From null at suse.de Tue Jan 2 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 08:30:03 -0000 Subject: SUSE-RU-2024:0001-1: moderate: Recommended update for kiwi-templates-Minimal Message-ID: <170418420365.21554.14950982355250166916@smelt2.prg2.suse.org> # Recommended update for kiwi-templates-Minimal Announcement ID: SUSE-RU-2024:0001-1 Rating: moderate References: * jsc#PED-3495 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature can now be installed. ## Description: This update for kiwi-templates-Minimal fixes the following issues: * Increase disk offset for RaspberryPi images to make space for customer- specific boot firmware (jsc#PED-3495) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-1=1 openSUSE-SLE-15.5-2024-1=1 ## Package List: * Development Tools Module 15-SP5 (noarch) * kiwi-templates-Minimal-15.5-150500.5.4.1 * openSUSE Leap 15.5 (noarch) * kiwi-templates-Minimal-15.5-150500.5.4.1 ## References: * https://jira.suse.com/browse/PED-3495 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 12:30:02 -0000 Subject: SUSE-SU-2024:0006-1: moderate: Security update for libssh2_org Message-ID: <170419860202.9573.10210845494702704047@smelt2.prg2.suse.org> # Security update for libssh2_org Announcement ID: SUSE-SU-2024:0006-1 Rating: moderate References: * bsc#1218127 Cross-References: * CVE-2023-48795 CVSS scores: * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for libssh2_org fixes the following issues: * CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (Terrapin Attack) (bsc#1218127). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-6=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-6=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-6=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-6=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-6=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-6=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-6=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-6=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-6=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-6=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-6=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-6=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-6=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-6=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-6=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-6=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-6=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-6=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-6=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-6=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-6=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-6=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-6=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-6=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-6=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-6=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-6=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-6=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-6=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-6=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-6=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-6=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-6=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-6=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * openSUSE Leap 15.4 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * openSUSE Leap 15.5 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Manager Proxy 4.3 (x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE CaaS Platform 4.0 (x86_64) * libssh2-1-1.11.0-150000.4.22.1 * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 ## References: * https://www.suse.com/security/cve/CVE-2023-48795.html * https://bugzilla.suse.com/show_bug.cgi?id=1218127 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 12:30:06 -0000 Subject: SUSE-SU-2024:0005-1: important: Security update for gstreamer-plugins-bad Message-ID: <170419860663.9573.11954407531408975722@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-bad Announcement ID: SUSE-SU-2024:0005-1 Rating: important References: * bsc#1215792 * bsc#1217213 Cross-References: * CVE-2023-40475 * CVE-2023-44446 CVSS scores: * CVE-2023-40475 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-44446 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP4 * Desktop Applications Module 15-SP4 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for gstreamer-plugins-bad fixes the following issues: * CVE-2023-44446: Fixed GStreamer MXF File Parsing Use-After-Free (bsc#1217213). * CVE-2023-40475: Fixed GStreamer MXF File Parsing Integer Overflow (bsc#1215792). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-5=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-5=1 * Desktop Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-5=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-5=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-5=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-5=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-5=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-5=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-5=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-5=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-5=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-5=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-5=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * gstreamer-transcoder-devel-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgsttranscoder-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstVulkanXCB-1_0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-transcoder-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstVulkanWayland-1_0-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgsttranscoder-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstVulkan-1_0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * gstreamer-transcoder-debuginfo-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * typelib-1_0-GstTranscoder-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * openSUSE Leap 15.4 (x86_64) * gstreamer-plugins-bad-32bit-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-32bit-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstplay-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-32bit-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstva-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-32bit-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-32bit-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstva-1_0-0-32bit-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstplay-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * openSUSE Leap 15.4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * openSUSE Leap 15.4 (aarch64_ilp32) * gstreamer-plugins-bad-chromaprint-64bit-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstva-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-64bit-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstplay-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-64bit-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstva-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstplay-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-64bit-1.20.1-150400.3.15.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * Desktop Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * Desktop Applications Module 15-SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64) * libgsttranscoder-1_0-0-1.20.1-150400.3.15.1 * libgsttranscoder-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Manager Proxy 4.3 (x86_64) * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40475.html * https://www.suse.com/security/cve/CVE-2023-44446.html * https://bugzilla.suse.com/show_bug.cgi?id=1215792 * https://bugzilla.suse.com/show_bug.cgi?id=1217213 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 12:30:10 -0000 Subject: SUSE-SU-2024:0004-1: important: Security update for webkit2gtk3 Message-ID: <170419861062.9573.12671578448364343219@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:0004-1 Rating: important References: * bsc#1215868 * bsc#1215869 * bsc#1215870 * bsc#1218032 * bsc#1218033 Cross-References: * CVE-2023-32359 * CVE-2023-39928 * CVE-2023-40451 * CVE-2023-41074 * CVE-2023-42883 * CVE-2023-42890 CVSS scores: * CVE-2023-32359 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-32359 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-39928 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-39928 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40451 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40451 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-41074 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-41074 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42883 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42890 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42890 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP4 * Desktop Applications Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves six vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * CVE-2023-42890: Fixed processing malicious web content may lead to arbitrary code execution (bsc#1218033). * CVE-2023-42883: Fixed processing a malicious image may lead to a denial-of- service (bsc#1218032). * CVE-2023-41074: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215870). * CVE-2023-40451, CVE-2023-41074: Update to version 2.42.4 (bsc#1218032, bsc#1215868). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-4=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4=1 * Desktop Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-4=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-4=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-4=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-4=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4=1 openSUSE-SLE-15.4-2024-4=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4=1 ## Package List: * Basesystem Module 15-SP4 (noarch) * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * Basesystem Module 15-SP5 (noarch) * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * Desktop Applications Module 15-SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * Desktop Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * Desktop Applications Module 15-SP5 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * Development Tools Module 15-SP5 (noarch) * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * SUSE Manager Proxy 4.3 (noarch) * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Manager Proxy 4.3 (x86_64) * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * SUSE Manager Retail Branch Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Manager Retail Branch Server 4.3 (x86_64) * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * SUSE Manager Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * openSUSE Leap 15.4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * webkit2gtk3-minibrowser-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk4-minibrowser-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit-jsc-4-2.42.4-150400.4.70.3 * webkit-jsc-6.0-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * webkit2gtk4-minibrowser-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * webkit-jsc-4.1-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk3-minibrowser-2.42.4-150400.4.70.3 * webkit-jsc-6.0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-minibrowser-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * webkit-jsc-4-debuginfo-2.42.4-150400.4.70.3 * webkit-jsc-4.1-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-devel-2.42.4-150400.4.70.3 * typelib-1_0-WebKitWebProcessExtension-6_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-minibrowser-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-6_0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit-6_0-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * openSUSE Leap 15.4 (x86_64) * libwebkit2gtk-4_1-0-32bit-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-32bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-32bit-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-32bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-32bit-2.42.4-150400.4.70.3 * openSUSE Leap 15.4 (aarch64_ilp32) * libwebkit2gtk-4_1-0-64bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-64bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-64bit-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-64bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-64bit-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-64bit-debuginfo-2.42.4-150400.4.70.3 * openSUSE Leap 15.5 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * webkit2gtk3-minibrowser-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk4-minibrowser-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit-jsc-4-2.42.4-150400.4.70.3 * webkit-jsc-6.0-debuginfo-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * webkit2gtk4-minibrowser-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit-jsc-4.1-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * webkit-jsc-6.0-2.42.4-150400.4.70.3 * webkit2gtk3-minibrowser-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-minibrowser-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * webkit-jsc-4-debuginfo-2.42.4-150400.4.70.3 * webkit-jsc-4.1-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk4-devel-2.42.4-150400.4.70.3 * typelib-1_0-WebKitWebProcessExtension-6_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-minibrowser-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-6_0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit-6_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * openSUSE Leap 15.5 (x86_64) * libwebkit2gtk-4_1-0-32bit-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-32bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-32bit-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-32bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-32bit-2.42.4-150400.4.70.3 ## References: * https://www.suse.com/security/cve/CVE-2023-32359.html * https://www.suse.com/security/cve/CVE-2023-39928.html * https://www.suse.com/security/cve/CVE-2023-40451.html * https://www.suse.com/security/cve/CVE-2023-41074.html * https://www.suse.com/security/cve/CVE-2023-42883.html * https://www.suse.com/security/cve/CVE-2023-42890.html * https://bugzilla.suse.com/show_bug.cgi?id=1215868 * https://bugzilla.suse.com/show_bug.cgi?id=1215869 * https://bugzilla.suse.com/show_bug.cgi?id=1215870 * https://bugzilla.suse.com/show_bug.cgi?id=1218032 * https://bugzilla.suse.com/show_bug.cgi?id=1218033 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 12:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 12:30:15 -0000 Subject: SUSE-SU-2024:0003-1: important: Security update for webkit2gtk3 Message-ID: <170419861531.9573.12602987626335479985@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:0003-1 Rating: important References: * bsc#1215868 * bsc#1215870 * bsc#1218032 * bsc#1218033 Cross-References: * CVE-2023-32359 * CVE-2023-39928 * CVE-2023-41074 * CVE-2023-42883 * CVE-2023-42890 CVSS scores: * CVE-2023-32359 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-32359 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-39928 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-39928 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-41074 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-41074 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42883 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42890 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42890 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves five vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * CVE-2023-42890: Fixed processing malicious web content may lead to arbitrary code execution (bsc#1218033). * CVE-2023-42883: Fixed processing a malicious image may lead to a denial-of- service (bsc#1218032). * CVE-2023-41074: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215870). * CVE-2023-40451, CVE-2023-41074: Update to version 2.42.4 (bsc#1215868). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-3=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Enterprise Storage 7.1 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 ## References: * https://www.suse.com/security/cve/CVE-2023-32359.html * https://www.suse.com/security/cve/CVE-2023-39928.html * https://www.suse.com/security/cve/CVE-2023-41074.html * https://www.suse.com/security/cve/CVE-2023-42883.html * https://www.suse.com/security/cve/CVE-2023-42890.html * https://bugzilla.suse.com/show_bug.cgi?id=1215868 * https://bugzilla.suse.com/show_bug.cgi?id=1215870 * https://bugzilla.suse.com/show_bug.cgi?id=1218032 * https://bugzilla.suse.com/show_bug.cgi?id=1218033 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 12:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 12:30:17 -0000 Subject: SUSE-SU-2024:0002-1: important: Security update for webkit2gtk3 Message-ID: <170419861762.9573.11452497306341673668@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:0002-1 Rating: important References: * bsc#1215868 * bsc#1215869 * bsc#1215870 * bsc#1218032 * bsc#1218033 Cross-References: * CVE-2023-32359 * CVE-2023-39928 * CVE-2023-40451 * CVE-2023-41074 * CVE-2023-42883 * CVE-2023-42890 CVSS scores: * CVE-2023-32359 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-32359 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-39928 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-39928 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40451 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40451 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-41074 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-41074 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42883 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42890 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42890 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE CaaS Platform 4.0 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 An update that solves six vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * CVE-2023-42890: Fixed processing malicious web content may lead to arbitrary code execution (bsc#1218033). * CVE-2023-42883: Fixed processing a malicious image may lead to a denial-of- service (bsc#1218032). * CVE-2023-41074: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215870). * CVE-2023-39928: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215868). * CVE-2023-40451, CVE-2023-41074: Update to version 2.42.4 (bsc#1215868). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-2=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-2=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-2=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2-4_0-2.42.4-150000.3.163.2 * libjavascriptcoregtk-4_0-18-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150000.3.163.2 * webkit2gtk3-debugsource-2.42.4-150000.3.163.2 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-2.42.4-150000.3.163.2 * webkit2gtk3-devel-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150000.3.163.2 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * libwebkit2gtk3-lang-2.42.4-150000.3.163.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2-4_0-2.42.4-150000.3.163.2 * libjavascriptcoregtk-4_0-18-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150000.3.163.2 * webkit2gtk3-debugsource-2.42.4-150000.3.163.2 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-2.42.4-150000.3.163.2 * webkit2gtk3-devel-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150000.3.163.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * libwebkit2gtk3-lang-2.42.4-150000.3.163.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2-4_0-2.42.4-150000.3.163.2 * libjavascriptcoregtk-4_0-18-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150000.3.163.2 * webkit2gtk3-debugsource-2.42.4-150000.3.163.2 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-2.42.4-150000.3.163.2 * webkit2gtk3-devel-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150000.3.163.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * libwebkit2gtk3-lang-2.42.4-150000.3.163.2 * SUSE CaaS Platform 4.0 (x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2-4_0-2.42.4-150000.3.163.2 * libjavascriptcoregtk-4_0-18-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150000.3.163.2 * webkit2gtk3-debugsource-2.42.4-150000.3.163.2 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-2.42.4-150000.3.163.2 * webkit2gtk3-devel-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150000.3.163.2 * SUSE CaaS Platform 4.0 (noarch) * libwebkit2gtk3-lang-2.42.4-150000.3.163.2 ## References: * https://www.suse.com/security/cve/CVE-2023-32359.html * https://www.suse.com/security/cve/CVE-2023-39928.html * https://www.suse.com/security/cve/CVE-2023-40451.html * https://www.suse.com/security/cve/CVE-2023-41074.html * https://www.suse.com/security/cve/CVE-2023-42883.html * https://www.suse.com/security/cve/CVE-2023-42890.html * https://bugzilla.suse.com/show_bug.cgi?id=1215868 * https://bugzilla.suse.com/show_bug.cgi?id=1215869 * https://bugzilla.suse.com/show_bug.cgi?id=1215870 * https://bugzilla.suse.com/show_bug.cgi?id=1218032 * https://bugzilla.suse.com/show_bug.cgi?id=1218033 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 16:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 16:30:01 -0000 Subject: SUSE-RU-2024:0013-1: moderate: Recommended update for wget Message-ID: <170421300162.30528.13093459873310253916@smelt2.prg2.suse.org> # Recommended update for wget Announcement ID: SUSE-RU-2024:0013-1 Rating: moderate References: * bsc#1217717 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for wget fixes the following issue: * Fixed the failure to detect SSL handshake timeout [bsc#1217717] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-13=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-13=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-13=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * wget-debuginfo-1.14-21.16.1 * wget-1.14-21.16.1 * wget-debugsource-1.14-21.16.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * wget-debuginfo-1.14-21.16.1 * wget-1.14-21.16.1 * wget-debugsource-1.14-21.16.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * wget-debuginfo-1.14-21.16.1 * wget-1.14-21.16.1 * wget-debugsource-1.14-21.16.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217717 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 16:30:03 -0000 Subject: SUSE-SU-2024:0012-1: important: Security update for postfix Message-ID: <170421300329.30528.11409484318827293016@smelt2.prg2.suse.org> # Security update for postfix Announcement ID: SUSE-SU-2024:0012-1 Rating: important References: * bsc#1218304 * bsc#1218314 Cross-References: * CVE-2023-51764 CVSS scores: * CVE-2023-51764 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP4 * Legacy Module 15-SP4 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * Server Applications Module 15-SP4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for postfix fixes the following issues: * CVE-2023-51764: Fixed SMTP smuggling attack (bsc#1218304). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-12=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-12=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-12=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-12=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-12=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-12=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-12=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-12=1 * Legacy Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP4-2024-12=1 * Server Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2024-12=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-12=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-12=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-12=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-12=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-12=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-12=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-12=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-12=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-12=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Manager Proxy 4.3 (x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * SUSE Manager Proxy 4.3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * SUSE Manager Server 4.3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Enterprise Storage 7.1 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-postgresql-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * postfix-postgresql-debuginfo-3.5.9-150300.5.15.1 * openSUSE Leap 15.3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-postgresql-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * postfix-postgresql-debuginfo-3.5.9-150300.5.15.1 * openSUSE Leap 15.4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * Basesystem Module 15-SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * Legacy Module 15-SP4 (aarch64 ppc64le s390x x86_64) * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * Server Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51764.html * https://bugzilla.suse.com/show_bug.cgi?id=1218304 * https://bugzilla.suse.com/show_bug.cgi?id=1218314 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 16:30:07 -0000 Subject: SUSE-RU-2024:0011-1: moderate: Recommended update for procps Message-ID: <170421300746.30528.5871877738441092098@smelt2.prg2.suse.org> # Recommended update for procps Announcement ID: SUSE-RU-2024:0011-1 Rating: moderate References: * bsc#1029961 * bsc#1158830 * bsc#1206798 * bsc#1209122 * jsc#PED-3144 * jsc#PED-3244 * jsc#PED-6369 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains three features and has four fixes can now be installed. ## Description: This update for procps fixes the following issues: * Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) * For support up to 2048 CPU as well (bsc#1185417) * Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) * Get the first CPU summary correct (bsc#1121753) * Enable pidof for SLE-15 as this is provided by sysvinit-tools * Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build * Do not truncate output of w with option -n * Prefer logind over utmp (jsc#PED-3144) * Don't install translated man pages for non-installed binaries (uptime, kill). * Fix directory for Ukrainian man pages translations. * Move localized man pages to lang package. * Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops * Package translations in procps-lang. * Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. * Enable pidof by default * Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * "ps -C" does not allow anymore an argument longer than 15 characters (bsc#1158830) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-11=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-11=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-11=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-11=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-11=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-11=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-11=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-11=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-11=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-11=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-11=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-11=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-11=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-11=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-11=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-11=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-11=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-11=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-11=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-11=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-11=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-11=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-11=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-11=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-11=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64) * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * procps-debugsource-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64) * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * procps-debugsource-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE CaaS Platform 4.0 (x86_64) * procps-devel-3.3.17-150000.7.37.1 * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * procps-debuginfo-3.3.17-150000.7.37.1 * procps-debugsource-3.3.17-150000.7.37.1 * procps-3.3.17-150000.7.37.1 * libprocps8-3.3.17-150000.7.37.1 * libprocps8-debuginfo-3.3.17-150000.7.37.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1029961 * https://bugzilla.suse.com/show_bug.cgi?id=1158830 * https://bugzilla.suse.com/show_bug.cgi?id=1206798 * https://bugzilla.suse.com/show_bug.cgi?id=1209122 * https://jira.suse.com/browse/PED-3144 * https://jira.suse.com/browse/PED-3244 * https://jira.suse.com/browse/PED-6369 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 16:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 16:30:12 -0000 Subject: SUSE-SU-2024:0010-1: moderate: Security update for polkit Message-ID: <170421301259.30528.6184165235294390265@smelt2.prg2.suse.org> # Security update for polkit Announcement ID: SUSE-SU-2024:0010-1 Rating: moderate References: * bsc#1209282 Affected Products: * Basesystem Module 15-SP4 * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one security fix can now be installed. ## Description: This update for polkit fixes the following issues: * Change permissions for rules folders (bsc#1209282) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-10=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-10=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-10=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-10=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-10=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-10=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-10=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-10=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-10=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-10=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-10=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * typelib-1_0-Polkit-1_0-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-devel-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * polkit-devel-0.116-150200.3.12.1 * openSUSE Leap 15.4 (x86_64) * libpolkit0-32bit-debuginfo-0.116-150200.3.12.1 * libpolkit0-32bit-0.116-150200.3.12.1 * openSUSE Leap 15.4 (noarch) * polkit-doc-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * typelib-1_0-Polkit-1_0-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-devel-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * polkit-devel-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1209282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 16:30:14 -0000 Subject: SUSE-RU-2024:0009-1: moderate: Recommended update for samba Message-ID: <170421301485.30528.9616359230004755904@smelt2.prg2.suse.org> # Recommended update for samba Announcement ID: SUSE-RU-2024:0009-1 Rating: moderate References: * bsc#1214076 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that has one fix can now be installed. ## Description: This update for samba fixes the following issues: * Add "net offlinejoin composeodj" command (bsc#1214076) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-9=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-9=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-9=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-9=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-9=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-9=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-9=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-9=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-9=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-4.15.13+git.710.7032820fcd-150300.3.66.2 * ctdb-pcp-pmda-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-4.15.13+git.710.7032820fcd-150300.3.66.2 * ctdb-pcp-pmda-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-test-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-tool-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-test-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * ctdb-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-4.15.13+git.710.7032820fcd-150300.3.66.2 * ctdb-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * openSUSE Leap 15.3 (x86_64) * samba-devel-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * openSUSE Leap 15.3 (noarch) * samba-doc-4.15.13+git.710.7032820fcd-150300.3.66.2 * openSUSE Leap 15.3 (aarch64 x86_64) * samba-ceph-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * openSUSE Leap 15.3 (aarch64_ilp32) * samba-libs-python3-64bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-64bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-64bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-64bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-devel-64bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-64bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-64bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-64bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-64bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-64bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-64bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-64bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-64bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-64bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-64bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * ctdb-4.15.13+git.710.7032820fcd-150300.3.66.2 * ctdb-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ceph-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-tool-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * samba-devel-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ceph-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-tool-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * samba-devel-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-tool-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * samba-ceph-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * samba-devel-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-tool-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * samba-devel-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ceph-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ceph-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * ctdb-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-tool-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-python3-4.15.13+git.710.7032820fcd-150300.3.66.2 * ctdb-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Enterprise Storage 7.1 (x86_64) * samba-devel-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150300.3.66.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150300.3.66.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214076 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 16:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 16:30:17 -0000 Subject: SUSE-RU-2024:0008-1: moderate: Recommended update for samba Message-ID: <170421301705.30528.2617168002145088083@smelt2.prg2.suse.org> # Recommended update for samba Announcement ID: SUSE-RU-2024:0008-1 Rating: moderate References: * bsc#1214076 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for samba fixes the following issues: * Add "net offlinejoin composeodj" command (bsc#1214076) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-8=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-8=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-8=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-8=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-8=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-8=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-8=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-8=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-8=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-8=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-8=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-8=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-8=1 openSUSE-SLE-15.4-2024-8=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-8=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-8=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-8=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-8=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * ctdb-4.15.13+git.710.7032820fcd-150400.3.34.2 * ctdb-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * samba-winbind-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-tool-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * samba-winbind-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-tool-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-tool-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-tool-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * samba-winbind-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-tool-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64) * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * samba-winbind-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-tool-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Manager Proxy 4.3 (x86_64) * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-tool-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-tool-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * samba-winbind-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-tool-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Manager Server 4.3 (x86_64) * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * samba-ad-dc-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * ctdb-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * ctdb-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-4.15.13+git.710.7032820fcd-150400.3.34.2 * ctdb-pcp-pmda-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-python3-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-test-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-gpupdate-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-test-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-tool-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-python3-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ldb-ldap-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-dsdb-modules-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * ctdb-pcp-pmda-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * openSUSE Leap 15.4 (x86_64) * samba-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-32bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-32bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * openSUSE Leap 15.4 (noarch) * samba-doc-4.15.13+git.710.7032820fcd-150400.3.34.2 * openSUSE Leap 15.4 (aarch64 x86_64) * samba-ceph-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ceph-4.15.13+git.710.7032820fcd-150400.3.34.2 * openSUSE Leap 15.4 (aarch64_ilp32) * samba-client-libs-64bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-64bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-64bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-64bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-64bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-64bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-64bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-64bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-64bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-ad-dc-libs-64bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-devel-64bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-64bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-python3-64bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-winbind-libs-64bit-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * libsamba-policy0-python3-64bit-4.15.13+git.710.7032820fcd-150400.3.34.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * samba-debugsource-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-client-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 * samba-libs-debuginfo-4.15.13+git.710.7032820fcd-150400.3.34.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214076 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 20:33:55 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 02 Jan 2024 20:33:55 -0000 Subject: SUSE-SU-2024:0014-1: moderate: Security update for w3m Message-ID: <170422763593.19586.14659994935450925098@smelt2.prg2.suse.org> # Security update for w3m Announcement ID: SUSE-SU-2024:0014-1 Rating: moderate References: * bsc#1218226 Cross-References: * CVE-2023-4255 CVSS scores: * CVE-2023-4255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for w3m fixes the following issues: * CVE-2023-4255: Fixed out-of-bounds write in function checkType() in etc.c (bsc#1218226). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-14=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-14=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-14=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * w3m-debuginfo-0.5.3.git20161120-161.9.1 * w3m-0.5.3.git20161120-161.9.1 * w3m-debugsource-0.5.3.git20161120-161.9.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * w3m-debuginfo-0.5.3.git20161120-161.9.1 * w3m-0.5.3.git20161120-161.9.1 * w3m-debugsource-0.5.3.git20161120-161.9.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * w3m-debuginfo-0.5.3.git20161120-161.9.1 * w3m-0.5.3.git20161120-161.9.1 * w3m-debugsource-0.5.3.git20161120-161.9.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4255.html * https://bugzilla.suse.com/show_bug.cgi?id=1218226 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Wed Jan 3 08:06:33 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 3 Jan 2024 09:06:33 +0100 (CET) Subject: SUSE-CU-2024:7-1: Recommended update of suse/sle15 Message-ID: <20240103080633.28CD6FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:7-1 Container Tags : suse/sle15:15.1 , suse/sle15:15.1.6.2.859 Container Release : 6.2.859 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-updates at lists.suse.com Wed Jan 3 08:07:48 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 3 Jan 2024 09:07:48 +0100 (CET) Subject: SUSE-CU-2024:8-1: Recommended update of suse/sle15 Message-ID: <20240103080748.6F93DFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:8-1 Container Tags : suse/sle15:15.2 , suse/sle15:15.2.9.5.388 Container Release : 9.5.388 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-updates at lists.suse.com Wed Jan 3 08:08:52 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 3 Jan 2024 09:08:52 +0100 (CET) Subject: SUSE-CU-2024:9-1: Recommended update of suse/sle15 Message-ID: <20240103080852.C4386FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:9-1 Container Tags : bci/bci-base:15.3 , bci/bci-base:15.3.17.20.232 , suse/sle15:15.3 , suse/sle15:15.3.17.20.232 Container Release : 17.20.232 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - libprocps7-3.3.15-150000.7.34.1 removed From null at suse.de Wed Jan 3 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 03 Jan 2024 12:30:05 -0000 Subject: SUSE-RU-2024:0020-1: moderate: Recommended update for lifecycle-data-sle-module-live-patching Message-ID: <170428500554.9974.18346306451540349429@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-module-live-patching Announcement ID: SUSE-RU-2024:0020-1 Rating: moderate References: * bsc#1020320 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP1 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for lifecycle-data-sle-module-live-patching fixes the following issues: * Added data for 4_12_14-150100_197_154, 4_12_14-150100_197_157, 5_14_21-150400_24_74, 5_14_21-150400_24_81, 5_14_21-150400_24_84, 5_14_21-150500_55_12, 5_14_21-150500_55_19, 5_14_21-150500_55_22, 5_3_18-150200_24_160, 5_3_18-150200_24_163, 5_3_18-150300_59_130, 5_3_18-150300_59_133, +kernel-livepatch-5_14_21-150400_15_46-rt, _,+kernel- livepatch-5_14_21-150400_15_49-rt,_ ,+kernel- livepatch-5_14_21-150500_13_11-rt, _,+kernel- livepatch-5_14_21-150500_13_14-rt,_. (bsc#1020320) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-20=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-20=1 * SUSE Linux Enterprise Live Patching 15-SP1 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2024-20=1 * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-20=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-20=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-20=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-20=1 ## Package List: * openSUSE Leap 15.4 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.102.1 * openSUSE Leap 15.5 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.102.1 * SUSE Linux Enterprise Live Patching 15-SP1 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.102.1 * SUSE Linux Enterprise Live Patching 15-SP2 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.102.1 * SUSE Linux Enterprise Live Patching 15-SP3 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.102.1 * SUSE Linux Enterprise Live Patching 15-SP4 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.102.1 * SUSE Linux Enterprise Live Patching 15-SP5 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.102.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1020320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 3 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 03 Jan 2024 12:30:07 -0000 Subject: SUSE-RU-2024:0019-1: moderate: Recommended update for libe-book Message-ID: <170428500711.9974.18034747157766990982@smelt2.prg2.suse.org> # Recommended update for libe-book Announcement ID: SUSE-RU-2024:0019-1 Rating: moderate References: * jsc#PED-6193 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP4 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that contains one feature can now be installed. ## Description: This update for libe-book fixes the following issues: * Rebuild against current ICU (jsc#PED-6193) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-19=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-19=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-19=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-19=1 * SUSE Linux Enterprise Workstation Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2024-19=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-19=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libe-book-debugsource-0.1.3-150200.9.3.1 * libe-book-0_1-1-0.1.3-150200.9.3.1 * libe-book-tools-debuginfo-0.1.3-150200.9.3.1 * libe-book-0_1-1-debuginfo-0.1.3-150200.9.3.1 * libe-book-tools-0.1.3-150200.9.3.1 * libe-book-debuginfo-0.1.3-150200.9.3.1 * libe-book-devel-0.1.3-150200.9.3.1 * openSUSE Leap 15.4 (noarch) * libe-book-devel-doc-0.1.3-150200.9.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libe-book-debugsource-0.1.3-150200.9.3.1 * libe-book-0_1-1-0.1.3-150200.9.3.1 * libe-book-tools-debuginfo-0.1.3-150200.9.3.1 * libe-book-0_1-1-debuginfo-0.1.3-150200.9.3.1 * libe-book-tools-0.1.3-150200.9.3.1 * libe-book-debuginfo-0.1.3-150200.9.3.1 * libe-book-devel-0.1.3-150200.9.3.1 * openSUSE Leap 15.5 (noarch) * libe-book-devel-doc-0.1.3-150200.9.3.1 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x) * libe-book-debugsource-0.1.3-150200.9.3.1 * libe-book-0_1-1-0.1.3-150200.9.3.1 * libe-book-tools-debuginfo-0.1.3-150200.9.3.1 * libe-book-0_1-1-debuginfo-0.1.3-150200.9.3.1 * libe-book-tools-0.1.3-150200.9.3.1 * libe-book-debuginfo-0.1.3-150200.9.3.1 * libe-book-devel-0.1.3-150200.9.3.1 * SUSE Package Hub 15 15-SP4 (noarch) * libe-book-devel-doc-0.1.3-150200.9.3.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * libe-book-debugsource-0.1.3-150200.9.3.1 * libe-book-0_1-1-0.1.3-150200.9.3.1 * libe-book-tools-debuginfo-0.1.3-150200.9.3.1 * libe-book-0_1-1-debuginfo-0.1.3-150200.9.3.1 * libe-book-tools-0.1.3-150200.9.3.1 * libe-book-debuginfo-0.1.3-150200.9.3.1 * libe-book-devel-0.1.3-150200.9.3.1 * SUSE Package Hub 15 15-SP5 (noarch) * libe-book-devel-doc-0.1.3-150200.9.3.1 * SUSE Linux Enterprise Workstation Extension 15 SP4 (x86_64) * libe-book-debugsource-0.1.3-150200.9.3.1 * libe-book-0_1-1-0.1.3-150200.9.3.1 * libe-book-0_1-1-debuginfo-0.1.3-150200.9.3.1 * libe-book-debuginfo-0.1.3-150200.9.3.1 * libe-book-devel-0.1.3-150200.9.3.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * libe-book-debugsource-0.1.3-150200.9.3.1 * libe-book-0_1-1-0.1.3-150200.9.3.1 * libe-book-0_1-1-debuginfo-0.1.3-150200.9.3.1 * libe-book-debuginfo-0.1.3-150200.9.3.1 * libe-book-devel-0.1.3-150200.9.3.1 ## References: * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 3 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 03 Jan 2024 12:30:08 -0000 Subject: SUSE-RU-2024:0018-1: moderate: Recommended update for libqxp Message-ID: <170428500856.9974.11141733857102501597@smelt2.prg2.suse.org> # Recommended update for libqxp Announcement ID: SUSE-RU-2024:0018-1 Rating: moderate References: * jsc#PED-6193 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP4 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that contains one feature can now be installed. ## Description: This update for libqxp fixes the following issue: * rebuild against ICU 73. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-18=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-18=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-18=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-18=1 * SUSE Linux Enterprise Workstation Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2024-18=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-18=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libqxp-0_0-0-0.0.1-150200.10.2.1 * libqxp-0_0-0-debuginfo-0.0.1-150200.10.2.1 * libqxp-tools-0.0.1-150200.10.2.1 * libqxp-debugsource-0.0.1-150200.10.2.1 * libqxp-devel-0.0.1-150200.10.2.1 * libqxp-debuginfo-0.0.1-150200.10.2.1 * libqxp-tools-debuginfo-0.0.1-150200.10.2.1 * openSUSE Leap 15.4 (noarch) * libqxp-doc-0.0.1-150200.10.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libqxp-0_0-0-0.0.1-150200.10.2.1 * libqxp-0_0-0-debuginfo-0.0.1-150200.10.2.1 * libqxp-tools-0.0.1-150200.10.2.1 * libqxp-debugsource-0.0.1-150200.10.2.1 * libqxp-devel-0.0.1-150200.10.2.1 * libqxp-debuginfo-0.0.1-150200.10.2.1 * libqxp-tools-debuginfo-0.0.1-150200.10.2.1 * openSUSE Leap 15.5 (noarch) * libqxp-doc-0.0.1-150200.10.2.1 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x) * libqxp-0_0-0-0.0.1-150200.10.2.1 * libqxp-0_0-0-debuginfo-0.0.1-150200.10.2.1 * libqxp-tools-0.0.1-150200.10.2.1 * libqxp-debugsource-0.0.1-150200.10.2.1 * libqxp-devel-0.0.1-150200.10.2.1 * libqxp-debuginfo-0.0.1-150200.10.2.1 * libqxp-tools-debuginfo-0.0.1-150200.10.2.1 * SUSE Package Hub 15 15-SP4 (noarch) * libqxp-doc-0.0.1-150200.10.2.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * libqxp-0_0-0-0.0.1-150200.10.2.1 * libqxp-0_0-0-debuginfo-0.0.1-150200.10.2.1 * libqxp-tools-0.0.1-150200.10.2.1 * libqxp-debugsource-0.0.1-150200.10.2.1 * libqxp-devel-0.0.1-150200.10.2.1 * libqxp-debuginfo-0.0.1-150200.10.2.1 * libqxp-tools-debuginfo-0.0.1-150200.10.2.1 * SUSE Package Hub 15 15-SP5 (noarch) * libqxp-doc-0.0.1-150200.10.2.1 * SUSE Linux Enterprise Workstation Extension 15 SP4 (x86_64) * libqxp-0_0-0-0.0.1-150200.10.2.1 * libqxp-0_0-0-debuginfo-0.0.1-150200.10.2.1 * libqxp-debugsource-0.0.1-150200.10.2.1 * libqxp-devel-0.0.1-150200.10.2.1 * libqxp-debuginfo-0.0.1-150200.10.2.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * libqxp-0_0-0-0.0.1-150200.10.2.1 * libqxp-0_0-0-debuginfo-0.0.1-150200.10.2.1 * libqxp-debugsource-0.0.1-150200.10.2.1 * libqxp-devel-0.0.1-150200.10.2.1 * libqxp-debuginfo-0.0.1-150200.10.2.1 ## References: * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 3 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 03 Jan 2024 12:30:10 -0000 Subject: SUSE-RU-2024:0017-1: moderate: Recommended update for gnustep-base Message-ID: <170428501003.9974.10030140441109671347@smelt2.prg2.suse.org> # Recommended update for gnustep-base Announcement ID: SUSE-RU-2024:0017-1 Rating: moderate References: * jsc#PED-6193 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for gnustep-base fixes the following issues: * Build against ICU 73. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-17=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-17=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-17=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-17=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-17=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-17=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-17=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-17=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-17=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-17=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-17=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-17=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libgnustep-base1_25-1.25.1-150200.9.3.1 * gnustep-base-debuginfo-1.25.1-150200.9.3.1 * gnustep-base-devel-1.25.1-150200.9.3.1 * libgnustep-base1_25-debuginfo-1.25.1-150200.9.3.1 * gnustep-base-debugsource-1.25.1-150200.9.3.1 * gnustep-base-1.25.1-150200.9.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libgnustep-base1_25-1.25.1-150200.9.3.1 * gnustep-base-debuginfo-1.25.1-150200.9.3.1 * gnustep-base-devel-1.25.1-150200.9.3.1 * libgnustep-base1_25-debuginfo-1.25.1-150200.9.3.1 * gnustep-base-debugsource-1.25.1-150200.9.3.1 * gnustep-base-1.25.1-150200.9.3.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libgnustep-base1_25-1.25.1-150200.9.3.1 * gnustep-base-debugsource-1.25.1-150200.9.3.1 * gnustep-base-debuginfo-1.25.1-150200.9.3.1 * libgnustep-base1_25-debuginfo-1.25.1-150200.9.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libgnustep-base1_25-1.25.1-150200.9.3.1 * gnustep-base-debugsource-1.25.1-150200.9.3.1 * gnustep-base-debuginfo-1.25.1-150200.9.3.1 * libgnustep-base1_25-debuginfo-1.25.1-150200.9.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libgnustep-base1_25-1.25.1-150200.9.3.1 * gnustep-base-debugsource-1.25.1-150200.9.3.1 * gnustep-base-debuginfo-1.25.1-150200.9.3.1 * libgnustep-base1_25-debuginfo-1.25.1-150200.9.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libgnustep-base1_25-1.25.1-150200.9.3.1 * gnustep-base-debugsource-1.25.1-150200.9.3.1 * gnustep-base-debuginfo-1.25.1-150200.9.3.1 * libgnustep-base1_25-debuginfo-1.25.1-150200.9.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libgnustep-base1_25-1.25.1-150200.9.3.1 * gnustep-base-debugsource-1.25.1-150200.9.3.1 * gnustep-base-debuginfo-1.25.1-150200.9.3.1 * libgnustep-base1_25-debuginfo-1.25.1-150200.9.3.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libgnustep-base1_25-1.25.1-150200.9.3.1 * gnustep-base-debugsource-1.25.1-150200.9.3.1 * gnustep-base-debuginfo-1.25.1-150200.9.3.1 * libgnustep-base1_25-debuginfo-1.25.1-150200.9.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libgnustep-base1_25-1.25.1-150200.9.3.1 * gnustep-base-debugsource-1.25.1-150200.9.3.1 * gnustep-base-debuginfo-1.25.1-150200.9.3.1 * libgnustep-base1_25-debuginfo-1.25.1-150200.9.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libgnustep-base1_25-1.25.1-150200.9.3.1 * gnustep-base-debugsource-1.25.1-150200.9.3.1 * gnustep-base-debuginfo-1.25.1-150200.9.3.1 * libgnustep-base1_25-debuginfo-1.25.1-150200.9.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libgnustep-base1_25-1.25.1-150200.9.3.1 * gnustep-base-debugsource-1.25.1-150200.9.3.1 * gnustep-base-debuginfo-1.25.1-150200.9.3.1 * libgnustep-base1_25-debuginfo-1.25.1-150200.9.3.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libgnustep-base1_25-1.25.1-150200.9.3.1 * gnustep-base-debugsource-1.25.1-150200.9.3.1 * gnustep-base-debuginfo-1.25.1-150200.9.3.1 * libgnustep-base1_25-debuginfo-1.25.1-150200.9.3.1 ## References: * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 3 12:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 03 Jan 2024 12:30:12 -0000 Subject: SUSE-RU-2024:0016-1: moderate: Recommended update for biosdevname Message-ID: <170428501201.9974.1420346247351390463@smelt2.prg2.suse.org> # Recommended update for biosdevname Announcement ID: SUSE-RU-2024:0016-1 Rating: moderate References: * bsc#1217455 * jsc#PED-7333 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has one fix can now be installed. ## Description: This update for biosdevname fixes the following issues: Update to version 0.7.3.7.g495ab76 (bsc#1217455): * Add SMBIOS 3.x support * Read DMI entries from /sys/firmware/dmi/tables/DMI * Add buffer read helper using read explicitly * man: fix all_ethN indentation * Netronome biosdevname support (#8) * Prevent infinite recursion in dmidecode.c::smbios_setslot by (#7) * Add support for ExaNIC network cards (#5) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-16=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-16=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-16=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-16=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-16=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-16=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-16=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-16=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-16=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-16=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-16=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-16=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-16=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-16=1 ## Package List: * openSUSE Leap Micro 5.3 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * openSUSE Leap Micro 5.4 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * openSUSE Leap 15.4 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * openSUSE Leap 15.5 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * Basesystem Module 15-SP4 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * Basesystem Module 15-SP5 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * biosdevname-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debuginfo-0.7.3.7.g495ab76-150000.5.6.1 * biosdevname-debugsource-0.7.3.7.g495ab76-150000.5.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217455 * https://jira.suse.com/browse/PED-7333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 3 12:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 03 Jan 2024 12:30:13 -0000 Subject: SUSE-RU-2024:0015-1: moderate: Recommended update for lifecycle-data-sle-live-patching Message-ID: <170428501369.9974.4554392184494349518@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-live-patching Announcement ID: SUSE-RU-2024:0015-1 Rating: moderate References: * bsc#1020320 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 12 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for lifecycle-data-sle-live-patching fixes the following issues: * Added data for 4_12_14-122_173. (bsc#1020320) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-15=1 * SUSE Linux Enterprise Live Patching 12 zypper in -t patch SUSE-SLE-Live-Patching-12-2024-15=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (noarch) * lifecycle-data-sle-live-patching-1-10.137.1 * SUSE Linux Enterprise Live Patching 12 (noarch) * lifecycle-data-sle-live-patching-1-10.137.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1020320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 3 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 03 Jan 2024 16:30:02 -0000 Subject: SUSE-RU-2024:0022-1: moderate: Recommended update for libica, openssl-ibmca Message-ID: <170429940219.25286.12298102788683197501@smelt2.prg2.suse.org> # Recommended update for libica, openssl-ibmca Announcement ID: SUSE-RU-2024:0022-1 Rating: moderate References: * bsc#1207472 Affected Products: * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for libica, openssl-ibmca fixes the following issues: Changes in libica: * Added library in openssl3 flavor [bsc#1207472] Changes in openssl-ibmca: * Add a additional openssl engine for openssl 3 [bsc#1207472] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-22=1 openSUSE-SLE-15.5-2024-22=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-22=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-22=1 ## Package List: * openSUSE Leap 15.5 (s390x) * openssl-ibmca-2.4.0-150500.6.3.1 * libica-openssl3-tools-4.2.1-150500.3.3.9 * libica-debugsource-4.2.1-150500.3.3.7 * libica-openssl3-devel-static-4.2.1-150500.3.3.9 * libica-openssl3-tools-debuginfo-4.2.1-150500.3.3.9 * libica4-openssl3-4.2.1-150500.3.3.9 * openssl-ibmca-debuginfo-2.4.0-150500.6.3.1 * openssl3-ibmca-2.4.0-150500.6.3.1 * libica-openssl3-debuginfo-4.2.1-150500.3.3.9 * libica-tools-4.2.1-150500.3.3.7 * libica-debuginfo-4.2.1-150500.3.3.7 * libica-devel-4.2.1-150500.3.3.7 * libica4-4.2.1-150500.3.3.7 * libica-devel-static-4.2.1-150500.3.3.7 * openssl3-ibmca-debuginfo-2.4.0-150500.6.3.1 * libica4-debuginfo-4.2.1-150500.3.3.7 * libica4-openssl3-debuginfo-4.2.1-150500.3.3.9 * openssl-ibmca-debugsource-2.4.0-150500.6.3.1 * libica-openssl3-devel-4.2.1-150500.3.3.9 * openssl3-ibmca-debugsource-2.4.0-150500.6.3.1 * libica-tools-debuginfo-4.2.1-150500.3.3.7 * libica-openssl3-debugsource-4.2.1-150500.3.3.9 * SUSE Linux Enterprise Micro 5.5 (s390x) * openssl-ibmca-2.4.0-150500.6.3.1 * libica4-4.2.1-150500.3.3.7 * libica-debugsource-4.2.1-150500.3.3.7 * openssl-ibmca-debuginfo-2.4.0-150500.6.3.1 * libica-tools-4.2.1-150500.3.3.7 * libica4-debuginfo-4.2.1-150500.3.3.7 * libica-tools-debuginfo-4.2.1-150500.3.3.7 * openssl-ibmca-debugsource-2.4.0-150500.6.3.1 * libica-debuginfo-4.2.1-150500.3.3.7 * Server Applications Module 15-SP5 (s390x) * openssl-ibmca-2.4.0-150500.6.3.1 * libica-openssl3-tools-4.2.1-150500.3.3.9 * libica-debugsource-4.2.1-150500.3.3.7 * libica-openssl3-devel-static-4.2.1-150500.3.3.9 * libica-openssl3-tools-debuginfo-4.2.1-150500.3.3.9 * libica4-openssl3-4.2.1-150500.3.3.9 * openssl-ibmca-debuginfo-2.4.0-150500.6.3.1 * openssl3-ibmca-2.4.0-150500.6.3.1 * libica-openssl3-debuginfo-4.2.1-150500.3.3.9 * libica-tools-4.2.1-150500.3.3.7 * libica-debuginfo-4.2.1-150500.3.3.7 * libica-devel-4.2.1-150500.3.3.7 * libica4-4.2.1-150500.3.3.7 * libica-devel-static-4.2.1-150500.3.3.7 * openssl3-ibmca-debuginfo-2.4.0-150500.6.3.1 * libica4-debuginfo-4.2.1-150500.3.3.7 * libica4-openssl3-debuginfo-4.2.1-150500.3.3.9 * openssl-ibmca-debugsource-2.4.0-150500.6.3.1 * libica-openssl3-devel-4.2.1-150500.3.3.9 * openssl3-ibmca-debugsource-2.4.0-150500.6.3.1 * libica-tools-debuginfo-4.2.1-150500.3.3.7 * libica-openssl3-debugsource-4.2.1-150500.3.3.9 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1207472 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 3 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 03 Jan 2024 16:30:04 -0000 Subject: SUSE-RU-2024:0021-1: moderate: Recommended update for net-snmp Message-ID: <170429940474.25286.7161844922107701787@smelt2.prg2.suse.org> # Recommended update for net-snmp Announcement ID: SUSE-RU-2024:0021-1 Rating: moderate References: * bsc#1206044 * bsc#1207697 * bsc#1214364 * jsc#PED-6416 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that contains one feature and has three fixes can now be installed. ## Description: This update for net-snmp fixes the following issues: Update to net-snmp-5.9.4 (bsc#1214364). * libsnmp: * Remove the SNMP_SWIPE_MEM() macro Remove this macro since it is not used in the Net-SNMP code base. * DISPLAY-HINT fixes * Miscellanious improvements to the transports * Handle multiple oldEngineID configuration lines * fixes for DNS names longer than 63 characters * agent: * Added a ignoremount configuration option for the HOST-MIB * disallow SETs with a NULL varbind * fix the --enable-minimalist build * apps: * snmpset: allow SET with NULL varbind for testing * snmptrapd: improved MySQL logging code * general: * configure: Remove -Wno-deprecated as it is no longer needed * miscellanious ther bug fixes, build fixes and cleanups * Re-add support for hostname netgroups that was removed accidentally and previously added with FATE#316305 (bsc#1207697). '@hostgroup' can be specified for multiple hosts * Hardening systemd services setting "ProtectHome=true" caused home directory size and allocation to be listed incorrectly (bsc#1206044). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-21=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-21=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-21=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-21=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-21=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-21=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-21=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-21=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-21=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-21=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-21=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-21=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-21=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-21=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-21=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-21=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-21=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-21=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-21=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-devel-5.9.4-150300.15.11.1 * perl-SNMP-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * net-snmp-5.9.4-150300.15.11.1 * perl-SNMP-debuginfo-5.9.4-150300.15.11.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-devel-5.9.4-150300.15.11.1 * perl-SNMP-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * net-snmp-5.9.4-150300.15.11.1 * perl-SNMP-debuginfo-5.9.4-150300.15.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-devel-5.9.4-150300.15.11.1 * perl-SNMP-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * net-snmp-5.9.4-150300.15.11.1 * perl-SNMP-debuginfo-5.9.4-150300.15.11.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-devel-5.9.4-150300.15.11.1 * perl-SNMP-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * net-snmp-5.9.4-150300.15.11.1 * perl-SNMP-debuginfo-5.9.4-150300.15.11.1 * openSUSE Leap 15.3 (x86_64) * libsnmp40-32bit-5.9.4-150300.15.11.1 * net-snmp-devel-32bit-5.9.4-150300.15.11.1 * libsnmp40-32bit-debuginfo-5.9.4-150300.15.11.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * python3-net-snmp-5.9.4-150300.15.11.1 * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-devel-5.9.4-150300.15.11.1 * perl-SNMP-5.9.4-150300.15.11.1 * python2-net-snmp-debuginfo-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * python3-net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * net-snmp-5.9.4-150300.15.11.1 * python2-net-snmp-5.9.4-150300.15.11.1 * perl-SNMP-debuginfo-5.9.4-150300.15.11.1 * openSUSE Leap 15.3 (aarch64_ilp32) * net-snmp-devel-64bit-5.9.4-150300.15.11.1 * libsnmp40-64bit-5.9.4-150300.15.11.1 * libsnmp40-64bit-debuginfo-5.9.4-150300.15.11.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * openSUSE Leap 15.4 (x86_64) * libsnmp40-32bit-5.9.4-150300.15.11.1 * net-snmp-devel-32bit-5.9.4-150300.15.11.1 * libsnmp40-32bit-debuginfo-5.9.4-150300.15.11.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * python3-net-snmp-5.9.4-150300.15.11.1 * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-devel-5.9.4-150300.15.11.1 * perl-SNMP-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * python3-net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * net-snmp-5.9.4-150300.15.11.1 * perl-SNMP-debuginfo-5.9.4-150300.15.11.1 * openSUSE Leap 15.5 (x86_64) * libsnmp40-32bit-5.9.4-150300.15.11.1 * net-snmp-devel-32bit-5.9.4-150300.15.11.1 * libsnmp40-32bit-debuginfo-5.9.4-150300.15.11.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python3-net-snmp-5.9.4-150300.15.11.1 * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-devel-5.9.4-150300.15.11.1 * perl-SNMP-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * python3-net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * net-snmp-5.9.4-150300.15.11.1 * perl-SNMP-debuginfo-5.9.4-150300.15.11.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-devel-5.9.4-150300.15.11.1 * perl-SNMP-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * net-snmp-5.9.4-150300.15.11.1 * perl-SNMP-debuginfo-5.9.4-150300.15.11.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-devel-5.9.4-150300.15.11.1 * perl-SNMP-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * net-snmp-5.9.4-150300.15.11.1 * perl-SNMP-debuginfo-5.9.4-150300.15.11.1 * SUSE Package Hub 15 15-SP4 (x86_64) * libsnmp40-32bit-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * libsnmp40-32bit-debuginfo-5.9.4-150300.15.11.1 * SUSE Package Hub 15 15-SP5 (x86_64) * libsnmp40-32bit-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * libsnmp40-32bit-debuginfo-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libsnmp40-5.9.4-150300.15.11.1 * net-snmp-debugsource-5.9.4-150300.15.11.1 * net-snmp-devel-5.9.4-150300.15.11.1 * perl-SNMP-5.9.4-150300.15.11.1 * net-snmp-debuginfo-5.9.4-150300.15.11.1 * libsnmp40-debuginfo-5.9.4-150300.15.11.1 * snmp-mibs-5.9.4-150300.15.11.1 * net-snmp-5.9.4-150300.15.11.1 * perl-SNMP-debuginfo-5.9.4-150300.15.11.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1206044 * https://bugzilla.suse.com/show_bug.cgi?id=1207697 * https://bugzilla.suse.com/show_bug.cgi?id=1214364 * https://jira.suse.com/browse/PED-6416 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 3 20:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 03 Jan 2024 20:30:04 -0000 Subject: SUSE-RU-2024:0023-1: moderate: Recommended update for libica, openssl-ibmca Message-ID: <170431380450.13355.16531971203287827934@smelt2.prg2.suse.org> # Recommended update for libica, openssl-ibmca Announcement ID: SUSE-RU-2024:0023-1 Rating: moderate References: * bsc#1207472 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.4 * Server Applications Module 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for libica, openssl-ibmca fixes the following issues: Changes in libica: * Added library in openssl3 flavor [bsc#1207472] Changes in openssl-ibmca: * Add a additional openssl engine for openssl 3 [bsc#1207472] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-23=1 openSUSE-SLE-15.4-2024-23=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-23=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-23=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-23=1 * Server Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2024-23=1 ## Package List: * openSUSE Leap 15.4 (s390x) * libica4-openssl3-4.2.1-150400.3.11.10 * libica4-debuginfo-4.2.1-150400.3.11.8 * libica-tools-debuginfo-4.2.1-150400.3.11.8 * openssl-ibmca-2.4.0-150400.4.16.1 * libica-openssl3-debuginfo-4.2.1-150400.3.11.10 * libica-devel-static-4.2.1-150400.3.11.8 * libica-debugsource-4.2.1-150400.3.11.8 * libica-devel-4.2.1-150400.3.11.8 * openssl3-ibmca-debugsource-2.4.0-150400.4.16.1 * openssl3-ibmca-2.4.0-150400.4.16.1 * libica-openssl3-devel-static-4.2.1-150400.3.11.10 * libica-tools-4.2.1-150400.3.11.8 * libica-openssl3-tools-4.2.1-150400.3.11.10 * libica4-4.2.1-150400.3.11.8 * libica-openssl3-tools-debuginfo-4.2.1-150400.3.11.10 * libica4-openssl3-debuginfo-4.2.1-150400.3.11.10 * openssl-ibmca-debuginfo-2.4.0-150400.4.16.1 * openssl-ibmca-debugsource-2.4.0-150400.4.16.1 * libica-openssl3-devel-4.2.1-150400.3.11.10 * libica-openssl3-debugsource-4.2.1-150400.3.11.10 * openssl3-ibmca-debuginfo-2.4.0-150400.4.16.1 * libica-debuginfo-4.2.1-150400.3.11.8 * openSUSE Leap Micro 5.4 (s390x) * openssl-ibmca-debugsource-2.4.0-150400.4.16.1 * libica4-4.2.1-150400.3.11.8 * libica4-debuginfo-4.2.1-150400.3.11.8 * libica-tools-debuginfo-4.2.1-150400.3.11.8 * openssl-ibmca-2.4.0-150400.4.16.1 * libica-tools-4.2.1-150400.3.11.8 * libica-debugsource-4.2.1-150400.3.11.8 * openssl-ibmca-debuginfo-2.4.0-150400.4.16.1 * libica-debuginfo-4.2.1-150400.3.11.8 * SUSE Linux Enterprise Micro for Rancher 5.4 (s390x) * openssl-ibmca-debugsource-2.4.0-150400.4.16.1 * libica4-4.2.1-150400.3.11.8 * libica4-debuginfo-4.2.1-150400.3.11.8 * libica-tools-debuginfo-4.2.1-150400.3.11.8 * openssl-ibmca-2.4.0-150400.4.16.1 * libica-tools-4.2.1-150400.3.11.8 * libica-debugsource-4.2.1-150400.3.11.8 * openssl-ibmca-debuginfo-2.4.0-150400.4.16.1 * libica-debuginfo-4.2.1-150400.3.11.8 * SUSE Linux Enterprise Micro 5.4 (s390x) * openssl-ibmca-debugsource-2.4.0-150400.4.16.1 * libica4-4.2.1-150400.3.11.8 * libica4-debuginfo-4.2.1-150400.3.11.8 * libica-tools-debuginfo-4.2.1-150400.3.11.8 * openssl-ibmca-2.4.0-150400.4.16.1 * libica-tools-4.2.1-150400.3.11.8 * libica-debugsource-4.2.1-150400.3.11.8 * openssl-ibmca-debuginfo-2.4.0-150400.4.16.1 * libica-debuginfo-4.2.1-150400.3.11.8 * Server Applications Module 15-SP4 (s390x) * libica4-openssl3-4.2.1-150400.3.11.10 * libica4-debuginfo-4.2.1-150400.3.11.8 * libica-tools-debuginfo-4.2.1-150400.3.11.8 * openssl-ibmca-2.4.0-150400.4.16.1 * libica-openssl3-debuginfo-4.2.1-150400.3.11.10 * libica-devel-static-4.2.1-150400.3.11.8 * libica-debugsource-4.2.1-150400.3.11.8 * libica-devel-4.2.1-150400.3.11.8 * openssl3-ibmca-debugsource-2.4.0-150400.4.16.1 * openssl3-ibmca-2.4.0-150400.4.16.1 * libica-openssl3-devel-static-4.2.1-150400.3.11.10 * libica-tools-4.2.1-150400.3.11.8 * libica-openssl3-tools-4.2.1-150400.3.11.10 * libica-openssl3-tools-debuginfo-4.2.1-150400.3.11.10 * libica4-4.2.1-150400.3.11.8 * libica4-openssl3-debuginfo-4.2.1-150400.3.11.10 * openssl-ibmca-debuginfo-2.4.0-150400.4.16.1 * openssl-ibmca-debugsource-2.4.0-150400.4.16.1 * libica-openssl3-devel-4.2.1-150400.3.11.10 * libica-openssl3-debugsource-4.2.1-150400.3.11.10 * openssl3-ibmca-debuginfo-2.4.0-150400.4.16.1 * libica-debuginfo-4.2.1-150400.3.11.8 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1207472 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Thu Jan 4 08:05:15 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 4 Jan 2024 09:05:15 +0100 (CET) Subject: SUSE-CU-2024:32-1: Recommended update of suse/sle-micro/5.1/toolbox Message-ID: <20240104080516.00E4DFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.1/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:32-1 Container Tags : suse/sle-micro/5.1/toolbox:12.1 , suse/sle-micro/5.1/toolbox:12.1-2.2.521 , suse/sle-micro/5.1/toolbox:latest Container Release : 2.2.521 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle-micro/5.1/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - container:sles15-image-15.0.0-17.20.232 updated From sle-updates at lists.suse.com Thu Jan 4 08:05:45 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 4 Jan 2024 09:05:45 +0100 (CET) Subject: SUSE-CU-2024:33-1: Recommended update of suse/sle-micro/5.2/toolbox Message-ID: <20240104080545.2DF82FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.2/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:33-1 Container Tags : suse/sle-micro/5.2/toolbox:12.1 , suse/sle-micro/5.2/toolbox:12.1-6.2.343 , suse/sle-micro/5.2/toolbox:latest Container Release : 6.2.343 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle-micro/5.2/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - container:sles15-image-15.0.0-17.20.232 updated From null at suse.de Thu Jan 4 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 04 Jan 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0030-1: moderate: Security update for libcryptopp Message-ID: <170437140355.6535.14643207021572510189@smelt2.prg2.suse.org> # Security update for libcryptopp Announcement ID: SUSE-SU-2024:0030-1 Rating: moderate References: * bsc#1218219 Cross-References: * CVE-2023-50980 CVSS scores: * CVE-2023-50980 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-50980 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libcryptopp fixes the following issues: * CVE-2023-50980: Fixed DoS via malformed DER public key file (bsc#1218219). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-30=1 openSUSE-SLE-15.4-2024-30=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-30=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-30=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-30=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libcryptopp-devel-8.6.0-150400.3.3.1 * libcryptopp8_6_0-8.6.0-150400.3.3.1 * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.3.1 * libcryptopp-debugsource-8.6.0-150400.3.3.1 * openSUSE Leap 15.4 (x86_64) * libcryptopp8_6_0-32bit-debuginfo-8.6.0-150400.3.3.1 * libcryptopp8_6_0-32bit-8.6.0-150400.3.3.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libcryptopp8_6_0-64bit-8.6.0-150400.3.3.1 * libcryptopp8_6_0-64bit-debuginfo-8.6.0-150400.3.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libcryptopp-devel-8.6.0-150400.3.3.1 * libcryptopp8_6_0-8.6.0-150400.3.3.1 * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.3.1 * libcryptopp-debugsource-8.6.0-150400.3.3.1 * openSUSE Leap 15.5 (x86_64) * libcryptopp8_6_0-32bit-debuginfo-8.6.0-150400.3.3.1 * libcryptopp8_6_0-32bit-8.6.0-150400.3.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libcryptopp-devel-8.6.0-150400.3.3.1 * libcryptopp8_6_0-8.6.0-150400.3.3.1 * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.3.1 * libcryptopp-debugsource-8.6.0-150400.3.3.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libcryptopp-devel-8.6.0-150400.3.3.1 * libcryptopp8_6_0-8.6.0-150400.3.3.1 * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.3.1 * libcryptopp-debugsource-8.6.0-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50980.html * https://bugzilla.suse.com/show_bug.cgi?id=1218219 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 4 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 04 Jan 2024 12:30:07 -0000 Subject: SUSE-RU-2024:0029-1: moderate: Recommended update for net-snmp Message-ID: <170437140740.6535.3094174691213068600@smelt2.prg2.suse.org> # Recommended update for net-snmp Announcement ID: SUSE-RU-2024:0029-1 Rating: moderate References: * bsc#1181400 * bsc#1206044 * bsc#1214364 * jsc#PED-6416 * jsc#PED-6434 * jsc#PED-6435 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that contains three features and has three fixes can now be installed. ## Description: This update for net-snmp fixes the following issues: Update to net-snmp-5.9.4 (bsc#1214364 jsc#PED-6435). * 5.9.4: * libsnmp: * Remove the SNMP_SWIPE_MEM() macro Remove this macro since it is not used in the Net-SNMP code base. * DISPLAY-HINT fixes * Miscellanious improvements to the transports * Handle multiple oldEngineID configuration lines * fixes for DNS names longer than 63 characters * agent: * Added a ignoremount configuration option for the HOST-MIB * disallow SETs with a NULL varbind * fix the --enable-minimalist build * apps: * snmpset: allow SET with NULL varbind for testing * snmptrapd: improved MySQL logging code * general: * configure: Remove -Wno-deprecated as it is no longer needed * miscellanious ther bug fixes, build fixes and cleanups * security: * These two CVEs can be exploited by a user with read-only credentials: * CVE-2022-24805 A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. * CVE-2022-24809 A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. * These CVEs can be exploited by a user with read-write credentials: * CVE-2022-24806 Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously * CVE-2022-24807 A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access. * CVE-2022-24808 A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference * CVE-2022-24810 A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. * To avoid these flaws, use strong SNMPv3 credentials and do not share them. If you must use SNMPv1 or SNMPv2c, use a complex community string and enhance the protection by restricting access to a given IP address range. * Thanks are due to Yu Zhang of VARAS at IIE and Nanyu Zhong of VARAS at IIE for reporting the following CVEs that have been fixed in this release, and to Arista Networks for providing fixes. * IF-MIB: Update ifTable entries even if the interface name has changed At least on Linux a network interface index may be reused for a network interface with a different name. Hence this patch that enables replacing network interface information even if the network interface name has changed. * unspecified: * Moved transport code into a separate subdirectory in snmplib * Snmplib: remove inline versions of container funcs". * misc: * snmp-create-v3-user: Fix the snmpd.conf path @datadir@ is expanded in ${datarootdir} so datarootdir must be set before @datadir@ is used. * 5.9: * snmplib: * Add IPv6 support to DTLSUDP transport * use new netsnmp_sockaddr_storage in netsnmp_addr_pair * add base_transport ptr for tunneled transports * Dtls: overhaul of debug * Remove inline versions of container funcs * snmpd: * Use ETHTOOL_GLINKSETTINGS when available Newer Linux kernels support ETHTOOL_GLINKSETTINGS. Use it when available instead of the older and deprecated ETHTOOL_GSET. This patch avoids that the Linux kernel reports the following kernel warning: warning: 'snmpd' uses legacy ethtool link settings API, link modes are only partially reported See also https://sourceforge.net/p/net-snmp/patches/1387/. * [BUG 2926]: Make it possible to set agentXPingInterval for a subagent - register agentXPingInterval for the subagent list handler, before it was registered for snmp - added agentxTimeout to the subagent list handler. It's now possible to set for snmpd and the subagent. See 'man snmpd.conf' \- added agentxRetries to the subagent list handler. See 'man snmpd.conf'. It's never used in the subagent, but it's now following the documentation Signed-off-by: Anders Wallin * snmptrap: * BUG: 2899: Patch from Drew Roedersheimer to set library engineboots/time values before sending * snmptrapd: * Add support for the latest libmysqlclient version * libsnmp: * Scan MIB directories in alphabetical order This guarantees that e.g. mibs/RFC1213-MIB.txt is read before mibs/SNMPv2-MIB.txt. The order in which these MIBs is read matters because both define sysLocation but with different attributes. * Removing legacy MIBs used by Velocity Software (jsc#PED-6416 jsc#PED-6434). * Added hardening to systemd service(s) (bsc#1181400, bsc#1206044). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-29=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-29=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-29=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-29=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * net-snmp-debugsource-5.9.4-14.3.1 * net-snmp-5.9.4-14.3.1 * net-snmp-debuginfo-5.9.4-14.3.1 * snmp-mibs-5.9.4-14.3.1 * libsnmp40-5.9.4-14.3.1 * libsnmp40-debuginfo-5.9.4-14.3.1 * perl-SNMP-debuginfo-5.9.4-14.3.1 * perl-SNMP-5.9.4-14.3.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libsnmp40-debuginfo-32bit-5.9.4-14.3.1 * libsnmp40-32bit-5.9.4-14.3.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * net-snmp-debugsource-5.9.4-14.3.1 * net-snmp-5.9.4-14.3.1 * net-snmp-debuginfo-5.9.4-14.3.1 * snmp-mibs-5.9.4-14.3.1 * libsnmp40-5.9.4-14.3.1 * libsnmp40-debuginfo-5.9.4-14.3.1 * perl-SNMP-debuginfo-5.9.4-14.3.1 * perl-SNMP-5.9.4-14.3.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libsnmp40-debuginfo-32bit-5.9.4-14.3.1 * libsnmp40-32bit-5.9.4-14.3.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * net-snmp-debugsource-5.9.4-14.3.1 * net-snmp-5.9.4-14.3.1 * net-snmp-debuginfo-5.9.4-14.3.1 * snmp-mibs-5.9.4-14.3.1 * libsnmp40-5.9.4-14.3.1 * libsnmp40-debuginfo-5.9.4-14.3.1 * perl-SNMP-debuginfo-5.9.4-14.3.1 * perl-SNMP-5.9.4-14.3.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libsnmp40-debuginfo-32bit-5.9.4-14.3.1 * libsnmp40-32bit-5.9.4-14.3.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * net-snmp-debuginfo-5.9.4-14.3.1 * net-snmp-debugsource-5.9.4-14.3.1 * net-snmp-devel-5.9.4-14.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1181400 * https://bugzilla.suse.com/show_bug.cgi?id=1206044 * https://bugzilla.suse.com/show_bug.cgi?id=1214364 * https://jira.suse.com/browse/PED-6416 * https://jira.suse.com/browse/PED-6434 * https://jira.suse.com/browse/PED-6435 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 4 12:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 04 Jan 2024 12:30:09 -0000 Subject: SUSE-RU-2024:0028-1: moderate: Recommended update for mozilla-nss Message-ID: <170437140922.6535.16683749174893301887@smelt2.prg2.suse.org> # Recommended update for mozilla-nss Announcement ID: SUSE-RU-2024:0028-1 Rating: moderate References: * bsc#1214980 Affected Products: * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has one fix can now be installed. ## Description: This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1: * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-28=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-28=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-28=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-28=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-28=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-28=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-28=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-28=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-28=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-28=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-28=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-28=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-28=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-28=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-devel-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64) * libfreebl3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-32bit-3.90.1-150000.3.104.2 * libsoftokn3-32bit-debuginfo-3.90.1-150000.3.104.2 * libfreebl3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-3.90.1-150000.3.104.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-devel-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libfreebl3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-32bit-3.90.1-150000.3.104.2 * libsoftokn3-32bit-debuginfo-3.90.1-150000.3.104.2 * libfreebl3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-3.90.1-150000.3.104.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-devel-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * libfreebl3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-32bit-3.90.1-150000.3.104.2 * mozilla-nss-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-32bit-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-32bit-3.90.1-150000.3.104.2 * libsoftokn3-32bit-debuginfo-3.90.1-150000.3.104.2 * libfreebl3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-3.90.1-150000.3.104.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-devel-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libfreebl3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-32bit-3.90.1-150000.3.104.2 * mozilla-nss-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-32bit-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-32bit-3.90.1-150000.3.104.2 * libsoftokn3-32bit-debuginfo-3.90.1-150000.3.104.2 * libfreebl3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-devel-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64) * libfreebl3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-32bit-3.90.1-150000.3.104.2 * libsoftokn3-32bit-debuginfo-3.90.1-150000.3.104.2 * libfreebl3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-devel-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libfreebl3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-32bit-3.90.1-150000.3.104.2 * libsoftokn3-32bit-debuginfo-3.90.1-150000.3.104.2 * libfreebl3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-devel-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libfreebl3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-32bit-3.90.1-150000.3.104.2 * mozilla-nss-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-32bit-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-32bit-3.90.1-150000.3.104.2 * libsoftokn3-32bit-debuginfo-3.90.1-150000.3.104.2 * libfreebl3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-devel-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64) * libfreebl3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-32bit-3.90.1-150000.3.104.2 * libsoftokn3-32bit-debuginfo-3.90.1-150000.3.104.2 * libfreebl3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-devel-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libfreebl3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-32bit-3.90.1-150000.3.104.2 * libsoftokn3-32bit-debuginfo-3.90.1-150000.3.104.2 * libfreebl3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-devel-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libfreebl3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-32bit-3.90.1-150000.3.104.2 * mozilla-nss-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-32bit-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-32bit-3.90.1-150000.3.104.2 * libsoftokn3-32bit-debuginfo-3.90.1-150000.3.104.2 * libfreebl3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-3.90.1-150000.3.104.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-devel-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Enterprise Storage 7.1 (x86_64) * libfreebl3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-32bit-3.90.1-150000.3.104.2 * mozilla-nss-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-32bit-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-32bit-3.90.1-150000.3.104.2 * libsoftokn3-32bit-debuginfo-3.90.1-150000.3.104.2 * libfreebl3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-3.90.1-150000.3.104.2 * SUSE CaaS Platform 4.0 (x86_64) * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-3.90.1-150000.3.104.2 * libsoftokn3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * libsoftokn3-32bit-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-certs-32bit-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-devel-3.90.1-150000.3.104.2 * libfreebl3-32bit-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-32bit-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libsoftokn3-3.90.1-150000.3.104.2 * libfreebl3-3.90.1-150000.3.104.2 * mozilla-nss-3.90.1-150000.3.104.2 * libfreebl3-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-debugsource-3.90.1-150000.3.104.2 * mozilla-nss-certs-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-tools-3.90.1-150000.3.104.2 * mozilla-nss-debuginfo-3.90.1-150000.3.104.2 * mozilla-nss-certs-3.90.1-150000.3.104.2 * libsoftokn3-debuginfo-3.90.1-150000.3.104.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214980 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 4 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 04 Jan 2024 16:30:02 -0000 Subject: SUSE-RU-2024:0031-1: moderate: Recommended update for powerpc-utils Message-ID: <170438580206.32313.10307120554896546131@smelt2.prg2.suse.org> # Recommended update for powerpc-utils Announcement ID: SUSE-RU-2024:0031-1 Rating: moderate References: * bsc#1205462 * bsc#1214285 Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has two fixes can now be installed. ## Description: This update for powerpc-utils fixes the following issues: * Tell kernel about the SMT value set by ppc64_cpu (bsc#1214285, bsc#1205462) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-31=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-31=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le) * powerpc-utils-debugsource-1.3.9-8.23.1 * powerpc-utils-1.3.9-8.23.1 * powerpc-utils-debuginfo-1.3.9-8.23.1 * SUSE Linux Enterprise Server 12 SP5 (ppc64le) * powerpc-utils-debugsource-1.3.9-8.23.1 * powerpc-utils-1.3.9-8.23.1 * powerpc-utils-debuginfo-1.3.9-8.23.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 4 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 04 Jan 2024 16:30:02 -0000 Subject: SUSE-RU-2024:0027-1: moderate: Recommended update for mozilla-nss Message-ID: <170438580260.32313.14771872604979226592@smelt2.prg2.suse.org> # Recommended update for mozilla-nss Announcement ID: SUSE-RU-2024:0027-1 Rating: moderate References: * bsc#1214980 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that has one fix can now be installed. ## Description: This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * bmo#1813401 - regenerate NameConstraints test certificates. * bmo#1854795 - add OSXSAVE and XCR0 tests to AVX2 detection. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-27=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-27=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-27=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-27=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * mozilla-nss-sysinit-3.90.1-58.107.2 * mozilla-nss-certs-debuginfo-3.90.1-58.107.2 * libsoftokn3-debuginfo-3.90.1-58.107.2 * mozilla-nss-sysinit-debuginfo-3.90.1-58.107.2 * libsoftokn3-3.90.1-58.107.2 * mozilla-nss-debugsource-3.90.1-58.107.2 * libfreebl3-debuginfo-3.90.1-58.107.2 * mozilla-nss-tools-3.90.1-58.107.2 * mozilla-nss-certs-3.90.1-58.107.2 * libfreebl3-3.90.1-58.107.2 * mozilla-nss-debuginfo-3.90.1-58.107.2 * mozilla-nss-devel-3.90.1-58.107.2 * mozilla-nss-tools-debuginfo-3.90.1-58.107.2 * mozilla-nss-3.90.1-58.107.2 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libfreebl3-debuginfo-32bit-3.90.1-58.107.2 * mozilla-nss-sysinit-32bit-3.90.1-58.107.2 * mozilla-nss-32bit-3.90.1-58.107.2 * libsoftokn3-32bit-3.90.1-58.107.2 * mozilla-nss-certs-debuginfo-32bit-3.90.1-58.107.2 * mozilla-nss-debuginfo-32bit-3.90.1-58.107.2 * mozilla-nss-sysinit-debuginfo-32bit-3.90.1-58.107.2 * libsoftokn3-debuginfo-32bit-3.90.1-58.107.2 * mozilla-nss-certs-32bit-3.90.1-58.107.2 * libfreebl3-32bit-3.90.1-58.107.2 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * mozilla-nss-sysinit-3.90.1-58.107.2 * mozilla-nss-certs-debuginfo-3.90.1-58.107.2 * libsoftokn3-debuginfo-3.90.1-58.107.2 * mozilla-nss-sysinit-debuginfo-3.90.1-58.107.2 * libsoftokn3-3.90.1-58.107.2 * mozilla-nss-debugsource-3.90.1-58.107.2 * libfreebl3-debuginfo-3.90.1-58.107.2 * mozilla-nss-tools-3.90.1-58.107.2 * mozilla-nss-certs-3.90.1-58.107.2 * libfreebl3-3.90.1-58.107.2 * mozilla-nss-debuginfo-3.90.1-58.107.2 * mozilla-nss-devel-3.90.1-58.107.2 * mozilla-nss-tools-debuginfo-3.90.1-58.107.2 * mozilla-nss-3.90.1-58.107.2 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libfreebl3-debuginfo-32bit-3.90.1-58.107.2 * mozilla-nss-sysinit-32bit-3.90.1-58.107.2 * mozilla-nss-32bit-3.90.1-58.107.2 * libsoftokn3-32bit-3.90.1-58.107.2 * mozilla-nss-certs-debuginfo-32bit-3.90.1-58.107.2 * mozilla-nss-debuginfo-32bit-3.90.1-58.107.2 * mozilla-nss-sysinit-debuginfo-32bit-3.90.1-58.107.2 * libsoftokn3-debuginfo-32bit-3.90.1-58.107.2 * mozilla-nss-certs-32bit-3.90.1-58.107.2 * libfreebl3-32bit-3.90.1-58.107.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * mozilla-nss-sysinit-3.90.1-58.107.2 * mozilla-nss-certs-debuginfo-3.90.1-58.107.2 * libsoftokn3-debuginfo-3.90.1-58.107.2 * mozilla-nss-sysinit-debuginfo-3.90.1-58.107.2 * libsoftokn3-3.90.1-58.107.2 * mozilla-nss-debugsource-3.90.1-58.107.2 * libfreebl3-debuginfo-3.90.1-58.107.2 * mozilla-nss-tools-3.90.1-58.107.2 * mozilla-nss-certs-3.90.1-58.107.2 * libfreebl3-3.90.1-58.107.2 * mozilla-nss-debuginfo-3.90.1-58.107.2 * mozilla-nss-devel-3.90.1-58.107.2 * mozilla-nss-tools-debuginfo-3.90.1-58.107.2 * mozilla-nss-3.90.1-58.107.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libfreebl3-debuginfo-32bit-3.90.1-58.107.2 * mozilla-nss-sysinit-32bit-3.90.1-58.107.2 * mozilla-nss-32bit-3.90.1-58.107.2 * libsoftokn3-32bit-3.90.1-58.107.2 * mozilla-nss-certs-debuginfo-32bit-3.90.1-58.107.2 * mozilla-nss-debuginfo-32bit-3.90.1-58.107.2 * mozilla-nss-sysinit-debuginfo-32bit-3.90.1-58.107.2 * libsoftokn3-debuginfo-32bit-3.90.1-58.107.2 * mozilla-nss-certs-32bit-3.90.1-58.107.2 * libfreebl3-32bit-3.90.1-58.107.2 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * mozilla-nss-debugsource-3.90.1-58.107.2 * mozilla-nss-devel-3.90.1-58.107.2 * mozilla-nss-debuginfo-3.90.1-58.107.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214980 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 4 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 04 Jan 2024 16:30:04 -0000 Subject: SUSE-RU-2024:0026-1: moderate: Recommended update for mozilla-nss Message-ID: <170438580464.32313.7435379013329378039@smelt2.prg2.suse.org> # Recommended update for mozilla-nss Announcement ID: SUSE-RU-2024:0026-1 Rating: moderate References: * bsc#1214980 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-26=1 SUSE-2024-26=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-26=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-26=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-26=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-26=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-26=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-26=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-26=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-26=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-26=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-26=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-26=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-26=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-26=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-26=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-26=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-26=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-26=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-26=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-devel-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * openSUSE Leap 15.4 (x86_64) * mozilla-nss-sysinit-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-32bit-3.90.1-150400.3.35.2 * libsoftokn3-32bit-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-debuginfo-3.90.1-150400.3.35.2 * openSUSE Leap 15.4 (aarch64_ilp32) * libfreebl3-64bit-3.90.1-150400.3.35.2 * mozilla-nss-64bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-64bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-64bit-3.90.1-150400.3.35.2 * libsoftokn3-64bit-3.90.1-150400.3.35.2 * libsoftokn3-64bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-64bit-3.90.1-150400.3.35.2 * libfreebl3-64bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-64bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-64bit-3.90.1-150400.3.35.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-devel-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * openSUSE Leap 15.5 (x86_64) * mozilla-nss-sysinit-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-32bit-3.90.1-150400.3.35.2 * libsoftokn3-32bit-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-debuginfo-3.90.1-150400.3.35.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-devel-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * Basesystem Module 15-SP5 (x86_64) * libfreebl3-32bit-3.90.1-150400.3.35.2 * libsoftokn3-32bit-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-debuginfo-3.90.1-150400.3.35.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-devel-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libfreebl3-32bit-3.90.1-150400.3.35.2 * libsoftokn3-32bit-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-debuginfo-3.90.1-150400.3.35.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-devel-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libfreebl3-32bit-3.90.1-150400.3.35.2 * libsoftokn3-32bit-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-debuginfo-3.90.1-150400.3.35.2 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-32bit-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * libsoftokn3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-3.90.1-150400.3.35.2 * mozilla-nss-devel-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150400.3.35.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-32bit-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * libsoftokn3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-3.90.1-150400.3.35.2 * mozilla-nss-devel-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150400.3.35.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-devel-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libfreebl3-32bit-3.90.1-150400.3.35.2 * libsoftokn3-32bit-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-debuginfo-3.90.1-150400.3.35.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-devel-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libfreebl3-32bit-3.90.1-150400.3.35.2 * libsoftokn3-32bit-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-debuginfo-3.90.1-150400.3.35.2 * SUSE Manager Proxy 4.3 (x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-32bit-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * libsoftokn3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-3.90.1-150400.3.35.2 * mozilla-nss-devel-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150400.3.35.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-32bit-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * libsoftokn3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-3.90.1-150400.3.35.2 * mozilla-nss-devel-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150400.3.35.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * mozilla-nss-tools-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-3.90.1-150400.3.35.2 * mozilla-nss-certs-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-devel-3.90.1-150400.3.35.2 * mozilla-nss-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-3.90.1-150400.3.35.2 * mozilla-nss-sysinit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-3.90.1-150400.3.35.2 * mozilla-nss-tools-3.90.1-150400.3.35.2 * mozilla-nss-3.90.1-150400.3.35.2 * libsoftokn3-3.90.1-150400.3.35.2 * libsoftokn3-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-debugsource-3.90.1-150400.3.35.2 * SUSE Manager Server 4.3 (x86_64) * libfreebl3-32bit-3.90.1-150400.3.35.2 * libsoftokn3-32bit-debuginfo-3.90.1-150400.3.35.2 * libsoftokn3-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-3.90.1-150400.3.35.2 * mozilla-nss-32bit-debuginfo-3.90.1-150400.3.35.2 * mozilla-nss-certs-32bit-debuginfo-3.90.1-150400.3.35.2 * libfreebl3-32bit-debuginfo-3.90.1-150400.3.35.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214980 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Fri Jan 5 08:03:54 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:03:54 +0100 (CET) Subject: SUSE-CU-2024:36-1: Recommended update of suse/sle-micro/5.5/toolbox Message-ID: <20240105080354.8CED3FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:36-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.127 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.127 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - container:sles15-image-15.0.0-36.5.69 updated From sle-updates at lists.suse.com Fri Jan 5 08:04:24 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:04:24 +0100 (CET) Subject: SUSE-CU-2024:37-1: Recommended update of suse/ltss/sle15.4/sle15 Message-ID: <20240105080424.E2024FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.4/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:37-1 Container Tags : suse/ltss/sle15.4/bci-base:15.4 , suse/ltss/sle15.4/bci-base:15.4.2.4 , suse/ltss/sle15.4/sle15:15.4 , suse/ltss/sle15.4/sle15:15.4.2.4 Container Release : 2.4 Severity : important Type : recommended References : 1029961 1158830 1206798 1209122 1216987 ----------------------------------------------------------------- The container suse/ltss/sle15.4/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - curl-8.0.1-150400.5.41.1 updated - libcurl4-8.0.1-150400.5.41.1 updated - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-updates at lists.suse.com Fri Jan 5 08:04:49 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:04:49 +0100 (CET) Subject: SUSE-CU-2024:39-1: Recommended update of suse/389-ds Message-ID: <20240105080449.909E6FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/389-ds ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:39-1 Container Tags : suse/389-ds:2.2 , suse/389-ds:2.2-17.2 , suse/389-ds:latest Container Release : 17.2 Severity : moderate Type : recommended References : 1214980 ----------------------------------------------------------------- The container suse/389-ds was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:26-1 Released: Thu Jan 4 11:15:24 2024 Summary: Recommended update for mozilla-nss Type: recommended Severity: moderate References: 1214980 This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. The following package changes have been done: - libfreebl3-3.90.1-150400.3.35.2 updated - mozilla-nss-certs-3.90.1-150400.3.35.2 updated - mozilla-nss-3.90.1-150400.3.35.2 updated - libsoftokn3-3.90.1-150400.3.35.2 updated - mozilla-nss-tools-3.90.1-150400.3.35.2 updated From sle-updates at lists.suse.com Fri Jan 5 08:07:59 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:07:59 +0100 (CET) Subject: SUSE-CU-2024:50-1: Recommended update of bci/nodejs Message-ID: <20240105080759.D22E3FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:50-1 Container Tags : bci/node:18 , bci/node:18-13.1 , bci/nodejs:18 , bci/nodejs:18-13.1 Container Release : 13.1 Severity : important Type : recommended References : 1216987 1217354 1217479 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4970-1 Released: Mon Dec 25 09:48:21 2023 Summary: Recommended update for icu73_2 Type: recommended Severity: moderate References: 1217354,1217479 This update for icu73_2 fixes the following issue: - ships 32bit icu library on SLES 15 SP3 to complement the ICU 69 32bit libraries. The following package changes have been done: - libcurl4-8.0.1-150400.5.41.1 updated - libicu73_2-ledata-73.2-150000.1.7.1 updated - libicu73_2-73.2-150000.1.7.1 updated - container:sles15-image-15.0.0-36.5.69 updated From sle-updates at lists.suse.com Fri Jan 5 08:08:24 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:08:24 +0100 (CET) Subject: SUSE-CU-2024:53-1: Recommended update of bci/openjdk-devel Message-ID: <20240105080824.123D8FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:53-1 Container Tags : bci/openjdk-devel:11 , bci/openjdk-devel:11-11.5 Container Release : 11.5 Severity : moderate Type : recommended References : 1214980 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:26-1 Released: Thu Jan 4 11:15:24 2024 Summary: Recommended update for mozilla-nss Type: recommended Severity: moderate References: 1214980 This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. The following package changes have been done: - libfreebl3-3.90.1-150400.3.35.2 updated - mozilla-nss-certs-3.90.1-150400.3.35.2 updated - mozilla-nss-3.90.1-150400.3.35.2 updated - libsoftokn3-3.90.1-150400.3.35.2 updated - container:bci-openjdk-11-15.5.11-12.2 updated From sle-updates at lists.suse.com Fri Jan 5 08:08:40 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:08:40 +0100 (CET) Subject: SUSE-CU-2024:54-1: Recommended update of bci/openjdk Message-ID: <20240105080840.D49DAFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:54-1 Container Tags : bci/openjdk:11 , bci/openjdk:11-12.2 Container Release : 12.2 Severity : moderate Type : recommended References : 1214980 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:26-1 Released: Thu Jan 4 11:15:24 2024 Summary: Recommended update for mozilla-nss Type: recommended Severity: moderate References: 1214980 This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. The following package changes have been done: - libfreebl3-3.90.1-150400.3.35.2 updated - mozilla-nss-certs-3.90.1-150400.3.35.2 updated - mozilla-nss-3.90.1-150400.3.35.2 updated - libsoftokn3-3.90.1-150400.3.35.2 updated From sle-updates at lists.suse.com Fri Jan 5 08:09:00 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:09:00 +0100 (CET) Subject: SUSE-CU-2024:56-1: Recommended update of bci/openjdk-devel Message-ID: <20240105080900.F33DFFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:56-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-13.5 , bci/openjdk-devel:latest Container Release : 13.5 Severity : moderate Type : recommended References : 1214980 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:26-1 Released: Thu Jan 4 11:15:24 2024 Summary: Recommended update for mozilla-nss Type: recommended Severity: moderate References: 1214980 This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. The following package changes have been done: - libfreebl3-3.90.1-150400.3.35.2 updated - mozilla-nss-certs-3.90.1-150400.3.35.2 updated - mozilla-nss-3.90.1-150400.3.35.2 updated - libsoftokn3-3.90.1-150400.3.35.2 updated - container:bci-openjdk-17-15.5.17-13.2 updated From sle-updates at lists.suse.com Fri Jan 5 08:09:18 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:09:18 +0100 (CET) Subject: SUSE-CU-2024:57-1: Recommended update of bci/openjdk Message-ID: <20240105080918.987D2FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:57-1 Container Tags : bci/openjdk:17 , bci/openjdk:17-13.2 , bci/openjdk:latest Container Release : 13.2 Severity : moderate Type : recommended References : 1214980 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:26-1 Released: Thu Jan 4 11:15:24 2024 Summary: Recommended update for mozilla-nss Type: recommended Severity: moderate References: 1214980 This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. The following package changes have been done: - libfreebl3-3.90.1-150400.3.35.2 updated - mozilla-nss-certs-3.90.1-150400.3.35.2 updated - mozilla-nss-3.90.1-150400.3.35.2 updated - libsoftokn3-3.90.1-150400.3.35.2 updated From sle-updates at lists.suse.com Fri Jan 5 08:09:39 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:09:39 +0100 (CET) Subject: SUSE-CU-2024:59-1: Recommended update of suse/pcp Message-ID: <20240105080939.A36E2FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/pcp ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:59-1 Container Tags : suse/pcp:5 , suse/pcp:5-19.4 , suse/pcp:5.2 , suse/pcp:5.2-19.4 , suse/pcp:5.2.5 , suse/pcp:5.2.5-19.4 , suse/pcp:latest Container Release : 19.4 Severity : moderate Type : recommended References : 1214980 ----------------------------------------------------------------- The container suse/pcp was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:26-1 Released: Thu Jan 4 11:15:24 2024 Summary: Recommended update for mozilla-nss Type: recommended Severity: moderate References: 1214980 This update for mozilla-nss fixes the following issues: Mozilla NSS was updated to NSS 3.90.1 * regenerate NameConstraints test certificates. * add OSXSAVE and XCR0 tests to AVX2 detection. The following package changes have been done: - libfreebl3-3.90.1-150400.3.35.2 updated - mozilla-nss-certs-3.90.1-150400.3.35.2 updated - mozilla-nss-3.90.1-150400.3.35.2 updated - libsoftokn3-3.90.1-150400.3.35.2 updated From sle-updates at lists.suse.com Fri Jan 5 08:10:35 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 5 Jan 2024 09:10:35 +0100 (CET) Subject: SUSE-CU-2024:64-1: Recommended update of suse/sle15 Message-ID: <20240105081035.203D3FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:64-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.69 , suse/sle15:15.5 , suse/sle15:15.5.36.5.69 Container Release : 36.5.69 Severity : moderate Type : recommended References : 1029961 1158830 1206798 1209122 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) The following package changes have been done: - libprocps8-3.3.17-150000.7.37.1 added - procps-3.3.17-150000.7.37.1 updated - libprocps7-3.3.15-150000.7.34.1 removed From null at suse.de Fri Jan 5 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 05 Jan 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0035-1: important: Security update for python-paramiko Message-ID: <170445780326.8875.7293191048730469548@smelt2.prg2.suse.org> # Security update for python-paramiko Announcement ID: SUSE-SU-2024:0035-1 Rating: important References: * bsc#1218168 Cross-References: * CVE-2023-48795 CVSS scores: * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-paramiko fixes the following issues: * CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity aka Terrapin Attack (bsc#bsc#1218168). * Update to 3.4.0. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-35=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-35=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-35=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-35=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-35=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-35=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-35=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-35=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * openSUSE Leap 15.5 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * Python 3 Module 15-SP5 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-48795.html * https://bugzilla.suse.com/show_bug.cgi?id=1218168 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 05 Jan 2024 12:30:05 -0000 Subject: SUSE-SU-2024:0034-1: moderate: Security update for python-aiohttp Message-ID: <170445780534.8875.6527948355245318643@smelt2.prg2.suse.org> # Security update for python-aiohttp Announcement ID: SUSE-SU-2024:0034-1 Rating: moderate References: * bsc#1217684 Cross-References: * CVE-2023-49081 CVSS scores: * CVE-2023-49081 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-49081 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-aiohttp fixes the following issues: * CVE-2023-49081: fixed an HTTP header injection via a crafted version (bsc#1217684). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-34=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-34=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-34=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-34=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-34=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-34=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-aiohttp-doc-3.6.0-150100.3.15.1 * python-aiohttp-debugsource-3.6.0-150100.3.15.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.15.1 * python3-aiohttp-3.6.0-150100.3.15.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * python-aiohttp-doc-3.6.0-150100.3.15.1 * python-aiohttp-debugsource-3.6.0-150100.3.15.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.15.1 * python3-aiohttp-3.6.0-150100.3.15.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * python-aiohttp-doc-3.6.0-150100.3.15.1 * python-aiohttp-debugsource-3.6.0-150100.3.15.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.15.1 * python3-aiohttp-3.6.0-150100.3.15.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.6.0-150100.3.15.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.15.1 * python3-aiohttp-3.6.0-150100.3.15.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.6.0-150100.3.15.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.15.1 * python3-aiohttp-3.6.0-150100.3.15.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.6.0-150100.3.15.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.15.1 * python3-aiohttp-3.6.0-150100.3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2023-49081.html * https://bugzilla.suse.com/show_bug.cgi?id=1217684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 05 Jan 2024 12:30:07 -0000 Subject: SUSE-SU-2024:0033-1: moderate: Security update for python-aiohttp Message-ID: <170445780740.8875.4267569831221823304@smelt2.prg2.suse.org> # Security update for python-aiohttp Announcement ID: SUSE-SU-2024:0033-1 Rating: moderate References: * bsc#1217684 Cross-References: * CVE-2023-49081 CVSS scores: * CVE-2023-49081 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-49081 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-aiohttp fixes the following issues: * CVE-2023-49081: fixed an HTTP header injection via a crafted version (bsc#1217684). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-33=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-33=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-33=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python311-aiohttp-3.8.5-150400.10.8.1 * python311-aiohttp-debuginfo-3.8.5-150400.10.8.1 * python-aiohttp-debugsource-3.8.5-150400.10.8.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-aiohttp-3.8.5-150400.10.8.1 * python311-aiohttp-debuginfo-3.8.5-150400.10.8.1 * python-aiohttp-debugsource-3.8.5-150400.10.8.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python311-aiohttp-3.8.5-150400.10.8.1 * python311-aiohttp-debuginfo-3.8.5-150400.10.8.1 * python-aiohttp-debugsource-3.8.5-150400.10.8.1 ## References: * https://www.suse.com/security/cve/CVE-2023-49081.html * https://bugzilla.suse.com/show_bug.cgi?id=1217684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 05 Jan 2024 16:30:02 -0000 Subject: SUSE-RU-2024:0043-1: moderate: Recommended update for libsolv, zypper, libzypp Message-ID: <170447220243.27142.9261706873905154423@smelt2.prg2.suse.org> # Recommended update for libsolv, zypper, libzypp Announcement ID: SUSE-RU-2024:0043-1 Rating: moderate References: * bsc#1212160 * bsc#1215294 * bsc#1216412 * bsc#1217593 * bsc#1217873 * bsc#1218291 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has six fixes can now be installed. ## Description: This update for libsolv, zypper, libzypp fixes the following issues: * Expand RepoVars in URLs downloading a .repo file (bsc#1212160) * Fix search/info commands ignoring --ignore-unknown (bsc#1217593) * CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) * Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) * Make sure reboot-needed is remembered until next boot (bsc#1217873) * Stop using boost version 1 timer library (bsc#1215294) * Updated to version 0.7.27 * Add zstd support for the installcheck tool * Add putinowndirpool cache to make file list handling in repo_write much faster * Do not use deprecated headerUnload with newer rpm versions * Support complex deps in SOLVABLE_PREREQ_IGNOREINST * Fix minimization not prefering installed packages in some cases * Reduce memory usage in repo_updateinfoxml * Fix lock-step interfering with architecture selection * Fix choice rule handing for package downgrades * Fix complex dependencies with an "else" part sometimes leading to unsolved dependencies ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP2 zypper in -t patch SUSE-SLE-INSTALLER-15-SP2-2024-43=1 * SUSE Linux Enterprise Server 15 SP3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP3-2024-43=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-43=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-43=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-43=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-43=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-43=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-43=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-43=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-43=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-43=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-43=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-43=1 ## Package List: * SUSE Linux Enterprise Server 15 SP2 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.27-150200.84.1 * libsolv-tools-0.7.27-150200.23.2 * SUSE Linux Enterprise Server 15 SP3 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.27-150200.84.1 * libsolv-tools-0.7.27-150200.23.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libsolv-debugsource-0.7.27-150200.23.2 * libzypp-debuginfo-17.31.27-150200.84.1 * zypper-debugsource-1.14.68-150200.70.2 * libsolv-devel-0.7.27-150200.23.2 * libsolv-tools-0.7.27-150200.23.2 * perl-solv-debuginfo-0.7.27-150200.23.2 * python3-solv-debuginfo-0.7.27-150200.23.2 * ruby-solv-debuginfo-0.7.27-150200.23.2 * libsolv-devel-debuginfo-0.7.27-150200.23.2 * zypper-debuginfo-1.14.68-150200.70.2 * perl-solv-0.7.27-150200.23.2 * zypper-1.14.68-150200.70.2 * python3-solv-0.7.27-150200.23.2 * libsolv-debuginfo-0.7.27-150200.23.2 * libsolv-tools-debuginfo-0.7.27-150200.23.2 * libzypp-devel-17.31.27-150200.84.1 * libzypp-17.31.27-150200.84.1 * ruby-solv-0.7.27-150200.23.2 * libzypp-debugsource-17.31.27-150200.84.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * zypper-log-1.14.68-150200.70.2 * zypper-needs-restarting-1.14.68-150200.70.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libsolv-debugsource-0.7.27-150200.23.2 * libzypp-debuginfo-17.31.27-150200.84.1 * zypper-debugsource-1.14.68-150200.70.2 * libsolv-devel-0.7.27-150200.23.2 * libsolv-tools-0.7.27-150200.23.2 * ruby-solv-debuginfo-0.7.27-150200.23.2 * python3-solv-debuginfo-0.7.27-150200.23.2 * zypper-debuginfo-1.14.68-150200.70.2 * libsolv-devel-debuginfo-0.7.27-150200.23.2 * perl-solv-debuginfo-0.7.27-150200.23.2 * perl-solv-0.7.27-150200.23.2 * zypper-1.14.68-150200.70.2 * python3-solv-0.7.27-150200.23.2 * libsolv-debuginfo-0.7.27-150200.23.2 * libsolv-tools-debuginfo-0.7.27-150200.23.2 * libzypp-devel-17.31.27-150200.84.1 * libzypp-17.31.27-150200.84.1 * ruby-solv-0.7.27-150200.23.2 * libzypp-debugsource-17.31.27-150200.84.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * zypper-log-1.14.68-150200.70.2 * zypper-needs-restarting-1.14.68-150200.70.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libsolv-debugsource-0.7.27-150200.23.2 * libzypp-debuginfo-17.31.27-150200.84.1 * zypper-debugsource-1.14.68-150200.70.2 * libsolv-devel-0.7.27-150200.23.2 * libsolv-tools-0.7.27-150200.23.2 * perl-solv-debuginfo-0.7.27-150200.23.2 * python3-solv-debuginfo-0.7.27-150200.23.2 * ruby-solv-debuginfo-0.7.27-150200.23.2 * libsolv-devel-debuginfo-0.7.27-150200.23.2 * zypper-debuginfo-1.14.68-150200.70.2 * perl-solv-0.7.27-150200.23.2 * zypper-1.14.68-150200.70.2 * python3-solv-0.7.27-150200.23.2 * libsolv-debuginfo-0.7.27-150200.23.2 * libsolv-tools-debuginfo-0.7.27-150200.23.2 * libzypp-devel-17.31.27-150200.84.1 * libzypp-17.31.27-150200.84.1 * ruby-solv-0.7.27-150200.23.2 * libzypp-debugsource-17.31.27-150200.84.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * zypper-log-1.14.68-150200.70.2 * zypper-needs-restarting-1.14.68-150200.70.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libsolv-debugsource-0.7.27-150200.23.2 * libzypp-debuginfo-17.31.27-150200.84.1 * zypper-debugsource-1.14.68-150200.70.2 * libsolv-devel-0.7.27-150200.23.2 * libsolv-tools-0.7.27-150200.23.2 * perl-solv-debuginfo-0.7.27-150200.23.2 * python3-solv-debuginfo-0.7.27-150200.23.2 * ruby-solv-debuginfo-0.7.27-150200.23.2 * libsolv-devel-debuginfo-0.7.27-150200.23.2 * zypper-debuginfo-1.14.68-150200.70.2 * perl-solv-0.7.27-150200.23.2 * zypper-1.14.68-150200.70.2 * python3-solv-0.7.27-150200.23.2 * libsolv-debuginfo-0.7.27-150200.23.2 * libsolv-tools-debuginfo-0.7.27-150200.23.2 * libzypp-devel-17.31.27-150200.84.1 * libzypp-17.31.27-150200.84.1 * ruby-solv-0.7.27-150200.23.2 * libzypp-debugsource-17.31.27-150200.84.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * zypper-log-1.14.68-150200.70.2 * zypper-needs-restarting-1.14.68-150200.70.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libsolv-debugsource-0.7.27-150200.23.2 * libzypp-debuginfo-17.31.27-150200.84.1 * zypper-debugsource-1.14.68-150200.70.2 * libsolv-devel-0.7.27-150200.23.2 * libsolv-tools-0.7.27-150200.23.2 * perl-solv-debuginfo-0.7.27-150200.23.2 * python3-solv-debuginfo-0.7.27-150200.23.2 * ruby-solv-debuginfo-0.7.27-150200.23.2 * libsolv-devel-debuginfo-0.7.27-150200.23.2 * zypper-debuginfo-1.14.68-150200.70.2 * perl-solv-0.7.27-150200.23.2 * zypper-1.14.68-150200.70.2 * python3-solv-0.7.27-150200.23.2 * libsolv-debuginfo-0.7.27-150200.23.2 * libsolv-tools-debuginfo-0.7.27-150200.23.2 * libzypp-devel-17.31.27-150200.84.1 * libzypp-17.31.27-150200.84.1 * ruby-solv-0.7.27-150200.23.2 * libzypp-debugsource-17.31.27-150200.84.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * zypper-log-1.14.68-150200.70.2 * zypper-needs-restarting-1.14.68-150200.70.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libsolv-debugsource-0.7.27-150200.23.2 * libzypp-debuginfo-17.31.27-150200.84.1 * zypper-debugsource-1.14.68-150200.70.2 * libsolv-devel-0.7.27-150200.23.2 * libsolv-tools-0.7.27-150200.23.2 * perl-solv-debuginfo-0.7.27-150200.23.2 * python3-solv-debuginfo-0.7.27-150200.23.2 * ruby-solv-debuginfo-0.7.27-150200.23.2 * libsolv-devel-debuginfo-0.7.27-150200.23.2 * zypper-debuginfo-1.14.68-150200.70.2 * perl-solv-0.7.27-150200.23.2 * zypper-1.14.68-150200.70.2 * python3-solv-0.7.27-150200.23.2 * libsolv-debuginfo-0.7.27-150200.23.2 * libsolv-tools-debuginfo-0.7.27-150200.23.2 * libzypp-devel-17.31.27-150200.84.1 * libzypp-17.31.27-150200.84.1 * ruby-solv-0.7.27-150200.23.2 * libzypp-debugsource-17.31.27-150200.84.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * zypper-log-1.14.68-150200.70.2 * zypper-needs-restarting-1.14.68-150200.70.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libsolv-debugsource-0.7.27-150200.23.2 * libzypp-debuginfo-17.31.27-150200.84.1 * zypper-debugsource-1.14.68-150200.70.2 * libsolv-devel-0.7.27-150200.23.2 * libsolv-tools-0.7.27-150200.23.2 * perl-solv-debuginfo-0.7.27-150200.23.2 * python3-solv-debuginfo-0.7.27-150200.23.2 * ruby-solv-debuginfo-0.7.27-150200.23.2 * libsolv-devel-debuginfo-0.7.27-150200.23.2 * zypper-debuginfo-1.14.68-150200.70.2 * perl-solv-0.7.27-150200.23.2 * zypper-1.14.68-150200.70.2 * python3-solv-0.7.27-150200.23.2 * libsolv-debuginfo-0.7.27-150200.23.2 * libsolv-tools-debuginfo-0.7.27-150200.23.2 * libzypp-devel-17.31.27-150200.84.1 * libzypp-17.31.27-150200.84.1 * ruby-solv-0.7.27-150200.23.2 * libzypp-debugsource-17.31.27-150200.84.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * zypper-log-1.14.68-150200.70.2 * zypper-needs-restarting-1.14.68-150200.70.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libsolv-debugsource-0.7.27-150200.23.2 * libzypp-debuginfo-17.31.27-150200.84.1 * zypper-debugsource-1.14.68-150200.70.2 * libsolv-devel-0.7.27-150200.23.2 * libsolv-tools-0.7.27-150200.23.2 * perl-solv-debuginfo-0.7.27-150200.23.2 * python3-solv-debuginfo-0.7.27-150200.23.2 * ruby-solv-debuginfo-0.7.27-150200.23.2 * libsolv-devel-debuginfo-0.7.27-150200.23.2 * zypper-debuginfo-1.14.68-150200.70.2 * perl-solv-0.7.27-150200.23.2 * zypper-1.14.68-150200.70.2 * python3-solv-0.7.27-150200.23.2 * libsolv-debuginfo-0.7.27-150200.23.2 * libsolv-tools-debuginfo-0.7.27-150200.23.2 * libzypp-devel-17.31.27-150200.84.1 * libzypp-17.31.27-150200.84.1 * ruby-solv-0.7.27-150200.23.2 * libzypp-debugsource-17.31.27-150200.84.1 * SUSE Enterprise Storage 7.1 (noarch) * zypper-log-1.14.68-150200.70.2 * zypper-needs-restarting-1.14.68-150200.70.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libsolv-debugsource-0.7.27-150200.23.2 * libzypp-debuginfo-17.31.27-150200.84.1 * zypper-debugsource-1.14.68-150200.70.2 * libsolv-tools-0.7.27-150200.23.2 * zypper-debuginfo-1.14.68-150200.70.2 * zypper-1.14.68-150200.70.2 * libsolv-debuginfo-0.7.27-150200.23.2 * libsolv-tools-debuginfo-0.7.27-150200.23.2 * libzypp-17.31.27-150200.84.1 * libzypp-debugsource-17.31.27-150200.84.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * zypper-needs-restarting-1.14.68-150200.70.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libsolv-debugsource-0.7.27-150200.23.2 * libzypp-debuginfo-17.31.27-150200.84.1 * zypper-debugsource-1.14.68-150200.70.2 * libsolv-tools-0.7.27-150200.23.2 * zypper-debuginfo-1.14.68-150200.70.2 * zypper-1.14.68-150200.70.2 * libsolv-debuginfo-0.7.27-150200.23.2 * libsolv-tools-debuginfo-0.7.27-150200.23.2 * libzypp-17.31.27-150200.84.1 * libzypp-debugsource-17.31.27-150200.84.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * zypper-needs-restarting-1.14.68-150200.70.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libsolv-debugsource-0.7.27-150200.23.2 * libzypp-debuginfo-17.31.27-150200.84.1 * zypper-debugsource-1.14.68-150200.70.2 * libsolv-tools-0.7.27-150200.23.2 * zypper-debuginfo-1.14.68-150200.70.2 * zypper-1.14.68-150200.70.2 * libsolv-debuginfo-0.7.27-150200.23.2 * libsolv-tools-debuginfo-0.7.27-150200.23.2 * libzypp-17.31.27-150200.84.1 * libzypp-debugsource-17.31.27-150200.84.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * zypper-needs-restarting-1.14.68-150200.70.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212160 * https://bugzilla.suse.com/show_bug.cgi?id=1215294 * https://bugzilla.suse.com/show_bug.cgi?id=1216412 * https://bugzilla.suse.com/show_bug.cgi?id=1217593 * https://bugzilla.suse.com/show_bug.cgi?id=1217873 * https://bugzilla.suse.com/show_bug.cgi?id=1218291 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 05 Jan 2024 16:30:05 -0000 Subject: SUSE-RU-2024:0042-1: moderate: Recommended update for libzypp, zypper Message-ID: <170447220535.27142.2645068988246633127@smelt2.prg2.suse.org> # Recommended update for libzypp, zypper Announcement ID: SUSE-RU-2024:0042-1 Rating: moderate References: * bsc#1212160 * bsc#1215294 * bsc#1216412 * bsc#1217593 * bsc#1217873 * bsc#1218291 Affected Products: * SUSE CaaS Platform 4.0 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 An update that has six fixes can now be installed. ## Description: This update for libzypp, zypper fixes the following issues: * Expand RepoVars in URLs downloading a .repo file (bsc#1212160) * CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) * Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) * tools/DownloadFiles: use standard zypp progress bar * Fix ProgressBar's calculation of the printed tag position * Fix usage of deprecated CURL features * Stop using boost version 1 timer library (bsc#1215294) * Fix search/info commands ignoring --ignore-unknown (bsc#1217593) * Make sure reboot-needed is remembered until next boot (bsc#1217873) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP1 zypper in -t patch SUSE-SLE-INSTALLER-15-SP1-2024-42=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-42=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-42=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-42=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE Linux Enterprise Server 15 SP1 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.27-150100.3.125.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libzypp-debugsource-17.31.27-150100.3.125.1 * libzypp-debuginfo-17.31.27-150100.3.125.1 * zypper-1.14.68-150100.3.93.2 * libzypp-17.31.27-150100.3.125.1 * libzypp-devel-17.31.27-150100.3.125.1 * zypper-debuginfo-1.14.68-150100.3.93.2 * zypper-debugsource-1.14.68-150100.3.93.2 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * zypper-log-1.14.68-150100.3.93.2 * zypper-needs-restarting-1.14.68-150100.3.93.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libzypp-debugsource-17.31.27-150100.3.125.1 * libzypp-debuginfo-17.31.27-150100.3.125.1 * zypper-1.14.68-150100.3.93.2 * libzypp-17.31.27-150100.3.125.1 * libzypp-devel-17.31.27-150100.3.125.1 * zypper-debuginfo-1.14.68-150100.3.93.2 * zypper-debugsource-1.14.68-150100.3.93.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * zypper-log-1.14.68-150100.3.93.2 * zypper-needs-restarting-1.14.68-150100.3.93.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libzypp-debugsource-17.31.27-150100.3.125.1 * libzypp-debuginfo-17.31.27-150100.3.125.1 * zypper-1.14.68-150100.3.93.2 * libzypp-17.31.27-150100.3.125.1 * libzypp-devel-17.31.27-150100.3.125.1 * zypper-debuginfo-1.14.68-150100.3.93.2 * zypper-debugsource-1.14.68-150100.3.93.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * zypper-log-1.14.68-150100.3.93.2 * zypper-needs-restarting-1.14.68-150100.3.93.2 * SUSE CaaS Platform 4.0 (x86_64) * libzypp-debugsource-17.31.27-150100.3.125.1 * libzypp-debuginfo-17.31.27-150100.3.125.1 * zypper-1.14.68-150100.3.93.2 * libzypp-17.31.27-150100.3.125.1 * libzypp-devel-17.31.27-150100.3.125.1 * zypper-debuginfo-1.14.68-150100.3.93.2 * zypper-debugsource-1.14.68-150100.3.93.2 * SUSE CaaS Platform 4.0 (noarch) * zypper-log-1.14.68-150100.3.93.2 * zypper-needs-restarting-1.14.68-150100.3.93.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212160 * https://bugzilla.suse.com/show_bug.cgi?id=1215294 * https://bugzilla.suse.com/show_bug.cgi?id=1216412 * https://bugzilla.suse.com/show_bug.cgi?id=1217593 * https://bugzilla.suse.com/show_bug.cgi?id=1217873 * https://bugzilla.suse.com/show_bug.cgi?id=1218291 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 05 Jan 2024 16:30:06 -0000 Subject: SUSE-RU-2024:0040-1: moderate: Recommended update for yast2-network Message-ID: <170447220670.27142.3745994826611107997@smelt2.prg2.suse.org> # Recommended update for yast2-network Announcement ID: SUSE-RU-2024:0040-1 Rating: moderate References: * bsc#1217652 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for yast2-network fixes the following issues: * Read all the driver modules from hwinfo instead of just the first ones (bsc#1217652) * Update to version 4.5.22 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-40=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-40=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-40=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-40=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-40=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-40=1 openSUSE-SLE-15.5-2024-40=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP5 (noarch) * yast2-network-4.5.22-150500.3.8.1 * SUSE Linux Enterprise Server 15 SP5 (noarch) * yast2-network-4.5.22-150500.3.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * yast2-network-4.5.22-150500.3.8.1 * SUSE Linux Enterprise Desktop 15 SP5 (noarch) * yast2-network-4.5.22-150500.3.8.1 * Basesystem Module 15-SP5 (noarch) * yast2-network-4.5.22-150500.3.8.1 * openSUSE Leap 15.5 (noarch) * yast2-network-4.5.22-150500.3.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217652 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 05 Jan 2024 16:30:09 -0000 Subject: SUSE-RU-2024:0039-1: moderate: Recommended update for samba Message-ID: <170447220905.27142.6276876301791508129@smelt2.prg2.suse.org> # Recommended update for samba Announcement ID: SUSE-RU-2024:0039-1 Rating: moderate References: * bsc#1215369 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for samba fixes the following issues: * Add idmap_nss option 'use_upn' for NSS modules able to handle UPNs or DOMAIN/user name format (bsc#1215369) * Avoid unnecessary locking in idmap parent setup (bsc#1215369) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-39=1 openSUSE-SLE-15.5-2024-39=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-39=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-39=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-39=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * samba-winbind-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-devel-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-test-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * libsamba-policy0-python3-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * libsamba-policy0-python3-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-winbind-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-winbind-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-python3-4.17.12+git.455.b299ac1e60-150500.3.20.1 * ctdb-pcp-pmda-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-gpupdate-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-winbind-libs-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * ctdb-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-tool-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-python3-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-ldb-ldap-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-debugsource-4.17.12+git.455.b299ac1e60-150500.3.20.1 * ctdb-pcp-pmda-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-ldb-ldap-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-python3-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * libsamba-policy-python3-devel-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-python3-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-libs-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * ctdb-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * libsamba-policy-devel-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-test-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 * openSUSE Leap 15.5 (x86_64) * samba-libs-python3-32bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-winbind-libs-32bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * libsamba-policy0-python3-32bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-32bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-python3-32bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-libs-32bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-32bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-32bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-32bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-devel-32bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * libsamba-policy0-python3-32bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-winbind-libs-32bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-libs-32bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * openSUSE Leap 15.5 (noarch) * samba-doc-4.17.12+git.455.b299ac1e60-150500.3.20.1 * openSUSE Leap 15.5 (aarch64 x86_64) * samba-ceph-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-ceph-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * openSUSE Leap 15.5 (aarch64_ilp32) * samba-winbind-libs-64bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-libs-64bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-64bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-winbind-libs-64bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-devel-64bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-python3-64bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-64bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-libs-64bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-64bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * libsamba-policy0-python3-64bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-64bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * libsamba-policy0-python3-64bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-python3-64bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * samba-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-libs-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-debugsource-4.17.12+git.455.b299ac1e60-150500.3.20.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * samba-winbind-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-devel-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-4.17.12+git.455.b299ac1e60-150500.3.20.1 * libsamba-policy0-python3-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * libsamba-policy0-python3-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-winbind-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-winbind-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-python3-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-gpupdate-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-winbind-libs-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-tool-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-python3-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-ldb-ldap-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-debugsource-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-ldb-ldap-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-python3-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * libsamba-policy-python3-devel-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-python3-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-libs-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * libsamba-policy-devel-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 * Basesystem Module 15-SP5 (aarch64 x86_64) * samba-ceph-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-ceph-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * Basesystem Module 15-SP5 (x86_64) * samba-client-libs-32bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-32bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-winbind-libs-32bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-libs-32bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-winbind-libs-32bit-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-client-libs-32bit-4.17.12+git.455.b299ac1e60-150500.3.20.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * ctdb-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * ctdb-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-debuginfo-4.17.12+git.455.b299ac1e60-150500.3.20.1 * samba-debugsource-4.17.12+git.455.b299ac1e60-150500.3.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215369 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 16:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 05 Jan 2024 16:30:11 -0000 Subject: SUSE-RU-2024:0038-1: moderate: Recommended update for samba Message-ID: <170447221178.27142.10678442585065482523@smelt2.prg2.suse.org> # Recommended update for samba Announcement ID: SUSE-RU-2024:0038-1 Rating: moderate References: * bsc#1215369 Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that has one fix can now be installed. ## Description: This update for samba fixes the following issues: * Add idmap_nss option 'use_upn' for NSS modules able to handle UPNs or DOMAIN/user name format (bsc#1215369) * Avoid unnecessary locking in idmap parent setup (bsc#1215369) * Do not try to set domain online in the idmap child (bsc#1215369) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-38=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-38=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-38=1 SUSE-SLE- HA-12-SP5-2024-38=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-38=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-38=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * samba-winbind-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-debugsource-4.15.13+git.638.942e3211cf-3.91.1 * samba-ldb-ldap-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-libs-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy0-python3-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-python3-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-libs-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-python3-4.15.13+git.638.942e3211cf-3.91.1 * samba-tool-4.15.13+git.638.942e3211cf-3.91.1 * samba-4.15.13+git.638.942e3211cf-3.91.1 * samba-python3-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-libs-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-4.15.13+git.638.942e3211cf-3.91.1 * samba-python3-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-libs-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-ldb-ldap-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64) * samba-devel-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * samba-doc-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * samba-client-libs-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-libs-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-libs-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-python3-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy0-python3-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-python3-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-libs-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy0-python3-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * samba-winbind-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-debugsource-4.15.13+git.638.942e3211cf-3.91.1 * samba-ldb-ldap-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-libs-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy0-python3-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-python3-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-libs-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-python3-4.15.13+git.638.942e3211cf-3.91.1 * samba-tool-4.15.13+git.638.942e3211cf-3.91.1 * samba-4.15.13+git.638.942e3211cf-3.91.1 * samba-python3-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-libs-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-4.15.13+git.638.942e3211cf-3.91.1 * samba-python3-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-libs-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-ldb-ldap-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64) * samba-devel-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * samba-doc-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise Server 12 SP5 (ppc64le) * libsamba-policy-python3-devel-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * samba-client-libs-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-libs-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-libs-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-python3-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy0-python3-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-python3-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-libs-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy0-python3-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le) * libsamba-policy-python3-devel-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * samba-winbind-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-debugsource-4.15.13+git.638.942e3211cf-3.91.1 * samba-ldb-ldap-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-libs-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy0-python3-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-python3-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-libs-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-python3-4.15.13+git.638.942e3211cf-3.91.1 * samba-tool-4.15.13+git.638.942e3211cf-3.91.1 * samba-4.15.13+git.638.942e3211cf-3.91.1 * samba-python3-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * ctdb-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-libs-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * ctdb-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-4.15.13+git.638.942e3211cf-3.91.1 * samba-python3-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-libs-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-ldb-ldap-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * samba-doc-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * samba-client-libs-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-libs-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-libs-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-python3-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy0-python3-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-client-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-python3-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-libs-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * samba-winbind-libs-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy0-python3-debuginfo-32bit-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64) * samba-debugsource-4.15.13+git.638.942e3211cf-3.91.1 * ctdb-4.15.13+git.638.942e3211cf-3.91.1 * samba-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * ctdb-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * samba-debuginfo-4.15.13+git.638.942e3211cf-3.91.1 * samba-debugsource-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy-python3-devel-4.15.13+git.638.942e3211cf-3.91.1 * libsamba-policy-devel-4.15.13+git.638.942e3211cf-3.91.1 * samba-devel-4.15.13+git.638.942e3211cf-3.91.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (s390x x86_64) * samba-devel-32bit-4.15.13+git.638.942e3211cf-3.91.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215369 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 16:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 05 Jan 2024 16:30:16 -0000 Subject: SUSE-RU-2024:0036-1: moderate: Recommended update for raptor Message-ID: <170447221614.27142.12819138020275769421@smelt2.prg2.suse.org> # Recommended update for raptor Announcement ID: SUSE-RU-2024:0036-1 Rating: moderate References: * jsc#PED-6193 Affected Products: * Desktop Applications Module 15-SP4 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for raptor fixes the following issues: * rebuild to use ICU 73 (jsc#PED-6193) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-36=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-36=1 * Desktop Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-36=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-36=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-36=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-36=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-36=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-36=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-36=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-36=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-36=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-36=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libraptor2-0-2.0.15-150200.9.15.1 * libraptor-devel-2.0.15-150200.9.15.1 * raptor-debugsource-2.0.15-150200.9.15.1 * raptor-2.0.15-150200.9.15.1 * raptor-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-debuginfo-2.0.15-150200.9.15.1 * openSUSE Leap 15.4 (x86_64) * libraptor2-0-32bit-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-32bit-2.0.15-150200.9.15.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libraptor2-0-2.0.15-150200.9.15.1 * libraptor-devel-2.0.15-150200.9.15.1 * raptor-debugsource-2.0.15-150200.9.15.1 * raptor-2.0.15-150200.9.15.1 * raptor-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-debuginfo-2.0.15-150200.9.15.1 * openSUSE Leap 15.5 (x86_64) * libraptor2-0-32bit-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-32bit-2.0.15-150200.9.15.1 * Desktop Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libraptor2-0-2.0.15-150200.9.15.1 * libraptor-devel-2.0.15-150200.9.15.1 * raptor-debugsource-2.0.15-150200.9.15.1 * raptor-2.0.15-150200.9.15.1 * raptor-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-debuginfo-2.0.15-150200.9.15.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libraptor2-0-2.0.15-150200.9.15.1 * libraptor-devel-2.0.15-150200.9.15.1 * raptor-debugsource-2.0.15-150200.9.15.1 * raptor-2.0.15-150200.9.15.1 * raptor-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-debuginfo-2.0.15-150200.9.15.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libraptor2-0-2.0.15-150200.9.15.1 * libraptor-devel-2.0.15-150200.9.15.1 * raptor-debugsource-2.0.15-150200.9.15.1 * raptor-2.0.15-150200.9.15.1 * raptor-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-debuginfo-2.0.15-150200.9.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libraptor2-0-2.0.15-150200.9.15.1 * libraptor-devel-2.0.15-150200.9.15.1 * raptor-debugsource-2.0.15-150200.9.15.1 * raptor-2.0.15-150200.9.15.1 * raptor-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-debuginfo-2.0.15-150200.9.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libraptor2-0-2.0.15-150200.9.15.1 * libraptor-devel-2.0.15-150200.9.15.1 * raptor-debugsource-2.0.15-150200.9.15.1 * raptor-2.0.15-150200.9.15.1 * raptor-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-debuginfo-2.0.15-150200.9.15.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libraptor2-0-2.0.15-150200.9.15.1 * libraptor-devel-2.0.15-150200.9.15.1 * raptor-debugsource-2.0.15-150200.9.15.1 * raptor-2.0.15-150200.9.15.1 * raptor-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-debuginfo-2.0.15-150200.9.15.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libraptor2-0-2.0.15-150200.9.15.1 * libraptor-devel-2.0.15-150200.9.15.1 * raptor-debugsource-2.0.15-150200.9.15.1 * raptor-2.0.15-150200.9.15.1 * raptor-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-debuginfo-2.0.15-150200.9.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libraptor2-0-2.0.15-150200.9.15.1 * libraptor-devel-2.0.15-150200.9.15.1 * raptor-debugsource-2.0.15-150200.9.15.1 * raptor-2.0.15-150200.9.15.1 * raptor-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-debuginfo-2.0.15-150200.9.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libraptor2-0-2.0.15-150200.9.15.1 * libraptor-devel-2.0.15-150200.9.15.1 * raptor-debugsource-2.0.15-150200.9.15.1 * raptor-2.0.15-150200.9.15.1 * raptor-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-debuginfo-2.0.15-150200.9.15.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libraptor2-0-2.0.15-150200.9.15.1 * libraptor-devel-2.0.15-150200.9.15.1 * raptor-debugsource-2.0.15-150200.9.15.1 * raptor-2.0.15-150200.9.15.1 * raptor-debuginfo-2.0.15-150200.9.15.1 * libraptor2-0-debuginfo-2.0.15-150200.9.15.1 ## References: * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 05 Jan 2024 16:30:14 -0000 Subject: SUSE-SU-2024:0037-1: low: Security update for libxkbcommon Message-ID: <170447221430.27142.8291941409288177990@smelt2.prg2.suse.org> # Security update for libxkbcommon Announcement ID: SUSE-SU-2024:0037-1 Rating: low References: * bsc#1105832 Cross-References: * CVE-2018-15853 * CVE-2018-15854 * CVE-2018-15855 * CVE-2018-15856 * CVE-2018-15857 * CVE-2018-15858 * CVE-2018-15859 * CVE-2018-15861 * CVE-2018-15862 * CVE-2018-15863 * CVE-2018-15864 CVSS scores: * CVE-2018-15853 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15853 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15854 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15854 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15855 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15855 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15856 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15856 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15857 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15857 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2018-15858 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15858 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15859 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15859 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15861 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15861 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15862 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15862 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15863 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15863 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15864 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15864 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves 11 vulnerabilities can now be installed. ## Description: This update for libxkbcommon fixes the following issues: Fixed multiple memory handling and correctness issues (bsc#1105832): * CVE-2018-15859 * CVE-2018-15856 * CVE-2018-15858 * CVE-2018-15864 * CVE-2018-15863 * CVE-2018-15862 * CVE-2018-15861 * CVE-2018-15855 * CVE-2018-15854 * CVE-2018-15857 * CVE-2018-15853 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-37=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-37=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-37=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-37=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libxkbcommon-x11-devel-0.6.1-9.3.1 * libxkbcommon-devel-0.6.1-9.3.1 * libxkbcommon-debugsource-0.6.1-9.3.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libxkbcommon0-0.6.1-9.3.1 * libxkbcommon-x11-0-0.6.1-9.3.1 * libxkbcommon0-debuginfo-0.6.1-9.3.1 * libxkbcommon-debugsource-0.6.1-9.3.1 * libxkbcommon-x11-0-debuginfo-0.6.1-9.3.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libxkbcommon0-32bit-0.6.1-9.3.1 * libxkbcommon0-debuginfo-32bit-0.6.1-9.3.1 * libxkbcommon-x11-0-32bit-0.6.1-9.3.1 * libxkbcommon-x11-0-debuginfo-32bit-0.6.1-9.3.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libxkbcommon0-0.6.1-9.3.1 * libxkbcommon-x11-0-0.6.1-9.3.1 * libxkbcommon0-debuginfo-0.6.1-9.3.1 * libxkbcommon-debugsource-0.6.1-9.3.1 * libxkbcommon-x11-0-debuginfo-0.6.1-9.3.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libxkbcommon0-debuginfo-32bit-0.6.1-9.3.1 * libxkbcommon0-32bit-0.6.1-9.3.1 * libxkbcommon-x11-0-32bit-0.6.1-9.3.1 * libxkbcommon-x11-0-debuginfo-32bit-0.6.1-9.3.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libxkbcommon0-0.6.1-9.3.1 * libxkbcommon-x11-0-0.6.1-9.3.1 * libxkbcommon0-debuginfo-0.6.1-9.3.1 * libxkbcommon-debugsource-0.6.1-9.3.1 * libxkbcommon-x11-0-debuginfo-0.6.1-9.3.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libxkbcommon0-32bit-0.6.1-9.3.1 * libxkbcommon0-debuginfo-32bit-0.6.1-9.3.1 * libxkbcommon-x11-0-32bit-0.6.1-9.3.1 * libxkbcommon-x11-0-debuginfo-32bit-0.6.1-9.3.1 ## References: * https://www.suse.com/security/cve/CVE-2018-15853.html * https://www.suse.com/security/cve/CVE-2018-15854.html * https://www.suse.com/security/cve/CVE-2018-15855.html * https://www.suse.com/security/cve/CVE-2018-15856.html * https://www.suse.com/security/cve/CVE-2018-15857.html * https://www.suse.com/security/cve/CVE-2018-15858.html * https://www.suse.com/security/cve/CVE-2018-15859.html * https://www.suse.com/security/cve/CVE-2018-15861.html * https://www.suse.com/security/cve/CVE-2018-15862.html * https://www.suse.com/security/cve/CVE-2018-15863.html * https://www.suse.com/security/cve/CVE-2018-15864.html * https://bugzilla.suse.com/show_bug.cgi?id=1105832 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Sat Jan 6 08:03:11 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 6 Jan 2024 09:03:11 +0100 (CET) Subject: SUSE-CU-2024:65-1: Recommended update of suse/sle15 Message-ID: <20240106080311.0673BFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:65-1 Container Tags : suse/sle15:15.1 , suse/sle15:15.1.6.2.860 Container Release : 6.2.860 Severity : moderate Type : recommended References : 1212160 1215294 1216412 1217593 1217873 1218291 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:42-1 Released: Fri Jan 5 14:47:55 2024 Summary: Recommended update for libzypp, zypper Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libzypp, zypper fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - tools/DownloadFiles: use standard zypp progress bar - Fix ProgressBar's calculation of the printed tag position - Fix usage of deprecated CURL features - Stop using boost version 1 timer library (bsc#1215294) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - Make sure reboot-needed is remembered until next boot (bsc#1217873) The following package changes have been done: - libzypp-17.31.27-150100.3.125.1 updated - zypper-1.14.68-150100.3.93.2 updated From null at suse.de Mon Jan 8 08:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 08:30:01 -0000 Subject: SUSE-RU-2024:0055-1: moderate: Recommended update for nfs-utils Message-ID: <170470260181.26845.18048140916002038678@smelt2.prg2.suse.org> # Recommended update for nfs-utils Announcement ID: SUSE-RU-2024:0055-1 Rating: moderate References: * bsc#1212594 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for nfs-utils fixes the following issues: * duplicate entry in /etc/exports causes nfs-server.service to fail (bsc#1212594) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-55=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-55=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-55=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * nfs-doc-1.3.0-34.50.1 * nfs-kernel-server-1.3.0-34.50.1 * nfs-client-debuginfo-1.3.0-34.50.1 * nfs-utils-debugsource-1.3.0-34.50.1 * nfs-client-1.3.0-34.50.1 * nfs-kernel-server-debuginfo-1.3.0-34.50.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * nfs-doc-1.3.0-34.50.1 * nfs-kernel-server-1.3.0-34.50.1 * nfs-client-debuginfo-1.3.0-34.50.1 * nfs-utils-debugsource-1.3.0-34.50.1 * nfs-client-1.3.0-34.50.1 * nfs-kernel-server-debuginfo-1.3.0-34.50.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * nfs-doc-1.3.0-34.50.1 * nfs-kernel-server-1.3.0-34.50.1 * nfs-client-debuginfo-1.3.0-34.50.1 * nfs-utils-debugsource-1.3.0-34.50.1 * nfs-client-1.3.0-34.50.1 * nfs-kernel-server-debuginfo-1.3.0-34.50.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212594 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 08:39:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 08:39:07 -0000 Subject: SUSE-RU-2024:0054-1: important: Recommended update for NetworkManager Message-ID: <170470314778.2111.17023653470660726360@smelt2.prg2.suse.org> # Recommended update for NetworkManager Announcement ID: SUSE-RU-2024:0054-1 Rating: important References: * bsc#1218248 Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that has one fix can now be installed. ## Description: This recommended update for NetworkManager fixes the following issues: * No-change rebuild to include NetworkManager-wwan in the SLE-Module-Desktop- Applications_15-SP5 channels (bsc#1218248) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-54=1 openSUSE-SLE-15.5-2024-54=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-54=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-54=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-54=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-54=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * NetworkManager-debugsource-1.38.6-150500.3.2.1 * NetworkManager-bluetooth-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-1.38.6-150500.3.2.1 * NetworkManager-ovs-1.38.6-150500.3.2.1 * NetworkManager-ovs-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-wwan-1.38.6-150500.3.2.1 * NetworkManager-pppoe-debuginfo-1.38.6-150500.3.2.1 * typelib-1_0-NM-1_0-1.38.6-150500.3.2.1 * NetworkManager-bluetooth-1.38.6-150500.3.2.1 * NetworkManager-tui-1.38.6-150500.3.2.1 * NetworkManager-tui-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-wwan-debuginfo-1.38.6-150500.3.2.1 * libnm0-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-cloud-setup-1.38.6-150500.3.2.1 * NetworkManager-cloud-setup-debuginfo-1.38.6-150500.3.2.1 * libnm0-1.38.6-150500.3.2.1 * NetworkManager-devel-1.38.6-150500.3.2.1 * NetworkManager-pppoe-1.38.6-150500.3.2.1 * NetworkManager-debuginfo-1.38.6-150500.3.2.1 * openSUSE Leap 15.5 (noarch) * NetworkManager-branding-upstream-1.38.6-150500.3.2.1 * NetworkManager-lang-1.38.6-150500.3.2.1 * openSUSE Leap 15.5 (x86_64) * libnm0-32bit-1.38.6-150500.3.2.1 * NetworkManager-devel-32bit-1.38.6-150500.3.2.1 * libnm0-32bit-debuginfo-1.38.6-150500.3.2.1 * openSUSE Leap 15.5 (aarch64_ilp32) * NetworkManager-devel-64bit-1.38.6-150500.3.2.1 * libnm0-64bit-1.38.6-150500.3.2.1 * libnm0-64bit-debuginfo-1.38.6-150500.3.2.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * NetworkManager-debugsource-1.38.6-150500.3.2.1 * NetworkManager-bluetooth-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-1.38.6-150500.3.2.1 * NetworkManager-wwan-1.38.6-150500.3.2.1 * NetworkManager-pppoe-debuginfo-1.38.6-150500.3.2.1 * typelib-1_0-NM-1_0-1.38.6-150500.3.2.1 * NetworkManager-bluetooth-1.38.6-150500.3.2.1 * NetworkManager-tui-1.38.6-150500.3.2.1 * NetworkManager-tui-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-wwan-debuginfo-1.38.6-150500.3.2.1 * libnm0-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-cloud-setup-1.38.6-150500.3.2.1 * NetworkManager-cloud-setup-debuginfo-1.38.6-150500.3.2.1 * libnm0-1.38.6-150500.3.2.1 * NetworkManager-pppoe-1.38.6-150500.3.2.1 * NetworkManager-debuginfo-1.38.6-150500.3.2.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * NetworkManager-debugsource-1.38.6-150500.3.2.1 * typelib-1_0-NM-1_0-1.38.6-150500.3.2.1 * libnm0-debuginfo-1.38.6-150500.3.2.1 * libnm0-1.38.6-150500.3.2.1 * NetworkManager-debuginfo-1.38.6-150500.3.2.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * NetworkManager-debugsource-1.38.6-150500.3.2.1 * NetworkManager-1.38.6-150500.3.2.1 * NetworkManager-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-wwan-1.38.6-150500.3.2.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * NetworkManager-debugsource-1.38.6-150500.3.2.1 * NetworkManager-bluetooth-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-wwan-1.38.6-150500.3.2.1 * NetworkManager-pppoe-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-bluetooth-1.38.6-150500.3.2.1 * NetworkManager-tui-1.38.6-150500.3.2.1 * NetworkManager-tui-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-wwan-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-cloud-setup-1.38.6-150500.3.2.1 * NetworkManager-cloud-setup-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-devel-1.38.6-150500.3.2.1 * NetworkManager-pppoe-1.38.6-150500.3.2.1 * NetworkManager-debuginfo-1.38.6-150500.3.2.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (noarch) * NetworkManager-lang-1.38.6-150500.3.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218248 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 12:30:02 -0000 Subject: SUSE-SU-2024:0063-1: important: Security update for qt6-base Message-ID: <170471700242.521.5077878235708304269@smelt2.prg2.suse.org> # Security update for qt6-base Announcement ID: SUSE-SU-2024:0063-1 Rating: important References: * bsc#1218413 * jsc#PED-6193 Cross-References: * CVE-2023-51714 CVSS scores: * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for qt6-base fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-63=1 openSUSE-SLE-15.5-2024-63=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-63=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-63=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-mysql-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-sql-postgresql-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * qt6-sql-postgresql-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-platformsupport-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-private-devel-6.4.2-150500.3.14.1 * qt6-base-examples-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-sql-mysql-debuginfo-6.4.2-150500.3.14.1 * qt6-network-private-devel-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-xml-private-devel-6.4.2-150500.3.14.1 * qt6-base-docs-qch-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-examples-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * qt6-dbus-private-devel-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-6.4.2-150500.3.14.1 * qt6-test-private-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * qt6-base-docs-html-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * openSUSE Leap 15.5 (noarch) * qt6-docs-common-6.4.2-150500.3.14.1 * qt6-base-private-devel-6.4.2-150500.3.14.1 * qt6-base-devel-6.4.2-150500.3.14.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (noarch) * qt6-base-devel-6.4.2-150500.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51714.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 12:33:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 12:33:03 -0000 Subject: SUSE-SU-2024:0063-1: important: Security update for qt6-base Message-ID: <170471718367.1702.17004243808256398668@smelt2.prg2.suse.org> # Security update for qt6-base Announcement ID: SUSE-SU-2024:0063-1 Rating: important References: * bsc#1218413 * jsc#PED-6193 Cross-References: * CVE-2023-51714 CVSS scores: * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for qt6-base fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-63=1 openSUSE-SLE-15.5-2024-63=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-63=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-63=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-6.4.2-150500.3.14.1 * qt6-sql-postgresql-6.4.2-150500.3.14.1 * qt6-sql-mysql-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-private-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-6.4.2-150500.3.14.1 * qt6-xml-private-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-sql-postgresql-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-base-examples-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.14.1 * qt6-sql-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-dbus-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-cups-debuginfo-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-base-docs-html-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-mysql-6.4.2-150500.3.14.1 * qt6-network-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-examples-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-test-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-private-devel-6.4.2-150500.3.14.1 * qt6-base-docs-qch-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * openSUSE Leap 15.5 (noarch) * qt6-docs-common-6.4.2-150500.3.14.1 * qt6-base-devel-6.4.2-150500.3.14.1 * qt6-base-private-devel-6.4.2-150500.3.14.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (noarch) * qt6-base-devel-6.4.2-150500.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51714.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 12:36:04 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 12:36:04 -0000 Subject: SUSE-SU-2024:0063-1: important: Security update for qt6-base Message-ID: <170471736499.1702.4348573146315165027@smelt2.prg2.suse.org> # Security update for qt6-base Announcement ID: SUSE-SU-2024:0063-1 Rating: important References: * bsc#1218413 * jsc#PED-6193 Cross-References: * CVE-2023-51714 CVSS scores: * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for qt6-base fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-63=1 openSUSE-SLE-15.5-2024-63=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-63=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-63=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-6.4.2-150500.3.14.1 * qt6-sql-postgresql-6.4.2-150500.3.14.1 * qt6-sql-mysql-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-private-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-6.4.2-150500.3.14.1 * qt6-xml-private-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-sql-postgresql-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-base-examples-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.14.1 * qt6-sql-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-dbus-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-cups-debuginfo-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-base-docs-html-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-mysql-6.4.2-150500.3.14.1 * qt6-network-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-examples-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-test-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-private-devel-6.4.2-150500.3.14.1 * qt6-base-docs-qch-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * openSUSE Leap 15.5 (noarch) * qt6-docs-common-6.4.2-150500.3.14.1 * qt6-base-devel-6.4.2-150500.3.14.1 * qt6-base-private-devel-6.4.2-150500.3.14.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (noarch) * qt6-base-devel-6.4.2-150500.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51714.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 12:39:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 12:39:07 -0000 Subject: SUSE-SU-2024:0063-1: important: Security update for qt6-base Message-ID: <170471754723.1702.9599701893438038848@smelt2.prg2.suse.org> # Security update for qt6-base Announcement ID: SUSE-SU-2024:0063-1 Rating: important References: * bsc#1218413 * jsc#PED-6193 Cross-References: * CVE-2023-51714 CVSS scores: * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for qt6-base fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-63=1 openSUSE-SLE-15.5-2024-63=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-63=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-63=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-6.4.2-150500.3.14.1 * qt6-sql-postgresql-6.4.2-150500.3.14.1 * qt6-sql-mysql-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-private-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-6.4.2-150500.3.14.1 * qt6-xml-private-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-sql-postgresql-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-base-examples-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.14.1 * qt6-sql-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-dbus-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-cups-debuginfo-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-base-docs-html-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-mysql-6.4.2-150500.3.14.1 * qt6-network-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-examples-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-test-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-private-devel-6.4.2-150500.3.14.1 * qt6-base-docs-qch-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * openSUSE Leap 15.5 (noarch) * qt6-docs-common-6.4.2-150500.3.14.1 * qt6-base-devel-6.4.2-150500.3.14.1 * qt6-base-private-devel-6.4.2-150500.3.14.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (noarch) * qt6-base-devel-6.4.2-150500.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51714.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 16:30:01 -0000 Subject: SUSE-SU-2024:0063-1: important: Security update for qt6-base Message-ID: <170473140139.20776.6565382787790609515@smelt2.prg2.suse.org> # Security update for qt6-base Announcement ID: SUSE-SU-2024:0063-1 Rating: important References: * bsc#1218413 * jsc#PED-6193 Cross-References: * CVE-2023-51714 CVSS scores: * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for qt6-base fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-63=1 openSUSE-SLE-15.5-2024-63=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-63=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-63=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-6.4.2-150500.3.14.1 * qt6-sql-postgresql-6.4.2-150500.3.14.1 * qt6-sql-mysql-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-private-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-6.4.2-150500.3.14.1 * qt6-xml-private-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-sql-postgresql-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-base-examples-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.14.1 * qt6-sql-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-dbus-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-cups-debuginfo-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-base-docs-html-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-mysql-6.4.2-150500.3.14.1 * qt6-network-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-examples-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-test-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-private-devel-6.4.2-150500.3.14.1 * qt6-base-docs-qch-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * openSUSE Leap 15.5 (noarch) * qt6-docs-common-6.4.2-150500.3.14.1 * qt6-base-devel-6.4.2-150500.3.14.1 * qt6-base-private-devel-6.4.2-150500.3.14.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (noarch) * qt6-base-devel-6.4.2-150500.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51714.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:33:04 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 16:33:04 -0000 Subject: SUSE-SU-2024:0063-1: important: Security update for qt6-base Message-ID: <170473158459.20776.2787568524998373485@smelt2.prg2.suse.org> # Security update for qt6-base Announcement ID: SUSE-SU-2024:0063-1 Rating: important References: * bsc#1218413 * jsc#PED-6193 Cross-References: * CVE-2023-51714 CVSS scores: * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for qt6-base fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-63=1 openSUSE-SLE-15.5-2024-63=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-63=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-63=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-6.4.2-150500.3.14.1 * qt6-sql-postgresql-6.4.2-150500.3.14.1 * qt6-sql-mysql-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-private-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-6.4.2-150500.3.14.1 * qt6-xml-private-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-sql-postgresql-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-base-examples-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.14.1 * qt6-sql-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-dbus-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-cups-debuginfo-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-base-docs-html-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-mysql-6.4.2-150500.3.14.1 * qt6-network-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-examples-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-test-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-private-devel-6.4.2-150500.3.14.1 * qt6-base-docs-qch-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * openSUSE Leap 15.5 (noarch) * qt6-docs-common-6.4.2-150500.3.14.1 * qt6-base-devel-6.4.2-150500.3.14.1 * qt6-base-private-devel-6.4.2-150500.3.14.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (noarch) * qt6-base-devel-6.4.2-150500.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51714.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:36:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 16:36:06 -0000 Subject: SUSE-SU-2024:0063-1: important: Security update for qt6-base Message-ID: <170473176634.21472.1926582493970590060@smelt2.prg2.suse.org> # Security update for qt6-base Announcement ID: SUSE-SU-2024:0063-1 Rating: important References: * bsc#1218413 * jsc#PED-6193 Cross-References: * CVE-2023-51714 CVSS scores: * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for qt6-base fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-63=1 openSUSE-SLE-15.5-2024-63=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-63=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-63=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-mysql-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-sql-postgresql-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * qt6-sql-postgresql-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-platformsupport-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-private-devel-6.4.2-150500.3.14.1 * qt6-base-examples-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-sql-mysql-debuginfo-6.4.2-150500.3.14.1 * qt6-network-private-devel-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-xml-private-devel-6.4.2-150500.3.14.1 * qt6-base-docs-qch-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-examples-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * qt6-dbus-private-devel-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-6.4.2-150500.3.14.1 * qt6-test-private-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * qt6-base-docs-html-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * openSUSE Leap 15.5 (noarch) * qt6-docs-common-6.4.2-150500.3.14.1 * qt6-base-private-devel-6.4.2-150500.3.14.1 * qt6-base-devel-6.4.2-150500.3.14.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (noarch) * qt6-base-devel-6.4.2-150500.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51714.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:36:10 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 16:36:10 -0000 Subject: SUSE-RU-2024:0062-1: moderate: Recommended update for libxcrypt Message-ID: <170473177075.21472.7188258332423071621@smelt2.prg2.suse.org> # Recommended update for libxcrypt Announcement ID: SUSE-RU-2024:0062-1 Rating: moderate References: * bsc#1215496 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for libxcrypt fixes the following issues: * fix variable name for datamember [bsc#1215496] * added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-62=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-62=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-62=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-62=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-62=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-62=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-62=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-62=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-62=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-62=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-62=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-62=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-62=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-62=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-62=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-62=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2024-62=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-62=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-62=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-62=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-62=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-62=1 ## Package List: * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libxcrypt-devel-static-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * libxcrypt-debugsource-4.4.15-150300.4.7.1 * SUSE Enterprise Storage 7.1 (x86_64) * libcrypt1-32bit-4.4.15-150300.4.7.1 * libcrypt1-32bit-debuginfo-4.4.15-150300.4.7.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * openSUSE Leap 15.3 (x86_64) * libcrypt1-32bit-4.4.15-150300.4.7.1 * libxcrypt-devel-32bit-4.4.15-150300.4.7.1 * libcrypt1-32bit-debuginfo-4.4.15-150300.4.7.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libxcrypt-devel-static-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * libxcrypt-debugsource-4.4.15-150300.4.7.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libxcrypt-devel-64bit-4.4.15-150300.4.7.1 * libcrypt1-64bit-4.4.15-150300.4.7.1 * libcrypt1-64bit-debuginfo-4.4.15-150300.4.7.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * openSUSE Leap 15.4 (x86_64) * libcrypt1-32bit-4.4.15-150300.4.7.1 * libxcrypt-devel-32bit-4.4.15-150300.4.7.1 * libcrypt1-32bit-debuginfo-4.4.15-150300.4.7.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libxcrypt-devel-static-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * libxcrypt-debugsource-4.4.15-150300.4.7.1 * openSUSE Leap 15.5 (x86_64) * libcrypt1-32bit-4.4.15-150300.4.7.1 * libxcrypt-devel-32bit-4.4.15-150300.4.7.1 * libcrypt1-32bit-debuginfo-4.4.15-150300.4.7.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libxcrypt-devel-static-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * libxcrypt-debugsource-4.4.15-150300.4.7.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * Basesystem Module 15-SP4 (x86_64) * libcrypt1-32bit-4.4.15-150300.4.7.1 * libcrypt1-32bit-debuginfo-4.4.15-150300.4.7.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * Basesystem Module 15-SP5 (x86_64) * libcrypt1-32bit-4.4.15-150300.4.7.1 * libcrypt1-32bit-debuginfo-4.4.15-150300.4.7.1 * Development Tools Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libxcrypt-devel-static-4.4.15-150300.4.7.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libxcrypt-debugsource-4.4.15-150300.4.7.1 * libxcrypt-devel-static-4.4.15-150300.4.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libxcrypt-devel-static-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * libxcrypt-debugsource-4.4.15-150300.4.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * libcrypt1-32bit-4.4.15-150300.4.7.1 * libcrypt1-32bit-debuginfo-4.4.15-150300.4.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libxcrypt-devel-static-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * libxcrypt-debugsource-4.4.15-150300.4.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libcrypt1-32bit-4.4.15-150300.4.7.1 * libcrypt1-32bit-debuginfo-4.4.15-150300.4.7.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libxcrypt-devel-static-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * libxcrypt-debugsource-4.4.15-150300.4.7.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libcrypt1-32bit-4.4.15-150300.4.7.1 * libcrypt1-32bit-debuginfo-4.4.15-150300.4.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libcrypt1-debuginfo-4.4.15-150300.4.7.1 * libxcrypt-devel-4.4.15-150300.4.7.1 * libxcrypt-devel-static-4.4.15-150300.4.7.1 * libcrypt1-4.4.15-150300.4.7.1 * libxcrypt-debugsource-4.4.15-150300.4.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libcrypt1-32bit-4.4.15-150300.4.7.1 * libcrypt1-32bit-debuginfo-4.4.15-150300.4.7.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215496 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:36:12 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 16:36:12 -0000 Subject: SUSE-RU-2024:0061-1: moderate: Recommended update for ntp Message-ID: <170473177276.21472.1916188609512155144@smelt2.prg2.suse.org> # Recommended update for ntp Announcement ID: SUSE-RU-2024:0061-1 Rating: moderate References: * bsc#1215801 * bsc#1217127 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has two fixes can now be installed. ## Description: This update for ntp fixes the following issues: * bsc#1215801: Use system-supplied libevent instead of local copy. * bsc#1217127: [EAR - NOT FOR USA Citizens] sntp -d ip crashes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-61=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-61=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-61=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * ntp-4.2.8p17-106.7.1 * ntp-debugsource-4.2.8p17-106.7.1 * ntp-debuginfo-4.2.8p17-106.7.1 * ntp-doc-4.2.8p17-106.7.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * ntp-4.2.8p17-106.7.1 * ntp-debugsource-4.2.8p17-106.7.1 * ntp-debuginfo-4.2.8p17-106.7.1 * ntp-doc-4.2.8p17-106.7.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * ntp-4.2.8p17-106.7.1 * ntp-debugsource-4.2.8p17-106.7.1 * ntp-debuginfo-4.2.8p17-106.7.1 * ntp-doc-4.2.8p17-106.7.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215801 * https://bugzilla.suse.com/show_bug.cgi?id=1217127 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:36:15 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 16:36:15 -0000 Subject: SUSE-RU-2024:0060-1: moderate: Recommended update for transactional-update Message-ID: <170473177512.21472.5569758586491398879@smelt2.prg2.suse.org> # Recommended update for transactional-update Announcement ID: SUSE-RU-2024:0060-1 Rating: moderate References: * bsc#1215878 Affected Products: * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that has one fix can now be installed. ## Description: Version 4.1.6, this update for transactional-update fixes the following issues: * Use permissions of real /etc dir when creating overlay * Add support for configuration file snippets ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-60=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-60=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-60=1 ## Package List: * openSUSE Leap Micro 5.4 (noarch) * transactional-update-zypp-config-4.1.6-150400.3.3.2 * dracut-transactional-update-4.1.6-150400.3.3.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libtukit4-debuginfo-4.1.6-150400.3.3.2 * transactional-update-debuginfo-4.1.6-150400.3.3.2 * transactional-update-debugsource-4.1.6-150400.3.3.2 * tukitd-4.1.6-150400.3.3.2 * tukit-4.1.6-150400.3.3.2 * transactional-update-4.1.6-150400.3.3.2 * libtukit4-4.1.6-150400.3.3.2 * tukit-debuginfo-4.1.6-150400.3.3.2 * tukitd-debuginfo-4.1.6-150400.3.3.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * transactional-update-zypp-config-4.1.6-150400.3.3.2 * dracut-transactional-update-4.1.6-150400.3.3.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libtukit4-debuginfo-4.1.6-150400.3.3.2 * transactional-update-debuginfo-4.1.6-150400.3.3.2 * transactional-update-debugsource-4.1.6-150400.3.3.2 * tukitd-4.1.6-150400.3.3.2 * tukit-4.1.6-150400.3.3.2 * transactional-update-4.1.6-150400.3.3.2 * libtukit4-4.1.6-150400.3.3.2 * tukit-debuginfo-4.1.6-150400.3.3.2 * tukitd-debuginfo-4.1.6-150400.3.3.2 * SUSE Linux Enterprise Micro 5.4 (noarch) * transactional-update-zypp-config-4.1.6-150400.3.3.2 * dracut-transactional-update-4.1.6-150400.3.3.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libtukit4-debuginfo-4.1.6-150400.3.3.2 * transactional-update-debuginfo-4.1.6-150400.3.3.2 * transactional-update-debugsource-4.1.6-150400.3.3.2 * tukitd-4.1.6-150400.3.3.2 * tukit-4.1.6-150400.3.3.2 * transactional-update-4.1.6-150400.3.3.2 * libtukit4-4.1.6-150400.3.3.2 * tukit-debuginfo-4.1.6-150400.3.3.2 * tukitd-debuginfo-4.1.6-150400.3.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215878 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:36:18 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 16:36:18 -0000 Subject: SUSE-SU-2024:0058-1: important: Security update for wireshark Message-ID: <170473177826.21472.5482561169821165269@smelt2.prg2.suse.org> # Security update for wireshark Announcement ID: SUSE-SU-2024:0058-1 Rating: important References: * bsc#1218504 * bsc#1218505 Cross-References: * CVE-2024-0208 * CVE-2024-0209 CVSS scores: * CVE-2024-0208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for wireshark fixes the following issues: * Updated to Wireshark 3.6.20: * CVE-2024-0208: Fixed a crash in the GVCP dissector (bsc#1218504). * CVE-2024-0209: Fixed a crash in the IEEE 1609.2 dissector (bsc#1218505). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-58=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-58=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-58=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-58=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-58=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-58=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-58=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-58=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-58=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-58=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-58=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Manager Proxy 4.3 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE CaaS Platform 4.0 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0208.html * https://www.suse.com/security/cve/CVE-2024-0209.html * https://bugzilla.suse.com/show_bug.cgi?id=1218504 * https://bugzilla.suse.com/show_bug.cgi?id=1218505 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:39:22 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 16:39:22 -0000 Subject: SUSE-SU-2024:0058-1: important: Security update for wireshark Message-ID: <170473196244.21472.10226942903526420364@smelt2.prg2.suse.org> # Security update for wireshark Announcement ID: SUSE-SU-2024:0058-1 Rating: important References: * bsc#1218504 * bsc#1218505 Cross-References: * CVE-2024-0208 * CVE-2024-0209 CVSS scores: * CVE-2024-0208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for wireshark fixes the following issues: * Updated to Wireshark 3.6.20: * CVE-2024-0208: Fixed a crash in the GVCP dissector (bsc#1218504). * CVE-2024-0209: Fixed a crash in the IEEE 1609.2 dissector (bsc#1218505). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-58=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-58=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-58=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-58=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-58=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-58=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-58=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-58=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-58=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-58=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-58=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Manager Proxy 4.3 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE CaaS Platform 4.0 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0208.html * https://www.suse.com/security/cve/CVE-2024-0209.html * https://bugzilla.suse.com/show_bug.cgi?id=1218504 * https://bugzilla.suse.com/show_bug.cgi?id=1218505 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:02 -0000 Subject: SUSE-SU-2024:0058-1: important: Security update for wireshark Message-ID: <170474580292.7941.10461115707239306319@smelt2.prg2.suse.org> # Security update for wireshark Announcement ID: SUSE-SU-2024:0058-1 Rating: important References: * bsc#1218504 * bsc#1218505 Cross-References: * CVE-2024-0208 * CVE-2024-0209 CVSS scores: * CVE-2024-0208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for wireshark fixes the following issues: * Updated to Wireshark 3.6.20: * CVE-2024-0208: Fixed a crash in the GVCP dissector (bsc#1218504). * CVE-2024-0209: Fixed a crash in the IEEE 1609.2 dissector (bsc#1218505). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-58=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-58=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-58=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-58=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-58=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-58=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-58=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-58=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-58=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-58=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-58=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Manager Proxy 4.3 (x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE CaaS Platform 4.0 (x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0208.html * https://www.suse.com/security/cve/CVE-2024-0209.html * https://bugzilla.suse.com/show_bug.cgi?id=1218504 * https://bugzilla.suse.com/show_bug.cgi?id=1218505 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:06 -0000 Subject: SUSE-SU-2024:0057-1: important: Security update for eclipse-jgit, jsch Message-ID: <170474580667.7941.2806253038286097131@smelt2.prg2.suse.org> # Security update for eclipse-jgit, jsch Announcement ID: SUSE-SU-2024:0057-1 Rating: important References: * bsc#1209646 * bsc#1211955 * bsc#1215298 * jsc#PED-6376 * jsc#PED-6377 Cross-References: * CVE-2023-4759 CVSS scores: * CVE-2023-4759 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-4759 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves one vulnerability, contains two features and has two security fixes can now be installed. ## Description: This update for eclipse-jgit, jsch fixes the following issues: Security fix: \- CVE-2023-4759: Fixed an arbitrary file overwrite which might have occurred with a specially crafted git repository and a case-insensitive filesystem. (bsc#1215298) Other fixes: jsch was updated to version 0.2.9: \- Added support for various algorithms \- Migrated from `com.jcraft:jsch` to `com.github.mwiede:jsch` fork (bsc#1211955): * Alias to the old artifact since the new one is drop-in replacement * Keep the old OSGi bundle symbolic name to avoid extensive patching of eclipse stack \- Updated to version 0.2.9: * For the full list of changes please consult the upstream changelogs below for each version updated: \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.9 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.8 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.7 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.6 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.5 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.4 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.3 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.2 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.1 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.0 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.71 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.70 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.69 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.68 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.67 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.66 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.65 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.64 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.63 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.62 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.61 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.60 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.59 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.58 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.57 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.56 eclipse-jgit: * Craft the jgit script from the real Main class of the jar file instead of using a jar launcher (bsc#1209646) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-57=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-57=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2024-57=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-57=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-57=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-57=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-57=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-57=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-57=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-57=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-57=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-57=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-57=1 ## Package List: * openSUSE Leap 15.4 (noarch) * jsch-demo-0.2.9-150200.11.10.1 * jsch-javadoc-0.2.9-150200.11.10.1 * jgit-javadoc-5.11.0-150200.3.15.2 * eclipse-jgit-5.11.0-150200.3.15.2 * jgit-5.11.0-150200.3.15.2 * jsch-0.2.9-150200.11.10.1 * openSUSE Leap 15.5 (noarch) * eclipse-jgit-5.11.0-150200.3.15.2 * jsch-demo-0.2.9-150200.11.10.1 * jsch-javadoc-0.2.9-150200.11.10.1 * jsch-0.2.9-150200.11.10.1 * Development Tools Module 15-SP4 (noarch) * jsch-0.2.9-150200.11.10.1 * Development Tools Module 15-SP5 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Manager Server 4.3 Module 4.3 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Enterprise Storage 7.1 (noarch) * jsch-0.2.9-150200.11.10.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4759.html * https://bugzilla.suse.com/show_bug.cgi?id=1209646 * https://bugzilla.suse.com/show_bug.cgi?id=1211955 * https://bugzilla.suse.com/show_bug.cgi?id=1215298 * https://jira.suse.com/browse/PED-6376 * https://jira.suse.com/browse/PED-6377 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:08 -0000 Subject: SUSE-SU-2024:0056-1: low: Security update for helm3 Message-ID: <170474580880.7941.3735732692844508911@smelt2.prg2.suse.org> # Security update for helm3 Announcement ID: SUSE-SU-2024:0056-1 Rating: low References: * bsc#1206471 Cross-References: * CVE-2022-23526 CVSS scores: * CVE-2022-23526 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-23526 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE CaaS Platform 4.0 * SUSE Linux Enterprise Server 15 SP1 An update that solves one vulnerability can now be installed. ## Description: This update for helm3 fixes the following issues: * CVE-2022-23526: Fixed Denial of service through schema file (bsc#1206471). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE CaaS Platform 4.0 (x86_64) * helm3-3.3.3-150100.1.15.1 ## References: * https://www.suse.com/security/cve/CVE-2022-23526.html * https://bugzilla.suse.com/show_bug.cgi?id=1206471 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:11 -0000 Subject: SUSE-RU-2024:0053-1: moderate: Recommended update for python-kiwi Message-ID: <170474581130.7941.7935235852330566654@smelt2.prg2.suse.org> # Recommended update for python-kiwi Announcement ID: SUSE-RU-2024:0053-1 Rating: moderate References: * bsc#1216465 Affected Products: * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for python-kiwi fixes the following issues: * Add `partx` to module-setup of kiwi-lib (bsc#1216465) * Change partprobe fallback to partx (bsc#1216465): Informing the kernel about a new partition geometry can be done in a busy state and is also effective for new devices and new mounts based on the new geometry. busy state mounts of course will not see it until swap of the busy state but a complete refuse of operation like it happens with blockdev is imho not required. Just as partprobe, partx is less restrictive on the busy state. That's why this commit changes the partprobe fallback to use partx instead of blockdev * Create live persistent storage without busy state (bsc#1216465): With the former logic the live ISO was already mounted when an eventual persistent storage partition was created. This leads to an issue on re-reading the partition table, not for all but several tools. This commit changes the order of tasks such that the setup of the persistent write storage is performed prior mounting the live ISO. In addition to this change an alternative method using blockdev to re-read the partition was added in case partprobe is not present. This also allows to get rid of the parted dependency which provides partprobe * Add alternative re-reading of the partition table (bsc#1216465): ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-53=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-53=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-53=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-53=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-53=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-53=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-53=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-53=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-53=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2024-53=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-53=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-53=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-53=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-53=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * kiwi-tools-9.24.43-150100.3.65.1 * kiwi-man-pages-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * kiwi-systemdeps-bootloaders-9.24.43-150100.3.65.1 * kiwi-tools-debuginfo-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * kiwi-systemdeps-disk-images-9.24.43-150100.3.65.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python3-kiwi-9.24.43-150100.3.65.1 * kiwi-systemdeps-9.24.43-150100.3.65.1 * kiwi-systemdeps-iso-media-9.24.43-150100.3.65.1 * kiwi-systemdeps-image-validation-9.24.43-150100.3.65.1 * kiwi-systemdeps-filesystems-9.24.43-150100.3.65.1 * kiwi-systemdeps-containers-9.24.43-150100.3.65.1 * dracut-kiwi-overlay-9.24.43-150100.3.65.1 * kiwi-systemdeps-core-9.24.43-150100.3.65.1 * dracut-kiwi-live-9.24.43-150100.3.65.1 * openSUSE Leap 15.4 (x86_64) * kiwi-pxeboot-9.24.43-150100.3.65.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * kiwi-tools-9.24.43-150100.3.65.1 * kiwi-man-pages-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * kiwi-systemdeps-bootloaders-9.24.43-150100.3.65.1 * kiwi-tools-debuginfo-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * kiwi-systemdeps-disk-images-9.24.43-150100.3.65.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python3-kiwi-9.24.43-150100.3.65.1 * kiwi-systemdeps-9.24.43-150100.3.65.1 * kiwi-systemdeps-iso-media-9.24.43-150100.3.65.1 * kiwi-systemdeps-image-validation-9.24.43-150100.3.65.1 * kiwi-systemdeps-filesystems-9.24.43-150100.3.65.1 * kiwi-systemdeps-containers-9.24.43-150100.3.65.1 * dracut-kiwi-overlay-9.24.43-150100.3.65.1 * kiwi-systemdeps-core-9.24.43-150100.3.65.1 * dracut-kiwi-live-9.24.43-150100.3.65.1 * openSUSE Leap 15.5 (x86_64) * kiwi-pxeboot-9.24.43-150100.3.65.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * Development Tools Module 15-SP4 (aarch64 ppc64le s390x x86_64) * kiwi-tools-9.24.43-150100.3.65.1 * kiwi-man-pages-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * kiwi-systemdeps-bootloaders-9.24.43-150100.3.65.1 * kiwi-tools-debuginfo-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * kiwi-systemdeps-disk-images-9.24.43-150100.3.65.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python3-kiwi-9.24.43-150100.3.65.1 * kiwi-systemdeps-9.24.43-150100.3.65.1 * kiwi-systemdeps-iso-media-9.24.43-150100.3.65.1 * kiwi-systemdeps-image-validation-9.24.43-150100.3.65.1 * kiwi-systemdeps-filesystems-9.24.43-150100.3.65.1 * kiwi-systemdeps-containers-9.24.43-150100.3.65.1 * dracut-kiwi-overlay-9.24.43-150100.3.65.1 * kiwi-systemdeps-core-9.24.43-150100.3.65.1 * dracut-kiwi-live-9.24.43-150100.3.65.1 * Development Tools Module 15-SP4 (x86_64) * kiwi-pxeboot-9.24.43-150100.3.65.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kiwi-tools-9.24.43-150100.3.65.1 * kiwi-man-pages-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * kiwi-systemdeps-bootloaders-9.24.43-150100.3.65.1 * kiwi-tools-debuginfo-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * kiwi-systemdeps-disk-images-9.24.43-150100.3.65.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python3-kiwi-9.24.43-150100.3.65.1 * kiwi-systemdeps-9.24.43-150100.3.65.1 * kiwi-systemdeps-iso-media-9.24.43-150100.3.65.1 * kiwi-systemdeps-image-validation-9.24.43-150100.3.65.1 * kiwi-systemdeps-filesystems-9.24.43-150100.3.65.1 * kiwi-systemdeps-containers-9.24.43-150100.3.65.1 * dracut-kiwi-overlay-9.24.43-150100.3.65.1 * kiwi-systemdeps-core-9.24.43-150100.3.65.1 * dracut-kiwi-live-9.24.43-150100.3.65.1 * Development Tools Module 15-SP5 (x86_64) * kiwi-pxeboot-9.24.43-150100.3.65.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * python-kiwi-debugsource-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * dracut-kiwi-oem-dump-9.24.43-150100.3.65.1 * python-kiwi-debugsource-9.24.43-150100.3.65.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.65.1 * dracut-kiwi-lib-9.24.43-150100.3.65.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1216465 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:09 -0000 Subject: SUSE-RU-2024:0054-1: important: Recommended update for NetworkManager Message-ID: <170474580958.7941.8234460565547737709@smelt2.prg2.suse.org> # Recommended update for NetworkManager Announcement ID: SUSE-RU-2024:0054-1 Rating: important References: * bsc#1218248 Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that has one fix can now be installed. ## Description: This recommended update for NetworkManager fixes the following issues: * No-change rebuild to include NetworkManager-wwan in the SLE-Module-Desktop- Applications_15-SP5 channels (bsc#1218248) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-54=1 openSUSE-SLE-15.5-2024-54=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-54=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-54=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-54=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-54=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * NetworkManager-debugsource-1.38.6-150500.3.2.1 * NetworkManager-bluetooth-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-1.38.6-150500.3.2.1 * NetworkManager-ovs-1.38.6-150500.3.2.1 * NetworkManager-ovs-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-wwan-1.38.6-150500.3.2.1 * NetworkManager-pppoe-debuginfo-1.38.6-150500.3.2.1 * typelib-1_0-NM-1_0-1.38.6-150500.3.2.1 * NetworkManager-bluetooth-1.38.6-150500.3.2.1 * NetworkManager-tui-1.38.6-150500.3.2.1 * NetworkManager-tui-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-wwan-debuginfo-1.38.6-150500.3.2.1 * libnm0-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-cloud-setup-1.38.6-150500.3.2.1 * NetworkManager-cloud-setup-debuginfo-1.38.6-150500.3.2.1 * libnm0-1.38.6-150500.3.2.1 * NetworkManager-devel-1.38.6-150500.3.2.1 * NetworkManager-pppoe-1.38.6-150500.3.2.1 * NetworkManager-debuginfo-1.38.6-150500.3.2.1 * openSUSE Leap 15.5 (noarch) * NetworkManager-branding-upstream-1.38.6-150500.3.2.1 * NetworkManager-lang-1.38.6-150500.3.2.1 * openSUSE Leap 15.5 (x86_64) * libnm0-32bit-1.38.6-150500.3.2.1 * NetworkManager-devel-32bit-1.38.6-150500.3.2.1 * libnm0-32bit-debuginfo-1.38.6-150500.3.2.1 * openSUSE Leap 15.5 (aarch64_ilp32) * NetworkManager-devel-64bit-1.38.6-150500.3.2.1 * libnm0-64bit-1.38.6-150500.3.2.1 * libnm0-64bit-debuginfo-1.38.6-150500.3.2.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * NetworkManager-debugsource-1.38.6-150500.3.2.1 * NetworkManager-bluetooth-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-1.38.6-150500.3.2.1 * NetworkManager-wwan-1.38.6-150500.3.2.1 * NetworkManager-pppoe-debuginfo-1.38.6-150500.3.2.1 * typelib-1_0-NM-1_0-1.38.6-150500.3.2.1 * NetworkManager-bluetooth-1.38.6-150500.3.2.1 * NetworkManager-tui-1.38.6-150500.3.2.1 * NetworkManager-tui-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-wwan-debuginfo-1.38.6-150500.3.2.1 * libnm0-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-cloud-setup-1.38.6-150500.3.2.1 * NetworkManager-cloud-setup-debuginfo-1.38.6-150500.3.2.1 * libnm0-1.38.6-150500.3.2.1 * NetworkManager-pppoe-1.38.6-150500.3.2.1 * NetworkManager-debuginfo-1.38.6-150500.3.2.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * NetworkManager-debugsource-1.38.6-150500.3.2.1 * typelib-1_0-NM-1_0-1.38.6-150500.3.2.1 * libnm0-debuginfo-1.38.6-150500.3.2.1 * libnm0-1.38.6-150500.3.2.1 * NetworkManager-debuginfo-1.38.6-150500.3.2.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * NetworkManager-debugsource-1.38.6-150500.3.2.1 * NetworkManager-1.38.6-150500.3.2.1 * NetworkManager-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-wwan-1.38.6-150500.3.2.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * NetworkManager-debugsource-1.38.6-150500.3.2.1 * NetworkManager-bluetooth-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-wwan-1.38.6-150500.3.2.1 * NetworkManager-pppoe-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-bluetooth-1.38.6-150500.3.2.1 * NetworkManager-tui-1.38.6-150500.3.2.1 * NetworkManager-tui-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-wwan-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-cloud-setup-1.38.6-150500.3.2.1 * NetworkManager-cloud-setup-debuginfo-1.38.6-150500.3.2.1 * NetworkManager-devel-1.38.6-150500.3.2.1 * NetworkManager-pppoe-1.38.6-150500.3.2.1 * NetworkManager-debuginfo-1.38.6-150500.3.2.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (noarch) * NetworkManager-lang-1.38.6-150500.3.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218248 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:12 -0000 Subject: SUSE-RU-2024:0052-1: moderate: Recommended update for open-vmdk Message-ID: <170474581265.7941.1240474281789518399@smelt2.prg2.suse.org> # Recommended update for open-vmdk Announcement ID: SUSE-RU-2024:0052-1 Rating: moderate References: * jsc#PED-6660 * jsc#PED-6661 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains two features can now be installed. ## Description: This update for open-vmdk fixes the following issues: * Updated to version 0.3.1.0 (jsc#PED-6660, jsc#PED-6661): * Create $(DESTDIR)/etc/ if it does not exist * Documented `configuration` in the README. * Added OVF configurations * Updated README.md * Added `-m/--manifest` option to create manifest with OVF * Support empty disks * Document ova-compose, declare mkova.sh legacy * install /etc/open-vmdk.conf ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-52=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-52=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * open-vmdk-debugsource-0.3.1.0-150500.11.3.1 * open-vmdk-0.3.1.0-150500.11.3.1 * open-vmdk-debuginfo-0.3.1.0-150500.11.3.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * open-vmdk-debugsource-0.3.1.0-150500.11.3.1 * open-vmdk-0.3.1.0-150500.11.3.1 * open-vmdk-debuginfo-0.3.1.0-150500.11.3.1 ## References: * https://jira.suse.com/browse/PED-6660 * https://jira.suse.com/browse/PED-6661 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:14 -0000 Subject: SUSE-RU-2024:0051-1: moderate: Recommended update for python-instance-billing-flavor-check Message-ID: <170474581410.7941.10981539415546253546@smelt2.prg2.suse.org> # Recommended update for python-instance-billing-flavor-check Announcement ID: SUSE-RU-2024:0051-1 Rating: moderate References: * bsc#1217695 * bsc#1217696 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has two fixes can now be installed. ## Description: This update for python-instance-billing-flavor-check fixes the following issues: * Run the command as sudo only (bsc#1217696, bsc#1217695) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2024-51=1 ## Package List: * Public Cloud Module 12 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.0.4-1.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217695 * https://bugzilla.suse.com/show_bug.cgi?id=1217696 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:15 -0000 Subject: SUSE-RU-2024:0050-1: moderate: Recommended update for python-instance-billing-flavor-check Message-ID: <170474581555.7941.8212645998371858583@smelt2.prg2.suse.org> # Recommended update for python-instance-billing-flavor-check Announcement ID: SUSE-RU-2024:0050-1 Rating: moderate References: * bsc#1217695 * bsc#1217696 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for python-instance-billing-flavor-check fixes the following issues: * Run the command as sudo only (bsc#1217696, bsc#1217695) * Handle exception for Python 3.4 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-50=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-50=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-50=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-50=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-50=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-50=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-50=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-50=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-50=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-50=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-50=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-50=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-50=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-50=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-50=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-50=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * python3-lxml-4.7.1-150200.3.12.1 * python3-lxml-debuginfo-4.7.1-150200.3.12.1 * python-lxml-debuginfo-4.7.1-150200.3.12.1 * python-lxml-debugsource-4.7.1-150200.3.12.1 * openSUSE Leap Micro 5.3 (noarch) * python3-cssselect-1.0.3-150000.3.5.1 * openSUSE Leap Micro 5.4 (aarch64 x86_64) * python3-lxml-4.7.1-150200.3.12.1 * python3-lxml-debuginfo-4.7.1-150200.3.12.1 * python-lxml-debuginfo-4.7.1-150200.3.12.1 * python-lxml-debugsource-4.7.1-150200.3.12.1 * openSUSE Leap Micro 5.4 (noarch) * python3-cssselect-1.0.3-150000.3.5.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * python3-lxml-4.7.1-150200.3.12.1 * python-lxml-debugsource-4.7.1-150200.3.12.1 * python3-lxml-devel-4.7.1-150200.3.12.1 * python3-lxml-debuginfo-4.7.1-150200.3.12.1 * python-lxml-debuginfo-4.7.1-150200.3.12.1 * openSUSE Leap 15.4 (noarch) * python3-cssselect-1.0.3-150000.3.5.1 * python3-lxml-doc-4.7.1-150200.3.12.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-lxml-debuginfo-4.7.1-150200.3.12.1 * python-lxml-debugsource-4.7.1-150200.3.12.1 * openSUSE Leap 15.5 (noarch) * python3-cssselect-1.0.3-150000.3.5.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python3-lxml-4.7.1-150200.3.12.1 * python3-lxml-debuginfo-4.7.1-150200.3.12.1 * python-instance-billing-flavor-check-0.0.4-150000.1.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * python-lxml-debuginfo-4.7.1-150200.3.12.1 * python-lxml-debugsource-4.7.1-150200.3.12.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * python3-cssselect-1.0.3-150000.3.5.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python3-lxml-4.7.1-150200.3.12.1 * python3-lxml-debuginfo-4.7.1-150200.3.12.1 * python-instance-billing-flavor-check-0.0.4-150000.1.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * python-lxml-debuginfo-4.7.1-150200.3.12.1 * python-lxml-debugsource-4.7.1-150200.3.12.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * python3-cssselect-1.0.3-150000.3.5.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python3-lxml-4.7.1-150200.3.12.1 * python3-lxml-debuginfo-4.7.1-150200.3.12.1 * python-instance-billing-flavor-check-0.0.4-150000.1.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * python-lxml-debuginfo-4.7.1-150200.3.12.1 * python-lxml-debugsource-4.7.1-150200.3.12.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * python3-cssselect-1.0.3-150000.3.5.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python3-lxml-4.7.1-150200.3.12.1 * python3-lxml-debuginfo-4.7.1-150200.3.12.1 * python-instance-billing-flavor-check-0.0.4-150000.1.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * python-lxml-debuginfo-4.7.1-150200.3.12.1 * python-lxml-debugsource-4.7.1-150200.3.12.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * python3-cssselect-1.0.3-150000.3.5.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * python3-cssselect-1.0.3-150000.3.5.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python3-lxml-4.7.1-150200.3.12.1 * python-lxml-debugsource-4.7.1-150200.3.12.1 * python3-lxml-devel-4.7.1-150200.3.12.1 * python3-lxml-debuginfo-4.7.1-150200.3.12.1 * python-lxml-debuginfo-4.7.1-150200.3.12.1 * Basesystem Module 15-SP4 (noarch) * python3-cssselect-1.0.3-150000.3.5.1 * Basesystem Module 15-SP5 (noarch) * python3-cssselect-1.0.3-150000.3.5.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.0.4-150000.1.6.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.0.4-150000.1.6.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.0.4-150000.1.6.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.0.4-150000.1.6.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.0.4-150000.1.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217695 * https://bugzilla.suse.com/show_bug.cgi?id=1217696 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:16 -0000 Subject: SUSE-RU-2024:0049-1: moderate: Recommended update for modello Message-ID: <170474581686.7941.6952122828386279007@smelt2.prg2.suse.org> # Recommended update for modello Announcement ID: SUSE-RU-2024:0049-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 An update that can now be installed. ## Description: This update for modello fixes the following issues: * modello was updated to version 2.1.2: * Changes of version 2.1.2: * Switch to codehaus plexus-build-api 1.2.0 (reverted by a patch in this package) * Add plexus 13 parent and reformat * Remove readonly flag from basedir: support .mdo from any location * Require Maven 3.5.4+ * Prepare to run with Java 19+ * Changes of version 2.1.1: * replace generatedBy context value by template * add velocityBasedir to select where to load (shared) .vm from * Changes of version 2.1.0: * Make the Xpp3Reader#read(XmlPullParser, boolean strict) public * Fix json encoding * Support arbitrary element names via 'xs:any' * Call setter only after object has been populated * replace handwritten components.xml with annotations * Optionally enforce required elements in XSDs * Add a velocity template based generator * Use optimised plexus-utils CachingWriter * Use the version of `plexus-build-api` that we have packaged * Cleanup unnecessary dependencies ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-49=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-49=1 ## Package List: * openSUSE Leap 15.4 (noarch) * modello-maven-plugin-javadoc-2.1.2-150200.3.7.1 * modello-2.1.2-150200.3.7.1 * modello-maven-plugin-2.1.2-150200.3.7.1 * modello-javadoc-2.1.2-150200.3.7.1 * openSUSE Leap 15.5 (noarch) * modello-maven-plugin-javadoc-2.1.2-150200.3.7.1 * modello-2.1.2-150200.3.7.1 * modello-maven-plugin-2.1.2-150200.3.7.1 * modello-javadoc-2.1.2-150200.3.7.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:18 -0000 Subject: SUSE-RU-2024:0048-1: moderate: Recommended update for patterns-sap Message-ID: <170474581837.7941.7082816053193266524@smelt2.prg2.suse.org> # Recommended update for patterns-sap Announcement ID: SUSE-RU-2024:0048-1 Rating: moderate References: * bsc#1216824 Affected Products: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for patterns-sap fixes the following issues: * Remove deprecated Java requirements as SAP delivers its own Java (bsc#1216824) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SAP-12-SP5-2024-48=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * patterns-sap-b1-12.3-6.20.1 * patterns-sap-nw-12.3-6.20.1 * patterns-sap-hana-12.3-6.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1216824 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:20 -0000 Subject: SUSE-RU-2024:0047-1: moderate: Recommended update for oracleasm Message-ID: <170474582020.7941.2123523792287730271@smelt2.prg2.suse.org> # Recommended update for oracleasm Announcement ID: SUSE-RU-2024:0047-1 Rating: moderate References: * bsc#1215781 Affected Products: * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Real Time Module 15-SP5 An update that has one fix can now be installed. ## Description: This update for oracleasm fixes the following issues: * Fix block-level errors in KMP, such as reversed arguments to `bio_kmalloc()` and other issues (bsc#1215781) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-47=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-47=1 openSUSE-SLE-15.5-2024-47=1 * SUSE Real Time Module 15-SP5 zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-47=1 ## Package List: * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * oracleasm-kmp-default-debuginfo-2.0.8_k5.14.21_150500.55.36-150500.7.3.1 * oracleasm-kmp-default-2.0.8_k5.14.21_150500.55.36-150500.7.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * oracleasm-kmp-default-debuginfo-2.0.8_k5.14.21_150500.55.36-150500.7.3.1 * oracleasm-kmp-default-2.0.8_k5.14.21_150500.55.36-150500.7.3.1 * oracleasm-debugsource-2.0.8-150500.7.3.1 * openSUSE Leap 15.5 (x86_64) * oracleasm-kmp-rt-2.0.8_k5.14.21_150500.13.24-150500.7.3.1 * oracleasm-kmp-rt-debuginfo-2.0.8_k5.14.21_150500.13.24-150500.7.3.1 * openSUSE Leap 15.5 (aarch64) * oracleasm-kmp-64kb-debuginfo-2.0.8_k5.14.21_150500.55.36-150500.7.3.1 * oracleasm-kmp-64kb-2.0.8_k5.14.21_150500.55.36-150500.7.3.1 * SUSE Real Time Module 15-SP5 (x86_64) * oracleasm-kmp-rt-2.0.8_k5.14.21_150500.13.24-150500.7.3.1 * oracleasm-kmp-rt-debuginfo-2.0.8_k5.14.21_150500.13.24-150500.7.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215781 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:22 -0000 Subject: SUSE-RU-2024:0046-1: moderate: Recommended update for suma-azure-adapter-config-llc and suma-azure-adapter-config-ltd Message-ID: <170474582248.7941.6601712905289910869@smelt2.prg2.suse.org> # Recommended update for suma-azure-adapter-config-llc and suma-azure-adapter- config-ltd Announcement ID: SUSE-RU-2024:0046-1 Rating: moderate References: * bsc#1217699 * bsc#1217700 * jsc#PED-6427 * jsc#PED-6428 Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains two features and has two fixes can now be installed. ## Description: This update for suma-azure-adapter-config-llc and suma-azure-adapter-config-ltd fixes the following issues: suma-azure-adapter-config-llc: * Updated to version 20231031 (bsc#1217699, jsc#PED-6427, jsc#PED-6428): * Use PAYG for product plan * Added preview in the product code suma-azure-adapter-config-ltd: * New package implementation at version 20231120 (bsc#1217700, jsc#PED-6427, jsc#PED-6428) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-46=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-46=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-46=1 ## Package List: * openSUSE Leap 15.4 (noarch) * suma-azure-adapter-config-llc-20231031-150400.9.6.1 * suma-azure-adapter-config-ltd-20231120-150400.9.3.1 * Public Cloud Module 15-SP4 (noarch) * suma-azure-adapter-config-llc-20231031-150400.9.6.1 * suma-azure-adapter-config-ltd-20231120-150400.9.3.1 * Public Cloud Module 15-SP5 (noarch) * suma-azure-adapter-config-llc-20231031-150400.9.6.1 * suma-azure-adapter-config-ltd-20231120-150400.9.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217699 * https://bugzilla.suse.com/show_bug.cgi?id=1217700 * https://jira.suse.com/browse/PED-6427 * https://jira.suse.com/browse/PED-6428 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:27 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:27 -0000 Subject: SUSE-SU-2024:0045-1: important: Security update for gcc13 Message-ID: <170474582754.7941.427090063111440343@smelt2.prg2.suse.org> # Security update for gcc13 Announcement ID: SUSE-SU-2024:0045-1 Rating: important References: * bsc#1206480 * bsc#1206684 * bsc#1210557 * bsc#1211427 * bsc#1212101 * bsc#1213915 * bsc#1214052 * bsc#1214460 * bsc#1215427 * bsc#1216664 * jsc#PED-153 * jsc#PED-2005 * jsc#PED-252 * jsc#PED-253 * jsc#PED-6584 Cross-References: * CVE-2023-4039 CVSS scores: * CVE-2023-4039 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4039 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves one vulnerability, contains five features and has nine security fixes can now be installed. ## Description: This update for gcc13 fixes the following issues: This update ship the GCC 13.2 compiler suite and its base libraries. The compiler base libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 12 ones. The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP4 and SP5, and provided in the "Development Tools" module. The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories. To use gcc13 compilers use: * install "gcc13" or "gcc13-c++" or one of the other "gcc13-COMPILER" frontend packages. * override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides for the other languages. For a full changelog with all new GCC13 features, check out https://gcc.gnu.org/gcc-13/changes.html Detailed changes: * CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable length stack allocations. (bsc#1214052) * Work around third party app crash during C++ standard library initialization. [bsc#1216664] * Fixed that GCC13 fails to compile some packages with error: unrecognizable insn (bsc#1215427) * Bump included newlib to version 4.3.0. * Update to GCC trunk head (r13-5254-g05b9868b182bb9) * Redo floatn fixinclude pick-up to simply keep what is there. * Turn cross compiler to s390x to a glibc cross. [bsc#1214460] * Also handle -static-pie in the default-PIE specs * Fixed missed optimization in Skia resulting in Firefox crashes when building with LTO. [bsc#1212101] * Make libstdc++6-devel packages own their directories since they can be installed standalone. [bsc#1211427] * Add new x86-related intrinsics (amxcomplexintrin.h). * RISC-V: Add support for inlining subword atomic operations * Use --enable-link-serialization rather that --enable-link-mutex, the benefit of the former one is that the linker jobs are not holding tokens of the make's jobserver. * Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd for the general state of BPF with GCC. * Add bootstrap conditional to allow --without=bootstrap to be specified to speed up local builds for testing. * Bump included newlib to version 4.3.0. * Also package libhwasan_preinit.o on aarch64. * Configure external timezone database provided by the timezone package. Make libstdc++6 recommend timezone to get a fully working std::chrono. Install timezone when running the testsuite. * Package libhwasan_preinit.o on x86_64. * Fixed unwinding on aarch64 with pointer signing. [bsc#1206684] * Enable PRU flavour for gcc13 * update floatn fixinclude pickup to check each header separately (bsc#1206480) * Redo floatn fixinclude pick-up to simply keep what is there. * Bump libgo SONAME to libgo22. * Do not package libhwasan for biarch (32-bit architecture) as the extension depends on 64-bit pointers. * Adjust floatn fixincludes guard to work with SLE12 and earlier SLE15. * Depend on at least LLVM 13 for GCN cross compiler. * Update embedded newlib to version 4.2.0 * Allow cross-pru-gcc12-bootstrap for armv7l architecture. PRU architecture is used for real-time MCUs embedded into TI armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for armv7l in order to build both host applications and PRU firmware during the same build. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-45=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-45=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-45=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-45=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-45=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4039.html * https://bugzilla.suse.com/show_bug.cgi?id=1206480 * https://bugzilla.suse.com/show_bug.cgi?id=1206684 * https://bugzilla.suse.com/show_bug.cgi?id=1210557 * https://bugzilla.suse.com/show_bug.cgi?id=1211427 * https://bugzilla.suse.com/show_bug.cgi?id=1212101 * https://bugzilla.suse.com/show_bug.cgi?id=1213915 * https://bugzilla.suse.com/show_bug.cgi?id=1214052 * https://bugzilla.suse.com/show_bug.cgi?id=1214460 * https://bugzilla.suse.com/show_bug.cgi?id=1215427 * https://bugzilla.suse.com/show_bug.cgi?id=1216664 * https://jira.suse.com/browse/PED-153 * https://jira.suse.com/browse/PED-2005 * https://jira.suse.com/browse/PED-252 * https://jira.suse.com/browse/PED-253 * https://jira.suse.com/browse/PED-6584 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:29 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 08 Jan 2024 20:30:29 -0000 Subject: SUSE-SU-2024:0044-1: important: Security update for MozillaThunderbird Message-ID: <170474582929.7941.15212170195645741974@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2024:0044-1 Rating: important References: * bsc#1217974 Cross-References: * CVE-2023-50761 * CVE-2023-50762 * CVE-2023-6856 * CVE-2023-6857 * CVE-2023-6858 * CVE-2023-6859 * CVE-2023-6860 * CVE-2023-6861 * CVE-2023-6862 * CVE-2023-6863 * CVE-2023-6864 CVSS scores: * CVE-2023-50761 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2023-50762 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2023-6856 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6857 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2023-6858 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6859 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6860 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2023-6861 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6862 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6863 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6864 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves 11 vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: Firefox Extended Support Release 115.6.0 ESR (bsc#1217974): * CVE-2023-6856: Heap-buffer-overflow affecting WebGL DrawElementsInstanced method with Mesa VM driver (bmo#1843782). * CVE-2023-6857: Symlinks may resolve to smaller than expected buffers (bmo#1796023). * CVE-2023-6858: Heap buffer overflow in nsTextFragment (bmo#1826791). * CVE-2023-6859: Use-after-free in PR_GetIdentitiesLayer (bmo#1840144). * CVE-2023-6860: Potential sandbox escape due to VideoBridge lack of texture validation (bmo#1854669). * CVE-2023-6861: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode (bmo#1864118). * CVE-2023-6862: Use-after-free in nsDNSService (bsc#1868042). * CVE-2023-6863: Undefined behavior in ShutdownObserver() (bmo#1868901). * CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. * CVE-2023-50762: Truncated signed text was shown with a valid OpenPGP signature (bmo#1862625). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-44=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-44=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-44=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-44=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-debuginfo-115.6.0-150200.8.142.2 * MozillaThunderbird-debugsource-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-other-115.6.0-150200.8.142.2 * MozillaThunderbird-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-common-115.6.0-150200.8.142.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * MozillaThunderbird-debuginfo-115.6.0-150200.8.142.2 * MozillaThunderbird-debugsource-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-other-115.6.0-150200.8.142.2 * MozillaThunderbird-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-common-115.6.0-150200.8.142.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * MozillaThunderbird-debuginfo-115.6.0-150200.8.142.2 * MozillaThunderbird-debugsource-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-other-115.6.0-150200.8.142.2 * MozillaThunderbird-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-common-115.6.0-150200.8.142.2 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * MozillaThunderbird-debuginfo-115.6.0-150200.8.142.2 * MozillaThunderbird-debugsource-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-other-115.6.0-150200.8.142.2 * MozillaThunderbird-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-common-115.6.0-150200.8.142.2 ## References: * https://www.suse.com/security/cve/CVE-2023-50761.html * https://www.suse.com/security/cve/CVE-2023-50762.html * https://www.suse.com/security/cve/CVE-2023-6856.html * https://www.suse.com/security/cve/CVE-2023-6857.html * https://www.suse.com/security/cve/CVE-2023-6858.html * https://www.suse.com/security/cve/CVE-2023-6859.html * https://www.suse.com/security/cve/CVE-2023-6860.html * https://www.suse.com/security/cve/CVE-2023-6861.html * https://www.suse.com/security/cve/CVE-2023-6862.html * https://www.suse.com/security/cve/CVE-2023-6863.html * https://www.suse.com/security/cve/CVE-2023-6864.html * https://bugzilla.suse.com/show_bug.cgi?id=1217974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Tue Jan 9 08:03:48 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 9 Jan 2024 09:03:48 +0100 (CET) Subject: SUSE-CU-2024:75-1: Recommended update of suse/rmt-server Message-ID: <20240109080348.54A10FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-server ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:75-1 Container Tags : suse/rmt-server:2.14 , suse/rmt-server:2.14-12.3 , suse/rmt-server:latest Container Release : 12.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/rmt-server was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From null at suse.de Tue Jan 9 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 09 Jan 2024 12:30:03 -0000 Subject: SUSE-RU-2024:0066-1: moderate: Recommended update for supportutils Message-ID: <170480340344.28903.6265285069908848330@smelt2.prg2.suse.org> # Recommended update for supportutils Announcement ID: SUSE-RU-2024:0066-1 Rating: moderate References: * bsc#1183663 * bsc#1196293 * bsc#1213127 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has three fixes can now be installed. ## Description: This update for supportutils fixes the following issues: * Optimize lsof usage (bsc#1183663) * Collect ntp or chrony as needed (bsc#1196293) * Add email.txt based on OPTION_EMAIL * Add run time detection (bsc#1213127) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-66=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-66=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-66=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * supportutils-3.0.12-95.57.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * supportutils-3.0.12-95.57.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * supportutils-3.0.12-95.57.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1183663 * https://bugzilla.suse.com/show_bug.cgi?id=1196293 * https://bugzilla.suse.com/show_bug.cgi?id=1213127 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 9 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 09 Jan 2024 12:30:04 -0000 Subject: SUSE-RU-2024:0065-1: moderate: Recommended update for skelcd-control-leanos Message-ID: <170480340492.28903.6296987940096103260@smelt2.prg2.suse.org> # Recommended update for skelcd-control-leanos Announcement ID: SUSE-RU-2024:0065-1 Rating: moderate References: * bsc#1216615 Affected Products: * openSUSE Leap 15.5 An update that has one fix can now be installed. ## Description: This update for skelcd-control-leanos fixes the following issues: * Add the security proposal to the autoyast overview and change the security policy proposal order in order to be run before the software proposal (bsc#1216615) * Upgrade to 15.5.7 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-65=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * skelcd-control-leanos-15.5.7-150500.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1216615 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 9 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 09 Jan 2024 16:30:04 -0000 Subject: SUSE-RU-2024:0069-1: moderate: Recommended update for SAPHanaSR Message-ID: <170481780406.24204.1625709137777405860@smelt2.prg2.suse.org> # Recommended update for SAPHanaSR Announcement ID: SUSE-RU-2024:0069-1 Rating: moderate References: * bsc#1210728 * bsc#1214613 * bsc#1215693 * bsc#1216484 * jsc#PED-1739 * jsc#PED-2608 Affected Products: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that contains two features and has four fixes can now be installed. ## Description: This update for SAPHanaSR fixes the following issues: * Version bump to 0.162.2 * Inside 'SAPHanaSR-hookHelper' use the full path for the 'cibadmin' command to support non root users in special user environments. (bsc#1216484) * If the 'SAPHanaSR.py' hook has successfully reported a SR event to the cluster a still existing fall-back state file will be removed to prevent an override of an already reported SR state. (bsc#1215693) * Improve supportability by providing the current process ID of the RA, which is logged in the RA outputs, to HANA tracefiles too. This allows a mapping of the SAP related command invocations from the RA and the HANA executions which might have a delay in between. (bsc#1214613) * Avoid explicit and implicit usage of '/tmp' filesystem to keep the 'SAPHanaSR' resource agents working even in situations with '/tmp' filesystem full. (bsc#1210728) * update man pages * add improvements from SAP to the RA scripts, part II (jsc#PED-1739, jsc#PED-2608) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SAP-12-SP5-2024-69=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * SAPHanaSR-0.162.2-3.32.2 * SAPHanaSR-doc-0.162.2-3.32.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1210728 * https://bugzilla.suse.com/show_bug.cgi?id=1214613 * https://bugzilla.suse.com/show_bug.cgi?id=1215693 * https://bugzilla.suse.com/show_bug.cgi?id=1216484 * https://jira.suse.com/browse/PED-1739 * https://jira.suse.com/browse/PED-2608 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 9 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 09 Jan 2024 16:30:05 -0000 Subject: SUSE-RU-2024:0068-1: moderate: Recommended update for rsyslog Message-ID: <170481780553.24204.4105688633800464046@smelt2.prg2.suse.org> # Recommended update for rsyslog Announcement ID: SUSE-RU-2024:0068-1 Rating: moderate References: * bsc#1217292 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for rsyslog fixes the following issues: * Restart daemon after modules packages have been updated (bsc#1217292) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-68=1 openSUSE-SLE-15.4-2024-68=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-68=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-68=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-68=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-68=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-68=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-68=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-68=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-68=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-68=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-68=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-68=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-68=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-8.2306.0-150400.5.24.1 * rsyslog-module-dbi-8.2306.0-150400.5.24.1 * rsyslog-module-gcrypt-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-8.2306.0-150400.5.24.1 * rsyslog-diag-tools-8.2306.0-150400.5.24.1 * rsyslog-module-kafka-8.2306.0-150400.5.24.1 * rsyslog-module-omtcl-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-ossl-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-8.2306.0-150400.5.24.1 * rsyslog-module-gcrypt-8.2306.0-150400.5.24.1 * rsyslog-module-relp-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-omamqp1-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-8.2306.0-150400.5.24.1 * rsyslog-module-omhttpfs-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-omamqp1-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-elasticsearch-8.2306.0-150400.5.24.1 * rsyslog-doc-8.2306.0-150400.5.24.1 * rsyslog-module-omtcl-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-omhttpfs-8.2306.0-150400.5.24.1 * rsyslog-module-kafka-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-dbi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-ossl-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-elasticsearch-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-8.2306.0-150400.5.24.1 * rsyslog-diag-tools-debuginfo-8.2306.0-150400.5.24.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-8.2306.0-150400.5.24.1 * rsyslog-module-dbi-8.2306.0-150400.5.24.1 * rsyslog-module-gcrypt-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-8.2306.0-150400.5.24.1 * rsyslog-diag-tools-8.2306.0-150400.5.24.1 * rsyslog-module-kafka-8.2306.0-150400.5.24.1 * rsyslog-module-omtcl-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-ossl-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-8.2306.0-150400.5.24.1 * rsyslog-module-gcrypt-8.2306.0-150400.5.24.1 * rsyslog-module-relp-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-omamqp1-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-8.2306.0-150400.5.24.1 * rsyslog-module-omhttpfs-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-omamqp1-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-elasticsearch-8.2306.0-150400.5.24.1 * rsyslog-doc-8.2306.0-150400.5.24.1 * rsyslog-module-omtcl-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-omhttpfs-8.2306.0-150400.5.24.1 * rsyslog-module-kafka-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-dbi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-ossl-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-elasticsearch-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-8.2306.0-150400.5.24.1 * rsyslog-diag-tools-debuginfo-8.2306.0-150400.5.24.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-8.2306.0-150400.5.24.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-8.2306.0-150400.5.24.1 * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-8.2306.0-150400.5.24.1 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-relp-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-8.2306.0-150400.5.24.1 * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-8.2306.0-150400.5.24.1 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-relp-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-8.2306.0-150400.5.24.1 * rsyslog-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-8.2306.0-150400.5.24.1 * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-8.2306.0-150400.5.24.1 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-relp-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-8.2306.0-150400.5.24.1 * rsyslog-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.24.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-8.2306.0-150400.5.24.1 * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-8.2306.0-150400.5.24.1 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-relp-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-8.2306.0-150400.5.24.1 * rsyslog-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.24.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-8.2306.0-150400.5.24.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-8.2306.0-150400.5.24.1 * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-8.2306.0-150400.5.24.1 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-relp-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-8.2306.0-150400.5.24.1 * rsyslog-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-8.2306.0-150400.5.24.1 * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-8.2306.0-150400.5.24.1 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-relp-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-8.2306.0-150400.5.24.1 * rsyslog-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.24.1 * SUSE Manager Proxy 4.3 (x86_64) * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-8.2306.0-150400.5.24.1 * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-8.2306.0-150400.5.24.1 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-relp-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-8.2306.0-150400.5.24.1 * rsyslog-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.24.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-8.2306.0-150400.5.24.1 * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-8.2306.0-150400.5.24.1 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-relp-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-8.2306.0-150400.5.24.1 * rsyslog-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.24.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-8.2306.0-150400.5.24.1 * rsyslog-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-snmp-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-8.2306.0-150400.5.24.1 * rsyslog-module-pgsql-8.2306.0-150400.5.24.1 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-relp-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-8.2306.0-150400.5.24.1 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-gtls-8.2306.0-150400.5.24.1 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-debugsource-8.2306.0-150400.5.24.1 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-8.2306.0-150400.5.24.1 * rsyslog-8.2306.0-150400.5.24.1 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.24.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217292 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 9 20:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 09 Jan 2024 20:30:04 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170483220416.2676.14406085038287162499@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Wed Jan 10 08:03:19 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:03:19 +0100 (CET) Subject: SUSE-CU-2024:78-1: Security update of suse/sle-micro/5.3/toolbox Message-ID: <20240110080319.9A3E3FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.3/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:78-1 Container Tags : suse/sle-micro/5.3/toolbox:12.1 , suse/sle-micro/5.3/toolbox:12.1-5.2.288 , suse/sle-micro/5.3/toolbox:latest Container Release : 5.2.288 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.3/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-updates at lists.suse.com Wed Jan 10 08:04:35 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:04:35 +0100 (CET) Subject: SUSE-CU-2024:80-1: Security update of suse/sle-micro/5.4/toolbox Message-ID: <20240110080435.27B9BFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.4/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:80-1 Container Tags : suse/sle-micro/5.4/toolbox:12.1 , suse/sle-micro/5.4/toolbox:12.1-4.2.186 , suse/sle-micro/5.4/toolbox:latest Container Release : 4.2.186 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.4/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-updates at lists.suse.com Wed Jan 10 08:04:51 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:04:51 +0100 (CET) Subject: SUSE-CU-2024:81-1: Recommended update of suse/sle-micro/5.5/toolbox Message-ID: <20240110080451.9A23AFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:81-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.132 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.132 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 08:05:31 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:05:31 +0100 (CET) Subject: SUSE-CU-2024:82-1: Recommended update of suse/ltss/sle15.4/sle15 Message-ID: <20240110080531.09956FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.4/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:82-1 Container Tags : suse/ltss/sle15.4/bci-base:15.4 , suse/ltss/sle15.4/bci-base:15.4.2.5 , suse/ltss/sle15.4/sle15:15.4 , suse/ltss/sle15.4/sle15:15.4.2.5 Container Release : 2.5 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/ltss/sle15.4/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 08:05:47 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:05:47 +0100 (CET) Subject: SUSE-CU-2024:83-1: Recommended update of suse/389-ds Message-ID: <20240110080547.CEC77FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/389-ds ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:83-1 Container Tags : suse/389-ds:2.2 , suse/389-ds:2.2-17.5 , suse/389-ds:latest Container Release : 17.5 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/389-ds was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 08:05:48 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:05:48 +0100 (CET) Subject: SUSE-CU-2024:84-1: Security update of suse/389-ds Message-ID: <20240110080548.781DBFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/389-ds ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:84-1 Container Tags : suse/389-ds:2.2 , suse/389-ds:2.2-17.7 , suse/389-ds:latest Container Release : 17.7 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/389-ds was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 08:06:05 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:05 +0100 (CET) Subject: SUSE-CU-2024:85-1: Recommended update of bci/dotnet-aspnet Message-ID: <20240110080605.A0C97FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:85-1 Container Tags : bci/dotnet-aspnet:6.0 , bci/dotnet-aspnet:6.0-18.32 , bci/dotnet-aspnet:6.0.25 , bci/dotnet-aspnet:6.0.25-18.32 Container Release : 18.32 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 08:06:06 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:06 +0100 (CET) Subject: SUSE-CU-2024:86-1: Security update of bci/dotnet-aspnet Message-ID: <20240110080606.3CE92FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:86-1 Container Tags : bci/dotnet-aspnet:6.0 , bci/dotnet-aspnet:6.0-19.1 , bci/dotnet-aspnet:6.0.25 , bci/dotnet-aspnet:6.0.25-19.1 Container Release : 19.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 08:06:23 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:23 +0100 (CET) Subject: SUSE-CU-2024:87-1: Recommended update of bci/dotnet-aspnet Message-ID: <20240110080623.A2831FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:87-1 Container Tags : bci/dotnet-aspnet:7.0 , bci/dotnet-aspnet:7.0-18.33 , bci/dotnet-aspnet:7.0.14 , bci/dotnet-aspnet:7.0.14-18.33 , bci/dotnet-aspnet:latest Container Release : 18.33 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 08:06:24 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:24 +0100 (CET) Subject: SUSE-CU-2024:88-1: Security update of bci/dotnet-aspnet Message-ID: <20240110080624.2D321FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:88-1 Container Tags : bci/dotnet-aspnet:7.0 , bci/dotnet-aspnet:7.0-19.1 , bci/dotnet-aspnet:7.0.14 , bci/dotnet-aspnet:7.0.14-19.1 , bci/dotnet-aspnet:latest Container Release : 19.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 08:06:28 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:28 +0100 (CET) Subject: SUSE-CU-2024:89-1: Recommended update of bci/bci-busybox Message-ID: <20240110080628.234E1FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-busybox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:89-1 Container Tags : bci/bci-busybox:15.5 , bci/bci-busybox:15.5.13.2 , bci/bci-busybox:latest Container Release : 13.2 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/bci-busybox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 08:06:38 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:38 +0100 (CET) Subject: SUSE-CU-2024:90-1: Recommended update of suse/registry Message-ID: <20240110080638.7565EFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/registry ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:90-1 Container Tags : suse/registry:2.8 , suse/registry:2.8-16.3 , suse/registry:latest Container Release : 16.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/registry was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 08:07:00 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:00 +0100 (CET) Subject: SUSE-CU-2024:91-1: Recommended update of bci/dotnet-sdk Message-ID: <20240110080700.06960FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:91-1 Container Tags : bci/dotnet-sdk:6.0 , bci/dotnet-sdk:6.0-17.33 , bci/dotnet-sdk:6.0.25 , bci/dotnet-sdk:6.0.25-17.33 Container Release : 17.33 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 08:07:00 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:00 +0100 (CET) Subject: SUSE-CU-2024:92-1: Security update of bci/dotnet-sdk Message-ID: <20240110080700.9C695FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:92-1 Container Tags : bci/dotnet-sdk:6.0 , bci/dotnet-sdk:6.0-18.1 , bci/dotnet-sdk:6.0.25 , bci/dotnet-sdk:6.0.25-18.1 Container Release : 18.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 08:07:22 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:22 +0100 (CET) Subject: SUSE-CU-2024:93-1: Recommended update of bci/dotnet-sdk Message-ID: <20240110080722.7ECD6FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:93-1 Container Tags : bci/dotnet-sdk:7.0 , bci/dotnet-sdk:7.0-19.32 , bci/dotnet-sdk:7.0.14 , bci/dotnet-sdk:7.0.14-19.32 , bci/dotnet-sdk:latest Container Release : 19.32 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 08:07:23 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:23 +0100 (CET) Subject: SUSE-CU-2024:94-1: Security update of bci/dotnet-sdk Message-ID: <20240110080723.24EE3FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:94-1 Container Tags : bci/dotnet-sdk:7.0 , bci/dotnet-sdk:7.0-20.1 , bci/dotnet-sdk:7.0.14 , bci/dotnet-sdk:7.0.14-20.1 , bci/dotnet-sdk:latest Container Release : 20.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 08:07:41 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:41 +0100 (CET) Subject: SUSE-CU-2024:96-1: Security update of bci/dotnet-runtime Message-ID: <20240110080741.A180CFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:96-1 Container Tags : bci/dotnet-runtime:6.0 , bci/dotnet-runtime:6.0-18.1 , bci/dotnet-runtime:6.0.25 , bci/dotnet-runtime:6.0.25-18.1 Container Release : 18.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 08:07:41 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:41 +0100 (CET) Subject: SUSE-CU-2024:95-1: Recommended update of bci/dotnet-runtime Message-ID: <20240110080741.09CACFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:95-1 Container Tags : bci/dotnet-runtime:6.0 , bci/dotnet-runtime:6.0-17.33 , bci/dotnet-runtime:6.0.25 , bci/dotnet-runtime:6.0.25-17.33 Container Release : 17.33 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 08:07:59 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:59 +0100 (CET) Subject: SUSE-CU-2024:97-1: Recommended update of bci/dotnet-runtime Message-ID: <20240110080759.C6964FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:97-1 Container Tags : bci/dotnet-runtime:7.0 , bci/dotnet-runtime:7.0-19.33 , bci/dotnet-runtime:7.0.14 , bci/dotnet-runtime:7.0.14-19.33 , bci/dotnet-runtime:latest Container Release : 19.33 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 08:08:00 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:08:00 +0100 (CET) Subject: SUSE-CU-2024:98-1: Security update of bci/dotnet-runtime Message-ID: <20240110080800.6CF33FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:98-1 Container Tags : bci/dotnet-runtime:7.0 , bci/dotnet-runtime:7.0-20.1 , bci/dotnet-runtime:7.0.14 , bci/dotnet-runtime:7.0.14-20.1 , bci/dotnet-runtime:latest Container Release : 20.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 08:08:12 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:08:12 +0100 (CET) Subject: SUSE-CU-2024:99-1: Recommended update of bci/golang Message-ID: <20240110080812.611FCFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:99-1 Container Tags : bci/golang:1.20 , bci/golang:1.20-2.5.4 , bci/golang:oldstable , bci/golang:oldstable-2.5.4 Container Release : 5.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From null at suse.de Wed Jan 10 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 08:30:02 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170487540288.26412.5920472298299120333@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-tests-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-backup-scripts-1.34-150000.3.34.1 * tar-doc-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-tests-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-backup-scripts-1.34-150000.3.34.1 * tar-doc-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 08:33:04 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 08:33:04 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170487558449.1358.7499144146969247162@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-tests-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-backup-scripts-1.34-150000.3.34.1 * tar-doc-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-tests-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-backup-scripts-1.34-150000.3.34.1 * tar-doc-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 08:36:06 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 08:36:06 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170487576616.2330.17489320800067153461@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-tests-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-backup-scripts-1.34-150000.3.34.1 * tar-doc-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-tests-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-backup-scripts-1.34-150000.3.34.1 * tar-doc-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 08:39:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 08:39:07 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170487594756.2318.14389418490896946354@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0076-1: moderate: Security update for hawk2 Message-ID: <170488980389.13849.2029351080459782736@smelt2.prg2.suse.org> # Security update for hawk2 Announcement ID: SUSE-SU-2024:0076-1 Rating: moderate References: * bsc#1206217 * bsc#1207930 * bsc#1208533 * bsc#1213454 * bsc#1215438 * bsc#1215976 * bsc#1216508 * bsc#1216571 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP1 * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has eight security fixes can now be installed. ## Description: This update for hawk2 fixes the following issues: * Fixed HttpOnly secure flag by default (bsc#1216508). * Fixed CSRF in errors_controller.rb protection (bsc#1216571). Update to version 2.6.4+git.1702030539.5fb7d91b: * Fix mime type issue in MS windows (bsc#1215438) * Parametrize CORS Access-Control-Allow-Origin header (bsc#1213454) * Tests: upgrate tests for ruby3.2 (tumbleweed) (bsc#1215976) * Upgrade for ruby3.2 (tumbleweed) (bsc#1215976) * Forbid special symbols in the category (bsc#1206217) * Fix the sass-rails version on ~5.0 (bsc#1208533) * Don't delete the private key if the public key is missing (bsc#1207930) * make-sle155-compatible.patch . No bsc, it's for backwards compatibility. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-76=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-76=1 * SUSE Linux Enterprise High Availability Extension 15 SP1 zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2024-76=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-76=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-76=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-76=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-76=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * SUSE Linux Enterprise High Availability Extension 15 SP1 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1206217 * https://bugzilla.suse.com/show_bug.cgi?id=1207930 * https://bugzilla.suse.com/show_bug.cgi?id=1208533 * https://bugzilla.suse.com/show_bug.cgi?id=1213454 * https://bugzilla.suse.com/show_bug.cgi?id=1215438 * https://bugzilla.suse.com/show_bug.cgi?id=1215976 * https://bugzilla.suse.com/show_bug.cgi?id=1216508 * https://bugzilla.suse.com/show_bug.cgi?id=1216571 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 12:30:08 -0000 Subject: SUSE-SU-2024:0075-1: important: Security update for LibreOffice Message-ID: <170488980838.13849.9451116101145752772@smelt2.prg2.suse.org> # Security update for LibreOffice Announcement ID: SUSE-SU-2024:0075-1 Rating: important References: * bsc#1198666 * bsc#1200085 * bsc#1204040 * bsc#1209242 * bsc#1210687 * bsc#1211746 * jsc#PED-1785 * jsc#PED-3550 * jsc#PED-3561 Cross-References: * CVE-2023-0950 * CVE-2023-2255 CVSS scores: * CVE-2023-0950 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H * CVE-2023-0950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-2255 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2023-2255 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 * SUSE OpenStack Cloud 9 * SUSE OpenStack Cloud Crowbar 9 An update that solves two vulnerabilities, contains three features and has four security fixes can now be installed. ## Description: This update for LibreOffice fixes the following issues: libreoffice: * Version update from 7.3.6.2 to 7.5.4.1 (jsc#PED-3561, jsc#PED-3550, jsc#PED-1785): * For the highlights of changes of version 7.5 please consult the official release notes: https://wiki.documentfoundation.org/ReleaseNotes/7.5 * For the highlights of changes of version 7.4 please consult the official release notes: https://wiki.documentfoundation.org/ReleaseNotes/7.4 * Security issues fixed: * CVE-2023-0950: Fixed stack underflow in ScInterpreter (bsc#1209242) * CVE-2023-2255: Fixed vulnerability where remote documents could be loaded without prompt via IFrame (bsc#1211746) * Bug fixes: * Fix PPTX shadow effect for table offset (bsc#1204040) * Fix ability to set the default tab size for each text object (bsc#1198666) * Fix PPTX extra vertical space between different text formats (bsc#1200085) * Do not use binutils-gold as the package is unmaintainedd and will be removed in the future (bsc#1210687) * Updated bundled dependencies: * boost version update from 1_77_0 to 1_80_0 * curl version update from 7.83.1 to 8.0.1 * icu4c-data version update from 70_1 to 72_1 * icu4c version update from 70_1 to 72_1 * pdfium version update from 4699 to 5408 * poppler version update from 21.11.0 to 22.12.0 * poppler-data version update from 0.4.10 to 0.4.11 * skia version from m97-a7230803d64ae9d44f4e128244480111a3ae967 to m103-b301ff025004c9cd82816c86c547588e6c24b466 * New build dependencies: * fixmath-devel * libwebp-devel * zlib-devel * dragonbox-devel * at-spi2-core-devel * libtiff-devel dragonbox: * New package at version 1.1.3 (jsc#PED-1785) * New dependency for LibreOffice 7.4 fixmath: * New package at version 2022.07.20 (jsc#PED-1785) * New dependency for LibreOffice 7.4 libmwaw: * Version update from 0.3.20 to 0.3.21 (jsc#PED-1785): * Add debug code to read some private rsrc data * Allow to read some MacWrite which does not have printer informations * Add a parser for Scoop files * Add a parser for ScriptWriter files * Add a parser for ReadySetGo 1-4 files xmlsec1: * Version update from 1.2.28 to 1.2.37 required by LibreOffice 7.5.2.2 (jsc#PED-3561, jsc#PED-3550): * Retired the XMLSec mailing list "xmlsec at aleksey.com" and the XMLSec Online Signature Verifier. * Migration to OpenSSL 3.0 API Note that OpenSSL engines are disabled by default when XMLSec library is compiled against OpenSSL 3.0. To re-enable OpenSSL engines, use `--enable-openssl3-engines` configure flag (there will be a lot of deprecation warnings). * The OpenSSL before 1.1.0 and LibreSSL before 2.7.0 are now deprecated and will be removed in the future versions of XMLSec Library. * Refactored all the integer casts to ensure cast-safety. Fixed all warnings and enabled `-Werror` and `-pedantic` flags on CI builds. * Added configure flag to use size_t for xmlSecSize (currently disabled by default for backward compatibility). * Support for OpenSSL compiled with OPENSSL_NO_ERR. * Full support for LibreSSL 3.5.0 and above * Several other small fixes * Fix decrypting session key for two recipients * Added `--privkey-openssl-engine` option to enhance openssl engine support * Remove MD5 for NSS 3.59 and above * Fix PKCS12_parse return code handling * Fix OpenSSL lookup * xmlSecX509DataGetNodeContent(): don't return 0 for non-empty elements - fix for LibreOffice * Unload error strings in OpenSSL shutdown. * Make userData available when executing preExecCallback function * Add an option to use secure memset. * Enabled XML_PARSE_HUGE for all xml parsers. * Various build and tests fixes and improvements. * Move remaining private header files away from xmlsec/include/`` folder * Other packaging changes: * Relax the crypto policies for the test-suite. It allows the tests using certificates with small key lengths to pass. * Pass `--disable-md5` to configure: The cryptographic strength of the MD5 algorithm is sufficiently doubtful that its use is discouraged at this time. It is not listed as an algorithm in [XMLDSIG-CORE1] https://www.w3.org/TR/xmlsec-algorithms/#bib-XMLDSIG-CORE1 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE OpenStack Cloud 9 zypper in -t patch SUSE-OpenStack-Cloud-9-2024-75=1 * SUSE OpenStack Cloud Crowbar 9 zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2024-75=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-75=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-75=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-75=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-75=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-75=1 ## Package List: * SUSE OpenStack Cloud 9 (x86_64) * libatk-1_0-0-2.28.1-6.5.23 * libxmlsec1-gcrypt1-debuginfo-1.2.37-8.6.21 * typelib-1_0-Atk-1_0-2.28.1-6.5.23 * libatk-1_0-0-debuginfo-2.28.1-6.5.23 * libxmlsec1-1-debuginfo-1.2.37-8.6.21 * atk-debugsource-2.28.1-6.5.23 * libxmlsec1-gcrypt1-1.2.37-8.6.21 * libxmlsec1-openssl1-1.2.37-8.6.21 * libxmlsec1-1-1.2.37-8.6.21 * libxmlsec1-gnutls1-1.2.37-8.6.21 * libxmlsec1-openssl1-debuginfo-1.2.37-8.6.21 * libxmlsec1-gnutls1-debuginfo-1.2.37-8.6.21 * libatk-1_0-0-debuginfo-32bit-2.28.1-6.5.23 * libatk-1_0-0-32bit-2.28.1-6.5.23 * xmlsec1-debuginfo-1.2.37-8.6.21 * xmlsec1-debugsource-1.2.37-8.6.21 * libxmlsec1-nss1-1.2.37-8.6.21 * libxmlsec1-nss1-debuginfo-1.2.37-8.6.21 * xmlsec1-1.2.37-8.6.21 * SUSE OpenStack Cloud 9 (noarch) * atk-doc-2.28.1-6.5.23 * atk-lang-2.28.1-6.5.23 * SUSE OpenStack Cloud Crowbar 9 (x86_64) * libatk-1_0-0-2.28.1-6.5.23 * libxmlsec1-gcrypt1-debuginfo-1.2.37-8.6.21 * typelib-1_0-Atk-1_0-2.28.1-6.5.23 * libatk-1_0-0-debuginfo-2.28.1-6.5.23 * libxmlsec1-1-debuginfo-1.2.37-8.6.21 * atk-debugsource-2.28.1-6.5.23 * libxmlsec1-gcrypt1-1.2.37-8.6.21 * libxmlsec1-openssl1-1.2.37-8.6.21 * libxmlsec1-1-1.2.37-8.6.21 * libxmlsec1-gnutls1-1.2.37-8.6.21 * libxmlsec1-openssl1-debuginfo-1.2.37-8.6.21 * libxmlsec1-gnutls1-debuginfo-1.2.37-8.6.21 * libatk-1_0-0-debuginfo-32bit-2.28.1-6.5.23 * libatk-1_0-0-32bit-2.28.1-6.5.23 * xmlsec1-debuginfo-1.2.37-8.6.21 * xmlsec1-debugsource-1.2.37-8.6.21 * libxmlsec1-nss1-1.2.37-8.6.21 * libxmlsec1-nss1-debuginfo-1.2.37-8.6.21 * xmlsec1-1.2.37-8.6.21 * SUSE OpenStack Cloud Crowbar 9 (noarch) * atk-doc-2.28.1-6.5.23 * atk-lang-2.28.1-6.5.23 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * xmlsec1-openssl-devel-1.2.37-8.6.21 * xmlsec1-devel-1.2.37-8.6.21 * xmlsec1-gnutls-devel-1.2.37-8.6.21 * atk-debugsource-2.28.1-6.5.23 * xmlsec1-gcrypt-devel-1.2.37-8.6.21 * atk-devel-2.28.1-6.5.23 * xmlsec1-nss-devel-1.2.37-8.6.21 * libmwaw-0_3-3-0.3.21-7.24.14 * xmlsec1-debuginfo-1.2.37-8.6.21 * xmlsec1-debugsource-1.2.37-8.6.21 * libmwaw-debugsource-0.3.21-7.24.14 * xmlsec1-1.2.37-8.6.21 * libmwaw-devel-0.3.21-7.24.14 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch) * libmwaw-devel-doc-0.3.21-7.24.14 * SUSE Linux Enterprise Software Development Kit 12 SP5 (x86_64) * libreoffice-sdk-debuginfo-7.5.4.1-48.44.2 * libreoffice-debugsource-7.5.4.1-48.44.2 * libreoffice-debuginfo-7.5.4.1-48.44.2 * libreoffice-sdk-7.5.4.1-48.44.2 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libatk-1_0-0-2.28.1-6.5.23 * libxmlsec1-gcrypt1-debuginfo-1.2.37-8.6.21 * typelib-1_0-Atk-1_0-2.28.1-6.5.23 * libatk-1_0-0-debuginfo-2.28.1-6.5.23 * libxmlsec1-1-debuginfo-1.2.37-8.6.21 * atk-debugsource-2.28.1-6.5.23 * libxmlsec1-gcrypt1-1.2.37-8.6.21 * libxmlsec1-openssl1-1.2.37-8.6.21 * libxmlsec1-1-1.2.37-8.6.21 * libxmlsec1-gnutls1-1.2.37-8.6.21 * libxmlsec1-openssl1-debuginfo-1.2.37-8.6.21 * libxmlsec1-gnutls1-debuginfo-1.2.37-8.6.21 * xmlsec1-debuginfo-1.2.37-8.6.21 * xmlsec1-debugsource-1.2.37-8.6.21 * libxmlsec1-nss1-1.2.37-8.6.21 * libxmlsec1-nss1-debuginfo-1.2.37-8.6.21 * xmlsec1-1.2.37-8.6.21 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * atk-doc-2.28.1-6.5.23 * atk-lang-2.28.1-6.5.23 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libatk-1_0-0-debuginfo-32bit-2.28.1-6.5.23 * libatk-1_0-0-32bit-2.28.1-6.5.23 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libatk-1_0-0-2.28.1-6.5.23 * libxmlsec1-gcrypt1-debuginfo-1.2.37-8.6.21 * typelib-1_0-Atk-1_0-2.28.1-6.5.23 * libatk-1_0-0-debuginfo-2.28.1-6.5.23 * libxmlsec1-1-debuginfo-1.2.37-8.6.21 * atk-debugsource-2.28.1-6.5.23 * libxmlsec1-gcrypt1-1.2.37-8.6.21 * libxmlsec1-openssl1-1.2.37-8.6.21 * libxmlsec1-1-1.2.37-8.6.21 * libxmlsec1-gnutls1-1.2.37-8.6.21 * libxmlsec1-openssl1-debuginfo-1.2.37-8.6.21 * libxmlsec1-gnutls1-debuginfo-1.2.37-8.6.21 * xmlsec1-debuginfo-1.2.37-8.6.21 * xmlsec1-debugsource-1.2.37-8.6.21 * libxmlsec1-nss1-1.2.37-8.6.21 * libxmlsec1-nss1-debuginfo-1.2.37-8.6.21 * xmlsec1-1.2.37-8.6.21 * SUSE Linux Enterprise Server 12 SP5 (noarch) * atk-doc-2.28.1-6.5.23 * atk-lang-2.28.1-6.5.23 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libatk-1_0-0-debuginfo-32bit-2.28.1-6.5.23 * libatk-1_0-0-32bit-2.28.1-6.5.23 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libatk-1_0-0-2.28.1-6.5.23 * libxmlsec1-gcrypt1-debuginfo-1.2.37-8.6.21 * typelib-1_0-Atk-1_0-2.28.1-6.5.23 * libatk-1_0-0-debuginfo-2.28.1-6.5.23 * libxmlsec1-1-debuginfo-1.2.37-8.6.21 * atk-debugsource-2.28.1-6.5.23 * libxmlsec1-gcrypt1-1.2.37-8.6.21 * libxmlsec1-openssl1-1.2.37-8.6.21 * libxmlsec1-1-1.2.37-8.6.21 * libxmlsec1-gnutls1-1.2.37-8.6.21 * libxmlsec1-openssl1-debuginfo-1.2.37-8.6.21 * libxmlsec1-gnutls1-debuginfo-1.2.37-8.6.21 * xmlsec1-debuginfo-1.2.37-8.6.21 * xmlsec1-debugsource-1.2.37-8.6.21 * libxmlsec1-nss1-1.2.37-8.6.21 * libxmlsec1-nss1-debuginfo-1.2.37-8.6.21 * xmlsec1-1.2.37-8.6.21 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * atk-doc-2.28.1-6.5.23 * atk-lang-2.28.1-6.5.23 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libatk-1_0-0-debuginfo-32bit-2.28.1-6.5.23 * libatk-1_0-0-32bit-2.28.1-6.5.23 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * libreoffice-7.5.4.1-48.44.2 * libreoffice-impress-debuginfo-7.5.4.1-48.44.2 * libreoffice-debuginfo-7.5.4.1-48.44.2 * libreoffice-calc-debuginfo-7.5.4.1-48.44.2 * libreoffice-gnome-debuginfo-7.5.4.1-48.44.2 * libreoffice-mailmerge-7.5.4.1-48.44.2 * libreoffice-writer-debuginfo-7.5.4.1-48.44.2 * libreoffice-base-debuginfo-7.5.4.1-48.44.2 * libreoffice-writer-extensions-7.5.4.1-48.44.2 * libreoffice-base-7.5.4.1-48.44.2 * libreoffice-math-debuginfo-7.5.4.1-48.44.2 * libreoffice-writer-7.5.4.1-48.44.2 * libreoffice-calc-extensions-7.5.4.1-48.44.2 * dragonbox-devel-1.1.3-8.3.48 * libreoffice-librelogo-7.5.4.1-48.44.2 * libmwaw-0_3-3-debuginfo-0.3.21-7.24.14 * libreoffice-gtk3-debuginfo-7.5.4.1-48.44.2 * libreoffice-gnome-7.5.4.1-48.44.2 * libreoffice-pyuno-7.5.4.1-48.44.2 * libreoffice-gtk3-7.5.4.1-48.44.2 * libreoffice-debugsource-7.5.4.1-48.44.2 * libreoffice-pyuno-debuginfo-7.5.4.1-48.44.2 * libreoffice-officebean-debuginfo-7.5.4.1-48.44.2 * libreoffice-filters-optional-7.5.4.1-48.44.2 * libreoffice-base-drivers-postgresql-debuginfo-7.5.4.1-48.44.2 * libreoffice-draw-7.5.4.1-48.44.2 * libreoffice-math-7.5.4.1-48.44.2 * libmwaw-0_3-3-0.3.21-7.24.14 * libreoffice-impress-7.5.4.1-48.44.2 * libreoffice-base-drivers-postgresql-7.5.4.1-48.44.2 * libreoffice-officebean-7.5.4.1-48.44.2 * libreoffice-draw-debuginfo-7.5.4.1-48.44.2 * fixmath-devel-2022.07.20-8.3.48 * libmwaw-debugsource-0.3.21-7.24.14 * libreoffice-calc-7.5.4.1-48.44.2 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (noarch) * libreoffice-l10n-zh_CN-7.5.4.1-48.44.2 * libreoffice-l10n-lt-7.5.4.1-48.44.2 * libreoffice-l10n-de-7.5.4.1-48.44.2 * libreoffice-l10n-it-7.5.4.1-48.44.2 * libreoffice-l10n-sk-7.5.4.1-48.44.2 * libreoffice-l10n-zh_TW-7.5.4.1-48.44.2 * libreoffice-l10n-bg-7.5.4.1-48.44.2 * libreoffice-l10n-uk-7.5.4.1-48.44.2 * libreoffice-l10n-ar-7.5.4.1-48.44.2 * libreoffice-l10n-cs-7.5.4.1-48.44.2 * libreoffice-l10n-fr-7.5.4.1-48.44.2 * libreoffice-l10n-gu-7.5.4.1-48.44.2 * libreoffice-icon-themes-7.5.4.1-48.44.2 * libreoffice-l10n-ru-7.5.4.1-48.44.2 * libreoffice-l10n-hr-7.5.4.1-48.44.2 * libreoffice-l10n-xh-7.5.4.1-48.44.2 * libreoffice-l10n-ko-7.5.4.1-48.44.2 * libreoffice-l10n-pt_PT-7.5.4.1-48.44.2 * libreoffice-l10n-nb-7.5.4.1-48.44.2 * libreoffice-l10n-nl-7.5.4.1-48.44.2 * libreoffice-l10n-da-7.5.4.1-48.44.2 * libreoffice-l10n-zu-7.5.4.1-48.44.2 * libreoffice-l10n-af-7.5.4.1-48.44.2 * libreoffice-branding-upstream-7.5.4.1-48.44.2 * libreoffice-l10n-hu-7.5.4.1-48.44.2 * libreoffice-l10n-hi-7.5.4.1-48.44.2 * libreoffice-l10n-fi-7.5.4.1-48.44.2 * libreoffice-l10n-nn-7.5.4.1-48.44.2 * libreoffice-l10n-ja-7.5.4.1-48.44.2 * libreoffice-l10n-ro-7.5.4.1-48.44.2 * libreoffice-l10n-pl-7.5.4.1-48.44.2 * libreoffice-l10n-ca-7.5.4.1-48.44.2 * libreoffice-l10n-sv-7.5.4.1-48.44.2 * libreoffice-l10n-pt_BR-7.5.4.1-48.44.2 * libreoffice-l10n-es-7.5.4.1-48.44.2 * libreoffice-l10n-en-7.5.4.1-48.44.2 ## References: * https://www.suse.com/security/cve/CVE-2023-0950.html * https://www.suse.com/security/cve/CVE-2023-2255.html * https://bugzilla.suse.com/show_bug.cgi?id=1198666 * https://bugzilla.suse.com/show_bug.cgi?id=1200085 * https://bugzilla.suse.com/show_bug.cgi?id=1204040 * https://bugzilla.suse.com/show_bug.cgi?id=1209242 * https://bugzilla.suse.com/show_bug.cgi?id=1210687 * https://bugzilla.suse.com/show_bug.cgi?id=1211746 * https://jira.suse.com/browse/PED-1785 * https://jira.suse.com/browse/PED-3550 * https://jira.suse.com/browse/PED-3561 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 12:30:10 -0000 Subject: SUSE-RU-2024:0074-1: moderate: Recommended update for libzypp, zypper Message-ID: <170488981022.13849.2066332578532371564@smelt2.prg2.suse.org> # Recommended update for libzypp, zypper Announcement ID: SUSE-RU-2024:0074-1 Rating: moderate References: * bsc#1217948 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that has one fix can now be installed. ## Description: This update for libzypp, zypper fixes the following issues: * Touch /run/reboot-needed if a patch suggesting a reboot was installed (bsc#1217948) * Backport needs-rebooting command from Code15 (bsc#1217948) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-74=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-74=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-74=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-74=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libzypp-devel-doc-16.22.11-59.2 * libzypp-devel-16.22.11-59.2 * libzypp-debugsource-16.22.11-59.2 * libzypp-debuginfo-16.22.11-59.2 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libzypp-debuginfo-16.22.11-59.2 * zypper-debugsource-1.13.65-21.58.2 * zypper-debuginfo-1.13.65-21.58.2 * libzypp-debugsource-16.22.11-59.2 * libzypp-devel-16.22.11-59.2 * libzypp-16.22.11-59.2 * zypper-1.13.65-21.58.2 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * zypper-log-1.13.65-21.58.2 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libzypp-debuginfo-16.22.11-59.2 * zypper-debugsource-1.13.65-21.58.2 * zypper-debuginfo-1.13.65-21.58.2 * libzypp-debugsource-16.22.11-59.2 * libzypp-devel-16.22.11-59.2 * libzypp-16.22.11-59.2 * zypper-1.13.65-21.58.2 * SUSE Linux Enterprise Server 12 SP5 (noarch) * zypper-log-1.13.65-21.58.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libzypp-debuginfo-16.22.11-59.2 * zypper-debugsource-1.13.65-21.58.2 * zypper-debuginfo-1.13.65-21.58.2 * libzypp-debugsource-16.22.11-59.2 * libzypp-devel-16.22.11-59.2 * libzypp-16.22.11-59.2 * zypper-1.13.65-21.58.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * zypper-log-1.13.65-21.58.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217948 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 12:30:11 -0000 Subject: SUSE-RU-2024:0073-1: moderate: Recommended update for sssd Message-ID: <170488981169.13849.6120923704016300474@smelt2.prg2.suse.org> # Recommended update for sssd Announcement ID: SUSE-RU-2024:0073-1 Rating: moderate References: * bsc#1216907 * bsc#1217319 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for sssd fixes the following issues: * Only send cldap-ping to our local domain; (bsc#1217319); (gh#SSSD/sssd#5822) * Do not write kdc info file for GC lookup; (bsc#1217319); (gh#SSSD/sssd#5956) * sssd Unable to obtain cached rules filling up sssd_sudo.log ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-73=1 SUSE-2024-73=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-73=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-73=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * sssd-ad-debuginfo-2.5.2-150500.10.11.1 * sssd-krb5-common-debuginfo-2.5.2-150500.10.11.1 * python3-sss-murmur-2.5.2-150500.10.11.1 * libsss_nss_idmap0-2.5.2-150500.10.11.1 * libipa_hbac-devel-2.5.2-150500.10.11.1 * libnfsidmap-sss-2.5.2-150500.10.11.1 * libipa_hbac0-2.5.2-150500.10.11.1 * sssd-dbus-debuginfo-2.5.2-150500.10.11.1 * libsss_idmap0-debuginfo-2.5.2-150500.10.11.1 * python3-ipa_hbac-debuginfo-2.5.2-150500.10.11.1 * sssd-ipa-2.5.2-150500.10.11.1 * libnfsidmap-sss-debuginfo-2.5.2-150500.10.11.1 * libsss_certmap-devel-2.5.2-150500.10.11.1 * libsss_nss_idmap-devel-2.5.2-150500.10.11.1 * libipa_hbac0-debuginfo-2.5.2-150500.10.11.1 * libsss_certmap0-debuginfo-2.5.2-150500.10.11.1 * sssd-kcm-debuginfo-2.5.2-150500.10.11.1 * sssd-proxy-2.5.2-150500.10.11.1 * sssd-ipa-debuginfo-2.5.2-150500.10.11.1 * libsss_certmap0-2.5.2-150500.10.11.1 * python3-sss-murmur-debuginfo-2.5.2-150500.10.11.1 * python3-sssd-config-debuginfo-2.5.2-150500.10.11.1 * sssd-2.5.2-150500.10.11.1 * sssd-ldap-debuginfo-2.5.2-150500.10.11.1 * sssd-krb5-debuginfo-2.5.2-150500.10.11.1 * libsss_idmap0-2.5.2-150500.10.11.1 * sssd-winbind-idmap-debuginfo-2.5.2-150500.10.11.1 * sssd-common-2.5.2-150500.10.11.1 * sssd-debugsource-2.5.2-150500.10.11.1 * sssd-kcm-2.5.2-150500.10.11.1 * sssd-winbind-idmap-2.5.2-150500.10.11.1 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.11.1 * sssd-tools-debuginfo-2.5.2-150500.10.11.1 * libsss_simpleifp0-debuginfo-2.5.2-150500.10.11.1 * python3-ipa_hbac-2.5.2-150500.10.11.1 * sssd-krb5-2.5.2-150500.10.11.1 * sssd-common-debuginfo-2.5.2-150500.10.11.1 * sssd-ad-2.5.2-150500.10.11.1 * sssd-tools-2.5.2-150500.10.11.1 * python3-sss_nss_idmap-debuginfo-2.5.2-150500.10.11.1 * python3-sssd-config-2.5.2-150500.10.11.1 * sssd-dbus-2.5.2-150500.10.11.1 * libsss_idmap-devel-2.5.2-150500.10.11.1 * sssd-ldap-2.5.2-150500.10.11.1 * sssd-krb5-common-2.5.2-150500.10.11.1 * sssd-proxy-debuginfo-2.5.2-150500.10.11.1 * python3-sss_nss_idmap-2.5.2-150500.10.11.1 * libsss_simpleifp-devel-2.5.2-150500.10.11.1 * libsss_simpleifp0-2.5.2-150500.10.11.1 * openSUSE Leap 15.5 (x86_64) * sssd-common-32bit-2.5.2-150500.10.11.1 * sssd-common-32bit-debuginfo-2.5.2-150500.10.11.1 * openSUSE Leap 15.5 (aarch64_ilp32) * sssd-common-64bit-2.5.2-150500.10.11.1 * sssd-common-64bit-debuginfo-2.5.2-150500.10.11.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * sssd-krb5-common-debuginfo-2.5.2-150500.10.11.1 * libsss_idmap0-2.5.2-150500.10.11.1 * libsss_certmap0-debuginfo-2.5.2-150500.10.11.1 * sssd-common-2.5.2-150500.10.11.1 * sssd-debugsource-2.5.2-150500.10.11.1 * libsss_nss_idmap0-2.5.2-150500.10.11.1 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.11.1 * sssd-ldap-2.5.2-150500.10.11.1 * sssd-krb5-common-2.5.2-150500.10.11.1 * libsss_certmap0-2.5.2-150500.10.11.1 * sssd-2.5.2-150500.10.11.1 * libsss_idmap0-debuginfo-2.5.2-150500.10.11.1 * sssd-ldap-debuginfo-2.5.2-150500.10.11.1 * sssd-common-debuginfo-2.5.2-150500.10.11.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * sssd-ad-debuginfo-2.5.2-150500.10.11.1 * sssd-krb5-common-debuginfo-2.5.2-150500.10.11.1 * libsss_nss_idmap0-2.5.2-150500.10.11.1 * libipa_hbac-devel-2.5.2-150500.10.11.1 * libipa_hbac0-2.5.2-150500.10.11.1 * sssd-dbus-debuginfo-2.5.2-150500.10.11.1 * libsss_idmap0-debuginfo-2.5.2-150500.10.11.1 * sssd-ipa-2.5.2-150500.10.11.1 * libsss_certmap-devel-2.5.2-150500.10.11.1 * libsss_nss_idmap-devel-2.5.2-150500.10.11.1 * libipa_hbac0-debuginfo-2.5.2-150500.10.11.1 * libsss_certmap0-debuginfo-2.5.2-150500.10.11.1 * sssd-kcm-debuginfo-2.5.2-150500.10.11.1 * sssd-proxy-2.5.2-150500.10.11.1 * sssd-ipa-debuginfo-2.5.2-150500.10.11.1 * libsss_certmap0-2.5.2-150500.10.11.1 * python3-sssd-config-debuginfo-2.5.2-150500.10.11.1 * sssd-2.5.2-150500.10.11.1 * sssd-ldap-debuginfo-2.5.2-150500.10.11.1 * sssd-krb5-debuginfo-2.5.2-150500.10.11.1 * libsss_idmap0-2.5.2-150500.10.11.1 * sssd-winbind-idmap-debuginfo-2.5.2-150500.10.11.1 * sssd-common-2.5.2-150500.10.11.1 * sssd-debugsource-2.5.2-150500.10.11.1 * sssd-kcm-2.5.2-150500.10.11.1 * sssd-winbind-idmap-2.5.2-150500.10.11.1 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.11.1 * sssd-tools-debuginfo-2.5.2-150500.10.11.1 * libsss_simpleifp0-debuginfo-2.5.2-150500.10.11.1 * sssd-krb5-2.5.2-150500.10.11.1 * sssd-common-debuginfo-2.5.2-150500.10.11.1 * sssd-ad-2.5.2-150500.10.11.1 * sssd-tools-2.5.2-150500.10.11.1 * sssd-dbus-2.5.2-150500.10.11.1 * python3-sssd-config-2.5.2-150500.10.11.1 * sssd-proxy-debuginfo-2.5.2-150500.10.11.1 * libsss_idmap-devel-2.5.2-150500.10.11.1 * sssd-ldap-2.5.2-150500.10.11.1 * sssd-krb5-common-2.5.2-150500.10.11.1 * libsss_simpleifp-devel-2.5.2-150500.10.11.1 * libsss_simpleifp0-2.5.2-150500.10.11.1 * Basesystem Module 15-SP5 (x86_64) * sssd-common-32bit-2.5.2-150500.10.11.1 * sssd-common-32bit-debuginfo-2.5.2-150500.10.11.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1216907 * https://bugzilla.suse.com/show_bug.cgi?id=1217319 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 12:30:13 -0000 Subject: SUSE-RU-2024:0072-1: moderate: Recommended update for sap-installation-wizard Message-ID: <170488981351.13849.12523100502986013992@smelt2.prg2.suse.org> # Recommended update for sap-installation-wizard Announcement ID: SUSE-RU-2024:0072-1 Rating: moderate References: * bsc#1214161 * bsc#1214821 * bsc#1215107 * bsc#1216539 * bsc#1216568 Affected Products: * openSUSE Leap 15.5 * SAP Applications Module 15-SP5 * SAP Business One Module 15-SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has five fixes can now be installed. ## Description: This update for sap-installation-wizard fixes the following issues: * Adjust HANA password policies to meet requirements of the changed SAP Business One password policies (bsc#1215107) * Fixes an issue when SAP Installation Wizard stops after HANA installation due to wrong pattern name. (bsc#1214161) * Add a missing role for SAP BusinessOne to 'sapconf'. (bsc#1216568) * Fixed for failing HANA installation due to new default value of parameter 'xs_routing_mode' in HANA. The parameter is set to 'ports' to remain the installation wizard backward compatible. (bsc#1216539) * Append '/' after directories in find to be able to properly handle links to directories ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-72=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-72=1 * SAP Business One Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-72=1 ## Package List: * openSUSE Leap 15.5 (ppc64le x86_64) * sap-installation-wizard-4.5.11-150500.5.9.1 * bone-installation-wizard-4.5.11-150500.5.9.1 * SAP Applications Module 15-SP5 (ppc64le x86_64) * sap-installation-wizard-4.5.11-150500.5.9.1 * SAP Business One Module 15-SP5 (x86_64) * bone-installation-wizard-4.5.11-150500.5.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214161 * https://bugzilla.suse.com/show_bug.cgi?id=1214821 * https://bugzilla.suse.com/show_bug.cgi?id=1215107 * https://bugzilla.suse.com/show_bug.cgi?id=1216539 * https://bugzilla.suse.com/show_bug.cgi?id=1216568 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 12:30:15 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170488981581.13849.4637495613007806671@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 12:30:14 -0000 Subject: SUSE-SU-2024:0071-1: low: Security update for tar Message-ID: <170488981493.13849.14864516857912821539@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0071-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Incorrectly handled extension attributes in PAX archives can lead to a crash (bsc#1217969) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-71=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-71=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-71=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * tar-1.27.1-15.24.1 * tar-debuginfo-1.27.1-15.24.1 * tar-debugsource-1.27.1-15.24.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * tar-lang-1.27.1-15.24.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * tar-1.27.1-15.24.1 * tar-debuginfo-1.27.1-15.24.1 * tar-debugsource-1.27.1-15.24.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * tar-lang-1.27.1-15.24.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * tar-1.27.1-15.24.1 * tar-debuginfo-1.27.1-15.24.1 * tar-debugsource-1.27.1-15.24.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * tar-lang-1.27.1-15.24.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:33:18 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 12:33:18 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170488999857.15566.15916369432986188827@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:36:21 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 12:36:21 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170489018191.15032.2007875791423733612@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-tests-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-backup-scripts-1.34-150000.3.34.1 * tar-doc-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-tests-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-backup-scripts-1.34-150000.3.34.1 * tar-doc-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Wed Jan 10 13:39:44 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:39:44 +0100 (CET) Subject: SUSE-CU-2024:99-1: Recommended update of bci/golang Message-ID: <20240110133944.15C4AFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:99-1 Container Tags : bci/golang:1.20 , bci/golang:1.20-2.5.4 , bci/golang:oldstable , bci/golang:oldstable-2.5.4 Container Release : 5.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 13:39:55 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:39:55 +0100 (CET) Subject: SUSE-CU-2024:100-1: Recommended update of bci/golang Message-ID: <20240110133955.E2477FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:100-1 Container Tags : bci/golang:1.20-openssl , bci/golang:1.20-openssl-9.4 , bci/golang:oldstable-openssl , bci/golang:oldstable-openssl-9.4 Container Release : 9.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 13:40:17 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:17 +0100 (CET) Subject: SUSE-CU-2024:101-1: Recommended update of bci/golang Message-ID: <20240110134017.CC588FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:101-1 Container Tags : bci/golang:1.21 , bci/golang:1.21-1.5.4 , bci/golang:latest , bci/golang:stable , bci/golang:stable-1.5.4 Container Release : 5.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 13:40:18 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:18 +0100 (CET) Subject: SUSE-CU-2024:102-1: Security update of bci/golang Message-ID: <20240110134018.AA13DFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:102-1 Container Tags : bci/golang:1.21 , bci/golang:1.21-1.5.6 , bci/golang:latest , bci/golang:stable , bci/golang:stable-1.5.6 Container Release : 5.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 13:40:29 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:29 +0100 (CET) Subject: SUSE-CU-2024:103-1: Recommended update of bci/golang Message-ID: <20240110134029.68894FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:103-1 Container Tags : bci/golang:1.21-openssl , bci/golang:1.21-openssl-9.4 , bci/golang:latest , bci/golang:stable-openssl , bci/golang:stable-openssl-9.4 Container Release : 9.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 13:40:30 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:30 +0100 (CET) Subject: SUSE-CU-2024:104-1: Security update of bci/golang Message-ID: <20240110134030.4228EFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:104-1 Container Tags : bci/golang:1.21-openssl , bci/golang:1.21-openssl-9.6 , bci/golang:latest , bci/golang:stable-openssl , bci/golang:stable-openssl-9.6 Container Release : 9.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 13:40:51 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:51 +0100 (CET) Subject: SUSE-CU-2024:105-1: Recommended update of bci/bci-init Message-ID: <20240110134051.774A4FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-init ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:105-1 Container Tags : bci/bci-init:15.5 , bci/bci-init:15.5.11.4 , bci/bci-init:latest Container Release : 11.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/bci-init was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 13:40:52 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:52 +0100 (CET) Subject: SUSE-CU-2024:106-1: Security update of bci/bci-init Message-ID: <20240110134052.08AC4FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-init ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:106-1 Container Tags : bci/bci-init:15.5 , bci/bci-init:15.5.11.6 , bci/bci-init:latest Container Release : 11.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/bci-init was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 13:41:00 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:00 +0100 (CET) Subject: SUSE-CU-2024:107-1: Recommended update of bci/bci-minimal Message-ID: <20240110134100.8FAE1FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-minimal ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:107-1 Container Tags : bci/bci-minimal:15.5 , bci/bci-minimal:15.5.14.3 , bci/bci-minimal:latest Container Release : 14.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/bci-minimal was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 13:41:15 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:15 +0100 (CET) Subject: SUSE-CU-2024:108-1: Recommended update of suse/nginx Message-ID: <20240110134115.DA625FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/nginx ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:108-1 Container Tags : suse/nginx:1.21 , suse/nginx:1.21-6.4 , suse/nginx:latest Container Release : 6.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/nginx was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 13:41:16 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:16 +0100 (CET) Subject: SUSE-CU-2024:109-1: Security update of suse/nginx Message-ID: <20240110134116.BC58BFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/nginx ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:109-1 Container Tags : suse/nginx:1.21 , suse/nginx:1.21-6.6 , suse/nginx:latest Container Release : 6.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/nginx was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 13:41:36 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:36 +0100 (CET) Subject: SUSE-CU-2024:110-1: Recommended update of bci/nodejs Message-ID: <20240110134136.BBA4DFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:110-1 Container Tags : bci/node:18 , bci/node:18-13.4 , bci/nodejs:18 , bci/nodejs:18-13.4 Container Release : 13.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 13:41:37 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:37 +0100 (CET) Subject: SUSE-CU-2024:111-1: Security update of bci/nodejs Message-ID: <20240110134137.9FA58FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:111-1 Container Tags : bci/node:18 , bci/node:18-13.6 , bci/nodejs:18 , bci/nodejs:18-13.6 Container Release : 13.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 13:41:43 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:43 +0100 (CET) Subject: SUSE-CU-2024:112-1: Recommended update of bci/nodejs Message-ID: <20240110134143.4746BFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:112-1 Container Tags : bci/node:20 , bci/node:20-3.4 , bci/node:latest , bci/nodejs:20 , bci/nodejs:20-3.4 , bci/nodejs:latest Container Release : 3.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 13:41:44 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:44 +0100 (CET) Subject: SUSE-CU-2024:113-1: Security update of bci/nodejs Message-ID: <20240110134144.1D54DFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:113-1 Container Tags : bci/node:20 , bci/node:20-3.6 , bci/node:latest , bci/nodejs:20 , bci/nodejs:20-3.6 , bci/nodejs:latest Container Release : 3.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 13:42:10 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:42:10 +0100 (CET) Subject: SUSE-CU-2024:114-1: Recommended update of bci/openjdk-devel Message-ID: <20240110134210.D9F43FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:114-1 Container Tags : bci/openjdk-devel:11 , bci/openjdk-devel:11-11.11 Container Release : 11.11 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:bci-openjdk-11-15.5.11-12.5 updated From sle-updates at lists.suse.com Wed Jan 10 13:42:11 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:42:11 +0100 (CET) Subject: SUSE-CU-2024:115-1: Security update of bci/openjdk-devel Message-ID: <20240110134211.AF769FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:115-1 Container Tags : bci/openjdk-devel:11 , bci/openjdk-devel:11-11.14 Container Release : 11.14 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:bci-openjdk-11-15.5.11-12.7 updated From sle-updates at lists.suse.com Wed Jan 10 13:42:33 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:42:33 +0100 (CET) Subject: SUSE-CU-2024:116-1: Recommended update of bci/openjdk Message-ID: <20240110134233.F3C67FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:116-1 Container Tags : bci/openjdk:11 , bci/openjdk:11-12.5 Container Release : 12.5 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 13:42:34 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:42:34 +0100 (CET) Subject: SUSE-CU-2024:117-1: Security update of bci/openjdk Message-ID: <20240110134234.D6912FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:117-1 Container Tags : bci/openjdk:11 , bci/openjdk:11-12.7 Container Release : 12.7 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 13:43:00 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:43:00 +0100 (CET) Subject: SUSE-CU-2024:118-1: Recommended update of bci/openjdk-devel Message-ID: <20240110134300.4BCF3FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:118-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-13.10 , bci/openjdk-devel:latest Container Release : 13.10 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:bci-openjdk-17-15.5.17-13.5 updated From sle-updates at lists.suse.com Wed Jan 10 13:43:01 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:43:01 +0100 (CET) Subject: SUSE-CU-2024:119-1: Security update of bci/openjdk-devel Message-ID: <20240110134301.3734BFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:119-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-13.14 , bci/openjdk-devel:latest Container Release : 13.14 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:bci-openjdk-17-15.5.17-13.7 updated From sle-updates at lists.suse.com Wed Jan 10 14:03:35 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:03:35 +0100 (CET) Subject: SUSE-CU-2024:119-1: Security update of bci/openjdk-devel Message-ID: <20240110140335.4A89EFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:119-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-13.14 , bci/openjdk-devel:latest Container Release : 13.14 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:bci-openjdk-17-15.5.17-13.7 updated From sle-updates at lists.suse.com Wed Jan 10 14:03:50 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:03:50 +0100 (CET) Subject: SUSE-CU-2024:120-1: Recommended update of bci/openjdk Message-ID: <20240110140350.93616FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:120-1 Container Tags : bci/openjdk:17 , bci/openjdk:17-13.5 , bci/openjdk:latest Container Release : 13.5 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 14:03:51 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:03:51 +0100 (CET) Subject: SUSE-CU-2024:121-1: Security update of bci/openjdk Message-ID: <20240110140351.1E5C6FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:121-1 Container Tags : bci/openjdk:17 , bci/openjdk:17-13.7 , bci/openjdk:latest Container Release : 13.7 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:04:10 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:10 +0100 (CET) Subject: SUSE-CU-2024:122-1: Recommended update of suse/pcp Message-ID: <20240110140410.D55A1FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/pcp ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:122-1 Container Tags : suse/pcp:5 , suse/pcp:5-19.9 , suse/pcp:5.2 , suse/pcp:5.2-19.9 , suse/pcp:5.2.5 , suse/pcp:5.2.5-19.9 , suse/pcp:latest Container Release : 19.9 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/pcp was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:bci-bci-init-15.5-15.5-11.4 updated From sle-updates at lists.suse.com Wed Jan 10 14:04:11 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:11 +0100 (CET) Subject: SUSE-CU-2024:123-1: Security update of suse/pcp Message-ID: <20240110140411.7AFA6FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/pcp ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:123-1 Container Tags : suse/pcp:5 , suse/pcp:5-19.12 , suse/pcp:5.2 , suse/pcp:5.2-19.12 , suse/pcp:5.2.5 , suse/pcp:5.2.5-19.12 , suse/pcp:latest Container Release : 19.12 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/pcp was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:bci-bci-init-15.5-15.5-11.6 updated From sle-updates at lists.suse.com Wed Jan 10 14:04:27 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:27 +0100 (CET) Subject: SUSE-CU-2024:124-1: Recommended update of bci/php-apache Message-ID: <20240110140427.78280FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/php-apache ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:124-1 Container Tags : bci/php-apache:8 , bci/php-apache:8-9.4 Container Release : 9.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/php-apache was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 14:04:28 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:28 +0100 (CET) Subject: SUSE-CU-2024:125-1: Security update of bci/php-apache Message-ID: <20240110140428.23FB8FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/php-apache ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:125-1 Container Tags : bci/php-apache:8 , bci/php-apache:8-9.6 Container Release : 9.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/php-apache was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:04:43 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:43 +0100 (CET) Subject: SUSE-CU-2024:126-1: Recommended update of bci/php-fpm Message-ID: <20240110140443.DBDA3FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/php-fpm ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:126-1 Container Tags : bci/php-fpm:8 , bci/php-fpm:8-9.4 Container Release : 9.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/php-fpm was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 14:04:44 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:44 +0100 (CET) Subject: SUSE-CU-2024:127-1: Security update of bci/php-fpm Message-ID: <20240110140444.65AADFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/php-fpm ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:127-1 Container Tags : bci/php-fpm:8 , bci/php-fpm:8-9.6 Container Release : 9.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/php-fpm was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:05:00 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:00 +0100 (CET) Subject: SUSE-CU-2024:129-1: Security update of bci/php Message-ID: <20240110140500.6DD47FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/php ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:129-1 Container Tags : bci/php:8 , bci/php:8-9.6 Container Release : 9.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/php was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:04:59 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:59 +0100 (CET) Subject: SUSE-CU-2024:128-1: Recommended update of bci/php Message-ID: <20240110140459.C7C5FFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/php ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:128-1 Container Tags : bci/php:8 , bci/php:8-9.4 Container Release : 9.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/php was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 14:05:20 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:20 +0100 (CET) Subject: SUSE-CU-2024:132-1: Recommended update of suse/postgres Message-ID: <20240110140520.40274FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:132-1 Container Tags : suse/postgres:16 , suse/postgres:16-3.3 , suse/postgres:16.1 , suse/postgres:16.1-3.3 , suse/postgres:latest Container Release : 3.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 14:05:17 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:17 +0100 (CET) Subject: SUSE-CU-2024:131-1: Security update of suse/postgres Message-ID: <20240110140517.352FBFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:131-1 Container Tags : suse/postgres:15 , suse/postgres:15-14.5 , suse/postgres:15.5 , suse/postgres:15.5-14.5 Container Release : 14.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:05:20 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:20 +0100 (CET) Subject: SUSE-CU-2024:133-1: Security update of suse/postgres Message-ID: <20240110140520.E3AF3FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:133-1 Container Tags : suse/postgres:16 , suse/postgres:16-3.5 , suse/postgres:16.1 , suse/postgres:16.1-3.5 , suse/postgres:latest Container Release : 3.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:05:16 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:16 +0100 (CET) Subject: SUSE-CU-2024:130-1: Recommended update of suse/postgres Message-ID: <20240110140516.8ADFAFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:130-1 Container Tags : suse/postgres:15 , suse/postgres:15-14.3 , suse/postgres:15.5 , suse/postgres:15.5-14.3 Container Release : 14.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 14:05:38 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:38 +0100 (CET) Subject: SUSE-CU-2024:135-1: Security update of bci/python Message-ID: <20240110140538.6F529FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:135-1 Container Tags : bci/python:3 , bci/python:3-14.3 , bci/python:3.11 , bci/python:3.11-14.3 , bci/python:latest Container Release : 14.3 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:05:55 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:55 +0100 (CET) Subject: SUSE-CU-2024:136-1: Recommended update of bci/python Message-ID: <20240110140555.8F85BFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:136-1 Container Tags : bci/python:3 , bci/python:3-15.3 , bci/python:3.6 , bci/python:3.6-15.3 Container Release : 15.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 14:05:37 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:37 +0100 (CET) Subject: SUSE-CU-2024:134-1: Recommended update of bci/python Message-ID: <20240110140537.CBEB6FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:134-1 Container Tags : bci/python:3 , bci/python:3-14.1 , bci/python:3.11 , bci/python:3.11-14.1 , bci/python:latest Container Release : 14.1 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-feature-2023:4502-1 Released: Tue Nov 21 12:14:58 2023 Summary: Feature update for python3 Type: feature Severity: low References: This feature update for python3 packages adds the following: - Second batch of new python-3.11 packages (jsc#PED-68) Updates to previosly released python 3.11 packages: - python-urllib3 to 2.0.7 - python-Sphinx to 7.2.6 - python-pytest to 7.4.2 - python-hypothesis to 6.82.7 - python-sphinxcontrib-serializinghtml to 1.1.9 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - python311-packaging-23.1-150400.8.3.9 added - python311-click-8.1.3-150400.7.3.9 added - python311-argcomplete-3.1.2-150400.12.5.1 added - python311-userpath-1.9.0-150400.9.3.1 added - python311-pipx-1.2.0-150400.9.3.1 added - container:sles15-image-15.0.0-36.5.70 updated From sle-updates at lists.suse.com Wed Jan 10 14:06:20 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:06:20 +0100 (CET) Subject: SUSE-CU-2024:139-1: Recommended update of bci/ruby Message-ID: <20240110140620.7A631FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/ruby ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:139-1 Container Tags : bci/ruby:2 , bci/ruby:2-13.3 , bci/ruby:2.5 , bci/ruby:2.5-13.3 , bci/ruby:latest Container Release : 13.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/ruby was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 14:05:56 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:56 +0100 (CET) Subject: SUSE-CU-2024:137-1: Security update of bci/python Message-ID: <20240110140556.41717FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:137-1 Container Tags : bci/python:3 , bci/python:3-15.5 , bci/python:3.6 , bci/python:3.6-15.5 Container Release : 15.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:06:04 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:06:04 +0100 (CET) Subject: SUSE-CU-2024:138-1: Security update of suse/rmt-server Message-ID: <20240110140604.9413BFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-server ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:138-1 Container Tags : suse/rmt-server:2.14 , suse/rmt-server:2.14-12.5 , suse/rmt-server:latest Container Release : 12.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/rmt-server was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:12:11 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:11 +0100 (CET) Subject: SUSE-CU-2024:139-1: Recommended update of bci/ruby Message-ID: <20240110141211.722BDFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/ruby ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:139-1 Container Tags : bci/ruby:2 , bci/ruby:2-13.3 , bci/ruby:2.5 , bci/ruby:2.5-13.3 , bci/ruby:latest Container Release : 13.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/ruby was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 14:12:12 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:12 +0100 (CET) Subject: SUSE-CU-2024:140-1: Security update of bci/ruby Message-ID: <20240110141212.308BDFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/ruby ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:140-1 Container Tags : bci/ruby:2 , bci/ruby:2-13.5 , bci/ruby:2.5 , bci/ruby:2.5-13.5 , bci/ruby:latest Container Release : 13.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/ruby was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:12:30 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:30 +0100 (CET) Subject: SUSE-CU-2024:141-1: Recommended update of bci/rust Message-ID: <20240110141230.79ADDFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:141-1 Container Tags : bci/rust:1.73 , bci/rust:1.73-2.3.3 , bci/rust:oldstable , bci/rust:oldstable-2.3.3 Container Release : 3.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 14:12:31 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:31 +0100 (CET) Subject: SUSE-CU-2024:142-1: Security update of bci/rust Message-ID: <20240110141231.2952AFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:142-1 Container Tags : bci/rust:1.73 , bci/rust:1.73-2.3.5 , bci/rust:oldstable , bci/rust:oldstable-2.3.5 Container Release : 3.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:12:51 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:51 +0100 (CET) Subject: SUSE-CU-2024:144-1: Security update of bci/rust Message-ID: <20240110141251.77AF9FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:144-1 Container Tags : bci/rust:1.74 , bci/rust:1.74-1.3.5 , bci/rust:latest , bci/rust:stable , bci/rust:stable-1.3.5 Container Release : 3.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:12:50 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:50 +0100 (CET) Subject: SUSE-CU-2024:143-1: Recommended update of bci/rust Message-ID: <20240110141250.AF2B4FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:143-1 Container Tags : bci/rust:1.74 , bci/rust:1.74-1.3.3 , bci/rust:latest , bci/rust:stable , bci/rust:stable-1.3.3 Container Release : 3.3 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 14:12:53 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:53 +0100 (CET) Subject: SUSE-CU-2024:145-1: Recommended update of bci/bci-sle15-kernel-module-devel Message-ID: <20240110141253.11641FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:145-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.3.4 , bci/bci-sle15-kernel-module-devel:latest Container Release : 3.4 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated - libxcrypt-devel-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 14:12:53 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:53 +0100 (CET) Subject: SUSE-CU-2024:146-1: Security update of bci/bci-sle15-kernel-module-devel Message-ID: <20240110141253.D62F1FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:146-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.3.6 , bci/bci-sle15-kernel-module-devel:latest Container Release : 3.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Wed Jan 10 14:13:11 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:13:11 +0100 (CET) Subject: SUSE-CU-2024:148-1: Security update of suse/sle15 Message-ID: <20240110141311.9AEEAFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:148-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.71 , suse/sle15:15.5 , suse/sle15:15.5.36.5.71 Container Release : 36.5.71 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-updates at lists.suse.com Wed Jan 10 14:13:10 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:13:10 +0100 (CET) Subject: SUSE-CU-2024:147-1: Recommended update of suse/sle15 Message-ID: <20240110141310.CEC00FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:147-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.70 , suse/sle15:15.5 , suse/sle15:15.5.36.5.70 Container Release : 36.5.70 Severity : moderate Type : recommended References : 1215496 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - libcrypt1-4.4.15-150300.4.7.1 updated From sle-updates at lists.suse.com Wed Jan 10 14:13:53 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:13:53 +0100 (CET) Subject: SUSE-CU-2024:149-1: Security update of suse/sle-micro/5.1/toolbox Message-ID: <20240110141353.064F7FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.1/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:149-1 Container Tags : suse/sle-micro/5.1/toolbox:12.1 , suse/sle-micro/5.1/toolbox:12.1-2.2.527 , suse/sle-micro/5.1/toolbox:latest Container Release : 2.2.527 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.1/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-updates at lists.suse.com Wed Jan 10 14:15:45 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:15:45 +0100 (CET) Subject: SUSE-CU-2024:151-1: Security update of suse/sle-micro/5.2/toolbox Message-ID: <20240110141545.21A2BFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.2/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:151-1 Container Tags : suse/sle-micro/5.2/toolbox:12.1 , suse/sle-micro/5.2/toolbox:12.1-6.2.349 , suse/sle-micro/5.2/toolbox:latest Container Release : 6.2.349 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.2/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From null at suse.de Wed Jan 10 20:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 20:30:01 -0000 Subject: SUSE-RU-2024:0080-1: moderate: Recommended update for rust, rust1.75 Message-ID: <170491860103.5672.10898426676066466892@smelt2.prg2.suse.org> # Recommended update for rust, rust1.75 Announcement ID: SUSE-RU-2024:0080-1 Rating: moderate References: * jsc#SLE-18626 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature can now be installed. ## Description: This update for rust, rust1.75 fixes the following issues: This update ships rust 1.75. # Version 1.75.0 (2023-12-28) ## Language * Stabilize `async fn` and return-position `impl Trait` in traits. * Allow function pointer signatures containing `&mut T` in `const` contexts. * Match `usize`/`isize` exhaustively with half-open ranges. * Guarantee that `char` has the same size and alignment as `u32`. * Document that the null pointer has the 0 address. * Allow partially moved values in `match`. * Add notes about non-compliant FP behavior on 32bit x86 targets. * Stabilize ratified RISC-V target features. ## Compiler * Rework negative coherence to properly consider impls that only partly overlap. * Bump `COINDUCTIVE_OVERLAP_IN_COHERENCE` to deny, and warn in dependencies. * Consider alias bounds when computing liveness in NLL. * Add the V (vector) extension to the `riscv64-linux-android` target spec. * Automatically enable cross-crate inlining for small functions ## Libraries * Override `Waker::clone_from` to avoid cloning `Waker`s unnecessarily. * Implement `BufRead` for `VecDeque<u8>`. * Implement `FusedIterator` for `DecodeUtf16` when the inner iterator does. * Implement `Not, Bit{And,Or}{,Assign}` for IP addresses. * Implement `Default` for `ExitCode`. * Guarantee representation of None in NPO * Document when atomic loads are guaranteed read-only. * Broaden the consequences of recursive TLS initialization. * Windows: Support sub-millisecond sleep. * Fix generic bound of `str::SplitInclusive`'s `DoubleEndedIterator` impl * Fix exit status / wait status on non-Unix `cfg(unix)` platforms. ## Stabilized APIs * `Atomic*::from_ptr` * `FileTimes` * `FileTimesExt` * `File::set_modified` * `File::set_times` * `IpAddr::to_canonical` * `Ipv6Addr::to_canonical` * `Option::as_slice` * `Option::as_mut_slice` * `pointer::byte_add` * `pointer::byte_offset` * `pointer::byte_offset_from` * `pointer::byte_sub` * `pointer::wrapping_byte_add` * `pointer::wrapping_byte_offset` * `pointer::wrapping_byte_sub` These APIs are now stable in const contexts: * `Ipv6Addr::to_ipv4_mapped` * `MaybeUninit::assume_init_read` * `MaybeUninit::zeroed` * `mem::discriminant` * `mem::zeroed` ## Cargo * Add new packages to `[workspace.members * Allow version-less `Cargo.toml` manifests. * Make browser links out of HTML file paths. ## Rustdoc * Accept less invalid Rust in rustdoc. * Document lack of object safety on affected traits. * Hide `#[repr(transparent) * Show enum discriminant if it is a C-like variant. ## Compatibility Notes * Make misalignment a hard error in `const` contexts. * Fix detecting references to packed unsized fields. * Remove support for compiler plugins. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-80=1 openSUSE-SLE-15.5-2024-80=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-80=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * cargo1.75-1.75.0-150500.11.3.1 * rust-1.75.0-150500.27.3.1 * cargo1.75-debuginfo-1.75.0-150500.11.3.1 * rust1.75-debuginfo-1.75.0-150500.11.3.1 * cargo-1.75.0-150500.27.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586 nosrc) * rust1.75-1.75.0-150500.11.3.1 * openSUSE Leap 15.5 (nosrc) * rust1.75-test-1.75.0-150500.11.3.2 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cargo1.75-1.75.0-150500.11.3.1 * rust-1.75.0-150500.27.3.1 * cargo1.75-debuginfo-1.75.0-150500.11.3.1 * rust1.75-debuginfo-1.75.0-150500.11.3.1 * cargo-1.75.0-150500.27.3.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc) * rust1.75-1.75.0-150500.11.3.1 ## References: * https://jira.suse.com/browse/SLE-18626 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 20:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 10 Jan 2024 20:30:02 -0000 Subject: SUSE-RU-2024:0079-1: moderate: Recommended update for azure-cli, python-azure-mgmt-appconfiguration, python-azure-mgmt-resource Message-ID: <170491860290.5672.9339137076546501530@smelt2.prg2.suse.org> # Recommended update for azure-cli, python-azure-mgmt-appconfiguration, python- azure-mgmt-resource Announcement ID: SUSE-RU-2024:0079-1 Rating: moderate References: * bsc#1201870 * bsc#1205340 Affected Products: * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 An update that has two fixes can now be installed. ## Description: This update for azure-cli, python-azure-mgmt-appconfiguration, python-azure- mgmt-resource fixes the following issues: * Add missing python3-azure-mgmt-resource dependency to Requires (bsc#1201870) * Downgrade to upstream version 0.6.0 * Downgrade to upstream version 10.3.0 (bsc#1205340) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-79=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-79=1 ## Package List: * Public Cloud Module 15-SP1 (noarch) * azure-cli-2.17.1-150100.6.14.2 * python2-azure-mgmt-appconfiguration-0.6.0-150100.3.6.2 * python3-azure-mgmt-appconfiguration-0.6.0-150100.3.6.2 * python2-azure-mgmt-resource-10.3.0-150100.6.10.2 * python3-azure-mgmt-resource-10.3.0-150100.6.10.2 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * azure-cli-test-2.17.1-150100.6.14.2 * Public Cloud Module 15-SP2 (noarch) * python2-azure-mgmt-appconfiguration-0.6.0-150100.3.6.2 * python2-azure-mgmt-resource-10.3.0-150100.6.10.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1201870 * https://bugzilla.suse.com/show_bug.cgi?id=1205340 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Thu Jan 11 08:01:46 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 11 Jan 2024 09:01:46 +0100 (CET) Subject: SUSE-CU-2024:152-1: Security update of suse/sle-micro/5.5/toolbox Message-ID: <20240111080146.E153AFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:152-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.133 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.133 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-updates at lists.suse.com Thu Jan 11 08:03:17 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 11 Jan 2024 09:03:17 +0100 (CET) Subject: SUSE-CU-2024:153-1: Recommended update of suse/sles12sp5 Message-ID: <20240111080317.BAE58FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sles12sp5 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:153-1 Container Tags : suse/sles12sp5:6.5.553 , suse/sles12sp5:latest Container Release : 6.5.553 Severity : moderate Type : recommended References : 1217948 ----------------------------------------------------------------- The container suse/sles12sp5 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:74-1 Released: Wed Jan 10 10:17:47 2024 Summary: Recommended update for libzypp, zypper Type: recommended Severity: moderate References: 1217948 This update for libzypp, zypper fixes the following issues: - Touch /run/reboot-needed if a patch suggesting a reboot was installed (bsc#1217948) - Backport needs-rebooting command from Code15 (bsc#1217948) The following package changes have been done: - libzypp-16.22.11-59.2 updated - zypper-1.13.65-21.58.2 updated From null at suse.de Thu Jan 11 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 11 Jan 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0089-1: important: Security update for gstreamer-plugins-bad Message-ID: <170497620316.14648.3972548595508472540@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-bad Announcement ID: SUSE-SU-2024:0089-1 Rating: important References: * bsc#1218534 Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that has one security fix can now be installed. ## Description: This update for gstreamer-plugins-bad fixes the following issues: * ZDI-CAN-22300: Fixed a buffer overflow in the AV1 video plugin (bsc#1218534). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-89=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-89=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-89=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-89=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libgstcodecparsers-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstVulkanXCB-1_0-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-devel-1.22.0-150500.3.20.1 * typelib-1_0-GstVulkan-1_0-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-debugsource-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgsttranscoder-1_0-0-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstCuda-1_0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-debuginfo-1.22.0-150500.3.20.1 * libgstcodecparsers-1_0-0-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-CudaGst-1_0-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstPlayer-1_0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-1.22.0-150500.3.20.1 * libgstva-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstWebRTC-1_0-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstVa-1_0-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstTranscoder-1_0-1.22.0-150500.3.20.1 * typelib-1_0-GstInsertBin-1_0-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-transcoder-1.22.0-150500.3.20.1 * typelib-1_0-GstBadAudio-1_0-1.22.0-150500.3.20.1 * typelib-1_0-GstMpegts-1_0-1.22.0-150500.3.20.1 * gstreamer-transcoder-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-1.22.0-150500.3.20.1 * libgstplay-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstva-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstVulkanWayland-1_0-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstplay-1_0-0-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstPlay-1_0-1.22.0-150500.3.20.1 * typelib-1_0-GstCodecs-1_0-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgsttranscoder-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-transcoder-devel-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-debuginfo-1.22.0-150500.3.20.1 * openSUSE Leap 15.5 (x86_64) * libgstsctp-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstplay-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstplay-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-32bit-1.22.0-150500.3.20.1 * libgstva-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstcodecparsers-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-32bit-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-32bit-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-32bit-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstva-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstcodecparsers-1_0-0-32bit-1.22.0-150500.3.20.1 * openSUSE Leap 15.5 (noarch) * gstreamer-plugins-bad-lang-1.22.0-150500.3.20.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libgstva-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstcodecparsers-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstplay-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstplay-1_0-0-64bit-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-64bit-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstva-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstcodecparsers-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-64bit-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-64bit-debuginfo-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-64bit-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-64bit-1.22.0-150500.3.20.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gstreamer-plugins-bad-debuginfo-1.22.0-150500.3.20.1 * libgstplay-1_0-0-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-debugsource-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-1.22.0-150500.3.20.1 * libgstplay-1_0-0-debuginfo-1.22.0-150500.3.20.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libgstcodecparsers-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-devel-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-debugsource-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgsttranscoder-1_0-0-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstCuda-1_0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-debuginfo-1.22.0-150500.3.20.1 * libgstcodecparsers-1_0-0-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-CudaGst-1_0-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstPlayer-1_0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-1.22.0-150500.3.20.1 * libgstva-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstWebRTC-1_0-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstVa-1_0-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstInsertBin-1_0-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstBadAudio-1_0-1.22.0-150500.3.20.1 * typelib-1_0-GstMpegts-1_0-1.22.0-150500.3.20.1 * libgstva-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstPlay-1_0-1.22.0-150500.3.20.1 * typelib-1_0-GstCodecs-1_0-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgsttranscoder-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-debuginfo-1.22.0-150500.3.20.1 * Desktop Applications Module 15-SP5 (noarch) * gstreamer-plugins-bad-lang-1.22.0-150500.3.20.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * gstreamer-plugins-bad-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-debugsource-1.22.0-150500.3.20.1 * libgsttranscoder-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgsttranscoder-1_0-0-1.22.0-150500.3.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218534 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 11 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 11 Jan 2024 12:30:06 -0000 Subject: SUSE-RU-2024:0088-1: moderate: Recommended update for libsolv, zypper, libzypp Message-ID: <170497620685.14648.14334277261229407236@smelt2.prg2.suse.org> # Recommended update for libsolv, zypper, libzypp Announcement ID: SUSE-RU-2024:0088-1 Rating: moderate References: * bsc#1212160 * bsc#1215294 * bsc#1216412 * bsc#1217593 * bsc#1217873 * bsc#1218291 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has six fixes can now be installed. ## Description: This update for libsolv, zypper, libzypp fixes the following issues: * Expand RepoVars in URLs downloading a .repo file (bsc#1212160) * Fix search/info commands ignoring --ignore-unknown (bsc#1217593) * CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) * Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) * Make sure reboot-needed is remembered until next boot (bsc#1217873) * Stop using boost version 1 timer library (bsc#1215294) * Updated to version 0.7.27 * Add zstd support for the installcheck tool * Add putinowndirpool cache to make file list handling in repo_write much faster * Do not use deprecated headerUnload with newer rpm versions * Support complex deps in SOLVABLE_PREREQ_IGNOREINST * Fix minimization not prefering installed packages in some cases * Reduce memory usage in repo_updateinfoxml * Fix lock-step interfering with architecture selection * Fix choice rule handing for package downgrades * Fix complex dependencies with an "else" part sometimes leading to unsolved dependencies ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-88=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-88=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-88=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-88=1 SUSE-SLE- INSTALLER-15-SP4-2024-88=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-88=1 SUSE-SLE-Product- SLES_SAP-15-SP4-2024-88=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-88=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-88=1 SUSE-SLE-Product-SUSE- Manager-Retail-Branch-Server-4.3-2024-88=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-88=1 SUSE-SLE-Product-SUSE- Manager-Proxy-4.3-2024-88=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-88=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-88=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-88=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-88=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-88=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-88=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-88=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-88=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-88=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-88=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-88=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-88=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-88=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-88=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-88=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-88=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-88=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-88=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-88=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-solv-0.7.27-150400.3.11.2 * libsolv-demo-0.7.27-150400.3.11.2 * libsolv-devel-debuginfo-0.7.27-150400.3.11.2 * libsolv-debugsource-0.7.27-150400.3.11.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-devel-0.7.27-150400.3.11.2 * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * python3-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-debuginfo-1.14.68-150400.3.40.2 * libzypp-devel-doc-17.31.27-150400.3.49.1 * libsolv-debuginfo-0.7.27-150400.3.11.2 * python3-solv-0.7.27-150400.3.11.2 * perl-solv-0.7.27-150400.3.11.2 * perl-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-demo-debuginfo-0.7.27-150400.3.11.2 * libsolv-tools-0.7.27-150400.3.11.2 * libzypp-devel-17.31.27-150400.3.49.1 * zypper-debugsource-1.14.68-150400.3.40.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * ruby-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-1.14.68-150400.3.40.2 * python-solv-debuginfo-0.7.27-150400.3.11.2 * ruby-solv-0.7.27-150400.3.11.2 * openSUSE Leap 15.5 (noarch) * zypper-aptitude-1.14.68-150400.3.40.2 * zypper-needs-restarting-1.14.68-150400.3.40.2 * zypper-log-1.14.68-150400.3.40.2 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libzypp-17.31.27-150400.3.49.1 * libsolv-tools-0.7.27-150400.3.11.2 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.27-150400.3.49.1 * libsolv-tools-0.7.27-150400.3.11.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * python3-solv-0.7.27-150400.3.11.2 * ruby-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-devel-0.7.27-150400.3.11.2 * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * python3-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-debuginfo-1.14.68-150400.3.40.2 * zypper-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-devel-debuginfo-0.7.27-150400.3.11.2 * libzypp-devel-17.31.27-150400.3.49.1 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * ruby-solv-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Manager Server 4.3 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * zypper-log-1.14.68-150400.3.40.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python3-solv-0.7.27-150400.3.11.2 * ruby-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-devel-0.7.27-150400.3.11.2 * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * perl-solv-0.7.27-150400.3.11.2 * perl-solv-debuginfo-0.7.27-150400.3.11.2 * python3-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-1.14.68-150400.3.40.2 * zypper-debuginfo-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-devel-debuginfo-0.7.27-150400.3.11.2 * libzypp-devel-17.31.27-150400.3.49.1 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * ruby-solv-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * zypper-log-1.14.68-150400.3.40.2 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libzypp-17.31.27-150400.3.49.1 * libsolv-tools-0.7.27-150400.3.11.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * python3-solv-0.7.27-150400.3.11.2 * ruby-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-devel-0.7.27-150400.3.11.2 * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * python3-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-debuginfo-1.14.68-150400.3.40.2 * zypper-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-devel-debuginfo-0.7.27-150400.3.11.2 * libzypp-devel-17.31.27-150400.3.49.1 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * ruby-solv-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * zypper-log-1.14.68-150400.3.40.2 * SUSE Manager Proxy 4.3 (x86_64) * python3-solv-0.7.27-150400.3.11.2 * ruby-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-devel-0.7.27-150400.3.11.2 * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * python3-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-debuginfo-1.14.68-150400.3.40.2 * zypper-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-devel-debuginfo-0.7.27-150400.3.11.2 * libzypp-devel-17.31.27-150400.3.49.1 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * ruby-solv-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Manager Proxy 4.3 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * zypper-log-1.14.68-150400.3.40.2 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libzypp-17.31.27-150400.3.49.1 * libsolv-tools-0.7.27-150400.3.11.2 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.27-150400.3.49.1 * libsolv-tools-0.7.27-150400.3.11.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libzypp-17.31.27-150400.3.49.1 * libsolv-tools-0.7.27-150400.3.11.2 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libzypp-17.31.27-150400.3.49.1 * libsolv-tools-0.7.27-150400.3.11.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * zypper-debuginfo-1.14.68-150400.3.40.2 * zypper-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * zypper-debuginfo-1.14.68-150400.3.40.2 * zypper-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * zypper-debuginfo-1.14.68-150400.3.40.2 * zypper-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * zypper-debuginfo-1.14.68-150400.3.40.2 * zypper-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * zypper-debuginfo-1.14.68-150400.3.40.2 * zypper-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-solv-0.7.27-150400.3.11.2 * ruby-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-devel-0.7.27-150400.3.11.2 * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * python3-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-debuginfo-1.14.68-150400.3.40.2 * zypper-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-devel-debuginfo-0.7.27-150400.3.11.2 * libzypp-devel-17.31.27-150400.3.49.1 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * ruby-solv-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * Basesystem Module 15-SP5 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * zypper-log-1.14.68-150400.3.40.2 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libsolv-debugsource-0.7.27-150400.3.11.2 * perl-solv-0.7.27-150400.3.11.2 * perl-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python3-solv-0.7.27-150400.3.11.2 * ruby-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-devel-0.7.27-150400.3.11.2 * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * perl-solv-0.7.27-150400.3.11.2 * perl-solv-debuginfo-0.7.27-150400.3.11.2 * python3-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-1.14.68-150400.3.40.2 * zypper-debuginfo-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-devel-debuginfo-0.7.27-150400.3.11.2 * libzypp-devel-17.31.27-150400.3.49.1 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * ruby-solv-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * zypper-log-1.14.68-150400.3.40.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python3-solv-0.7.27-150400.3.11.2 * ruby-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-devel-0.7.27-150400.3.11.2 * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * perl-solv-0.7.27-150400.3.11.2 * perl-solv-debuginfo-0.7.27-150400.3.11.2 * python3-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-1.14.68-150400.3.40.2 * zypper-debuginfo-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-devel-debuginfo-0.7.27-150400.3.11.2 * libzypp-devel-17.31.27-150400.3.49.1 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * ruby-solv-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * zypper-log-1.14.68-150400.3.40.2 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * python3-solv-0.7.27-150400.3.11.2 * ruby-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-devel-0.7.27-150400.3.11.2 * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * perl-solv-0.7.27-150400.3.11.2 * perl-solv-debuginfo-0.7.27-150400.3.11.2 * python3-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-1.14.68-150400.3.40.2 * zypper-debuginfo-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-devel-debuginfo-0.7.27-150400.3.11.2 * libzypp-devel-17.31.27-150400.3.49.1 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * ruby-solv-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * zypper-log-1.14.68-150400.3.40.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python3-solv-0.7.27-150400.3.11.2 * ruby-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-devel-0.7.27-150400.3.11.2 * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * perl-solv-0.7.27-150400.3.11.2 * perl-solv-debuginfo-0.7.27-150400.3.11.2 * python3-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-1.14.68-150400.3.40.2 * zypper-debuginfo-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-devel-debuginfo-0.7.27-150400.3.11.2 * libzypp-devel-17.31.27-150400.3.49.1 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * ruby-solv-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * zypper-log-1.14.68-150400.3.40.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python3-solv-0.7.27-150400.3.11.2 * ruby-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-devel-0.7.27-150400.3.11.2 * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * perl-solv-0.7.27-150400.3.11.2 * perl-solv-debuginfo-0.7.27-150400.3.11.2 * python3-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-1.14.68-150400.3.40.2 * zypper-debuginfo-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-devel-debuginfo-0.7.27-150400.3.11.2 * libzypp-devel-17.31.27-150400.3.49.1 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * ruby-solv-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * zypper-log-1.14.68-150400.3.40.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python-solv-0.7.27-150400.3.11.2 * libsolv-demo-0.7.27-150400.3.11.2 * libsolv-devel-debuginfo-0.7.27-150400.3.11.2 * libsolv-debugsource-0.7.27-150400.3.11.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-devel-0.7.27-150400.3.11.2 * libzypp-17.31.27-150400.3.49.1 * python3-solv-debuginfo-0.7.27-150400.3.11.2 * libzypp-debuginfo-17.31.27-150400.3.49.1 * zypper-debuginfo-1.14.68-150400.3.40.2 * libzypp-devel-doc-17.31.27-150400.3.49.1 * libsolv-debuginfo-0.7.27-150400.3.11.2 * python3-solv-0.7.27-150400.3.11.2 * perl-solv-0.7.27-150400.3.11.2 * perl-solv-debuginfo-0.7.27-150400.3.11.2 * libsolv-demo-debuginfo-0.7.27-150400.3.11.2 * libsolv-tools-0.7.27-150400.3.11.2 * libzypp-devel-17.31.27-150400.3.49.1 * zypper-debugsource-1.14.68-150400.3.40.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * ruby-solv-debuginfo-0.7.27-150400.3.11.2 * zypper-1.14.68-150400.3.40.2 * python-solv-debuginfo-0.7.27-150400.3.11.2 * ruby-solv-0.7.27-150400.3.11.2 * openSUSE Leap 15.4 (noarch) * zypper-aptitude-1.14.68-150400.3.40.2 * zypper-needs-restarting-1.14.68-150400.3.40.2 * zypper-log-1.14.68-150400.3.40.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * zypper-debuginfo-1.14.68-150400.3.40.2 * zypper-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * openSUSE Leap Micro 5.3 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libzypp-17.31.27-150400.3.49.1 * libzypp-debuginfo-17.31.27-150400.3.49.1 * zypper-debuginfo-1.14.68-150400.3.40.2 * zypper-1.14.68-150400.3.40.2 * libsolv-tools-0.7.27-150400.3.11.2 * libsolv-debugsource-0.7.27-150400.3.11.2 * zypper-debugsource-1.14.68-150400.3.40.2 * libsolv-tools-debuginfo-0.7.27-150400.3.11.2 * libsolv-debuginfo-0.7.27-150400.3.11.2 * libzypp-debugsource-17.31.27-150400.3.49.1 * openSUSE Leap Micro 5.4 (noarch) * zypper-needs-restarting-1.14.68-150400.3.40.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212160 * https://bugzilla.suse.com/show_bug.cgi?id=1215294 * https://bugzilla.suse.com/show_bug.cgi?id=1216412 * https://bugzilla.suse.com/show_bug.cgi?id=1217593 * https://bugzilla.suse.com/show_bug.cgi?id=1217873 * https://bugzilla.suse.com/show_bug.cgi?id=1218291 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 11 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 11 Jan 2024 12:30:10 -0000 Subject: SUSE-RU-2024:0087-1: moderate: Recommended update for pesign Message-ID: <170497621041.14648.1134793782885968387@smelt2.prg2.suse.org> # Recommended update for pesign Announcement ID: SUSE-RU-2024:0087-1 Rating: moderate References: * jsc#PED-7256 * jsc#PED-7314 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains two features can now be installed. ## Description: This update for pesign fixes the following issue: * Create pesign-systemd subpackage to remove systemd dependency (jsc#PED-7256) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-87=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-87=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-87=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-87=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-87=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-87=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-87=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-87=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-87=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-87=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-87=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-87=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-87=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-87=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-87=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-87=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-87=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-87=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-87=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-87=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-87=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-87=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-87=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-87=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.4 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * openSUSE Leap 15.4 (noarch) * pesign-systemd-0.112-150000.4.18.1 * openSUSE Leap 15.5 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * openSUSE Leap 15.5 (noarch) * pesign-systemd-0.112-150000.4.18.1 * Basesystem Module 15-SP4 (noarch) * pesign-systemd-0.112-150000.4.18.1 * Basesystem Module 15-SP4 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * Basesystem Module 15-SP5 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * Basesystem Module 15-SP5 (noarch) * pesign-systemd-0.112-150000.4.18.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * pesign-systemd-0.112-150000.4.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * pesign-systemd-0.112-150000.4.18.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * pesign-systemd-0.112-150000.4.18.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * pesign-systemd-0.112-150000.4.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * pesign-systemd-0.112-150000.4.18.1 * SUSE Manager Proxy 4.3 (x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Manager Server 4.3 (x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 * SUSE CaaS Platform 4.0 (x86_64) * pesign-debugsource-0.112-150000.4.18.1 * pesign-0.112-150000.4.18.1 * pesign-debuginfo-0.112-150000.4.18.1 ## References: * https://jira.suse.com/browse/PED-7256 * https://jira.suse.com/browse/PED-7314 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 11 12:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 11 Jan 2024 12:30:12 -0000 Subject: SUSE-RU-2024:0086-1: important: Recommended update for SAPHanaSR-ScaleOut Message-ID: <170497621275.14648.11091772304352893468@smelt2.prg2.suse.org> # Recommended update for SAPHanaSR-ScaleOut Announcement ID: SUSE-RU-2024:0086-1 Rating: important References: * bsc#1215693 * bsc#1216484 * bsc#1217830 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SAP Applications Module 15-SP2 * SAP Applications Module 15-SP1 * SAP Applications Module 15-SP3 * SAP Applications Module 15-SP4 * SAP Applications Module 15-SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has three fixes can now be installed. ## Description: This update for SAPHanaSR-ScaleOut fixes the following issues: * SAPHanaSR-ScaleOut was updated to version 0.185.2: * Fixed cluster state in SAPHanaSR-manageAttr by supporting the different behaviour of 'crmadmin -q -S' in different pacemaker versions (bsc#1217830) * Inside SAPHanaSR-hookHelper use the full path for the cibadmin command to support non root users in special user environments (bsc#1216484) * If the SAPHanaSrMultiTarget hook has successfully reported a SR event to the cluster a still existing fall-back state file will be removed to prevent an override of an already reported SR state. (bsc#1215693) * Updated man pages: SAPHanaSR-ScaleOut_basic_cluster.7 SAPHanaSR_maintenance_examples.7 ocf_suse_SAPHanaTopology.7 ocf_suse_SAPHanaController.7 SAPHanaSR-showAttr.8 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SAP Applications Module 15-SP2 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP2-2024-86=1 * SAP Applications Module 15-SP3 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP3-2024-86=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-86=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-86=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-86=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-86=1 * SAP Applications Module 15-SP1 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP1-2024-86=1 ## Package List: * SAP Applications Module 15-SP2 (noarch) * SAPHanaSR-ScaleOut-doc-0.185.2-150000.42.1 * SAPHanaSR-ScaleOut-0.185.2-150000.42.1 * SAP Applications Module 15-SP3 (noarch) * SAPHanaSR-ScaleOut-doc-0.185.2-150000.42.1 * SAPHanaSR-ScaleOut-0.185.2-150000.42.1 * SAP Applications Module 15-SP4 (noarch) * SAPHanaSR-ScaleOut-doc-0.185.2-150000.42.1 * SAPHanaSR-ScaleOut-0.185.2-150000.42.1 * SAP Applications Module 15-SP5 (noarch) * SAPHanaSR-ScaleOut-doc-0.185.2-150000.42.1 * SAPHanaSR-ScaleOut-0.185.2-150000.42.1 * openSUSE Leap 15.4 (noarch) * SAPHanaSR-ScaleOut-doc-0.185.2-150000.42.1 * SAPHanaSR-ScaleOut-0.185.2-150000.42.1 * openSUSE Leap 15.5 (noarch) * SAPHanaSR-ScaleOut-doc-0.185.2-150000.42.1 * SAPHanaSR-ScaleOut-0.185.2-150000.42.1 * SAP Applications Module 15-SP1 (noarch) * SAPHanaSR-ScaleOut-doc-0.185.2-150000.42.1 * SAPHanaSR-ScaleOut-0.185.2-150000.42.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215693 * https://bugzilla.suse.com/show_bug.cgi?id=1216484 * https://bugzilla.suse.com/show_bug.cgi?id=1217830 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 11 12:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 11 Jan 2024 12:30:14 -0000 Subject: SUSE-RU-2024:0085-1: important: Recommended update for SAPHanaSR-ScaleOut Message-ID: <170497621457.14648.8234947505915027793@smelt2.prg2.suse.org> # Recommended update for SAPHanaSR-ScaleOut Announcement ID: SUSE-RU-2024:0085-1 Rating: important References: * bsc#1215693 * bsc#1216484 * bsc#1217830 Affected Products: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has three fixes can now be installed. ## Description: This update for SAPHanaSR-ScaleOut fixes the following issues: * SAPHanaSR-ScaleOut was updated to version 0.185.2: * Fixed cluster state in SAPHanaSR-manageAttr by supporting the different behaviour of 'crmadmin -q -S' in different pacemaker versions (bsc#1217830) * Inside SAPHanaSR-hookHelper use the full path for the cibadmin command to support non root users in special user environments (bsc#1216484) * If the SAPHanaSrMultiTarget hook has successfully reported a SR event to the cluster a still existing fall-back state file will be removed to prevent an override of an already reported SR state. (bsc#1215693) * Updated man pages: SAPHanaSR-ScaleOut.7 SAPHanaSR-ScaleOut_basic_cluster.7 SAPHanaSR_maintenance_examples.7 ocf_suse_SAPHanaTopology.7 ocf_suse_SAPHanaController.7 SAPHanaSR-showAttr.8 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SAP-12-SP5-2024-85=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * SAPHanaSR-ScaleOut-doc-0.185.2-3.38.2 * SAPHanaSR-ScaleOut-0.185.2-3.38.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215693 * https://bugzilla.suse.com/show_bug.cgi?id=1216484 * https://bugzilla.suse.com/show_bug.cgi?id=1217830 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 11 12:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 11 Jan 2024 12:30:16 -0000 Subject: SUSE-RU-2024:0084-1: moderate: Recommended update for sapstartsrv-resource-agents Message-ID: <170497621656.14648.13804732415395718886@smelt2.prg2.suse.org> # Recommended update for sapstartsrv-resource-agents Announcement ID: SUSE-RU-2024:0084-1 Rating: moderate References: * bsc#1210790 * bsc#1217276 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SAP Applications Module 15-SP2 * SAP Applications Module 15-SP1 * SAP Applications Module 15-SP3 * SAP Applications Module 15-SP4 * SAP Applications Module 15-SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for sapstartsrv-resource-agents fixes the following issues: sapstartsrv-resource-agents was updated from version 0.9.2 to 0.9.4: * Version 0.9.4: * Fixed error in exception handling of sapstartsrv status function (bsc#1217276) * Version 0.9.3: * Adapted fix for monitor/probe operation to detect a running sapstartsrv process to run with python3-psutil version 5.2.2 or higher (bsc#1210790) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-84=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-84=1 * SAP Applications Module 15-SP1 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP1-2024-84=1 * SAP Applications Module 15-SP2 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP2-2024-84=1 * SAP Applications Module 15-SP3 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP3-2024-84=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-84=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-84=1 ## Package List: * openSUSE Leap 15.4 (noarch) * sapstartsrv-resource-agents-0.9.4+git.1702393371.1758e33-150000.1.21.1 * openSUSE Leap 15.5 (noarch) * sapstartsrv-resource-agents-0.9.4+git.1702393371.1758e33-150000.1.21.1 * SAP Applications Module 15-SP1 (noarch) * sapstartsrv-resource-agents-0.9.4+git.1702393371.1758e33-150000.1.21.1 * SAP Applications Module 15-SP2 (noarch) * sapstartsrv-resource-agents-0.9.4+git.1702393371.1758e33-150000.1.21.1 * SAP Applications Module 15-SP3 (noarch) * sapstartsrv-resource-agents-0.9.4+git.1702393371.1758e33-150000.1.21.1 * SAP Applications Module 15-SP4 (noarch) * sapstartsrv-resource-agents-0.9.4+git.1702393371.1758e33-150000.1.21.1 * SAP Applications Module 15-SP5 (noarch) * sapstartsrv-resource-agents-0.9.4+git.1702393371.1758e33-150000.1.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1210790 * https://bugzilla.suse.com/show_bug.cgi?id=1217276 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 11 12:30:21 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 11 Jan 2024 12:30:21 -0000 Subject: SUSE-RU-2024:0083-1: moderate: Recommended update for ceph Message-ID: <170497622192.14648.14275543212677686214@smelt2.prg2.suse.org> # Recommended update for ceph Announcement ID: SUSE-RU-2024:0083-1 Rating: moderate References: * bsc#1199880 * bsc#1201088 * bsc#1208820 * bsc#1209621 * bsc#1210153 * bsc#1210243 * bsc#1210314 * bsc#1210719 * bsc#1210784 * bsc#1210944 * bsc#1211090 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that has 11 fixes can now be installed. ## Description: This update for ceph fixes the following issues: * Fix FTBFS on gcc 13 (bsc#1201088) * Fix FTBFS on s390x (bsc#1211090) * ceph-volume: Fix regression in activate (bsc#1210243, bsc#1210314) * cephadm: Fix NFS haproxy failover if active node disappears (bsc#1209621) * cephadm: Mount host /etc/hosts for daemon containers in podman deployments (bsc#1210719) * cmake: Patch boost source to support python 3.11 (bsc#1210944) * mgr: Don't dump global config holding gil (bsc#1199880) * mgr/cephadm: Fix handling of mgr upgrades with 3 or more mgrs (bsc#1210153) * mgr/dashboard: allow to pass controls on iscsi disk create (bsc#1208820) * mgr/dashboard: Fix SSO error: 'str' object has no attribute 'decode' (bsc#1210784) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-83=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-83=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-83=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2024-83=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-83=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-83=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2024-83=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2024-83=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2024-83=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-83=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-83=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-83=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-83=1 ## Package List: * openSUSE Leap 15.3 (x86_64) * ceph-test-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-test-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-test-16.2.13.66+g54799ee0666-150300.5.10.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * rbd-nbd-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephsqlite-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-fuse-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-fuse-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-osd-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephsqlite-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-mds-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * rados-objclass-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-mgr-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-16.2.13.66+g54799ee0666-150300.5.10.1 * cephfs-mirror-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-mon-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-mds-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-base-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-osd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-radosgw-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-16.2.13.66+g54799ee0666-150300.5.10.1 * libradospp-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-mirror-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-fuse-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-radosgw-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-base-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-fuse-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephsqlite-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * cephfs-shell-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-mirror-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-immutable-object-cache-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-immutable-object-cache-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-mgr-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * cephfs-mirror-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-mon-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * openSUSE Leap 15.3 (noarch) * ceph-mgr-rook-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-mgr-modules-core-16.2.13.66+g54799ee0666-150300.5.10.1 * cephadm-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-mgr-cephadm-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-prometheus-alerts-16.2.13.66+g54799ee0666-150300.5.10.1 * cephfs-top-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-mgr-diskprediction-local-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-mgr-k8sevents-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-mgr-dashboard-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-grafana-dashboards-16.2.13.66+g54799ee0666-150300.5.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * rbd-nbd-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * rados-objclass-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libradospp-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * rbd-nbd-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * rados-objclass-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libradospp-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * rbd-nbd-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * rados-objclass-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libradospp-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * rbd-nbd-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * rados-objclass-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libradospp-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * rbd-nbd-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * rados-objclass-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libradospp-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * SUSE Manager Proxy 4.2 (x86_64) * rbd-nbd-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * rados-objclass-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libradospp-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * rbd-nbd-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * rados-objclass-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libradospp-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * rbd-nbd-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * rados-objclass-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libradospp-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * rbd-nbd-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * rados-objclass-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libradospp-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-16.2.13.66+g54799ee0666-150300.5.10.1 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rados-16.2.13.66+g54799ee0666-150300.5.10.1 * librados-devel-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 x86_64) * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-16.2.13.66+g54799ee0666-150300.5.10.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.5.10.1 * librbd1-16.2.13.66+g54799ee0666-150300.5.10.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1199880 * https://bugzilla.suse.com/show_bug.cgi?id=1201088 * https://bugzilla.suse.com/show_bug.cgi?id=1208820 * https://bugzilla.suse.com/show_bug.cgi?id=1209621 * https://bugzilla.suse.com/show_bug.cgi?id=1210153 * https://bugzilla.suse.com/show_bug.cgi?id=1210243 * https://bugzilla.suse.com/show_bug.cgi?id=1210314 * https://bugzilla.suse.com/show_bug.cgi?id=1210719 * https://bugzilla.suse.com/show_bug.cgi?id=1210784 * https://bugzilla.suse.com/show_bug.cgi?id=1210944 * https://bugzilla.suse.com/show_bug.cgi?id=1211090 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 11 12:30:23 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 11 Jan 2024 12:30:23 -0000 Subject: SUSE-RU-2024:0082-1: moderate: Recommended update for ceph Message-ID: <170497622369.14648.1981373278326565249@smelt2.prg2.suse.org> # Recommended update for ceph Announcement ID: SUSE-RU-2024:0082-1 Rating: moderate References: Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Server 15 SP3 An update that can now be installed. ## Description: This update for ceph fixes the following issues: * Fix build versioning to resolve installation conflicts (no source code changes) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-82=1 ## Package List: * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150300.9.1 * ceph-common-16.2.13.66+g54799ee0666-150300.9.1 * ceph-base-16.2.13.66+g54799ee0666-150300.9.1 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150300.9.1 * librados2-16.2.13.66+g54799ee0666-150300.9.1 * python3-rgw-16.2.13.66+g54799ee0666-150300.9.1 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150300.9.1 * python3-rbd-16.2.13.66+g54799ee0666-150300.9.1 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150300.9.1 * python3-ceph-common-16.2.13.66+g54799ee0666-150300.9.1 * librgw2-16.2.13.66+g54799ee0666-150300.9.1 * librbd1-16.2.13.66+g54799ee0666-150300.9.1 * librados2-debuginfo-16.2.13.66+g54799ee0666-150300.9.1 * libcephfs2-16.2.13.66+g54799ee0666-150300.9.1 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150300.9.1 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150300.9.1 * python3-cephfs-16.2.13.66+g54799ee0666-150300.9.1 * ceph-debugsource-16.2.13.66+g54799ee0666-150300.9.1 * ceph-base-debuginfo-16.2.13.66+g54799ee0666-150300.9.1 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.9.1 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150300.9.1 * rbd-nbd-16.2.13.66+g54799ee0666-150300.9.1 * python3-rados-16.2.13.66+g54799ee0666-150300.9.1 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150300.9.1 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150300.9.1 * SUSE Enterprise Storage 7.1 (noarch) * cephadm-16.2.13.66+g54799ee0666-150300.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 11 12:30:29 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 11 Jan 2024 12:30:29 -0000 Subject: SUSE-RU-2024:0081-1: moderate: Recommended update for ceph Message-ID: <170497622901.14648.9217111133263706507@smelt2.prg2.suse.org> # Recommended update for ceph Announcement ID: SUSE-RU-2024:0081-1 Rating: moderate References: * bsc#1199880 * bsc#1201088 * bsc#1208820 * bsc#1209621 * bsc#1210153 * bsc#1210243 * bsc#1210314 * bsc#1210719 * bsc#1210784 * bsc#1210944 * bsc#1211090 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has 11 fixes can now be installed. ## Description: This update for ceph fixes the following issues: * Fix FTBFS on gcc 13 (bsc#1201088) * Fix FTBFS on s390x (bsc#1211090) * ceph-volume: Fix regression in activate (bsc#1210243, bsc#1210314) * cephadm: Fix NFS haproxy failover if active node disappears (bsc#1209621) * cephadm: Mount host /etc/hosts for daemon containers in podman deployments (bsc#1210719) * cmake: Patch boost source to support python 3.11 (bsc#1210944) * mgr: Don't dump global config holding gil (bsc#1199880) * mgr/cephadm: Fix handling of mgr upgrades with 3 or more mgrs (bsc#1210153) * mgr/dashboard: allow to pass controls on iscsi disk create (bsc#1208820) * mgr/dashboard: Fix SSO error: 'str' object has no attribute 'decode' (bsc#1210784) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-81=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-81=1 SUSE-2024-81=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-81=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-81=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-81=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-81=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-81=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-81=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-81=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-81=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-81=1 ## Package List: * openSUSE Leap Micro 5.4 (aarch64 x86_64) * ceph-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * ceph-base-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-nbd-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephsqlite-16.2.13.66+g54799ee0666-150400.3.9.2 * librgw-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-osd-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephfs2-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-mirror-16.2.13.66+g54799ee0666-150400.3.9.2 * rados-objclass-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephfs-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * librgw2-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-immutable-object-cache-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mon-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephsqlite-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-mirror-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-radosgw-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-fuse-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mds-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * cephfs-shell-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mds-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-fuse-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-immutable-object-cache-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-radosgw-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * cephfs-mirror-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-cephfs-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * libradospp-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rados-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-fuse-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-ceph-common-16.2.13.66+g54799ee0666-150400.3.9.2 * cephfs-mirror-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephsqlite-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-base-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rgw-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mon-16.2.13.66+g54799ee0666-150400.3.9.2 * librados-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-osd-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-common-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rbd-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-fuse-16.2.13.66+g54799ee0666-150400.3.9.2 * openSUSE Leap 15.4 (noarch) * cephfs-top-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-modules-core-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-rook-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-cephadm-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-diskprediction-local-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-grafana-dashboards-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-prometheus-alerts-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-dashboard-16.2.13.66+g54799ee0666-150400.3.9.2 * cephadm-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-k8sevents-16.2.13.66+g54799ee0666-150400.3.9.2 * openSUSE Leap 15.4 (x86_64) * ceph-test-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-test-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-test-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * ceph-base-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-nbd-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephsqlite-16.2.13.66+g54799ee0666-150400.3.9.2 * librgw-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-osd-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephfs2-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-mirror-16.2.13.66+g54799ee0666-150400.3.9.2 * rados-objclass-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephfs-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * librgw2-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-immutable-object-cache-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mon-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephsqlite-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-mirror-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-radosgw-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-fuse-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mds-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * cephfs-shell-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mds-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-fuse-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-immutable-object-cache-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-radosgw-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * cephfs-mirror-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-cephfs-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * libradospp-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rados-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-fuse-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-ceph-common-16.2.13.66+g54799ee0666-150400.3.9.2 * cephfs-mirror-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephsqlite-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-base-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rgw-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mon-16.2.13.66+g54799ee0666-150400.3.9.2 * librados-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-osd-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-common-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rbd-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-fuse-16.2.13.66+g54799ee0666-150400.3.9.2 * openSUSE Leap 15.5 (noarch) * cephfs-top-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-modules-core-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-rook-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-cephadm-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-diskprediction-local-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-grafana-dashboards-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-prometheus-alerts-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-dashboard-16.2.13.66+g54799ee0666-150400.3.9.2 * cephadm-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-mgr-k8sevents-16.2.13.66+g54799ee0666-150400.3.9.2 * openSUSE Leap 15.5 (x86_64) * ceph-test-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-test-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-test-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * ceph-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * ceph-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * ceph-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * ceph-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * ceph-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * ceph-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-nbd-16.2.13.66+g54799ee0666-150400.3.9.2 * librgw-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephfs2-16.2.13.66+g54799ee0666-150400.3.9.2 * rados-objclass-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephfs-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * librgw2-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-cephfs-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * libradospp-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rados-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-ceph-common-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rgw-16.2.13.66+g54799ee0666-150400.3.9.2 * librados-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-common-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rbd-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * ceph-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephfs2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-nbd-16.2.13.66+g54799ee0666-150400.3.9.2 * librgw-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephfs2-16.2.13.66+g54799ee0666-150400.3.9.2 * rados-objclass-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * libcephfs-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * librgw2-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-cephfs-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * rbd-nbd-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rbd-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librados-devel-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-cephfs-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * libradospp-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rados-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-ceph-common-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rados-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rgw-16.2.13.66+g54799ee0666-150400.3.9.2 * librados-devel-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-ceph-argparse-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-common-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rbd-16.2.13.66+g54799ee0666-150400.3.9.2 * python3-rgw-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librgw2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * ceph-common-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * ceph-debugsource-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 * librbd1-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-16.2.13.66+g54799ee0666-150400.3.9.2 * librados2-debuginfo-16.2.13.66+g54799ee0666-150400.3.9.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1199880 * https://bugzilla.suse.com/show_bug.cgi?id=1201088 * https://bugzilla.suse.com/show_bug.cgi?id=1208820 * https://bugzilla.suse.com/show_bug.cgi?id=1209621 * https://bugzilla.suse.com/show_bug.cgi?id=1210153 * https://bugzilla.suse.com/show_bug.cgi?id=1210243 * https://bugzilla.suse.com/show_bug.cgi?id=1210314 * https://bugzilla.suse.com/show_bug.cgi?id=1210719 * https://bugzilla.suse.com/show_bug.cgi?id=1210784 * https://bugzilla.suse.com/show_bug.cgi?id=1210944 * https://bugzilla.suse.com/show_bug.cgi?id=1211090 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 11 16:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 11 Jan 2024 16:30:01 -0000 Subject: SUSE-SU-2024:0090-1: moderate: Security update for gstreamer-plugins-rs Message-ID: <170499060194.6523.1466866904116833431@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-rs Announcement ID: SUSE-SU-2024:0090-1 Rating: moderate References: * bsc#1208556 Cross-References: * CVE-2022-31394 CVSS scores: * CVE-2022-31394 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-31394 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-rs fixes the following issues: * CVE-2022-31394: Fixed a potential denial of service in the HTTP/2 implementation (bsc#1208556). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-90=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-90=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-90=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gstreamer-plugins-rs-debuginfo-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-devel-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-debugsource-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-0.8.2-150400.3.3.1 * Desktop Applications Module 15-SP5 (ppc64le) * gstreamer-plugins-rs-debuginfo-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-devel-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-debugsource-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-0.8.2-150400.3.3.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * gstreamer-plugins-rs-debuginfo-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-devel-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-debugsource-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-0.8.2-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2022-31394.html * https://bugzilla.suse.com/show_bug.cgi?id=1208556 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Fri Jan 12 08:01:34 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:01:34 +0100 (CET) Subject: SUSE-CU-2024:154-1: Security update of ses/7.1/ceph/ceph Message-ID: <20240112080134.B8BD9FBA4@maintenance.suse.de> SUSE Container Update Advisory: ses/7.1/ceph/ceph ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:154-1 Container Tags : ses/7.1/ceph/ceph:16.2.13.66 , ses/7.1/ceph/ceph:16.2.13.66.4.9.1 , ses/7.1/ceph/ceph:latest , ses/7.1/ceph/ceph:sle15.3.pacific Container Release : 4.9.1 Severity : important Type : security References : 1029961 1041742 1107342 1111622 1158830 1170175 1176785 1184753 1196647 1199282 1200962 1201384 1203760 1205767 1206080 1206480 1206480 1206556 1206684 1206684 1206798 1207853 1208037 1208038 1208040 1208409 1209122 1209275 1209642 1210297 1210335 1210557 1210557 1210660 1210733 1211427 1211427 1211829 1212101 1212101 1212422 1212819 1212910 1213458 1213854 1213915 1213915 1214052 1214052 1214292 1214395 1214460 1214460 1214565 1214567 1214579 1214580 1214604 1214611 1214619 1214620 1214623 1214624 1214625 1214692 1214788 1214806 1215007 1215215 1215286 1215314 1215427 1215434 1215496 1215713 1215889 1215891 1215968 1215979 1216091 1216123 1216129 1216174 1216377 1216378 1216664 1216862 1216922 1216987 1217212 1217472 1217573 1217592 1217695 1217696 1217950 1218014 CVE-2020-19726 CVE-2021-32256 CVE-2022-35205 CVE-2022-35206 CVE-2022-4285 CVE-2022-44840 CVE-2022-45703 CVE-2022-47673 CVE-2022-47695 CVE-2022-47696 CVE-2022-48063 CVE-2022-48064 CVE-2022-48065 CVE-2023-0687 CVE-2023-1579 CVE-2023-1829 CVE-2023-1972 CVE-2023-2137 CVE-2023-2222 CVE-2023-23559 CVE-2023-25585 CVE-2023-25587 CVE-2023-25588 CVE-2023-35945 CVE-2023-38546 CVE-2023-40217 CVE-2023-4039 CVE-2023-4039 CVE-2023-43804 CVE-2023-44487 CVE-2023-45322 CVE-2023-45803 CVE-2023-45853 CVE-2023-46218 CVE-2023-4641 CVE-2023-4813 CVE-2023-48795 CVE-2023-49083 CVE-2023-50495 CVE-2023-5678 ----------------------------------------------------------------- The container ses/7.1/ceph/ceph was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:3814-1 Released: Wed Sep 27 18:08:17 2023 Summary: Recommended update for glibc Type: recommended Severity: moderate References: 1211829,1212819,1212910 This update for glibc fixes the following issues: - nscd: Fix netlink cache invalidation if epoll is used (bsc#1212910, BZ #29415) - Restore lookup of IPv4 mapped addresses in files database (bsc#1212819, BZ #25457) - elf: Remove excessive p_align check on PT_LOAD segments (bsc#1211829, BZ #28688) - elf: Properly align PT_LOAD segments (bsc#1211829, BZ #28676) - ld.so: Always use MAP_COPY to map the first segment (BZ #30452) - add GB18030-2022 charmap (jsc#PED-4908, BZ #30243) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:3825-1 Released: Wed Sep 27 18:48:53 2023 Summary: Security update for binutils Type: security Severity: important References: 1200962,1206080,1206556,1208037,1208038,1208040,1208409,1209642,1210297,1210733,1213458,1214565,1214567,1214579,1214580,1214604,1214611,1214619,1214620,1214623,1214624,1214625,CVE-2020-19726,CVE-2021-32256,CVE-2022-35205,CVE-2022-35206,CVE-2022-4285,CVE-2022-44840,CVE-2022-45703,CVE-2022-47673,CVE-2022-47695,CVE-2022-47696,CVE-2022-48063,CVE-2022-48064,CVE-2022-48065,CVE-2023-0687,CVE-2023-1579,CVE-2023-1972,CVE-2023-2222,CVE-2023-25585,CVE-2023-25587,CVE-2023-25588 This update for binutils fixes the following issues: Update to version 2.41 [jsc#PED-5778]: * The MIPS port now supports the Sony Interactive Entertainment Allegrex processor, used with the PlayStation Portable, which implements the MIPS II ISA along with a single-precision FPU and a few implementation-specific integer instructions. * Objdump's --private option can now be used on PE format files to display the fields in the file header and section headers. * New versioned release of libsframe: libsframe.so.1. This release introduces versioned symbols with version node name LIBSFRAME_1.0. This release also updates the ABI in an incompatible way: this includes removal of sframe_get_funcdesc_with_addr API, change in the behavior of sframe_fre_get_ra_offset and sframe_fre_get_fp_offset APIs. * SFrame Version 2 is now the default (and only) format version supported by gas, ld, readelf and objdump. * Add command-line option, --strip-section-headers, to objcopy and strip to remove ELF section header from ELF file. * The RISC-V port now supports the following new standard extensions: - Zicond (conditional zero instructions) - Zfa (additional floating-point instructions) - Zvbb, Zvbc, Zvkg, Zvkned, Zvknh[ab], Zvksed, Zvksh, Zvkn, Zvknc, Zvkng, Zvks, Zvksc, Zvkg, Zvkt (vector crypto instructions) * The RISC-V port now supports the following vendor-defined extensions: - XVentanaCondOps * Add support for Intel FRED, LKGS and AMX-COMPLEX instructions. * A new .insn directive is recognized by x86 gas. * Add SME2 support to the AArch64 port. * The linker now accepts a command line option of --remap-inputs = to relace any input file that matches with . In addition the option --remap-inputs-file= can be used to specify a file containing any number of these remapping directives. * The linker command line option --print-map-locals can be used to include local symbols in a linker map. (ELF targets only). * For most ELF based targets, if the --enable-linker-version option is used then the version of the linker will be inserted as a string into the .comment section. * The linker script syntax has a new command for output sections: ASCIZ 'string' This will insert a zero-terminated string at the current location. * Add command-line option, -z nosectionheader, to omit ELF section header. - Contains fixes for these non-CVEs (not security bugs per upstreams SECURITY.md): * bsc#1209642 aka CVE-2023-1579 aka PR29988 * bsc#1210297 aka CVE-2023-1972 aka PR30285 * bsc#1210733 aka CVE-2023-2222 aka PR29936 * bsc#1213458 aka CVE-2021-32256 aka PR105039 (gcc) * bsc#1214565 aka CVE-2020-19726 aka PR26240 * bsc#1214567 aka CVE-2022-35206 aka PR29290 * bsc#1214579 aka CVE-2022-35205 aka PR29289 * bsc#1214580 aka CVE-2022-44840 aka PR29732 * bsc#1214604 aka CVE-2022-45703 aka PR29799 * bsc#1214611 aka CVE-2022-48065 aka PR29925 * bsc#1214619 aka CVE-2022-48064 aka PR29922 * bsc#1214620 aka CVE-2022-48063 aka PR29924 * bsc#1214623 aka CVE-2022-47696 aka PR29677 * bsc#1214624 aka CVE-2022-47695 aka PR29846 * bsc#1214625 aka CVE-2022-47673 aka PR29876 - This only existed only for a very short while in SLE-15, as the main variant in devel:gcc subsumed this in binutils-revert-rela.diff. Hence: - Document fixed CVEs: * bsc#1208037 aka CVE-2023-25588 aka PR29677 * bsc#1208038 aka CVE-2023-25587 aka PR29846 * bsc#1208040 aka CVE-2023-25585 aka PR29892 * bsc#1208409 aka CVE-2023-0687 aka PR29444 - Enable bpf-none cross target and add bpf-none to the multitarget set of supported targets. - Disable packed-relative-relocs for old codestreams. They generate buggy relocations when binutils-revert-rela.diff is active. [bsc#1206556] - Disable ZSTD debug section compress by default. - Enable zstd compression algorithm (instead of zlib) for debug info sections by default. - Pack libgprofng only for supported platforms. - Move libgprofng-related libraries to the proper locations (packages). - Add --without=bootstrap for skipping of bootstrap (faster testing of the package). - Remove broken arm32-avoid-copyreloc.patch to fix [gcc#108515] Update to version 2.40: * Objdump has a new command line option --show-all-symbols which will make it display all symbols that match a given address when disassembling. (Normally only the first symbol that matches an address is shown). * Add --enable-colored-disassembly configure time option to enable colored disassembly output by default, if the output device is a terminal. Note, this configure option is disabled by default. * DCO signed contributions are now accepted. * objcopy --decompress-debug-sections now supports zstd compressed debug sections. The new option --compress-debug-sections=zstd compresses debug sections with zstd. * addr2line and objdump --dwarf now support zstd compressed debug sections. * The dlltool program now accepts --deterministic-libraries and --non-deterministic-libraries as command line options to control whether or not it generates deterministic output libraries. If neither of these options are used the default is whatever was set when the binutils were configured. * readelf and objdump now have a newly added option --sframe which dumps the SFrame section. * Add support for Intel RAO-INT instructions. * Add support for Intel AVX-NE-CONVERT instructions. * Add support for Intel MSRLIST instructions. * Add support for Intel WRMSRNS instructions. * Add support for Intel CMPccXADD instructions. * Add support for Intel AVX-VNNI-INT8 instructions. * Add support for Intel AVX-IFMA instructions. * Add support for Intel PREFETCHI instructions. * Add support for Intel AMX-FP16 instructions. * gas now supports --compress-debug-sections=zstd to compress debug sections with zstd. * Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd} that selects the default compression algorithm for --enable-compressed-debug-sections. * Add support for various T-Head extensions (XTheadBa, XTheadBb, XTheadBs, XTheadCmo, XTheadCondMov, XTheadFMemIdx, XTheadFmv, XTheadInt, XTheadMemIdx, XTheadMemPair, XTheadMac, and XTheadSync) from version 2.0 of the T-Head ISA manual, which are implemented in the Allwinner D1. * Add support for the RISC-V Zawrs extension, version 1.0-rc4. * Add support for Cortex-X1C for Arm. * New command line option --gsframe to generate SFrame unwind information on x86_64 and aarch64 targets. * The linker has a new command line option to suppress the generation of any warning or error messages. This can be useful when there is a need to create a known non-working binary. The option is -w or --no-warnings. * ld now supports zstd compressed debug sections. The new option --compress-debug-sections=zstd compresses debug sections with zstd. * Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd} that selects the default compression algorithm for --enable-compressed-debug-sections. * Remove support for -z bndplt (MPX prefix instructions). - Includes fixes for these CVEs: * bsc#1206080 aka CVE-2022-4285 aka PR29699 - Enable by default: --enable-colored-disassembly. - fix build on x86_64_vX platforms ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:3828-1 Released: Wed Sep 27 19:07:38 2023 Summary: Security update for python3 Type: security Severity: important References: 1214692,CVE-2023-40217 This update for python3 fixes the following issues: - CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:3997-1 Released: Fri Oct 6 14:13:56 2023 Summary: Security update for nghttp2 Type: security Severity: important References: 1215713,CVE-2023-35945 This update for nghttp2 fixes the following issues: - CVE-2023-35945: Fixed memory leak when PUSH_PROMISE or HEADERS frame cannot be sent (bsc#1215713). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4006-1 Released: Mon Oct 9 08:35:50 2023 Summary: Recommended update for zypper Type: recommended Severity: moderate References: 1213854,1214292,1214395,1215007 This update for zypper fixes the following issues: - Fix name of the bash completion script (bsc#1215007) - Update notes about failing signature checks (bsc#1214395) - Improve the SIGINT handler to be signal safe (bsc#1214292) - Update to version 1.14.64 - Changed location of bash completion script (bsc#1213854). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4027-1 Released: Tue Oct 10 13:59:02 2023 Summary: Security update for shadow Type: security Severity: low References: 1214806,CVE-2023-4641 This update for shadow fixes the following issues: - CVE-2023-4641: Fixed potential password leak (bsc#1214806). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4045-1 Released: Wed Oct 11 09:10:43 2023 Summary: Security update for curl Type: security Severity: moderate References: 1215889,CVE-2023-38546 This update for curl fixes the following issues: - CVE-2023-38546: Fixed a cookie injection with none file (bsc#1215889). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4052-1 Released: Wed Oct 11 14:11:55 2023 Summary: Recommended update for babeltrace Type: recommended Severity: moderate References: 1209275 This update ships missing babeltrace-devel to the Basesystem module to allow building gdb source rpms. (bsc#1209275) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4108-1 Released: Wed Oct 18 11:51:12 2023 Summary: Security update for python-urllib3 Type: security Severity: moderate References: 1215968,CVE-2023-43804 This update for python-urllib3 fixes the following issues: - CVE-2023-43804: Fixed a potential cookie leak via HTTP redirect if the user manually set the corresponding header (bsc#1215968). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4110-1 Released: Wed Oct 18 12:35:26 2023 Summary: Security update for glibc Type: security Severity: important References: 1215286,1215891,CVE-2023-4813 This update for glibc fixes the following issues: Security issue fixed: - CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931) Also a regression from a previous update was fixed: - elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4154-1 Released: Fri Oct 20 19:33:25 2023 Summary: Recommended update for aaa_base Type: recommended Severity: moderate References: 1107342,1215434 This update for aaa_base fixes the following issues: - Respect /etc/update-alternatives/java when setting JAVA_HOME (bsc#1215434,bsc#1107342) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4158-1 Released: Mon Oct 23 09:52:06 2023 Summary: Security update for suse-module-tools Type: security Severity: important References: 1205767,1207853,1210335,CVE-2023-1829,CVE-2023-23559 This update for suse-module-tools fixes the following issues: - Updated to version 15.3.17: - CVE-2023-1829: Blacklisted the Linux kernel tcindex classifier module (bsc#1210335). - CVE-2023-23559: Blacklisted the Linux kernel RNDIS modules (bsc#1205767, jsc#PED-5731). - Updated to version 15.3.16: - Fixed a build issue for s390x (bsc#1207853). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4162-1 Released: Mon Oct 23 15:33:03 2023 Summary: Security update for gcc13 Type: security Severity: important References: 1206480,1206684,1210557,1211427,1212101,1213915,1214052,1214460,CVE-2023-4039 This update for gcc13 fixes the following issues: This update ship the GCC 13.2 compiler suite and its base libraries. The compiler base libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 12 ones. The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module. The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories. To use gcc13 compilers use: - install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages. - override your Makefile to use CC=gcc13, CXX=g++13 and similar overrides for the other languages. For a full changelog with all new GCC13 features, check out https://gcc.gnu.org/gcc-13/changes.html Detailed changes: * CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable length stack allocations. (bsc#1214052) - Turn cross compiler to s390x to a glibc cross. [bsc#1214460] - Also handle -static-pie in the default-PIE specs - Fixed missed optimization in Skia resulting in Firefox crashes when building with LTO. [bsc#1212101] - Make libstdc++6-devel packages own their directories since they can be installed standalone. [bsc#1211427] - Add new x86-related intrinsics (amxcomplexintrin.h). - RISC-V: Add support for inlining subword atomic operations - Use --enable-link-serialization rather that --enable-link-mutex, the benefit of the former one is that the linker jobs are not holding tokens of the make's jobserver. - Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd for the general state of BPF with GCC. - Add bootstrap conditional to allow --without=bootstrap to be specified to speed up local builds for testing. - Bump included newlib to version 4.3.0. - Also package libhwasan_preinit.o on aarch64. - Configure external timezone database provided by the timezone package. Make libstdc++6 recommend timezone to get a fully working std::chrono. Install timezone when running the testsuite. - Package libhwasan_preinit.o on x86_64. - Fixed unwinding on aarch64 with pointer signing. [bsc#1206684] - Enable PRU flavour for gcc13 - update floatn fixinclude pickup to check each header separately (bsc#1206480) - Redo floatn fixinclude pick-up to simply keep what is there. - Bump libgo SONAME to libgo22. - Do not package libhwasan for biarch (32-bit architecture) as the extension depends on 64-bit pointers. - Adjust floatn fixincludes guard to work with SLE12 and earlier SLE15. - Depend on at least LLVM 13 for GCN cross compiler. - Update embedded newlib to version 4.2.0 - Allow cross-pru-gcc12-bootstrap for armv7l architecture. PRU architecture is used for real-time MCUs embedded into TI armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for armv7l in order to build both host applications and PRU firmware during the same build. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4200-1 Released: Wed Oct 25 12:04:29 2023 Summary: Security update for nghttp2 Type: security Severity: important References: 1216123,1216174,CVE-2023-44487 This update for nghttp2 fixes the following issues: - CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack. (bsc#1216174) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4217-1 Released: Thu Oct 26 12:20:27 2023 Summary: Security update for zlib Type: security Severity: moderate References: 1216378,CVE-2023-45853 This update for zlib fixes the following issues: - CVE-2023-45853: Fixed an integer overflow that would lead to a buffer overflow in the minizip subcomponent (bsc#1216378). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4226-1 Released: Fri Oct 27 11:14:10 2023 Summary: Recommended update for openssl-1_1 Type: recommended Severity: moderate References: 1215215 This update for openssl-1_1 fixes the following issues: - Displays 'fips' in the version string (bsc#1215215) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4310-1 Released: Tue Oct 31 14:10:47 2023 Summary: Recommended update for libtirpc Type: recommended Severity: moderate References: 1196647 This Update for libtirpc to 1.3.4, fixing the following issues: Update to 1.3.4 (bsc#1199467) * binddynport.c honor ip_local_reserved_ports - replaces: binddynport-honor-ip_local_reserved_ports.patch * gss-api: expose gss major/minor error in authgss_refresh() * rpcb_clnt.c: Eliminate double frees in delete_cache() * rpcb_clnt.c: memory leak in destroy_addr * portmapper: allow TCP-only portmapper * getnetconfigent: avoid potential DoS issue by removing unnecessary sleep * clnt_raw.c: fix a possible null pointer dereference * bindresvport.c: fix a potential resource leakage Update to 1.3.3: * Fix DoS vulnerability in libtirpc - replaces: 0001-Fix-DoS-vulnerability-in-libtirpc.patch * _rpc_dtablesize: use portable system call * libtirpc: Fix use-after-free accessing the error number * Fix potential memory leak of parms.r_addr - replaces 0001-fix-parms.r_addr-memory-leak.patch * rpcb_clnt.c add mechanism to try v2 protocol first - preplaces: 0001-rpcb_clnt.c-config-to-try-protocolversion-2-first.patch * Eliminate deadlocks in connects with an MT environment * clnt_dg_freeres() uncleared set active state may deadlock * thread safe clnt destruction * SUNRPC: mutexed access blacklist_read state variable * SUNRPC: MT-safe overhaul of address cache management in rpcb_clnt.c Update to 1.3.2: * Replace the final SunRPC licenses with BSD licenses * blacklist: Add a few more well known ports * libtirpc: disallow calling auth_refresh from clnt_call with RPCSEC_GSS Update to 1.3.1: * Remove AUTH_DES interfaces from auth_des.h The unsupported AUTH_DES authentication has be compiled out since commit d918e41d889 (Wed Oct 9 2019) replaced by API routines that return errors. * svc_dg: Free xp_netid during destroy * Fix memory management issues of fd locks * libtirpc: replace array with list for per-fd locks * __svc_vc_dodestroy: fix double free of xp_ltaddr.buf * __rpc_dtbsize: rlim_cur instead of rlim_max * pkg-config: use the correct replacements for libdir/includedir ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4458-1 Released: Thu Nov 16 14:38:48 2023 Summary: Security update for gcc13 Type: security Severity: important References: 1206480,1206684,1210557,1211427,1212101,1213915,1214052,1214460,1215427,1216664,CVE-2023-4039 This update for gcc13 fixes the following issues: This update ship the GCC 13.2 compiler suite and its base libraries. The compiler base libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 12 ones. The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module. The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories. To use gcc13 compilers use: - install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages. - override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides for the other languages. For a full changelog with all new GCC13 features, check out https://gcc.gnu.org/gcc-13/changes.html Detailed changes: * CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable length stack allocations. (bsc#1214052) - Work around third party app crash during C++ standard library initialization. [bsc#1216664] - Fixed that GCC13 fails to compile some packages with error: unrecognizable insn (bsc#1215427) - Bump included newlib to version 4.3.0. - Update to GCC trunk head (r13-5254-g05b9868b182bb9) - Redo floatn fixinclude pick-up to simply keep what is there. - Turn cross compiler to s390x to a glibc cross. [bsc#1214460] - Also handle -static-pie in the default-PIE specs - Fixed missed optimization in Skia resulting in Firefox crashes when building with LTO. [bsc#1212101] - Make libstdc++6-devel packages own their directories since they can be installed standalone. [bsc#1211427] - Add new x86-related intrinsics (amxcomplexintrin.h). - RISC-V: Add support for inlining subword atomic operations - Use --enable-link-serialization rather that --enable-link-mutex, the benefit of the former one is that the linker jobs are not holding tokens of the make's jobserver. - Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd for the general state of BPF with GCC. - Add bootstrap conditional to allow --without=bootstrap to be specified to speed up local builds for testing. - Bump included newlib to version 4.3.0. - Also package libhwasan_preinit.o on aarch64. - Configure external timezone database provided by the timezone package. Make libstdc++6 recommend timezone to get a fully working std::chrono. Install timezone when running the testsuite. - Package libhwasan_preinit.o on x86_64. - Fixed unwinding on aarch64 with pointer signing. [bsc#1206684] - Enable PRU flavour for gcc13 - update floatn fixinclude pickup to check each header separately (bsc#1206480) - Redo floatn fixinclude pick-up to simply keep what is there. - Bump libgo SONAME to libgo22. - Do not package libhwasan for biarch (32-bit architecture) as the extension depends on 64-bit pointers. - Adjust floatn fixincludes guard to work with SLE12 and earlier SLE15. - Depend on at least LLVM 13 for GCN cross compiler. - Update embedded newlib to version 4.2.0 - Allow cross-pru-gcc12-bootstrap for armv7l architecture. PRU architecture is used for real-time MCUs embedded into TI armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for armv7l in order to build both host applications and PRU firmware during the same build. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4464-1 Released: Thu Nov 16 17:56:12 2023 Summary: Security update for libxml2 Type: security Severity: moderate References: 1216129,CVE-2023-45322 This update for libxml2 fixes the following issues: - CVE-2023-45322: Fixed a use-after-free in xmlUnlinkNode() in tree.c (bsc#1216129). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4467-1 Released: Thu Nov 16 17:57:51 2023 Summary: Security update for python-urllib3 Type: security Severity: moderate References: 1216377,CVE-2023-45803 This update for python-urllib3 fixes the following issues: - CVE-2023-45803: Fix a request body leak that could occur when receiving a 303 HTTP response (bsc#1216377). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4519-1 Released: Tue Nov 21 17:39:58 2023 Summary: Security update for openssl-1_1 Type: security Severity: important References: 1216922,CVE-2023-5678 This update for openssl-1_1 fixes the following issues: - CVE-2023-5678: Fixed generating and checking of excessively long X9.42 DH keys that resulted in a possible Denial of Service (bsc#1216922). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4535-1 Released: Thu Nov 23 08:17:40 2023 Summary: Recommended update for libzypp, zypper Type: recommended Severity: moderate References: 1041742,1203760,1212422,1215979,1216091 This update for libzypp, zypper fixes the following issues: - Preliminary disable 'rpm --runposttrans' usage for chrooted systems (bsc#1216091) - Fix comment typo on zypp.conf (bsc#1215979) - Attempt to delay %transfiletrigger(postun|in) execution if rpm supports it (bsc#1041742) - Make sure the old target is deleted before a new one is created (bsc#1203760) - Return 104 also if info suggests near matches - Rephrase upgrade message for openSUSE Tumbleweed (bsc#1212422) - commit: Insert a headline to separate output of different rpm scripts (bsc#1041742) ----------------------------------------------------------------- Advisory ID: SUSE-feature-2023:4583-1 Released: Mon Nov 27 10:16:11 2023 Summary: Feature update for python-psutil Type: feature Severity: moderate References: 1111622,1170175,1176785,1184753,1199282 This update for python-psutil, python-requests fixes the following issues: - update python-psutil to 5.9.1 (bsc#1199282, bsc#1184753, jsc#SLE-24629, jsc#PM-3243, gh#giampaolo/psutil#2043) - Fix tests: setuptools changed the builddir library path and does not find the module from it. Use the installed platlib instead and exclude psutil.tests only later. - remove the dependency on net-tools, since it conflicts with busybox-hostnmame which is default on MicroOS - Update python-requests to 2.25.1 (bsc#1176785, bsc#1170175, jsc#ECO-3105, jsc#PM-2352, jsc#PED-7192) - Fixed bug with unintended Authorization header stripping for redirects using default ports (bsc#1111622). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4615-1 Released: Wed Nov 29 20:33:38 2023 Summary: Recommended update for icu Type: recommended Severity: moderate References: 1217472 This update of icu fixes the following issue: - missing 32bit libraries in SLES 15 SP3 were added, required by xerces-c 32bit. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4619-1 Released: Thu Nov 30 10:13:52 2023 Summary: Security update for sqlite3 Type: security Severity: important References: 1210660,CVE-2023-2137 This update for sqlite3 fixes the following issues: - CVE-2023-2137: Fixed heap buffer overflow (bsc#1210660). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4644-1 Released: Tue Dec 5 13:46:14 2023 Summary: Recommended update for psmisc Type: recommended Severity: moderate References: This update for psmisc fixes the following issues: - Fix version number when building the package ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4699-1 Released: Mon Dec 11 07:02:10 2023 Summary: Recommended update for gpg2 Type: recommended Severity: moderate References: 1217212 This update for gpg2 fixes the following issues: - `dirmngr-client --validate` is broken for DER-encoded files (bsc#1217212) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4713-1 Released: Mon Dec 11 13:23:12 2023 Summary: Security update for curl Type: security Severity: moderate References: 1217573,CVE-2023-46218 This update for curl fixes the following issues: - CVE-2023-46218: Fixed cookie mixed case PSL bypass (bsc#1217573). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4723-1 Released: Tue Dec 12 09:57:51 2023 Summary: Recommended update for libtirpc Type: recommended Severity: moderate References: 1216862 This update for libtirpc fixes the following issue: - fix sed parsing in specfile (bsc#1216862) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4890-1 Released: Mon Dec 18 13:00:52 2023 Summary: Recommended update for python-websocket-client Type: recommended Severity: moderate References: 1215314 This update for python-websocket-client fixes the following issues: - Re-enable Python 3.6 to fix pip3 install (bsc#1215314) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4902-1 Released: Tue Dec 19 13:09:42 2023 Summary: Security update for openssh Type: security Severity: important References: 1214788,1217950,CVE-2023-48795 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4921-1 Released: Wed Dec 20 09:51:31 2023 Summary: Security update for python-cryptography Type: security Severity: moderate References: 1217592,CVE-2023-49083 This update for python-cryptography fixes the following issues: - CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4963-1 Released: Fri Dec 22 14:37:08 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:50-1 Released: Mon Jan 8 03:18:56 2024 Summary: Recommended update for python-instance-billing-flavor-check Type: recommended Severity: moderate References: 1217695,1217696 This update for python-instance-billing-flavor-check fixes the following issues: - Run the command as sudo only (bsc#1217696, bsc#1217695) - Handle exception for Python 3.4 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:82-1 Released: Thu Jan 11 09:21:29 2024 Summary: Recommended update for ceph Type: recommended Severity: moderate References: This update for ceph fixes the following issues: - Fix build versioning to resolve installation conflicts (no source code changes) The following package changes have been done: - aaa_base-84.87+git20180409.04c9dae-150300.10.6.2 updated - babeltrace-1.5.8-150300.3.2.1 updated - binutils-2.41-150100.7.46.1 updated - ceph-base-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-common-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-grafana-dashboards-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mds-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-cephadm-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-dashboard-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-modules-core-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-rook-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mon-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-osd-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-prometheus-alerts-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-radosgw-16.2.13.66+g54799ee0666-150300.9.1 updated - cephadm-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-16.2.13.66+g54799ee0666-150300.9.1 updated - glibc-locale-base-2.31-150300.63.1 updated - glibc-2.31-150300.63.1 updated - gpg2-2.2.27-150300.3.8.1 updated - libcephfs2-16.2.13.66+g54799ee0666-150300.9.1 updated - libcephsqlite-16.2.13.66+g54799ee0666-150300.9.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libctf-nobfd0-2.41-150100.7.46.1 updated - libctf0-2.41-150100.7.46.1 updated - libcurl4-7.66.0-150200.4.66.1 updated - libgcc_s1-13.2.1+git7813-150000.1.6.1 updated - libicu-suse65_1-65.1-150200.4.10.1 updated - libicu65_1-ledata-65.1-150200.4.10.1 updated - libncurses6-6.1-150000.5.20.1 updated - libnghttp2-14-1.40.0-150200.12.1 updated - libopenssl1_1-hmac-1.1.1d-150200.11.82.1 updated - libopenssl1_1-1.1.1d-150200.11.82.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libpython3_6m1_0-3.6.15-150300.10.51.1 updated - librados2-16.2.13.66+g54799ee0666-150300.9.1 updated - librbd1-16.2.13.66+g54799ee0666-150300.9.1 updated - librgw2-16.2.13.66+g54799ee0666-150300.9.1 updated - libsolv-tools-0.7.27-150200.23.2 updated - libsqlite3-0-3.44.0-150000.3.23.1 updated - libstdc++6-13.2.1+git7813-150000.1.6.1 updated - libtirpc-netconfig-1.3.4-150300.3.23.1 updated - libtirpc3-1.3.4-150300.3.23.1 updated - libxml2-2-2.9.7-150000.3.63.1 updated - libz1-1.2.11-150000.3.48.1 updated - libzypp-17.31.27-150200.84.1 updated - login_defs-4.8.1-150300.4.12.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - openssh-clients-8.4p1-150300.3.27.1 updated - openssh-common-8.4p1-150300.3.27.1 updated - openssh-fips-8.4p1-150300.3.27.1 updated - openssh-server-8.4p1-150300.3.27.1 updated - openssh-8.4p1-150300.3.27.1 updated - openssl-1_1-1.1.1d-150200.11.82.1 updated - procps-3.3.17-150000.7.37.1 updated - psmisc-23.0-150000.6.25.1 updated - python3-base-3.6.15-150300.10.51.1 updated - python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-ceph-common-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-cephfs-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-cryptography-3.3.2-150200.22.1 updated - python3-cssselect-1.0.3-150000.3.5.1 updated - python3-curses-3.6.15-150300.10.51.1 updated - python3-lxml-4.7.1-150200.3.12.1 updated - python3-rados-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-rbd-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-requests-2.25.1-150300.3.6.1 updated - python3-rgw-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-urllib3-1.25.10-150300.4.9.1 updated - python3-websocket-client-1.3.2-150100.6.10.5 updated - python3-3.6.15-150300.10.51.1 updated - rbd-mirror-16.2.13.66+g54799ee0666-150300.9.1 updated - shadow-4.8.1-150300.4.12.1 updated - suse-module-tools-15.3.17-150300.3.22.1 updated - terminfo-base-6.1-150000.5.20.1 updated - zypper-1.14.68-150200.70.2 updated - container:sles15-image-15.0.0-17.20.236 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-updates at lists.suse.com Fri Jan 12 08:03:45 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:03:45 +0100 (CET) Subject: SUSE-CU-2024:157-1: Recommended update of suse/ltss/sle15.4/sle15 Message-ID: <20240112080345.CC617FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.4/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:157-1 Container Tags : suse/ltss/sle15.4/bci-base:15.4 , suse/ltss/sle15.4/bci-base:15.4.2.6 , suse/ltss/sle15.4/sle15:15.4 , suse/ltss/sle15.4/sle15:15.4.2.6 Container Release : 2.6 Severity : moderate Type : recommended References : 1212160 1215294 1216412 1217593 1217873 1218291 ----------------------------------------------------------------- The container suse/ltss/sle15.4/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - zypper-1.14.68-150400.3.40.2 updated From sle-updates at lists.suse.com Fri Jan 12 08:06:12 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:06:12 +0100 (CET) Subject: SUSE-CU-2024:168-1: Security update of bci/golang Message-ID: <20240112080612.CAA3EFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:168-1 Container Tags : bci/golang:1.20 , bci/golang:1.20-2.6.1 , bci/golang:oldstable , bci/golang:oldstable-2.6.1 Container Release : 6.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.72 updated From sle-updates at lists.suse.com Fri Jan 12 08:06:21 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:06:21 +0100 (CET) Subject: SUSE-CU-2024:169-1: Security update of bci/golang Message-ID: <20240112080621.8BB25FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:169-1 Container Tags : bci/golang:1.20-openssl , bci/golang:1.20-openssl-10.1 , bci/golang:oldstable-openssl , bci/golang:oldstable-openssl-10.1 Container Release : 10.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.72 updated From sle-updates at lists.suse.com Fri Jan 12 08:11:08 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:11:08 +0100 (CET) Subject: SUSE-CU-2024:195-1: Recommended update of bci/bci-sle15-kernel-module-devel Message-ID: <20240112081108.2F39CFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:195-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.3.8 , bci/bci-sle15-kernel-module-devel:latest Container Release : 3.8 Severity : moderate Type : recommended References : ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:87-1 Released: Thu Jan 11 10:05:12 2024 Summary: Recommended update for pesign Type: recommended Severity: moderate References: This update for pesign fixes the following issue: - Create pesign-systemd subpackage to remove systemd dependency (jsc#PED-7256) The following package changes have been done: - pesign-0.112-150000.4.18.1 updated - container:sles15-image-15.0.0-36.5.72 updated - dbus-1-1.12.2-150400.18.8.1 removed - kbd-2.4.0-150400.5.6.1 removed - kbd-legacy-2.4.0-150400.5.6.1 removed - libapparmor1-3.0.4-150500.11.9.1 removed - libargon2-1-0.0+git20171227.670229c-2.14 removed - libcryptsetup12-2.4.3-150400.3.3.1 removed - libcryptsetup12-hmac-2.4.3-150400.3.3.1 removed - libdbus-1-3-1.12.2-150400.18.8.1 removed - libdevmapper1_03-2.03.22_1.02.196-150500.7.9.1 removed - libip4tc2-1.8.7-1.1 removed - libjson-c3-0.13-3.3.1 removed - libkmod2-29-4.15.1 removed - libp11-kit0-0.23.22-150500.8.3.1 removed - libseccomp2-2.5.3-150400.2.4 removed - libudev1-249.16-150400.8.35.5 removed - netcfg-11.6-3.3.1 removed - pam-config-1.1-3.3.1 removed - systemd-249.16-150400.8.35.5 removed - systemd-default-settings-0.7-3.2.1 removed - systemd-default-settings-branding-SLE-0.7-3.2.1 removed - systemd-presets-branding-SLE-15.1-150100.20.11.1 removed - systemd-presets-common-SUSE-15-150500.20.3.1 removed From sle-updates at lists.suse.com Fri Jan 12 08:11:20 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:11:20 +0100 (CET) Subject: SUSE-CU-2024:196-1: Recommended update of suse/sle15 Message-ID: <20240112081120.884E8FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:196-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.72 , suse/sle15:15.5 , suse/sle15:15.5.36.5.72 Container Release : 36.5.72 Severity : moderate Type : recommended References : 1212160 1215294 1216412 1217593 1217873 1218291 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - zypper-1.14.68-150400.3.40.2 updated From null at suse.de Fri Jan 12 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 12 Jan 2024 08:30:02 -0000 Subject: SUSE-RU-2024:0097-1: moderate: Recommended update for Java Message-ID: <170504820210.21359.5294659269406645385@smelt2.prg2.suse.org> # Recommended update for Java Announcement ID: SUSE-RU-2024:0097-1 Rating: moderate References: Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP4 * Web and Scripting Module 15-SP5 An update that can now be installed. ## Description: This update for Java fixes the following issues: apache-commons-daemon was updated from version 1.3.2 to 1.3.4: * Version 1.3.4: * Procrun: Configured stack size now applies to the main thread when running in JVM mode. Fixes DAEMON-451. * Procrun: If the specified log directory does not exist, attempt to create any missing parent directories, as well as the specified directory, when the service starts. Fixes DAEMON-452. * Procrun: Allow Windows service dependencies to be managed by Procrun or by 'sc config ...'. Fixes DAEMON-458. * jsvc: Fix DaemonController.reload() only working the first time it is called. Fixes DAEMON-459. Thanks to Klaus Malorny. * jsvc: Remove incorrent definition 'supported_os' which defined in psupport.m4 file to fix jsvc build error on riscv64. * Version 1.3.3: * Procrun: ensure all child processes are cleaned up if the service does not stop cleanly. * Procrun: Fix creation of duplicate ACL entries on some Windows platforms. * Updates: * Bump actions/cache from 3.0.8 to 3.0.11. * Bump actions/checkout from 3.0.2 to 3.1.0. * Bump actions/setup-java from 3.5.1 to 3.6.0. * Bump spotbugs-maven-plugin from 4.7.2.0 to 4.7.3.0. aqute-bnd was updated from version 5.2.0 to 6.3.1: * For the full list of changes please consult the following: * https://github.com/bndtools/bnd/wiki/Changes-in-6.3.1 * https://github.com/bndtools/bnd/wiki/Changes-in-6.3.0 * https://github.com/bndtools/bnd/wiki/Changes-in-6.2.0 * https://github.com/bndtools/bnd/wiki/Changes-in-6.1.0 * https://github.com/bndtools/bnd/wiki/Changes-in-6.0.0 * https://github.com/bndtools/bnd/wiki/Changes-in-5.3.0 tomcat-jakartaee-migration: * New package implementation of tomcat-jakartaee-migration at version 1.0.7 libtcnative-1-0 was updated from version 1.2.22 to 1.2.38: * Changes of version 1.2.22 to 1.2.38: * Align default pass phrase prompt with HTTPd. * Fix memory leak in SNI processing. * Update the recommended minimum version of OpenSSL to 1.1.1v. * Update the recommended minimum version of APR to 1.7.4. * Document the TLS rengotiation behaviour. * Add HOWTO-RELEASE.txt that describes the release process. * Refactor library initialization so it is compatible with Tomcat 10.1.x onwards where a number of Java classes have been removed. * Map the OpenSSL 3.x FIPS behaviour to the OpenSSL 1.x API to allow clients to determine if the FIPS provider is being used when Tomcat Native is compiled against OpenSSL 3.x. * Fix crash when attempting to read TLS session ID after a handshake failure. * Enable download_deps.sh to be called from any directory. * Fix release script so it works with the current git layout. * Correct previous fix that enabled building to continue with OpenSSL 3.x. * Remove remaining reference to pkg-config which is no longer included in the Tomcat Native distribution. * Additional changes required to provided support for using OpenSSL Engines that use proprietary key formats. * Correct handling of WINVER in make file to use correct constant for Windows 7. Add constants for Windows 8, Windows 8.1 and Windows 10. Rename WINNT to WIN2k as it is used for Windows 2000 upwards, not Windows NT upwards. * Add a patch for APR that fixes an issue where some Windows systems in some configurations would only listen on IPv6 addresses on dual stack systems even though configured to listen on both IPv6 and IPv4 addresses. * Correct a regression in the fix for 65181 that prevented an error message from being displayed if an invalid key file was provided and no OpenSSL Engine was configured. * Improve support for using OpenSSL Engines that use proprietary key formats. * Enable building to continue against OpenSSL 3.x and 1.1.1. * Incomplete name mangling fix for C++ compilers in tcn_api.h. * Improve OS-specific header include for native thread id. * Disable keylog callback support for LibreSSL. * Add support for SSLContext.addChainCertificateRaw() with LibreSSL 2.9.1 and up. * Add support for HP-UX's _lwp_self() in our ssl_thread_id(void). * Remove default option passed for rpath to linker on HP-UX. * Add an option to allow the OCSP responder check to be bypassed. Note that if OCSP is enabled, a missing responder is now treated as an error. * Fix compilation with LibreSSL. * libtcnative does not compile with OpenSSL < 1.1.0 and APR w/o threading support. * Correct configure message for OpenSSL libdir. * Clean up install target. * configure output for OpenSSL wrong/incomplete sometimes. * Drop obsolete build time workarounds for HP-UX. * Add support for FreeBSD's pthread_getthreadid_np() in our ssl_thread_id(void). * Introduce tcn_get_thread_id(void) to reduce code duplication. * Fix linking against OpenSSL in non-standard locations on FreeBSD. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2024-97=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-97=1 * Web and Scripting Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP4-2024-97=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-97=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-97=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-97=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-97=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-97=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-97=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-97=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-97=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-97=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-97=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-97=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-97=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-97=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-97=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-97=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-97=1 ## Package List: * Development Tools Module 15-SP4 (noarch) * aqute-bndlib-6.3.1-150200.3.12.2 * Development Tools Module 15-SP5 (noarch) * aqute-bndlib-6.3.1-150200.3.12.2 * Web and Scripting Module 15-SP4 (aarch64 ppc64le s390x x86_64) * apache-commons-daemon-debugsource-1.3.4-150200.11.12.2 * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * apache-commons-daemon-1.3.4-150200.11.12.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64) * apache-commons-daemon-debugsource-1.3.4-150200.11.12.2 * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * apache-commons-daemon-1.3.4-150200.11.12.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libtcnative-1-0-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * apache-commons-daemon-debugsource-1.3.4-150200.11.12.2 * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * apache-commons-daemon-1.3.4-150200.11.12.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * libtcnative-1-0-1.2.38-150100.3.9.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * aqute-bndlib-6.3.1-150200.3.12.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * apache-commons-daemon-debugsource-1.3.4-150200.11.12.2 * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * apache-commons-daemon-1.3.4-150200.11.12.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * libtcnative-1-0-1.2.38-150100.3.9.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * aqute-bndlib-6.3.1-150200.3.12.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * apache-commons-daemon-debugsource-1.3.4-150200.11.12.2 * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * apache-commons-daemon-1.3.4-150200.11.12.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * libtcnative-1-0-1.2.38-150100.3.9.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * aqute-bndlib-6.3.1-150200.3.12.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libtcnative-1-0-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * apache-commons-daemon-debugsource-1.3.4-150200.11.12.2 * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * apache-commons-daemon-1.3.4-150200.11.12.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * libtcnative-1-0-1.2.38-150100.3.9.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * aqute-bndlib-6.3.1-150200.3.12.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * apache-commons-daemon-debugsource-1.3.4-150200.11.12.2 * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * apache-commons-daemon-1.3.4-150200.11.12.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * libtcnative-1-0-1.2.38-150100.3.9.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * aqute-bndlib-6.3.1-150200.3.12.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libtcnative-1-0-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * apache-commons-daemon-debugsource-1.3.4-150200.11.12.2 * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * apache-commons-daemon-1.3.4-150200.11.12.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * libtcnative-1-0-1.2.38-150100.3.9.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * aqute-bndlib-6.3.1-150200.3.12.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * apache-commons-daemon-debugsource-1.3.4-150200.11.12.2 * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * apache-commons-daemon-1.3.4-150200.11.12.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * libtcnative-1-0-1.2.38-150100.3.9.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * aqute-bndlib-6.3.1-150200.3.12.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * apache-commons-daemon-debugsource-1.3.4-150200.11.12.2 * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * apache-commons-daemon-1.3.4-150200.11.12.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * libtcnative-1-0-1.2.38-150100.3.9.2 * SUSE Enterprise Storage 7.1 (noarch) * aqute-bndlib-6.3.1-150200.3.12.2 * SUSE CaaS Platform 4.0 (x86_64) * libtcnative-1-0-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * apache-commons-daemon-debugsource-1.3.4-150200.11.12.2 * apache-commons-daemon-jsvc-debuginfo-1.3.4-150200.11.12.2 * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * apache-commons-daemon-1.3.4-150200.11.12.2 * apache-commons-daemon-jsvc-1.3.4-150200.11.12.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * libtcnative-1-0-1.2.38-150100.3.9.2 * openSUSE Leap 15.4 (noarch) * apache-commons-daemon-javadoc-1.3.4-150200.11.12.2 * bnd-maven-plugin-6.3.1-150200.3.12.1 * aqute-bnd-javadoc-6.3.1-150200.3.12.2 * bnd-maven-plugin-javadoc-6.3.1-150200.3.12.1 * aqute-bndlib-6.3.1-150200.3.12.2 * aqute-bnd-6.3.1-150200.3.12.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * apache-commons-daemon-debugsource-1.3.4-150200.11.12.2 * apache-commons-daemon-jsvc-debuginfo-1.3.4-150200.11.12.2 * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-devel-1.2.38-150100.3.9.2 * apache-commons-daemon-1.3.4-150200.11.12.2 * apache-commons-daemon-jsvc-1.3.4-150200.11.12.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * libtcnative-1-0-1.2.38-150100.3.9.2 * openSUSE Leap 15.5 (noarch) * apache-commons-daemon-javadoc-1.3.4-150200.11.12.2 * bnd-maven-plugin-6.3.1-150200.3.12.1 * aqute-bnd-javadoc-6.3.1-150200.3.12.2 * bnd-maven-plugin-javadoc-6.3.1-150200.3.12.1 * aqute-bndlib-6.3.1-150200.3.12.2 * aqute-bnd-6.3.1-150200.3.12.2 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-1.2.38-150100.3.9.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libtcnative-1-0-debugsource-1.2.38-150100.3.9.2 * libtcnative-1-0-1.2.38-150100.3.9.2 * libtcnative-1-0-debuginfo-1.2.38-150100.3.9.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 12 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 12 Jan 2024 08:30:03 -0000 Subject: SUSE-RU-2024:0096-1: moderate: Recommended update for replacer, velocity Message-ID: <170504820359.21359.11061208144192639887@smelt2.prg2.suse.org> # Recommended update for replacer, velocity Announcement ID: SUSE-RU-2024:0096-1 Rating: moderate References: Affected Products: * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that can now be installed. ## Description: This update for replacer, velocity fixes the following issues: replacer: * Port from `commons-lang to commons-lang3` velocity: * Reduce considerably the dependencies graph * Port from `apache-commons-lang` to `apache-commons-lang3` * Make JDK's own logging provider as default ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-96=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-96=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2024-96=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-96=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-96=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-96=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-96=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-96=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-96=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-96=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-96=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-96=1 ## Package List: * openSUSE Leap 15.4 (noarch) * velocity-manual-1.7-150200.3.10.1 * replacer-javadoc-1.6-150200.3.7.5 * velocity-demo-1.7-150200.3.10.1 * replacer-1.6-150200.3.7.5 * velocity-javadoc-1.7-150200.3.10.1 * velocity-1.7-150200.3.10.1 * openSUSE Leap 15.5 (noarch) * velocity-manual-1.7-150200.3.10.1 * replacer-javadoc-1.6-150200.3.7.5 * velocity-demo-1.7-150200.3.10.1 * replacer-1.6-150200.3.7.5 * velocity-javadoc-1.7-150200.3.10.1 * velocity-1.7-150200.3.10.1 * Development Tools Module 15-SP4 (noarch) * velocity-1.7-150200.3.10.1 * Development Tools Module 15-SP5 (noarch) * velocity-1.7-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * velocity-1.7-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * velocity-1.7-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * velocity-1.7-150200.3.10.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * velocity-1.7-150200.3.10.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * velocity-1.7-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * velocity-1.7-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * velocity-1.7-150200.3.10.1 * SUSE Enterprise Storage 7.1 (noarch) * velocity-1.7-150200.3.10.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 12 08:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 12 Jan 2024 08:30:04 -0000 Subject: SUSE-RU-2024:0095-1: moderate: Recommended update for osgi-annotation, osgi-compendium, osgi-core Message-ID: <170504820487.21359.3810984534263854027@smelt2.prg2.suse.org> # Recommended update for osgi-annotation, osgi-compendium, osgi-core Announcement ID: SUSE-RU-2024:0095-1 Rating: moderate References: Affected Products: * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that can now be installed. ## Description: This update for osgi-annotation, osgi-compendium, osgi-core fixes the following issues: * Regenerate the bundle manifest to correspond to what maven-bundle-plugin generates during the maven build ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-95=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-95=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2024-95=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-95=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-95=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-95=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-95=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-95=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-95=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-95=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-95=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-95=1 ## Package List: * openSUSE Leap 15.4 (noarch) * osgi-annotation-8.1.0-150200.3.7.1 * osgi-core-8.0.0-150200.3.7.1 * osgi-core-javadoc-8.0.0-150200.3.7.1 * osgi-compendium-javadoc-7.0.0-150200.3.7.1 * osgi-compendium-7.0.0-150200.3.7.1 * osgi-annotation-javadoc-8.1.0-150200.3.7.1 * openSUSE Leap 15.5 (noarch) * osgi-annotation-8.1.0-150200.3.7.1 * osgi-core-8.0.0-150200.3.7.1 * osgi-core-javadoc-8.0.0-150200.3.7.1 * osgi-compendium-javadoc-7.0.0-150200.3.7.1 * osgi-compendium-7.0.0-150200.3.7.1 * osgi-annotation-javadoc-8.1.0-150200.3.7.1 * Development Tools Module 15-SP4 (noarch) * osgi-core-8.0.0-150200.3.7.1 * osgi-annotation-8.1.0-150200.3.7.1 * osgi-compendium-7.0.0-150200.3.7.1 * Development Tools Module 15-SP5 (noarch) * osgi-core-8.0.0-150200.3.7.1 * osgi-annotation-8.1.0-150200.3.7.1 * osgi-compendium-7.0.0-150200.3.7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * osgi-core-8.0.0-150200.3.7.1 * osgi-annotation-8.1.0-150200.3.7.1 * osgi-compendium-7.0.0-150200.3.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * osgi-core-8.0.0-150200.3.7.1 * osgi-annotation-8.1.0-150200.3.7.1 * osgi-compendium-7.0.0-150200.3.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * osgi-core-8.0.0-150200.3.7.1 * osgi-annotation-8.1.0-150200.3.7.1 * osgi-compendium-7.0.0-150200.3.7.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * osgi-core-8.0.0-150200.3.7.1 * osgi-annotation-8.1.0-150200.3.7.1 * osgi-compendium-7.0.0-150200.3.7.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * osgi-core-8.0.0-150200.3.7.1 * osgi-annotation-8.1.0-150200.3.7.1 * osgi-compendium-7.0.0-150200.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * osgi-core-8.0.0-150200.3.7.1 * osgi-annotation-8.1.0-150200.3.7.1 * osgi-compendium-7.0.0-150200.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * osgi-core-8.0.0-150200.3.7.1 * osgi-annotation-8.1.0-150200.3.7.1 * osgi-compendium-7.0.0-150200.3.7.1 * SUSE Enterprise Storage 7.1 (noarch) * osgi-core-8.0.0-150200.3.7.1 * osgi-annotation-8.1.0-150200.3.7.1 * osgi-compendium-7.0.0-150200.3.7.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 12 08:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 12 Jan 2024 08:30:06 -0000 Subject: SUSE-RU-2024:0094-1: moderate: Recommended update for felix-gogo-command, felix-gogo-runtime, felix-gogo-shell, felix-scr Message-ID: <170504820622.21359.11396365360036494840@smelt2.prg2.suse.org> # Recommended update for felix-gogo-command, felix-gogo-runtime, felix-gogo- shell, felix-scr Announcement ID: SUSE-RU-2024:0094-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 An update that can now be installed. ## Description: This update for felix-gogo-command, felix-gogo-runtime, felix-gogo-shell, felix- scr fixes the following issues: felix-gogo-command: * Updated from version 1.0.2 to 1.1.2: * Improvement * Pulled Java 7 support back in for gogo runtime, shell and console * Bug * Gogo Command bundle should not include org.osgi.service.log classes * Gogo command exports org.osgi.service.log * New Feature * Upgraded to JDK 8 * Upgraded to OSGi r6 * Improvement * Removed transitive dependencies from gogo command * Added requirement & capabilities model so gogo can be resolved * Cleanup compiler warnings * Removed legacy code in Gogo Command * Added some resolver checks to make sure @RequireGogo annotation works for both jline and shell * Create a gogo bom felix-gogo-runtime: * Advertize capability needed by other felix-gogo artifacts felix-gogo-shell: * Updated from version 1.1.0 to 1.1.4: * Pulled Java 7 support back in for gogo runtime,shell and console * Fixed gogo shell thread interrupt. * Added requirement & capabilities model so gogo can be resolved * Added some resolver checks to make sure @RequireGogo annotation works for both jline and shell * Created a gogo bom ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-94=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-94=1 ## Package List: * openSUSE Leap 15.4 (noarch) * felix-gogo-shell-1.1.4-150200.3.3.1 * felix-scr-javadoc-2.1.16-150200.3.7.1 * felix-gogo-shell-javadoc-1.1.4-150200.3.3.1 * felix-gogo-command-javadoc-1.1.2-150200.3.7.1 * felix-gogo-runtime-javadoc-1.1.0-150200.3.7.1 * felix-scr-2.1.16-150200.3.7.1 * felix-gogo-runtime-1.1.0-150200.3.7.1 * felix-gogo-command-1.1.2-150200.3.7.1 * openSUSE Leap 15.5 (noarch) * felix-gogo-shell-1.1.4-150200.3.3.1 * felix-scr-javadoc-2.1.16-150200.3.7.1 * felix-gogo-shell-javadoc-1.1.4-150200.3.3.1 * felix-gogo-command-javadoc-1.1.2-150200.3.7.1 * felix-gogo-runtime-javadoc-1.1.0-150200.3.7.1 * felix-scr-2.1.16-150200.3.7.1 * felix-gogo-runtime-1.1.0-150200.3.7.1 * felix-gogo-command-1.1.2-150200.3.7.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 12 08:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 12 Jan 2024 08:30:08 -0000 Subject: SUSE-RU-2024:0093-1: moderate: Recommended update for antlr3, stringtemplate4 Message-ID: <170504820817.21359.7835338913077610171@smelt2.prg2.suse.org> # Recommended update for antlr3, stringtemplate4 Announcement ID: SUSE-RU-2024:0093-1 Rating: moderate References: * bsc#1047218 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that has one fix can now be installed. ## Description: This update for antlr3, stringtemplate4 fixes the following issues: antlr3: * Fixed package build date and time (bsc#1047218) * Removed obsolete package dependency on maven2 stringtemplate4: * Upgraded to version 4.3.3: * Issues fixed: * Loading template group from STGroupDir in app running on Tomcat 8 fails * Trailing slash on the root dir leads to an IOException when calling URL.openstream() * Improvements, features: * Shift to Linux DCO * Bazel support * Fix for NPE when Thread.currentThread().getContextClassLoader() is null * Add license to pom.xml * Fix escaping for closing angle brackets * Correctly handle surrogate pairs in StringRenderer.encodeHTML * Updating scala documentation to be more idiomatic and work with ST4 * Add test for TypeRegistry ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-93=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-93=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-93=1 ## Package List: * openSUSE Leap 15.5 (noarch) * stringtemplate4-4.3.3-150200.3.7.11 * stringtemplate4-bootstrap-4.3.3-150200.3.7.11 * stringtemplate4-javadoc-4.3.3-150200.3.7.11 * antlr3-bootstrap-tool-3.5.3-150200.3.16.1 * antlr3-javadoc-3.5.3-150200.3.16.1 * antlr3-java-javadoc-3.5.3-150200.3.16.1 * antlr3-java-3.5.3-150200.3.16.1 * antlr3-tool-3.5.3-150200.3.16.1 * SUSE Manager Server 4.3 Module 4.3 (noarch) * antlr3-java-3.5.3-150200.3.16.1 * openSUSE Leap 15.4 (noarch) * stringtemplate4-4.3.3-150200.3.7.11 * stringtemplate4-bootstrap-4.3.3-150200.3.7.11 * stringtemplate4-javadoc-4.3.3-150200.3.7.11 * antlr3-bootstrap-tool-3.5.3-150200.3.16.1 * antlr3-javadoc-3.5.3-150200.3.16.1 * antlr3-java-javadoc-3.5.3-150200.3.16.1 * antlr3-java-3.5.3-150200.3.16.1 * antlr3-tool-3.5.3-150200.3.16.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1047218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 12 08:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 12 Jan 2024 08:30:09 -0000 Subject: SUSE-FU-2024:0092-1: moderate: Feature update for apache-commons-configuration2 Message-ID: <170504820951.21359.11979724627458233973@smelt2.prg2.suse.org> # Feature update for apache-commons-configuration2 Announcement ID: SUSE-FU-2024:0092-1 Rating: moderate References: Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for apache-commons-configuration2 fixes the following issues: * New package implementation of apache-commons-configuration2 at version 2.9 * This will be a package dependency of several packages to phase out the outdated apache-commons-lang ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-92=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-92=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-92=1 ## Package List: * openSUSE Leap 15.5 (noarch) * apache-commons-configuration2-javadoc-2.9.0-150200.5.3.1 * apache-commons-configuration2-2.9.0-150200.5.3.1 * Development Tools Module 15-SP5 (noarch) * apache-commons-configuration2-2.9.0-150200.5.3.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * apache-commons-configuration2-2.9.0-150200.5.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 12 08:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 12 Jan 2024 08:30:10 -0000 Subject: SUSE-FU-2024:0091-1: moderate: Feature update for jetbrains-annotations, saxon10 Message-ID: <170504821096.21359.12223726805165124383@smelt2.prg2.suse.org> # Feature update for jetbrains-annotations, saxon10 Announcement ID: SUSE-FU-2024:0091-1 Rating: moderate References: * jsc#PED-6499 * jsc#PED-7233 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains two features can now be installed. ## Description: This update for jetbrains-annotations, saxon10 fixes the following issues: saxon10: * Initial package implementation at version 23.0.0 (jsc#PED-6499, jsc#PED-7233) jetbrains-annotations: * Initial package implementation of jetbrains-annotations at version 15.0 (jsc#PED-6499, jsc#PED-7233) jline: * New package included as dependency that is needed by saxon10-scripts (jsc#PED-6499, jsc#PED-7233) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-91=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-91=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-91=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-91=1 ## Package List: * openSUSE Leap 15.4 (noarch) * jline-2.14.6-150200.3.6.1 * jline-javadoc-2.14.6-150200.3.6.1 * openSUSE Leap 15.5 (noarch) * jline-2.14.6-150200.3.6.1 * saxon10-javadoc-10.9-150200.5.3.1 * saxon10-scripts-10.9-150200.5.3.1 * saxon10-manual-10.9-150200.5.3.1 * saxon10-demo-10.9-150200.5.3.1 * saxon10-10.9-150200.5.3.1 * jline-javadoc-2.14.6-150200.3.6.1 * Basesystem Module 15-SP5 (noarch) * saxon10-10.9-150200.5.3.1 * Development Tools Module 15-SP5 (noarch) * jline-2.14.6-150200.3.6.1 * saxon10-scripts-10.9-150200.5.3.1 ## References: * https://jira.suse.com/browse/PED-6499 * https://jira.suse.com/browse/PED-7233 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 12 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 12 Jan 2024 12:30:03 -0000 Subject: SUSE-RU-2024:0098-1: moderate: Recommended update for gegl Message-ID: <170506260328.14744.1918407760434166744@smelt2.prg2.suse.org> # Recommended update for gegl Announcement ID: SUSE-RU-2024:0098-1 Rating: moderate References: * jsc#PED-6351 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP4 * Desktop Applications Module 15-SP5 * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP4 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that contains one feature can now be installed. ## Description: This update for gegl and its dependencies fixes the following issues: gegl: * Allow building against a newer libraw (0.21) (jsc#PED-6351) celt, fdk-aac-free, ffmpeg-4, ilmbase, ldacBT, lensfun, libass, libbluray, libbs2b, libcdio-paranoia, libcdio, libdc1394, libgsm, libmfx, libopenmpt, libraw1394, libraw, libspiro, libva, libvdpau, lilv, metis, openexr, pipewire, pulseaudio, rtkit, SDL2, serd, sord, sratom, suitesparse, webrtc-audio- processing, wireplumber: * Deliver missing direct and indirect dependencies of gegl to SUSE Package Hub 15 SP{4,5} for aarch64, ppc64le, s390x and x86_64 * There are NO code changes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-98=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-98=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-98=1 openSUSE-SLE-15.4-2024-98=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-98=1 openSUSE-SLE-15.5-2024-98=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-98=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-98=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-98=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-98=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-98=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-98=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-98=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-98=1 * Desktop Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-98=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-98=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2024-98=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-98=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-98=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-98=1 * SUSE Linux Enterprise Workstation Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2024-98=1 ## Package List: * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * gegl-0_4-0.4.34-150400.3.5.2 * metis-debugsource-5.1.0-150100.9.5.2 * gegl-debugsource-0.4.34-150400.3.5.2 * ffmpeg-4-debuginfo-4.4-150400.3.19.1 * libavcodec58_134-4.4-150400.3.19.1 * pulseaudio-module-lirc-15.0-150400.4.4.1 * libavcodec58_134-debuginfo-4.4-150400.3.19.1 * gegl-0_4-debuginfo-0.4.34-150400.3.5.2 * pulseaudio-module-bluetooth-debuginfo-15.0-150400.4.4.1 * metis-devel-5.1.0-150100.9.5.2 * libavformat58_76-4.4-150400.3.19.1 * libswscale5_9-debuginfo-4.4-150400.3.19.1 * pulseaudio-debugsource-15.0-150400.4.4.1 * pulseaudio-module-bluetooth-15.0-150400.4.4.1 * libgegl-0_4-0-0.4.34-150400.3.5.2 * gegl-devel-0.4.34-150400.3.5.2 * libavutil56_70-debuginfo-4.4-150400.3.19.1 * libswresample3_9-debuginfo-4.4-150400.3.19.1 * libavformat58_76-debuginfo-4.4-150400.3.19.1 * libiso9660-10-debuginfo-0.94-150000.6.13.1 * liblensfun1-debuginfo-0.3.2-150400.3.2.2 * typelib-1_0-Gegl-0_4-0.4.34-150400.3.5.2 * libraw-devel-0.20.2-150400.3.11.3 * ffmpeg-4-debugsource-4.4-150400.3.19.1 * libiso9660-10-0.94-150000.6.13.1 * pulseaudio-module-lirc-debuginfo-15.0-150400.4.4.1 * pulseaudio-debuginfo-15.0-150400.4.4.1 * libavutil56_70-4.4-150400.3.19.1 * libgegl-0_4-0-debuginfo-0.4.34-150400.3.5.2 * lensfun-debugsource-0.3.2-150400.3.2.2 * liblensfun1-0.3.2-150400.3.2.2 * libcdio-debugsource-0.94-150000.6.13.1 * libswresample3_9-4.4-150400.3.19.1 * metis-debuginfo-5.1.0-150100.9.5.2 * libswscale5_9-4.4-150400.3.19.1 * libraw-debugsource-0.20.2-150400.3.11.3 * gegl-debuginfo-0.4.34-150400.3.5.2 * SUSE Linux Enterprise Workstation Extension 15 SP5 (noarch) * gegl-0_4-lang-0.4.34-150400.3.5.2 * lensfun-data-0.3.2-150400.3.2.2 * openSUSE Leap 15.3 (aarch64 ppc64le x86_64 i586) * ldacBT-debugsource-2.0.2.3-150300.3.2.1 * libldac2-2.0.2.3-150300.3.2.1 * ldacBT-devel-2.0.2.3-150300.3.2.1 * libldac2-debuginfo-2.0.2.3-150300.3.2.1 * openSUSE Leap 15.3 (x86_64) * liblilv-0-0-32bit-debuginfo-0.24.10-150300.3.2.1 * libserd-0-0-32bit-0.30.6-150300.3.2.1 * libldac2-32bit-2.0.2.3-150300.3.2.1 * liblilv-0-0-32bit-0.24.10-150300.3.2.1 * libserd-0-0-32bit-debuginfo-0.30.6-150300.3.2.1 * libldac2-32bit-debuginfo-2.0.2.3-150300.3.2.1 * libbluray2-32bit-1.3.0-150300.10.9.1 * libbluray2-32bit-debuginfo-1.3.0-150300.10.9.1 * openSUSE Leap 15.3 (noarch) * libbluray-bdj-1.3.0-150300.10.9.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * serd-debugsource-0.30.6-150300.3.2.1 * libbluray2-1.3.0-150300.10.9.1 * libbluray-debugsource-1.3.0-150300.10.9.1 * liblilv-0-0-debuginfo-0.24.10-150300.3.2.1 * lilv-0.24.10-150300.3.2.1 * lilv-debuginfo-0.24.10-150300.3.2.1 * python3-lilv-0.24.10-150300.3.2.1 * libbluray2-debuginfo-1.3.0-150300.10.9.1 * liblilv-0-devel-0.24.10-150300.3.2.1 * liblilv-0-0-0.24.10-150300.3.2.1 * serdi-0.30.6-150300.3.2.1 * libbluray-tools-debuginfo-1.3.0-150300.10.9.1 * libbluray-tools-1.3.0-150300.10.9.1 * serdi-debuginfo-0.30.6-150300.3.2.1 * libbluray-devel-1.3.0-150300.10.9.1 * lilv-debugsource-0.24.10-150300.3.2.1 * libserd-0-0-debuginfo-0.30.6-150300.3.2.1 * libserd-0-0-0.30.6-150300.3.2.1 * serd-devel-0.30.6-150300.3.2.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libserd-0-0-64bit-debuginfo-0.30.6-150300.3.2.1 * libserd-0-0-64bit-0.30.6-150300.3.2.1 * libbluray2-64bit-debuginfo-1.3.0-150300.10.9.1 * libldac2-64bit-2.0.2.3-150300.3.2.1 * libbluray2-64bit-1.3.0-150300.10.9.1 * liblilv-0-0-64bit-0.24.10-150300.3.2.1 * libldac2-64bit-debuginfo-2.0.2.3-150300.3.2.1 * liblilv-0-0-64bit-debuginfo-0.24.10-150300.3.2.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libva2-2.13.0-150400.3.2.1 * pipewire-modules-0_3-0.3.49-150400.3.5.2 * libva-wayland2-debuginfo-2.13.0-150400.3.2.1 * libva-gl-debugsource-2.13.0-150400.3.2.1 * pulseaudio-utils-debuginfo-15.0-150400.4.4.1 * libbs2b0-debuginfo-3.1.0-150400.3.2.1 * libfdk-aac2-debuginfo-2.0.0-150400.3.2.1 * libpulse-mainloop-glib0-15.0-150400.4.4.1 * pulseaudio-module-zeroconf-15.0-150400.4.4.1 * pulseaudio-module-jack-15.0-150400.4.4.1 * ffmpeg-4-libavutil-devel-4.4-150400.3.19.1 * libgegl-0_4-0-0.4.34-150400.3.5.2 * gstreamer-plugin-pipewire-debuginfo-0.3.49-150400.3.5.2 * libpulse-devel-15.0-150400.4.4.1 * ffmpeg-4-libavdevice-devel-4.4-150400.3.19.1 * pipewire-libjack-0_3-devel-0.3.49-150400.3.5.2 * pipewire-modules-0_3-debuginfo-0.3.49-150400.3.5.2 * ffmpeg-4-private-devel-4.4-150400.3.19.1 * liblensfun1-debuginfo-0.3.2-150400.3.2.2 * pulseaudio-bash-completion-15.0-150400.4.4.1 * pipewire-devel-0.3.49-150400.3.5.2 * pulseaudio-module-gsettings-15.0-150400.4.4.1 * libva-glx2-debuginfo-2.13.0-150400.3.2.1 * ffmpeg-4-libswscale-devel-4.4-150400.3.19.1 * pipewire-libjack-0_3-0.3.49-150400.3.5.2 * lensfun-tools-0.3.2-150400.3.2.2 * pipewire-pulseaudio-0.3.49-150400.3.5.2 * libbs2b0-3.1.0-150400.3.2.1 * libwireplumber-0_4-0-0.4.9-150400.3.5.2 * wireplumber-devel-0.4.9-150400.3.5.2 * gstreamer-plugin-pipewire-0.3.49-150400.3.5.2 * libva-debugsource-2.13.0-150400.3.2.1 * libva2-debuginfo-2.13.0-150400.3.2.1 * libraw-debugsource-0.20.2-150400.3.11.3 * bs2b-tools-3.1.0-150400.3.2.1 * pulseaudio-zsh-completion-15.0-150400.4.4.1 * gegl-debuginfo-0.4.34-150400.3.5.2 * wireplumber-0.4.9-150400.3.5.2 * libbs2b-debugsource-3.1.0-150400.3.2.1 * libavresample4_0-debuginfo-4.4-150400.3.19.1 * pulseaudio-module-lirc-15.0-150400.4.4.1 * libavcodec58_134-debuginfo-4.4-150400.3.19.1 * gegl-0_4-debuginfo-0.4.34-150400.3.5.2 * pulseaudio-module-bluetooth-debuginfo-15.0-150400.4.4.1 * libavfilter7_110-4.4-150400.3.19.1 * libswscale5_9-debuginfo-4.4-150400.3.19.1 * pulseaudio-15.0-150400.4.4.1 * libpulse-mainloop-glib0-debuginfo-15.0-150400.4.4.1 * libwireplumber-0_4-0-debuginfo-0.4.9-150400.3.5.2 * libavformat58_76-debuginfo-4.4-150400.3.19.1 * libpostproc55_9-4.4-150400.3.19.1 * libraw-tools-debuginfo-0.20.2-150400.3.11.3 * libraw-devel-0.20.2-150400.3.11.3 * pulseaudio-module-x11-debuginfo-15.0-150400.4.4.1 * libavutil56_70-4.4-150400.3.19.1 * libgegl-0_4-0-debuginfo-0.4.34-150400.3.5.2 * fdk-aac-free-debugsource-2.0.0-150400.3.2.1 * lensfun-debugsource-0.3.2-150400.3.2.2 * pulseaudio-setup-15.0-150400.4.4.1 * pipewire-spa-tools-0.3.49-150400.3.5.2 * libraw20-0.20.2-150400.3.11.3 * pipewire-alsa-0.3.49-150400.3.5.2 * lensfun-doc-0.3.2-150400.3.2.2 * libva-drm2-2.13.0-150400.3.2.1 * gegl-debugsource-0.4.34-150400.3.5.2 * pipewire-doc-0.3.49-150400.3.5.2 * libpipewire-0_3-0-debuginfo-0.3.49-150400.3.5.2 * typelib-1_0-Wp-0_4-0.4.9-150400.3.5.2 * pipewire-spa-tools-debuginfo-0.3.49-150400.3.5.2 * gegl-0.4.34-150400.3.5.2 * libva-glx2-2.13.0-150400.3.2.1 * libavformat58_76-4.4-150400.3.19.1 * pulseaudio-module-x11-15.0-150400.4.4.1 * pulseaudio-module-gsettings-debuginfo-15.0-150400.4.4.1 * pulseaudio-debugsource-15.0-150400.4.4.1 * pipewire-debugsource-0.3.49-150400.3.5.2 * bs2b-tools-debuginfo-3.1.0-150400.3.2.1 * pipewire-pulseaudio-debuginfo-0.3.49-150400.3.5.2 * libavdevice58_13-4.4-150400.3.19.1 * libva-wayland2-2.13.0-150400.3.2.1 * libva-devel-2.13.0-150400.3.2.1 * libswresample3_9-debuginfo-4.4-150400.3.19.1 * wireplumber-debugsource-0.4.9-150400.3.5.2 * ffmpeg-4-libavfilter-devel-4.4-150400.3.19.1 * python3-lensfun-0.3.2-150400.3.2.2 * libva-drm2-debuginfo-2.13.0-150400.3.2.1 * gegl-doc-0.4.34-150400.3.5.2 * typelib-1_0-Gegl-0_4-0.4.34-150400.3.5.2 * pipewire-debuginfo-0.3.49-150400.3.5.2 * libpipewire-0_3-0-0.3.49-150400.3.5.2 * ffmpeg-4-libpostproc-devel-4.4-150400.3.19.1 * pipewire-spa-plugins-0_2-0.3.49-150400.3.5.2 * liblensfun1-0.3.2-150400.3.2.2 * pulseaudio-module-zeroconf-debuginfo-15.0-150400.4.4.1 * libswscale5_9-4.4-150400.3.19.1 * ffmpeg-4-libavcodec-devel-4.4-150400.3.19.1 * pipewire-tools-debuginfo-0.3.49-150400.3.5.2 * libfdk-aac-devel-2.0.0-150400.3.2.1 * pipewire-tools-0.3.49-150400.3.5.2 * ffmpeg-4-libavformat-devel-4.4-150400.3.19.1 * gegl-0_4-0.4.34-150400.3.5.2 * libraw-tools-0.20.2-150400.3.11.3 * libavfilter7_110-debuginfo-4.4-150400.3.19.1 * pipewire-libjack-0_3-debuginfo-0.3.49-150400.3.5.2 * pipewire-spa-plugins-0_2-debuginfo-0.3.49-150400.3.5.2 * ffmpeg-4-debuginfo-4.4-150400.3.19.1 * libavcodec58_134-4.4-150400.3.19.1 * libva-x11-2-2.13.0-150400.3.2.1 * pipewire-alsa-debuginfo-0.3.49-150400.3.5.2 * libpulse0-debuginfo-15.0-150400.4.4.1 * pulseaudio-system-wide-15.0-150400.4.4.1 * libva-x11-2-debuginfo-2.13.0-150400.3.2.1 * libpostproc55_9-debuginfo-4.4-150400.3.19.1 * pipewire-0.3.49-150400.3.5.2 * libva-gl-devel-2.13.0-150400.3.2.1 * wireplumber-debuginfo-0.4.9-150400.3.5.2 * lensfun-devel-0.3.2-150400.3.2.2 * libavresample4_0-4.4-150400.3.19.1 * pulseaudio-module-bluetooth-15.0-150400.4.4.1 * gegl-devel-0.4.34-150400.3.5.2 * libraw20-debuginfo-0.20.2-150400.3.11.3 * libfdk-aac2-2.0.0-150400.3.2.1 * libavutil56_70-debuginfo-4.4-150400.3.19.1 * libbs2b-devel-3.1.0-150400.3.2.1 * pulseaudio-module-jack-debuginfo-15.0-150400.4.4.1 * libavdevice58_13-debuginfo-4.4-150400.3.19.1 * libpulse0-15.0-150400.4.4.1 * ffmpeg-4-debugsource-4.4-150400.3.19.1 * pulseaudio-utils-15.0-150400.4.4.1 * pulseaudio-module-lirc-debuginfo-15.0-150400.4.4.1 * pulseaudio-debuginfo-15.0-150400.4.4.1 * pulseaudio-gdm-hooks-15.0-150400.4.4.1 * ffmpeg-4-4.4-150400.3.19.1 * libraw-devel-static-0.20.2-150400.3.11.3 * ffmpeg-4-libswresample-devel-4.4-150400.3.19.1 * libswresample3_9-4.4-150400.3.19.1 * ffmpeg-4-libavresample-devel-4.4-150400.3.19.1 * openSUSE Leap 15.4 (x86_64) * libdc1394-22-32bit-2.2.5-150000.3.4.1 * libmodplug1-32bit-debuginfo-0.3.28-150000.2.15.1 * libva-drm2-32bit-debuginfo-2.13.0-150400.3.2.1 * libIlmImfUtil-2_2-23-32bit-debuginfo-2.2.1-150000.3.43.1 * libraw1394-11-32bit-2.1.1-150000.3.4.1 * libmfx1-debuginfo-21.3.4-150400.3.2.2 * libva2-32bit-2.13.0-150400.3.2.1 * libva-x11-2-32bit-2.13.0-150400.3.2.1 * libpulse-devel-32bit-15.0-150400.4.4.1 * libraw1394-devel-32bit-2.1.1-150000.3.4.1 * libpulse-mainloop-glib0-32bit-15.0-150400.4.4.1 * libwebrtc_audio_processing1-32bit-debuginfo-0.3-150000.3.2.1 * libcelt0-2-32bit-debuginfo-0.11.3-150000.3.5.1 * pipewire-spa-plugins-0_2-32bit-0.3.49-150400.3.5.2 * libcelt-devel-32bit-0.11.3-150000.3.5.1 * pipewire-alsa-32bit-0.3.49-150400.3.5.2 * libcdio_cdda2-32bit-10.2+0.93+1-150000.3.4.1 * libavutil56_70-32bit-4.4-150400.3.19.1 * pulseaudio-utils-32bit-debuginfo-15.0-150400.4.4.1 * libpulse0-32bit-15.0-150400.4.4.1 * libswscale5_9-32bit-debuginfo-4.4-150400.3.19.1 * libgegl-0_4-0-32bit-0.4.34-150400.3.5.2 * libva-drm2-32bit-2.13.0-150400.3.2.1 * libsord-0-0-32bit-0.16.0-150000.3.2.1 * libavdevice58_13-32bit-debuginfo-4.4-150400.3.19.1 * libpostproc55_9-32bit-debuginfo-4.4-150400.3.19.1 * libmfx1-21.3.4-150400.3.2.2 * libcdio_paranoia2-32bit-debuginfo-10.2+0.93+1-150000.3.4.1 * libcdio16-32bit-debuginfo-0.94-150000.6.13.1 * libavfilter7_110-32bit-debuginfo-4.4-150400.3.19.1 * libpipewire-0_3-0-32bit-debuginfo-0.3.49-150400.3.5.2 * libva-wayland2-32bit-debuginfo-2.13.0-150400.3.2.1 * libopenmpt_modplug1-32bit-debuginfo-0.3.28-150000.2.15.1 * libdc1394-22-32bit-debuginfo-2.2.5-150000.3.4.1 * libbluray2-32bit-1.3.0-150300.10.9.1 * libgegl-0_4-0-32bit-debuginfo-0.4.34-150400.3.5.2 * pipewire-alsa-32bit-debuginfo-0.3.49-150400.3.5.2 * libraw1394-11-32bit-debuginfo-2.1.1-150000.3.4.1 * libvdpau_trace1-32bit-1.1.1-150000.3.4.1 * libcelt0-2-32bit-0.11.3-150000.3.5.1 * libmodplug1-32bit-0.3.28-150000.2.15.1 * libcdio_cdda2-32bit-debuginfo-10.2+0.93+1-150000.3.4.1 * libsratom-0-0-32bit-0.6.0-150000.3.2.1 * libavfilter7_110-32bit-4.4-150400.3.19.1 * libHalf23-32bit-debuginfo-2.2.1-150000.3.3.1 * libIexMath-2_2-23-32bit-debuginfo-2.2.1-150000.3.3.1 * libmfx-21.3.4-150400.3.2.2 * libva-gl-devel-32bit-2.13.0-150400.3.2.1 * libiso9660-10-32bit-debuginfo-0.94-150000.6.13.1 * libmfx-samples-debuginfo-21.3.4-150400.3.2.2 * libIexMath-2_2-23-32bit-2.2.1-150000.3.3.1 * libSDL2-2_0-0-32bit-debuginfo-2.0.8-150200.11.11.1 * libbs2b0-32bit-3.1.0-150400.3.2.1 * libbluray2-32bit-debuginfo-1.3.0-150300.10.9.1 * libvdpau-devel-32bit-1.1.1-150000.3.4.1 * libIex-2_2-23-32bit-2.2.1-150000.3.3.1 * libgsm-devel-32bit-1.0.14-150000.3.6.1 * libIlmImf-2_2-23-32bit-2.2.1-150000.3.43.1 * libswresample3_9-32bit-debuginfo-4.4-150400.3.19.1 * libIlmThread-2_2-23-32bit-2.2.1-150000.3.3.1 * libavformat58_76-32bit-debuginfo-4.4-150400.3.19.1 * libavresample4_0-32bit-debuginfo-4.4-150400.3.19.1 * libraw20-32bit-debuginfo-0.20.2-150400.3.11.3 * libIlmImfUtil-2_2-23-32bit-2.2.1-150000.3.43.1 * libavresample4_0-32bit-4.4-150400.3.19.1 * libraw20-32bit-0.20.2-150400.3.11.3 * libfdk-aac2-32bit-debuginfo-2.0.0-150400.3.2.1 * libswscale5_9-32bit-4.4-150400.3.19.1 * pipewire-libjack-0_3-32bit-0.3.49-150400.3.5.2 * libsratom-0-0-32bit-debuginfo-0.6.0-150000.3.2.1 * libpipewire-0_3-0-32bit-0.3.49-150400.3.5.2 * libsord-0-0-32bit-debuginfo-0.16.0-150000.3.2.1 * libpulse-mainloop-glib0-32bit-debuginfo-15.0-150400.4.4.1 * libavcodec58_134-32bit-debuginfo-4.4-150400.3.19.1 * libwebrtc_audio_processing1-32bit-0.3-150000.3.2.1 * libldac2-32bit-2.0.2.3-150300.3.2.1 * libavformat58_76-32bit-4.4-150400.3.19.1 * libcdio_paranoia2-32bit-10.2+0.93+1-150000.3.4.1 * libpulse0-32bit-debuginfo-15.0-150400.4.4.1 * libass9-32bit-0.14.0-150000.3.13.1 * libva-glx2-32bit-debuginfo-2.13.0-150400.3.2.1 * libIlmThread-2_2-23-32bit-debuginfo-2.2.1-150000.3.3.1 * libpostproc55_9-32bit-4.4-150400.3.19.1 * libmfx-debuginfo-21.3.4-150400.3.2.2 * liblilv-0-0-32bit-0.24.10-150300.3.2.1 * libmfx-devel-21.3.4-150400.3.2.2 * libImath-2_2-23-32bit-2.2.1-150000.3.3.1 * libSDL2-2_0-0-32bit-2.0.8-150200.11.11.1 * libcdio16-32bit-0.94-150000.6.13.1 * libavdevice58_13-32bit-4.4-150400.3.19.1 * pipewire-libjack-0_3-32bit-debuginfo-0.3.49-150400.3.5.2 * libfdk-aac2-32bit-2.0.0-150400.3.2.1 * libgsm1-32bit-debuginfo-1.0.14-150000.3.6.1 * libvdpau1-32bit-1.1.1-150000.3.4.1 * libvdpau1-32bit-debuginfo-1.1.1-150000.3.4.1 * libva2-32bit-debuginfo-2.13.0-150400.3.2.1 * libva-wayland2-32bit-2.13.0-150400.3.2.1 * libSDL2-devel-32bit-2.0.8-150200.11.11.1 * libImath-2_2-23-32bit-debuginfo-2.2.1-150000.3.3.1 * libgsm1-32bit-1.0.14-150000.3.6.1 * pipewire-spa-plugins-0_2-32bit-debuginfo-0.3.49-150400.3.5.2 * libIex-2_2-23-32bit-debuginfo-2.2.1-150000.3.3.1 * liblilv-0-0-32bit-debuginfo-0.24.10-150300.3.2.1 * libbs2b0-32bit-debuginfo-3.1.0-150400.3.2.1 * libva-glx2-32bit-2.13.0-150400.3.2.1 * libavcodec58_134-32bit-4.4-150400.3.19.1 * libserd-0-0-32bit-0.30.6-150300.3.2.1 * libva-devel-32bit-2.13.0-150400.3.2.1 * pulseaudio-utils-32bit-15.0-150400.4.4.1 * pipewire-modules-0_3-32bit-debuginfo-0.3.49-150400.3.5.2 * libva-x11-2-32bit-debuginfo-2.13.0-150400.3.2.1 * libmfx-samples-21.3.4-150400.3.2.2 * libopenmpt0-32bit-debuginfo-0.3.28-150000.2.15.1 * libavutil56_70-32bit-debuginfo-4.4-150400.3.19.1 * libldac2-32bit-debuginfo-2.0.2.3-150300.3.2.1 * libass9-32bit-debuginfo-0.14.0-150000.3.13.1 * pipewire-modules-0_3-32bit-0.3.49-150400.3.5.2 * libHalf23-32bit-2.2.1-150000.3.3.1 * libvdpau_trace1-32bit-debuginfo-1.1.1-150000.3.4.1 * libiso9660-10-32bit-0.94-150000.6.13.1 * libmfx-debugsource-21.3.4-150400.3.2.2 * libopenmpt_modplug1-32bit-0.3.28-150000.2.15.1 * libIlmImf-2_2-23-32bit-debuginfo-2.2.1-150000.3.43.1 * libswresample3_9-32bit-4.4-150400.3.19.1 * libserd-0-0-32bit-debuginfo-0.30.6-150300.3.2.1 * libopenmpt0-32bit-0.3.28-150000.2.15.1 * openSUSE Leap 15.4 (noarch) * system-user-pulse-15.0-150400.4.4.1 * libbluray-bdj-1.3.0-150300.10.9.1 * metis-gnu-hpc-examples-5.1.0-150100.9.5.2 * metis-gnu-hpc-doc-5.1.0-150100.9.5.2 * lensfun-data-0.3.2-150400.3.2.2 * wireplumber-audio-0.4.9-150400.3.5.2 * metis_5_1_0-gnu-hpc-doc-5.1.0-150100.9.5.2 * gegl-0_4-lang-0.4.34-150400.3.5.2 * metis-examples-5.1.0-150100.9.5.2 * pulseaudio-lang-15.0-150400.4.4.1 * pipewire-lang-0.3.49-150400.3.5.2 * metis-doc-5.1.0-150100.9.5.2 * metis_5_1_0-gnu-hpc-examples-5.1.0-150100.9.5.2 * metis-gnu-hpc-5.1.0-150100.9.5.2 * metis-gnu-hpc-devel-5.1.0-150100.9.5.2 * openSUSE Leap 15.4 (aarch64_ilp32) * libavdevice58_13-64bit-debuginfo-4.4-150400.3.19.1 * pipewire-spa-plugins-0_2-64bit-0.3.49-150400.3.5.2 * pulseaudio-utils-64bit-debuginfo-15.0-150400.4.4.1 * libpulse-devel-64bit-15.0-150400.4.4.1 * pulseaudio-utils-64bit-15.0-150400.4.4.1 * pipewire-modules-0_3-64bit-0.3.49-150400.3.5.2 * libva-glx2-64bit-2.13.0-150400.3.2.1 * libva-wayland2-64bit-debuginfo-2.13.0-150400.3.2.1 * libpulse-mainloop-glib0-64bit-15.0-150400.4.4.1 * libswscale5_9-64bit-4.4-150400.3.19.1 * libavdevice58_13-64bit-4.4-150400.3.19.1 * libswscale5_9-64bit-debuginfo-4.4-150400.3.19.1 * libva-devel-64bit-2.13.0-150400.3.2.1 * pipewire-libjack-0_3-64bit-debuginfo-0.3.49-150400.3.5.2 * libswresample3_9-64bit-4.4-150400.3.19.1 * libavresample4_0-64bit-4.4-150400.3.19.1 * libraw20-64bit-0.20.2-150400.3.11.3 * libpipewire-0_3-0-64bit-0.3.49-150400.3.5.2 * libavresample4_0-64bit-debuginfo-4.4-150400.3.19.1 * libva-glx2-64bit-debuginfo-2.13.0-150400.3.2.1 * libva-drm2-64bit-debuginfo-2.13.0-150400.3.2.1 * libavcodec58_134-64bit-4.4-150400.3.19.1 * libgegl-0_4-0-64bit-debuginfo-0.4.34-150400.3.5.2 * libva-drm2-64bit-2.13.0-150400.3.2.1 * libpulse-mainloop-glib0-64bit-debuginfo-15.0-150400.4.4.1 * libfdk-aac2-64bit-debuginfo-2.0.0-150400.3.2.1 * libavcodec58_134-64bit-debuginfo-4.4-150400.3.19.1 * libavfilter7_110-64bit-4.4-150400.3.19.1 * libbs2b0-64bit-debuginfo-3.1.0-150400.3.2.1 * libpulse0-64bit-15.0-150400.4.4.1 * libva2-64bit-2.13.0-150400.3.2.1 * libavfilter7_110-64bit-debuginfo-4.4-150400.3.19.1 * libpostproc55_9-64bit-4.4-150400.3.19.1 * libva-wayland2-64bit-2.13.0-150400.3.2.1 * pipewire-modules-0_3-64bit-debuginfo-0.3.49-150400.3.5.2 * libgegl-0_4-0-64bit-0.4.34-150400.3.5.2 * libva-gl-devel-64bit-2.13.0-150400.3.2.1 * libavformat58_76-64bit-4.4-150400.3.19.1 * pipewire-alsa-64bit-0.3.49-150400.3.5.2 * libavutil56_70-64bit-4.4-150400.3.19.1 * libraw20-64bit-debuginfo-0.20.2-150400.3.11.3 * libavutil56_70-64bit-debuginfo-4.4-150400.3.19.1 * libbs2b0-64bit-3.1.0-150400.3.2.1 * libswresample3_9-64bit-debuginfo-4.4-150400.3.19.1 * pipewire-alsa-64bit-debuginfo-0.3.49-150400.3.5.2 * libpulse0-64bit-debuginfo-15.0-150400.4.4.1 * libva-x11-2-64bit-debuginfo-2.13.0-150400.3.2.1 * libfdk-aac2-64bit-2.0.0-150400.3.2.1 * libpipewire-0_3-0-64bit-debuginfo-0.3.49-150400.3.5.2 * libavformat58_76-64bit-debuginfo-4.4-150400.3.19.1 * libva2-64bit-debuginfo-2.13.0-150400.3.2.1 * libva-x11-2-64bit-2.13.0-150400.3.2.1 * pipewire-libjack-0_3-64bit-0.3.49-150400.3.5.2 * pipewire-spa-plugins-0_2-64bit-debuginfo-0.3.49-150400.3.5.2 * libpostproc55_9-64bit-debuginfo-4.4-150400.3.19.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libIex-2_2-23-2.2.1-150000.3.3.1 * python3-lilv-0.24.10-150300.3.2.1 * webrtc-audio-processing-debugsource-0.3-150000.3.2.1 * libsuitesparseconfig5-5.2.0-150100.9.2.3 * libcdio_paranoia2-10.2+0.93+1-150000.3.4.1 * metis-debugsource-5.1.0-150100.9.5.2 * libsuitesparseconfig5-debuginfo-5.2.0-150100.9.2.3 * libcamd2-2.4.6-150100.9.2.3 * libmetis_5_1_0-gnu-hpc-5.1.0-150100.9.5.2 * libmodplug1-0.3.28-150000.2.15.1 * openexr-2.2.1-150000.3.43.1 * librbio2-2.2.6-150100.9.2.3 * libass9-debuginfo-0.14.0-150000.3.13.1 * libamd2-debuginfo-2.4.6-150100.9.2.3 * libass-devel-0.14.0-150000.3.13.1 * libIex-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libldl2-2.2.6-150100.9.2.3 * libwebrtc_audio_processing1-0.3-150000.3.2.1 * libopenmpt0-0.3.28-150000.2.15.1 * libcsparse3-3.2.0-150100.9.2.3 * libsratom-0-0-0.6.0-150000.3.2.1 * libcxsparse3-3.2.0-150100.9.2.3 * rtkit-debugsource-0.11+git.20130926-150000.3.5.1 * libcdio-paranoia-debugsource-10.2+0.93+1-150000.3.4.1 * libSDL2-devel-2.0.8-150200.11.11.1 * libbluray2-1.3.0-150300.10.9.1 * libspiro0-0.5.20150702-150000.3.2.1 * ilmbase-debugsource-2.2.1-150000.3.3.1 * libklu1-debuginfo-1.3.9-150100.9.2.3 * lilv-0.24.10-150300.3.2.1 * libcdio_paranoia2-debuginfo-10.2+0.93+1-150000.3.4.1 * libIlmImfUtil-2_2-23-2.2.1-150000.3.43.1 * libSDL2-2_0-0-2.0.8-150200.11.11.1 * sratom-devel-0.6.0-150000.3.2.1 * libraw1394-devel-2.1.1-150000.3.4.1 * libcolamd2-2.9.6-150100.9.2.3 * libbluray-tools-debuginfo-1.3.0-150300.10.9.1 * metis_5_1_0-gnu-hpc-devel-5.1.0-150100.9.5.2 * suitesparse-debuginfo-5.2.0-150100.9.2.3 * libass-debugsource-0.14.0-150000.3.13.1 * openexr-debugsource-2.2.1-150000.3.43.1 * libbtf1-1.2.6-150100.9.2.3 * suitesparse-debugsource-5.2.0-150100.9.2.3 * libImath-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libspqr2-2.0.8-150100.9.2.3 * libHalf23-debuginfo-2.2.1-150000.3.3.1 * openexr-devel-2.2.1-150000.3.43.1 * celt-0.11.3-150000.3.5.1 * libcdio_cdda2-debuginfo-10.2+0.93+1-150000.3.4.1 * libdc1394-tools-debuginfo-2.2.5-150000.3.4.1 * libgsm1-1.0.14-150000.3.6.1 * rtkit-0.11+git.20130926-150000.3.5.1 * libcdio_cdda2-10.2+0.93+1-150000.3.4.1 * celt-debuginfo-0.11.3-150000.3.5.1 * metis-devel-5.1.0-150100.9.5.2 * libIlmImf-2_2-23-2.2.1-150000.3.43.1 * metis_5_1_0-gnu-hpc-5.1.0-150100.9.5.2 * libdc1394-22-2.2.5-150000.3.4.1 * liblilv-0-0-0.24.10-150300.3.2.1 * libIexMath-2_2-23-2.2.1-150000.3.3.1 * libopenmpt0-debuginfo-0.3.28-150000.2.15.1 * libcamd2-debuginfo-2.4.6-150100.9.2.3 * libwebrtc_audio_processing-devel-0.3-150000.3.2.1 * libdc1394-tools-2.2.5-150000.3.4.1 * suitesparse-devel-static-5.2.0-150100.9.2.3 * rtkit-debuginfo-0.11+git.20130926-150000.3.5.1 * libccolamd2-debuginfo-2.9.6-150100.9.2.3 * libcdio-paranoia-devel-10.2+0.93+1-150000.3.4.1 * libbluray-devel-1.3.0-150300.10.9.1 * libserd-0-0-debuginfo-0.30.6-150300.3.2.1 * libHalf23-2.2.1-150000.3.3.1 * libklu1-1.3.9-150100.9.2.3 * libcxsparse3-debuginfo-3.2.0-150100.9.2.3 * libwebrtc_audio_processing1-debuginfo-0.3-150000.3.2.1 * serd-debugsource-0.30.6-150300.3.2.1 * openexr-doc-2.2.1-150000.3.43.1 * sord-0.16.0-150000.3.2.1 * libIlmImf-2_2-23-debuginfo-2.2.1-150000.3.43.1 * libbluray2-debuginfo-1.3.0-150300.10.9.1 * libgraphblas2-debuginfo-2.0.1-150100.9.2.3 * libopenmpt-devel-0.3.28-150000.2.15.1 * metis_5_1_0-gnu-hpc-debuginfo-5.1.0-150100.9.5.2 * libvdpau1-debuginfo-1.1.1-150000.3.4.1 * libgsm1-debuginfo-1.0.14-150000.3.6.1 * librbio2-debuginfo-2.2.6-150100.9.2.3 * libvdpau_trace1-1.1.1-150000.3.4.1 * metis-debuginfo-5.1.0-150100.9.5.2 * lilv-debugsource-0.24.10-150300.3.2.1 * libspiro-devel-0.5.20150702-150000.3.2.1 * libvdpau-debugsource-1.1.1-150000.3.4.1 * libcholmod3-debuginfo-3.0.12-150100.9.2.3 * libsratom-0-0-debuginfo-0.6.0-150000.3.2.1 * libspqr2-debuginfo-2.0.8-150100.9.2.3 * libmetis5-5.1.0-150100.9.5.2 * libcolamd2-debuginfo-2.9.6-150100.9.2.3 * libSDL2-2_0-0-debuginfo-2.0.8-150200.11.11.1 * libIlmImfUtil-2_2-23-debuginfo-2.2.1-150000.3.43.1 * libass9-0.14.0-150000.3.13.1 * libvdpau_trace1-debuginfo-1.1.1-150000.3.4.1 * openmpt123-0.3.28-150000.2.15.1 * libcdio16-0.94-150000.6.13.1 * libraw1394-11-debuginfo-2.1.1-150000.3.4.1 * libspiro0-debuginfo-0.5.20150702-150000.3.2.1 * libbtf1-debuginfo-1.2.6-150100.9.2.3 * liblilv-0-devel-0.24.10-150300.3.2.1 * libmetis5-debuginfo-5.1.0-150100.9.5.2 * libraw1394-tools-debuginfo-2.1.1-150000.3.4.1 * sratom-debugsource-0.6.0-150000.3.2.1 * libvdpau1-1.1.1-150000.3.4.1 * serdi-debuginfo-0.30.6-150300.3.2.1 * openmpt123-debuginfo-0.3.28-150000.2.15.1 * libiso9660-10-debuginfo-0.94-150000.6.13.1 * libgsm-utils-debuginfo-1.0.14-150000.3.6.1 * openexr-debuginfo-2.2.1-150000.3.43.1 * libmodplug-devel-0.3.28-150000.2.15.1 * suitesparse-devel-debuginfo-5.2.0-150100.9.2.3 * libdc1394-debugsource-2.2.5-150000.3.4.1 * libcelt0-2-debuginfo-0.11.3-150000.3.5.1 * libraw1394-11-2.1.1-150000.3.4.1 * libmetis-gnu-hpc-5.1.0-150100.9.5.2 * metis_5_1_0-gnu-hpc-debugsource-5.1.0-150100.9.5.2 * libamd2-2.4.6-150100.9.2.3 * cd-paranoia-10.2+0.93+1-150000.3.4.1 * libgraphblas2-2.0.1-150100.9.2.3 * libwebrtc_audio_processing-devel-static-0.3-150000.3.2.1 * SDL2-debugsource-2.0.8-150200.11.11.1 * suitesparse-devel-5.2.0-150100.9.2.3 * libIlmThread-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libmetis_5_1_0-gnu-hpc-debuginfo-5.1.0-150100.9.5.2 * libccolamd2-2.9.6-150100.9.2.3 * libopenmpt_modplug1-0.3.28-150000.2.15.1 * libgsm-debugsource-1.0.14-150000.3.6.1 * libImath-2_2-23-2.2.1-150000.3.3.1 * libldl2-debuginfo-2.2.6-150100.9.2.3 * libcdio16-debuginfo-0.94-150000.6.13.1 * libraw1394-tools-2.1.1-150000.3.4.1 * libmodplug1-debuginfo-0.3.28-150000.2.15.1 * serd-devel-0.30.6-150300.3.2.1 * libumfpack5-5.7.6-150100.9.2.3 * libIexMath-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libgsm-devel-1.0.14-150000.3.6.1 * libcelt-devel-0.11.3-150000.3.5.1 * celt-debugsource-0.11.3-150000.3.5.1 * sord-devel-0.16.0-150000.3.2.1 * cd-paranoia-debuginfo-10.2+0.93+1-150000.3.4.1 * sord-debuginfo-0.16.0-150000.3.2.1 * libumfpack5-debuginfo-5.7.6-150100.9.2.3 * libopenmpt_modplug1-debuginfo-0.3.28-150000.2.15.1 * libcelt0-2-0.11.3-150000.3.5.1 * metis-5.1.0-150100.9.5.2 * libbluray-debugsource-1.3.0-150300.10.9.1 * liblilv-0-0-debuginfo-0.24.10-150300.3.2.1 * sord-debugsource-0.16.0-150000.3.2.1 * libgsm-utils-1.0.14-150000.3.6.1 * libcsparse3-debuginfo-3.2.0-150100.9.2.3 * libspiro-debugsource-0.5.20150702-150000.3.2.1 * libsord-0-0-0.16.0-150000.3.2.1 * libbluray-tools-1.3.0-150300.10.9.1 * serdi-0.30.6-150300.3.2.1 * libiso9660-10-0.94-150000.6.13.1 * libopenmpt-debugsource-0.3.28-150000.2.15.1 * ilmbase-devel-2.2.1-150000.3.3.1 * libraw1394-debugsource-2.1.1-150000.3.4.1 * lilv-debuginfo-0.24.10-150300.3.2.1 * libdc1394-devel-2.2.5-150000.3.4.1 * libdc1394-22-debuginfo-2.2.5-150000.3.4.1 * libcholmod3-3.0.12-150100.9.2.3 * libIlmThread-2_2-23-2.2.1-150000.3.3.1 * libsord-0-0-debuginfo-0.16.0-150000.3.2.1 * libvdpau-devel-1.1.1-150000.3.4.1 * libserd-0-0-0.30.6-150300.3.2.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * ldacBT-debugsource-2.0.2.3-150300.3.2.1 * libldac2-2.0.2.3-150300.3.2.1 * ldacBT-devel-2.0.2.3-150300.3.2.1 * libldac2-debuginfo-2.0.2.3-150300.3.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libva-drm2-debuginfo-2.16.0-150500.3.2.1 * pipewire-alsa-0.3.64-150500.3.5.2 * pipewire-devel-0.3.64-150500.3.5.2 * pipewire-modules-0_3-debuginfo-0.3.64-150500.3.5.2 * pipewire-libjack-0_3-devel-0.3.64-150500.3.5.2 * libva-wayland2-2.16.0-150500.3.2.1 * libva-glx2-debuginfo-2.16.0-150500.3.2.1 * libva-debugsource-2.16.0-150500.3.2.1 * libva2-debuginfo-2.16.0-150500.3.2.1 * wireplumber-0.4.13-150500.3.2.1 * pipewire-doc-0.3.64-150500.3.5.2 * wireplumber-devel-0.4.13-150500.3.2.1 * pipewire-debuginfo-0.3.64-150500.3.5.2 * gstreamer-plugin-pipewire-0.3.64-150500.3.5.2 * pipewire-spa-tools-debuginfo-0.3.64-150500.3.5.2 * libva-x11-2-debuginfo-2.16.0-150500.3.2.1 * libwireplumber-0_4-0-0.4.13-150500.3.2.1 * libva-gl-debugsource-2.16.0-150500.3.2.1 * pipewire-tools-0.3.64-150500.3.5.2 * pipewire-libjack-0_3-0.3.64-150500.3.5.2 * pipewire-module-x11-0_3-0.3.64-150500.3.5.2 * pipewire-spa-plugins-0_2-debuginfo-0.3.64-150500.3.5.2 * typelib-1_0-Wp-0_4-0.4.13-150500.3.2.1 * libva2-2.16.0-150500.3.2.1 * pipewire-spa-plugins-0_2-0.3.64-150500.3.5.2 * pipewire-modules-0_3-0.3.64-150500.3.5.2 * libva-x11-2-2.16.0-150500.3.2.1 * libva-glx2-2.16.0-150500.3.2.1 * libwireplumber-0_4-0-debuginfo-0.4.13-150500.3.2.1 * pipewire-debugsource-0.3.64-150500.3.5.2 * pipewire-spa-tools-0.3.64-150500.3.5.2 * pipewire-module-x11-0_3-debuginfo-0.3.64-150500.3.5.2 * pipewire-libjack-0_3-debuginfo-0.3.64-150500.3.5.2 * pipewire-0.3.64-150500.3.5.2 * libva-drm2-2.16.0-150500.3.2.1 * pipewire-pulseaudio-debuginfo-0.3.64-150500.3.5.2 * libpipewire-0_3-0-0.3.64-150500.3.5.2 * pipewire-tools-debuginfo-0.3.64-150500.3.5.2 * libva-wayland2-debuginfo-2.16.0-150500.3.2.1 * libva-gl-devel-2.16.0-150500.3.2.1 * gstreamer-plugin-pipewire-debuginfo-0.3.64-150500.3.5.2 * pipewire-pulseaudio-0.3.64-150500.3.5.2 * pipewire-alsa-debuginfo-0.3.64-150500.3.5.2 * libva-devel-2.16.0-150500.3.2.1 * libpipewire-0_3-0-debuginfo-0.3.64-150500.3.5.2 * wireplumber-debuginfo-0.4.13-150500.3.2.1 * wireplumber-debugsource-0.4.13-150500.3.2.1 * openSUSE Leap 15.5 (x86_64) * libdc1394-22-32bit-2.2.5-150000.3.4.1 * pipewire-spa-plugins-0_2-32bit-0.3.64-150500.3.5.2 * libmodplug1-32bit-debuginfo-0.3.28-150000.2.15.1 * libIlmImfUtil-2_2-23-32bit-debuginfo-2.2.1-150000.3.43.1 * libraw1394-11-32bit-2.1.1-150000.3.4.1 * libmfx-devel-22.6.1-150500.3.2.4 * libpulse-devel-32bit-15.0-150400.4.4.1 * libraw1394-devel-32bit-2.1.1-150000.3.4.1 * libpulse-mainloop-glib0-32bit-15.0-150400.4.4.1 * libwebrtc_audio_processing1-32bit-debuginfo-0.3-150000.3.2.1 * libcelt0-2-32bit-debuginfo-0.11.3-150000.3.5.1 * libcelt-devel-32bit-0.11.3-150000.3.5.1 * libmfx-samples-22.6.1-150500.3.2.4 * libcdio_cdda2-32bit-10.2+0.93+1-150000.3.4.1 * libavutil56_70-32bit-4.4-150400.3.19.1 * pulseaudio-utils-32bit-debuginfo-15.0-150400.4.4.1 * pipewire-alsa-32bit-debuginfo-0.3.64-150500.3.5.2 * libpulse0-32bit-15.0-150400.4.4.1 * libpipewire-0_3-0-32bit-0.3.64-150500.3.5.2 * pipewire-libjack-0_3-32bit-0.3.64-150500.3.5.2 * libswscale5_9-32bit-debuginfo-4.4-150400.3.19.1 * libgegl-0_4-0-32bit-0.4.34-150400.3.5.2 * libsord-0-0-32bit-0.16.0-150000.3.2.1 * libavdevice58_13-32bit-debuginfo-4.4-150400.3.19.1 * libpostproc55_9-32bit-debuginfo-4.4-150400.3.19.1 * libcdio_paranoia2-32bit-debuginfo-10.2+0.93+1-150000.3.4.1 * libavfilter7_110-32bit-debuginfo-4.4-150400.3.19.1 * libopenmpt_modplug1-32bit-debuginfo-0.3.28-150000.2.15.1 * libdc1394-22-32bit-debuginfo-2.2.5-150000.3.4.1 * libbluray2-32bit-1.3.0-150300.10.9.1 * libva-wayland2-32bit-2.16.0-150500.3.2.1 * libgegl-0_4-0-32bit-debuginfo-0.4.34-150400.3.5.2 * libraw1394-11-32bit-debuginfo-2.1.1-150000.3.4.1 * libvdpau_trace1-32bit-1.1.1-150000.3.4.1 * libcelt0-2-32bit-0.11.3-150000.3.5.1 * libmodplug1-32bit-0.3.28-150000.2.15.1 * libcdio_cdda2-32bit-debuginfo-10.2+0.93+1-150000.3.4.1 * libsratom-0-0-32bit-0.6.0-150000.3.2.1 * libavfilter7_110-32bit-4.4-150400.3.19.1 * libHalf23-32bit-debuginfo-2.2.1-150000.3.3.1 * libIexMath-2_2-23-32bit-debuginfo-2.2.1-150000.3.3.1 * libva2-32bit-debuginfo-2.16.0-150500.3.2.1 * libIexMath-2_2-23-32bit-2.2.1-150000.3.3.1 * libSDL2-2_0-0-32bit-debuginfo-2.0.8-150200.11.11.1 * libbs2b0-32bit-3.1.0-150400.3.2.1 * libbluray2-32bit-debuginfo-1.3.0-150300.10.9.1 * libmfx-22.6.1-150500.3.2.4 * libvdpau-devel-32bit-1.1.1-150000.3.4.1 * libIex-2_2-23-32bit-2.2.1-150000.3.3.1 * libgsm-devel-32bit-1.0.14-150000.3.6.1 * libIlmImf-2_2-23-32bit-2.2.1-150000.3.43.1 * libva-gl-devel-32bit-2.16.0-150500.3.2.1 * libswresample3_9-32bit-debuginfo-4.4-150400.3.19.1 * libIlmThread-2_2-23-32bit-2.2.1-150000.3.3.1 * libavformat58_76-32bit-debuginfo-4.4-150400.3.19.1 * libavresample4_0-32bit-debuginfo-4.4-150400.3.19.1 * pipewire-alsa-32bit-0.3.64-150500.3.5.2 * libraw20-32bit-debuginfo-0.20.2-150400.3.11.3 * libIlmImfUtil-2_2-23-32bit-2.2.1-150000.3.43.1 * libavresample4_0-32bit-4.4-150400.3.19.1 * pipewire-modules-0_3-32bit-0.3.64-150500.3.5.2 * libraw20-32bit-0.20.2-150400.3.11.3 * libmfx1-debuginfo-22.6.1-150500.3.2.4 * libfdk-aac2-32bit-debuginfo-2.0.0-150400.3.2.1 * libswscale5_9-32bit-4.4-150400.3.19.1 * libsratom-0-0-32bit-debuginfo-0.6.0-150000.3.2.1 * libsord-0-0-32bit-debuginfo-0.16.0-150000.3.2.1 * libva-wayland2-32bit-debuginfo-2.16.0-150500.3.2.1 * libpulse-mainloop-glib0-32bit-debuginfo-15.0-150400.4.4.1 * libpipewire-0_3-0-32bit-debuginfo-0.3.64-150500.3.5.2 * pipewire-spa-plugins-0_2-32bit-debuginfo-0.3.64-150500.3.5.2 * libavcodec58_134-32bit-debuginfo-4.4-150400.3.19.1 * libwebrtc_audio_processing1-32bit-0.3-150000.3.2.1 * libldac2-32bit-2.0.2.3-150300.3.2.1 * libva-drm2-32bit-2.16.0-150500.3.2.1 * libavformat58_76-32bit-4.4-150400.3.19.1 * libcdio_paranoia2-32bit-10.2+0.93+1-150000.3.4.1 * libpulse0-32bit-debuginfo-15.0-150400.4.4.1 * libass9-32bit-0.14.0-150000.3.13.1 * libIlmThread-2_2-23-32bit-debuginfo-2.2.1-150000.3.3.1 * libva-glx2-32bit-debuginfo-2.16.0-150500.3.2.1 * libpostproc55_9-32bit-4.4-150400.3.19.1 * libmfx-debuginfo-22.6.1-150500.3.2.4 * liblilv-0-0-32bit-0.24.10-150300.3.2.1 * libImath-2_2-23-32bit-2.2.1-150000.3.3.1 * libSDL2-2_0-0-32bit-2.0.8-150200.11.11.1 * libva2-32bit-2.16.0-150500.3.2.1 * libavdevice58_13-32bit-4.4-150400.3.19.1 * pipewire-modules-0_3-32bit-debuginfo-0.3.64-150500.3.5.2 * libfdk-aac2-32bit-2.0.0-150400.3.2.1 * libgsm1-32bit-debuginfo-1.0.14-150000.3.6.1 * libva-glx2-32bit-2.16.0-150500.3.2.1 * libmfx-samples-debuginfo-22.6.1-150500.3.2.4 * libvdpau1-32bit-1.1.1-150000.3.4.1 * libvdpau1-32bit-debuginfo-1.1.1-150000.3.4.1 * libSDL2-devel-32bit-2.0.8-150200.11.11.1 * libva-x11-2-32bit-debuginfo-2.16.0-150500.3.2.1 * libImath-2_2-23-32bit-debuginfo-2.2.1-150000.3.3.1 * libgsm1-32bit-1.0.14-150000.3.6.1 * libIex-2_2-23-32bit-debuginfo-2.2.1-150000.3.3.1 * liblilv-0-0-32bit-debuginfo-0.24.10-150300.3.2.1 * libbs2b0-32bit-debuginfo-3.1.0-150400.3.2.1 * libva-drm2-32bit-debuginfo-2.16.0-150500.3.2.1 * libmfx1-22.6.1-150500.3.2.4 * libavcodec58_134-32bit-4.4-150400.3.19.1 * libserd-0-0-32bit-0.30.6-150300.3.2.1 * libopenmpt0-32bit-debuginfo-0.3.28-150000.2.15.1 * pulseaudio-utils-32bit-15.0-150400.4.4.1 * libva-x11-2-32bit-2.16.0-150500.3.2.1 * libavutil56_70-32bit-debuginfo-4.4-150400.3.19.1 * libldac2-32bit-debuginfo-2.0.2.3-150300.3.2.1 * libass9-32bit-debuginfo-0.14.0-150000.3.13.1 * libHalf23-32bit-2.2.1-150000.3.3.1 * libvdpau_trace1-32bit-debuginfo-1.1.1-150000.3.4.1 * libva-devel-32bit-2.16.0-150500.3.2.1 * libmfx-debugsource-22.6.1-150500.3.2.4 * pipewire-libjack-0_3-32bit-debuginfo-0.3.64-150500.3.5.2 * libopenmpt_modplug1-32bit-0.3.28-150000.2.15.1 * libIlmImf-2_2-23-32bit-debuginfo-2.2.1-150000.3.43.1 * libswresample3_9-32bit-4.4-150400.3.19.1 * libserd-0-0-32bit-debuginfo-0.30.6-150300.3.2.1 * libopenmpt0-32bit-0.3.28-150000.2.15.1 * openSUSE Leap 15.5 (noarch) * libbluray-bdj-1.3.0-150300.10.9.1 * metis-gnu-hpc-examples-5.1.0-150100.9.5.2 * system-user-pulse-15.0-150400.4.4.1 * metis-gnu-hpc-doc-5.1.0-150100.9.5.2 * lensfun-data-0.3.2-150400.3.2.2 * pipewire-lang-0.3.64-150500.3.5.2 * metis_5_1_0-gnu-hpc-doc-5.1.0-150100.9.5.2 * wireplumber-audio-0.4.13-150500.3.2.1 * gegl-0_4-lang-0.4.34-150400.3.5.2 * metis-examples-5.1.0-150100.9.5.2 * wireplumber-lang-0.4.13-150500.3.2.1 * pulseaudio-lang-15.0-150400.4.4.1 * metis-doc-5.1.0-150100.9.5.2 * metis_5_1_0-gnu-hpc-examples-5.1.0-150100.9.5.2 * metis-gnu-hpc-5.1.0-150100.9.5.2 * metis-gnu-hpc-devel-5.1.0-150100.9.5.2 * openSUSE Leap 15.5 (aarch64_ilp32) * libva-x11-2-64bit-debuginfo-2.16.0-150500.3.2.1 * pipewire-spa-plugins-0_2-64bit-debuginfo-0.3.64-150500.3.5.2 * libva-wayland2-64bit-debuginfo-2.16.0-150500.3.2.1 * pipewire-libjack-0_3-64bit-0.3.64-150500.3.5.2 * libva-x11-2-64bit-2.16.0-150500.3.2.1 * libva2-64bit-debuginfo-2.16.0-150500.3.2.1 * pipewire-alsa-64bit-0.3.64-150500.3.5.2 * libva-glx2-64bit-debuginfo-2.16.0-150500.3.2.1 * libpipewire-0_3-0-64bit-0.3.64-150500.3.5.2 * libva-drm2-64bit-debuginfo-2.16.0-150500.3.2.1 * libpipewire-0_3-0-64bit-debuginfo-0.3.64-150500.3.5.2 * pipewire-libjack-0_3-64bit-debuginfo-0.3.64-150500.3.5.2 * libva-devel-64bit-2.16.0-150500.3.2.1 * pipewire-spa-plugins-0_2-64bit-0.3.64-150500.3.5.2 * libva-wayland2-64bit-2.16.0-150500.3.2.1 * pipewire-modules-0_3-64bit-debuginfo-0.3.64-150500.3.5.2 * pipewire-modules-0_3-64bit-0.3.64-150500.3.5.2 * libva2-64bit-2.16.0-150500.3.2.1 * libva-glx2-64bit-2.16.0-150500.3.2.1 * pipewire-alsa-64bit-debuginfo-0.3.64-150500.3.5.2 * libva-drm2-64bit-2.16.0-150500.3.2.1 * libva-gl-devel-64bit-2.16.0-150500.3.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libIex-2_2-23-2.2.1-150000.3.3.1 * python3-lilv-0.24.10-150300.3.2.1 * webrtc-audio-processing-debugsource-0.3-150000.3.2.1 * libsuitesparseconfig5-5.2.0-150100.9.2.3 * libcdio_paranoia2-10.2+0.93+1-150000.3.4.1 * metis-debugsource-5.1.0-150100.9.5.2 * libsuitesparseconfig5-debuginfo-5.2.0-150100.9.2.3 * libcamd2-2.4.6-150100.9.2.3 * libmetis_5_1_0-gnu-hpc-5.1.0-150100.9.5.2 * libmodplug1-0.3.28-150000.2.15.1 * openexr-2.2.1-150000.3.43.1 * pulseaudio-utils-debuginfo-15.0-150400.4.4.1 * librbio2-2.2.6-150100.9.2.3 * libass9-debuginfo-0.14.0-150000.3.13.1 * libamd2-debuginfo-2.4.6-150100.9.2.3 * libass-devel-0.14.0-150000.3.13.1 * libIex-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libldl2-2.2.6-150100.9.2.3 * libwebrtc_audio_processing1-0.3-150000.3.2.1 * libopenmpt0-0.3.28-150000.2.15.1 * libcsparse3-3.2.0-150100.9.2.3 * libbs2b0-debuginfo-3.1.0-150400.3.2.1 * libfdk-aac2-debuginfo-2.0.0-150400.3.2.1 * libpulse-mainloop-glib0-15.0-150400.4.4.1 * libsratom-0-0-0.6.0-150000.3.2.1 * libcxsparse3-3.2.0-150100.9.2.3 * rtkit-debugsource-0.11+git.20130926-150000.3.5.1 * pulseaudio-module-zeroconf-15.0-150400.4.4.1 * pulseaudio-module-jack-15.0-150400.4.4.1 * ffmpeg-4-libavutil-devel-4.4-150400.3.19.1 * libcdio-paranoia-debugsource-10.2+0.93+1-150000.3.4.1 * libSDL2-devel-2.0.8-150200.11.11.1 * libbluray2-1.3.0-150300.10.9.1 * libgegl-0_4-0-0.4.34-150400.3.5.2 * ilmbase-debugsource-2.2.1-150000.3.3.1 * libklu1-debuginfo-1.3.9-150100.9.2.3 * libspiro0-0.5.20150702-150000.3.2.1 * lilv-0.24.10-150300.3.2.1 * libcdio_paranoia2-debuginfo-10.2+0.93+1-150000.3.4.1 * libIlmImfUtil-2_2-23-2.2.1-150000.3.43.1 * libpulse-devel-15.0-150400.4.4.1 * libSDL2-2_0-0-2.0.8-150200.11.11.1 * ffmpeg-4-libavdevice-devel-4.4-150400.3.19.1 * ffmpeg-4-private-devel-4.4-150400.3.19.1 * liblensfun1-debuginfo-0.3.2-150400.3.2.2 * pulseaudio-bash-completion-15.0-150400.4.4.1 * sratom-devel-0.6.0-150000.3.2.1 * pulseaudio-module-gsettings-15.0-150400.4.4.1 * libraw1394-devel-2.1.1-150000.3.4.1 * ffmpeg-4-libswscale-devel-4.4-150400.3.19.1 * lensfun-tools-0.3.2-150400.3.2.2 * libbs2b0-3.1.0-150400.3.2.1 * libcolamd2-2.9.6-150100.9.2.3 * libbluray-tools-debuginfo-1.3.0-150300.10.9.1 * metis_5_1_0-gnu-hpc-devel-5.1.0-150100.9.5.2 * suitesparse-debuginfo-5.2.0-150100.9.2.3 * libraw-debugsource-0.20.2-150400.3.11.3 * bs2b-tools-3.1.0-150400.3.2.1 * libass-debugsource-0.14.0-150000.3.13.1 * gegl-debuginfo-0.4.34-150400.3.5.2 * openexr-debugsource-2.2.1-150000.3.43.1 * pulseaudio-zsh-completion-15.0-150400.4.4.1 * libbtf1-1.2.6-150100.9.2.3 * suitesparse-devel-5.2.0-150100.9.2.3 * suitesparse-debugsource-5.2.0-150100.9.2.3 * libImath-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libspqr2-2.0.8-150100.9.2.3 * libbs2b-debugsource-3.1.0-150400.3.2.1 * libHalf23-debuginfo-2.2.1-150000.3.3.1 * libavresample4_0-debuginfo-4.4-150400.3.19.1 * openexr-devel-2.2.1-150000.3.43.1 * pulseaudio-module-lirc-15.0-150400.4.4.1 * celt-0.11.3-150000.3.5.1 * libcdio_cdda2-debuginfo-10.2+0.93+1-150000.3.4.1 * libdc1394-tools-debuginfo-2.2.5-150000.3.4.1 * libavcodec58_134-debuginfo-4.4-150400.3.19.1 * gegl-0_4-debuginfo-0.4.34-150400.3.5.2 * libgsm1-1.0.14-150000.3.6.1 * rtkit-0.11+git.20130926-150000.3.5.1 * libcdio_cdda2-10.2+0.93+1-150000.3.4.1 * celt-debuginfo-0.11.3-150000.3.5.1 * metis-devel-5.1.0-150100.9.5.2 * libIlmImf-2_2-23-2.2.1-150000.3.43.1 * libavfilter7_110-4.4-150400.3.19.1 * pulseaudio-module-bluetooth-debuginfo-15.0-150400.4.4.1 * metis_5_1_0-gnu-hpc-5.1.0-150100.9.5.2 * libdc1394-22-2.2.5-150000.3.4.1 * liblilv-0-0-0.24.10-150300.3.2.1 * libswscale5_9-debuginfo-4.4-150400.3.19.1 * libIexMath-2_2-23-2.2.1-150000.3.3.1 * libopenmpt0-debuginfo-0.3.28-150000.2.15.1 * pulseaudio-15.0-150400.4.4.1 * libpulse-mainloop-glib0-debuginfo-15.0-150400.4.4.1 * libcamd2-debuginfo-2.4.6-150100.9.2.3 * libwebrtc_audio_processing-devel-0.3-150000.3.2.1 * libdc1394-tools-2.2.5-150000.3.4.1 * suitesparse-devel-static-5.2.0-150100.9.2.3 * rtkit-debuginfo-0.11+git.20130926-150000.3.5.1 * libavformat58_76-debuginfo-4.4-150400.3.19.1 * libccolamd2-debuginfo-2.9.6-150100.9.2.3 * libcdio-paranoia-devel-10.2+0.93+1-150000.3.4.1 * libpostproc55_9-4.4-150400.3.19.1 * libraw-tools-debuginfo-0.20.2-150400.3.11.3 * libbluray-devel-1.3.0-150300.10.9.1 * libraw-devel-0.20.2-150400.3.11.3 * libserd-0-0-debuginfo-0.30.6-150300.3.2.1 * pulseaudio-module-x11-debuginfo-15.0-150400.4.4.1 * libHalf23-2.2.1-150000.3.3.1 * libklu1-1.3.9-150100.9.2.3 * libcxsparse3-debuginfo-3.2.0-150100.9.2.3 * libwebrtc_audio_processing1-debuginfo-0.3-150000.3.2.1 * serd-debugsource-0.30.6-150300.3.2.1 * openexr-doc-2.2.1-150000.3.43.1 * sord-0.16.0-150000.3.2.1 * libIlmImf-2_2-23-debuginfo-2.2.1-150000.3.43.1 * libavutil56_70-4.4-150400.3.19.1 * libgegl-0_4-0-debuginfo-0.4.34-150400.3.5.2 * libbluray2-debuginfo-1.3.0-150300.10.9.1 * libgraphblas2-debuginfo-2.0.1-150100.9.2.3 * fdk-aac-free-debugsource-2.0.0-150400.3.2.1 * libopenmpt-devel-0.3.28-150000.2.15.1 * lensfun-debugsource-0.3.2-150400.3.2.2 * libvdpau1-debuginfo-1.1.1-150000.3.4.1 * libgsm1-debuginfo-1.0.14-150000.3.6.1 * metis_5_1_0-gnu-hpc-debuginfo-5.1.0-150100.9.5.2 * pulseaudio-setup-15.0-150400.4.4.1 * librbio2-debuginfo-2.2.6-150100.9.2.3 * libvdpau_trace1-1.1.1-150000.3.4.1 * metis-debuginfo-5.1.0-150100.9.5.2 * lilv-debugsource-0.24.10-150300.3.2.1 * libspiro-devel-0.5.20150702-150000.3.2.1 * libvdpau-debugsource-1.1.1-150000.3.4.1 * libcholmod3-debuginfo-3.0.12-150100.9.2.3 * libsratom-0-0-debuginfo-0.6.0-150000.3.2.1 * libspqr2-debuginfo-2.0.8-150100.9.2.3 * libmetis5-5.1.0-150100.9.5.2 * libraw20-0.20.2-150400.3.11.3 * lensfun-doc-0.3.2-150400.3.2.2 * libcolamd2-debuginfo-2.9.6-150100.9.2.3 * gegl-debugsource-0.4.34-150400.3.5.2 * libSDL2-2_0-0-debuginfo-2.0.8-150200.11.11.1 * libIlmImfUtil-2_2-23-debuginfo-2.2.1-150000.3.43.1 * libass9-0.14.0-150000.3.13.1 * libvdpau_trace1-debuginfo-1.1.1-150000.3.4.1 * openmpt123-0.3.28-150000.2.15.1 * gegl-0.4.34-150400.3.5.2 * libraw1394-11-debuginfo-2.1.1-150000.3.4.1 * libspiro0-debuginfo-0.5.20150702-150000.3.2.1 * libbtf1-debuginfo-1.2.6-150100.9.2.3 * liblilv-0-devel-0.24.10-150300.3.2.1 * libmetis5-debuginfo-5.1.0-150100.9.5.2 * libraw1394-tools-debuginfo-2.1.1-150000.3.4.1 * libavformat58_76-4.4-150400.3.19.1 * pulseaudio-module-x11-15.0-150400.4.4.1 * libvdpau1-1.1.1-150000.3.4.1 * sratom-debugsource-0.6.0-150000.3.2.1 * pulseaudio-module-gsettings-debuginfo-15.0-150400.4.4.1 * serdi-debuginfo-0.30.6-150300.3.2.1 * pulseaudio-debugsource-15.0-150400.4.4.1 * bs2b-tools-debuginfo-3.1.0-150400.3.2.1 * libavdevice58_13-4.4-150400.3.19.1 * openmpt123-debuginfo-0.3.28-150000.2.15.1 * libswresample3_9-debuginfo-4.4-150400.3.19.1 * ffmpeg-4-libavfilter-devel-4.4-150400.3.19.1 * python3-lensfun-0.3.2-150400.3.2.2 * libgsm-utils-debuginfo-1.0.14-150000.3.6.1 * openexr-debuginfo-2.2.1-150000.3.43.1 * libmodplug-devel-0.3.28-150000.2.15.1 * gegl-doc-0.4.34-150400.3.5.2 * suitesparse-devel-debuginfo-5.2.0-150100.9.2.3 * typelib-1_0-Gegl-0_4-0.4.34-150400.3.5.2 * libdc1394-debugsource-2.2.5-150000.3.4.1 * libcelt0-2-debuginfo-0.11.3-150000.3.5.1 * libraw1394-11-2.1.1-150000.3.4.1 * libmetis-gnu-hpc-5.1.0-150100.9.5.2 * ffmpeg-4-libpostproc-devel-4.4-150400.3.19.1 * metis_5_1_0-gnu-hpc-debugsource-5.1.0-150100.9.5.2 * liblensfun1-0.3.2-150400.3.2.2 * libamd2-2.4.6-150100.9.2.3 * pulseaudio-module-zeroconf-debuginfo-15.0-150400.4.4.1 * cd-paranoia-10.2+0.93+1-150000.3.4.1 * libgraphblas2-2.0.1-150100.9.2.3 * libwebrtc_audio_processing-devel-static-0.3-150000.3.2.1 * libswscale5_9-4.4-150400.3.19.1 * ffmpeg-4-libavcodec-devel-4.4-150400.3.19.1 * SDL2-debugsource-2.0.8-150200.11.11.1 * libfdk-aac-devel-2.0.0-150400.3.2.1 * ffmpeg-4-libavformat-devel-4.4-150400.3.19.1 * gegl-0_4-0.4.34-150400.3.5.2 * libIlmThread-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libccolamd2-2.9.6-150100.9.2.3 * libmetis_5_1_0-gnu-hpc-debuginfo-5.1.0-150100.9.5.2 * libopenmpt_modplug1-0.3.28-150000.2.15.1 * libavfilter7_110-debuginfo-4.4-150400.3.19.1 * libgsm-debugsource-1.0.14-150000.3.6.1 * libraw-tools-0.20.2-150400.3.11.3 * libImath-2_2-23-2.2.1-150000.3.3.1 * libldl2-debuginfo-2.2.6-150100.9.2.3 * libraw1394-tools-2.1.1-150000.3.4.1 * libmodplug1-debuginfo-0.3.28-150000.2.15.1 * ffmpeg-4-debuginfo-4.4-150400.3.19.1 * libavcodec58_134-4.4-150400.3.19.1 * serd-devel-0.30.6-150300.3.2.1 * libumfpack5-5.7.6-150100.9.2.3 * libIexMath-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libpulse0-debuginfo-15.0-150400.4.4.1 * pulseaudio-system-wide-15.0-150400.4.4.1 * libgsm-devel-1.0.14-150000.3.6.1 * libcelt-devel-0.11.3-150000.3.5.1 * celt-debugsource-0.11.3-150000.3.5.1 * libpostproc55_9-debuginfo-4.4-150400.3.19.1 * sord-devel-0.16.0-150000.3.2.1 * cd-paranoia-debuginfo-10.2+0.93+1-150000.3.4.1 * sord-debuginfo-0.16.0-150000.3.2.1 * libumfpack5-debuginfo-5.7.6-150100.9.2.3 * libopenmpt_modplug1-debuginfo-0.3.28-150000.2.15.1 * libcelt0-2-0.11.3-150000.3.5.1 * metis-5.1.0-150100.9.5.2 * lensfun-devel-0.3.2-150400.3.2.2 * libavresample4_0-4.4-150400.3.19.1 * pulseaudio-module-bluetooth-15.0-150400.4.4.1 * libbluray-debugsource-1.3.0-150300.10.9.1 * liblilv-0-0-debuginfo-0.24.10-150300.3.2.1 * sord-debugsource-0.16.0-150000.3.2.1 * gegl-devel-0.4.34-150400.3.5.2 * libgsm-utils-1.0.14-150000.3.6.1 * libraw20-debuginfo-0.20.2-150400.3.11.3 * libfdk-aac2-2.0.0-150400.3.2.1 * libavutil56_70-debuginfo-4.4-150400.3.19.1 * libbs2b-devel-3.1.0-150400.3.2.1 * pulseaudio-module-jack-debuginfo-15.0-150400.4.4.1 * libavdevice58_13-debuginfo-4.4-150400.3.19.1 * libcsparse3-debuginfo-3.2.0-150100.9.2.3 * libspiro-debugsource-0.5.20150702-150000.3.2.1 * libsord-0-0-0.16.0-150000.3.2.1 * libbluray-tools-1.3.0-150300.10.9.1 * libpulse0-15.0-150400.4.4.1 * serdi-0.30.6-150300.3.2.1 * ffmpeg-4-debugsource-4.4-150400.3.19.1 * pulseaudio-utils-15.0-150400.4.4.1 * pulseaudio-module-lirc-debuginfo-15.0-150400.4.4.1 * libopenmpt-debugsource-0.3.28-150000.2.15.1 * ilmbase-devel-2.2.1-150000.3.3.1 * libserd-0-0-0.30.6-150300.3.2.1 * libraw1394-debugsource-2.1.1-150000.3.4.1 * lilv-debuginfo-0.24.10-150300.3.2.1 * pulseaudio-debuginfo-15.0-150400.4.4.1 * pulseaudio-gdm-hooks-15.0-150400.4.4.1 * ffmpeg-4-4.4-150400.3.19.1 * libdc1394-devel-2.2.5-150000.3.4.1 * libraw-devel-static-0.20.2-150400.3.11.3 * libdc1394-22-debuginfo-2.2.5-150000.3.4.1 * ffmpeg-4-libswresample-devel-4.4-150400.3.19.1 * libIlmThread-2_2-23-2.2.1-150000.3.3.1 * libcholmod3-3.0.12-150100.9.2.3 * libswresample3_9-4.4-150400.3.19.1 * libsord-0-0-debuginfo-0.16.0-150000.3.2.1 * libvdpau-devel-1.1.1-150000.3.4.1 * ffmpeg-4-libavresample-devel-4.4-150400.3.19.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * ldacBT-debugsource-2.0.2.3-150300.3.2.1 * libldac2-2.0.2.3-150300.3.2.1 * ldacBT-devel-2.0.2.3-150300.3.2.1 * libldac2-debuginfo-2.0.2.3-150300.3.2.1 * openSUSE Leap Micro 5.3 (noarch) * system-user-pulse-15.0-150400.4.4.1 * openSUSE Leap Micro 5.4 (noarch) * system-user-pulse-15.0-150400.4.4.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * system-user-pulse-15.0-150400.4.4.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * system-user-pulse-15.0-150400.4.4.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * system-user-pulse-15.0-150400.4.4.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * system-user-pulse-15.0-150400.4.4.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * pulseaudio-debuginfo-15.0-150400.4.4.1 * libpulse0-debuginfo-15.0-150400.4.4.1 * libpulse-devel-15.0-150400.4.4.1 * libpulse-mainloop-glib0-15.0-150400.4.4.1 * libpulse0-15.0-150400.4.4.1 * pulseaudio-debugsource-15.0-150400.4.4.1 * libpulse-mainloop-glib0-debuginfo-15.0-150400.4.4.1 * Basesystem Module 15-SP4 (noarch) * system-user-pulse-15.0-150400.4.4.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * pulseaudio-debuginfo-15.0-150400.4.4.1 * libpulse0-debuginfo-15.0-150400.4.4.1 * libpulse-devel-15.0-150400.4.4.1 * libpulse-mainloop-glib0-15.0-150400.4.4.1 * libpulse0-15.0-150400.4.4.1 * pulseaudio-debugsource-15.0-150400.4.4.1 * libpulse-mainloop-glib0-debuginfo-15.0-150400.4.4.1 * Basesystem Module 15-SP5 (noarch) * system-user-pulse-15.0-150400.4.4.1 * Desktop Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libva2-2.13.0-150400.3.2.1 * libIex-2_2-23-2.2.1-150000.3.3.1 * pipewire-modules-0_3-0.3.49-150400.3.5.2 * webrtc-audio-processing-debugsource-0.3-150000.3.2.1 * libsuitesparseconfig5-5.2.0-150100.9.2.3 * libcdio_paranoia2-10.2+0.93+1-150000.3.4.1 * metis-debugsource-5.1.0-150100.9.5.2 * libsuitesparseconfig5-debuginfo-5.2.0-150100.9.2.3 * libcamd2-2.4.6-150100.9.2.3 * libmodplug1-0.3.28-150000.2.15.1 * pulseaudio-utils-debuginfo-15.0-150400.4.4.1 * libass9-debuginfo-0.14.0-150000.3.13.1 * libamd2-debuginfo-2.4.6-150100.9.2.3 * libass-devel-0.14.0-150000.3.13.1 * libIex-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libwebrtc_audio_processing1-0.3-150000.3.2.1 * libopenmpt0-0.3.28-150000.2.15.1 * libbs2b0-debuginfo-3.1.0-150400.3.2.1 * libfdk-aac2-debuginfo-2.0.0-150400.3.2.1 * libsratom-0-0-0.6.0-150000.3.2.1 * rtkit-debugsource-0.11+git.20130926-150000.3.5.1 * pulseaudio-module-zeroconf-15.0-150400.4.4.1 * libcdio-paranoia-debugsource-10.2+0.93+1-150000.3.4.1 * libSDL2-devel-2.0.8-150200.11.11.1 * libbluray2-1.3.0-150300.10.9.1 * libspiro0-0.5.20150702-150000.3.2.1 * gstreamer-plugin-pipewire-debuginfo-0.3.49-150400.3.5.2 * ilmbase-debugsource-2.2.1-150000.3.3.1 * libcdio_paranoia2-debuginfo-10.2+0.93+1-150000.3.4.1 * libIlmImfUtil-2_2-23-2.2.1-150000.3.43.1 * libSDL2-2_0-0-2.0.8-150200.11.11.1 * pipewire-modules-0_3-debuginfo-0.3.49-150400.3.5.2 * pulseaudio-bash-completion-15.0-150400.4.4.1 * sratom-devel-0.6.0-150000.3.2.1 * pulseaudio-module-gsettings-15.0-150400.4.4.1 * libraw1394-devel-2.1.1-150000.3.4.1 * libbs2b0-3.1.0-150400.3.2.1 * libcolamd2-2.9.6-150100.9.2.3 * libwireplumber-0_4-0-0.4.9-150400.3.5.2 * gstreamer-plugin-pipewire-0.3.49-150400.3.5.2 * libva-debugsource-2.13.0-150400.3.2.1 * libva2-debuginfo-2.13.0-150400.3.2.1 * suitesparse-debuginfo-5.2.0-150100.9.2.3 * libraw-debugsource-0.20.2-150400.3.11.3 * pulseaudio-zsh-completion-15.0-150400.4.4.1 * libass-debugsource-0.14.0-150000.3.13.1 * openexr-debugsource-2.2.1-150000.3.43.1 * wireplumber-0.4.9-150400.3.5.2 * suitesparse-debugsource-5.2.0-150100.9.2.3 * libImath-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libbs2b-debugsource-3.1.0-150400.3.2.1 * libHalf23-debuginfo-2.2.1-150000.3.3.1 * openexr-devel-2.2.1-150000.3.43.1 * celt-0.11.3-150000.3.5.1 * libcdio_cdda2-debuginfo-10.2+0.93+1-150000.3.4.1 * libdc1394-tools-debuginfo-2.2.5-150000.3.4.1 * libavcodec58_134-debuginfo-4.4-150400.3.19.1 * libgsm1-1.0.14-150000.3.6.1 * rtkit-0.11+git.20130926-150000.3.5.1 * libcdio_cdda2-10.2+0.93+1-150000.3.4.1 * celt-debuginfo-0.11.3-150000.3.5.1 * libIlmImf-2_2-23-2.2.1-150000.3.43.1 * libdc1394-22-2.2.5-150000.3.4.1 * liblilv-0-0-0.24.10-150300.3.2.1 * libIexMath-2_2-23-2.2.1-150000.3.3.1 * libopenmpt0-debuginfo-0.3.28-150000.2.15.1 * pulseaudio-15.0-150400.4.4.1 * libcamd2-debuginfo-2.4.6-150100.9.2.3 * libwebrtc_audio_processing-devel-0.3-150000.3.2.1 * libdc1394-tools-2.2.5-150000.3.4.1 * rtkit-debuginfo-0.11+git.20130926-150000.3.5.1 * libwireplumber-0_4-0-debuginfo-0.4.9-150400.3.5.2 * libavformat58_76-debuginfo-4.4-150400.3.19.1 * libccolamd2-debuginfo-2.9.6-150100.9.2.3 * libcdio-paranoia-devel-10.2+0.93+1-150000.3.4.1 * libpostproc55_9-4.4-150400.3.19.1 * libbluray-devel-1.3.0-150300.10.9.1 * libserd-0-0-debuginfo-0.30.6-150300.3.2.1 * pulseaudio-module-x11-debuginfo-15.0-150400.4.4.1 * libHalf23-2.2.1-150000.3.3.1 * serd-debugsource-0.30.6-150300.3.2.1 * libwebrtc_audio_processing1-debuginfo-0.3-150000.3.2.1 * libIlmImf-2_2-23-debuginfo-2.2.1-150000.3.43.1 * libavutil56_70-4.4-150400.3.19.1 * libbluray2-debuginfo-1.3.0-150300.10.9.1 * fdk-aac-free-debugsource-2.0.0-150400.3.2.1 * libopenmpt-devel-0.3.28-150000.2.15.1 * libvdpau1-debuginfo-1.1.1-150000.3.4.1 * libgsm1-debuginfo-1.0.14-150000.3.6.1 * pulseaudio-setup-15.0-150400.4.4.1 * libcdio-debugsource-0.94-150000.6.13.1 * metis-debuginfo-5.1.0-150100.9.5.2 * lilv-debugsource-0.24.10-150300.3.2.1 * libvdpau-debugsource-1.1.1-150000.3.4.1 * pipewire-spa-tools-0.3.49-150400.3.5.2 * libcholmod3-debuginfo-3.0.12-150100.9.2.3 * libsratom-0-0-debuginfo-0.6.0-150000.3.2.1 * libmetis5-5.1.0-150100.9.5.2 * libraw20-0.20.2-150400.3.11.3 * libcolamd2-debuginfo-2.9.6-150100.9.2.3 * libva-drm2-2.13.0-150400.3.2.1 * libSDL2-2_0-0-debuginfo-2.0.8-150200.11.11.1 * libIlmImfUtil-2_2-23-debuginfo-2.2.1-150000.3.43.1 * libass9-0.14.0-150000.3.13.1 * libpipewire-0_3-0-debuginfo-0.3.49-150400.3.5.2 * pipewire-spa-tools-debuginfo-0.3.49-150400.3.5.2 * libcdio16-0.94-150000.6.13.1 * libraw1394-11-debuginfo-2.1.1-150000.3.4.1 * libspiro0-debuginfo-0.5.20150702-150000.3.2.1 * liblilv-0-devel-0.24.10-150300.3.2.1 * libmetis5-debuginfo-5.1.0-150100.9.5.2 * libavformat58_76-4.4-150400.3.19.1 * pulseaudio-module-x11-15.0-150400.4.4.1 * libvdpau1-1.1.1-150000.3.4.1 * sratom-debugsource-0.6.0-150000.3.2.1 * pulseaudio-module-gsettings-debuginfo-15.0-150400.4.4.1 * pulseaudio-debugsource-15.0-150400.4.4.1 * pipewire-debugsource-0.3.49-150400.3.5.2 * wireplumber-debugsource-0.4.9-150400.3.5.2 * libva-devel-2.13.0-150400.3.2.1 * libswresample3_9-debuginfo-4.4-150400.3.19.1 * libva-drm2-debuginfo-2.13.0-150400.3.2.1 * openexr-debuginfo-2.2.1-150000.3.43.1 * libmodplug-devel-0.3.28-150000.2.15.1 * libdc1394-debugsource-2.2.5-150000.3.4.1 * libcelt0-2-debuginfo-0.11.3-150000.3.5.1 * libpipewire-0_3-0-0.3.49-150400.3.5.2 * pipewire-debuginfo-0.3.49-150400.3.5.2 * libraw1394-11-2.1.1-150000.3.4.1 * pipewire-spa-plugins-0_2-0.3.49-150400.3.5.2 * libamd2-2.4.6-150100.9.2.3 * pulseaudio-module-zeroconf-debuginfo-15.0-150400.4.4.1 * pipewire-tools-debuginfo-0.3.49-150400.3.5.2 * SDL2-debugsource-2.0.8-150200.11.11.1 * pipewire-tools-0.3.49-150400.3.5.2 * libIlmThread-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libopenmpt_modplug1-0.3.28-150000.2.15.1 * libccolamd2-2.9.6-150100.9.2.3 * libgsm-debugsource-1.0.14-150000.3.6.1 * libImath-2_2-23-2.2.1-150000.3.3.1 * libcdio16-debuginfo-0.94-150000.6.13.1 * pipewire-spa-plugins-0_2-debuginfo-0.3.49-150400.3.5.2 * libmodplug1-debuginfo-0.3.28-150000.2.15.1 * ffmpeg-4-debuginfo-4.4-150400.3.19.1 * libavcodec58_134-4.4-150400.3.19.1 * serd-devel-0.30.6-150300.3.2.1 * libva-x11-2-2.13.0-150400.3.2.1 * libumfpack5-5.7.6-150100.9.2.3 * libIexMath-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libgsm-devel-1.0.14-150000.3.6.1 * libcelt-devel-0.11.3-150000.3.5.1 * celt-debugsource-0.11.3-150000.3.5.1 * libpostproc55_9-debuginfo-4.4-150400.3.19.1 * libva-x11-2-debuginfo-2.13.0-150400.3.2.1 * pipewire-0.3.49-150400.3.5.2 * sord-debuginfo-0.16.0-150000.3.2.1 * libumfpack5-debuginfo-5.7.6-150100.9.2.3 * sord-devel-0.16.0-150000.3.2.1 * libopenmpt_modplug1-debuginfo-0.3.28-150000.2.15.1 * libcelt0-2-0.11.3-150000.3.5.1 * wireplumber-debuginfo-0.4.9-150400.3.5.2 * libbluray-debugsource-1.3.0-150300.10.9.1 * liblilv-0-0-debuginfo-0.24.10-150300.3.2.1 * sord-debugsource-0.16.0-150000.3.2.1 * libraw20-debuginfo-0.20.2-150400.3.11.3 * libfdk-aac2-2.0.0-150400.3.2.1 * libavutil56_70-debuginfo-4.4-150400.3.19.1 * libspiro-debugsource-0.5.20150702-150000.3.2.1 * libsord-0-0-0.16.0-150000.3.2.1 * ffmpeg-4-debugsource-4.4-150400.3.19.1 * pulseaudio-utils-15.0-150400.4.4.1 * libopenmpt-debugsource-0.3.28-150000.2.15.1 * ilmbase-devel-2.2.1-150000.3.3.1 * pulseaudio-debuginfo-15.0-150400.4.4.1 * libraw1394-debugsource-2.1.1-150000.3.4.1 * lilv-debuginfo-0.24.10-150300.3.2.1 * pulseaudio-gdm-hooks-15.0-150400.4.4.1 * libdc1394-devel-2.2.5-150000.3.4.1 * libdc1394-22-debuginfo-2.2.5-150000.3.4.1 * libcholmod3-3.0.12-150100.9.2.3 * libIlmThread-2_2-23-2.2.1-150000.3.3.1 * libswresample3_9-4.4-150400.3.19.1 * libsord-0-0-debuginfo-0.16.0-150000.3.2.1 * libvdpau-devel-1.1.1-150000.3.4.1 * libserd-0-0-0.30.6-150300.3.2.1 * Desktop Applications Module 15-SP4 (aarch64 ppc64le x86_64) * ldacBT-debugsource-2.0.2.3-150300.3.2.1 * libldac2-2.0.2.3-150300.3.2.1 * libldac2-debuginfo-2.0.2.3-150300.3.2.1 * Desktop Applications Module 15-SP4 (noarch) * system-user-pulse-15.0-150400.4.4.1 * pulseaudio-lang-15.0-150400.4.4.1 * pipewire-lang-0.3.49-150400.3.5.2 * Desktop Applications Module 15-SP4 (x86_64) * libmfx1-21.3.4-150400.3.2.2 * libmfx-debugsource-21.3.4-150400.3.2.2 * libmfx1-debuginfo-21.3.4-150400.3.2.2 * libmfx-debuginfo-21.3.4-150400.3.2.2 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libIex-2_2-23-2.2.1-150000.3.3.1 * webrtc-audio-processing-debugsource-0.3-150000.3.2.1 * libsuitesparseconfig5-5.2.0-150100.9.2.3 * libcdio_paranoia2-10.2+0.93+1-150000.3.4.1 * metis-debugsource-5.1.0-150100.9.5.2 * libsuitesparseconfig5-debuginfo-5.2.0-150100.9.2.3 * libcamd2-2.4.6-150100.9.2.3 * libmodplug1-0.3.28-150000.2.15.1 * pulseaudio-utils-debuginfo-15.0-150400.4.4.1 * libass9-debuginfo-0.14.0-150000.3.13.1 * libamd2-debuginfo-2.4.6-150100.9.2.3 * libass-devel-0.14.0-150000.3.13.1 * libIex-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libwebrtc_audio_processing1-0.3-150000.3.2.1 * libopenmpt0-0.3.28-150000.2.15.1 * libbs2b0-debuginfo-3.1.0-150400.3.2.1 * libfdk-aac2-debuginfo-2.0.0-150400.3.2.1 * libsratom-0-0-0.6.0-150000.3.2.1 * pipewire-spa-plugins-0_2-debuginfo-0.3.64-150500.3.5.2 * rtkit-debugsource-0.11+git.20130926-150000.3.5.1 * pulseaudio-module-zeroconf-15.0-150400.4.4.1 * libcdio-paranoia-debugsource-10.2+0.93+1-150000.3.4.1 * libSDL2-devel-2.0.8-150200.11.11.1 * libbluray2-1.3.0-150300.10.9.1 * libspiro0-0.5.20150702-150000.3.2.1 * ilmbase-debugsource-2.2.1-150000.3.3.1 * libcdio_paranoia2-debuginfo-10.2+0.93+1-150000.3.4.1 * libIlmImfUtil-2_2-23-2.2.1-150000.3.43.1 * libSDL2-2_0-0-2.0.8-150200.11.11.1 * pulseaudio-bash-completion-15.0-150400.4.4.1 * sratom-devel-0.6.0-150000.3.2.1 * pulseaudio-module-gsettings-15.0-150400.4.4.1 * libpipewire-0_3-0-0.3.64-150500.3.5.2 * libraw1394-devel-2.1.1-150000.3.4.1 * pipewire-tools-debuginfo-0.3.64-150500.3.5.2 * libbs2b0-3.1.0-150400.3.2.1 * libcolamd2-2.9.6-150100.9.2.3 * gstreamer-plugin-pipewire-debuginfo-0.3.64-150500.3.5.2 * libva-devel-2.16.0-150500.3.2.1 * suitesparse-debuginfo-5.2.0-150100.9.2.3 * libraw-debugsource-0.20.2-150400.3.11.3 * pulseaudio-zsh-completion-15.0-150400.4.4.1 * libass-debugsource-0.14.0-150000.3.13.1 * openexr-debugsource-2.2.1-150000.3.43.1 * suitesparse-debugsource-5.2.0-150100.9.2.3 * libImath-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libbs2b-debugsource-3.1.0-150400.3.2.1 * libHalf23-debuginfo-2.2.1-150000.3.3.1 * libva2-debuginfo-2.16.0-150500.3.2.1 * openexr-devel-2.2.1-150000.3.43.1 * celt-0.11.3-150000.3.5.1 * libcdio_cdda2-debuginfo-10.2+0.93+1-150000.3.4.1 * libdc1394-tools-debuginfo-2.2.5-150000.3.4.1 * libgsm1-1.0.14-150000.3.6.1 * rtkit-0.11+git.20130926-150000.3.5.1 * libcdio_cdda2-10.2+0.93+1-150000.3.4.1 * celt-debuginfo-0.11.3-150000.3.5.1 * libIlmImf-2_2-23-2.2.1-150000.3.43.1 * libdc1394-22-2.2.5-150000.3.4.1 * liblilv-0-0-0.24.10-150300.3.2.1 * pipewire-tools-0.3.64-150500.3.5.2 * libIexMath-2_2-23-2.2.1-150000.3.3.1 * libopenmpt0-debuginfo-0.3.28-150000.2.15.1 * pipewire-spa-plugins-0_2-0.3.64-150500.3.5.2 * pulseaudio-15.0-150400.4.4.1 * libcamd2-debuginfo-2.4.6-150100.9.2.3 * pipewire-modules-0_3-0.3.64-150500.3.5.2 * libwebrtc_audio_processing-devel-0.3-150000.3.2.1 * libdc1394-tools-2.2.5-150000.3.4.1 * rtkit-debuginfo-0.11+git.20130926-150000.3.5.1 * pipewire-spa-tools-0.3.64-150500.3.5.2 * libccolamd2-debuginfo-2.9.6-150100.9.2.3 * pipewire-0.3.64-150500.3.5.2 * libcdio-paranoia-devel-10.2+0.93+1-150000.3.4.1 * libbluray-devel-1.3.0-150300.10.9.1 * libserd-0-0-debuginfo-0.30.6-150300.3.2.1 * pulseaudio-module-x11-debuginfo-15.0-150400.4.4.1 * libHalf23-2.2.1-150000.3.3.1 * serd-debugsource-0.30.6-150300.3.2.1 * libwebrtc_audio_processing1-debuginfo-0.3-150000.3.2.1 * libIlmImf-2_2-23-debuginfo-2.2.1-150000.3.43.1 * libbluray2-debuginfo-1.3.0-150300.10.9.1 * fdk-aac-free-debugsource-2.0.0-150400.3.2.1 * libopenmpt-devel-0.3.28-150000.2.15.1 * libvdpau1-debuginfo-1.1.1-150000.3.4.1 * libgsm1-debuginfo-1.0.14-150000.3.6.1 * pulseaudio-setup-15.0-150400.4.4.1 * libcdio-debugsource-0.94-150000.6.13.1 * metis-debuginfo-5.1.0-150100.9.5.2 * lilv-debugsource-0.24.10-150300.3.2.1 * wireplumber-debugsource-0.4.13-150500.3.2.1 * libvdpau-debugsource-1.1.1-150000.3.4.1 * libva-drm2-debuginfo-2.16.0-150500.3.2.1 * libcholmod3-debuginfo-3.0.12-150100.9.2.3 * libsratom-0-0-debuginfo-0.6.0-150000.3.2.1 * pipewire-modules-0_3-debuginfo-0.3.64-150500.3.5.2 * libmetis5-5.1.0-150100.9.5.2 * libraw20-0.20.2-150400.3.11.3 * libcolamd2-debuginfo-2.9.6-150100.9.2.3 * libSDL2-2_0-0-debuginfo-2.0.8-150200.11.11.1 * libIlmImfUtil-2_2-23-debuginfo-2.2.1-150000.3.43.1 * libass9-0.14.0-150000.3.13.1 * wireplumber-0.4.13-150500.3.2.1 * libcdio16-0.94-150000.6.13.1 * libraw1394-11-debuginfo-2.1.1-150000.3.4.1 * libspiro0-debuginfo-0.5.20150702-150000.3.2.1 * pipewire-debuginfo-0.3.64-150500.3.5.2 * gstreamer-plugin-pipewire-0.3.64-150500.3.5.2 * liblilv-0-devel-0.24.10-150300.3.2.1 * libmetis5-debuginfo-5.1.0-150100.9.5.2 * pipewire-spa-tools-debuginfo-0.3.64-150500.3.5.2 * libva-x11-2-debuginfo-2.16.0-150500.3.2.1 * libwireplumber-0_4-0-0.4.13-150500.3.2.1 * pulseaudio-module-x11-15.0-150400.4.4.1 * sratom-debugsource-0.6.0-150000.3.2.1 * libvdpau1-1.1.1-150000.3.4.1 * pulseaudio-module-gsettings-debuginfo-15.0-150400.4.4.1 * pulseaudio-debugsource-15.0-150400.4.4.1 * libwireplumber-0_4-0-debuginfo-0.4.13-150500.3.2.1 * openexr-debuginfo-2.2.1-150000.3.43.1 * libmodplug-devel-0.3.28-150000.2.15.1 * libdc1394-debugsource-2.2.5-150000.3.4.1 * libcelt0-2-debuginfo-0.11.3-150000.3.5.1 * libraw1394-11-2.1.1-150000.3.4.1 * libamd2-2.4.6-150100.9.2.3 * pulseaudio-module-zeroconf-debuginfo-15.0-150400.4.4.1 * wireplumber-debuginfo-0.4.13-150500.3.2.1 * SDL2-debugsource-2.0.8-150200.11.11.1 * libIlmThread-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libopenmpt_modplug1-0.3.28-150000.2.15.1 * libccolamd2-2.9.6-150100.9.2.3 * libgsm-debugsource-1.0.14-150000.3.6.1 * libImath-2_2-23-2.2.1-150000.3.3.1 * libcdio16-debuginfo-0.94-150000.6.13.1 * libmodplug1-debuginfo-0.3.28-150000.2.15.1 * libva-debugsource-2.16.0-150500.3.2.1 * serd-devel-0.30.6-150300.3.2.1 * libumfpack5-5.7.6-150100.9.2.3 * libIexMath-2_2-23-debuginfo-2.2.1-150000.3.3.1 * libgsm-devel-1.0.14-150000.3.6.1 * libcelt-devel-0.11.3-150000.3.5.1 * celt-debugsource-0.11.3-150000.3.5.1 * sord-devel-0.16.0-150000.3.2.1 * sord-debuginfo-0.16.0-150000.3.2.1 * libumfpack5-debuginfo-5.7.6-150100.9.2.3 * libopenmpt_modplug1-debuginfo-0.3.28-150000.2.15.1 * libcelt0-2-0.11.3-150000.3.5.1 * libva2-2.16.0-150500.3.2.1 * libbluray-debugsource-1.3.0-150300.10.9.1 * liblilv-0-0-debuginfo-0.24.10-150300.3.2.1 * libva-x11-2-2.16.0-150500.3.2.1 * sord-debugsource-0.16.0-150000.3.2.1 * libraw20-debuginfo-0.20.2-150400.3.11.3 * libfdk-aac2-2.0.0-150400.3.2.1 * pipewire-debugsource-0.3.64-150500.3.5.2 * libspiro-debugsource-0.5.20150702-150000.3.2.1 * libsord-0-0-0.16.0-150000.3.2.1 * libva-drm2-2.16.0-150500.3.2.1 * pulseaudio-utils-15.0-150400.4.4.1 * libopenmpt-debugsource-0.3.28-150000.2.15.1 * ilmbase-devel-2.2.1-150000.3.3.1 * pulseaudio-debuginfo-15.0-150400.4.4.1 * libraw1394-debugsource-2.1.1-150000.3.4.1 * lilv-debuginfo-0.24.10-150300.3.2.1 * pulseaudio-gdm-hooks-15.0-150400.4.4.1 * libdc1394-devel-2.2.5-150000.3.4.1 * libdc1394-22-debuginfo-2.2.5-150000.3.4.1 * libcholmod3-3.0.12-150100.9.2.3 * libIlmThread-2_2-23-2.2.1-150000.3.3.1 * libpipewire-0_3-0-debuginfo-0.3.64-150500.3.5.2 * libsord-0-0-debuginfo-0.16.0-150000.3.2.1 * libvdpau-devel-1.1.1-150000.3.4.1 * libserd-0-0-0.30.6-150300.3.2.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le x86_64) * ldacBT-debugsource-2.0.2.3-150300.3.2.1 * libldac2-2.0.2.3-150300.3.2.1 * libldac2-debuginfo-2.0.2.3-150300.3.2.1 * Desktop Applications Module 15-SP5 (noarch) * pipewire-lang-0.3.64-150500.3.5.2 * pulseaudio-lang-15.0-150400.4.4.1 * system-user-pulse-15.0-150400.4.4.1 * Desktop Applications Module 15-SP5 (x86_64) * libmfx1-debuginfo-22.6.1-150500.3.2.4 * libmfx-debugsource-22.6.1-150500.3.2.4 * libmfx1-22.6.1-150500.3.2.4 * libmfx-debuginfo-22.6.1-150500.3.2.4 * Development Tools Module 15-SP4 (noarch) * system-user-pulse-15.0-150400.4.4.1 * Development Tools Module 15-SP5 (noarch) * system-user-pulse-15.0-150400.4.4.1 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64) * libva2-2.13.0-150400.3.2.1 * pipewire-tools-0.3.49-150400.3.5.2 * pipewire-spa-tools-0.3.49-150400.3.5.2 * libIex-2_2-23-2.2.1-150000.3.3.1 * libcholmod3-debuginfo-3.0.12-150100.9.2.3 * libccolamd2-2.9.6-150100.9.2.3 * libmetis5-5.1.0-150100.9.5.2 * pipewire-modules-0_3-0.3.49-150400.3.5.2 * libavfilter7_110-debuginfo-4.4-150400.3.19.1 * libraw20-0.20.2-150400.3.11.3 * libsuitesparseconfig5-5.2.0-150100.9.2.3 * pipewire-alsa-0.3.49-150400.3.5.2 * libcdio_paranoia2-10.2+0.93+1-150000.3.4.1 * pipewire-libjack-0_3-debuginfo-0.3.49-150400.3.5.2 * libcamd2-2.4.6-150100.9.2.3 * libavresample4_0-debuginfo-4.4-150400.3.19.1 * libva-drm2-2.13.0-150400.3.2.1 * libass9-0.14.0-150000.3.13.1 * libva-gl-debugsource-2.13.0-150400.3.2.1 * ffmpeg-4-debuginfo-4.4-150400.3.19.1 * libavcodec58_134-4.4-150400.3.19.1 * libva-wayland2-debuginfo-2.13.0-150400.3.2.1 * pipewire-doc-0.3.49-150400.3.5.2 * wireplumber-0.4.9-150400.3.5.2 * libwebrtc_audio_processing1-0.3-150000.3.2.1 * libgsm1-1.0.14-150000.3.6.1 * libcdio16-0.94-150000.6.13.1 * libumfpack5-5.7.6-150100.9.2.3 * pipewire-alsa-debuginfo-0.3.49-150400.3.5.2 * libcdio_cdda2-10.2+0.93+1-150000.3.4.1 * libopenmpt0-0.3.28-150000.2.15.1 * libIlmImf-2_2-23-2.2.1-150000.3.43.1 * libavfilter7_110-4.4-150400.3.19.1 * libdc1394-22-2.2.5-150000.3.4.1 * libpostproc55_9-debuginfo-4.4-150400.3.19.1 * liblilv-0-0-0.24.10-150300.3.2.1 * cd-paranoia-debuginfo-10.2+0.93+1-150000.3.4.1 * pipewire-0.3.49-150400.3.5.2 * libavformat58_76-4.4-150400.3.19.1 * libsratom-0-0-0.6.0-150000.3.2.1 * libcelt0-2-0.11.3-150000.3.5.1 * libvdpau1-1.1.1-150000.3.4.1 * wireplumber-debuginfo-0.4.9-150400.3.5.2 * libcdio-paranoia-debugsource-10.2+0.93+1-150000.3.4.1 * pipewire-debugsource-0.3.49-150400.3.5.2 * libavresample4_0-4.4-150400.3.19.1 * pipewire-pulseaudio-debuginfo-0.3.49-150400.3.5.2 * libbluray2-1.3.0-150300.10.9.1 * libavdevice58_13-4.4-150400.3.19.1 * libspiro0-0.5.20150702-150000.3.2.1 * libfdk-aac2-2.0.0-150400.3.2.1 * libva-wayland2-2.13.0-150400.3.2.1 * wireplumber-debugsource-0.4.9-150400.3.5.2 * libSDL2-2_0-0-2.0.8-150200.11.11.1 * pipewire-libjack-0_3-devel-0.3.49-150400.3.5.2 * libavdevice58_13-debuginfo-4.4-150400.3.19.1 * libsord-0-0-0.16.0-150000.3.2.1 * libpostproc55_9-4.4-150400.3.19.1 * pipewire-debuginfo-0.3.49-150400.3.5.2 * libpipewire-0_3-0-0.3.49-150400.3.5.2 * ffmpeg-4-debugsource-4.4-150400.3.19.1 * pipewire-devel-0.3.49-150400.3.5.2 * libHalf23-2.2.1-150000.3.3.1 * libraw1394-11-2.1.1-150000.3.4.1 * pipewire-pulseaudio-0.3.49-150400.3.5.2 * pipewire-libjack-0_3-0.3.49-150400.3.5.2 * pipewire-spa-plugins-0_2-0.3.49-150400.3.5.2 * libbs2b0-3.1.0-150400.3.2.1 * libavutil56_70-4.4-150400.3.19.1 * libcolamd2-2.9.6-150100.9.2.3 * libwireplumber-0_4-0-0.4.9-150400.3.5.2 * ffmpeg-4-4.4-150400.3.19.1 * wireplumber-devel-0.4.9-150400.3.5.2 * libamd2-2.4.6-150100.9.2.3 * libcholmod3-3.0.12-150100.9.2.3 * libIlmThread-2_2-23-2.2.1-150000.3.3.1 * cd-paranoia-10.2+0.93+1-150000.3.4.1 * libswresample3_9-4.4-150400.3.19.1 * pulseaudio-setup-15.0-150400.4.4.1 * libswscale5_9-4.4-150400.3.19.1 * libserd-0-0-0.30.6-150300.3.2.1 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x) * gegl-0_4-debuginfo-0.4.34-150400.3.5.2 * gegl-0.4.34-150400.3.5.2 * libgegl-0_4-0-0.4.34-150400.3.5.2 * gegl-0_4-0.4.34-150400.3.5.2 * gegl-devel-0.4.34-150400.3.5.2 * libgegl-0_4-0-debuginfo-0.4.34-150400.3.5.2 * gegl-debugsource-0.4.34-150400.3.5.2 * gegl-doc-0.4.34-150400.3.5.2 * typelib-1_0-Gegl-0_4-0.4.34-150400.3.5.2 * gegl-debuginfo-0.4.34-150400.3.5.2 * SUSE Package Hub 15 15-SP4 (noarch) * gegl-0_4-lang-0.4.34-150400.3.5.2 * lensfun-data-0.3.2-150400.3.2.2 * wireplumber-audio-0.4.9-150400.3.5.2 * pipewire-lang-0.3.49-150400.3.5.2 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le x86_64) * libldac2-2.0.2.3-150300.3.2.1 * SUSE Package Hub 15 15-SP4 (ppc64le s390x x86_64) * libavformat58_76-debuginfo-4.4-150400.3.19.1 * SUSE Package Hub 15 15-SP4 (x86_64) * libraw1394-11-32bit-debuginfo-2.1.1-150000.3.4.1 * libspqr2-debuginfo-2.0.8-150100.9.2.3 * libgsm1-32bit-debuginfo-1.0.14-150000.3.6.1 * libavresample4_0-32bit-4.4-150400.3.19.1 * libgsm-debugsource-1.0.14-150000.3.6.1 * libspqr2-2.0.8-150100.9.2.3 * libraw1394-11-32bit-2.1.1-150000.3.4.1 * libavfilter7_110-32bit-4.4-150400.3.19.1 * libgsm1-32bit-1.0.14-150000.3.6.1 * libpulse0-32bit-15.0-150400.4.4.1 * pulseaudio-debugsource-15.0-150400.4.4.1 * libpulse0-32bit-debuginfo-15.0-150400.4.4.1 * libSDL2-2_0-0-32bit-debuginfo-2.0.8-150200.11.11.1 * libavdevice58_13-32bit-debuginfo-4.4-150400.3.19.1 * libpostproc55_9-32bit-debuginfo-4.4-150400.3.19.1 * libmfx1-21.3.4-150400.3.2.2 * libpostproc55_9-32bit-4.4-150400.3.19.1 * pulseaudio-debuginfo-15.0-150400.4.4.1 * libraw1394-debugsource-2.1.1-150000.3.4.1 * libavfilter7_110-32bit-debuginfo-4.4-150400.3.19.1 * libavresample4_0-32bit-debuginfo-4.4-150400.3.19.1 * libSDL2-2_0-0-32bit-2.0.8-150200.11.11.1 * SDL2-debugsource-2.0.8-150200.11.11.1 * libavdevice58_13-32bit-4.4-150400.3.19.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libIex-2_2-23-2.2.1-150000.3.3.1 * libsuitesparseconfig5-5.2.0-150100.9.2.3 * libcdio_paranoia2-10.2+0.93+1-150000.3.4.1 * libcamd2-2.4.6-150100.9.2.3 * libwebrtc_audio_processing1-0.3-150000.3.2.1 * libopenmpt0-0.3.28-150000.2.15.1 * libsratom-0-0-0.6.0-150000.3.2.1 * ffmpeg-4-libavutil-devel-4.4-150400.3.19.1 * libcdio-paranoia-debugsource-10.2+0.93+1-150000.3.4.1 * libbluray2-1.3.0-150300.10.9.1 * ffmpeg-4-libavdevice-devel-4.4-150400.3.19.1 * ffmpeg-4-private-devel-4.4-150400.3.19.1 * libpipewire-0_3-0-0.3.64-150500.3.5.2 * libva-wayland2-debuginfo-2.16.0-150500.3.2.1 * ffmpeg-4-libswscale-devel-4.4-150400.3.19.1 * lensfun-tools-0.3.2-150400.3.2.2 * libbs2b0-3.1.0-150400.3.2.1 * libcolamd2-2.9.6-150100.9.2.3 * bs2b-tools-3.1.0-150400.3.2.1 * pipewire-devel-0.3.64-150500.3.5.2 * libbs2b-debugsource-3.1.0-150400.3.2.1 * libavresample4_0-debuginfo-4.4-150400.3.19.1 * libgsm1-1.0.14-150000.3.6.1 * libavcodec58_134-debuginfo-4.4-150400.3.19.1 * rtkit-0.11+git.20130926-150000.3.5.1 * libcdio_cdda2-10.2+0.93+1-150000.3.4.1 * libIlmImf-2_2-23-2.2.1-150000.3.43.1 * libavfilter7_110-4.4-150400.3.19.1 * libdc1394-22-2.2.5-150000.3.4.1 * liblilv-0-0-0.24.10-150300.3.2.1 * libva-gl-debugsource-2.16.0-150500.3.2.1 * pipewire-tools-0.3.64-150500.3.5.2 * libswscale5_9-debuginfo-4.4-150400.3.19.1 * pipewire-spa-plugins-0_2-0.3.64-150500.3.5.2 * pipewire-modules-0_3-0.3.64-150500.3.5.2 * pipewire-spa-tools-0.3.64-150500.3.5.2 * libavformat58_76-debuginfo-4.4-150400.3.19.1 * pipewire-0.3.64-150500.3.5.2 * libpostproc55_9-4.4-150400.3.19.1 * libHalf23-2.2.1-150000.3.3.1 * ffmpeg-4-libavresample-devel-4.4-150400.3.19.1 * libavutil56_70-4.4-150400.3.19.1 * lensfun-debugsource-0.3.2-150400.3.2.2 * pulseaudio-setup-15.0-150400.4.4.1 * wireplumber-debugsource-0.4.13-150500.3.2.1 * libcholmod3-debuginfo-3.0.12-150100.9.2.3 * pipewire-alsa-0.3.64-150500.3.5.2 * libmetis5-5.1.0-150100.9.5.2 * libraw20-0.20.2-150400.3.11.3 * lensfun-doc-0.3.2-150400.3.2.2 * libass9-0.14.0-150000.3.13.1 * wireplumber-0.4.13-150500.3.2.1 * libcdio16-0.94-150000.6.13.1 * wireplumber-devel-0.4.13-150500.3.2.1 * pipewire-debuginfo-0.3.64-150500.3.5.2 * libwireplumber-0_4-0-0.4.13-150500.3.2.1 * libavformat58_76-4.4-150400.3.19.1 * libvdpau1-1.1.1-150000.3.4.1 * bs2b-tools-debuginfo-3.1.0-150400.3.2.1 * libavdevice58_13-4.4-150400.3.19.1 * libswresample3_9-debuginfo-4.4-150400.3.19.1 * ffmpeg-4-libavfilter-devel-4.4-150400.3.19.1 * pipewire-libjack-0_3-debuginfo-0.3.64-150500.3.5.2 * python3-lensfun-0.3.2-150400.3.2.2 * libraw1394-11-2.1.1-150000.3.4.1 * ffmpeg-4-libpostproc-devel-4.4-150400.3.19.1 * liblensfun1-0.3.2-150400.3.2.2 * libamd2-2.4.6-150100.9.2.3 * pipewire-alsa-debuginfo-0.3.64-150500.3.5.2 * cd-paranoia-10.2+0.93+1-150000.3.4.1 * libswscale5_9-4.4-150400.3.19.1 * ffmpeg-4-libavcodec-devel-4.4-150400.3.19.1 * wireplumber-debuginfo-0.4.13-150500.3.2.1 * ffmpeg-4-libavformat-devel-4.4-150400.3.19.1 * libccolamd2-2.9.6-150100.9.2.3 * pipewire-libjack-0_3-devel-0.3.64-150500.3.5.2 * libavfilter7_110-debuginfo-4.4-150400.3.19.1 * libva-wayland2-2.16.0-150500.3.2.1 * ffmpeg-4-debuginfo-4.4-150400.3.19.1 * libavcodec58_134-4.4-150400.3.19.1 * pipewire-doc-0.3.64-150500.3.5.2 * libumfpack5-5.7.6-150100.9.2.3 * libpostproc55_9-debuginfo-4.4-150400.3.19.1 * cd-paranoia-debuginfo-10.2+0.93+1-150000.3.4.1 * libcelt0-2-0.11.3-150000.3.5.1 * pipewire-libjack-0_3-0.3.64-150500.3.5.2 * lensfun-devel-0.3.2-150400.3.2.2 * libva2-2.16.0-150500.3.2.1 * libavresample4_0-4.4-150400.3.19.1 * libfdk-aac2-2.0.0-150400.3.2.1 * libavutil56_70-debuginfo-4.4-150400.3.19.1 * pipewire-debugsource-0.3.64-150500.3.5.2 * libbs2b-devel-3.1.0-150400.3.2.1 * libavdevice58_13-debuginfo-4.4-150400.3.19.1 * libsord-0-0-0.16.0-150000.3.2.1 * libva-drm2-2.16.0-150500.3.2.1 * ffmpeg-4-debugsource-4.4-150400.3.19.1 * pipewire-pulseaudio-debuginfo-0.3.64-150500.3.5.2 * pulseaudio-utils-15.0-150400.4.4.1 * ffmpeg-4-4.4-150400.3.19.1 * pipewire-pulseaudio-0.3.64-150500.3.5.2 * ffmpeg-4-libswresample-devel-4.4-150400.3.19.1 * libIlmThread-2_2-23-2.2.1-150000.3.3.1 * libcholmod3-3.0.12-150100.9.2.3 * libswresample3_9-4.4-150400.3.19.1 * libserd-0-0-0.30.6-150300.3.2.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * gegl-0_4-debuginfo-0.4.34-150400.3.5.2 * gegl-0.4.34-150400.3.5.2 * libgegl-0_4-0-0.4.34-150400.3.5.2 * libspiro0-0.5.20150702-150000.3.2.1 * gegl-0_4-0.4.34-150400.3.5.2 * gegl-devel-0.4.34-150400.3.5.2 * libraw-tools-0.20.2-150400.3.11.3 * libraw-tools-debuginfo-0.20.2-150400.3.11.3 * libgegl-0_4-0-debuginfo-0.4.34-150400.3.5.2 * libraw-devel-static-0.20.2-150400.3.11.3 * gegl-debugsource-0.4.34-150400.3.5.2 * typelib-1_0-Gegl-0_4-0.4.34-150400.3.5.2 * gegl-doc-0.4.34-150400.3.5.2 * liblensfun1-debuginfo-0.3.2-150400.3.2.2 * libraw-debugsource-0.20.2-150400.3.11.3 * libraw-devel-0.20.2-150400.3.11.3 * gegl-debuginfo-0.4.34-150400.3.5.2 * SUSE Package Hub 15 15-SP5 (noarch) * gegl-0_4-lang-0.4.34-150400.3.5.2 * lensfun-data-0.3.2-150400.3.2.2 * pipewire-lang-0.3.64-150500.3.5.2 * wireplumber-audio-0.4.13-150500.3.2.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64 i586) * libSDL2-2_0-0-2.0.8-150200.11.11.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le x86_64) * libldac2-2.0.2.3-150300.3.2.1 * SUSE Package Hub 15 15-SP5 (x86_64) * SDL2-debugsource-2.0.8-150200.11.11.1 * libraw1394-11-32bit-debuginfo-2.1.1-150000.3.4.1 * pulseaudio-debuginfo-15.0-150400.4.4.1 * libspqr2-debuginfo-2.0.8-150100.9.2.3 * libraw1394-debugsource-2.1.1-150000.3.4.1 * libgsm1-32bit-debuginfo-1.0.14-150000.3.6.1 * libgsm-debugsource-1.0.14-150000.3.6.1 * libpulse0-32bit-debuginfo-15.0-150400.4.4.1 * libSDL2-2_0-0-32bit-debuginfo-2.0.8-150200.11.11.1 * libspqr2-2.0.8-150100.9.2.3 * libraw1394-11-32bit-2.1.1-150000.3.4.1 * libpulse0-32bit-15.0-150400.4.4.1 * libgsm1-32bit-1.0.14-150000.3.6.1 * pulseaudio-debugsource-15.0-150400.4.4.1 * libSDL2-2_0-0-32bit-2.0.8-150200.11.11.1 * libmfx1-22.6.1-150500.3.2.4 * SUSE Linux Enterprise Workstation Extension 15 SP4 (x86_64) * gegl-0_4-0.4.34-150400.3.5.2 * metis-debugsource-5.1.0-150100.9.5.2 * gegl-debugsource-0.4.34-150400.3.5.2 * ffmpeg-4-debuginfo-4.4-150400.3.19.1 * pulseaudio-module-lirc-15.0-150400.4.4.1 * gegl-0_4-debuginfo-0.4.34-150400.3.5.2 * pulseaudio-module-bluetooth-debuginfo-15.0-150400.4.4.1 * metis-devel-5.1.0-150100.9.5.2 * libavformat58_76-4.4-150400.3.19.1 * libswscale5_9-debuginfo-4.4-150400.3.19.1 * pulseaudio-debugsource-15.0-150400.4.4.1 * pulseaudio-module-bluetooth-15.0-150400.4.4.1 * libgegl-0_4-0-0.4.34-150400.3.5.2 * gegl-devel-0.4.34-150400.3.5.2 * libavformat58_76-debuginfo-4.4-150400.3.19.1 * libiso9660-10-debuginfo-0.94-150000.6.13.1 * liblensfun1-debuginfo-0.3.2-150400.3.2.2 * typelib-1_0-Gegl-0_4-0.4.34-150400.3.5.2 * libraw-devel-0.20.2-150400.3.11.3 * ffmpeg-4-debugsource-4.4-150400.3.19.1 * libiso9660-10-0.94-150000.6.13.1 * pulseaudio-module-lirc-debuginfo-15.0-150400.4.4.1 * pulseaudio-debuginfo-15.0-150400.4.4.1 * libgegl-0_4-0-debuginfo-0.4.34-150400.3.5.2 * lensfun-debugsource-0.3.2-150400.3.2.2 * liblensfun1-0.3.2-150400.3.2.2 * libcdio-debugsource-0.94-150000.6.13.1 * metis-debuginfo-5.1.0-150100.9.5.2 * libswscale5_9-4.4-150400.3.19.1 * libraw-debugsource-0.20.2-150400.3.11.3 * gegl-debuginfo-0.4.34-150400.3.5.2 * SUSE Linux Enterprise Workstation Extension 15 SP4 (noarch) * gegl-0_4-lang-0.4.34-150400.3.5.2 * lensfun-data-0.3.2-150400.3.2.2 ## References: * https://jira.suse.com/browse/PED-6351 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Fri Jan 12 12:35:49 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 12 Jan 2024 13:35:49 +0100 (CET) Subject: SUSE-CU-2024:197-1: Recommended update of suse/sle-micro/5.5/toolbox Message-ID: <20240112123549.57233FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:197-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.135 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.135 Severity : moderate Type : recommended References : 1212160 1215294 1216412 1217593 1217873 1218291 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - zypper-1.14.68-150400.3.40.2 updated - container:sles15-image-15.0.0-36.5.72 updated From null at suse.de Fri Jan 12 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 12 Jan 2024 16:30:03 -0000 Subject: SUSE-SU-2024:0100-1: important: Security update for gstreamer-plugins-bad Message-ID: <170507700332.9476.1909636958309274131@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-bad Announcement ID: SUSE-SU-2024:0100-1 Rating: important References: * bsc#1218534 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one security fix can now be installed. ## Description: This update for gstreamer-plugins-bad fixes the following issues: * ZDI-CAN-22300: Fixed a buffer overflow in the AV1 video plugin (bsc#1218534). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-100=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-100=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-100=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-100=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-100=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-100=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-100=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-100=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-100=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-100=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gstreamer-transcoder-devel-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstVulkan-1_0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-transcoder-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgsttranscoder-1_0-0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * typelib-1_0-GstVulkanXCB-1_0-1.20.1-150400.3.18.1 * libgsttranscoder-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * gstreamer-transcoder-debuginfo-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstTranscoder-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstVulkanWayland-1_0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * openSUSE Leap 15.4 (x86_64) * gstreamer-plugins-bad-chromaprint-32bit-1.20.1-150400.3.18.1 * libgstplay-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-32bit-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstva-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstplay-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstva-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-32bit-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-32bit-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * openSUSE Leap 15.4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libgstwayland-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstva-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-64bit-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-64bit-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstva-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-64bit-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-64bit-1.20.1-150400.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * SUSE Manager Proxy 4.3 (x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218534 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 12 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 12 Jan 2024 16:30:06 -0000 Subject: SUSE-RU-2024:0099-1: moderate: Recommended update for bcc Message-ID: <170507700624.9476.11355184546364711086@smelt2.prg2.suse.org> # Recommended update for bcc Announcement ID: SUSE-RU-2024:0099-1 Rating: moderate References: * bsc#1217884 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for bcc fixes the following issue: * Fix BPF verifier rejection of nfsslower.py (bsc#1217884) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-99=1 openSUSE-SLE-15.5-2024-99=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-99=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libbcc0-0.26.0-150500.3.3.1 * bcc-debugsource-0.26.0-150500.3.3.1 * bcc-tools-0.26.0-150500.3.3.1 * libbcc0-debuginfo-0.26.0-150500.3.3.1 * bcc-tools-debuginfo-0.26.0-150500.3.3.1 * bcc-devel-0.26.0-150500.3.3.1 * bcc-debuginfo-0.26.0-150500.3.3.1 * openSUSE Leap 15.5 (noarch) * bcc-docs-0.26.0-150500.3.3.1 * bcc-examples-0.26.0-150500.3.3.1 * python3-bcc-0.26.0-150500.3.3.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libbcc0-0.26.0-150500.3.3.1 * bcc-debugsource-0.26.0-150500.3.3.1 * bcc-tools-0.26.0-150500.3.3.1 * libbcc0-debuginfo-0.26.0-150500.3.3.1 * bcc-tools-debuginfo-0.26.0-150500.3.3.1 * bcc-devel-0.26.0-150500.3.3.1 * bcc-debuginfo-0.26.0-150500.3.3.1 * Development Tools Module 15-SP5 (noarch) * bcc-docs-0.26.0-150500.3.3.1 * bcc-examples-0.26.0-150500.3.3.1 * python3-bcc-0.26.0-150500.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217884 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Sat Jan 13 08:06:28 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 13 Jan 2024 09:06:28 +0100 (CET) Subject: SUSE-CU-2024:218-1: Recommended update of bci/rust Message-ID: <20240113080628.6538FFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:218-1 Container Tags : bci/rust:1.74 , bci/rust:1.74-2.2.1 , bci/rust:oldstable , bci/rust:oldstable-2.2.1 Container Release : 2.1 Severity : moderate Type : recommended References : ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4592-1 Released: Mon Nov 27 18:02:44 2023 Summary: Recommended update for rust, rust1.74 Type: recommended Severity: moderate References: This update for rust, rust1.74 fixes the following issues: Version 1.74.0 (2023-11-16) ========================== Language -------- - Codify that std::mem::Discriminant does not depend on any lifetimes in T - Replace private_in_public lint with private_interfaces and private_bounds per RFC 2145. Read more in [RFC 2145(https://rust-lang.github.io/rfcs/2145-type-privacy.html). - Allow explicit #[repr(Rust)] - closure field capturing: don't depend on alignment of packed fields - Enable MIR-based drop-tracking for async blocks - Stabilize impl_trait_projections Compiler -------- - stabilize combining +bundle and +whole-archive link modifiers - Stabilize PATH option for --print KIND=PATH - Enable ASAN/LSAN/TSAN for *-apple-ios-macabi - Promote loongarch64-unknown-none* to Tier 2 - Add i686-pc-windows-gnullvm as a tier 3 target Libraries --------- - Implement From for ChildStdin/out/err - Implement From<{&,&mut} [T; N]> for Vec where T: Clone - impl Step for IP addresses - Implement From<[T; N]> for Rc<[T]> and Arc<[T]> - impl TryFrom for u16 - Stabilize io_error_other feature - Stabilize the Saturating type - Stabilize const_transmute_copy Stabilized APIs --------------- - core::num::Saturating - impl From for std::process::Stdio - impl From for std::process::Stdio - impl From for std::process::Child{Stdin, Stdout, Stderr} - impl From for std::process::Child{Stdin, Stdout, Stderr} - std::ffi::OsString::from_encoded_bytes_unchecked - std::ffi::OsString::into_encoded_bytes - std::ffi::OsStr::from_encoded_bytes_unchecked - std::ffi::OsStr::as_encoded_bytes - std::io::Error::other - impl TryFrom for u16 - impl From<&[T; N]> for Vec - impl From<&mut [T; N]> for Vec - impl From<[T; N]> for Arc<[T]> - impl From<[T; N]> for Rc<[T]> Thse APIs are now stable in const contexts: - core::mem::transmute_copy - str::is_ascii - [u8]::is_ascii Cargo ----- - fix: Set MSRV for internal packages - config: merge lists in precedence order - fix(update): Clarify meaning of --aggressive as --recursive - fix(update): Make -p more convenient by being positional - feat(help): Add styling to help output - feat(pkgid): Allow incomplete versions when unambigious - feat: stabilize credential-process and registry-auth - feat(cli): Add '-n' to dry-run - Add support for target.'cfg(..)'.linker - Stabilize --keep-going - feat: Stabilize lints Rustdoc ------- - Add warning block support in rustdoc - Accept additional user-defined syntax classes in fenced code blocks - rustdoc-search: add support for type parameters - rustdoc: show inner enum and struct in type definition for concrete type Compatibility Notes ------------------- - Raise minimum supported Apple OS versions - make Cell::swap panic if the Cells partially overlap - Reject invalid crate names in --extern - Don't resolve generic impls that may be shadowed by dyn built-in impls - The new impl From<{&,&mut} [T; N]> for Vec is known to cause some inference failures with overly-generic code. Changes in rust: - Update to version 1.74.0 - for details see the rust1.74 package The following package changes have been done: - rust1.74-1.74.0-150400.9.3.1 added - cargo1.74-1.74.0-150400.9.3.1 added - cargo1.73-1.73.0-150400.9.3.1 removed - rust1.73-1.73.0-150400.9.3.1 removed From sle-updates at lists.suse.com Sat Jan 13 08:06:47 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 13 Jan 2024 09:06:47 +0100 (CET) Subject: SUSE-CU-2024:220-1: Recommended update of bci/bci-sle15-kernel-module-devel Message-ID: <20240113080647.1461BFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:220-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.4.1 , bci/bci-sle15-kernel-module-devel:latest Container Release : 4.1 Severity : moderate Type : recommended References : 1201041 1209353 1209881 ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-feature-2022:3302-1 Released: Mon Sep 19 08:51:02 2022 Summary: Feature update for python310-pip Type: feature Severity: moderate References: 1201041 This feature update for python310-pip and python-rpm-macros provides: python310-pip: Upgrade from version 20.2.4 to version 22.0.4 (jsc#SLE-24539) - Adjust SPEC file to generate python310 module only - Avoid cycle: BuildRequire ca-certificates only in tests - This version is not compatible with Python 3.6 and thus not suitable for SUSE Linux Enterprise 15. - Drop the doctype check, that presented a warning for index pages that use non-compliant HTML 5. - Print the exception via rich.traceback, when running with `--debug`. - Only calculate topological installation order, for packages that are going to be installed/upgraded. * This error occurred when determining the installation order for a very specific combination of upgrading of already installed packages, change of dependencies and fetching some packages from a package index. This combination was especially common in Read the Docs' builds. - Use html.parser by default, instead of falling back to html5lib when --use-deprecated=html5lib is not passed. - Clarify that using per-requirement overrides disables the usage of wheels. - Instead of failing on index pages that use non-compliant HTML 5, print a deprecation warning and fall back to html5lib-based parsing for now. This simplifies the migration for non-compliant index pages, by letting such indexes function with a warning. - Accept lowercase on index pages. - Properly handle links parsed by html5lib, when using --use-deprecated=html5lib. - Changed PackageFinder to parse HTML documents using the stdlib :class:`html.parser.HTMLParser` class instead of the html5lib package. - For now, the deprecated html5lib code remains and can be used with the --use-deprecated=html5lib command line option. However, it will be removed in a future pip release. - Completely replace :pypi:`tox` in our development workflow, with :pypi:`nox`. - Deprecate alternative progress bar styles, leaving only on and off as available choices. - Drop support for Python 3.6. - Disable location mismatch warnings on Python versions prior to 3.10. * These warnings were helping identify potential issues as part of the sysconfig -> distutils transition, and we no longer need to rely on reports from older Python versions for information on the transition. - Utilize rich for presenting pip's default download progress bar. - Present a better error message when an invalid wheel file is encountered, providing more context where the invalid wheel file is. - Documents the --require-virtualenv flag for pip install. - pip install autocompletes paths. - Allow Python distributors to opt-out from or opt-in to the sysconfig installation scheme backend by setting sysconfig._PIP_USE_SYSCONFIG to True or False. - Make it possible to deselect tests requiring cryptography package on systems where it cannot be installed. - Start using Rich for presenting error messages in a consistent format. - Improve presentation of errors from subprocesses. - Forward pip's verbosity configuration to VCS tools to control their output accordingly. - Optimize installation order calculation to improve performance when installing requirements that form a complex dependency graph with a large amount of edges. - When a package is requested by the user for upgrade, correctly identify that the extra-ed variant of that same package depended by another user-requested package is requesting the same package, and upgrade it accordingly. - Prevent pip from installing yanked releases unless explicitly pinned via the `==` or `===` operators. - Stop backtracking on build failures, by instead surfacing them to the user and aborting immediately. This behaviour provides more immediate feedback when a package cannot be built due to missing build dependencies or platform incompatibility. - Silence Value for does not match warning caused by an erroneous patch in Slackware-distributed Python 3.9. - Fix an issue where pip did not consider dependencies with and without extras to be equal - Always refuse installing or building projects that have no ``pyproject.toml`` nor ``setup.py``. - Tweak running-as-root detection, to check ``os.getuid`` if it exists, on Unix-y and non-Linux/non-MacOS machines. - When installing projects with a ``pyproject.toml`` in editable mode, and the build backend does not support :pep:`660`, prepare metadata using ``prepare_metadata_for_build_wheel`` instead of ``setup.py egg_info``. Also, refuse installing projects that only have a ``setup.cfg`` and no ``setup.py`` nor ``pyproject.toml``. These restore the pre-21.3 behaviour. - Restore compatibility of where configuration files are loaded from on MacOS - Upgrade pep517 to 0.12.0 - Improve deprecation warning regarding the copying of source trees when installing from a local directory. - Suppress location mismatch warnings when pip is invoked from a Python source tree, so ``ensurepip`` does not emit warnings on CPython ``make install``. - On Python 3.10 or later, the installation scheme backend has been changed to use ``sysconfig``. This is to anticipate the deprecation of ``distutils`` in Python 3.10, and its scheduled removal in 3.12. For compatibility considerations, pip installations running on Python 3.9 or lower will continue to use ``distutils``. - Remove the ``--build-dir`` option and aliases, one last time. - In-tree builds are now the default. ``--use-feature=in-tree-build`` is now ignored. ``--use-deprecated=out-of-tree-build`` may be used temporarily to ease the transition. - Un-deprecate source distribution re-installation behaviour. - Replace vendored appdirs with platformdirs. - Support `PEP 610 `_ to detect editable installs in ``pip freeze`` and ``pip list``. The ``pip list`` column output has a new ``Editable project location`` column, and the JSON output has a new ``editable_project_location`` field. - ``pip freeze`` will now always fallback to reporting the editable project location when it encounters a VCS error while analyzing an editable requirement. Before, it sometimes reported the requirement as non-editable. - ``pip show`` now sorts ``Requires`` and ``Required-By`` alphabetically. - Do not raise error when there are no files to remove with ``pip cache purge/remove``. Instead log a warning and continue (to log that we removed 0 files). - When backtracking during dependency resolution, prefer the dependencies which are involved in the most recent conflict. This can significantly reduce the amount of backtracking required. - Cache requirement objects, to improve performance reducing reparses of requirement strings. - Support editable installs for projects that have a ``pyproject.toml`` and use a build backend that supports :pep:`660`. - When a revision is specified in a Git URL, use git's partial clone feature to speed up source retrieval. - Add a ``--debug`` flag, to enable a mode that doesn't log errors and propagates them to the top level instead. This is primarily to aid with debugging pip's crashes. - If a host is explicitly specified as trusted by the user (via the --trusted-host option), cache HTTP responses from it in addition to HTTPS ones. - Present a better error message, when a ``file:`` URL is not found. - Fix the auth credential cache to allow for the case in which the index url contains the username, but the password comes from an external source, such as keyring. - Fix double unescape of HTML ``data-requires-python`` and ``data-yanked`` attributes. - New resolver: Fixes depth ordering of packages during resolution, e.g. a dependency 2 levels deep will be ordered before a dependency 3 levels deep. python-rpm-macros: Update from version 20220106.80d3756 to version 20220809.cf8a7b8 (bsc#1201041) - Pass `--ignore-installed` to `pip install` in %pyproject_install - restore end-of-line in alternative scriptlets - make python_flavored_alternatives less verbose - Move install of libalts from sciptlets to python_clone -a - hard-code %py_ver - print proper error on missing python interpreter - Update compile-macros.sh - Create python_flavored_alternatives and use for testing - Switch primary_interpreter from python38 to python310 - Avoid bashism in %() - Fix flavor executable substitution - Keep python38 as primary python3 - Add python310 to the buildset - Move python39 to the primary place in %pythons - Disable python36 flavor in Factory buildset - Add python310 flavor macros to compile set ----------------------------------------------------------------- Advisory ID: SUSE-feature-2022:3689-1 Released: Fri Oct 21 14:19:56 2022 Summary: Feature update for rpm Type: feature Severity: moderate References: This feature update for rpm provides: - Support Ed25519 RPM signatures (jsc#SLE-24714, jsc#SLE-24715) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:2155-1 Released: Wed May 10 13:07:56 2023 Summary: Recommended update for python-rpm-macros Type: recommended Severity: moderate References: 1209353,1209881 This update for python-rpm-macros fixes the following issues: - Update to version 20230304.050c1a4 (bsc#1209881, bsc#1209353) The following package changes have been done: - bzip2-1.0.8-150400.1.122 added - dwz-0.12-150000.3.2.1 added - file-5.32-7.14.1 added - glibc-locale-base-2.31-150300.63.1 added - libtextstyle0-0.20.2-1.43 added - python-rpm-macros-20230403.29b58f8-150400.3.9.1 added - which-2.21-2.20 added - xz-5.2.3-150000.4.7.1 added - glibc-locale-2.31-150300.63.1 added - gettext-runtime-0.20.2-1.43 added - gettext-tools-0.20.2-1.43 added - rpm-build-4.14.3-150400.59.3.1 added From sle-updates at lists.suse.com Mon Jan 15 08:01:03 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 15 Jan 2024 09:01:03 +0100 (CET) Subject: SUSE-IU-2024:18-1: Security update of suse-sles-15-sp5-chost-byos-v20240111-x86_64-gen2 Message-ID: <20240115080103.670D6FBA4@maintenance.suse.de> SUSE Image Update Advisory: suse-sles-15-sp5-chost-byos-v20240111-x86_64-gen2 ----------------------------------------------------------------- Image Advisory ID : SUSE-IU-2024:18-1 Image Tags : suse-sles-15-sp5-chost-byos-v20240111-x86_64-gen2:20240111 Image Release : Severity : important Type : security References : 1029961 1158830 1170415 1170446 1178760 1201384 1206798 1209122 1210141 1212160 1213229 1213500 1214788 1215294 1215323 1215496 1216412 1216853 1216987 1217277 1217292 1217513 1217592 1217593 1217695 1217696 1217873 1217950 1217969 1218014 1218291 CVE-2020-12912 CVE-2020-8694 CVE-2020-8695 CVE-2023-38472 CVE-2023-39804 CVE-2023-48795 CVE-2023-49083 CVE-2023-50495 CVE-2023-5981 ----------------------------------------------------------------- The container suse-sles-15-sp5-chost-byos-v20240111-x86_64-gen2 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4843-1 Released: Thu Dec 14 12:22:44 2023 Summary: Security update for python3-cryptography Type: security Severity: moderate References: 1217592,CVE-2023-49083 This update for python3-cryptography fixes the following issues: - CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4901-1 Released: Tue Dec 19 11:25:47 2023 Summary: Security update for avahi Type: security Severity: moderate References: 1216853,CVE-2023-38472 This update for avahi fixes the following issues: - CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4902-1 Released: Tue Dec 19 13:09:42 2023 Summary: Security update for openssh Type: security Severity: important References: 1214788,1217950,CVE-2023-48795 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4936-1 Released: Wed Dec 20 17:18:21 2023 Summary: Security update for docker, rootlesskit Type: security Severity: important References: 1170415,1170446,1178760,1210141,1213229,1213500,1215323,1217513,CVE-2020-12912,CVE-2020-8694,CVE-2020-8695 This update for docker, rootlesskit fixes the following issues: docker: - Update to Docker 24.0.7-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2407>. bsc#1217513 * Deny containers access to /sys/devices/virtual/powercap by default. - CVE-2020-8694 bsc#1170415 - CVE-2020-8695 bsc#1170446 - CVE-2020-12912 bsc#1178760 - Update to Docker 24.0.6-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2406 . bsc#1215323 - Add a docker.socket unit file, but with socket activation effectively disabled to ensure that Docker will always run even if you start the socket individually. Users should probably just ignore this unit file. bsc#1210141 - Update to Docker 24.0.5-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2405 . bsc#1213229 This update ships docker-rootless support in the docker-rootless-extra package. (jsc#PED-6180) rootlesskit: - new package, for docker rootless support. (jsc#PED-6180) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4983-1 Released: Thu Dec 28 14:21:40 2023 Summary: Security update for gnutls Type: security Severity: moderate References: 1217277,CVE-2023-5981 This update for gnutls fixes the following issues: - CVE-2023-5981: Fixed timing side-channel inside RSA-PSK key exchange (bsc#1217277). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:50-1 Released: Mon Jan 8 03:18:56 2024 Summary: Recommended update for python-instance-billing-flavor-check Type: recommended Severity: moderate References: 1217695,1217696 This update for python-instance-billing-flavor-check fixes the following issues: - Run the command as sudo only (bsc#1217696, bsc#1217695) - Handle exception for Python 3.4 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:68-1 Released: Tue Jan 9 15:26:08 2024 Summary: Recommended update for rsyslog Type: recommended Severity: moderate References: 1217292 This update for rsyslog fixes the following issues: - Restart daemon after modules packages have been updated (bsc#1217292) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - curl-8.0.1-150400.5.41.1 updated - docker-24.0.7_ce-150000.190.4 updated - libavahi-client3-0.8-150400.7.13.1 updated - libavahi-common3-0.8-150400.7.13.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libcurl4-8.0.1-150400.5.41.1 updated - libgnutls30-3.7.3-150400.4.38.1 updated - libncurses6-6.1-150000.5.20.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - openssh-clients-8.4p1-150300.3.27.1 updated - openssh-common-8.4p1-150300.3.27.1 updated - openssh-server-8.4p1-150300.3.27.1 updated - openssh-8.4p1-150300.3.27.1 updated - procps-3.3.17-150000.7.37.1 updated - python-instance-billing-flavor-check-0.0.4-150000.1.6.1 updated - python3-cryptography-3.3.2-150400.23.1 updated - python3-cssselect-1.0.3-150000.3.5.1 updated - rsyslog-module-relp-8.2306.0-150400.5.24.1 updated - rsyslog-8.2306.0-150400.5.24.1 updated - samba-client-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 updated - tar-1.34-150000.3.34.1 updated - terminfo-base-6.1-150000.5.20.1 updated - terminfo-6.1-150000.5.20.1 updated - xen-libs-4.17.3_02-150500.3.18.1 updated - zypper-1.14.68-150400.3.40.2 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-updates at lists.suse.com Mon Jan 15 08:01:06 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 15 Jan 2024 09:01:06 +0100 (CET) Subject: SUSE-IU-2024:19-1: Security update of suse-sles-15-sp5-chost-byos-v20240111-hvm-ssd-x86_64 Message-ID: <20240115080106.AE9F4FBA4@maintenance.suse.de> SUSE Image Update Advisory: suse-sles-15-sp5-chost-byos-v20240111-hvm-ssd-x86_64 ----------------------------------------------------------------- Image Advisory ID : SUSE-IU-2024:19-1 Image Tags : suse-sles-15-sp5-chost-byos-v20240111-hvm-ssd-x86_64:20240111 Image Release : Severity : important Type : security References : 1029961 1158830 1170415 1170446 1178760 1201384 1206798 1209122 1210141 1212160 1213229 1213500 1214788 1215294 1215323 1215496 1216412 1216853 1216987 1217277 1217292 1217513 1217592 1217593 1217695 1217696 1217873 1217950 1217969 1218014 1218291 CVE-2020-12912 CVE-2020-8694 CVE-2020-8695 CVE-2023-38472 CVE-2023-39804 CVE-2023-48795 CVE-2023-49083 CVE-2023-50495 CVE-2023-5981 ----------------------------------------------------------------- The container suse-sles-15-sp5-chost-byos-v20240111-hvm-ssd-x86_64 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4843-1 Released: Thu Dec 14 12:22:44 2023 Summary: Security update for python3-cryptography Type: security Severity: moderate References: 1217592,CVE-2023-49083 This update for python3-cryptography fixes the following issues: - CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4901-1 Released: Tue Dec 19 11:25:47 2023 Summary: Security update for avahi Type: security Severity: moderate References: 1216853,CVE-2023-38472 This update for avahi fixes the following issues: - CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4902-1 Released: Tue Dec 19 13:09:42 2023 Summary: Security update for openssh Type: security Severity: important References: 1214788,1217950,CVE-2023-48795 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4936-1 Released: Wed Dec 20 17:18:21 2023 Summary: Security update for docker, rootlesskit Type: security Severity: important References: 1170415,1170446,1178760,1210141,1213229,1213500,1215323,1217513,CVE-2020-12912,CVE-2020-8694,CVE-2020-8695 This update for docker, rootlesskit fixes the following issues: docker: - Update to Docker 24.0.7-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2407>. bsc#1217513 * Deny containers access to /sys/devices/virtual/powercap by default. - CVE-2020-8694 bsc#1170415 - CVE-2020-8695 bsc#1170446 - CVE-2020-12912 bsc#1178760 - Update to Docker 24.0.6-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2406 . bsc#1215323 - Add a docker.socket unit file, but with socket activation effectively disabled to ensure that Docker will always run even if you start the socket individually. Users should probably just ignore this unit file. bsc#1210141 - Update to Docker 24.0.5-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2405 . bsc#1213229 This update ships docker-rootless support in the docker-rootless-extra package. (jsc#PED-6180) rootlesskit: - new package, for docker rootless support. (jsc#PED-6180) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4983-1 Released: Thu Dec 28 14:21:40 2023 Summary: Security update for gnutls Type: security Severity: moderate References: 1217277,CVE-2023-5981 This update for gnutls fixes the following issues: - CVE-2023-5981: Fixed timing side-channel inside RSA-PSK key exchange (bsc#1217277). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:50-1 Released: Mon Jan 8 03:18:56 2024 Summary: Recommended update for python-instance-billing-flavor-check Type: recommended Severity: moderate References: 1217695,1217696 This update for python-instance-billing-flavor-check fixes the following issues: - Run the command as sudo only (bsc#1217696, bsc#1217695) - Handle exception for Python 3.4 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:68-1 Released: Tue Jan 9 15:26:08 2024 Summary: Recommended update for rsyslog Type: recommended Severity: moderate References: 1217292 This update for rsyslog fixes the following issues: - Restart daemon after modules packages have been updated (bsc#1217292) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - curl-8.0.1-150400.5.41.1 updated - docker-24.0.7_ce-150000.190.4 updated - libavahi-client3-0.8-150400.7.13.1 updated - libavahi-common3-0.8-150400.7.13.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libcurl4-8.0.1-150400.5.41.1 updated - libgnutls30-3.7.3-150400.4.38.1 updated - libncurses6-6.1-150000.5.20.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - openssh-clients-8.4p1-150300.3.27.1 updated - openssh-common-8.4p1-150300.3.27.1 updated - openssh-server-8.4p1-150300.3.27.1 updated - openssh-8.4p1-150300.3.27.1 updated - procps-3.3.17-150000.7.37.1 updated - python-instance-billing-flavor-check-0.0.4-150000.1.6.1 updated - python3-cryptography-3.3.2-150400.23.1 updated - python3-cssselect-1.0.3-150000.3.5.1 updated - rsyslog-module-relp-8.2306.0-150400.5.24.1 updated - rsyslog-8.2306.0-150400.5.24.1 updated - samba-client-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 updated - tar-1.34-150000.3.34.1 updated - terminfo-base-6.1-150000.5.20.1 updated - terminfo-6.1-150000.5.20.1 updated - xen-libs-4.17.3_02-150500.3.18.1 updated - xen-tools-domU-4.17.3_02-150500.3.18.1 updated - zypper-1.14.68-150400.3.40.2 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-updates at lists.suse.com Mon Jan 15 08:01:12 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 15 Jan 2024 09:01:12 +0100 (CET) Subject: SUSE-IU-2024:20-1: Security update of sles-15-sp5-chost-byos-v20240111-arm64 Message-ID: <20240115080112.7A0CAFBA4@maintenance.suse.de> SUSE Image Update Advisory: sles-15-sp5-chost-byos-v20240111-arm64 ----------------------------------------------------------------- Image Advisory ID : SUSE-IU-2024:20-1 Image Tags : sles-15-sp5-chost-byos-v20240111-arm64:20240111 Image Release : Severity : important Type : security References : 1029961 1158830 1170415 1170446 1178760 1201384 1206798 1209122 1210141 1212160 1213229 1213500 1214788 1215294 1215323 1215496 1216412 1216546 1216547 1216548 1216750 1216751 1216853 1216987 1217277 1217292 1217513 1217592 1217593 1217695 1217696 1217873 1217950 1217969 1218014 1218291 CVE-2020-12912 CVE-2020-8694 CVE-2020-8695 CVE-2023-38472 CVE-2023-39804 CVE-2023-48795 CVE-2023-49083 CVE-2023-50495 CVE-2023-5981 ----------------------------------------------------------------- The container sles-15-sp5-chost-byos-v20240111-arm64 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4843-1 Released: Thu Dec 14 12:22:44 2023 Summary: Security update for python3-cryptography Type: security Severity: moderate References: 1217592,CVE-2023-49083 This update for python3-cryptography fixes the following issues: - CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4886-1 Released: Mon Dec 18 09:38:37 2023 Summary: Recommended update for google-guest-agent, google-guest-oslogin Type: recommended Severity: moderate References: 1216546,1216547,1216548,1216750,1216751 This update for google-guest-agent, google-guest-oslogin fixes the following issues: - Update to version 20231031.01 (bsc#1216547, bsc#1216751) - Bump the golang compiler version to 1.21 (bsc#1216546) - Update to version 20231101.00 (bsc#1216548, bsc#1216750) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4901-1 Released: Tue Dec 19 11:25:47 2023 Summary: Security update for avahi Type: security Severity: moderate References: 1216853,CVE-2023-38472 This update for avahi fixes the following issues: - CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4902-1 Released: Tue Dec 19 13:09:42 2023 Summary: Security update for openssh Type: security Severity: important References: 1214788,1217950,CVE-2023-48795 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4936-1 Released: Wed Dec 20 17:18:21 2023 Summary: Security update for docker, rootlesskit Type: security Severity: important References: 1170415,1170446,1178760,1210141,1213229,1213500,1215323,1217513,CVE-2020-12912,CVE-2020-8694,CVE-2020-8695 This update for docker, rootlesskit fixes the following issues: docker: - Update to Docker 24.0.7-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2407>. bsc#1217513 * Deny containers access to /sys/devices/virtual/powercap by default. - CVE-2020-8694 bsc#1170415 - CVE-2020-8695 bsc#1170446 - CVE-2020-12912 bsc#1178760 - Update to Docker 24.0.6-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2406 . bsc#1215323 - Add a docker.socket unit file, but with socket activation effectively disabled to ensure that Docker will always run even if you start the socket individually. Users should probably just ignore this unit file. bsc#1210141 - Update to Docker 24.0.5-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2405 . bsc#1213229 This update ships docker-rootless support in the docker-rootless-extra package. (jsc#PED-6180) rootlesskit: - new package, for docker rootless support. (jsc#PED-6180) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4983-1 Released: Thu Dec 28 14:21:40 2023 Summary: Security update for gnutls Type: security Severity: moderate References: 1217277,CVE-2023-5981 This update for gnutls fixes the following issues: - CVE-2023-5981: Fixed timing side-channel inside RSA-PSK key exchange (bsc#1217277). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:50-1 Released: Mon Jan 8 03:18:56 2024 Summary: Recommended update for python-instance-billing-flavor-check Type: recommended Severity: moderate References: 1217695,1217696 This update for python-instance-billing-flavor-check fixes the following issues: - Run the command as sudo only (bsc#1217696, bsc#1217695) - Handle exception for Python 3.4 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:68-1 Released: Tue Jan 9 15:26:08 2024 Summary: Recommended update for rsyslog Type: recommended Severity: moderate References: 1217292 This update for rsyslog fixes the following issues: - Restart daemon after modules packages have been updated (bsc#1217292) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - curl-8.0.1-150400.5.41.1 updated - docker-24.0.7_ce-150000.190.4 updated - google-guest-agent-20231031.01-150000.1.40.1 updated - google-guest-oslogin-20231101.00-150000.1.35.1 updated - libavahi-client3-0.8-150400.7.13.1 updated - libavahi-common3-0.8-150400.7.13.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libcurl4-8.0.1-150400.5.41.1 updated - libgnutls30-3.7.3-150400.4.38.1 updated - libncurses6-6.1-150000.5.20.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - openssh-clients-8.4p1-150300.3.27.1 updated - openssh-common-8.4p1-150300.3.27.1 updated - openssh-server-8.4p1-150300.3.27.1 updated - openssh-8.4p1-150300.3.27.1 updated - procps-3.3.17-150000.7.37.1 updated - python-instance-billing-flavor-check-0.0.4-150000.1.6.1 updated - python3-cryptography-3.3.2-150400.23.1 updated - python3-cssselect-1.0.3-150000.3.5.1 updated - rsyslog-module-relp-8.2306.0-150400.5.24.1 updated - rsyslog-8.2306.0-150400.5.24.1 updated - samba-client-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 updated - tar-1.34-150000.3.34.1 updated - terminfo-base-6.1-150000.5.20.1 updated - terminfo-6.1-150000.5.20.1 updated - xen-libs-4.17.3_02-150500.3.18.1 updated - zypper-1.14.68-150400.3.40.2 updated - libprocps7-3.3.15-150000.7.34.1 removed From null at suse.de Mon Jan 15 08:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 15 Jan 2024 08:30:05 -0000 Subject: SUSE-RU-2024:0101-1: moderate: Recommended update for suseconnect-ng Message-ID: <170530740532.21903.16596230672884280460@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0101-1 Rating: moderate References: * bsc#1161891 * bsc#1170267 * bsc#1174657 * bsc#1188646 * bsc#1194989 * bsc#1195003 * bsc#1195220 * bsc#1195729 * bsc#1196076 * bsc#1196326 * bsc#1197398 * bsc#1198625 * bsc#1200803 * bsc#1200994 * bsc#1202705 * bsc#1203341 * bsc#1204821 * bsc#1207876 * bsc#1211588 * bsc#1212799 * bsc#1214781 * bsc#1217317 * jsc#PED-3179 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that contains one feature and has 22 fixes can now be installed. ## Description: This update fixes the following issues: suseconnect-ng: * Update from verions 0.0.0 to version 1.4.0 * Enable building on SLE12 SP5 (jsc#PED-3179) * Added EULA display for addons (bsc#1170267) * Fix zypper argument for auto-agreeing licenses (bsc#1214781) * Fixed 'provides' to work with yast2-registration on SLE15 SP4 (bsc#1212799) * Improve error message if product set more than once * Keep keepalive timer states when replacing SUSEConnect (bsc#1211588) * Make keepalive on SUMA systems exit without error (bsc#1207876) * Add deactivate API to ruby bindings (bsc#1202705) * Don't write system_token to service credentials files * Allow non-root users to use --version * Fix keepalive feature notice during installation * Fix requires for all RHEL clone distributions like alma and rocky * Fix System-Token support in ruby binding (bsc#1203341) * Respect the PROXY_ENABLED environment variable * Use system-wide proxy settings (bsc#1200994) * Add customer information about keepalive calls * Fixes an issue when (bsc#1196076) * Print nested zypper errors (bsc#1200803) * Fix migration json error with SMT (bsc#1198625) * Allow reloading CA certs pool (bsc#1195220) * Fix product tree traversal (bsc#1197398) * Revert "Remove self from LD_PRELOAD (bsc#1196326) * Remove self from LD_PRELOAD (bsc#1196326) * Delegate free() calls back to Go (bsc#1195729) * Workaround system cert reloading after import (bsc#1195220) * Add -l as an alias for --list-extensions * Add --clean as an alias for --cleanup (bsc#1195003) * Add flag to import product repo keys (bsc#1174657) * Cleanup services during migration (bsc#1161891) * Allow non-root users to see usage text * Update code comments to match shim behavior. * Remove dependency on systemd * Add package search for YaST's "Online Search" * Add CLI for zypper search-packages plugin * Add Requires that weren't explicit (bsc#1188646) * Fix list-extensions printing "Not available" when using SCC * Write usage help to stdout like the Ruby version * Document advantage of suseconnect-ng * Add proxy auth support * Change order of usage help options to match the Ruby version * Add zypper service commands needed for registration * S390: set cpus, sockets, hypervisor and uuid hwinfo fields * Implement the system update part of registration yast2-registration: * Switch to the new SUSEConnect-ng (bsc#1212799) * Fixes an issue with SSL root CA certificates. (bsc#1195220) * Detection of base products coming from SCC (bsc#1194989, bsc#1217317) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-101=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-101=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-101=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libsuseconnect-debuginfo-1.4.0~git0.b0f7c25bfdfa-3.3.8 * suseconnect-ruby-bindings-1.4.0~git0.b0f7c25bfdfa-3.3.8 * suseconnect-ng-1.4.0~git0.b0f7c25bfdfa-3.3.8 * suseconnect-ng-debuginfo-1.4.0~git0.b0f7c25bfdfa-3.3.8 * libsuseconnect-1.4.0~git0.b0f7c25bfdfa-3.3.8 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * yast2-registration-3.3.2-3.7.4 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libsuseconnect-debuginfo-1.4.0~git0.b0f7c25bfdfa-3.3.8 * suseconnect-ruby-bindings-1.4.0~git0.b0f7c25bfdfa-3.3.8 * suseconnect-ng-1.4.0~git0.b0f7c25bfdfa-3.3.8 * suseconnect-ng-debuginfo-1.4.0~git0.b0f7c25bfdfa-3.3.8 * libsuseconnect-1.4.0~git0.b0f7c25bfdfa-3.3.8 * SUSE Linux Enterprise Server 12 SP5 (noarch) * yast2-registration-3.3.2-3.7.4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libsuseconnect-debuginfo-1.4.0~git0.b0f7c25bfdfa-3.3.8 * suseconnect-ruby-bindings-1.4.0~git0.b0f7c25bfdfa-3.3.8 * suseconnect-ng-1.4.0~git0.b0f7c25bfdfa-3.3.8 * suseconnect-ng-debuginfo-1.4.0~git0.b0f7c25bfdfa-3.3.8 * libsuseconnect-1.4.0~git0.b0f7c25bfdfa-3.3.8 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * yast2-registration-3.3.2-3.7.4 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1161891 * https://bugzilla.suse.com/show_bug.cgi?id=1170267 * https://bugzilla.suse.com/show_bug.cgi?id=1174657 * https://bugzilla.suse.com/show_bug.cgi?id=1188646 * https://bugzilla.suse.com/show_bug.cgi?id=1194989 * https://bugzilla.suse.com/show_bug.cgi?id=1195003 * https://bugzilla.suse.com/show_bug.cgi?id=1195220 * https://bugzilla.suse.com/show_bug.cgi?id=1195729 * https://bugzilla.suse.com/show_bug.cgi?id=1196076 * https://bugzilla.suse.com/show_bug.cgi?id=1196326 * https://bugzilla.suse.com/show_bug.cgi?id=1197398 * https://bugzilla.suse.com/show_bug.cgi?id=1198625 * https://bugzilla.suse.com/show_bug.cgi?id=1200803 * https://bugzilla.suse.com/show_bug.cgi?id=1200994 * https://bugzilla.suse.com/show_bug.cgi?id=1202705 * https://bugzilla.suse.com/show_bug.cgi?id=1203341 * https://bugzilla.suse.com/show_bug.cgi?id=1204821 * https://bugzilla.suse.com/show_bug.cgi?id=1207876 * https://bugzilla.suse.com/show_bug.cgi?id=1211588 * https://bugzilla.suse.com/show_bug.cgi?id=1212799 * https://bugzilla.suse.com/show_bug.cgi?id=1214781 * https://bugzilla.suse.com/show_bug.cgi?id=1217317 * https://jira.suse.com/browse/PED-3179 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 15 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 15 Jan 2024 16:30:03 -0000 Subject: SUSE-RU-2024:0105-1: important: Recommended update for grub2 and efibootmgr Message-ID: <170533620305.16893.14406628335917828029@smelt2.prg2.suse.org> # Recommended update for grub2 and efibootmgr Announcement ID: SUSE-RU-2024:0105-1 Rating: important References: * bsc#1217237 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that has one fix can now be installed. ## Description: This update for grub2 and efibootmgr fixes the following issues: grub2: * Deliver missing grub2-arm64-efi and grub2-powerpc-ieee1275 to SUSE Manager 4.3 (no source changes) (bsc#1217237) efibootmgr: * Deliver missing efibootmgr to SUSE Manager 4.3 (no source changes) (bsc#1217237) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-105=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-105=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-105=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-105=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-105=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-105=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-105=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-105=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-105=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-105=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-105=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-105=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-105=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-105=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-105=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-105=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-105=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-105=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-105=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-105=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-105=1 ## Package List: * SUSE Manager Proxy 4.3 Module 4.3 (noarch) * grub2-arm64-efi-2.06-150400.11.43.2 * SUSE Manager Server 4.3 Module 4.3 (noarch) * grub2-arm64-efi-2.06-150400.11.43.2 * grub2-powerpc-ieee1275-2.06-150400.11.43.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * efibootmgr-debugsource-17-150400.3.2.2 * grub2-debugsource-2.06-150400.11.43.2 * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * efibootmgr-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * grub2-arm64-efi-2.06-150400.11.43.2 * grub2-systemd-sleep-plugin-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * efibootmgr-debugsource-17-150400.3.2.2 * grub2-debugsource-2.06-150400.11.43.2 * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * efibootmgr-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * grub2-arm64-efi-2.06-150400.11.43.2 * grub2-systemd-sleep-plugin-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * efibootmgr-debugsource-17-150400.3.2.2 * grub2-debugsource-2.06-150400.11.43.2 * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * efibootmgr-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * grub2-systemd-sleep-plugin-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * efibootmgr-debugsource-17-150400.3.2.2 * grub2-debugsource-2.06-150400.11.43.2 * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * efibootmgr-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * grub2-systemd-sleep-plugin-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64) * efibootmgr-17-150400.3.2.2 * efibootmgr-debugsource-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * grub2-arm64-efi-2.06-150400.11.43.2 * grub2-systemd-sleep-plugin-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-powerpc-ieee1275-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150400.11.43.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x) * grub2-s390x-emu-2.06-150400.11.43.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * grub2-systemd-sleep-plugin-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-powerpc-ieee1275-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * efibootmgr-17-150400.3.2.2 * efibootmgr-debugsource-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * grub2-debugsource-2.06-150400.11.43.2 * SUSE Manager Proxy 4.3 (x86_64) * efibootmgr-debugsource-17-150400.3.2.2 * grub2-debugsource-2.06-150400.11.43.2 * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * efibootmgr-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Manager Proxy 4.3 (noarch) * grub2-systemd-sleep-plugin-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * efibootmgr-debugsource-17-150400.3.2.2 * grub2-debugsource-2.06-150400.11.43.2 * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * efibootmgr-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * grub2-systemd-sleep-plugin-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * efibootmgr-debugsource-17-150400.3.2.2 * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * efibootmgr-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Manager Server 4.3 (noarch) * grub2-systemd-sleep-plugin-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-powerpc-ieee1275-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * SUSE Manager Server 4.3 (s390x x86_64) * grub2-debugsource-2.06-150400.11.43.2 * SUSE Manager Server 4.3 (s390x) * grub2-s390x-emu-2.06-150400.11.43.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * efibootmgr-debugsource-17-150400.3.2.2 * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * grub2-branding-upstream-2.06-150400.11.43.2 * efibootmgr-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * openSUSE Leap 15.4 (aarch64 s390x x86_64 i586) * grub2-debugsource-2.06-150400.11.43.2 * openSUSE Leap 15.4 (noarch) * grub2-i386-xen-2.06-150400.11.43.2 * grub2-x86_64-efi-debug-2.06-150400.11.43.2 * grub2-i386-efi-extras-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-powerpc-ieee1275-debug-2.06-150400.11.43.2 * grub2-arm64-efi-2.06-150400.11.43.2 * grub2-i386-xen-extras-2.06-150400.11.43.2 * grub2-x86_64-xen-extras-2.06-150400.11.43.2 * grub2-i386-pc-debug-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-powerpc-ieee1275-extras-2.06-150400.11.43.2 * grub2-s390x-emu-extras-2.06-150400.11.43.2 * grub2-systemd-sleep-plugin-2.06-150400.11.43.2 * grub2-i386-efi-2.06-150400.11.43.2 * grub2-arm64-efi-debug-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * grub2-i386-efi-debug-2.06-150400.11.43.2 * grub2-x86_64-efi-extras-2.06-150400.11.43.2 * grub2-i386-pc-extras-2.06-150400.11.43.2 * grub2-arm64-efi-extras-2.06-150400.11.43.2 * grub2-powerpc-ieee1275-2.06-150400.11.43.2 * openSUSE Leap 15.4 (s390x) * grub2-s390x-emu-debug-2.06-150400.11.43.2 * grub2-s390x-emu-2.06-150400.11.43.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * efibootmgr-debugsource-17-150400.3.2.2 * grub2-debugsource-2.06-150400.11.43.2 * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * efibootmgr-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * openSUSE Leap Micro 5.3 (noarch) * grub2-arm64-efi-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * openSUSE Leap Micro 5.4 (aarch64 x86_64) * efibootmgr-17-150400.3.2.2 * efibootmgr-debugsource-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * grub2-debugsource-2.06-150400.11.43.2 * openSUSE Leap Micro 5.4 (noarch) * grub2-arm64-efi-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * openSUSE Leap Micro 5.4 (s390x) * grub2-s390x-emu-2.06-150400.11.43.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * efibootmgr-17-150400.3.2.2 * efibootmgr-debugsource-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * efibootmgr-17-150400.3.2.2 * efibootmgr-debugsource-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * grub2-debugsource-2.06-150400.11.43.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * grub2-arm64-efi-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (s390x) * grub2-s390x-emu-2.06-150400.11.43.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * efibootmgr-17-150400.3.2.2 * efibootmgr-debugsource-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * grub2-debugsource-2.06-150400.11.43.2 * SUSE Linux Enterprise Micro 5.3 (noarch) * grub2-arm64-efi-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * SUSE Linux Enterprise Micro 5.3 (s390x) * grub2-s390x-emu-2.06-150400.11.43.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * efibootmgr-17-150400.3.2.2 * efibootmgr-debugsource-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * grub2-debugsource-2.06-150400.11.43.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * grub2-arm64-efi-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (s390x) * grub2-s390x-emu-2.06-150400.11.43.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * efibootmgr-17-150400.3.2.2 * efibootmgr-debugsource-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * grub2-2.06-150400.11.43.2 * grub2-debuginfo-2.06-150400.11.43.2 * grub2-debugsource-2.06-150400.11.43.2 * SUSE Linux Enterprise Micro 5.4 (noarch) * grub2-arm64-efi-2.06-150400.11.43.2 * grub2-x86_64-efi-2.06-150400.11.43.2 * grub2-i386-pc-2.06-150400.11.43.2 * grub2-snapper-plugin-2.06-150400.11.43.2 * grub2-x86_64-xen-2.06-150400.11.43.2 * SUSE Linux Enterprise Micro 5.4 (s390x) * grub2-s390x-emu-2.06-150400.11.43.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * efibootmgr-17-150400.3.2.2 * efibootmgr-debugsource-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 * Basesystem Module 15-SP5 (aarch64 x86_64) * efibootmgr-17-150400.3.2.2 * efibootmgr-debugsource-17-150400.3.2.2 * efibootmgr-debuginfo-17-150400.3.2.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217237 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 15 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 15 Jan 2024 16:30:04 -0000 Subject: SUSE-OU-2024:0104-1: low: Recommended update for python3-pyqt-rpm-macros Message-ID: <170533620489.16893.15612748260609199968@smelt2.prg2.suse.org> # Recommended update for python3-pyqt-rpm-macros Announcement ID: SUSE-OU-2024:0104-1 Rating: low References: * jsc#PED-68 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 An update that contains one feature can now be installed. ## Description: This update for python3-pyqt-rpm-macros fixes the following issues: * Don't use python_module for Recommends. * Add a conflict with python-pyqt-rpm-macros so the python3-pyqt-rpm-macros renamed package that recommends the python3-sip-devel package doesn't have a file conflict with the python-pyqt-rpm-macros that recommends the python311-sip-devel package (related to jsc#PED-68). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-104=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-104=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python3-pyqt-rpm-macros-0.1-150400.9.6.2 * openSUSE Leap 15.5 (noarch) * python3-pyqt-rpm-macros-0.1-150400.9.6.2 ## References: * https://jira.suse.com/browse/PED-68 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 15 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 15 Jan 2024 16:30:06 -0000 Subject: SUSE-SU-2024:0103-1: low: Security update for rubygem-actionpack-5_1 Message-ID: <170533620676.16893.15690659163136833462@smelt2.prg2.suse.org> # Security update for rubygem-actionpack-5_1 Announcement ID: SUSE-SU-2024:0103-1 Rating: low References: * bsc#1172182 * bsc#1215707 Cross-References: * CVE-2020-8166 CVSS scores: * CVE-2020-8166 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2020-8166 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP1 * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for rubygem-actionpack-5_1 fixes the following issues: * CVE-2020-8166: Fixed ability to forge per-form CSRF tokens given a global CSRF (bsc#1172182). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-103=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-103=1 * SUSE Linux Enterprise High Availability Extension 15 SP1 zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2024-103=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-103=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-103=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-103=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-103=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-150000.3.29.1 * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-150000.3.29.1 * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 * SUSE Linux Enterprise High Availability Extension 15 SP1 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 ## References: * https://www.suse.com/security/cve/CVE-2020-8166.html * https://bugzilla.suse.com/show_bug.cgi?id=1172182 * https://bugzilla.suse.com/show_bug.cgi?id=1215707 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 15 20:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 15 Jan 2024 20:30:03 -0000 Subject: SUSE-SU-2024:0106-1: important: Security update for postgresql, postgresql15, postgresql16 Message-ID: <170535060351.27839.14685521722880198649@smelt2.prg2.suse.org> # Security update for postgresql, postgresql15, postgresql16 Announcement ID: SUSE-SU-2024:0106-1 Rating: important References: * bsc#1122892 * bsc#1179231 * bsc#1206796 * bsc#1209208 * bsc#1216022 * bsc#1216734 * bsc#1216960 * bsc#1216961 * bsc#1216962 * jsc#PED-5586 Cross-References: * CVE-2023-5868 * CVE-2023-5869 * CVE-2023-5870 CVSS scores: * CVE-2023-5868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-5868 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-5869 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5869 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5870 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-5870 ( NVD ): 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Legacy Module 15-SP4 * Legacy Module 15-SP5 * Server Applications Module 15-SP4 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 An update that solves three vulnerabilities, contains one feature and has six security fixes can now be installed. ## Description: This update for postgresql, postgresql15, postgresql16 fixes the following issues: This update ships postgresql 16. Security issues fixed: * CVE-2023-5868: Fix handling of unknown-type arguments in DISTINCT "any" aggregate functions. This error led to a text-type value being interpreted as an unknown-type value (that is, a zero-terminated string) at runtime. This could result in disclosure of server memory following the text value. (bsc#1216962) * CVE-2023-5869: Detect integer overflow while computing new array dimensions. When assigning new elements to array subscripts that are outside the current array bounds, an undetected integer overflow could occur in edge cases. Memory stomps that are potentially exploitable for arbitrary code execution are possible, and so is disclosure of server memory. (bsc#1216961) * CVE-2023-5870: Prevent the pg_signal_backend role from signalling background workers and autovacuum processes. The documentation says that pg_signal_backend cannot issue signals to superuser-owned processes. It was able to signal these background processes, though, because they advertise a role OID of zero. Treat that as indicating superuser ownership. The security implications of cancelling one of these process types are fairly small so far as the core code goes (we'll just start another one), but extensions might add background workers that are more vulnerable. Also ensure that the is_superuser parameter is set correctly in such processes. No specific security consequences are known for that oversight, but it might be significant for some extensions. (bsc#1216960) Changes in postgresql16: * Upgrade to 16.1: * https://www.postgresql.org/about/news/2715 * https://www.postgresql.org/docs/16/release-16.html * https://www.postgresql.org/docs/16/release-16-1.html * Overhaul postgresql-README.SUSE and move it from the binary package to the noarch wrapper package. * Change the unix domain socket location from /var/run to /run. Changes in postgresql15: * Update to 15.5 https://www.postgresql.org/docs/15/release-15-5.html * The libs and mini package are now provided by postgresql16. * Overhaul postgresql-README.SUSE and move it from the binary package to the noarch wrapper package. * Change the unix domain socket location from /var/run to /run. Changes in postgresql: * Interlock version and release of all noarch packages except for the postgresql-docs. * bsc#1122892: Add a sysconfig variable for initdb. * Overhaul postgresql-README.SUSE and move it from the binary package to the noarch wrapper package. * bsc#1179231: Add an explanation for the /tmp -> /run/postgresql move and permission change. * Add postgresql-README as a separate source file. * bsc#1209208: Drop hard dependency on systemd * bsc#1206796: Refine the distinction of where to use sysusers and use bcond to have the expression only in one place. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-106=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-106=1 * Legacy Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP4-2024-106=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-106=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-106=1 * Server Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2024-106=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-106=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-106=1 ## Package List: * Basesystem Module 15-SP4 (x86_64) * postgresql16-debugsource-16.1-150200.5.7.1 * postgresql15-debugsource-15.5-150200.5.19.1 * libpq5-16.1-150200.5.7.1 * libpq5-32bit-debuginfo-16.1-150200.5.7.1 * postgresql16-16.1-150200.5.7.1 * libpq5-32bit-16.1-150200.5.7.1 * libpq5-debuginfo-16.1-150200.5.7.1 * postgresql15-15.5-150200.5.19.1 * postgresql15-debuginfo-15.5-150200.5.19.1 * postgresql16-debuginfo-16.1-150200.5.7.1 * Basesystem Module 15-SP4 (noarch) * postgresql-16-150400.4.9.2 * Basesystem Module 15-SP5 (x86_64) * postgresql16-debugsource-16.1-150200.5.7.1 * postgresql15-debugsource-15.5-150200.5.19.1 * libpq5-16.1-150200.5.7.1 * libpq5-32bit-debuginfo-16.1-150200.5.7.1 * postgresql16-16.1-150200.5.7.1 * libpq5-32bit-16.1-150200.5.7.1 * libpq5-debuginfo-16.1-150200.5.7.1 * postgresql15-15.5-150200.5.19.1 * postgresql15-debuginfo-15.5-150200.5.19.1 * postgresql16-debuginfo-16.1-150200.5.7.1 * Basesystem Module 15-SP5 (noarch) * postgresql-16-150500.10.3.2 * Legacy Module 15-SP4 (noarch) * postgresql-llvmjit-16-150400.4.9.2 * postgresql-llvmjit-devel-16-150400.4.9.2 * Legacy Module 15-SP5 (noarch) * postgresql-llvmjit-devel-16-150500.10.3.2 * postgresql-llvmjit-16-150500.10.3.2 * SUSE Package Hub 15 15-SP4 (noarch) * postgresql-16-150400.4.9.2 * postgresql-docs-16-150400.4.9.2 * postgresql-pltcl-16-150400.4.9.2 * postgresql-plperl-16-150400.4.9.2 * postgresql-plpython-16-150400.4.9.2 * postgresql-server-16-150400.4.9.2 * postgresql-test-16-150400.4.9.2 * postgresql-llvmjit-devel-16-150400.4.9.2 * postgresql-llvmjit-16-150400.4.9.2 * postgresql-contrib-16-150400.4.9.2 * postgresql-devel-16-150400.4.9.2 * postgresql-server-devel-16-150400.4.9.2 * SUSE Package Hub 15 15-SP4 (x86_64) * postgresql15-llvmjit-debuginfo-15.5-150200.5.19.1 * postgresql16-llvmjit-debuginfo-16.1-150200.5.7.1 * postgresql16-llvmjit-16.1-150200.5.7.1 * postgresql15-llvmjit-15.5-150200.5.19.1 * postgresql15-llvmjit-devel-15.5-150200.5.19.1 * postgresql16-llvmjit-devel-16.1-150200.5.7.1 * postgresql16-test-16.1-150200.5.7.1 * postgresql15-test-15.5-150200.5.19.1 * Server Applications Module 15-SP4 (x86_64) * postgresql16-debugsource-16.1-150200.5.7.1 * postgresql15-devel-15.5-150200.5.19.1 * postgresql15-pltcl-debuginfo-15.5-150200.5.19.1 * postgresql15-debugsource-15.5-150200.5.19.1 * postgresql16-plpython-debuginfo-16.1-150200.5.7.1 * postgresql16-pltcl-16.1-150200.5.7.1 * postgresql16-devel-16.1-150200.5.7.1 * postgresql16-pltcl-debuginfo-16.1-150200.5.7.1 * postgresql16-devel-debuginfo-16.1-150200.5.7.1 * postgresql15-devel-debuginfo-15.5-150200.5.19.1 * libecpg6-debuginfo-16.1-150200.5.7.1 * postgresql16-plperl-16.1-150200.5.7.1 * postgresql16-contrib-debuginfo-16.1-150200.5.7.1 * postgresql16-server-devel-debuginfo-16.1-150200.5.7.1 * postgresql15-contrib-15.5-150200.5.19.1 * postgresql16-debuginfo-16.1-150200.5.7.1 * postgresql16-plpython-16.1-150200.5.7.1 * postgresql16-server-16.1-150200.5.7.1 * postgresql16-server-devel-16.1-150200.5.7.1 * postgresql15-plpython-debuginfo-15.5-150200.5.19.1 * libecpg6-16.1-150200.5.7.1 * postgresql15-contrib-debuginfo-15.5-150200.5.19.1 * postgresql15-server-debuginfo-15.5-150200.5.19.1 * postgresql16-contrib-16.1-150200.5.7.1 * postgresql15-plperl-debuginfo-15.5-150200.5.19.1 * postgresql15-debuginfo-15.5-150200.5.19.1 * postgresql16-plperl-debuginfo-16.1-150200.5.7.1 * postgresql16-server-debuginfo-16.1-150200.5.7.1 * postgresql15-plpython-15.5-150200.5.19.1 * postgresql15-server-devel-15.5-150200.5.19.1 * postgresql15-server-devel-debuginfo-15.5-150200.5.19.1 * postgresql15-pltcl-15.5-150200.5.19.1 * postgresql15-plperl-15.5-150200.5.19.1 * postgresql15-server-15.5-150200.5.19.1 * Server Applications Module 15-SP4 (noarch) * postgresql-docs-16-150400.4.9.2 * postgresql-pltcl-16-150400.4.9.2 * postgresql-plperl-16-150400.4.9.2 * postgresql15-docs-15.5-150200.5.19.1 * postgresql16-docs-16.1-150200.5.7.1 * postgresql-plpython-16-150400.4.9.2 * postgresql-server-16-150400.4.9.2 * postgresql-contrib-16-150400.4.9.2 * postgresql-devel-16-150400.4.9.2 * postgresql-server-devel-16-150400.4.9.2 * Server Applications Module 15-SP5 (x86_64) * postgresql16-debugsource-16.1-150200.5.7.1 * postgresql15-devel-15.5-150200.5.19.1 * postgresql15-pltcl-debuginfo-15.5-150200.5.19.1 * postgresql15-debugsource-15.5-150200.5.19.1 * postgresql16-plpython-debuginfo-16.1-150200.5.7.1 * postgresql16-pltcl-16.1-150200.5.7.1 * postgresql16-devel-16.1-150200.5.7.1 * postgresql16-pltcl-debuginfo-16.1-150200.5.7.1 * postgresql16-devel-debuginfo-16.1-150200.5.7.1 * postgresql15-devel-debuginfo-15.5-150200.5.19.1 * libecpg6-debuginfo-16.1-150200.5.7.1 * postgresql16-plperl-16.1-150200.5.7.1 * postgresql16-contrib-debuginfo-16.1-150200.5.7.1 * postgresql16-server-devel-debuginfo-16.1-150200.5.7.1 * postgresql15-contrib-15.5-150200.5.19.1 * postgresql16-debuginfo-16.1-150200.5.7.1 * postgresql16-plpython-16.1-150200.5.7.1 * postgresql16-server-16.1-150200.5.7.1 * postgresql16-server-devel-16.1-150200.5.7.1 * postgresql15-plpython-debuginfo-15.5-150200.5.19.1 * libecpg6-16.1-150200.5.7.1 * postgresql15-contrib-debuginfo-15.5-150200.5.19.1 * postgresql15-server-debuginfo-15.5-150200.5.19.1 * postgresql16-contrib-16.1-150200.5.7.1 * postgresql15-plperl-debuginfo-15.5-150200.5.19.1 * postgresql15-debuginfo-15.5-150200.5.19.1 * postgresql16-plperl-debuginfo-16.1-150200.5.7.1 * postgresql16-server-debuginfo-16.1-150200.5.7.1 * postgresql15-plpython-15.5-150200.5.19.1 * postgresql15-server-devel-15.5-150200.5.19.1 * postgresql15-server-devel-debuginfo-15.5-150200.5.19.1 * postgresql15-pltcl-15.5-150200.5.19.1 * postgresql15-plperl-15.5-150200.5.19.1 * postgresql15-server-15.5-150200.5.19.1 * Server Applications Module 15-SP5 (noarch) * postgresql-contrib-16-150500.10.3.2 * postgresql-pltcl-16-150500.10.3.2 * postgresql15-docs-15.5-150200.5.19.1 * postgresql16-docs-16.1-150200.5.7.1 * postgresql-docs-16-150500.10.3.2 * postgresql-server-devel-16-150500.10.3.2 * postgresql-server-16-150500.10.3.2 * postgresql-plpython-16-150500.10.3.2 * postgresql-plperl-16-150500.10.3.2 * postgresql-devel-16-150500.10.3.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * postgresql16-debugsource-16.1-150200.5.7.1 * postgresql15-devel-15.5-150200.5.19.1 * postgresql15-pltcl-debuginfo-15.5-150200.5.19.1 * postgresql15-debugsource-15.5-150200.5.19.1 * postgresql15-devel-debuginfo-15.5-150200.5.19.1 * libecpg6-debuginfo-16.1-150200.5.7.1 * postgresql15-contrib-15.5-150200.5.19.1 * postgresql16-debuginfo-16.1-150200.5.7.1 * postgresql15-plpython-debuginfo-15.5-150200.5.19.1 * libecpg6-16.1-150200.5.7.1 * postgresql15-contrib-debuginfo-15.5-150200.5.19.1 * libpq5-16.1-150200.5.7.1 * postgresql15-server-debuginfo-15.5-150200.5.19.1 * postgresql15-plperl-debuginfo-15.5-150200.5.19.1 * postgresql15-debuginfo-15.5-150200.5.19.1 * libpq5-debuginfo-16.1-150200.5.7.1 * postgresql15-15.5-150200.5.19.1 * postgresql15-plpython-15.5-150200.5.19.1 * postgresql15-server-devel-15.5-150200.5.19.1 * postgresql15-server-devel-debuginfo-15.5-150200.5.19.1 * postgresql15-pltcl-15.5-150200.5.19.1 * postgresql15-plperl-15.5-150200.5.19.1 * postgresql15-server-15.5-150200.5.19.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * postgresql-contrib-16-150300.10.18.3 * postgresql-plpython-16-150300.10.18.3 * postgresql-server-16-150300.10.18.3 * postgresql-docs-16-150300.10.18.3 * postgresql-plperl-16-150300.10.18.3 * postgresql15-docs-15.5-150200.5.19.1 * postgresql-pltcl-16-150300.10.18.3 * postgresql-server-devel-16-150300.10.18.3 * postgresql-16-150300.10.18.3 * postgresql-devel-16-150300.10.18.3 ## References: * https://www.suse.com/security/cve/CVE-2023-5868.html * https://www.suse.com/security/cve/CVE-2023-5869.html * https://www.suse.com/security/cve/CVE-2023-5870.html * https://bugzilla.suse.com/show_bug.cgi?id=1122892 * https://bugzilla.suse.com/show_bug.cgi?id=1179231 * https://bugzilla.suse.com/show_bug.cgi?id=1206796 * https://bugzilla.suse.com/show_bug.cgi?id=1209208 * https://bugzilla.suse.com/show_bug.cgi?id=1216022 * https://bugzilla.suse.com/show_bug.cgi?id=1216734 * https://bugzilla.suse.com/show_bug.cgi?id=1216960 * https://bugzilla.suse.com/show_bug.cgi?id=1216961 * https://bugzilla.suse.com/show_bug.cgi?id=1216962 * https://jira.suse.com/browse/PED-5586 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 16 Jan 2024 08:30:02 -0000 Subject: SUSE-RU-2024:0107-1: low: Recommended update for release-notes-sles Message-ID: <170539380256.3170.1010657612544261630@smelt2.prg2.suse.org> # Recommended update for release-notes-sles Announcement ID: SUSE-RU-2024:0107-1 Rating: low References: * bsc#1211550 * bsc#933411 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for release-notes-sles fixes the following issues: * Minor version update to 15.5.20231213 (bsc#933411) * Added note about vncserver removal (bsc#1211550) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-107=1 openSUSE-SLE-15.5-2024-107=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-107=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-107=1 SUSE-SLE-Product- SLES-15-SP5-2024-107=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-107=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-107=1 ## Package List: * openSUSE Leap 15.5 (noarch) * release-notes-sles-15.5.20231213-150500.3.12.1 * SUSE Linux Enterprise High Performance Computing 15 SP5 (noarch) * release-notes-sles-15.5.20231213-150500.3.12.1 * SUSE Linux Enterprise Server 15 SP5 (noarch) * release-notes-sles-15.5.20231213-150500.3.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * release-notes-sles-15.5.20231213-150500.3.12.1 * SUSE Linux Enterprise Desktop 15 SP5 (noarch) * release-notes-sles-15.5.20231213-150500.3.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1211550 * https://bugzilla.suse.com/show_bug.cgi?id=933411 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 16:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 16 Jan 2024 16:30:11 -0000 Subject: SUSE-SU-2024:0129-1: important: Security update for the Linux Kernel Message-ID: <170542261110.7395.6767231271763343808@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0129-1 Rating: important References: * bsc#1179610 * bsc#1183045 * bsc#1193285 * bsc#1211162 * bsc#1211226 * bsc#1212584 * bsc#1214747 * bsc#1214823 * bsc#1215237 * bsc#1215696 * bsc#1215885 * bsc#1216057 * bsc#1216559 * bsc#1216776 * bsc#1217036 * bsc#1217217 * bsc#1217250 * bsc#1217602 * bsc#1217692 * bsc#1217790 * bsc#1217801 * bsc#1217933 * bsc#1217938 * bsc#1217946 * bsc#1217947 * bsc#1217980 * bsc#1217981 * bsc#1217982 * bsc#1218056 * bsc#1218139 * bsc#1218184 * bsc#1218234 * bsc#1218253 * bsc#1218258 * bsc#1218335 * bsc#1218357 * bsc#1218447 * bsc#1218515 * bsc#1218559 * bsc#1218569 * bsc#1218659 * jsc#PED-3459 * jsc#PED-5021 * jsc#PED-7322 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6531 * CVE-2023-6546 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6622 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Real Time Module 15-SP4 An update that solves 10 vulnerabilities, contains three features and has 31 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on (bsc#1218447). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). * CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938). * CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250). The following non-security bugs were fixed: * Reviewed and added more information to README.SUSE (jsc#PED-5021). * Build in the correct KOTD repository with multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184) With multibuild setting repository flags is no longer supported for individual spec files - see https://github.com/openSUSE/open-build-service/issues/3574 Add ExclusiveArch conditional that depends on a macro set up by bs-upload-kernel instead. With that each package should build only in one repository - either standard or QA. Note: bs-upload-kernel does not interpret rpm conditionals, and only uses the first ExclusiveArch line to determine the architectures to enable. * KVM: s390/mm: Properly reset no-dat (bsc#1218056). * KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217933). * KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322). * NFS: Fix O_DIRECT locking issues (bsc#1211162). * NFS: Fix a few more clear_bit() instances that need release semantics (bsc#1211162). * NFS: Fix a potential data corruption (bsc#1211162). * NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162). * NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162). * NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162). * NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162). * NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162). * NLM: Defend against file_lock changes after vfs_test_lock() (bsc#1217692). * Updated SPI patches for NVIDIA Grace enablement (bsc#1212584, jsc#PED-3459). * block: fix revalidate performance regression (bsc#1216057). * bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980). * ceph: fix type promotion bug on 32bit systems (bsc#1217982). * clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217). * clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217). * clocksource: Handle negative skews in "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217). * clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217). * clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217). * clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217). * dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659). * kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes, as used only locally for asus-wmi stuff * libceph: use kernel_connect() (bsc#1217981). * mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files. * mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515). * net/smc: Fix pos miscalculation in statistics (bsc#1218139). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162). * remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569). * s390/vx: fix save/restore of fpu kernel context (bsc#1218357). * scsi: lpfc: use unsigned type for num_sge (bsc#1214747). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix slot alignment checks (bsc#1216559). * tracing: Disable preemption when using the filter buffer (bsc#1217036). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036). * tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036). * uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978). * vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602). * x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285). * x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790). * x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217). * x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217). * x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Real Time Module 15-SP4 zypper in -t patch SUSE-SLE-Module-RT-15-SP4-2024-129=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-129=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-129=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-129=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-129=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-129=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-129=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-129=1 ## Package List: * SUSE Real Time Module 15-SP4 (x86_64) * kernel-rt-devel-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt_debug-debuginfo-5.14.21-150400.15.65.1 * gfs2-kmp-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt_debug-devel-5.14.21-150400.15.65.1 * cluster-md-kmp-rt-5.14.21-150400.15.65.1 * dlm-kmp-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-devel-5.14.21-150400.15.65.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.65.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-syms-rt-5.14.21-150400.15.65.1 * ocfs2-kmp-rt-5.14.21-150400.15.65.1 * dlm-kmp-rt-5.14.21-150400.15.65.1 * kernel-rt_debug-debugsource-5.14.21-150400.15.65.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * gfs2-kmp-rt-5.14.21-150400.15.65.1 * SUSE Real Time Module 15-SP4 (noarch) * kernel-devel-rt-5.14.21-150400.15.65.1 * kernel-source-rt-5.14.21-150400.15.65.1 * SUSE Real Time Module 15-SP4 (nosrc x86_64) * kernel-rt_debug-5.14.21-150400.15.65.1 * kernel-rt-5.14.21-150400.15.65.1 * openSUSE Leap Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * openSUSE Leap Micro 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * openSUSE Leap Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * openSUSE Leap Micro 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Live Patching 15-SP4 (x86_64) * kernel-livepatch-SLE15-SP4-RT_Update_17-debugsource-1-150400.1.3.1 * kernel-livepatch-5_14_21-150400_15_65-rt-debuginfo-1-150400.1.3.1 * kernel-livepatch-5_14_21-150400_15_65-rt-1-150400.1.3.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6622.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1193285 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212584 * https://bugzilla.suse.com/show_bug.cgi?id=1214747 * https://bugzilla.suse.com/show_bug.cgi?id=1214823 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1216057 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217602 * https://bugzilla.suse.com/show_bug.cgi?id=1217692 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217933 * https://bugzilla.suse.com/show_bug.cgi?id=1217938 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1217980 * https://bugzilla.suse.com/show_bug.cgi?id=1217981 * https://bugzilla.suse.com/show_bug.cgi?id=1217982 * https://bugzilla.suse.com/show_bug.cgi?id=1218056 * https://bugzilla.suse.com/show_bug.cgi?id=1218139 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218335 * https://bugzilla.suse.com/show_bug.cgi?id=1218357 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218515 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218569 * https://bugzilla.suse.com/show_bug.cgi?id=1218659 * https://jira.suse.com/browse/PED-3459 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-7322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 16 Jan 2024 16:30:14 -0000 Subject: SUSE-SU-2024:0120-1: important: Security update for the Linux Kernel Message-ID: <170542261490.7395.2961390868396787152@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0120-1 Rating: important References: * bsc#1179610 * bsc#1202095 * bsc#1215237 * bsc#1217250 * bsc#1217946 * bsc#1217947 * bsc#1218253 * bsc#1218258 * bsc#1218559 * jsc#PED-5021 Cross-References: * CVE-2020-26555 * CVE-2022-2586 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2022-2586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE CaaS Platform 4.0 * SUSE Linux Enterprise High Availability Extension 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Live Patching 15-SP1 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Manager Proxy 4.0 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Server 4.0 An update that solves eight vulnerabilities, contains one feature and has one security fix can now be installed. ## Description: The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). * CVE-2023-6606: Fixed an out-of-bounds read vulnerability in smbCalcSize in fs/smb/client/netmisc.c that could allow a local attacker to crash the system or leak internal kernel information (bsc#1217947). * CVE-2023-6610: Fixed an out-of-bounds read vulnerability in smb2_dump_detail in fs/smb/client/smb2ops.c that could allow a local attacker to crash the system or leak internal kernel information (bsc#1217946). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). The following non-security bugs were fixed: * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP1 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2024-120=1 * SUSE Linux Enterprise High Availability Extension 15 SP1 zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2024-120=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-120=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-120=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-120=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE Linux Enterprise Live Patching 15-SP1 (nosrc) * kernel-default-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Live Patching 15-SP1 (ppc64le x86_64) * kernel-livepatch-4_12_14-150100_197_168-default-1-150100.3.3.1 * kernel-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-debugsource-4.12.14-150100.197.168.1 * kernel-default-livepatch-4.12.14-150100.197.168.1 * kernel-default-livepatch-devel-4.12.14-150100.197.168.1 * SUSE Linux Enterprise High Availability Extension 15 SP1 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-4.12.14-150100.197.168.1 * kernel-default-debuginfo-4.12.14-150100.197.168.1 * cluster-md-kmp-default-debuginfo-4.12.14-150100.197.168.1 * cluster-md-kmp-default-4.12.14-150100.197.168.1 * kernel-default-debugsource-4.12.14-150100.197.168.1 * ocfs2-kmp-default-4.12.14-150100.197.168.1 * dlm-kmp-default-debuginfo-4.12.14-150100.197.168.1 * gfs2-kmp-default-4.12.14-150100.197.168.1 * gfs2-kmp-default-debuginfo-4.12.14-150100.197.168.1 * ocfs2-kmp-default-debuginfo-4.12.14-150100.197.168.1 * SUSE Linux Enterprise High Availability Extension 15 SP1 (nosrc) * kernel-default-4.12.14-150100.197.168.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 nosrc x86_64) * kernel-default-4.12.14-150100.197.168.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * kernel-obs-build-4.12.14-150100.197.168.1 * kernel-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-debuginfo-4.12.14-150100.197.168.1 * kernel-default-debugsource-4.12.14-150100.197.168.1 * kernel-default-devel-4.12.14-150100.197.168.1 * kernel-default-base-4.12.14-150100.197.168.1 * kernel-default-base-debuginfo-4.12.14-150100.197.168.1 * kernel-obs-build-debugsource-4.12.14-150100.197.168.1 * kernel-syms-4.12.14-150100.197.168.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * kernel-source-4.12.14-150100.197.168.1 * kernel-macros-4.12.14-150100.197.168.1 * kernel-devel-4.12.14-150100.197.168.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch nosrc) * kernel-docs-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-4.12.14-150100.197.168.1 * kernel-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-debuginfo-4.12.14-150100.197.168.1 * kernel-default-debugsource-4.12.14-150100.197.168.1 * reiserfs-kmp-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-4.12.14-150100.197.168.1 * reiserfs-kmp-default-4.12.14-150100.197.168.1 * kernel-default-base-4.12.14-150100.197.168.1 * kernel-default-base-debuginfo-4.12.14-150100.197.168.1 * kernel-obs-build-debugsource-4.12.14-150100.197.168.1 * kernel-syms-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * kernel-source-4.12.14-150100.197.168.1 * kernel-macros-4.12.14-150100.197.168.1 * kernel-devel-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch nosrc) * kernel-docs-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (s390x) * kernel-zfcpdump-debuginfo-4.12.14-150100.197.168.1 * kernel-zfcpdump-debugsource-4.12.14-150100.197.168.1 * kernel-default-man-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (nosrc) * kernel-zfcpdump-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (nosrc ppc64le x86_64) * kernel-default-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * kernel-obs-build-4.12.14-150100.197.168.1 * kernel-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-debuginfo-4.12.14-150100.197.168.1 * kernel-default-debugsource-4.12.14-150100.197.168.1 * reiserfs-kmp-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-4.12.14-150100.197.168.1 * reiserfs-kmp-default-4.12.14-150100.197.168.1 * kernel-default-base-4.12.14-150100.197.168.1 * kernel-default-base-debuginfo-4.12.14-150100.197.168.1 * kernel-obs-build-debugsource-4.12.14-150100.197.168.1 * kernel-syms-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * kernel-source-4.12.14-150100.197.168.1 * kernel-macros-4.12.14-150100.197.168.1 * kernel-devel-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch nosrc) * kernel-docs-4.12.14-150100.197.168.1 * SUSE CaaS Platform 4.0 (nosrc x86_64) * kernel-default-4.12.14-150100.197.168.1 * SUSE CaaS Platform 4.0 (x86_64) * kernel-obs-build-4.12.14-150100.197.168.1 * kernel-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-debuginfo-4.12.14-150100.197.168.1 * kernel-default-debugsource-4.12.14-150100.197.168.1 * reiserfs-kmp-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-4.12.14-150100.197.168.1 * reiserfs-kmp-default-4.12.14-150100.197.168.1 * kernel-default-base-4.12.14-150100.197.168.1 * kernel-default-base-debuginfo-4.12.14-150100.197.168.1 * kernel-obs-build-debugsource-4.12.14-150100.197.168.1 * kernel-syms-4.12.14-150100.197.168.1 * SUSE CaaS Platform 4.0 (noarch) * kernel-source-4.12.14-150100.197.168.1 * kernel-macros-4.12.14-150100.197.168.1 * kernel-devel-4.12.14-150100.197.168.1 * SUSE CaaS Platform 4.0 (noarch nosrc) * kernel-docs-4.12.14-150100.197.168.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2022-2586.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1202095 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://jira.suse.com/browse/PED-5021 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 16:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 16 Jan 2024 16:30:20 -0000 Subject: SUSE-SU-2024:0117-1: important: Security update for the Linux Kernel Message-ID: <170542262026.7395.18333491841002161716@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0117-1 Rating: important References: * bsc#1109837 * bsc#1179610 * bsc#1202095 * bsc#1211226 * bsc#1211439 * bsc#1214158 * bsc#1214479 * bsc#1215237 * bsc#1217036 * bsc#1217250 * bsc#1217801 * bsc#1217936 * bsc#1217946 * bsc#1217947 * bsc#1218057 * bsc#1218184 * bsc#1218253 * bsc#1218258 * bsc#1218362 * bsc#1218559 * bsc#1218622 * jsc#PED-5021 * jsc#PED-5023 Cross-References: * CVE-2020-26555 * CVE-2022-2586 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2022-2586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves eight vulnerabilities, contains two features and has 13 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095). * CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1214158 bsc#1218258). * CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253). * CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237). * CVE-2023-51779: Fixed a use-after-free issue due to a race condition during Bluetooth message reception (bsc#1218559). The following non-security bugs were fixed: * Enabled the LLC counters for ?perf? (perf stat) on the Ice-Lake and Rocket- Lake CPUs (jsc#PED-5023 bsc#1211439). * Reviewed and added more information to README.SUSE (jsc#PED-5021). * Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184). * Fix termination state for idr_for_each_entry_ul() (bsc#1109837). * KVM: s390/mm: Properly reset no-dat (bsc#1218057). * KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217936). * PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1218622). * gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479). * gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479). * gve: Changes to add new TX queues (bsc#1214479). * gve: Control path for DQO-QPL (bsc#1214479). * gve: Do not fully free QPL pages on prefill errors (bsc#1214479). * gve: Fix gve interrupt names (bsc#1214479). * gve: Fixes for napi_poll when budget is 0 (bsc#1214479). * gve: RX path for DQO-QPL (bsc#1214479). * gve: Set default duplex configuration to full (bsc#1214479). * gve: Tx path for DQO-QPL (bsc#1214479). * gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479). * gve: XDP support GQI-QPL: helper function changes (bsc#1214479). * gve: fix frag_list chaining (bsc#1214479). * gve: trivial spell fix Recive to Receive (bsc#1214479). * gve: unify driver name usage (bsc#1214479). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1217801). * s390/vx: fix save/restore of fpu kernel context (bsc#1218362). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-117=1 SUSE-SLE- SERVER-12-SP5-2024-117=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-117=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-117=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-117=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-117=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-117=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-117=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * cluster-md-kmp-default-debuginfo-4.12.14-122.189.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.189.1 * kernel-default-debugsource-4.12.14-122.189.1 * kernel-syms-4.12.14-122.189.1 * kernel-default-base-debuginfo-4.12.14-122.189.1 * gfs2-kmp-default-4.12.14-122.189.1 * dlm-kmp-default-4.12.14-122.189.1 * gfs2-kmp-default-debuginfo-4.12.14-122.189.1 * kernel-default-devel-4.12.14-122.189.1 * dlm-kmp-default-debuginfo-4.12.14-122.189.1 * ocfs2-kmp-default-4.12.14-122.189.1 * kernel-default-base-4.12.14-122.189.1 * kernel-default-debuginfo-4.12.14-122.189.1 * cluster-md-kmp-default-4.12.14-122.189.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le x86_64) * kernel-default-4.12.14-122.189.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-devel-4.12.14-122.189.1 * kernel-source-4.12.14-122.189.1 * kernel-macros-4.12.14-122.189.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.189.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-4.12.14-122.189.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.189.1 * kernel-default-debugsource-4.12.14-122.189.1 * gfs2-kmp-default-4.12.14-122.189.1 * dlm-kmp-default-4.12.14-122.189.1 * gfs2-kmp-default-debuginfo-4.12.14-122.189.1 * dlm-kmp-default-debuginfo-4.12.14-122.189.1 * ocfs2-kmp-default-4.12.14-122.189.1 * kernel-default-debuginfo-4.12.14-122.189.1 * cluster-md-kmp-default-4.12.14-122.189.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc) * kernel-default-4.12.14-122.189.1 * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc) * kernel-default-4.12.14-122.189.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kernel-default-debugsource-4.12.14-122.189.1 * kernel-default-kgraft-devel-4.12.14-122.189.1 * kgraft-patch-4_12_14-122_189-default-1-8.3.1 * kernel-default-debuginfo-4.12.14-122.189.1 * kernel-default-kgraft-4.12.14-122.189.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch nosrc) * kernel-docs-4.12.14-122.189.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-4.12.14-122.189.1 * kernel-obs-build-4.12.14-122.189.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 nosrc x86_64) * kernel-default-4.12.14-122.189.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * kernel-default-debugsource-4.12.14-122.189.1 * kernel-default-base-debuginfo-4.12.14-122.189.1 * kernel-default-devel-4.12.14-122.189.1 * kernel-default-base-4.12.14-122.189.1 * kernel-default-debuginfo-4.12.14-122.189.1 * kernel-syms-4.12.14-122.189.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-devel-4.12.14-122.189.1 * kernel-source-4.12.14-122.189.1 * kernel-macros-4.12.14-122.189.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.189.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-122.189.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-4.12.14-122.189.1 * kernel-default-base-debuginfo-4.12.14-122.189.1 * kernel-default-devel-4.12.14-122.189.1 * kernel-default-base-4.12.14-122.189.1 * kernel-default-debuginfo-4.12.14-122.189.1 * kernel-syms-4.12.14-122.189.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-devel-4.12.14-122.189.1 * kernel-source-4.12.14-122.189.1 * kernel-macros-4.12.14-122.189.1 * SUSE Linux Enterprise Server 12 SP5 (s390x) * kernel-default-man-4.12.14-122.189.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.189.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (nosrc) * kernel-default-4.12.14-122.189.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * kernel-default-extra-4.12.14-122.189.1 * kernel-default-debuginfo-4.12.14-122.189.1 * kernel-default-debugsource-4.12.14-122.189.1 * kernel-default-extra-debuginfo-4.12.14-122.189.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2022-2586.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1109837 * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1202095 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1211439 * https://bugzilla.suse.com/show_bug.cgi?id=1214158 * https://bugzilla.suse.com/show_bug.cgi?id=1214479 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217936 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218057 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218362 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218622 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-5023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 16:30:31 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 16 Jan 2024 16:30:31 -0000 Subject: SUSE-SU-2024:0115-1: important: Security update for the Linux Kernel Message-ID: <170542263112.7395.12623470636650969871@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0115-1 Rating: important References: * bsc#1179610 * bsc#1183045 * bsc#1211162 * bsc#1211226 * bsc#1212139 * bsc#1212584 * bsc#1214117 * bsc#1214747 * bsc#1214823 * bsc#1215237 * bsc#1215696 * bsc#1215885 * bsc#1215952 * bsc#1216032 * bsc#1216057 * bsc#1216559 * bsc#1216776 * bsc#1217036 * bsc#1217217 * bsc#1217250 * bsc#1217602 * bsc#1217692 * bsc#1217790 * bsc#1217801 * bsc#1217822 * bsc#1217927 * bsc#1217933 * bsc#1217938 * bsc#1217946 * bsc#1217947 * bsc#1217980 * bsc#1217981 * bsc#1217982 * bsc#1218056 * bsc#1218092 * bsc#1218139 * bsc#1218184 * bsc#1218229 * bsc#1218234 * bsc#1218253 * bsc#1218258 * bsc#1218335 * bsc#1218357 * bsc#1218397 * bsc#1218447 * bsc#1218461 * bsc#1218515 * bsc#1218559 * bsc#1218569 * bsc#1218643 * jsc#PED-3459 * jsc#PED-5021 * jsc#PED-7167 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6531 * CVE-2023-6546 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6622 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Real Time Module 15-SP5 An update that solves 10 vulnerabilities, contains three features and has 40 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). * CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). The following non-security bugs were fixed: * Documentation: KVM: add separate directories for architecture-specific documentation (jsc#PED-7167). * Documentation: KVM: update amd-memory-encryption.rst references (jsc#PED-7167). * Documentation: KVM: update msr.rst reference (jsc#PED-7167). * Documentation: KVM: update s390-diag.rst reference (jsc#PED-7167). * Documentation: KVM: update s390-pv.rst reference (jsc#PED-7167). * Documentation: drop more IDE boot options and ide-cd.rst (git-fixes). * Documentation: qat: Use code block for qat sysfs example (git-fixes). * Drop Documentation/ide/ (git-fixes). * Fix crash on screen resize (bsc#1218229) * Fix drm gem object underflow (bsc#1218092) * KVM: arm64: Prevent kmemleak from accessing pKVM memory (jsc#PED-7167). * KVM: s390/mm: Properly reset no-dat (git-fixes bsc#1218056). * KVM: s390: vsie: fix wrong VIR 37 when MSO is used (git-fixes bsc#1217933). * Revert "PCI/ASPM: Remove pcie_aspm_pm_state_change()" (git-fixes). * Revert "PCI: acpiphp: Reassign resources on bridge if necessary" (git- fixes). * Revert "md: unlock mddev before reap sync_thread in action_store" (git- fixes). * Revert "swiotlb: panic if nslabs is too small" (git-fixes). * Revert "xhci: Loosen RPM as default policy to cover for AMD xHC 1.1" (git- fixes). * USB: serial: ftdi_sio: update Actisense PIDs constant names (git-fixes). * USB: serial: option: add Foxconn T99W265 with new baseline (git-fixes). * USB: serial: option: add Quectel EG912Y module support (git-fixes). * USB: serial: option: add Quectel RM500Q R13 firmware support (git-fixes). * Update: drm/vmwgfx: Keep a gem reference to user bos in surfaces * acpi: video: Add backlight=native DMI quirk for Lenovo Ideapad Z470 (git- fixes). * acpi: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects (git-fixes). * acpica: Add AML_NO_OPERAND_RESOLVE flag to Timer (git-fixes). * afs: Fix afs_server_list to be cleaned up with RCU (git-fixes). * afs: Fix dynamic root lookup DNS check (git-fixes). * afs: Fix file locking on R/O volumes to operate in local mode (git-fixes). * afs: Fix overwriting of result of DNS query (git-fixes). * afs: Fix refcount underflow from error handling race (git-fixes). * afs: Fix the dynamic root's d_delete to always delete unused dentries (git- fixes). * afs: Fix use-after-free due to get/remove race in volume tree (git-fixes). * afs: Make error on cell lookup failure consistent with OpenAFS (git-fixes). * afs: Return ENOENT if no cell DNS record can be found (git-fixes). * alsa: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro (git-fixes). * alsa: hda/hdmi: add force-connect quirk for NUC5CPYB (git-fixes). * alsa: hda/hdmi: add force-connect quirks for ASUSTeK Z170 variants (git- fixes). * alsa: hda/realtek: Add Framework laptop 16 to quirks (git-fixes). * alsa: hda/realtek: Add quirk for ASUS ROG GV302XA (git-fixes). * alsa: hda/realtek: Add supported ALC257 for ChromeOS (git-fixes). * alsa: hda/realtek: Apply mute LED quirk for HP15-db (git-fixes). * alsa: hda/realtek: Enable headset on Lenovo M90 Gen5 (git-fixes). * alsa: hda/realtek: Fix mute and mic-mute LEDs for HP ProBook 440 G6 (git- fixes). * alsa: hda/realtek: Headset Mic VREF to 100% (git-fixes). * alsa: hda/realtek: add new Framework laptop to quirks (git-fixes). * alsa: hda/realtek: enable SND_PCI_QUIRK for hp pavilion 14-ec1xxx series (git-fixes). * alsa: hda/realtek: fix mute/micmute LEDs for a HP ZBook (git-fixes). * alsa: hda/realtek: fix speakers on XPS 9530 (2023) (git-fixes). * alsa: hda: intel-dsp-cfg: add LunarLake support (git-fixes). * alsa: pcm: fix out-of-bounds in snd_pcm_state_names (git-fixes). * alsa: seq: oss: Fix racy open/close of MIDI devices (git-fixes). * alsa: usb-audio: Add Pioneer DJM-450 mixer controls (git-fixes). * alsa: usb-audio: Increase delay in MOTU M quirk (git-fixes). * apparmor: Free up __cleanup() name (jsc#PED-7167). * arm64: dts: arm: add missing cache properties (git-fixes) * arm64: dts: imx8mm: Add sound-dai-cells to micfil node (git-fixes) * arm64: dts: imx8mn: Add sound-dai-cells to micfil node (git-fixes) * arm64: dts: imx8mq-librem5: Remove dis_u3_susphy_quirk from (git-fixes) * arm64: kdump: Skip kmemleak scan reserved memory for kdump (jsc#PED-7167). * arm64: mm: Fix "rodata=on" when CONFIG_RODATA_FULL_DEFAULT_ENABLED=y (git- fixes) * arm: oMAP2+: Fix null pointer dereference and memory leak in omap_soc_device_init (git-fixes). * arm: pL011: Fix DMA support (git-fixes). * asoc: fsl_rpmsg: Fix error handler with pm_runtime_enable (git-fixes). * asoc: hdmi-codec: fix missing report for jack initial status (git-fixes). * asoc: meson: g12a-toacodec: Fix event generation (git-fixes). * asoc: meson: g12a-toacodec: Validate written enum values (git-fixes). * asoc: meson: g12a-tohdmitx: Fix event generation for S/PDIF mux (git-fixes). * asoc: meson: g12a-tohdmitx: Validate written enum values (git-fixes). * asoc: wm_adsp: fix memleak in wm_adsp_buffer_populate (git-fixes). * bitmap: unify find_bit operations (jsc#PED-7167). * block: fix revalidate performance regression (bsc#1216057). * bluetooth: Fix deadlock in vhci_send_frame (git-fixes). * bluetooth: L2CAP: Send reject on command corrupted request (git-fixes). * bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE (git- fixes). * bluetooth: btusb: Add new PID/VID 0489:e0f2 for MT7921 (bsc#1218461). * bluetooth: hci_event: Fix not checking if HCI_OP_INQUIRY has been sent (git- fixes). * bluetooth: hci_event: shut up a false-positive warning (git-fixes). * bluetooth: hci_qca: Fix the teardown problem for real (git-fixes). * bnxt: do not handle XDP in netpoll (jsc#PED-1495). * bnxt_en: Clear resource reservation during resume (jsc#PED-1495). * bnxt_en: Fix HWTSTAMP_FILTER_ALL packet timestamp logic (jsc#PED-1495). * bnxt_en: Fix max_mtu setting for multi-buf XDP (jsc#PED-1495). * bnxt_en: Fix page pool logic for page size >= 64K (jsc#PED-1495). * bnxt_en: Fix wrong return value check in bnxt_close_nic() (jsc#PED-1495). * bnxt_en: Flush XDP for bnxt_poll_nitroa0()'s NAPI (jsc#PED-1495). * bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234 git-fixes). * bus: ti-sysc: Flush posted write only after srst_udelay (git-fixes). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980). * ceph: fix type promotion bug on 32bit systems (bsc#1217982). * cleanup: Make no_free_ptr() __must_check (jsc#PED-7167). * clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217). * clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217). * clocksource: Handle negative skews in "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217). * clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217). * clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217). * clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217). * configfs-tsm: Introduce a shared ABI for attestation reports (jsc#PED-7167). * crypto: ccp - Add SEV_INIT rc error logging on init (jsc#PED-7167). * crypto: ccp - Add SEV_INIT_EX support (jsc#PED-7167). * crypto: ccp - Add a header for multiple drivers to use `__psp_pa` (jsc#PED-7167). * crypto: ccp - Add a quirk to firmware update (jsc#PED-7167). * crypto: ccp - Add psp_init_on_probe module parameter (jsc#PED-7167). * crypto: ccp - Drop TEE support for IRQ handler (jsc#PED-7167). * crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() (jsc#PED-7167). * crypto: ccp - Fail the PSP initialization when writing psp data file failed (jsc#PED-7167). * crypto: ccp - Fix the INIT_EX data file open failure (jsc#PED-7167). * crypto: ccp - Fix whitespace in sev_cmd_buffer_len() (jsc#PED-7167). * crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware (jsc#PED-7167). * crypto: ccp - Initialize PSP when reading psp data file failed (jsc#PED-7167). * crypto: ccp - Log when resetting PSP SEV state (jsc#PED-7167). * crypto: ccp - Move SEV_INIT retry for corrupted data (jsc#PED-7167). * crypto: ccp - Move some PSP mailbox bit definitions into common header (jsc#PED-7167). * crypto: ccp - Name -1 return value as SEV_RET_NO_FW_CALL (jsc#PED-7167). * crypto: ccp - Refactor out sev_fw_alloc() (jsc#PED-7167). * crypto: ccp - remove unneeded semicolon (jsc#PED-7167). * crypto: ccp: Get rid of __sev_platform_init_locked()'s local function pointer (jsc#PED-7167). * dm verity: initialize fec io before freeing it (git-fixes). * dm-verity: do not use blocking calls from tasklets (git-fixes). * dm: add cond_resched() to dm_wq_requeue_work() (git-fixes). * dm: do not attempt to queue IO under RCU protection (git-fixes). * dm: fix __send_duplicate_bios() to always allow for splitting IO (bsc#1215952). * dm: fix improper splitting for abnormal bios (bsc#1215952). * dm: verity-loadpin: Add NULL pointer check for 'bdev' parameter (git-fixes). * dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * dmaengine: ioat: Free up __cleanup() name (jsc#PED-7167). * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021) * drm/amd/amdgpu: Fix warnings in amdgpu/amdgpu_display.c (git-fixes). * drm/amdgpu/sdma5.2: add begin/end_use ring callbacks (bsc#1212139). * drm/amdgpu: Add EEPROM I2C address support for ip discovery (git-fixes). * drm/amdgpu: Add I2C EEPROM support on smu v13_0_6 (git-fixes). * drm/amdgpu: Add support for RAS table at 0x40000 (git-fixes). * drm/amdgpu: Decouple RAS EEPROM addresses from chips (git-fixes). * drm/amdgpu: Remove redundant I2C EEPROM address (git-fixes). * drm/amdgpu: Remove second moot switch to set EEPROM I2C address (git-fixes). * drm/amdgpu: Return from switch early for EEPROM I2C address (git-fixes). * drm/amdgpu: Update EEPROM I2C address for smu v13_0_0 (git-fixes). * drm/amdgpu: Update ras eeprom support for smu v13_0_0 and v13_0_10 (git- fixes). * drm/amdgpu: correct chunk_ptr to a pointer to chunk (git-fixes). * drm/amdgpu: correct the amdgpu runtime dereference usage count (git-fixes). * drm/amdgpu: fix tear down order in amdgpu_vm_pt_free (git-fixes). * drm/amdgpu: simplify amdgpu_ras_eeprom.c (git-fixes). * drm/bridge: parade-ps8640: Never store more than msg->size bytes in AUX xfer (git-fixes). * drm/bridge: ps8640: Fix size mismatch warning w/ len (git-fixes). * drm/bridge: tc358768: select CONFIG_VIDEOMODE_HELPERS (git-fixes). * drm/bridge: ti-sn65dsi86: Never store more than msg->size bytes in AUX xfer (git-fixes). * drm/i915/display: Drop check for doublescan mode in modevalid (git-fixes). * drm/i915/dp: Fix passing the correct DPCD_REV for drm_dp_set_phy_test_pattern (git-fixes). * drm/i915/dpt: Only do the POT stride remap when using DPT (git-fixes). * drm/i915/lvds: Use REG_BIT() & co (git-fixes). * drm/i915/mtl: limit second scaler vertical scaling in ver >= 14 (git-fixes). * drm/i915/sdvo: stop caching has_hdmi_monitor in struct intel_sdvo (git- fixes). * drm/i915: Fix intel_atomic_setup_scalers() plane_state handling (git-fixes). * drm/i915: Fix remapped stride with CCS on ADL+ (git-fixes). * drm/i915: Reject async flips with bigjoiner (git-fixes). * drm/i915: Relocate intel_atomic_setup_scalers() (git-fixes). * drm/i915: fix MAX_ORDER usage in i915_gem_object_get_pages_internal() (jsc#PED-7167). * drm/mediatek: Add spinlock for setting vblank event in atomic_begin (git- fixes). * drm/mgag200: Fix gamma lut not initialized for G200ER, G200EV, G200SE (git- fixes). * efi/libstub: Implement support for unaccepted memory (jsc#PED-7167). * efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory (jsc#PED-7167). * efi/unaccepted: Fix off-by-one when checking for overlapping ranges (jsc#PED-7167). * efi/unaccepted: Fix soft lockups caused by parallel memory acceptance (jsc#PED-7167). * efi/unaccepted: Make sure unaccepted table is mapped (jsc#PED-7167). * efi/unaccepted: Use ACPI reclaim memory for unaccepted memory table (jsc#PED-7167). * efi/x86: Get full memory map in allocate_e820() (jsc#PED-7167). * efi: Add unaccepted memory support (jsc#PED-7167). * efi: libstub: avoid efi_get_memory_map() for allocating the virt map (jsc#PED-7167). * efi: libstub: install boot-time memory map as config table (jsc#PED-7167). * efi: libstub: remove DT dependency from generic stub (jsc#PED-7167). * efi: libstub: remove pointless goto kludge (jsc#PED-7167). * efi: libstub: simplify efi_get_memory_map() and struct efi_boot_memmap (jsc#PED-7167). * efi: libstub: unify initrd loading between architectures (jsc#PED-7167). * floppy: fix MAX_ORDER usage (jsc#PED-7167). * fprobe: Fix to ensure the number of active retprobes is not zero (git- fixes). * fs/jfs: Add check for negative db_l2nbperpage (git-fixes). * fs/jfs: Add validity check for db_maxag and db_agpref (git-fixes). * fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount() (git- fixes). * fs/remap: constrain dedupe of EOF blocks (git-fixes). * fs: avoid empty option when generating legacy mount string (git-fixes). * fs: fix an infinite loop in iomap_fiemap (git-fixes). * fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes). * genwqe: fix MAX_ORDER usage (jsc#PED-7167). * gfs2: Add wrapper for iomap_file_buffered_write (git-fixes). * gfs2: Check sb_bsize_shift after reading superblock (git-fixes). * gfs2: Clean up function may_grant (git-fixes). * gfs2: Fix filesystem block deallocation for short writes (git-fixes). * gfs2: Fix gfs2_release for non-writers regression (git-fixes). * gfs2: Fix inode height consistency check (git-fixes). * gfs2: Fix length of holes reported at end-of-file (git-fixes). * gfs2: Fix possible data races in gfs2_show_options() (git-fixes). * gfs2: Improve gfs2_make_fs_rw error handling (git-fixes). * gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes). * gfs2: Silence "suspicious RCU usage in gfs2_permission" warning (git-fixes). * gfs2: Switch from strlcpy to strscpy (git-fixes). * gfs2: fix an oops in gfs2_permission (git-fixes). * gfs2: gfs2_setattr_size error path fix (git-fixes). * gfs2: ignore negated quota changes (git-fixes). * gfs2: jdata writepage fix (git-fixes). * gfs2: use i_lock spin_lock for inode qadata (git-fixes). * gpiolib: sysfs: Fix error handling on failed export (git-fixes). * gve: Fixes for napi_poll when budget is 0 (git-fixes). * gve: Use size_add() in call to struct_size() (git-fixes). * hid: add ALWAYS_POLL quirk for Apple kb (git-fixes). * hid: glorious: fix Glorious Model I HID report (git-fixes). * hid: hid-asus: add const to read-only outgoing usb buffer (git-fixes). * hid: hid-asus: reset the backlight brightness level on resume (git-fixes). * hid: lenovo: Restrict detection of patched firmware only to USB cptkbd (git- fixes). * hid: multitouch: Add quirk for HONOR GLO-GXXX touchpad (git-fixes). * hwmon: (acpi_power_meter) Fix 4.29 MW bug (git-fixes). * hwmon: (nzxt-kraken2) Fix error handling path in kraken2_probe() (git- fixes). * i2c: aspeed: Handle the coalesced stop conditions with the start conditions (git-fixes). * i2c: core: Fix atomic xfer check for non-preempt config (git-fixes). * i2c: designware: Fix corrupted memory seen in the ISR (git-fixes). * i40e: Fix I40E_FLAG_VF_VLAN_PRUNING value (jsc#PED-372). * i40e: Fix VF VLAN offloading when port VLAN is configured (jsc#PED-372). * i40e: Fix unexpected MFS warning message (jsc#PED-372). * i40e: Fix wrong check for I40E_TXR_FLAGS_WB_ON_ITR (jsc#PED-372). * i40e: fix misleading debug logs (jsc#PED-372). * i40e: fix potential NULL pointer dereferencing of pf->vf i40e_sync_vsi_filters() (jsc#PED-372). * i40e: fix potential memory leaks in i40e_remove() (jsc#PED-372). * i40e: prevent crash on probe if hw registers have invalid values (jsc#PED-372). * ib/mlx5: Fix init stage error handling to avoid double free of same QP and UAF (git-fixes) * ib/mlx5: Fix rdma counter binding for RAW QP (git-fixes) * igb: Avoid starting unnecessary workqueues (jsc#PED-370). * igb: Change IGB_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370). * igb: Fix potential memory leak in igb_add_ethtool_nfc_entry (jsc#PED-370). * igb: clean up in all error paths when enabling SR-IOV (jsc#PED-370). * igb: disable virtualization features on 82580 (jsc#PED-370). * igbvf: Change IGBVF_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370). * igc: Change IGC_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-375). * igc: Expose tx-usecs coalesce setting to user (jsc#PED-375). * igc: Fix ambiguity in the ethtool advertising (jsc#PED-375). * igc: Fix infinite initialization loop with early XDP redirect (jsc#PED-375). * igc: Fix the typo in the PTM Control macro (jsc#PED-375). * iio: adc: ti_am335x_adc: Fix return value check of tiadc_request_dma() (git- fixes). * iio: common: ms_sensors: ms_sensors_i2c: fix humidity conversion time table (git-fixes). * iio: imu: inv_mpu6050: fix an error code problem in inv_mpu6050_read_raw (git-fixes). * iio: triggered-buffer: prevent possible freeing of wrong buffer (git-fixes). * input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN (git-fixes). * input: ipaq-micro-keys - add error handling for devm_kmemdup (git-fixes). * input: soc_button_array - add mapping for airplane mode button (git-fixes). * input: xpad - add HyperX Clutch Gladiate Support (git-fixes). * interconnect: Treat xlate() returning NULL node as an error (git-fixes). * iomap: Fix iomap_dio_rw return value for user copies (git-fixes). * iommu: fix MAX_ORDER usage in __iommu_dma_alloc_pages() (jsc#PED-7167). * iov_iter, x86: Be consistent about the __user tag on copy_mc_to_user() (git- fixes). * jfs: fix array-index-out-of-bounds in dbFindLeaf (git-fixes). * jfs: fix array-index-out-of-bounds in diAlloc (git-fixes). * jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount (git-fixes). * jfs: validate max amount of blocks before allocation (git-fixes). * kABI: Preserve the type of rethook::handler (git-fixes). * kABI: restore void return to typec_altmode_attention (git-fixes). * kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes, as used only locally for asus-wmi stuff * kabi/severities: make snp_issue_guest_request PASS (jsc#PED-7167) * kabi: fix of_reserved_mem_* due to struct vm_struct became defined (jsc#PED-7167). * kabi: fix sev-dev due to fs_struct became defined (jsc#PED-7167). * kabi: fix struct efi after adding unaccepted memory table (jsc#PED-7167). * kabi: fix struct zone kabi after adding unaccepted_pages and NR_UNACCEPTED (jsc#PED-7167). * kbuild: Drop -Wdeclaration-after-statement (jsc#PED-7167). * kconfig: fix memory leak from range properties (git-fixes). * kernel-source: Remove config-options.changes (jsc#PED-5021) * kprobes: consistent rcu api usage for kretprobe holder (git-fixes). * lib/vsprintf: Fix %pfwf when current node refcount == 0 (git-fixes). * libceph: use kernel_connect() (bsc#1217981). * locking: Introduce __cleanup() based infrastructure (jsc#PED-7167). * locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes). * md/bitmap: do not set max_write_behind if there is no write mostly device (git-fixes). * md/md-bitmap: hold 'reconfig_mutex' in backlog_store() (git-fixes). * md/md-bitmap: remove unnecessary local variable in backlog_store() (git- fixes). * md/raid0: add discard support for the 'original' layout (git-fixes). * md/raid10: do not call bio_start_io_acct twice for bio which experienced read error (git-fixes). * md/raid10: factor out code from wait_barrier() to stop_waiting_barrier() (git-fixes). * md/raid10: factor out dereference_rdev_and_rrdev() (git-fixes). * md/raid10: fix io loss while replacement replace rdev (git-fixes). * md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes). * md/raid10: fix memleak for 'conf->bio_split' (git-fixes). * md/raid10: fix memleak of md thread (git-fixes). * md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes). * md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git- fixes). * md/raid10: fix overflow of md/safe_mode_delay (git-fixes). * md/raid10: fix task hung in raid10d (git-fixes). * md/raid10: fix the condition to call bio_end_io_acct() (git-fixes). * md/raid10: fix wrong setting of max_corr_read_errors (git-fixes). * md/raid10: prevent soft lockup while flush writes (git-fixes). * md/raid10: use dereference_rdev_and_rrdev() to get devices (git-fixes). * md/raid1: fix error: ISO C90 forbids mixed declarations (git-fixes). * md/raid1: free the r1bio before waiting for blocked rdev (git-fixes). * md/raid1: hold the barrier until handle_read_error() finishes (git-fixes). * md/raid5-cache: fix a deadlock in r5l_exit_log() (git-fixes). * md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() (git- fixes). * md/raid5: fix miscalculation of 'end_sector' in raid5_read_one_chunk() (git- fixes). * md: Put the right device in md_seq_next (bsc#1217822). * md: Set MD_BROKEN for RAID1 and RAID10 (git-fixes). * md: avoid signed overflow in slot_store() (git-fixes). * md: do not update recovery_cp when curr_resync is ACTIVE (git-fixes). * md: drop queue limitation for RAID1 and RAID10 (git-fixes). * md: raid0: account for split bio in iostat accounting (git-fixes). * md: raid10 add nowait support (git-fixes). * md: raid1: fix potential OOB in raid1_remove_disk() (git-fixes). * md: restore 'noio_flag' for the last mddev_resume() (git-fixes). * md: select BLOCK_LEGACY_AUTOLOAD (git-fixes). * memblock: exclude MEMBLOCK_NOMAP regions from kmemleak (jsc#PED-7167). * memblock: make memblock_find_in_range method private (jsc#PED-7167). * misc: mei: client.c: fix problem of return '-EOVERFLOW' in mei_cl_write (git-fixes). * misc: mei: client.c: return negative error code in mei_cl_write (git-fixes). * mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files. * mm/page_alloc: make deferred page init free pages in MAX_ORDER blocks (jsc#PED-7167). * mm/pgtable: Fix multiple -Wstringop-overflow warnings (jsc#PED-7167). * mm/slab: Add __free() support for kvfree (jsc#PED-7167). * mm/slub: fix MAX_ORDER usage in calculate_order() (jsc#PED-7167). * mm: Add PAGE_ALIGN_DOWN macro (jsc#PED-7167). * mm: Add support for unaccepted memory (jsc#PED-7167). * mm: add pageblock_align() macro (jsc#PED-7167). * mm: add pageblock_aligned() macro (jsc#PED-7167). * mm: avoid passing 0 to __ffs() (jsc#PED-7167). * mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515). * mm: move kvmalloc-related functions to slab.h (jsc#PED-7167). * mm: new primitive kvmemdup() (jsc#PED-7167). * mm: reuse pageblock_start/end_pfn() macro (jsc#PED-7167). * mmc: meson-mx-sdhc: Fix initialization frozen issue (git-fixes). * mmc: rpmb: fixes pause retune on all RPMB partitions (git-fixes). * mmc: sdhci-sprd: Fix eMMC init failure after hw reset (git-fixes). * neighbor: tracing: Move pin6 inside CONFIG_IPV6=y section (git-fixes). * net/rose: Fix Use-After-Free in rose_ioctl (git-fixes). * net/smc: Fix pos miscalculation in statistics (bsc#1218139). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes). * net: bnxt: fix a potential use-after-free in bnxt_init_tc (jsc#PED-1495). * net: ena: Destroy correct number of xdp queues upon failure (git-fixes). * net: ena: Fix XDP redirection error (git-fixes). * net: ena: Fix xdp drops handling due to multibuf packets (git-fixes). * net: ena: Flush XDP packets on error (git-fixes). * net: mana: select PAGE_POOL (git-fixes). * net: rfkill: gpio: set GPIO direction (git-fixes). * net: usb: ax88179_178a: avoid failed operations when device is disconnected (git-fixes). * net: usb: ax88179_178a: clean up pm calls (git-fixes). * net: usb: ax88179_178a: wol optimizations (git-fixes). * net: usb: qmi_wwan: claim interface 4 for ZTE MF290 (git-fixes). * nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local (git-fixes). * nfs: Fix O_DIRECT locking issues (bsc#1211162). * nfs: Fix a few more clear_bit() instances that need release semantics (bsc#1211162). * nfs: Fix a potential data corruption (bsc#1211162). * nfs: Fix a use after free in nfs_direct_join_group() (bsc#1211162). * nfs: Fix error handling for O_DIRECT write scheduling (bsc#1211162). * nfs: More O_DIRECT accounting fixes for error paths (bsc#1211162). * nfs: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162). * nfs: Use the correct commit info in nfs_join_page_group() (bsc#1211162). * nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162). * nilfs2: fix missing error check for sb_set_blocksize call (git-fixes). * nilfs2: prevent WARNING in nilfs_sufile_set_segment_usage() (git-fixes). * nlm: Defend against file_lock changes after vfs_test_lock() (bsc#1217692). * null_blk: fix poll request timeout handling (git-fixes). * nvme-core: check for too small lba shift (bsc#1214117). * nvme-pci: Add sleep quirk for Kingston drives (git-fixes). * nvme-pci: always return an ERR_PTR from nvme_pci_alloc_dev (git-fixes). * nvme-pci: do not set the NUMA node of device if it has none (git-fixes). * nvme-pci: factor out a nvme_pci_alloc_dev helper (git-fixes). * nvme-rdma: do not try to stop unallocated queues (git-fixes). * nvme: sanitize metadata bounce buffer for reads (git-fixes). * nvmet-auth: complete a request only after freeing the dhchap pointers (git- fixes). * of: reserved_mem: Have kmemleak ignore dynamically allocated reserved mem (jsc#PED-7167). * orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git- fixes). * orangefs: Fix kmemleak in orangefs_{kernel,client}_debug_init() (git-fixes). * orangefs: Fix sysfs not cleanup when dev init failed (git-fixes). * orangefs: Fix the size of a memory allocation in orangefs_bufmap_alloc() (git-fixes). * padata: Fix refcnt handling in padata_free_shell() (git-fixes). * parport: Add support for Brainboxes IX/UC/PX parallel cards (git-fixes). * pci: loongson: Limit MRRS to 256 (git-fixes). * perf/core: fix MAX_ORDER usage in rb_alloc_aux_page() (jsc#PED-7167). * pinctrl: at91-pio4: use dedicated lock class for IRQ (git-fixes). * platform/surface: aggregator: fix recv_buf() return value (git-fixes). * platform/x86: asus-wmi: Add support for ROG X13 tablet mode (git-fixes). * platform/x86: asus-wmi: Adjust tablet/lidflip handling to use enum (git- fixes). * platform/x86: asus-wmi: Fix kbd_dock_devid tablet-switch reporting (git- fixes). * platform/x86: asus-wmi: Move i8042 filter install to shared asus-wmi code (git-fixes). * platform/x86: asus-wmi: Simplify tablet-mode-switch handling (git-fixes). * platform/x86: asus-wmi: Simplify tablet-mode-switch probing (git-fixes). * platform/x86: wmi: Allow duplicate GUIDs for drivers that use struct wmi_driver (git-fixes). * platform/x86: wmi: Skip blocks with zero instances (git-fixes). * powerpc/pseries/vas: Migration suspend waits for no in-progress open windows (bsc#1218397 ltc#204523). * qed/red_ll2: Fix undefined behavior bug in struct qed_ll2_info (jsc#PED-1526). * qed: Fix a potential use-after-free in qed_cxt_tables_alloc (jsc#PED-1526). * qed: fix LL2 RX buffer allocation (jsc#PED-1526). * qede: fix firmware halt over suspend and resume (jsc#PED-1526). * qla2xxx: add debug log for deprecated hw detected (bsc#1216032). * r8152: Add RTL8152_INACCESSIBLE checks to more loops (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_aldps_en() (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_pre_firmware_1() (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8156b_wait_loading_flash() (git-fixes). * r8152: Rename RTL8152_UNPLUG to RTL8152_INACCESSIBLE (git-fixes). * r8169: Fix PCI error on system resume (git-fixes). * rdma/bnxt_re: Correct module description string (jsc#PED-1495). * rdma/core: Use size_{add,sub,mul}() in calls to struct_size() (git-fixes) * rdma/hfi1: Use FIELD_GET() to extract Link Width (git-fixes) * rdma/hfi1: Workaround truncation compilation error (git-fixes) * rdma/hns: Add check for SL (git-fixes) * rdma/hns: Fix printing level of asynchronous events (git-fixes) * rdma/hns: Fix signed-unsigned mixed comparisons (git-fixes) * rdma/hns: Fix uninitialized ucmd in hns_roce_create_qp_common() (git-fixes) * rdma/hns: The UD mode can only be configured with DCQCN (git-fixes) * regmap: fix bogus error on regcache_sync success (git-fixes). * reiserfs: Check the return value from __getblk() (git-fixes). * reiserfs: Replace 1-element array with C99 style flex-array (git-fixes). * remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569). * reset: Fix crash when freeing non-existent optional resets (git-fixes). * restore renamed device IDs for USB HID devices (git-fixes). * rethook: Fix to use WRITE_ONCE() for rethook:: Handler (git-fixes). * rethook: Use __rcu pointer for rethook::handler (git-fixes). * ring-buffer: Do not try to put back write_stamp (git-fixes). * ring-buffer: Do not update before stamp when switching sub-buffers (git- fixes). * ring-buffer: Fix a race in rb_time_cmpxchg() for 32 bit archs (git-fixes). * ring-buffer: Fix memory leak of free page (git-fixes). * ring-buffer: Fix slowpath of interrupted event (git-fixes). * ring-buffer: Fix wake ups when buffer_percent is set to 100 (git-fixes). * ring-buffer: Fix writing to the buffer with max_data_size (git-fixes). * ring-buffer: Force absolute timestamp on discard of event (git-fixes). * ring-buffer: Have saved event hold the entire event (git-fixes). * ring-buffer: Remove useless update to write_stamp in rb_try_to_discard() (git-fixes). * s390/vx: fix save/restore of fpu kernel context (git-fixes bsc#1218357). * scsi: lpfc: use unsigned type for num_sge (bsc#1214747). * serial: 8250: 8250_omap: Clear UART_HAS_RHR_IT_DIS bit (git-fixes). * serial: 8250: 8250_omap: Do not start RX DMA on THRI interrupt (git-fixes). * serial: sc16is7xx: address RX timeout interrupt errata (git-fixes). * soundwire: stream: fix NULL pointer dereference for multi_link (git-fixes). * spi: atmel: Fix clock issue when using devices with different polarities (git-fixes). * statfs: enforce statfs[64] structure initialization (git-fixes). * supported.conf: add drivers/virt/coco/tsm (jsc#PED-7167) * swiotlb: always set the number of areas before allocating the pool (git- fixes). * swiotlb: do not panic! (git-fixes). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix debugfs reporting of reserved memory pools (git-fixes). * swiotlb: fix slot alignment checks (bsc#1216559). * swiotlb: fix the deadlock in swiotlb_do_find_slots (git-fixes). * swiotlb: mark swiotlb_memblock_alloc() as __init (git-fixes). * swiotlb: reduce the number of areas to match actual memory pool size (git- fixes). * swiotlb: reduce the swiotlb buffer size on allocation failure (git-fixes). * swiotlb: use the calculated number of areas (git-fixes). * tracing / synthetic: Disable events after testing in synth_event_gen_test_init() (git-fixes). * tracing/kprobes: Fix the description of variable length arguments (git- fixes). * tracing/kprobes: Fix the order of argument descriptions (git-fixes). * tracing/perf: Add interrupt_context_level() helper (git-fixes). * tracing/synthetic: fix kernel-doc warnings (git-fixes). * tracing: Always update snapshot buffer size (git-fixes). * tracing: Disable preemption when using the filter buffer (bsc#1217036). * tracing: Disable snapshot buffer when stopping instance tracers (git-fixes). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix blocked reader of snapshot buffer (git-fixes). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (git-fixes, bsc#1217036). * tracing: Have the user copy of synthetic event address use correct context (git-fixes). * tracing: Reuse logic from perf's get_recursion_context() (git-fixes). * tracing: Set actual size after ring buffer resize (git-fixes). * tracing: Stop current tracer when resizing buffer (git-fixes). * tracing: Update snapshot buffer on resize if it is allocated (git-fixes). * tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036). * tracing: relax trace_event_eval_update() execution with cond_resched() (git- fixes). * uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978). * ubifs: Fix memory leak of bud->log_hash (git-fixes). * ubifs: fix possible dereference after free (git-fixes). * usb-storage: Add quirk for incorrect WP on Kingston DT Ultimate 3.0 G3 (git- fixes). * usb: aqc111: check packet for fixup for true limit (git-fixes). * usb: config: fix iteration issue in 'usb_get_bos_descriptor()' (git-fixes). * usb: host: xhci-plat: fix possible kernel oops while resuming (git-fixes). * usb: hub: Guard against accesses to uninitialized BOS descriptors (git- fixes). * usb: typec: bus: verify partner exists in typec_altmode_attention (git- fixes). * usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes). * usb: typec: ucsi: acpi: add quirk for ASUS Zenbook UM325 (git-fixes). * virt/coco/sev-guest: Double-buffer messages (jsc#PED-7167). * virt: coco: Add a coco/Makefile and coco/Kconfig (jsc#PED-7167). * virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT (jsc#PED-7167). * virt: sevguest: Fix passing a stack buffer as a scatterlist target (jsc#PED-7167). * virt: sevguest: Prep for kernel internal get_ext_report() (jsc#PED-7167). * virt: tdx-guest: Add Quote generation support using TSM_REPORTS (jsc#PED-7167). * vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602). * wifi: cfg80211: Add my certificate (git-fixes). * wifi: cfg80211: fix certs build to not depend on file order (git-fixes). * wifi: iwlwifi: pcie: add another missing bh-disable for rxq->lock (git- fixes). * wifi: iwlwifi: pcie: do not synchronize IRQs from IRQ (git-fixes). * wifi: mac80211: mesh: check element parsing succeeded (git-fixes). * wifi: mac80211: mesh_plink: fix matches_local logic (git-fixes). * x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes). * x86/alternatives: Disable KASAN in apply_alternatives() (git-fixes). * x86/alternatives: Disable interrupts and sync when optimizing NOPs in place (git-fixes). * x86/alternatives: Sync core before enabling interrupts (git-fixes). * x86/boot/compressed: Handle unaccepted memory (jsc#PED-7167). * x86/boot/compressed: Reserve more memory for page tables (git-fixes). * x86/boot: Add an efi.h header for the decompressor (jsc#PED-7167). * x86/boot: Centralize __pa()/__va() definitions (jsc#PED-7167). * x86/boot: Fix incorrect startup_gdt_descr.size (git-fixes). * x86/cpu/amd: Enable Zenbleed fix for AMD Custom APU 0405 (git-fixes). * x86/cpu: Do not write CSTAR MSR on Intel CPUs (jsc#PED-7167). * x86/cpu: Fix amd_check_microcode() declaration (git-fixes). * x86/efi: Safely enable unaccepted memory in UEFI (jsc#PED-7167). * x86/entry: Convert INT 0x80 emulation to IDTENTRY (bsc#1217927). * x86/entry: Do not allow external 0x80 interrupts (bsc#1217927). * x86/fpu/xstate: Prevent false-positive warning in __copy_xstate_uabi_buf() (git-fixes). * x86/fpu: Invalidate FPU state correctly on exec() (git-fixes). * x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790). * x86/purgatory: Remove LTO flags (git-fixes). * x86/resctrl: Fix kernel-doc warnings (git-fixes). * x86/sev-es: Replace open-coded hlt-loop with sev_es_terminate() (jsc#PED-7167). * x86/sev-es: Use insn_decode_mmio() for MMIO implementation (jsc#PED-7167). * x86/sev: Add SNP-specific unaccepted memory support (jsc#PED-7167). * x86/sev: Allow for use of the early boot GHCB for PSC requests (jsc#PED-7167). * x86/sev: Change npages to unsigned long in snp_accept_memory() (jsc#PED-7167). * x86/sev: Change snp_guest_issue_request()'s fw_err argument (jsc#PED-7167). * x86/sev: Fix address space sparse warning (jsc#PED-7167). * x86/sev: Get rid of special sev_es_enable_key (jsc#PED-7167). * x86/sev: Mark snp_abort() noreturn (jsc#PED-7167). * x86/sev: Put PSC struct on the stack in prep for unaccepted memory support (jsc#PED-7167). * x86/sev: Use large PSC requests if applicable (jsc#PED-7167). * x86/smp: Use dedicated cache-line for mwait_play_dead() (git-fixes). * x86/srso: Add SRSO mitigation for Hygon processors (git-fixes). * x86/srso: Fix SBPB enablement for (possible) future fixed HW (git-fixes). * x86/srso: Fix vulnerability reporting for missing microcode (git-fixes). * x86/tdx: Add unaccepted memory support (jsc#PED-7167). * x86/tdx: Disable NOTIFY_ENABLES (jsc#PED-7167). * x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub (jsc#PED-7167). * x86/tdx: Refactor try_accept_one() (jsc#PED-7167). * x86/tdx: Relax SEPT_VE_DISABLE check for debug TD (jsc#PED-7167). * x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLE (jsc#PED-7167). * x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217). * x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217). * x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217). * x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git- fixes). * xfs: Rename __xfs_attr_rmtval_remove (git-fixes). * xfs: Use kvcalloc() instead of kvzalloc() (git-fixes). * xfs: aborting inodes on shutdown may need buffer lock (git-fixes). * xfs: add selinux labels to whiteout inodes (git-fixes). * xfs: clean up "%Ld/%Lu" which does not meet C standard (git-fixes). * xfs: convert flex-array declarations in struct xfs_attrlist* (git-fixes). * xfs: convert flex-array declarations in xfs attr leaf blocks (git-fixes). * xfs: convert flex-array declarations in xfs attr shortform objects (git- fixes). * xfs: decode scrub flags in ftrace output (git-fixes). * xfs: dump log intent items that cannot be recovered due to corruption (git- fixes). * xfs: fix a bug in the online fsck directory leaf1 bestcount check (git- fixes). * xfs: fix agf_fllast when repairing an empty AGFL (git-fixes). * xfs: fix incorrect unit conversion in scrub tracepoint (git-fixes). * xfs: fix silly whitespace problems with kernel libxfs (git-fixes). * xfs: fix uninit warning in xfs_growfs_data (git-fixes). * xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes). * xfs: make sure maxlen is still congruent with prod when rounding down (git- fixes). * xfs: remove kmem_alloc_io() (git-fixes). * xfs: remove the xfs_dinode_t typedef (git-fixes). * xfs: remove the xfs_dqblk_t typedef (git-fixes). * xfs: remove the xfs_dsb_t typedef (git-fixes). * xfs: rename xfs_has_attr() (git-fixes). * xfs: replace snprintf in show functions with sysfs_emit (git-fixes). * xfs: return EINTR when a fatal signal terminates scrub (git-fixes). * xfs: sb verifier does not handle uncached sb buffer (git-fixes). * xfs: simplify two-level sysctl registration for xfs_table (git-fixes). * xfs: sysfs: use default_groups in kobj_type (git-fixes). * xfs: use swap() to make dabtree code cleaner (git-fixes). * xhci: Clear EHB bit only at end of interrupt handler (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-115=1 openSUSE-SLE-15.5-2024-115=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-115=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-115=1 * SUSE Real Time Module 15-SP5 zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-115=1 ## Package List: * openSUSE Leap 15.5 (noarch) * kernel-source-rt-5.14.21-150500.13.30.1 * kernel-devel-rt-5.14.21-150500.13.30.1 * openSUSE Leap 15.5 (x86_64) * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-extra-5.14.21-150500.13.30.1 * gfs2-kmp-rt-5.14.21-150500.13.30.1 * kernel-rt-optional-5.14.21-150500.13.30.1 * kernel-rt-vdso-5.14.21-150500.13.30.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.30.1 * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-optional-debuginfo-5.14.21-150500.13.30.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * dlm-kmp-rt-5.14.21-150500.13.30.1 * reiserfs-kmp-rt-5.14.21-150500.13.30.1 * kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-1-150500.11.3.1 * cluster-md-kmp-rt-5.14.21-150500.13.30.1 * kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-1-150500.11.3.1 * kernel-rt-debugsource-5.14.21-150500.13.30.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-extra-debuginfo-5.14.21-150500.13.30.1 * ocfs2-kmp-rt-5.14.21-150500.13.30.1 * kselftests-kmp-rt-5.14.21-150500.13.30.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.30.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-livepatch-5.14.21-150500.13.30.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-livepatch-5_14_21-150500_13_30-rt-1-150500.11.3.1 * kernel-rt_debug-vdso-5.14.21-150500.13.30.1 * kernel-rt-livepatch-devel-5.14.21-150500.13.30.1 * kernel-rt_debug-livepatch-devel-5.14.21-150500.13.30.1 * kernel-rt_debug-devel-5.14.21-150500.13.30.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-devel-5.14.21-150500.13.30.1 * kernel-syms-rt-5.14.21-150500.13.30.1 * openSUSE Leap 15.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.30.1 * kernel-rt_debug-5.14.21-150500.13.30.1 * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.30.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * kernel-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-debugsource-5.14.21-150500.13.30.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_13_30-rt-1-150500.11.3.1 * kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-1-150500.11.3.1 * SUSE Real Time Module 15-SP5 (x86_64) * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.30.1 * gfs2-kmp-rt-5.14.21-150500.13.30.1 * kernel-rt-vdso-5.14.21-150500.13.30.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.30.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * dlm-kmp-rt-5.14.21-150500.13.30.1 * cluster-md-kmp-rt-5.14.21-150500.13.30.1 * kernel-rt-debugsource-5.14.21-150500.13.30.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.30.1 * ocfs2-kmp-rt-5.14.21-150500.13.30.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.30.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt_debug-vdso-5.14.21-150500.13.30.1 * kernel-rt_debug-devel-5.14.21-150500.13.30.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-devel-5.14.21-150500.13.30.1 * kernel-syms-rt-5.14.21-150500.13.30.1 * SUSE Real Time Module 15-SP5 (noarch) * kernel-source-rt-5.14.21-150500.13.30.1 * kernel-devel-rt-5.14.21-150500.13.30.1 * SUSE Real Time Module 15-SP5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.30.1 * kernel-rt_debug-5.14.21-150500.13.30.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6622.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212139 * https://bugzilla.suse.com/show_bug.cgi?id=1212584 * https://bugzilla.suse.com/show_bug.cgi?id=1214117 * https://bugzilla.suse.com/show_bug.cgi?id=1214747 * https://bugzilla.suse.com/show_bug.cgi?id=1214823 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1215952 * https://bugzilla.suse.com/show_bug.cgi?id=1216032 * https://bugzilla.suse.com/show_bug.cgi?id=1216057 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217602 * https://bugzilla.suse.com/show_bug.cgi?id=1217692 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217822 * https://bugzilla.suse.com/show_bug.cgi?id=1217927 * https://bugzilla.suse.com/show_bug.cgi?id=1217933 * https://bugzilla.suse.com/show_bug.cgi?id=1217938 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1217980 * https://bugzilla.suse.com/show_bug.cgi?id=1217981 * https://bugzilla.suse.com/show_bug.cgi?id=1217982 * https://bugzilla.suse.com/show_bug.cgi?id=1218056 * https://bugzilla.suse.com/show_bug.cgi?id=1218092 * https://bugzilla.suse.com/show_bug.cgi?id=1218139 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218229 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218335 * https://bugzilla.suse.com/show_bug.cgi?id=1218357 * https://bugzilla.suse.com/show_bug.cgi?id=1218397 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218461 * https://bugzilla.suse.com/show_bug.cgi?id=1218515 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218569 * https://bugzilla.suse.com/show_bug.cgi?id=1218643 * https://jira.suse.com/browse/PED-3459 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-7167 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 16:30:33 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 16 Jan 2024 16:30:33 -0000 Subject: SUSE-RU-2024:0130-1: moderate: Recommended update for google-cloud-sap-agent Message-ID: <170542263396.7395.3845316887143547835@smelt2.prg2.suse.org> # Recommended update for google-cloud-sap-agent Announcement ID: SUSE-RU-2024:0130-1 Rating: moderate References: * bsc#1215672 * bsc#1215673 * bsc#1217373 * bsc#1217374 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has four fixes can now be installed. ## Description: This update for google-cloud-sap-agent contains the following fixes: * Update to version 2.8 (bsc#1217373, bsc#1217374) * Bump agent version to 2.8 to support C3/M3 certification * Update go.yml to use go 1.21 * Switch from "slices" to "go_exp.../slices" for go version dependency * Use newly refactored discovery packages. * Fixes issue with diskname from source or device name * Adds extreme disk type IOps and Throughput for host metrics * Add `INTEGRATION` target config environment for collection definition testing * Add project number to SAP System proto * Add a cache to discovered resources. This reduces the number of API calls needed to perform System Discovery * Replace windows wmic hardware queries with PowerShell wmi queries * Fix test flakiness * Improve development process for collection definition configuration * HANA PD based snapshot and restore - changes to add wait for uploading * Fix for kokoro build issue in processmetrics/networkstats * GCBDR SAPCoreAPP Package in Agent for SAP * Add version tracking for WLM validation config * Send workload validation config to remote instances for use during remote collection * Add flag for passing in workload validation config into remote collection OTE * Bump google.golang.org/grpc from 1.58.2 to 1.58.3 * Update to version 2.7 * Added ote for hma dashboards migration * Increase Max backoff in storage package to 300 seconds * Added subpaths for collection of required TCP metrics * Add more debug logs and increase the wait-time for PD operations in restore * No public description * Add 30 second timeout to read/write from the local file system for Backint * No public description * Adds RHEL 9 VM Manager policy * Extract cloud-related discovery functions into separate file * Adding timeout to systemReplication.py command execution * Allow download attempts without verifying connection to bucket * Invoke `collectiondefinition.Start` when starting the agent in daemon mode * SAP Agent CLI - usability improvements for flags and help menu * Add host project information to HANA DB component discovery data. * Use proto names for default configuration during Backint installation * Extending logging capabilities to all packages of the agent * Added a feature for exposing TCP connection metrics * Migrating context logging logic to all packages of SAP Agent * Add an ifthisthenthatlint to ensure new script is kept in sync with rule proto * (collectiondefition) - Discard unknown fields and remove breaking metrics * Moving commandlineexecutor from internal to shared for sqlserveragent * Define startup function for collectiondefinition package * Check error on close of destFile in backint restore * Allow trailing zeros for millisecond timestamps in Backint * Add pid to all agent logs * Bump SAP Agent version to 2.7 (placeholder release version) * Separate collection definition validation functionality into a separate file * Add datetime to migration folder for Backint installation * Add symlink for Backint log file to install directory * Set a deadline for the final flush to cloud logging * Increase chunk retry deadline in storage package * Fix order dependent tests in sapagent/internal/storage * Change support bundle feature to collect the OTE logs from new path * Usage logging for remote WLM validation metrics collection from the collector instance * Extract discovery functions performed on the host to a separate file * Improve agent shutdown experience in daemon mode * Fix Backint restoring incorrect file * Google Events - rule proto initial submission * Move gce package to shared folder for use by SQL Server agent * Add GCS integration into collectiondefinition package * Standardize import aliases * go mod updates * Fixing go/gotsan data race error in processmetrics_test * Add Backint support for Inquire line: `#EBID <external_backup_id>` * Chown Backint install directories to user/group of the opt/ folder * Create OTE logs under a subdir under /var/log as /var/log is only writable by root * Will not create an empty log file for logusage logs and one time execution logs will have 0666 file mode * Setting the log file created to world read+write permission * Bump golang.org/x/net from 0.15.0 to 0.17.0 * Add recovery_bucket parameter to Backint * Extract SAP related discovery functions to a separate file * Fix Backint install directory * Fix Backint parallel uploads * Move maintenance collector to beta API * Pruning batches to prevent time series duplication * Added a logger for incorporating service context keys in logs * Encode the DB password string to handle passwords with special characters * Handling non error scenarios better in netweaver.go * Internal change * fixes typo on backint install * Allow all users to execute google_cloud_sap_agent * Fix hdbbackint script. * Subdirs for Backint DIAGNOSE temporary files * Report zero-value metrics for upcoming maintenance * Clean up gcealpha functionality * Fix default configuration values in daemon and backint * Update the comment in proto to reflect that the metric path in skip list should start with /sap * Implemented separation of context of different services * Update to version 2.6 (bsc#1215672, bsc#1215673) * Rolling back previous change for storing Project Number, Project ID is sufficient, no need to add complexity * Determine location of HANA global.ini using SAP system discovery logic * Add numeric project ID prefix to object name for ReadMetrics * Discovery now looks up and stores project number with discovery data * ReadMetrics updates for IAM permissions and bucket object names * fixing the bug in backoff logic, using separate policies for each collector and adding some logs * Backint migration from the old agent and supporting legacy parameters * adding new backoff policies for process metrics and fixing the bug in process metrics sapservice collector * Bump SAP Agent version to 2.6 * Fix an issue where HANA hosts may not be discovered properly if hostname differs from instance name * Use Go 1.20 friendly sorting solution * adding retries in process metrics logic with backoffs * Fix parsing of instance (host/VM) name in Pacemaker pcmk_delay_max metric * Add the collection definition changes for the SAP HANA Topology metrics * Template for Cloud Monitoring Alerts for Backint errors * adding backoff to InstanceProperties to each collector * Reduced the number of parameters of startXX functions by consolidating them into respective structs * completing TODO (b/298315981): Create a map from skipped list metrics and pass it to collectors. * Proto package name changes to reflect the current path * Use instance_name instead of instance_id for baremetal systems * Decode encryption keys for Backint. * Moving HA replication metric to fast moving metrics * Added backoffs package in process metrics to keep the backoff policies and retry policies separately and make it reusable acrosss process metrics * Install Backint OTE * Adding skip list logic to process metrics * Separating fastmoving metrics into a separate file from other process metrics * Update remote collection to use collected instance's Cloud Properties * ReadMetrics upload to bucket and send status to monitoring * Remove local implementation of DW API in favor of using generated third_party version * ReadMetrics read input file and write results to local filesystem * Clean up command line executions to collect SAP Control metrics * Adding new OTE structure for ReadMetrics * Add the SUSE specific spec file to keep upstream changes and SUSE packaging in sync * Collect and report upcoming maintenance * Add basepath override and gcealpha functionality * Making proto changes for process metrics re-arch * Changes for generating HANA Insights locally into a markdown file * Delay feature specific daily action logs by 24 hours to avoid noise created by startup failures * Update to the rule "maximum_invalid_connect_attempts" * Add some missing related resources * Fix rate limiting for compression enabled uploads/downloads * Optional User-Agent parameter added to storage package client connection * Relocate gcealpha to /internal * Fix parse_test error * Retries added for opening files in Backint * Make processmetrics unit tests hermetic * Remove if-this-then-that requirement from WLM validation rule * Fix WriteInsight JSON encoding, and add missing elements * Add configuration value to change API endpoint for Data Warehouse calls * Storage package progress messages based off of read/writes directly to the bucket * Make Collect DB Metrics as NO-OP when metrics are being read from override file * Remove unused field from backint proto * Custom retries for the storage package with exponential backoff and MaxRetries setting ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2024-130=1 ## Package List: * Public Cloud Module 12 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-2.8-6.19.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215672 * https://bugzilla.suse.com/show_bug.cgi?id=1215673 * https://bugzilla.suse.com/show_bug.cgi?id=1217373 * https://bugzilla.suse.com/show_bug.cgi?id=1217374 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 20:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 16 Jan 2024 20:30:05 -0000 Subject: SUSE-RU-2024:0131-1: moderate: Recommended update for sanlock Message-ID: <170543700596.27276.9561836593222756924@smelt2.prg2.suse.org> # Recommended update for sanlock Announcement ID: SUSE-RU-2024:0131-1 Rating: moderate References: * bsc#1181400 * bsc#1215229 * jsc#PED-7338 Affected Products: * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has two fixes can now be installed. ## Description: This update for sanlock fixes the following issues: * Update to sanlock 3.8.5 (jsc#PED-7338) * python: Replace distutils with setuptools * sanlock: fix memory leak of lockspace renewal_history * sanlock: fix pthread_create error check * sanlock: use helper to set max_sectors_kb * Add support for 4k sector size (bsc#1215229) * Dropped patches: sanlock-old_blkid, suse-fix-link-errors, sanlock-python3 * Add hardening to systemd services (bsc#1181400) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-131=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-131=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-131=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-131=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-131=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-131=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-131=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-131=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-131=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-131=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-131=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-131=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-131=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-131=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-131=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-131=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-131=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-131=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-131=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-131=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-131=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python3-sanlock-3.8.5-150000.4.6.1 * python3-sanlock-debuginfo-3.8.5-150000.4.6.1 * sanlk-reset-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * fence-sanlock-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * fence-sanlock-debuginfo-3.8.5-150000.4.6.1 * sanlk-reset-3.8.5-150000.4.6.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Manager Proxy 4.3 (x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 * SUSE CaaS Platform 4.0 (x86_64) * libsanlock1-debuginfo-3.8.5-150000.4.6.1 * sanlock-3.8.5-150000.4.6.1 * sanlock-debugsource-3.8.5-150000.4.6.1 * sanlock-devel-3.8.5-150000.4.6.1 * sanlock-debuginfo-3.8.5-150000.4.6.1 * libsanlock1-3.8.5-150000.4.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1181400 * https://bugzilla.suse.com/show_bug.cgi?id=1215229 * https://jira.suse.com/browse/PED-7338 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 20:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 16 Jan 2024 20:30:07 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170543700709.27276.4236344851096127882@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 20:33:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 16 Jan 2024 20:33:08 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170543718876.3422.16353325155717535411@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 20:36:11 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 16 Jan 2024 20:36:11 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170543737186.3213.9870059258820202541@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-doc-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-doc-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 20:39:13 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 16 Jan 2024 20:39:13 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170543755374.3422.12022011934723688828@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 08:30:00 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 08:30:00 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170548020083.10898.17055131731571085499@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 08:33:03 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 08:33:03 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170548038305.12145.16055552172921621834@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 08:36:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 08:36:05 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170548056530.11913.10827958593942879634@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-doc-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-doc-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 08:39:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 08:39:07 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170548074751.12145.12104006445855252262@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:30:02 -0000 Subject: SUSE-RU-2024:0132-1: moderate: Recommended update for gcc48 Message-ID: <170549460212.25570.17024295187954774037@smelt2.prg2.suse.org> # Recommended update for gcc48 Announcement ID: SUSE-RU-2024:0132-1 Rating: moderate References: * bsc#1218020 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that has one fix can now be installed. ## Description: This update for gcc48 fixes the following issues: * Fixed miscompilation of glibc wcstod function on aarch64. (bsc#1218020) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-132=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-132=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-132=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-132=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-132=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * cpp48-debuginfo-4.8.5-31.29.1 * gcc48-debugsource-4.8.5-31.29.1 * cpp48-4.8.5-31.29.1 * gcc48-debuginfo-4.8.5-31.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * gcc48-locale-4.8.5-31.29.1 * libstdc++48-devel-4.8.5-31.29.1 * libasan0-debuginfo-4.8.5-31.29.1 * gcc48-4.8.5-31.29.1 * libasan0-4.8.5-31.29.1 * gcc48-32bit-4.8.5-31.29.1 * libasan0-32bit-4.8.5-31.29.1 * libstdc++48-devel-32bit-4.8.5-31.29.1 * gcc48-c++-4.8.5-31.29.1 * gcc48-c++-debuginfo-4.8.5-31.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * gcc48-info-4.8.5-31.29.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * cpp48-debuginfo-4.8.5-31.29.1 * gcc48-debugsource-4.8.5-31.29.1 * cpp48-4.8.5-31.29.1 * gcc48-debuginfo-4.8.5-31.29.1 * SUSE Linux Enterprise Server 12 SP5 (ppc64le s390x x86_64) * gcc48-locale-4.8.5-31.29.1 * libstdc++48-devel-4.8.5-31.29.1 * gcc48-4.8.5-31.29.1 * gcc48-c++-4.8.5-31.29.1 * gcc48-c++-debuginfo-4.8.5-31.29.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * gcc48-info-4.8.5-31.29.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libstdc++48-devel-32bit-4.8.5-31.29.1 * gcc48-32bit-4.8.5-31.29.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * libasan0-debuginfo-4.8.5-31.29.1 * libasan0-32bit-4.8.5-31.29.1 * libasan0-4.8.5-31.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * cpp48-debuginfo-4.8.5-31.29.1 * gcc48-locale-4.8.5-31.29.1 * libstdc++48-devel-4.8.5-31.29.1 * gcc48-4.8.5-31.29.1 * gcc48-debuginfo-4.8.5-31.29.1 * gcc48-debugsource-4.8.5-31.29.1 * gcc48-c++-4.8.5-31.29.1 * gcc48-c++-debuginfo-4.8.5-31.29.1 * cpp48-4.8.5-31.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * gcc48-info-4.8.5-31.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libasan0-debuginfo-4.8.5-31.29.1 * libasan0-4.8.5-31.29.1 * gcc48-32bit-4.8.5-31.29.1 * libasan0-32bit-4.8.5-31.29.1 * libstdc++48-devel-32bit-4.8.5-31.29.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * gcc48-gij-32bit-4.8.5-31.29.1 * libgcj48-32bit-4.8.5-31.29.1 * gcc48-gij-debuginfo-4.8.5-31.29.1 * libgcj48-debuginfo-32bit-4.8.5-31.29.1 * libgcj48-4.8.5-31.29.1 * gcc48-gij-debuginfo-32bit-4.8.5-31.29.1 * libgcj48-debuginfo-4.8.5-31.29.1 * libgcj_bc1-4.8.5-31.29.1 * libgcj48-debugsource-4.8.5-31.29.1 * gcc48-gij-4.8.5-31.29.1 * libgcj48-jar-4.8.5-31.29.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64) * gcc48-locale-4.8.5-31.29.1 * libstdc++48-devel-4.8.5-31.29.1 * gcc48-4.8.5-31.29.1 * gcc48-c++-4.8.5-31.29.1 * gcc48-c++-debuginfo-4.8.5-31.29.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * gcc48-debuginfo-4.8.5-31.29.1 * gcc48-objc-4.8.5-31.29.1 * libgcj_bc1-4.8.5-31.29.1 * libgcj48-debugsource-4.8.5-31.29.1 * gcc48-gij-4.8.5-31.29.1 * gcc48-obj-c++-debuginfo-4.8.5-31.29.1 * gcc48-obj-c++-4.8.5-31.29.1 * gcc48-fortran-debuginfo-4.8.5-31.29.1 * gcc48-gij-debuginfo-4.8.5-31.29.1 * libgcj48-debuginfo-4.8.5-31.29.1 * gcc48-java-4.8.5-31.29.1 * libgcj48-jar-4.8.5-31.29.1 * libgcj48-devel-debuginfo-4.8.5-31.29.1 * libgcj48-devel-4.8.5-31.29.1 * gcc48-objc-debuginfo-4.8.5-31.29.1 * gcc48-fortran-4.8.5-31.29.1 * libgcj48-4.8.5-31.29.1 * gcc48-java-debuginfo-4.8.5-31.29.1 * gcc48-debugsource-4.8.5-31.29.1 * libffi48-debugsource-4.8.5-31.29.1 * libffi48-devel-4.8.5-31.29.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch) * gcc48-info-4.8.5-31.29.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (s390x x86_64) * gcc48-objc-32bit-4.8.5-31.29.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (x86_64) * libada48-4.8.5-31.29.1 * libada48-debuginfo-4.8.5-31.29.1 * gcc48-ada-4.8.5-31.29.1 * gcc48-ada-debuginfo-4.8.5-31.29.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218020 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:30:02 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170549460279.25570.17287088489775671718@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-doc-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-doc-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:30:05 -0000 Subject: SUSE-RU-2024:0127-1: moderate: Recommended update for google-cloud-sap-agent Message-ID: <170549460556.25570.8564426054055353689@smelt2.prg2.suse.org> # Recommended update for google-cloud-sap-agent Announcement ID: SUSE-RU-2024:0127-1 Rating: moderate References: * bsc#1215672 * bsc#1215673 * bsc#1217373 * bsc#1217374 Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has four fixes can now be installed. ## Description: This update for google-cloud-sap-agent contains the following fixes: * Update to version 2.8 (bsc#1217373, bsc#1217374) * Bump agent version to 2.8 to support C3/M3 certification * Update go.yml to use go 1.21 * Switch from "slices" to "go_exp.../slices" for go version dependency * Use newly refactored discovery packages. * Fixes issue with diskname from source or device name * Adds extreme disk type IOps and Throughput for host metrics * Add `INTEGRATION` target config environment for collection definition testing * Add project number to SAP System proto * Add a cache to discovered resources. This reduces the number of API calls needed to perform System Discovery * Replace windows wmic hardware queries with PowerShell wmi queries * Fix test flakiness * Improve development process for collection definition configuration * HANA PD based snapshot and restore - changes to add wait for uploading * Fix for kokoro build issue in processmetrics/networkstats * GCBDR SAPCoreAPP Package in Agent for SAP * Add version tracking for WLM validation config * Send workload validation config to remote instances for use during remote collection * Add flag for passing in workload validation config into remote collection OTE * Bump google.golang.org/grpc from 1.58.2 to 1.58.3 * from version 2.7 * Added ote for hma dashboards migration * Increase Max backoff in storage package to 300 seconds * Added subpaths for collection of required TCP metrics * Add more debug logs and increase the wait-time for PD operations in restore * No public description * Add 30 second timeout to read/write from the local file system for Backint * No public description * Adds RHEL 9 VM Manager policy * Extract cloud-related discovery functions into separate file * Adding timeout to systemReplication.py command execution * Allow download attempts without verifying connection to bucket * Invoke `collectiondefinition.Start` when starting the agent in daemon mode * SAP Agent CLI - usability improvements for flags and help menu * Add host project information to HANA DB component discovery data. * Use proto names for default configuration during Backint installation * Extending logging capabilities to all packages of the agent * Added a feature for exposing TCP connection metrics * Migrating context logging logic to all packages of SAP Agent * Add an ifthisthenthatlint to ensure new script is kept in sync with rule proto * (collectiondefition) - Discard unknown fields and remove breaking metrics * Moving commandlineexecutor from internal to shared for sqlserveragent * Define startup function for collectiondefinition package * Check error on close of destFile in backint restore * Allow trailing zeros for millisecond timestamps in Backint * Add pid to all agent logs * Bump SAP Agent version to 2.7 (placeholder release version) * Separate collection definition validation functionality into a separate file * Add datetime to migration folder for Backint installation * Add symlink for Backint log file to install directory * Set a deadline for the final flush to cloud logging * Increase chunk retry deadline in storage package * Fix order dependent tests in sapagent/internal/storage * Change support bundle feature to collect the OTE logs from new path * Usage logging for remote WLM validation metrics collection from the collector instance * Extract discovery functions performed on the host to a separate file * Improve agent shutdown experience in daemon mode * Fix Backint restoring incorrect file * Google Events - rule proto initial submission * Move gce package to shared folder for use by SQL Server agent * Add GCS integration into collectiondefinition package * Standardize import aliases * go mod updates * Fixing go/gotsan data race error in processmetrics_test * Add Backint support for Inquire line: `#EBID <external_backup_id>` * Chown Backint install directories to user/group of the opt/ folder * Create OTE logs under a subdir under /var/log as /var/log is only writable by root * Will not create an empty log file for logusage logs and one time execution logs will have 0666 file mode * Setting the log file created to world read+write permission * Bump golang.org/x/net from 0.15.0 to 0.17.0 * Add recovery_bucket parameter to Backint * Extract SAP related discovery functions to a separate file * Fix Backint install directory * Fix Backint parallel uploads * Move maintenance collector to beta API * Pruning batches to prevent time series duplication * Added a logger for incorporating service context keys in logs * Encode the DB password string to handle passwords with special characters * Handling non error scenarios better in netweaver.go * Internal change * fixes typo on backint install * Allow all users to execute google_cloud_sap_agent * Fix hdbbackint script. * Subdirs for Backint DIAGNOSE temporary files * Report zero-value metrics for upcoming maintenance * Clean up gcealpha functionality * Fix default configuration values in daemon and backint * Update the comment in proto to reflect that the metric path in skip list should start with /sap * Implemented separation of context of different services * Update to version 2.6 (bsc#1215672, bsc#1215673) * Rolling back previous change for storing Project Number, Project ID is sufficient, no need to add complexity * Determine location of HANA global.ini using SAP system discovery logic * Add numeric project ID prefix to object name for ReadMetrics * Discovery now looks up and stores project number with discovery data * ReadMetrics updates for IAM permissions and bucket object names * fixing the bug in backoff logic, using separate policies for each collector and adding some logs * Backint migration from the old agent and supporting legacy parameters * adding new backoff policies for process metrics and fixing the bug in process metrics sapservice collector * Bump SAP Agent version to 2.6 * Fix an issue where HANA hosts may not be discovered properly if hostname differs from instance name * Use Go 1.20 friendly sorting solution * adding retries in process metrics logic with backoffs * Fix parsing of instance (host/VM) name in Pacemaker pcmk_delay_max metric * Add the collection definition changes for the SAP HANA Topology metrics * Template for Cloud Monitoring Alerts for Backint errors * adding backoff to InstanceProperties to each collector * Reduced the number of parameters of startXX functions by consolidating them into respective structs * completing TODO (b/298315981): Create a map from skipped list metrics and pass it to collectors. * Proto package name changes to reflect the current path * Use instance_name instead of instance_id for baremetal systems * Decode encryption keys for Backint. * Moving hareplication metric to fast moving metrics * Added backoffs package in process metrics to keep the backoff policies and retry policies separately and make it reusable acrosss process metrics * Install Backint OTE * Adding skip list logic to process metrics * Separating fastmoving metrics into a separate file from other process metrics * Update remote collection to use collected instance's Cloud Properties * ReadMetrics upload to bucket and send status to monitoring * Remove local implementation of DW API in favor of using generated third_party version * ReadMetrics read input file and write results to local filesystem * Clean up command line executions to collect SAP Control metrics * Adding new OTE structure for ReadMetrics * Add the SUSE specific spec file to keep upstream changes and SUSE packaging in sync * Collect and report upcoming maintenance * Add basepath override and gcealpha functionality * Making proto changes for process metrics re-arch * Changes for generating HANA Insights locally into a markdown file * Delay feature specific daily action logs by 24 hours to avoid noise created by startup failures * Update to the rule "maximum_invalid_connect_attempts" * Add some missing related resources * Fix rate limiting for compression enabled uploads/downloads * Optional User-Agent parameter added to storage package client connection * Relocate gcealpha to /internal * Fix parse_test error * Retries added for opening files in Backint * Make processmetrics unit tests hermetic * Remove if-this-then-that requirement from WLM validation rule * Fix WriteInsight JSON encoding, and add missing elements * Add configuration value to change API endpoint for Data Warehouse calls * Storage package progress messages based off of read/writes directly to the bucket * Make Collect DB Metrics as NO-OP when metrics are being read from override file * Remove unused field from backint proto * Custom retries for the storage package with exponential backoff and MaxRetries setting ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-127=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-127=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-127=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-127=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-127=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-127=1 ## Package List: * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-2.8-150100.3.20.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-2.8-150100.3.20.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-2.8-150100.3.20.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-2.8-150100.3.20.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-2.8-150100.3.20.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-2.8-150100.3.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215672 * https://bugzilla.suse.com/show_bug.cgi?id=1215673 * https://bugzilla.suse.com/show_bug.cgi?id=1217373 * https://bugzilla.suse.com/show_bug.cgi?id=1217374 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:30:07 -0000 Subject: SUSE-RU-2024:0126-1: moderate: Recommended update for suseconnect-ng Message-ID: <170549460717.25570.2154491388906108784@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0126-1 Rating: moderate References: * bsc#1218364 Affected Products: * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Update to version 1.5.0 * Configure docker credentials for registry authentication * Feature: Support usage from Agama + Cockpit for ALP Micro system registration (bsc#1218364) * Add --json output option ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP1 zypper in -t patch SUSE-SLE-INSTALLER-15-SP1-2024-126=1 * SUSE Linux Enterprise Server 15 SP2 zypper in -t patch SUSE-SLE-INSTALLER-15-SP2-2024-126=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-126=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-126=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-126=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-126=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-126=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-126=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-126=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-126=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-126=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-126=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-126=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE Linux Enterprise Server 15 SP1 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE Linux Enterprise Server 15 SP2 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * SUSE CaaS Platform 4.0 (x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-1.5.0~git0.d27a8e2-150100.3.12.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150100.3.12.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150100.3.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218364 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:30:08 -0000 Subject: SUSE-RU-2024:0125-1: moderate: Recommended update for suseconnect-ng Message-ID: <170549460855.25570.7691846936438758988@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0125-1 Rating: moderate References: * bsc#1218364 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Update to version 1.5.0 * Configure docker credentials for registry authentication * Feature: Support usage from Agama + Cockpit for ALP Micro system registration (bsc#1218364) * Add --json output option ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-125=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-125=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-125=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-125=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-125=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-125=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-125=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-125=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-125=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-125=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-125=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-125=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-125=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-125=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-125=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-125=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Manager Proxy 4.3 (x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218364 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:33:10 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:33:10 -0000 Subject: SUSE-RU-2024:0125-1: moderate: Recommended update for suseconnect-ng Message-ID: <170549479009.26918.16793555092226092709@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0125-1 Rating: moderate References: * bsc#1218364 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Update to version 1.5.0 * Configure docker credentials for registry authentication * Feature: Support usage from Agama + Cockpit for ALP Micro system registration (bsc#1218364) * Add --json output option ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-125=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-125=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-125=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-125=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-125=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-125=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-125=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-125=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-125=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-125=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-125=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-125=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-125=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-125=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-125=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-125=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Manager Proxy 4.3 (x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218364 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:11 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:11 -0000 Subject: SUSE-RU-2024:0125-1: moderate: Recommended update for suseconnect-ng Message-ID: <170549497153.26918.638040443046613671@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0125-1 Rating: moderate References: * bsc#1218364 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Update to version 1.5.0 * Configure docker credentials for registry authentication * Feature: Support usage from Agama + Cockpit for ALP Micro system registration (bsc#1218364) * Add --json output option ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-125=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-125=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-125=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-125=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-125=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-125=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-125=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-125=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-125=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-125=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-125=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-125=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-125=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-125=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-125=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-125=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Manager Proxy 4.3 (x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libsuseconnect-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150400.3.19.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150400.3.19.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218364 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:13 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:13 -0000 Subject: SUSE-RU-2024:0124-1: moderate: Recommended update for suseconnect-ng Message-ID: <170549497322.26918.18408975782984005107@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0124-1 Rating: moderate References: * bsc#1218364 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Update to version 1.5.0 * Configure docker credentials for registry authentication * Feature: Support usage from Agama + Cockpit for ALP Micro system registration (bsc#1218364) * Add --json output option ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-124=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-124=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-124=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150500.3.9.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150500.3.9.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150500.3.9.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150500.3.9.1 * libsuseconnect-1.5.0~git0.d27a8e2-150500.3.9.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150500.3.9.1 * suseconnect-ruby-bindings-1.5.0~git0.d27a8e2-150500.3.9.1 * libsuseconnect-debuginfo-1.5.0~git0.d27a8e2-150500.3.9.1 * suseconnect-ng-1.5.0~git0.d27a8e2-150500.3.9.1 * libsuseconnect-1.5.0~git0.d27a8e2-150500.3.9.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150500.3.9.1 * suseconnect-ng-debuginfo-1.5.0~git0.d27a8e2-150500.3.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218364 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:18 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:18 -0000 Subject: SUSE-RU-2024:0123-1: moderate: Recommended update for suseconnect-ng Message-ID: <170549497804.26918.16297132192870379485@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0123-1 Rating: moderate References: * bsc#1170267 * bsc#1195220 * bsc#1195729 * bsc#1196076 * bsc#1196326 * bsc#1197398 * bsc#1198625 * bsc#1200803 * bsc#1200994 * bsc#1202705 * bsc#1203341 * bsc#1207876 * bsc#1211588 * bsc#1212799 * bsc#1214781 * bsc#1218364 * jsc#PED-3179 Affected Products: * SUSE Linux Enterprise Micro 5.1 An update that contains one feature and has 16 fixes can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Update to version 1.5.0 * Configure docker credentials for registry authentication * Feature: Support usage from Agama + Cockpit for ALP Micro system registration (bsc#1218364) * Add --json output option * Added EULA display for addons (bsc#1170267) * Fix zypper argument for auto-agreeing licenses (bsc#1214781) * Enable building on SLE12 SP5 (jsc#PED-3179) * Fixed `provides` to work with yast2-registration on SLE15 SP4 (bsc#1212799) * Keep keepalive timer states when replacing SUSEConnect (bsc#1211588) * Make keepalive on SUMA systems exit without error (bsc#1207876) * Add deactivate API to ruby bindings (bsc#1202705) * Don't write system_token to service credentials files * Allow non-root users to use --version * Fix keepalive feature notice during installation * Fix requires for all rhel clone distributions like alma, rocky... * Fix System-Token support in ruby binding (bsc#1203341) * Respect the PROXY_ENABLED environment variable * Use system-wide proxy settings (bsc#1200994) * Add timer for SUSEConnect --keepalive (bsc#1196076) * Print nested zypper errors (bsc#1200803) * Fix migration json error with SMT (bsc#1198625) * Allow reloading CA certs pool (bsc#1195220) * Fix product tree traversal (bsc#1197398) * Revert "Remove self from LD_PRELOAD (bsc#1196326)" * Remove self from LD_PRELOAD (bsc#1196326) * Delegate free() calls back to Go (bsc#1195729) * Workaround system cert reloading after import (bsc#1195220) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-123=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150300.3.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1170267 * https://bugzilla.suse.com/show_bug.cgi?id=1195220 * https://bugzilla.suse.com/show_bug.cgi?id=1195729 * https://bugzilla.suse.com/show_bug.cgi?id=1196076 * https://bugzilla.suse.com/show_bug.cgi?id=1196326 * https://bugzilla.suse.com/show_bug.cgi?id=1197398 * https://bugzilla.suse.com/show_bug.cgi?id=1198625 * https://bugzilla.suse.com/show_bug.cgi?id=1200803 * https://bugzilla.suse.com/show_bug.cgi?id=1200994 * https://bugzilla.suse.com/show_bug.cgi?id=1202705 * https://bugzilla.suse.com/show_bug.cgi?id=1203341 * https://bugzilla.suse.com/show_bug.cgi?id=1207876 * https://bugzilla.suse.com/show_bug.cgi?id=1211588 * https://bugzilla.suse.com/show_bug.cgi?id=1212799 * https://bugzilla.suse.com/show_bug.cgi?id=1214781 * https://bugzilla.suse.com/show_bug.cgi?id=1218364 * https://jira.suse.com/browse/PED-3179 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:21 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:21 -0000 Subject: SUSE-RU-2024:0122-1: moderate: Recommended update for suseconnect-ng Message-ID: <170549498148.26918.1144047367151953811@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0122-1 Rating: moderate References: * bsc#1170267 * bsc#1195220 * bsc#1195729 * bsc#1196076 * bsc#1196326 * bsc#1197398 * bsc#1198625 * bsc#1200803 * bsc#1200994 * bsc#1202705 * bsc#1203341 * bsc#1207876 * bsc#1211588 * bsc#1212799 * bsc#1214781 * bsc#1218364 * jsc#PED-3179 Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that contains one feature and has 16 fixes can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Update to version 1.5.0 * Configure docker credentials for registry authentication * Feature: Support usage from Agama + Cockpit for ALP Micro system registration (bsc#1218364) * Add --json output option * Added EULA display for addons (bsc#1170267) * Fix zypper argument for auto-agreeing licenses (bsc#1214781) * Enable building on SLE12 SP5 (jsc#PED-3179) * Fixed `provides` to work with yast2-registration on SLE15 SP4 (bsc#1212799) * Keep keepalive timer states when replacing SUSEConnect (bsc#1211588) * Make keepalive on SUMA systems exit without error (bsc#1207876) * Add deactivate API to ruby bindings (bsc#1202705) * Don't write system_token to service credentials files * Allow non-root users to use --version * Fix keepalive feature notice during installation * Fix requires for all rhel clone distributions like alma, rocky... * Fix System-Token support in ruby binding (bsc#1203341) * Respect the PROXY_ENABLED environment variable * Use system-wide proxy settings (bsc#1200994) * Add timer for SUSEConnect --keepalive (bsc#1196076) * Print nested zypper errors (bsc#1200803) * Fix migration json error with SMT (bsc#1198625) * Allow reloading CA certs pool (bsc#1195220) * Fix product tree traversal (bsc#1197398) * Revert "Remove self from LD_PRELOAD (bsc#1196326)" * Remove self from LD_PRELOAD (bsc#1196326) * Delegate free() calls back to Go (bsc#1195729) * Workaround system cert reloading after import (bsc#1195220) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-122=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-122=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150300.3.3.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * suseconnect-ng-1.5.0~git0.d27a8e2-150300.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1170267 * https://bugzilla.suse.com/show_bug.cgi?id=1195220 * https://bugzilla.suse.com/show_bug.cgi?id=1195729 * https://bugzilla.suse.com/show_bug.cgi?id=1196076 * https://bugzilla.suse.com/show_bug.cgi?id=1196326 * https://bugzilla.suse.com/show_bug.cgi?id=1197398 * https://bugzilla.suse.com/show_bug.cgi?id=1198625 * https://bugzilla.suse.com/show_bug.cgi?id=1200803 * https://bugzilla.suse.com/show_bug.cgi?id=1200994 * https://bugzilla.suse.com/show_bug.cgi?id=1202705 * https://bugzilla.suse.com/show_bug.cgi?id=1203341 * https://bugzilla.suse.com/show_bug.cgi?id=1207876 * https://bugzilla.suse.com/show_bug.cgi?id=1211588 * https://bugzilla.suse.com/show_bug.cgi?id=1212799 * https://bugzilla.suse.com/show_bug.cgi?id=1214781 * https://bugzilla.suse.com/show_bug.cgi?id=1218364 * https://jira.suse.com/browse/PED-3179 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:24 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:24 -0000 Subject: SUSE-SU-2024:0121-1: important: Security update for xorg-x11-server Message-ID: <170549498431.26918.12027579539837699786@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2024:0121-1 Rating: important References: * bsc#1218582 * bsc#1218583 * bsc#1218584 * bsc#1218585 Cross-References: * CVE-2023-6816 * CVE-2024-0229 * CVE-2024-21885 * CVE-2024-21886 CVSS scores: * CVE-2023-6816 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0229 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21885 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21886 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582) * CVE-2024-0229: Fixed reattaching to different master device may lead to out- of-bounds memory access (bsc#1218583) * CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584) * CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-121=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-121=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-121=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-121=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-121=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-121=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-121=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-121=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-121=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-121=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * xorg-x11-server-wayland-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-wayland-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * xorg-x11-server-wayland-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-wayland-1.20.3-150200.22.5.88.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6816.html * https://www.suse.com/security/cve/CVE-2024-0229.html * https://www.suse.com/security/cve/CVE-2024-21885.html * https://www.suse.com/security/cve/CVE-2024-21886.html * https://bugzilla.suse.com/show_bug.cgi?id=1218582 * https://bugzilla.suse.com/show_bug.cgi?id=1218583 * https://bugzilla.suse.com/show_bug.cgi?id=1218584 * https://bugzilla.suse.com/show_bug.cgi?id=1218585 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:29 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:29 -0000 Subject: SUSE-SU-2024:0118-1: important: Security update for the Linux Kernel Message-ID: <170549498914.26918.6386357268067085630@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0118-1 Rating: important References: * bsc#1109837 * bsc#1179610 * bsc#1202095 * bsc#1211226 * bsc#1211439 * bsc#1214479 * bsc#1215237 * bsc#1217036 * bsc#1217250 * bsc#1217801 * bsc#1217936 * bsc#1217946 * bsc#1217947 * bsc#1218057 * bsc#1218184 * bsc#1218253 * bsc#1218258 * bsc#1218362 * bsc#1218559 * bsc#1218622 * jsc#PED-5021 * jsc#PED-5023 Cross-References: * CVE-2020-26555 * CVE-2022-2586 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2022-2586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Real Time 12 SP5 * SUSE Linux Enterprise Server 12 SP5 An update that solves eight vulnerabilities, contains two features and has 12 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237). * CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). The following non-security bugs were fixed: * Enabled the LLC counters for ?perf? (perf stat) on the Ice-Lake and Rocket- Lake CPUs (jsc#PED-5023 bsc#1211439). * Reviewed and added more information to README.SUSE (jsc#PED-5021). * Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184). * Fix termination state for idr_for_each_entry_ul() (bsc#1109837). * KVM: s390/mm: Properly reset no-dat (bsc#1218057). * KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217936). * PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1218622). * Previous perf cve-4.12->SLE12-SP5 manual merge was incorrect. Fix. * gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479). * gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479). * gve: Changes to add new TX queues (bsc#1214479). * gve: Control path for DQO-QPL (bsc#1214479). * gve: Do not fully free QPL pages on prefill errors (bsc#1214479). * gve: Fix gve interrupt names (bsc#1214479). * gve: Fixes for napi_poll when budget is 0 (bsc#1214479). * gve: RX path for DQO-QPL (bsc#1214479). * gve: Set default duplex configuration to full (bsc#1214479). * gve: Tx path for DQO-QPL (bsc#1214479). * gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479). * gve: XDP support GQI-QPL: helper function changes (bsc#1214479). * gve: fix frag_list chaining (bsc#1214479). * gve: trivial spell fix Recive to Receive (bsc#1214479). * gve: unify driver name usage (bsc#1214479). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1217801). * s390/vx: fix save/restore of fpu kernel context (bsc#1218362). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Real Time 12 SP5 zypper in -t patch SUSE-SLE-RT-12-SP5-2024-118=1 ## Package List: * SUSE Linux Enterprise Real Time 12 SP5 (x86_64) * kernel-rt-devel-4.12.14-10.157.1 * kernel-rt_debug-devel-debuginfo-4.12.14-10.157.1 * kernel-rt-base-debuginfo-4.12.14-10.157.1 * kernel-rt-debugsource-4.12.14-10.157.1 * kernel-rt-debuginfo-4.12.14-10.157.1 * kernel-rt_debug-debugsource-4.12.14-10.157.1 * ocfs2-kmp-rt-4.12.14-10.157.1 * kernel-rt_debug-debuginfo-4.12.14-10.157.1 * dlm-kmp-rt-4.12.14-10.157.1 * kernel-rt_debug-devel-4.12.14-10.157.1 * cluster-md-kmp-rt-4.12.14-10.157.1 * ocfs2-kmp-rt-debuginfo-4.12.14-10.157.1 * gfs2-kmp-rt-debuginfo-4.12.14-10.157.1 * gfs2-kmp-rt-4.12.14-10.157.1 * kernel-rt-base-4.12.14-10.157.1 * kernel-syms-rt-4.12.14-10.157.1 * cluster-md-kmp-rt-debuginfo-4.12.14-10.157.1 * kernel-rt-devel-debuginfo-4.12.14-10.157.1 * dlm-kmp-rt-debuginfo-4.12.14-10.157.1 * SUSE Linux Enterprise Real Time 12 SP5 (noarch) * kernel-source-rt-4.12.14-10.157.1 * kernel-devel-rt-4.12.14-10.157.1 * SUSE Linux Enterprise Real Time 12 SP5 (nosrc x86_64) * kernel-rt_debug-4.12.14-10.157.1 * kernel-rt-4.12.14-10.157.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2022-2586.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1109837 * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1202095 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1211439 * https://bugzilla.suse.com/show_bug.cgi?id=1214479 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217936 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218057 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218362 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218622 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-5023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:31 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:31 -0000 Subject: SUSE-SU-2024:0116-1: important: Security update for xorg-x11-server Message-ID: <170549499125.26918.10307367075884326582@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2024:0116-1 Rating: important References: * bsc#1218582 * bsc#1218583 * bsc#1218584 * bsc#1218585 Cross-References: * CVE-2023-6816 * CVE-2024-0229 * CVE-2024-21885 * CVE-2024-21886 CVSS scores: * CVE-2023-6816 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0229 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21885 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21886 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582) * CVE-2024-0229: Fixed reattaching to different master device may lead to out- of-bounds memory access (bsc#1218583) * CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584) * CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-116=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-116=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-116=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-116=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * xorg-x11-server-extra-1.19.6-10.65.1 * xorg-x11-server-extra-debuginfo-1.19.6-10.65.1 * xorg-x11-server-debugsource-1.19.6-10.65.1 * xorg-x11-server-debuginfo-1.19.6-10.65.1 * xorg-x11-server-1.19.6-10.65.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-1.19.6-10.65.1 * xorg-x11-server-extra-debuginfo-1.19.6-10.65.1 * xorg-x11-server-debugsource-1.19.6-10.65.1 * xorg-x11-server-debuginfo-1.19.6-10.65.1 * xorg-x11-server-1.19.6-10.65.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * xorg-x11-server-extra-1.19.6-10.65.1 * xorg-x11-server-extra-debuginfo-1.19.6-10.65.1 * xorg-x11-server-debugsource-1.19.6-10.65.1 * xorg-x11-server-debuginfo-1.19.6-10.65.1 * xorg-x11-server-1.19.6-10.65.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-debuginfo-1.19.6-10.65.1 * xorg-x11-server-sdk-1.19.6-10.65.1 * xorg-x11-server-debugsource-1.19.6-10.65.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6816.html * https://www.suse.com/security/cve/CVE-2024-0229.html * https://www.suse.com/security/cve/CVE-2024-21885.html * https://www.suse.com/security/cve/CVE-2024-21886.html * https://bugzilla.suse.com/show_bug.cgi?id=1218582 * https://bugzilla.suse.com/show_bug.cgi?id=1218583 * https://bugzilla.suse.com/show_bug.cgi?id=1218584 * https://bugzilla.suse.com/show_bug.cgi?id=1218585 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:33 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:33 -0000 Subject: SUSE-SU-2024:0114-1: important: Security update for xwayland Message-ID: <170549499308.26918.7978763022912948818@smelt2.prg2.suse.org> # Security update for xwayland Announcement ID: SUSE-SU-2024:0114-1 Rating: important References: * bsc#1218582 * bsc#1218583 * bsc#1218584 * bsc#1218585 Cross-References: * CVE-2023-6816 * CVE-2024-0229 * CVE-2024-21885 * CVE-2024-21886 CVSS scores: * CVE-2023-6816 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0229 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21885 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21886 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for xwayland fixes the following issues: * CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582) * CVE-2024-0229: Fixed reattaching to different master device may lead to out- of-bounds memory access (bsc#1218583) * CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584) * CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-114=1 openSUSE-SLE-15.5-2024-114=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-114=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * xwayland-22.1.5-150500.7.14.1 * xwayland-debugsource-22.1.5-150500.7.14.1 * xwayland-devel-22.1.5-150500.7.14.1 * xwayland-debuginfo-22.1.5-150500.7.14.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * xwayland-22.1.5-150500.7.14.1 * xwayland-debugsource-22.1.5-150500.7.14.1 * xwayland-debuginfo-22.1.5-150500.7.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6816.html * https://www.suse.com/security/cve/CVE-2024-0229.html * https://www.suse.com/security/cve/CVE-2024-21885.html * https://www.suse.com/security/cve/CVE-2024-21886.html * https://bugzilla.suse.com/show_bug.cgi?id=1218582 * https://bugzilla.suse.com/show_bug.cgi?id=1218583 * https://bugzilla.suse.com/show_bug.cgi?id=1218584 * https://bugzilla.suse.com/show_bug.cgi?id=1218585 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:39 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:39 -0000 Subject: SUSE-SU-2024:0113-1: important: Security update for the Linux Kernel Message-ID: <170549499958.26918.15443010046479134359@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0113-1 Rating: important References: * bsc#1108281 * bsc#1109837 * bsc#1179610 * bsc#1202095 * bsc#1211226 * bsc#1211439 * bsc#1214479 * bsc#1215237 * bsc#1217036 * bsc#1217250 * bsc#1217801 * bsc#1217936 * bsc#1217946 * bsc#1217947 * bsc#1218057 * bsc#1218184 * bsc#1218253 * bsc#1218258 * bsc#1218362 * bsc#1218559 * bsc#1218622 * jsc#PED-5021 * jsc#PED-5023 Cross-References: * CVE-2020-26555 * CVE-2022-2586 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2022-2586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves eight vulnerabilities, contains two features and has 13 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). The following non-security bugs were fixed: * Fix termination state for idr_for_each_entry_ul() (bsc#1109837). * Input: powermate - fix use-after-free in powermate_config_complete (git- fixes). * KVM: s390/mm: Properly reset no-dat (git-fixes bsc#1218057). * KVM: s390: vsie: fix wrong VIR 37 when MSO is used (git-fixes bsc#1217936). * Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281). * PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1218622). * Resolve build warnings from previous series due to missing commit for Ice Lake freerunning counters perf/x86/intel/uncore: Add box_offsets for free- running counters (jsc#PED-5023 bsc#1211439). * Revert "Limit kernel-source-azure build to architectures for which we build binaries (bsc#1108281)." * bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes). * bcache: Remove unnecessary NULL point check in node allocations (git-fixes). * bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes). * bcache: check return value from btree_node_alloc_replacement() (git-fixes). * bcache: prevent potential division by zero error (git-fixes). * bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes). * bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes). * dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes). * dm cache: add cond_resched() to various workqueue loops (git-fixes). * dm crypt: add cond_resched() to dmcrypt_write() (git-fixes). * dm flakey: do not corrupt the zero page (git-fixes). * dm flakey: fix a crash with invalid table line (git-fixes). * dm flakey: fix logic when corrupting a bio (git-fixes). * dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes). * dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git- fixes). * dm stats: check for and propagate alloc_percpu failure (git-fixes). * dm thin: add cond_resched() to various workqueue loops (git-fixes). * dm verity: do not perform FEC for failed readahead IO (git-fixes). * dm verity: fix error handling for check_at_most_once on FEC (git-fixes). * dm verity: skip redundant verity_handle_err() on I/O errors (git-fixes). * dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes). * dm-verity: align struct dm_verity_fec_io properly (git-fixes). * dm: remove flush_scheduled_work() during local_exit() (git-fixes). * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021) * gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479). * gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479). * gve: Changes to add new TX queues (bsc#1214479). * gve: Control path for DQO-QPL (bsc#1214479). * gve: Do not fully free QPL pages on prefill errors (bsc#1214479). * gve: Fix gve interrupt names (bsc#1214479). * gve: Fixes for napi_poll when budget is 0 (bsc#1214479). * gve: RX path for DQO-QPL (bsc#1214479). * gve: Set default duplex configuration to full (bsc#1214479). * gve: Tx path for DQO-QPL (bsc#1214479). * gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479). * gve: XDP support GQI-QPL: helper function changes (bsc#1214479). * gve: fix frag_list chaining (bsc#1214479). * gve: trivial spell fix Recive to Receive (bsc#1214479). * gve: unify driver name usage (bsc#1214479). * ip6_gre: proper dev_{hold|put} in ndo_[un]init methods (git-fixes). * ip6_tunnel: sit: proper dev_{hold|put} in ndo_[un]init methods (git-fixes). * ip6_vti: proper dev_{hold|put} in ndo_[un]init methods (git-fixes). * ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes). * ipv6: remove extra dev_hold() for fallback tunnels (git-fixes). * md/raid0: add discard support for the 'original' layout (git-fixes). * md/raid1: fix error: ISO C90 forbids mixed declarations (git-fixes). * md/raid1: free the r1bio before waiting for blocked rdev (git-fixes). * md/raid1: hold the barrier until handle_read_error() finishes (git-fixes). * md: do not leave 'MD_RECOVERY_FROZEN' in error path of md_set_readonly() (git-fixes). * md: raid1: fix potential OOB in raid1_remove_disk() (git-fixes). * md: restore 'noio_flag' for the last mddev_resume() (git-fixes). * mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files. * nbd: Add the maximum limit of allocated index in nbd_dev_add (git-fixes). * nbd: Fix debugfs_create_dir error checking (git-fixes). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1217801). * net: dsa: mv88e6xxx: Fix 88E6141/6341 2500mbps SERDES speed (git-fixes). * net: ethernet: ti: cpsw: unsync mcast entries while switch promisc mode (git-fixes). * net: macb: disable scatter-gather for macb on sama5d3 (git-fixes). * net: stmmac: Move debugfs init/exit to ->probe()/->remove() (git-fixes). * net: usb: ax88179_178a: fix failed operations during ax88179_reset (git- fixes). * net: usb: qmi_wwan: claim interface 4 for ZTE MF290 (git-fixes). * net: usb: smsc95xx: Fix an error code in smsc95xx_reset() (git-fixes). * net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git- fixes). * netfilter: compat: prepare xt_compat_init_offsets to return errors (git- fixes). * netfilter: compat: reject huge allocation requests (git-fixes). * netfilter: ebtables: also count base chain policies (git-fixes). * netfilter: ebtables: compat: un-break 32bit setsockopt when no rules are present (git-fixes). * netfilter: ebtables: do not attempt to allocate 0-sized compat array (git- fixes). * netfilter: nf_tables: fix use-after-free when deleting compat expressions (git-fixes). * netfilter: nft_compat: use-after-free when deleting targets (git-fixes). * netfilter: preserve KABI for xt_compat_init_offsets (git-fixes). * nvme: sanitize metadata bounce buffer for reads (git-fixes). * perf/x86/cstate: Add Rocket Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/cstate: Add Tiger Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/cstate: Update C-state counters for Ice Lake (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add Comet Lake support (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add IMC uncore support for Snow Ridge (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add Ice Lake server uncore support (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add Rocket Lake support (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add new IMC PCI IDs for KabyLake, AmberLake and WhiskeyLake CPUs (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add tabs to Uncore IMC PCI IDs (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add uncore support for Snow Ridge server (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Clean up client IMC (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Factor out __snr_uncore_mmio_init_box (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Factor out box ref/unref functions (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Fix CAS_COUNT_WRITE issue for ICX (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix IIO event constraints for Snowridge (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix Intel ICX IIO event constraints (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix M2M event umask for Ice Lake server (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix broken read_counter() for SNB IMC PMU (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix integer overflow on 23 bit left shift of a u32 (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix missing marker for snr_uncore_imc_freerunning_events (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix oops when counting IMC uncore events on some TGL (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix reference count leak in __uncore_imc_init_box() (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map() (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix the scale of the IMC free-running events (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Split the Ice Lake and Tiger Lake MSR uncore support (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Support MMIO type uncore blocks (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Support extra IMC channel on Ice Lake server (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Update Ice Lake uncore units (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Add Icelake desktop CPUID (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Add Rocket Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Add Tiger Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Add more Icelake CPUIDs (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Fix Ice Lake event constraint table (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Fix invalid Bit 13 for Icelake MSR_OFFCORE_RSP_x register (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Mark expected switch fall-throughs (jsc#PED-5023 bsc#1211439). * perf/x86/msr: Add Comet Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/msr: Add Rocket Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/msr: Add Tiger Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/msr: Add new CPU model numbers for Ice Lake (jsc#PED-5023 bsc#1211439). * perf/x86/rapl: Add Ice Lake RAPL support (jsc#PED-5023 bsc#1211439). * perf/x86: Add Intel Ice Lake NNPI uncore support (jsc#PED-5023 bsc#1211439). * perf/x86: Add Intel Tiger Lake uncore support (jsc#PED-5023 bsc#1211439). * r8152: Add RTL8152_INACCESSIBLE checks to more loops (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_aldps_en() (git-fixes). * r8152: Cancel hw_phy_work if we have an error in probe (git-fixes). * r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes). * r8152: Rename RTL8152_UNPLUG to RTL8152_INACCESSIBLE (git-fixes). * r8152: Run the unload routine if we have errors during probe (git-fixes). * rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails (git- fixes). * ring-buffer: Fix memory leak of free page (git-fixes). * s390/vx: fix save/restore of fpu kernel context (git-fixes bsc#1218362). * sit: proper dev_{hold|put} in ndo_[un]init methods (git-fixes). * tcp: fix under-evaluated ssthresh in TCP Vegas (git-fixes). * tracing: Always update snapshot buffer size (git-fixes). * tracing: Disable snapshot buffer when stopping instance tracers (git-fixes). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (git-fixes, bsc#1217036). * tracing: Stop current tracer when resizing buffer (git-fixes). * tracing: Update snapshot buffer on resize if it is allocated (git-fixes). * tracing: relax trace_event_eval_update() execution with cond_resched() (git- fixes). * usb: config: fix iteration issue in 'usb_get_bos_descriptor()' (git-fixes). * x86/cpu: Add Comet Lake to the Intel CPU models header (jsc#PED-5023 bsc#1211439). * x86/cpu: Add Ice Lake NNPI to Intel family (jsc#PED-5023 bsc#1211439). * x86/cpu: Add Lakefield, Alder Lake and Rocket Lake models to the to Intel CPU family (jsc#PED-5023 bsc#1211439). * x86/cpu: Add Sapphire Rapids CPU model number (jsc#PED-5023 bsc#1211439). * x86/cpu: Add Tiger Lake to Intel family (jsc#PED-5023 bsc#1211439). * xfrm6: fix inet6_dev refcount underflow problem (git-fixes). * xfrm: reuse uncached_list to track xdsts (git-fixes). * xhci: Clear EHB bit only at end of interrupt handler (git-fixes). * xsk: Fix incorrect netdev reference count (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-113=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-113=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-113=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.163.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-azure-base-4.12.14-16.163.1 * kernel-azure-devel-4.12.14-16.163.1 * kernel-azure-debuginfo-4.12.14-16.163.1 * kernel-azure-base-debuginfo-4.12.14-16.163.1 * kernel-azure-debugsource-4.12.14-16.163.1 * kernel-syms-azure-4.12.14-16.163.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-source-azure-4.12.14-16.163.1 * kernel-devel-azure-4.12.14-16.163.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.163.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-azure-base-4.12.14-16.163.1 * kernel-azure-devel-4.12.14-16.163.1 * kernel-azure-debuginfo-4.12.14-16.163.1 * kernel-azure-base-debuginfo-4.12.14-16.163.1 * kernel-azure-debugsource-4.12.14-16.163.1 * kernel-syms-azure-4.12.14-16.163.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-source-azure-4.12.14-16.163.1 * kernel-devel-azure-4.12.14-16.163.1 * SUSE Linux Enterprise Server 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.163.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-azure-base-4.12.14-16.163.1 * kernel-azure-devel-4.12.14-16.163.1 * kernel-azure-debuginfo-4.12.14-16.163.1 * kernel-azure-base-debuginfo-4.12.14-16.163.1 * kernel-azure-debugsource-4.12.14-16.163.1 * kernel-syms-azure-4.12.14-16.163.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-source-azure-4.12.14-16.163.1 * kernel-devel-azure-4.12.14-16.163.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2022-2586.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1109837 * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1202095 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1211439 * https://bugzilla.suse.com/show_bug.cgi?id=1214479 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217936 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218057 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218362 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218622 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-5023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:44 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:44 -0000 Subject: SUSE-SU-2024:0112-1: important: Security update for the Linux Kernel Message-ID: <170549500474.26918.4539521070759149868@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0112-1 Rating: important References: * bsc#1179610 * bsc#1205762 * bsc#1210778 * bsc#1212051 * bsc#1212703 * bsc#1215237 * bsc#1215858 * bsc#1215860 * bsc#1216046 * bsc#1216058 * bsc#1216976 * bsc#1217947 * bsc#1218253 * bsc#1218559 Cross-References: * CVE-2020-26555 * CVE-2022-45887 * CVE-2023-1206 * CVE-2023-31085 * CVE-2023-3111 * CVE-2023-39189 * CVE-2023-39192 * CVE-2023-39193 * CVE-2023-39197 * CVE-2023-45863 * CVE-2023-51779 * CVE-2023-6606 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2022-45887 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-45887 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1206 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1206 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-31085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-31085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3111 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-39189 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2023-39189 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2023-39192 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2023-39192 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2023-39193 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2023-39193 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2023-39197 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2023-45863 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-45863 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 11 SP4 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 An update that solves 13 vulnerabilities and has one security fix can now be installed. ## Description: The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762). * CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703). * CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS (bsc#1210778). * CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051). * CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure (bsc#1216046). * CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858). * CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860). * CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976). * CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-112=1 * SUSE Linux Enterprise Server 11 SP4 zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-112=1 ## Package List: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 (nosrc x86_64) * kernel-ec2-3.0.101-108.150.1 * kernel-default-3.0.101-108.150.1 * kernel-trace-3.0.101-108.150.1 * kernel-xen-3.0.101-108.150.1 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 (x86_64) * kernel-xen-base-3.0.101-108.150.1 * kernel-source-3.0.101-108.150.1 * kernel-ec2-devel-3.0.101-108.150.1 * kernel-default-devel-3.0.101-108.150.1 * kernel-ec2-base-3.0.101-108.150.1 * kernel-xen-devel-3.0.101-108.150.1 * kernel-default-base-3.0.101-108.150.1 * kernel-trace-devel-3.0.101-108.150.1 * kernel-syms-3.0.101-108.150.1 * kernel-trace-base-3.0.101-108.150.1 * SUSE Linux Enterprise Server 11 SP4 (nosrc x86_64) * kernel-ec2-3.0.101-108.150.1 * kernel-default-3.0.101-108.150.1 * kernel-trace-3.0.101-108.150.1 * kernel-xen-3.0.101-108.150.1 * SUSE Linux Enterprise Server 11 SP4 (x86_64) * kernel-xen-base-3.0.101-108.150.1 * kernel-source-3.0.101-108.150.1 * kernel-ec2-devel-3.0.101-108.150.1 * kernel-default-devel-3.0.101-108.150.1 * kernel-ec2-base-3.0.101-108.150.1 * kernel-xen-devel-3.0.101-108.150.1 * kernel-default-base-3.0.101-108.150.1 * kernel-trace-devel-3.0.101-108.150.1 * kernel-syms-3.0.101-108.150.1 * kernel-trace-base-3.0.101-108.150.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2022-45887.html * https://www.suse.com/security/cve/CVE-2023-1206.html * https://www.suse.com/security/cve/CVE-2023-31085.html * https://www.suse.com/security/cve/CVE-2023-3111.html * https://www.suse.com/security/cve/CVE-2023-39189.html * https://www.suse.com/security/cve/CVE-2023-39192.html * https://www.suse.com/security/cve/CVE-2023-39193.html * https://www.suse.com/security/cve/CVE-2023-39197.html * https://www.suse.com/security/cve/CVE-2023-45863.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1205762 * https://bugzilla.suse.com/show_bug.cgi?id=1210778 * https://bugzilla.suse.com/show_bug.cgi?id=1212051 * https://bugzilla.suse.com/show_bug.cgi?id=1212703 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215858 * https://bugzilla.suse.com/show_bug.cgi?id=1215860 * https://bugzilla.suse.com/show_bug.cgi?id=1216046 * https://bugzilla.suse.com/show_bug.cgi?id=1216058 * https://bugzilla.suse.com/show_bug.cgi?id=1216976 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:47 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:47 -0000 Subject: SUSE-SU-2024:0111-1: important: Security update for xorg-x11-server Message-ID: <170549500710.26918.6927952170914464563@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2024:0111-1 Rating: important References: * bsc#1218176 * bsc#1218240 * bsc#1218582 * bsc#1218583 * bsc#1218584 * bsc#1218585 Cross-References: * CVE-2023-6816 * CVE-2024-0229 * CVE-2024-21885 * CVE-2024-21886 CVSS scores: * CVE-2023-6816 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0229 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21885 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21886 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves four vulnerabilities and has two security fixes can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: Security fixes: * CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582) * CVE-2024-0229: Fixed reattaching to different master device may lead to out- of-bounds memory access (bsc#1218583) * CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584) * CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585) Other: * Fix vmware graphics driver crash (bsc#1218176) * Fix xserver crash when Xinerama is enabled (bsc#1218240) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-111=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-111=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-111=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-111=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-111=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-111=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-111=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-111=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-111=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-111=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * xorg-x11-server-source-1.20.3-150400.38.40.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Manager Proxy 4.3 (x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6816.html * https://www.suse.com/security/cve/CVE-2024-0229.html * https://www.suse.com/security/cve/CVE-2024-21885.html * https://www.suse.com/security/cve/CVE-2024-21886.html * https://bugzilla.suse.com/show_bug.cgi?id=1218176 * https://bugzilla.suse.com/show_bug.cgi?id=1218240 * https://bugzilla.suse.com/show_bug.cgi?id=1218582 * https://bugzilla.suse.com/show_bug.cgi?id=1218583 * https://bugzilla.suse.com/show_bug.cgi?id=1218584 * https://bugzilla.suse.com/show_bug.cgi?id=1218585 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:51 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:51 -0000 Subject: SUSE-SU-2024:0110-1: important: Security update for the Linux Kernel Message-ID: <170549501143.26918.10179371137192842846@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0110-1 Rating: important References: * bsc#1179610 * bsc#1211226 * bsc#1215237 * bsc#1215375 * bsc#1217250 * bsc#1217709 * bsc#1217946 * bsc#1217947 * bsc#1218105 * bsc#1218184 * bsc#1218253 * bsc#1218258 * bsc#1218559 * jsc#PED-5021 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves seven vulnerabilities, contains one feature and has six security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237). * CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). The following non-security bugs were fixed: * Reviewed and added more information to README.SUSE (jsc#PED-5021). * Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184). * clocksource: Avoid accidental unstable marking of clocksources (bsc#1218105). * clocksource: Suspend the watchdog temporarily when high read latency detected (bsc#1218105). * efi/mokvar: Reserve the table only if it is in boot services data (bsc#1215375). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-110=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-110=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-110=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (nosrc x86_64) * kernel-rt-5.3.18-150300.155.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * kernel-rt-debugsource-5.3.18-150300.155.1 * kernel-rt-debuginfo-5.3.18-150300.155.1 * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.155.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * kernel-rt-debugsource-5.3.18-150300.155.1 * kernel-rt-debuginfo-5.3.18-150300.155.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.155.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * kernel-rt-debugsource-5.3.18-150300.155.1 * kernel-rt-debuginfo-5.3.18-150300.155.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215375 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217709 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218105 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://jira.suse.com/browse/PED-5021 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:53 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:53 -0000 Subject: SUSE-SU-2024:0109-1: important: Security update for xorg-x11-server Message-ID: <170549501372.26918.10132545979927535627@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2024:0109-1 Rating: important References: * bsc#1218176 * bsc#1218240 * bsc#1218582 * bsc#1218583 * bsc#1218584 * bsc#1218585 Cross-References: * CVE-2023-6816 * CVE-2024-0229 * CVE-2024-21885 * CVE-2024-21886 CVSS scores: * CVE-2023-6816 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0229 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21885 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21886 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities and has two security fixes can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: Security fixes: * CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582) * CVE-2024-0229: Fixed reattaching to different master device may lead to out- of-bounds memory access (bsc#1218583) * CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584) * CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585) Other: * Fix vmware graphics driver crash (bsc#1218176) * Fix xserver crash when Xinerama is enabled (bsc#1218240) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-109=1 openSUSE-SLE-15.5-2024-109=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-109=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-109=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.18.1 * xorg-x11-server-extra-21.1.4-150500.7.18.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-sdk-21.1.4-150500.7.18.1 * xorg-x11-server-source-21.1.4-150500.7.18.1 * xorg-x11-server-debugsource-21.1.4-150500.7.18.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-21.1.4-150500.7.18.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.18.1 * xorg-x11-server-extra-21.1.4-150500.7.18.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-debugsource-21.1.4-150500.7.18.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-21.1.4-150500.7.18.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-debugsource-21.1.4-150500.7.18.1 * xorg-x11-server-sdk-21.1.4-150500.7.18.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6816.html * https://www.suse.com/security/cve/CVE-2024-0229.html * https://www.suse.com/security/cve/CVE-2024-21885.html * https://www.suse.com/security/cve/CVE-2024-21886.html * https://bugzilla.suse.com/show_bug.cgi?id=1218176 * https://bugzilla.suse.com/show_bug.cgi?id=1218240 * https://bugzilla.suse.com/show_bug.cgi?id=1218582 * https://bugzilla.suse.com/show_bug.cgi?id=1218583 * https://bugzilla.suse.com/show_bug.cgi?id=1218584 * https://bugzilla.suse.com/show_bug.cgi?id=1218585 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:55 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 12:36:55 -0000 Subject: SUSE-RU-2024:0108-1: moderate: Recommended update for apache2-mod_jk Message-ID: <170549501580.26918.163762749993997556@smelt2.prg2.suse.org> # Recommended update for apache2-mod_jk Announcement ID: SUSE-RU-2024:0108-1 Rating: moderate References: * bsc#1206261 Affected Products: * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for apache2-mod_jk fixes the following issues: * Fix a typo to restrict the symbols to export by the module (bsc#1206261) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-108=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-108=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-108=1 ## Package List: * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1206261 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 20:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 17 Jan 2024 20:30:01 -0000 Subject: SUSE-RU-2024:0133-1: critical: Recommended update for regionServiceClientConfigGCE Message-ID: <170552340187.11547.5940903032224532110@smelt2.prg2.suse.org> # Recommended update for regionServiceClientConfigGCE Announcement ID: SUSE-RU-2024:0133-1 Rating: critical References: * bsc#1199668 * bsc#1217538 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has two fixes can now be installed. ## Description: This update for regionServiceClientConfigGCE contains the following fixes: * Update to version 4.0.1 (bsc#1217538) * Replace 130.211.242.136.pem and 130.211.88.88.pem certs expiring in 8 years and new length of 4096 These certs will replace the current certs that expire soon * Update to version 4.0.0 (bsc#1199668) * Move the cert location to /usr for compatibility with ro setup of SLE-Micro * Fix url in spec file to pint to the proper location of the source ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2024-133=1 ## Package List: * Public Cloud Module 12 (noarch) * regionServiceClientConfigGCE-4.0.1-5.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1199668 * https://bugzilla.suse.com/show_bug.cgi?id=1217538 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Thu Jan 18 08:01:57 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 18 Jan 2024 09:01:57 +0100 (CET) Subject: SUSE-CU-2024:223-1: Security update of suse/ltss/sle15.3/sle15 Message-ID: <20240118080157.0B2E1FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.3/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:223-1 Container Tags : suse/ltss/sle15.3/bci-base:15.3 , suse/ltss/sle15.3/bci-base:15.3.3.40 , suse/ltss/sle15.3/sle15:15.3 , suse/ltss/sle15.3/sle15:15.3.3.40 Container Release : 3.40 Severity : important Type : security References : 1029961 1158830 1201384 1206798 1209122 1212475 1215496 1216862 1216987 1217212 1217573 1218014 CVE-2023-46218 CVE-2023-50495 ----------------------------------------------------------------- The container suse/ltss/sle15.3/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4699-1 Released: Mon Dec 11 07:02:10 2023 Summary: Recommended update for gpg2 Type: recommended Severity: moderate References: 1217212 This update for gpg2 fixes the following issues: - `dirmngr-client --validate` is broken for DER-encoded files (bsc#1217212) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4713-1 Released: Mon Dec 11 13:23:12 2023 Summary: Security update for curl Type: security Severity: moderate References: 1217573,CVE-2023-46218 This update for curl fixes the following issues: - CVE-2023-46218: Fixed cookie mixed case PSL bypass (bsc#1217573). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4723-1 Released: Tue Dec 12 09:57:51 2023 Summary: Recommended update for libtirpc Type: recommended Severity: moderate References: 1216862 This update for libtirpc fixes the following issue: - fix sed parsing in specfile (bsc#1216862) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4807-1 Released: Wed Dec 13 18:07:37 2023 Summary: Security update for container-suseconnect Type: security Severity: important References: 1212475 This update of container-suseconnect fixes the following issues: - rebuild the package with the go 1.21 security release (bsc#1212475). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4963-1 Released: Fri Dec 22 14:37:08 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - container-suseconnect-2.4.0-150000.4.46.1 updated - curl-7.66.0-150200.4.66.1 updated - gpg2-2.2.27-150300.3.8.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libcurl4-7.66.0-150200.4.66.1 updated - libncurses6-6.1-150000.5.20.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libsolv-tools-0.7.27-150200.23.2 updated - libtirpc-netconfig-1.3.4-150300.3.23.1 updated - libtirpc3-1.3.4-150300.3.23.1 updated - libzypp-17.31.27-150200.84.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - procps-3.3.17-150000.7.37.1 updated - terminfo-base-6.1-150000.5.20.1 updated - zypper-1.14.68-150200.70.2 updated - libprocps7-3.3.15-150000.7.34.1 removed From null at suse.de Thu Jan 18 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 08:30:03 -0000 Subject: SUSE-RU-2024:0134-1: critical: Recommended update for regionServiceClientConfigAzure Message-ID: <170556660300.17609.4790379821217041214@smelt2.prg2.suse.org> # Recommended update for regionServiceClientConfigAzure Announcement ID: SUSE-RU-2024:0134-1 Rating: critical References: * bsc#1199668 * bsc#1217537 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has two fixes can now be installed. ## Description: This update for regionServiceClientConfigAzure contains the following fixes: * Update to version 2.0.1 (bsc#1217537) * Replacing 104.45.31.195.pem 191.237.254.253.pem certs expiring in 8 years and new length of 4096 These certs will replace the current certs that expire soon * Update to version 2.0.0 (bsc#1199668) * Move the certs to /usr from /var to accomodate ro filesystem of SLE-Micro * Fix source url in spec file ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2024-134=1 ## Package List: * Public Cloud Module 12 (noarch) * regionServiceClientConfigAzure-2.0.1-3.18.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1199668 * https://bugzilla.suse.com/show_bug.cgi?id=1217537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 12:30:06 -0000 Subject: SUSE-RU-2024:0143-1: moderate: Recommended update for nvidia-open-driver-G06-signed Message-ID: <170558100691.4190.7298148017018191551@smelt2.prg2.suse.org> # Recommended update for nvidia-open-driver-G06-signed Announcement ID: SUSE-RU-2024:0143-1 Rating: moderate References: * bsc#1215981 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for nvidia-open-driver-G06-signed fixes the following issues: * Update to 545.29.06 * no longer try to overwrite NVreg_OpenRmEnableUnsupportedGpus driver NVreg_OpenRmEnableUnsupportedGpus driver option setting (disable it), ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-143=1 openSUSE-SLE-15.5-2024-143=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-143=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-143=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-143=1 ## Package List: * openSUSE Leap 15.5 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150500.11.15.1 * openSUSE Leap 15.5 (x86_64) * nvidia-open-driver-G06-signed-kmp-azure-545.29.06_k5.14.21_150500.33.26-150500.3.21.5 * nvidia-open-driver-G06-signed-azure-devel-545.29.06-150500.3.21.5 * nvidia-open-driver-G06-signed-kmp-azure-debuginfo-545.29.06_k5.14.21_150500.33.26-150500.3.21.5 * openSUSE Leap 15.5 (aarch64 x86_64) * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150500.55.39-150500.3.21.5 * nvidia-open-driver-G06-signed-default-devel-545.29.06-150500.3.21.5 * nvidia-open-driver-G06-signed-debugsource-545.29.06-150500.3.21.5 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150500.55.39-150500.3.21.5 * openSUSE Leap 15.5 (aarch64) * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-545.29.06_k5.14.21_150500.55.39-150500.3.21.5 * nvidia-open-driver-G06-signed-kmp-64kb-545.29.06_k5.14.21_150500.55.39-150500.3.21.5 * nvidia-open-driver-G06-signed-64kb-devel-545.29.06-150500.3.21.5 * SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150500.11.15.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150500.55.39-150500.3.21.5 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150500.55.39-150500.3.21.5 * Basesystem Module 15-SP5 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150500.11.15.1 * Basesystem Module 15-SP5 (aarch64) * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-545.29.06_k5.14.21_150500.55.39-150500.3.21.5 * nvidia-open-driver-G06-signed-kmp-64kb-545.29.06_k5.14.21_150500.55.39-150500.3.21.5 * nvidia-open-driver-G06-signed-64kb-devel-545.29.06-150500.3.21.5 * Basesystem Module 15-SP5 (aarch64 x86_64) * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150500.55.39-150500.3.21.5 * nvidia-open-driver-G06-signed-default-devel-545.29.06-150500.3.21.5 * nvidia-open-driver-G06-signed-debugsource-545.29.06-150500.3.21.5 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150500.55.39-150500.3.21.5 * Public Cloud Module 15-SP5 (x86_64) * nvidia-open-driver-G06-signed-kmp-azure-545.29.06_k5.14.21_150500.33.26-150500.3.21.5 * nvidia-open-driver-G06-signed-azure-devel-545.29.06-150500.3.21.5 * nvidia-open-driver-G06-signed-kmp-azure-debuginfo-545.29.06_k5.14.21_150500.33.26-150500.3.21.5 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215981 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 12:30:10 -0000 Subject: SUSE-RU-2024:0142-1: moderate: Recommended update for go1.20 Message-ID: <170558101021.4190.1724690051648607683@smelt2.prg2.suse.org> # Recommended update for go1.20 Announcement ID: SUSE-RU-2024:0142-1 Rating: moderate References: * bsc#1206346 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for go1.20 fixes the following issues: * Update to version go1.20.13 (bsc#1206346) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-142=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-142=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-142=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * go1.20-debuginfo-1.20.13-150000.1.38.1 * go1.20-doc-1.20.13-150000.1.38.1 * go1.20-race-1.20.13-150000.1.38.1 * go1.20-1.20.13-150000.1.38.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * go1.20-debuginfo-1.20.13-150000.1.38.1 * go1.20-doc-1.20.13-150000.1.38.1 * go1.20-race-1.20.13-150000.1.38.1 * go1.20-1.20.13-150000.1.38.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * go1.20-doc-1.20.13-150000.1.38.1 * go1.20-race-1.20.13-150000.1.38.1 * go1.20-1.20.13-150000.1.38.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1206346 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:23 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 12:30:23 -0000 Subject: SUSE-SU-2024:0141-1: important: Security update for the Linux Kernel Message-ID: <170558102371.4190.16676857601736710152@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0141-1 Rating: important References: * bsc#1108281 * bsc#1179610 * bsc#1183045 * bsc#1211162 * bsc#1211226 * bsc#1212139 * bsc#1212584 * bsc#1214117 * bsc#1214747 * bsc#1214823 * bsc#1215237 * bsc#1215696 * bsc#1215885 * bsc#1215952 * bsc#1216032 * bsc#1216057 * bsc#1216559 * bsc#1216776 * bsc#1217036 * bsc#1217217 * bsc#1217250 * bsc#1217602 * bsc#1217692 * bsc#1217790 * bsc#1217801 * bsc#1217822 * bsc#1217927 * bsc#1217933 * bsc#1217938 * bsc#1217946 * bsc#1217947 * bsc#1217980 * bsc#1217981 * bsc#1217982 * bsc#1218056 * bsc#1218092 * bsc#1218139 * bsc#1218184 * bsc#1218229 * bsc#1218234 * bsc#1218253 * bsc#1218258 * bsc#1218335 * bsc#1218357 * bsc#1218397 * bsc#1218447 * bsc#1218461 * bsc#1218515 * bsc#1218559 * bsc#1218569 * bsc#1218643 * jsc#PED-3459 * jsc#PED-5021 * jsc#PED-7167 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6531 * CVE-2023-6546 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6622 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 10 vulnerabilities, contains three features and has 41 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). * CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). The following non-security bugs were fixed: * Documentation: KVM: add separate directories for architecture-specific documentation (jsc#PED-7167). * Documentation: KVM: update amd-memory-encryption.rst references (jsc#PED-7167). * Documentation: KVM: update msr.rst reference (jsc#PED-7167). * Documentation: KVM: update s390-diag.rst reference (jsc#PED-7167). * Documentation: KVM: update s390-pv.rst reference (jsc#PED-7167). * Documentation: drop more IDE boot options and ide-cd.rst (git-fixes). * Documentation: qat: Use code block for qat sysfs example (git-fixes). * Drop Documentation/ide/ (git-fixes). * Fix crash on screen resize (bsc#1218229) * Fix drm gem object underflow (bsc#1218092) * Revert "Limit kernel-source-azure build to architectures for which we build binaries (bsc#1108281)." * Revert "PCI/ASPM: Remove pcie_aspm_pm_state_change()" (git-fixes). * Revert "PCI: acpiphp: Reassign resources on bridge if necessary" (git- fixes). * Revert "md: unlock mddev before reap sync_thread in action_store" (git- fixes). * Revert "swiotlb: panic if nslabs is too small" (git-fixes). * Revert "xhci: Loosen RPM as default policy to cover for AMD xHC 1.1" (git- fixes). * Update: drm/vmwgfx: Keep a gem reference to user bos in surfaces * acpi: video: Add backlight=native DMI quirk for Lenovo Ideapad Z470 (git- fixes). * acpi: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects (git-fixes). * acpica: Add AML_NO_OPERAND_RESOLVE flag to Timer (git-fixes). * afs: Fix afs_server_list to be cleaned up with RCU (git-fixes). * afs: Fix dynamic root lookup DNS check (git-fixes). * afs: Fix file locking on R/O volumes to operate in local mode (git-fixes). * afs: Fix overwriting of result of DNS query (git-fixes). * afs: Fix refcount underflow from error handling race (git-fixes). * afs: Fix the dynamic root's d_delete to always delete unused dentries (git- fixes). * afs: Fix use-after-free due to get/remove race in volume tree (git-fixes). * afs: Make error on cell lookup failure consistent with OpenAFS (git-fixes). * afs: Return ENOENT if no cell DNS record can be found (git-fixes). * alsa: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro (git-fixes). * alsa: hda/hdmi: add force-connect quirk for NUC5CPYB (git-fixes). * alsa: hda/hdmi: add force-connect quirks for ASUSTeK Z170 variants (git- fixes). * alsa: hda/realtek: Add Framework laptop 16 to quirks (git-fixes). * alsa: hda/realtek: Add quirk for ASUS ROG GV302XA (git-fixes). * alsa: hda/realtek: Add supported ALC257 for ChromeOS (git-fixes). * alsa: hda/realtek: Apply mute LED quirk for HP15-db (git-fixes). * alsa: hda/realtek: Enable headset on Lenovo M90 Gen5 (git-fixes). * alsa: hda/realtek: Fix mute and mic-mute LEDs for HP ProBook 440 G6 (git- fixes). * alsa: hda/realtek: Headset Mic VREF to 100% (git-fixes). * alsa: hda/realtek: add new Framework laptop to quirks (git-fixes). * alsa: hda/realtek: enable SND_PCI_QUIRK for hp pavilion 14-ec1xxx series (git-fixes). * alsa: hda/realtek: fix mute/micmute LEDs for a HP ZBook (git-fixes). * alsa: hda/realtek: fix speakers on XPS 9530 (2023) (git-fixes). * alsa: hda: intel-dsp-cfg: add LunarLake support (git-fixes). * alsa: pcm: fix out-of-bounds in snd_pcm_state_names (git-fixes). * alsa: seq: oss: Fix racy open/close of MIDI devices (git-fixes). * alsa: usb-audio: Add Pioneer DJM-450 mixer controls (git-fixes). * alsa: usb-audio: Increase delay in MOTU M quirk (git-fixes). * apparmor: Free up __cleanup() name (jsc#PED-7167). * arm64: dts: arm: add missing cache properties (git-fixes) * arm64: dts: imx8mm: Add sound-dai-cells to micfil node (git-fixes) * arm64: dts: imx8mn: Add sound-dai-cells to micfil node (git-fixes) * arm64: dts: imx8mq-librem5: Remove dis_u3_susphy_quirk from (git-fixes) * arm64: kdump: Skip kmemleak scan reserved memory for kdump (jsc#PED-7167). * arm64: mm: Fix "rodata=on" when CONFIG_RODATA_FULL_DEFAULT_ENABLED=y (git- fixes) * arm: oMAP2+: Fix null pointer dereference and memory leak in omap_soc_device_init (git-fixes). * arm: pL011: Fix DMA support (git-fixes). * asoc: fsl_rpmsg: Fix error handler with pm_runtime_enable (git-fixes). * asoc: hdmi-codec: fix missing report for jack initial status (git-fixes). * asoc: meson: g12a-toacodec: Fix event generation (git-fixes). * asoc: meson: g12a-toacodec: Validate written enum values (git-fixes). * asoc: meson: g12a-tohdmitx: Fix event generation for S/PDIF mux (git-fixes). * asoc: meson: g12a-tohdmitx: Validate written enum values (git-fixes). * asoc: wm_adsp: fix memleak in wm_adsp_buffer_populate (git-fixes). * bitmap: unify find_bit operations (jsc#PED-7167). * block: fix revalidate performance regression (bsc#1216057). * bluetooth: Fix deadlock in vhci_send_frame (git-fixes). * bluetooth: L2CAP: Send reject on command corrupted request (git-fixes). * bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE (git- fixes). * bluetooth: btusb: Add new PID/VID 0489:e0f2 for MT7921 (bsc#1218461). * bluetooth: hci_event: Fix not checking if HCI_OP_INQUIRY has been sent (git- fixes). * bluetooth: hci_event: shut up a false-positive warning (git-fixes). * bluetooth: hci_qca: Fix the teardown problem for real (git-fixes). * bnxt: do not handle XDP in netpoll (jsc#PED-1495). * bnxt_en: Clear resource reservation during resume (jsc#PED-1495). * bnxt_en: Fix HWTSTAMP_FILTER_ALL packet timestamp logic (jsc#PED-1495). * bnxt_en: Fix max_mtu setting for multi-buf XDP (jsc#PED-1495). * bnxt_en: Fix page pool logic for page size >= 64K (jsc#PED-1495). * bnxt_en: Fix wrong return value check in bnxt_close_nic() (jsc#PED-1495). * bnxt_en: Flush XDP for bnxt_poll_nitroa0()'s NAPI (jsc#PED-1495). * bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234 git-fixes). * bus: ti-sysc: Flush posted write only after srst_udelay (git-fixes). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980). * ceph: fix type promotion bug on 32bit systems (bsc#1217982). * cleanup: Make no_free_ptr() __must_check (jsc#PED-7167). * clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217). * clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217). * clocksource: Handle negative skews in "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217). * clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217). * clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217). * clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217). * configfs-tsm: Introduce a shared ABI for attestation reports (jsc#PED-7167). * crypto: ccp - Add SEV_INIT rc error logging on init (jsc#PED-7167). * crypto: ccp - Add SEV_INIT_EX support (jsc#PED-7167). * crypto: ccp - Add a header for multiple drivers to use `__psp_pa` (jsc#PED-7167). * crypto: ccp - Add a quirk to firmware update (jsc#PED-7167). * crypto: ccp - Add psp_init_on_probe module parameter (jsc#PED-7167). * crypto: ccp - Drop TEE support for IRQ handler (jsc#PED-7167). * crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() (jsc#PED-7167). * crypto: ccp - Fail the PSP initialization when writing psp data file failed (jsc#PED-7167). * crypto: ccp - Fix the INIT_EX data file open failure (jsc#PED-7167). * crypto: ccp - Fix whitespace in sev_cmd_buffer_len() (jsc#PED-7167). * crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware (jsc#PED-7167). * crypto: ccp - Initialize PSP when reading psp data file failed (jsc#PED-7167). * crypto: ccp - Log when resetting PSP SEV state (jsc#PED-7167). * crypto: ccp - Move SEV_INIT retry for corrupted data (jsc#PED-7167). * crypto: ccp - Move some PSP mailbox bit definitions into common header (jsc#PED-7167). * crypto: ccp - Name -1 return value as SEV_RET_NO_FW_CALL (jsc#PED-7167). * crypto: ccp - Refactor out sev_fw_alloc() (jsc#PED-7167). * crypto: ccp - remove unneeded semicolon (jsc#PED-7167). * crypto: ccp: Get rid of __sev_platform_init_locked()'s local function pointer (jsc#PED-7167). * dm verity: initialize fec io before freeing it (git-fixes). * dm-verity: do not use blocking calls from tasklets (git-fixes). * dm: add cond_resched() to dm_wq_requeue_work() (git-fixes). * dm: do not attempt to queue IO under RCU protection (git-fixes). * dm: fix __send_duplicate_bios() to always allow for splitting IO (bsc#1215952). * dm: fix improper splitting for abnormal bios (bsc#1215952). * dm: verity-loadpin: Add NULL pointer check for 'bdev' parameter (git-fixes). * dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * dmaengine: ioat: Free up __cleanup() name (jsc#PED-7167). * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021) * drm/amd/amdgpu: Fix warnings in amdgpu/amdgpu_display.c (git-fixes). * drm/amdgpu/sdma5.2: add begin/end_use ring callbacks (bsc#1212139). * drm/amdgpu: Add EEPROM I2C address support for ip discovery (git-fixes). * drm/amdgpu: Add I2C EEPROM support on smu v13_0_6 (git-fixes). * drm/amdgpu: Add support for RAS table at 0x40000 (git-fixes). * drm/amdgpu: Decouple RAS EEPROM addresses from chips (git-fixes). * drm/amdgpu: Remove redundant I2C EEPROM address (git-fixes). * drm/amdgpu: Remove second moot switch to set EEPROM I2C address (git-fixes). * drm/amdgpu: Return from switch early for EEPROM I2C address (git-fixes). * drm/amdgpu: Update EEPROM I2C address for smu v13_0_0 (git-fixes). * drm/amdgpu: Update ras eeprom support for smu v13_0_0 and v13_0_10 (git- fixes). * drm/amdgpu: correct chunk_ptr to a pointer to chunk (git-fixes). * drm/amdgpu: correct the amdgpu runtime dereference usage count (git-fixes). * drm/amdgpu: fix tear down order in amdgpu_vm_pt_free (git-fixes). * drm/amdgpu: simplify amdgpu_ras_eeprom.c (git-fixes). * drm/bridge: parade-ps8640: Never store more than msg->size bytes in AUX xfer (git-fixes). * drm/bridge: ps8640: Fix size mismatch warning w/ len (git-fixes). * drm/bridge: tc358768: select CONFIG_VIDEOMODE_HELPERS (git-fixes). * drm/bridge: ti-sn65dsi86: Never store more than msg->size bytes in AUX xfer (git-fixes). * drm/i915/display: Drop check for doublescan mode in modevalid (git-fixes). * drm/i915/dp: Fix passing the correct DPCD_REV for drm_dp_set_phy_test_pattern (git-fixes). * drm/i915/dpt: Only do the POT stride remap when using DPT (git-fixes). * drm/i915/lvds: Use REG_BIT() & co (git-fixes). * drm/i915/mtl: limit second scaler vertical scaling in ver >= 14 (git-fixes). * drm/i915/sdvo: stop caching has_hdmi_monitor in struct intel_sdvo (git- fixes). * drm/i915: Fix intel_atomic_setup_scalers() plane_state handling (git-fixes). * drm/i915: Fix remapped stride with CCS on ADL+ (git-fixes). * drm/i915: Reject async flips with bigjoiner (git-fixes). * drm/i915: Relocate intel_atomic_setup_scalers() (git-fixes). * drm/i915: fix MAX_ORDER usage in i915_gem_object_get_pages_internal() (jsc#PED-7167). * drm/mediatek: Add spinlock for setting vblank event in atomic_begin (git- fixes). * drm/mgag200: Fix gamma lut not initialized for G200ER, G200EV, G200SE (git- fixes). * efi/libstub: Implement support for unaccepted memory (jsc#PED-7167). * efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory (jsc#PED-7167). * efi/unaccepted: Fix off-by-one when checking for overlapping ranges (jsc#PED-7167). * efi/unaccepted: Fix soft lockups caused by parallel memory acceptance (jsc#PED-7167). * efi/unaccepted: Make sure unaccepted table is mapped (jsc#PED-7167). * efi/unaccepted: Use ACPI reclaim memory for unaccepted memory table (jsc#PED-7167). * efi/x86: Get full memory map in allocate_e820() (jsc#PED-7167). * efi: Add unaccepted memory support (jsc#PED-7167). * efi: libstub: avoid efi_get_memory_map() for allocating the virt map (jsc#PED-7167). * efi: libstub: install boot-time memory map as config table (jsc#PED-7167). * efi: libstub: remove DT dependency from generic stub (jsc#PED-7167). * efi: libstub: remove pointless goto kludge (jsc#PED-7167). * efi: libstub: simplify efi_get_memory_map() and struct efi_boot_memmap (jsc#PED-7167). * efi: libstub: unify initrd loading between architectures (jsc#PED-7167). * floppy: fix MAX_ORDER usage (jsc#PED-7167). * fprobe: Fix to ensure the number of active retprobes is not zero (git- fixes). * fs/jfs: Add check for negative db_l2nbperpage (git-fixes). * fs/jfs: Add validity check for db_maxag and db_agpref (git-fixes). * fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount() (git- fixes). * fs/remap: constrain dedupe of EOF blocks (git-fixes). * fs: avoid empty option when generating legacy mount string (git-fixes). * fs: fix an infinite loop in iomap_fiemap (git-fixes). * fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes). * genwqe: fix MAX_ORDER usage (jsc#PED-7167). * gfs2: Add wrapper for iomap_file_buffered_write (git-fixes). * gfs2: Check sb_bsize_shift after reading superblock (git-fixes). * gfs2: Clean up function may_grant (git-fixes). * gfs2: Fix filesystem block deallocation for short writes (git-fixes). * gfs2: Fix gfs2_release for non-writers regression (git-fixes). * gfs2: Fix inode height consistency check (git-fixes). * gfs2: Fix length of holes reported at end-of-file (git-fixes). * gfs2: Fix possible data races in gfs2_show_options() (git-fixes). * gfs2: Improve gfs2_make_fs_rw error handling (git-fixes). * gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes). * gfs2: Silence "suspicious RCU usage in gfs2_permission" warning (git-fixes). * gfs2: Switch from strlcpy to strscpy (git-fixes). * gfs2: fix an oops in gfs2_permission (git-fixes). * gfs2: gfs2_setattr_size error path fix (git-fixes). * gfs2: ignore negated quota changes (git-fixes). * gfs2: jdata writepage fix (git-fixes). * gfs2: use i_lock spin_lock for inode qadata (git-fixes). * gpiolib: sysfs: Fix error handling on failed export (git-fixes). * gve: Fixes for napi_poll when budget is 0 (git-fixes). * gve: Use size_add() in call to struct_size() (git-fixes). * hid: add ALWAYS_POLL quirk for Apple kb (git-fixes). * hid: glorious: fix Glorious Model I HID report (git-fixes). * hid: hid-asus: add const to read-only outgoing usb buffer (git-fixes). * hid: hid-asus: reset the backlight brightness level on resume (git-fixes). * hid: lenovo: Restrict detection of patched firmware only to USB cptkbd (git- fixes). * hid: multitouch: Add quirk for HONOR GLO-GXXX touchpad (git-fixes). * hwmon: (acpi_power_meter) Fix 4.29 MW bug (git-fixes). * hwmon: (nzxt-kraken2) Fix error handling path in kraken2_probe() (git- fixes). * i2c: aspeed: Handle the coalesced stop conditions with the start conditions (git-fixes). * i2c: core: Fix atomic xfer check for non-preempt config (git-fixes). * i2c: designware: Fix corrupted memory seen in the ISR (git-fixes). * i40e: Fix I40E_FLAG_VF_VLAN_PRUNING value (jsc#PED-372). * i40e: Fix VF VLAN offloading when port VLAN is configured (jsc#PED-372). * i40e: Fix unexpected MFS warning message (jsc#PED-372). * i40e: Fix wrong check for I40E_TXR_FLAGS_WB_ON_ITR (jsc#PED-372). * i40e: fix misleading debug logs (jsc#PED-372). * i40e: fix potential NULL pointer dereferencing of pf->vf i40e_sync_vsi_filters() (jsc#PED-372). * i40e: fix potential memory leaks in i40e_remove() (jsc#PED-372). * i40e: prevent crash on probe if hw registers have invalid values (jsc#PED-372). * ib/mlx5: Fix init stage error handling to avoid double free of same QP and UAF (git-fixes) * ib/mlx5: Fix rdma counter binding for RAW QP (git-fixes) * igb: Avoid starting unnecessary workqueues (jsc#PED-370). * igb: Change IGB_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370). * igb: Fix potential memory leak in igb_add_ethtool_nfc_entry (jsc#PED-370). * igb: clean up in all error paths when enabling SR-IOV (jsc#PED-370). * igb: disable virtualization features on 82580 (jsc#PED-370). * igbvf: Change IGBVF_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370). * igc: Change IGC_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-375). * igc: Expose tx-usecs coalesce setting to user (jsc#PED-375). * igc: Fix ambiguity in the ethtool advertising (jsc#PED-375). * igc: Fix infinite initialization loop with early XDP redirect (jsc#PED-375). * igc: Fix the typo in the PTM Control macro (jsc#PED-375). * iio: adc: ti_am335x_adc: Fix return value check of tiadc_request_dma() (git- fixes). * iio: common: ms_sensors: ms_sensors_i2c: fix humidity conversion time table (git-fixes). * iio: imu: inv_mpu6050: fix an error code problem in inv_mpu6050_read_raw (git-fixes). * iio: triggered-buffer: prevent possible freeing of wrong buffer (git-fixes). * input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN (git-fixes). * input: ipaq-micro-keys - add error handling for devm_kmemdup (git-fixes). * input: soc_button_array - add mapping for airplane mode button (git-fixes). * input: xpad - add HyperX Clutch Gladiate Support (git-fixes). * interconnect: Treat xlate() returning NULL node as an error (git-fixes). * iomap: Fix iomap_dio_rw return value for user copies (git-fixes). * iommu: fix MAX_ORDER usage in __iommu_dma_alloc_pages() (jsc#PED-7167). * iov_iter, x86: Be consistent about the __user tag on copy_mc_to_user() (git- fixes). * jfs: fix array-index-out-of-bounds in dbFindLeaf (git-fixes). * jfs: fix array-index-out-of-bounds in diAlloc (git-fixes). * jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount (git-fixes). * jfs: validate max amount of blocks before allocation (git-fixes). * kABI: Preserve the type of rethook::handler (git-fixes). * kABI: restore void return to typec_altmode_attention (git-fixes). * kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes, as used only locally for asus-wmi stuff * kabi/severities: make snp_issue_guest_request PASS (jsc#PED-7167) * kabi: fix of_reserved_mem_* due to struct vm_struct became defined (jsc#PED-7167). * kabi: fix sev-dev due to fs_struct became defined (jsc#PED-7167). * kabi: fix struct efi after adding unaccepted memory table (jsc#PED-7167). * kabi: fix struct zone kabi after adding unaccepted_pages and NR_UNACCEPTED (jsc#PED-7167). * kbuild: Drop -Wdeclaration-after-statement (jsc#PED-7167). * kconfig: fix memory leak from range properties (git-fixes). * kernel-source: Remove config-options.changes (jsc#PED-5021) * kprobes: consistent rcu api usage for kretprobe holder (git-fixes). * kvm: arm64: Prevent kmemleak from accessing pKVM memory (jsc#PED-7167). * kvm: s390/mm: Properly reset no-dat (git-fixes bsc#1218056). * kvm: s390: vsie: fix wrong VIR 37 when MSO is used (git-fixes bsc#1217933). * lib/vsprintf: Fix %pfwf when current node refcount == 0 (git-fixes). * libceph: use kernel_connect() (bsc#1217981). * limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281). * locking: Introduce __cleanup() based infrastructure (jsc#PED-7167). * locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes). * md/bitmap: do not set max_write_behind if there is no write mostly device (git-fixes). * md/md-bitmap: hold 'reconfig_mutex' in backlog_store() (git-fixes). * md/md-bitmap: remove unnecessary local variable in backlog_store() (git- fixes). * md/raid0: add discard support for the 'original' layout (git-fixes). * md/raid10: do not call bio_start_io_acct twice for bio which experienced read error (git-fixes). * md/raid10: factor out code from wait_barrier() to stop_waiting_barrier() (git-fixes). * md/raid10: factor out dereference_rdev_and_rrdev() (git-fixes). * md/raid10: fix io loss while replacement replace rdev (git-fixes). * md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes). * md/raid10: fix memleak for 'conf->bio_split' (git-fixes). * md/raid10: fix memleak of md thread (git-fixes). * md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes). * md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git- fixes). * md/raid10: fix overflow of md/safe_mode_delay (git-fixes). * md/raid10: fix task hung in raid10d (git-fixes). * md/raid10: fix the condition to call bio_end_io_acct() (git-fixes). * md/raid10: fix wrong setting of max_corr_read_errors (git-fixes). * md/raid10: prevent soft lockup while flush writes (git-fixes). * md/raid10: use dereference_rdev_and_rrdev() to get devices (git-fixes). * md/raid1: fix error: ISO C90 forbids mixed declarations (git-fixes). * md/raid1: free the r1bio before waiting for blocked rdev (git-fixes). * md/raid1: hold the barrier until handle_read_error() finishes (git-fixes). * md/raid5-cache: fix a deadlock in r5l_exit_log() (git-fixes). * md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() (git- fixes). * md/raid5: fix miscalculation of 'end_sector' in raid5_read_one_chunk() (git- fixes). * md: Put the right device in md_seq_next (bsc#1217822). * md: Set MD_BROKEN for RAID1 and RAID10 (git-fixes). * md: avoid signed overflow in slot_store() (git-fixes). * md: do not update recovery_cp when curr_resync is ACTIVE (git-fixes). * md: drop queue limitation for RAID1 and RAID10 (git-fixes). * md: raid0: account for split bio in iostat accounting (git-fixes). * md: raid10 add nowait support (git-fixes). * md: raid1: fix potential OOB in raid1_remove_disk() (git-fixes). * md: restore 'noio_flag' for the last mddev_resume() (git-fixes). * md: select BLOCK_LEGACY_AUTOLOAD (git-fixes). * memblock: exclude MEMBLOCK_NOMAP regions from kmemleak (jsc#PED-7167). * memblock: make memblock_find_in_range method private (jsc#PED-7167). * misc: mei: client.c: fix problem of return '-EOVERFLOW' in mei_cl_write (git-fixes). * misc: mei: client.c: return negative error code in mei_cl_write (git-fixes). * mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files. * mm/page_alloc: make deferred page init free pages in MAX_ORDER blocks (jsc#PED-7167). * mm/pgtable: Fix multiple -Wstringop-overflow warnings (jsc#PED-7167). * mm/slab: Add __free() support for kvfree (jsc#PED-7167). * mm/slub: fix MAX_ORDER usage in calculate_order() (jsc#PED-7167). * mm: Add PAGE_ALIGN_DOWN macro (jsc#PED-7167). * mm: Add support for unaccepted memory (jsc#PED-7167). * mm: add pageblock_align() macro (jsc#PED-7167). * mm: add pageblock_aligned() macro (jsc#PED-7167). * mm: avoid passing 0 to __ffs() (jsc#PED-7167). * mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515). * mm: move kvmalloc-related functions to slab.h (jsc#PED-7167). * mm: new primitive kvmemdup() (jsc#PED-7167). * mm: reuse pageblock_start/end_pfn() macro (jsc#PED-7167). * mmc: meson-mx-sdhc: Fix initialization frozen issue (git-fixes). * mmc: rpmb: fixes pause retune on all RPMB partitions (git-fixes). * mmc: sdhci-sprd: Fix eMMC init failure after hw reset (git-fixes). * neighbor: tracing: Move pin6 inside CONFIG_IPV6=y section (git-fixes). * net/rose: Fix Use-After-Free in rose_ioctl (git-fixes). * net/smc: Fix pos miscalculation in statistics (bsc#1218139). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes). * net: bnxt: fix a potential use-after-free in bnxt_init_tc (jsc#PED-1495). * net: ena: Destroy correct number of xdp queues upon failure (git-fixes). * net: ena: Fix XDP redirection error (git-fixes). * net: ena: Fix xdp drops handling due to multibuf packets (git-fixes). * net: ena: Flush XDP packets on error (git-fixes). * net: mana: select PAGE_POOL (git-fixes). * net: rfkill: gpio: set GPIO direction (git-fixes). * net: usb: ax88179_178a: avoid failed operations when device is disconnected (git-fixes). * net: usb: ax88179_178a: clean up pm calls (git-fixes). * net: usb: ax88179_178a: wol optimizations (git-fixes). * net: usb: qmi_wwan: claim interface 4 for ZTE MF290 (git-fixes). * nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local (git-fixes). * nfs: Fix O_DIRECT locking issues (bsc#1211162). * nfs: Fix a few more clear_bit() instances that need release semantics (bsc#1211162). * nfs: Fix a potential data corruption (bsc#1211162). * nfs: Fix a use after free in nfs_direct_join_group() (bsc#1211162). * nfs: Fix error handling for O_DIRECT write scheduling (bsc#1211162). * nfs: More O_DIRECT accounting fixes for error paths (bsc#1211162). * nfs: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162). * nfs: Use the correct commit info in nfs_join_page_group() (bsc#1211162). * nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162). * nilfs2: fix missing error check for sb_set_blocksize call (git-fixes). * nilfs2: prevent WARNING in nilfs_sufile_set_segment_usage() (git-fixes). * nlm: Defend against file_lock changes after vfs_test_lock() (bsc#1217692). * null_blk: fix poll request timeout handling (git-fixes). * nvme-core: check for too small lba shift (bsc#1214117). * nvme-pci: Add sleep quirk for Kingston drives (git-fixes). * nvme-pci: always return an ERR_PTR from nvme_pci_alloc_dev (git-fixes). * nvme-pci: do not set the NUMA node of device if it has none (git-fixes). * nvme-pci: factor out a nvme_pci_alloc_dev helper (git-fixes). * nvme-rdma: do not try to stop unallocated queues (git-fixes). * nvme: sanitize metadata bounce buffer for reads (git-fixes). * nvmet-auth: complete a request only after freeing the dhchap pointers (git- fixes). * of: reserved_mem: Have kmemleak ignore dynamically allocated reserved mem (jsc#PED-7167). * orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git- fixes). * orangefs: Fix kmemleak in orangefs_{kernel,client}_debug_init() (git-fixes). * orangefs: Fix sysfs not cleanup when dev init failed (git-fixes). * orangefs: Fix the size of a memory allocation in orangefs_bufmap_alloc() (git-fixes). * padata: Fix refcnt handling in padata_free_shell() (git-fixes). * parport: Add support for Brainboxes IX/UC/PX parallel cards (git-fixes). * pci: loongson: Limit MRRS to 256 (git-fixes). * perf/core: fix MAX_ORDER usage in rb_alloc_aux_page() (jsc#PED-7167). * pinctrl: at91-pio4: use dedicated lock class for IRQ (git-fixes). * platform/surface: aggregator: fix recv_buf() return value (git-fixes). * platform/x86: asus-wmi: Add support for ROG X13 tablet mode (git-fixes). * platform/x86: asus-wmi: Adjust tablet/lidflip handling to use enum (git- fixes). * platform/x86: asus-wmi: Fix kbd_dock_devid tablet-switch reporting (git- fixes). * platform/x86: asus-wmi: Move i8042 filter install to shared asus-wmi code (git-fixes). * platform/x86: asus-wmi: Simplify tablet-mode-switch handling (git-fixes). * platform/x86: asus-wmi: Simplify tablet-mode-switch probing (git-fixes). * platform/x86: wmi: Allow duplicate GUIDs for drivers that use struct wmi_driver (git-fixes). * platform/x86: wmi: Skip blocks with zero instances (git-fixes). * powerpc/pseries/vas: Migration suspend waits for no in-progress open windows (bsc#1218397 ltc#204523). * qed/red_ll2: Fix undefined behavior bug in struct qed_ll2_info (jsc#PED-1526). * qed: Fix a potential use-after-free in qed_cxt_tables_alloc (jsc#PED-1526). * qed: fix LL2 RX buffer allocation (jsc#PED-1526). * qede: fix firmware halt over suspend and resume (jsc#PED-1526). * qla2xxx: add debug log for deprecated hw detected (bsc#1216032). * r8152: Add RTL8152_INACCESSIBLE checks to more loops (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_aldps_en() (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_pre_firmware_1() (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8156b_wait_loading_flash() (git-fixes). * r8152: Rename RTL8152_UNPLUG to RTL8152_INACCESSIBLE (git-fixes). * r8169: Fix PCI error on system resume (git-fixes). * rdma/bnxt_re: Correct module description string (jsc#PED-1495). * rdma/core: Use size_{add,sub,mul}() in calls to struct_size() (git-fixes) * rdma/hfi1: Use FIELD_GET() to extract Link Width (git-fixes) * rdma/hfi1: Workaround truncation compilation error (git-fixes) * rdma/hns: Add check for SL (git-fixes) * rdma/hns: Fix printing level of asynchronous events (git-fixes) * rdma/hns: Fix signed-unsigned mixed comparisons (git-fixes) * rdma/hns: Fix uninitialized ucmd in hns_roce_create_qp_common() (git-fixes) * rdma/hns: The UD mode can only be configured with DCQCN (git-fixes) * regmap: fix bogus error on regcache_sync success (git-fixes). * reiserfs: Check the return value from __getblk() (git-fixes). * reiserfs: Replace 1-element array with C99 style flex-array (git-fixes). * remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569). * reset: Fix crash when freeing non-existent optional resets (git-fixes). * restore renamed device IDs for USB HID devices (git-fixes). * rethook: Fix to use WRITE_ONCE() for rethook:: Handler (git-fixes). * rethook: Use __rcu pointer for rethook::handler (git-fixes). * ring-buffer: Do not try to put back write_stamp (git-fixes). * ring-buffer: Do not update before stamp when switching sub-buffers (git- fixes). * ring-buffer: Fix a race in rb_time_cmpxchg() for 32 bit archs (git-fixes). * ring-buffer: Fix memory leak of free page (git-fixes). * ring-buffer: Fix slowpath of interrupted event (git-fixes). * ring-buffer: Fix wake ups when buffer_percent is set to 100 (git-fixes). * ring-buffer: Fix writing to the buffer with max_data_size (git-fixes). * ring-buffer: Force absolute timestamp on discard of event (git-fixes). * ring-buffer: Have saved event hold the entire event (git-fixes). * ring-buffer: Remove useless update to write_stamp in rb_try_to_discard() (git-fixes). * s390/vx: fix save/restore of fpu kernel context (git-fixes bsc#1218357). * scsi: lpfc: use unsigned type for num_sge (bsc#1214747). * serial: 8250: 8250_omap: Clear UART_HAS_RHR_IT_DIS bit (git-fixes). * serial: 8250: 8250_omap: Do not start RX DMA on THRI interrupt (git-fixes). * serial: sc16is7xx: address RX timeout interrupt errata (git-fixes). * soundwire: stream: fix NULL pointer dereference for multi_link (git-fixes). * spi: atmel: Fix clock issue when using devices with different polarities (git-fixes). * statfs: enforce statfs[64] structure initialization (git-fixes). * supported.conf: add drivers/virt/coco/tsm (jsc#PED-7167) * swiotlb: always set the number of areas before allocating the pool (git- fixes). * swiotlb: do not panic! (git-fixes). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix debugfs reporting of reserved memory pools (git-fixes). * swiotlb: fix slot alignment checks (bsc#1216559). * swiotlb: fix the deadlock in swiotlb_do_find_slots (git-fixes). * swiotlb: mark swiotlb_memblock_alloc() as __init (git-fixes). * swiotlb: reduce the number of areas to match actual memory pool size (git- fixes). * swiotlb: reduce the swiotlb buffer size on allocation failure (git-fixes). * swiotlb: use the calculated number of areas (git-fixes). * tracing / synthetic: Disable events after testing in synth_event_gen_test_init() (git-fixes). * tracing/kprobes: Fix the description of variable length arguments (git- fixes). * tracing/kprobes: Fix the order of argument descriptions (git-fixes). * tracing/perf: Add interrupt_context_level() helper (git-fixes). * tracing/synthetic: fix kernel-doc warnings (git-fixes). * tracing: Always update snapshot buffer size (git-fixes). * tracing: Disable preemption when using the filter buffer (bsc#1217036). * tracing: Disable snapshot buffer when stopping instance tracers (git-fixes). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix blocked reader of snapshot buffer (git-fixes). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (git-fixes, bsc#1217036). * tracing: Have the user copy of synthetic event address use correct context (git-fixes). * tracing: Reuse logic from perf's get_recursion_context() (git-fixes). * tracing: Set actual size after ring buffer resize (git-fixes). * tracing: Stop current tracer when resizing buffer (git-fixes). * tracing: Update snapshot buffer on resize if it is allocated (git-fixes). * tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036). * tracing: relax trace_event_eval_update() execution with cond_resched() (git- fixes). * uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978). * ubifs: Fix memory leak of bud->log_hash (git-fixes). * ubifs: fix possible dereference after free (git-fixes). * usb-storage: Add quirk for incorrect WP on Kingston DT Ultimate 3.0 G3 (git- fixes). * usb: aqc111: check packet for fixup for true limit (git-fixes). * usb: config: fix iteration issue in 'usb_get_bos_descriptor()' (git-fixes). * usb: host: xhci-plat: fix possible kernel oops while resuming (git-fixes). * usb: hub: Guard against accesses to uninitialized BOS descriptors (git- fixes). * usb: serial: ftdi_sio: update Actisense PIDs constant names (git-fixes). * usb: serial: option: add Foxconn T99W265 with new baseline (git-fixes). * usb: serial: option: add Quectel EG912Y module support (git-fixes). * usb: serial: option: add Quectel RM500Q R13 firmware support (git-fixes). * usb: typec: bus: verify partner exists in typec_altmode_attention (git- fixes). * usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes). * usb: typec: ucsi: acpi: add quirk for ASUS Zenbook UM325 (git-fixes). * virt/coco/sev-guest: Double-buffer messages (jsc#PED-7167). * virt: coco: Add a coco/Makefile and coco/Kconfig (jsc#PED-7167). * virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT (jsc#PED-7167). * virt: sevguest: Fix passing a stack buffer as a scatterlist target (jsc#PED-7167). * virt: sevguest: Prep for kernel internal get_ext_report() (jsc#PED-7167). * virt: tdx-guest: Add Quote generation support using TSM_REPORTS (jsc#PED-7167). * vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602). * wifi: cfg80211: Add my certificate (git-fixes). * wifi: cfg80211: fix certs build to not depend on file order (git-fixes). * wifi: iwlwifi: pcie: add another missing bh-disable for rxq->lock (git- fixes). * wifi: iwlwifi: pcie: do not synchronize IRQs from IRQ (git-fixes). * wifi: mac80211: mesh: check element parsing succeeded (git-fixes). * wifi: mac80211: mesh_plink: fix matches_local logic (git-fixes). * x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes). * x86/alternatives: Disable KASAN in apply_alternatives() (git-fixes). * x86/alternatives: Disable interrupts and sync when optimizing NOPs in place (git-fixes). * x86/alternatives: Sync core before enabling interrupts (git-fixes). * x86/boot/compressed: Handle unaccepted memory (jsc#PED-7167). * x86/boot/compressed: Reserve more memory for page tables (git-fixes). * x86/boot: Add an efi.h header for the decompressor (jsc#PED-7167). * x86/boot: Centralize __pa()/__va() definitions (jsc#PED-7167). * x86/boot: Fix incorrect startup_gdt_descr.size (git-fixes). * x86/cpu/amd: Enable Zenbleed fix for AMD Custom APU 0405 (git-fixes). * x86/cpu: Do not write CSTAR MSR on Intel CPUs (jsc#PED-7167). * x86/cpu: Fix amd_check_microcode() declaration (git-fixes). * x86/efi: Safely enable unaccepted memory in UEFI (jsc#PED-7167). * x86/entry: Convert INT 0x80 emulation to IDTENTRY (bsc#1217927). * x86/entry: Do not allow external 0x80 interrupts (bsc#1217927). * x86/fpu/xstate: Prevent false-positive warning in __copy_xstate_uabi_buf() (git-fixes). * x86/fpu: Invalidate FPU state correctly on exec() (git-fixes). * x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790). * x86/purgatory: Remove LTO flags (git-fixes). * x86/resctrl: Fix kernel-doc warnings (git-fixes). * x86/sev-es: Replace open-coded hlt-loop with sev_es_terminate() (jsc#PED-7167). * x86/sev-es: Use insn_decode_mmio() for MMIO implementation (jsc#PED-7167). * x86/sev: Add SNP-specific unaccepted memory support (jsc#PED-7167). * x86/sev: Allow for use of the early boot GHCB for PSC requests (jsc#PED-7167). * x86/sev: Change npages to unsigned long in snp_accept_memory() (jsc#PED-7167). * x86/sev: Change snp_guest_issue_request()'s fw_err argument (jsc#PED-7167). * x86/sev: Fix address space sparse warning (jsc#PED-7167). * x86/sev: Get rid of special sev_es_enable_key (jsc#PED-7167). * x86/sev: Mark snp_abort() noreturn (jsc#PED-7167). * x86/sev: Put PSC struct on the stack in prep for unaccepted memory support (jsc#PED-7167). * x86/sev: Use large PSC requests if applicable (jsc#PED-7167). * x86/smp: Use dedicated cache-line for mwait_play_dead() (git-fixes). * x86/srso: Add SRSO mitigation for Hygon processors (git-fixes). * x86/srso: Fix SBPB enablement for (possible) future fixed HW (git-fixes). * x86/srso: Fix vulnerability reporting for missing microcode (git-fixes). * x86/tdx: Add unaccepted memory support (jsc#PED-7167). * x86/tdx: Disable NOTIFY_ENABLES (jsc#PED-7167). * x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub (jsc#PED-7167). * x86/tdx: Refactor try_accept_one() (jsc#PED-7167). * x86/tdx: Relax SEPT_VE_DISABLE check for debug TD (jsc#PED-7167). * x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLE (jsc#PED-7167). * x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217). * x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217). * x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217). * x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git- fixes). * xfs: Rename __xfs_attr_rmtval_remove (git-fixes). * xfs: Use kvcalloc() instead of kvzalloc() (git-fixes). * xfs: aborting inodes on shutdown may need buffer lock (git-fixes). * xfs: add selinux labels to whiteout inodes (git-fixes). * xfs: clean up "%Ld/%Lu" which does not meet C standard (git-fixes). * xfs: convert flex-array declarations in struct xfs_attrlist* (git-fixes). * xfs: convert flex-array declarations in xfs attr leaf blocks (git-fixes). * xfs: convert flex-array declarations in xfs attr shortform objects (git- fixes). * xfs: decode scrub flags in ftrace output (git-fixes). * xfs: dump log intent items that cannot be recovered due to corruption (git- fixes). * xfs: fix a bug in the online fsck directory leaf1 bestcount check (git- fixes). * xfs: fix agf_fllast when repairing an empty AGFL (git-fixes). * xfs: fix incorrect unit conversion in scrub tracepoint (git-fixes). * xfs: fix silly whitespace problems with kernel libxfs (git-fixes). * xfs: fix uninit warning in xfs_growfs_data (git-fixes). * xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes). * xfs: make sure maxlen is still congruent with prod when rounding down (git- fixes). * xfs: remove kmem_alloc_io() (git-fixes). * xfs: remove the xfs_dinode_t typedef (git-fixes). * xfs: remove the xfs_dqblk_t typedef (git-fixes). * xfs: remove the xfs_dsb_t typedef (git-fixes). * xfs: rename xfs_has_attr() (git-fixes). * xfs: replace snprintf in show functions with sysfs_emit (git-fixes). * xfs: return EINTR when a fatal signal terminates scrub (git-fixes). * xfs: sb verifier does not handle uncached sb buffer (git-fixes). * xfs: simplify two-level sysctl registration for xfs_table (git-fixes). * xfs: sysfs: use default_groups in kobj_type (git-fixes). * xfs: use swap() to make dabtree code cleaner (git-fixes). * xhci: Clear EHB bit only at end of interrupt handler (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-141=1 openSUSE-SLE-15.5-2024-141=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-141=1 ## Package List: * openSUSE Leap 15.5 (aarch64 x86_64) * reiserfs-kmp-azure-5.14.21-150500.33.29.1 * kernel-azure-optional-5.14.21-150500.33.29.1 * reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.29.1 * kernel-azure-debuginfo-5.14.21-150500.33.29.1 * kernel-azure-livepatch-devel-5.14.21-150500.33.29.1 * kernel-azure-debugsource-5.14.21-150500.33.29.1 * kselftests-kmp-azure-debuginfo-5.14.21-150500.33.29.1 * kernel-azure-extra-debuginfo-5.14.21-150500.33.29.1 * dlm-kmp-azure-debuginfo-5.14.21-150500.33.29.1 * kselftests-kmp-azure-5.14.21-150500.33.29.1 * ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.29.1 * gfs2-kmp-azure-5.14.21-150500.33.29.1 * kernel-azure-devel-5.14.21-150500.33.29.1 * kernel-syms-azure-5.14.21-150500.33.29.1 * dlm-kmp-azure-5.14.21-150500.33.29.1 * gfs2-kmp-azure-debuginfo-5.14.21-150500.33.29.1 * kernel-azure-devel-debuginfo-5.14.21-150500.33.29.1 * ocfs2-kmp-azure-5.14.21-150500.33.29.1 * cluster-md-kmp-azure-5.14.21-150500.33.29.1 * kernel-azure-extra-5.14.21-150500.33.29.1 * kernel-azure-optional-debuginfo-5.14.21-150500.33.29.1 * cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.29.1 * openSUSE Leap 15.5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.29.1 * openSUSE Leap 15.5 (x86_64) * kernel-azure-vdso-5.14.21-150500.33.29.1 * kernel-azure-vdso-debuginfo-5.14.21-150500.33.29.1 * openSUSE Leap 15.5 (noarch) * kernel-source-azure-5.14.21-150500.33.29.1 * kernel-devel-azure-5.14.21-150500.33.29.1 * Public Cloud Module 15-SP5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.29.1 * Public Cloud Module 15-SP5 (aarch64 x86_64) * kernel-azure-devel-debuginfo-5.14.21-150500.33.29.1 * kernel-azure-devel-5.14.21-150500.33.29.1 * kernel-syms-azure-5.14.21-150500.33.29.1 * kernel-azure-debuginfo-5.14.21-150500.33.29.1 * kernel-azure-debugsource-5.14.21-150500.33.29.1 * Public Cloud Module 15-SP5 (noarch) * kernel-source-azure-5.14.21-150500.33.29.1 * kernel-devel-azure-5.14.21-150500.33.29.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6622.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212139 * https://bugzilla.suse.com/show_bug.cgi?id=1212584 * https://bugzilla.suse.com/show_bug.cgi?id=1214117 * https://bugzilla.suse.com/show_bug.cgi?id=1214747 * https://bugzilla.suse.com/show_bug.cgi?id=1214823 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1215952 * https://bugzilla.suse.com/show_bug.cgi?id=1216032 * https://bugzilla.suse.com/show_bug.cgi?id=1216057 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217602 * https://bugzilla.suse.com/show_bug.cgi?id=1217692 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217822 * https://bugzilla.suse.com/show_bug.cgi?id=1217927 * https://bugzilla.suse.com/show_bug.cgi?id=1217933 * https://bugzilla.suse.com/show_bug.cgi?id=1217938 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1217980 * https://bugzilla.suse.com/show_bug.cgi?id=1217981 * https://bugzilla.suse.com/show_bug.cgi?id=1217982 * https://bugzilla.suse.com/show_bug.cgi?id=1218056 * https://bugzilla.suse.com/show_bug.cgi?id=1218092 * https://bugzilla.suse.com/show_bug.cgi?id=1218139 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218229 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218335 * https://bugzilla.suse.com/show_bug.cgi?id=1218357 * https://bugzilla.suse.com/show_bug.cgi?id=1218397 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218461 * https://bugzilla.suse.com/show_bug.cgi?id=1218515 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218569 * https://bugzilla.suse.com/show_bug.cgi?id=1218643 * https://jira.suse.com/browse/PED-3459 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-7167 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:30 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 12:30:30 -0000 Subject: SUSE-SU-2024:0140-1: important: Security update for libssh Message-ID: <170558103010.4190.5448984171602462101@smelt2.prg2.suse.org> # Security update for libssh Announcement ID: SUSE-SU-2024:0140-1 Rating: important References: * bsc#1211188 * bsc#1211190 * bsc#1218126 * bsc#1218186 * bsc#1218209 Cross-References: * CVE-2023-1667 * CVE-2023-2283 * CVE-2023-48795 * CVE-2023-6004 * CVE-2023-6918 CVSS scores: * CVE-2023-1667 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-1667 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2283 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-2283 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-6004 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2023-6004 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2023-6918 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6918 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves five vulnerabilities can now be installed. ## Description: This update for libssh fixes the following issues: Security fixes: * CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) * CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) * CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) * CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) * CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: * Update to version 0.9.8 * Allow @ in usernames when parsing from URI composes * Update to version 0.9.7 * Fix several memory leaks in GSSAPI handling code ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-140=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-140=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-140=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-140=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-140=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-140=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-140=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-140=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-140=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-140=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-140=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-140=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-140=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-140=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-140=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-140=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-140=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-140=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-140=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * openSUSE Leap 15.4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libssh4-64bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-64bit-0.9.8-150400.3.3.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * openSUSE Leap 15.5 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * Basesystem Module 15-SP5 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * SUSE Manager Proxy 4.3 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Manager Server 4.3 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1667.html * https://www.suse.com/security/cve/CVE-2023-2283.html * https://www.suse.com/security/cve/CVE-2023-48795.html * https://www.suse.com/security/cve/CVE-2023-6004.html * https://www.suse.com/security/cve/CVE-2023-6918.html * https://bugzilla.suse.com/show_bug.cgi?id=1211188 * https://bugzilla.suse.com/show_bug.cgi?id=1211190 * https://bugzilla.suse.com/show_bug.cgi?id=1218126 * https://bugzilla.suse.com/show_bug.cgi?id=1218186 * https://bugzilla.suse.com/show_bug.cgi?id=1218209 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:35 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 12:30:35 -0000 Subject: SUSE-RU-2024:0139-1: moderate: Recommended update for go1.21 Message-ID: <170558103543.4190.10288893704566989961@smelt2.prg2.suse.org> # Recommended update for go1.21 Announcement ID: SUSE-RU-2024:0139-1 Rating: moderate References: * bsc#1212475 Affected Products: * Containers Module 15-SP4 * Containers Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-139=1 * Containers Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2024-139=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-139=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-139=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-139=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-139=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-139=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-139=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-139=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-139=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * go1.21-doc-1.21.6-150000.1.21.1 * go1.21-race-1.21.6-150000.1.21.1 * go1.21-1.21.6-150000.1.21.1 * Containers Module 15-SP4 (aarch64 ppc64le s390x) * container-suseconnect-2.4.0-150000.4.48.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.4.0-150000.4.48.1 * container-suseconnect-debuginfo-2.4.0-150000.4.48.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * go1.21-doc-1.21.6-150000.1.21.1 * go1.21-race-1.21.6-150000.1.21.1 * go1.21-1.21.6-150000.1.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.21-doc-1.21.6-150000.1.21.1 * container-suseconnect-2.4.0-150000.4.48.1 * go1.21-race-1.21.6-150000.1.21.1 * go1.21-1.21.6-150000.1.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.21-doc-1.21.6-150000.1.21.1 * container-suseconnect-2.4.0-150000.4.48.1 * go1.21-race-1.21.6-150000.1.21.1 * go1.21-1.21.6-150000.1.21.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * go1.21-doc-1.21.6-150000.1.21.1 * go1.21-race-1.21.6-150000.1.21.1 * go1.21-1.21.6-150000.1.21.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * go1.21-doc-1.21.6-150000.1.21.1 * go1.21-race-1.21.6-150000.1.21.1 * go1.21-1.21.6-150000.1.21.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * go1.21-doc-1.21.6-150000.1.21.1 * container-suseconnect-2.4.0-150000.4.48.1 * go1.21-1.21.6-150000.1.21.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64) * go1.21-race-1.21.6-150000.1.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.21-doc-1.21.6-150000.1.21.1 * container-suseconnect-2.4.0-150000.4.48.1 * go1.21-1.21.6-150000.1.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * go1.21-race-1.21.6-150000.1.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212475 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:38 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 12:30:38 -0000 Subject: SUSE-SU-2024:0138-1: moderate: Security update for libqt5-qtbase Message-ID: <170558103884.4190.13690526396773514635@smelt2.prg2.suse.org> # Security update for libqt5-qtbase Announcement ID: SUSE-SU-2024:0138-1 Rating: moderate References: * bsc#1218413 Cross-References: * CVE-2023-51714 CVSS scores: * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libqt5-qtbase fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-138=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-138=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-138=1 openSUSE-SLE-15.5-2024-138=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Network-devel-5.15.8+kde185-150500.4.16.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.16.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.16.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-5.15.8+kde185-150500.4.16.1 * libQt5Core-devel-5.15.8+kde185-150500.4.16.1 * libQt5Core5-5.15.8+kde185-150500.4.16.1 * libQt5Test5-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.16.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.16.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-5.15.8+kde185-150500.4.16.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Network5-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-5.15.8+kde185-150500.4.16.1 * libQt5Test-devel-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.16.1 * Basesystem Module 15-SP5 (noarch) * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.16.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.16.1 * openSUSE Leap 15.5 (x86_64) * libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Test5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-examples-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Core5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Test-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Test5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Network-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Network5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Core-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Core5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Network5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.16.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Network-devel-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.16.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.16.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.16.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.16.1 * libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-5.15.8+kde185-150500.4.16.1 * libQt5Core-devel-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-examples-5.15.8+kde185-150500.4.16.1 * libQt5Core5-5.15.8+kde185-150500.4.16.1 * libQt5Test5-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-examples-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.16.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.16.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-5.15.8+kde185-150500.4.16.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.16.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Network5-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.16.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-5.15.8+kde185-150500.4.16.1 * libQt5Test-devel-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.16.1 * openSUSE Leap 15.5 (noarch) * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.16.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libQt5Gui5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Test-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Network-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-64bit-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Core-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Network5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-examples-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Widgets-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Network5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Gui-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Core5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Core5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-64bit-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-64bit-5.15.8+kde185-150500.4.16.1 * libQt5OpenGLExtensions-devel-static-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Test5-64bit-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-examples-64bit-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5PlatformSupport-devel-static-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Test5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Bootstrap-devel-static-64bit-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Xml-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51714.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:43 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 12:30:43 -0000 Subject: SUSE-SU-2024:0137-1: moderate: Security update for pam Message-ID: <170558104322.4190.6827258010988195333@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2024:0137-1 Rating: moderate References: * bsc#1218475 Cross-References: * CVE-2024-22365 CVSS scores: * CVE-2024-22365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for pam fixes the following issues: * CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-137=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-137=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-137=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-137=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * pam-devel-1.1.8-24.56.1 * pam-debuginfo-1.1.8-24.56.1 * pam-debugsource-1.1.8-24.56.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * pam-1.1.8-24.56.1 * pam-debuginfo-1.1.8-24.56.1 * pam-extra-debuginfo-1.1.8-24.56.1 * pam-extra-1.1.8-24.56.1 * pam-debugsource-1.1.8-24.56.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * pam-doc-1.1.8-24.56.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * pam-extra-32bit-1.1.8-24.56.1 * pam-debuginfo-32bit-1.1.8-24.56.1 * pam-32bit-1.1.8-24.56.1 * pam-extra-debuginfo-32bit-1.1.8-24.56.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * pam-1.1.8-24.56.1 * pam-debuginfo-1.1.8-24.56.1 * pam-extra-debuginfo-1.1.8-24.56.1 * pam-extra-1.1.8-24.56.1 * pam-debugsource-1.1.8-24.56.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * pam-doc-1.1.8-24.56.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * pam-extra-32bit-1.1.8-24.56.1 * pam-debuginfo-32bit-1.1.8-24.56.1 * pam-32bit-1.1.8-24.56.1 * pam-extra-debuginfo-32bit-1.1.8-24.56.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * pam-1.1.8-24.56.1 * pam-debuginfo-1.1.8-24.56.1 * pam-extra-debuginfo-1.1.8-24.56.1 * pam-extra-1.1.8-24.56.1 * pam-debugsource-1.1.8-24.56.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * pam-doc-1.1.8-24.56.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * pam-extra-32bit-1.1.8-24.56.1 * pam-debuginfo-32bit-1.1.8-24.56.1 * pam-32bit-1.1.8-24.56.1 * pam-extra-debuginfo-32bit-1.1.8-24.56.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22365.html * https://bugzilla.suse.com/show_bug.cgi?id=1218475 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:48 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 12:30:48 -0000 Subject: SUSE-SU-2024:0136-1: moderate: Security update for pam Message-ID: <170558104843.4190.15149731754912073245@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2024:0136-1 Rating: moderate References: * bsc#1217000 * bsc#1218475 Cross-References: * CVE-2024-22365 CVSS scores: * CVE-2024-22365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for pam fixes the following issues: * CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). * Check localtime_r() return value to fix crashing (bsc#1217000) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-136=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-136=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-136=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-136=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-136=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-136=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-136=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-136=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-136=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-136=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-136=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-136=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-136=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-136=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-136=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-136=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-136=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-136=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-136=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-136=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-136=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-136=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-136=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-136=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-136=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-136=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-136=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-136=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-136=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-136=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-136=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-136=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-136=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * Basesystem Module 15-SP5 (noarch) * pam-doc-1.3.0-150000.6.66.1 * Basesystem Module 15-SP5 (x86_64) * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * Development Tools Module 15-SP5 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Manager Proxy 4.3 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Manager Proxy 4.3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Manager Server 4.3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Manager Server 4.3 (x86_64) * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Enterprise Storage 7.1 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Enterprise Storage 7.1 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE CaaS Platform 4.0 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE CaaS Platform 4.0 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * openSUSE Leap 15.5 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * openSUSE Leap 15.5 (noarch) * pam-doc-1.3.0-150000.6.66.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22365.html * https://bugzilla.suse.com/show_bug.cgi?id=1217000 * https://bugzilla.suse.com/show_bug.cgi?id=1218475 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:53 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 12:30:53 -0000 Subject: SUSE-SU-2024:0135-1: important: Security update for rear27a Message-ID: <170558105351.4190.7389749869281023456@smelt2.prg2.suse.org> # Security update for rear27a Announcement ID: SUSE-SU-2024:0135-1 Rating: important References: * bsc#1218728 Cross-References: * CVE-2024-23301 CVSS scores: * CVE-2024-23301 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for rear27a fixes the following issues: * CVE-2024-23301: Fixed ReaR creates world-readable initrd with GRUB_RESCUE=Y. (bsc#1218728) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-135=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-135=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * rear27a-2.7-8.6.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le x86_64) * rear27a-2.7-8.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23301.html * https://bugzilla.suse.com/show_bug.cgi?id=1218728 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:30:05 -0000 Subject: SUSE-SU-2024:0154-1: important: Security update for the Linux Kernel Message-ID: <170559540548.31379.2131507938533419652@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0154-1 Rating: important References: * bsc#1179610 * bsc#1215237 * bsc#1217250 * bsc#1217709 * bsc#1217946 * bsc#1217947 * bsc#1218253 * bsc#1218258 * bsc#1218559 * jsc#PED-5021 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Proxy 4.1 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Server 4.1 An update that solves seven vulnerabilities, contains one feature and has two security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). The following non-security bugs were fixed: * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021) * io_uring: fix 32-bit compatability with sendmsg/recvmsg (bsc#1217709). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-154=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-154=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-154=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-154=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-154=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (nosrc) * kernel-default-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-default-debuginfo-5.3.18-150200.24.175.1 * kernel-livepatch-5_3_18-150200_24_175-default-debuginfo-1-150200.5.3.1 * kernel-livepatch-5_3_18-150200_24_175-default-1-150200.5.3.1 * kernel-default-livepatch-devel-5.3.18-150200.24.175.1 * kernel-default-livepatch-5.3.18-150200.24.175.1 * kernel-livepatch-SLE15-SP2_Update_44-debugsource-1-150200.5.3.1 * kernel-default-debugsource-5.3.18-150200.24.175.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-5.3.18-150200.24.175.1 * cluster-md-kmp-default-5.3.18-150200.24.175.1 * gfs2-kmp-default-debuginfo-5.3.18-150200.24.175.1 * cluster-md-kmp-default-debuginfo-5.3.18-150200.24.175.1 * ocfs2-kmp-default-debuginfo-5.3.18-150200.24.175.1 * dlm-kmp-default-debuginfo-5.3.18-150200.24.175.1 * dlm-kmp-default-5.3.18-150200.24.175.1 * ocfs2-kmp-default-5.3.18-150200.24.175.1 * kernel-default-debuginfo-5.3.18-150200.24.175.1 * kernel-default-debugsource-5.3.18-150200.24.175.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (nosrc) * kernel-default-5.3.18-150200.24.175.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150200.24.175.1 * kernel-preempt-5.3.18-150200.24.175.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * kernel-default-devel-debuginfo-5.3.18-150200.24.175.1 * kernel-preempt-devel-5.3.18-150200.24.175.1 * kernel-obs-build-5.3.18-150200.24.175.1 * kernel-default-base-5.3.18-150200.24.175.1.150200.9.89.1 * kernel-default-devel-5.3.18-150200.24.175.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.175.1 * kernel-preempt-debuginfo-5.3.18-150200.24.175.1 * kernel-default-debuginfo-5.3.18-150200.24.175.1 * kernel-obs-build-debugsource-5.3.18-150200.24.175.1 * kernel-preempt-debugsource-5.3.18-150200.24.175.1 * kernel-syms-5.3.18-150200.24.175.1 * kernel-default-debugsource-5.3.18-150200.24.175.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * kernel-source-5.3.18-150200.24.175.1 * kernel-devel-5.3.18-150200.24.175.1 * kernel-macros-5.3.18-150200.24.175.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-5.3.18-150200.24.175.1 * reiserfs-kmp-default-5.3.18-150200.24.175.1 * kernel-obs-build-5.3.18-150200.24.175.1 * kernel-default-base-5.3.18-150200.24.175.1.150200.9.89.1 * kernel-default-devel-5.3.18-150200.24.175.1 * kernel-default-debuginfo-5.3.18-150200.24.175.1 * kernel-obs-build-debugsource-5.3.18-150200.24.175.1 * reiserfs-kmp-default-debuginfo-5.3.18-150200.24.175.1 * kernel-syms-5.3.18-150200.24.175.1 * kernel-default-debugsource-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * kernel-source-5.3.18-150200.24.175.1 * kernel-devel-5.3.18-150200.24.175.1 * kernel-macros-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * kernel-preempt-debuginfo-5.3.18-150200.24.175.1 * kernel-preempt-debugsource-5.3.18-150200.24.175.1 * kernel-preempt-devel-5.3.18-150200.24.175.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * kernel-default-devel-debuginfo-5.3.18-150200.24.175.1 * reiserfs-kmp-default-5.3.18-150200.24.175.1 * kernel-obs-build-5.3.18-150200.24.175.1 * kernel-default-base-5.3.18-150200.24.175.1.150200.9.89.1 * kernel-default-devel-5.3.18-150200.24.175.1 * kernel-default-debuginfo-5.3.18-150200.24.175.1 * kernel-obs-build-debugsource-5.3.18-150200.24.175.1 * reiserfs-kmp-default-debuginfo-5.3.18-150200.24.175.1 * kernel-syms-5.3.18-150200.24.175.1 * kernel-default-debugsource-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * kernel-source-5.3.18-150200.24.175.1 * kernel-devel-5.3.18-150200.24.175.1 * kernel-macros-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc x86_64) * kernel-preempt-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * kernel-preempt-debuginfo-5.3.18-150200.24.175.1 * kernel-preempt-debugsource-5.3.18-150200.24.175.1 * kernel-preempt-devel-5.3.18-150200.24.175.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.175.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217709 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://jira.suse.com/browse/PED-5021 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:30:09 -0000 Subject: SUSE-SU-2024:0153-1: important: Security update for the Linux Kernel Message-ID: <170559540939.31379.42693687940775100@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0153-1 Rating: important References: * bsc#1179610 * bsc#1215237 * bsc#1215375 * bsc#1217250 * bsc#1217709 * bsc#1217946 * bsc#1217947 * bsc#1218105 * bsc#1218253 * bsc#1218258 * bsc#1218559 * jsc#PED-5021 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves seven vulnerabilities, contains one feature and has four security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). The following non-security bugs were fixed: * clocksource: Avoid accidental unstable marking of clocksources (bsc#1218105). * clocksource: Suspend the watchdog temporarily when high read latency detected (bsc#1218105). * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021). * efi/mokvar: Reserve the table only if it is in boot services data (bsc#1215375). * io_uring: fix 32-bit compatability with sendmsg/recvmsg (bsc#1217709). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-153=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-153=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-153=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-153=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-153=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-153=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-153=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-153=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-153=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-153=1 ## Package List: * openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.147.1 * openSUSE Leap 15.3 (noarch) * kernel-macros-5.3.18-150300.59.147.1 * kernel-docs-html-5.3.18-150300.59.147.1 * kernel-source-vanilla-5.3.18-150300.59.147.1 * kernel-devel-5.3.18-150300.59.147.1 * kernel-source-5.3.18-150300.59.147.1 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-kvmsmall-5.3.18-150300.59.147.2 * kernel-debug-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-kvmsmall-debugsource-5.3.18-150300.59.147.2 * kernel-debug-livepatch-devel-5.3.18-150300.59.147.2 * kernel-kvmsmall-devel-5.3.18-150300.59.147.2 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.147.2 * kernel-debug-devel-5.3.18-150300.59.147.2 * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-debug-debuginfo-5.3.18-150300.59.147.2 * kernel-debug-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.147.2 * kernel-debug-debugsource-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * kselftests-kmp-default-5.3.18-150300.59.147.2 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * cluster-md-kmp-default-5.3.18-150300.59.147.2 * kernel-default-optional-debuginfo-5.3.18-150300.59.147.2 * kernel-default-livepatch-devel-5.3.18-150300.59.147.2 * kernel-default-extra-5.3.18-150300.59.147.2 * kernel-obs-qa-5.3.18-150300.59.147.1 * kernel-default-base-rebuild-5.3.18-150300.59.147.2.150300.18.86.2 * kernel-default-extra-debuginfo-5.3.18-150300.59.147.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-devel-5.3.18-150300.59.147.2 * kernel-syms-5.3.18-150300.59.147.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * dlm-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-obs-build-5.3.18-150300.59.147.2 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-livepatch-5.3.18-150300.59.147.2 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-obs-build-debugsource-5.3.18-150300.59.147.2 * reiserfs-kmp-default-5.3.18-150300.59.147.2 * ocfs2-kmp-default-5.3.18-150300.59.147.2 * dlm-kmp-default-5.3.18-150300.59.147.2 * kernel-default-optional-5.3.18-150300.59.147.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * gfs2-kmp-default-5.3.18-150300.59.147.2 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_40-debugsource-1-150300.7.3.2 * kernel-livepatch-5_3_18-150300_59_147-default-debuginfo-1-150300.7.3.2 * kernel-livepatch-5_3_18-150300_59_147-default-1-150300.7.3.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_147-preempt-1-150300.7.3.2 * kernel-livepatch-5_3_18-150300_59_147-preempt-debuginfo-1-150300.7.3.2 * openSUSE Leap 15.3 (aarch64 x86_64) * cluster-md-kmp-preempt-5.3.18-150300.59.147.2 * kernel-preempt-optional-5.3.18-150300.59.147.2 * dlm-kmp-preempt-5.3.18-150300.59.147.2 * kernel-preempt-livepatch-devel-5.3.18-150300.59.147.2 * kernel-preempt-debuginfo-5.3.18-150300.59.147.2 * gfs2-kmp-preempt-5.3.18-150300.59.147.2 * reiserfs-kmp-preempt-5.3.18-150300.59.147.2 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.147.2 * ocfs2-kmp-preempt-5.3.18-150300.59.147.2 * kernel-preempt-devel-5.3.18-150300.59.147.2 * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.147.2 * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.147.2 * kselftests-kmp-preempt-5.3.18-150300.59.147.2 * kernel-preempt-extra-5.3.18-150300.59.147.2 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.147.2 * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.147.2 * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.147.1 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.147.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.147.1 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.147.1 * openSUSE Leap 15.3 (aarch64) * dtb-marvell-5.3.18-150300.59.147.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-debugsource-5.3.18-150300.59.147.2 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.147.2 * dtb-freescale-5.3.18-150300.59.147.1 * gfs2-kmp-64kb-5.3.18-150300.59.147.2 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.147.2 * dtb-zte-5.3.18-150300.59.147.1 * dlm-kmp-64kb-5.3.18-150300.59.147.2 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.147.2 * dtb-lg-5.3.18-150300.59.147.1 * dtb-renesas-5.3.18-150300.59.147.1 * dtb-al-5.3.18-150300.59.147.1 * dtb-allwinner-5.3.18-150300.59.147.1 * dtb-amd-5.3.18-150300.59.147.1 * dtb-apm-5.3.18-150300.59.147.1 * dtb-socionext-5.3.18-150300.59.147.1 * kernel-64kb-livepatch-devel-5.3.18-150300.59.147.2 * dtb-sprd-5.3.18-150300.59.147.1 * dtb-arm-5.3.18-150300.59.147.1 * ocfs2-kmp-64kb-5.3.18-150300.59.147.2 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-debuginfo-5.3.18-150300.59.147.2 * kselftests-kmp-64kb-5.3.18-150300.59.147.2 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-extra-5.3.18-150300.59.147.2 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.147.2 * dtb-altera-5.3.18-150300.59.147.1 * kernel-64kb-devel-5.3.18-150300.59.147.2 * dtb-hisilicon-5.3.18-150300.59.147.1 * dtb-mediatek-5.3.18-150300.59.147.1 * dtb-xilinx-5.3.18-150300.59.147.1 * dtb-broadcom-5.3.18-150300.59.147.1 * dtb-cavium-5.3.18-150300.59.147.1 * reiserfs-kmp-64kb-5.3.18-150300.59.147.2 * dtb-exynos-5.3.18-150300.59.147.1 * dtb-qcom-5.3.18-150300.59.147.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-optional-5.3.18-150300.59.147.2 * dtb-amlogic-5.3.18-150300.59.147.1 * dtb-nvidia-5.3.18-150300.59.147.1 * dtb-rockchip-5.3.18-150300.59.147.1 * cluster-md-kmp-64kb-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-default-livepatch-5.3.18-150300.59.147.2 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * kernel-livepatch-5_3_18-150300_59_147-default-1-150300.7.3.2 * kernel-default-livepatch-devel-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.147.2 * ocfs2-kmp-default-5.3.18-150300.59.147.2 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.147.2 * dlm-kmp-default-5.3.18-150300.59.147.2 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * cluster-md-kmp-default-5.3.18-150300.59.147.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.147.2 * dlm-kmp-default-debuginfo-5.3.18-150300.59.147.2 * gfs2-kmp-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-debugsource-5.3.18-150300.59.147.2 * kernel-64kb-devel-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.147.2 * kernel-preempt-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-debugsource-5.3.18-150300.59.147.2 * reiserfs-kmp-default-5.3.18-150300.59.147.2 * kernel-syms-5.3.18-150300.59.147.1 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-obs-build-5.3.18-150300.59.147.2 * kernel-default-devel-5.3.18-150300.59.147.2 * kernel-preempt-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-devel-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-devel-5.3.18-150300.59.147.1 * kernel-macros-5.3.18-150300.59.147.1 * kernel-source-5.3.18-150300.59.147.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-debugsource-5.3.18-150300.59.147.2 * kernel-64kb-devel-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.147.2 * reiserfs-kmp-default-5.3.18-150300.59.147.2 * kernel-syms-5.3.18-150300.59.147.1 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * kernel-obs-build-5.3.18-150300.59.147.2 * kernel-default-devel-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * kernel-devel-5.3.18-150300.59.147.1 * kernel-macros-5.3.18-150300.59.147.1 * kernel-source-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * kernel-preempt-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-devel-5.3.18-150300.59.147.2 * kernel-preempt-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.147.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.147.2 * reiserfs-kmp-default-5.3.18-150300.59.147.2 * kernel-syms-5.3.18-150300.59.147.1 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * kernel-obs-build-5.3.18-150300.59.147.2 * kernel-default-devel-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-devel-5.3.18-150300.59.147.1 * kernel-macros-5.3.18-150300.59.147.1 * kernel-source-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-devel-5.3.18-150300.59.147.2 * kernel-preempt-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.147.2 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.147.2 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-debugsource-5.3.18-150300.59.147.2 * kernel-64kb-devel-5.3.18-150300.59.147.2 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.147.2 * kernel-preempt-5.3.18-150300.59.147.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-debugsource-5.3.18-150300.59.147.2 * reiserfs-kmp-default-5.3.18-150300.59.147.2 * kernel-syms-5.3.18-150300.59.147.1 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-obs-build-5.3.18-150300.59.147.2 * kernel-default-devel-5.3.18-150300.59.147.2 * kernel-preempt-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-devel-5.3.18-150300.59.147.2 * SUSE Enterprise Storage 7.1 (noarch) * kernel-devel-5.3.18-150300.59.147.1 * kernel-macros-5.3.18-150300.59.147.1 * kernel-source-5.3.18-150300.59.147.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215375 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217709 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218105 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://jira.suse.com/browse/PED-5021 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:30:12 -0000 Subject: SUSE-RU-2024:0152-1: moderate: Recommended update for ipxe Message-ID: <170559541264.31379.11536606672603730343@smelt2.prg2.suse.org> # Recommended update for ipxe Announcement ID: SUSE-RU-2024:0152-1 Rating: moderate References: * jsc#PED-1930 Affected Products: * HPC Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that contains one feature can now be installed. ## Description: This update for ipxe fixes the following issues: * Add missing ipxe-bootimgs package to Package Hub 15 SP5 (jsc#PED-1930) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-152=1 openSUSE-SLE-15.5-2024-152=1 * HPC Module 15-SP5 zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-152=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-152=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le x86_64 i586) * ipxe-bootimgs-1.21.1+git20231006.ff0f8604-150500.3.5.1 * HPC Module 15-SP5 (aarch64 x86_64) * ipxe-bootimgs-1.21.1+git20231006.ff0f8604-150500.3.5.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le x86_64) * ipxe-bootimgs-1.21.1+git20231006.ff0f8604-150500.3.5.1 ## References: * https://jira.suse.com/browse/PED-1930 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:30:15 -0000 Subject: SUSE-RU-2024:0151-1: moderate: Recommended update for selinux-policy Message-ID: <170559541514.31379.15528739456899438251@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2024:0151-1 Rating: moderate References: * bsc#1215423 * bsc#1216060 Affected Products: * openSUSE Leap Micro 5.3 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro for Rancher 5.3 An update that has two fixes can now be installed. ## Description: This update for selinux-policy fixes the following issues: * Allow keepalived_t read+write kernel_t pipes (bsc#1216060) * Support new PING_CHECK health checker in keepalived * Allow init to run bpf programs. We do this during early startup (bsc#1215423) * Allow sysadm_t run kernel bpf programs ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-151=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-151=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-151=1 ## Package List: * openSUSE Leap Micro 5.3 (noarch) * selinux-policy-targeted-20210716+git65.8c9b6599-150400.5.12.1 * selinux-policy-devel-20210716+git65.8c9b6599-150400.5.12.1 * selinux-policy-20210716+git65.8c9b6599-150400.5.12.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * selinux-policy-targeted-20210716+git65.8c9b6599-150400.5.12.1 * selinux-policy-devel-20210716+git65.8c9b6599-150400.5.12.1 * selinux-policy-20210716+git65.8c9b6599-150400.5.12.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * selinux-policy-targeted-20210716+git65.8c9b6599-150400.5.12.1 * selinux-policy-devel-20210716+git65.8c9b6599-150400.5.12.1 * selinux-policy-20210716+git65.8c9b6599-150400.5.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215423 * https://bugzilla.suse.com/show_bug.cgi?id=1216060 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:30:17 -0000 Subject: SUSE-RU-2024:0150-1: moderate: Recommended update for selinux-policy Message-ID: <170559541773.31379.4997583419093156587@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2024:0150-1 Rating: moderate References: * bsc#1205931 * bsc#1215423 * bsc#1216060 Affected Products: * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that has three fixes can now be installed. ## Description: This update for selinux-policy fixes the following issues: * Allow rebootmgr to read the system state (bsc#1205931) * Allow keepalived_t read+write kernel_t pipes (bsc#1216060) * Allow init to run bpf programs. We do this during early startup (bsc#1215423) * Allow sysadm_t run kernel bpf programs ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-150=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-150=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-150=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * selinux-policy-20230511+git12.c35c6fe1-150400.4.24.1 * selinux-policy-devel-20230511+git12.c35c6fe1-150400.4.24.1 * selinux-policy-targeted-20230511+git12.c35c6fe1-150400.4.24.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * selinux-policy-20230511+git12.c35c6fe1-150400.4.24.1 * selinux-policy-devel-20230511+git12.c35c6fe1-150400.4.24.1 * selinux-policy-targeted-20230511+git12.c35c6fe1-150400.4.24.1 * openSUSE Leap Micro 5.4 (noarch) * selinux-policy-20230511+git12.c35c6fe1-150400.4.24.1 * selinux-policy-devel-20230511+git12.c35c6fe1-150400.4.24.1 * selinux-policy-targeted-20230511+git12.c35c6fe1-150400.4.24.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1205931 * https://bugzilla.suse.com/show_bug.cgi?id=1215423 * https://bugzilla.suse.com/show_bug.cgi?id=1216060 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:30:20 -0000 Subject: SUSE-RU-2024:0149-1: moderate: Recommended update for selinux-policy Message-ID: <170559542026.31379.7317095817833814414@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2024:0149-1 Rating: moderate References: * bsc#1205931 * bsc#1216060 Affected Products: * SUSE Linux Enterprise Micro 5.5 An update that has two fixes can now be installed. ## Description: This update for selinux-policy fixes the following issues: * Allow rebootmgr to read the system state (bsc#1205931) * Allow keepalived_t read+write kernel_t pipes (bsc#1216060) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-149=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (noarch) * selinux-policy-targeted-20230511+git13.edb03d70-150500.3.12.1 * selinux-policy-devel-20230511+git13.edb03d70-150500.3.12.1 * selinux-policy-20230511+git13.edb03d70-150500.3.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1205931 * https://bugzilla.suse.com/show_bug.cgi?id=1216060 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:30:21 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:30:21 -0000 Subject: SUSE-SU-2024:0148-1: important: Security update for rear23a Message-ID: <170559542178.31379.14824043217261717047@smelt2.prg2.suse.org> # Security update for rear23a Announcement ID: SUSE-SU-2024:0148-1 Rating: important References: * bsc#1218728 Cross-References: * CVE-2024-23301 CVSS scores: * CVE-2024-23301 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for rear23a fixes the following issues: * CVE-2024-23301: Fixed ReaR creates world-readable initrd with GRUB_RESCUE=Y. (bsc#1218728) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-148=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-148=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * rear23a-2.3.a-3.9.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le x86_64) * rear23a-2.3.a-3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23301.html * https://bugzilla.suse.com/show_bug.cgi?id=1218728 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:30:25 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:30:25 -0000 Subject: SUSE-RU-2024:0146-1: moderate: Recommended update for btrfsprogs Message-ID: <170559542529.31379.13047693572045059954@smelt2.prg2.suse.org> # Recommended update for btrfsprogs Announcement ID: SUSE-RU-2024:0146-1 Rating: moderate References: * bsc#1218029 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for btrfsprogs fixes the following issue: * btrfs-progs: fix defrag -c option parsing (bsc#1218029) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-146=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-146=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-146=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-146=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-146=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-146=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-146=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-146=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-146=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-146=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-146=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-146=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-146=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-146=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-146=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-146=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * btrfsprogs-5.14-150400.5.6.1 * python-btrfsutil-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * libbtrfsutil-devel-5.14-150400.5.6.1 * btrfsprogs-static-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfsutil1-5.14-150400.5.6.1 * libbtrfsutil1-debuginfo-5.14-150400.5.6.1 * btrfsprogs-static-debuginfo-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * python-btrfsutil-debuginfo-5.14-150400.5.6.1 * openSUSE Leap 15.4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * openSUSE Leap Micro 5.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * openSUSE Leap Micro 5.4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Manager Proxy 4.3 (x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Manager Proxy 4.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Manager Server 4.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218029 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:30:23 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:30:23 -0000 Subject: SUSE-RU-2024:0147-1: moderate: Recommended update for ignition Message-ID: <170559542351.31379.13967532489503597849@smelt2.prg2.suse.org> # Recommended update for ignition Announcement ID: SUSE-RU-2024:0147-1 Rating: moderate References: * bsc#1217533 * jsc#SMO-314 Affected Products: * SUSE Linux Enterprise Micro 5.5 An update that contains one feature and has one fix can now be installed. ## Description: This update for ignition fixes the following issues: * Update to version 2.17.0: * Updates from version 2.16.x [jsc#SMO-314] [bsc#1217533]: * Fix segmentation fault if filesystem section of Ignition JSON doesn't contain path entry * Increased required Go version ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-147=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * ignition-2.17.0-150500.3.3.1 * ignition-debuginfo-2.17.0-150500.3.3.1 * ignition-dracut-grub2-2.17.0-150500.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217533 * https://jira.suse.com/browse/SMO-314 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:33:27 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:33:27 -0000 Subject: SUSE-RU-2024:0146-1: moderate: Recommended update for btrfsprogs Message-ID: <170559560729.32352.14853740591954187938@smelt2.prg2.suse.org> # Recommended update for btrfsprogs Announcement ID: SUSE-RU-2024:0146-1 Rating: moderate References: * bsc#1218029 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for btrfsprogs fixes the following issue: * btrfs-progs: fix defrag -c option parsing (bsc#1218029) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-146=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-146=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-146=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-146=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-146=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-146=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-146=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-146=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-146=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-146=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-146=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-146=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-146=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-146=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-146=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-146=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * btrfsprogs-static-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * python-btrfsutil-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * libbtrfsutil-devel-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfsutil1-debuginfo-5.14-150400.5.6.1 * python-btrfsutil-debuginfo-5.14-150400.5.6.1 * libbtrfsutil1-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * btrfsprogs-static-5.14-150400.5.6.1 * openSUSE Leap 15.4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * openSUSE Leap Micro 5.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * openSUSE Leap Micro 5.4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Manager Proxy 4.3 (x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Manager Proxy 4.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * btrfsprogs-5.14-150400.5.6.1 * SUSE Manager Server 4.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218029 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:36:28 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:36:28 -0000 Subject: SUSE-RU-2024:0146-1: moderate: Recommended update for btrfsprogs Message-ID: <170559578862.32350.15148239208728632705@smelt2.prg2.suse.org> # Recommended update for btrfsprogs Announcement ID: SUSE-RU-2024:0146-1 Rating: moderate References: * bsc#1218029 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for btrfsprogs fixes the following issue: * btrfs-progs: fix defrag -c option parsing (bsc#1218029) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-146=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-146=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-146=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-146=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-146=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-146=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-146=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-146=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-146=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-146=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-146=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-146=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-146=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-146=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-146=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-146=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * btrfsprogs-5.14-150400.5.6.1 * python-btrfsutil-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * libbtrfsutil-devel-5.14-150400.5.6.1 * btrfsprogs-static-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfsutil1-5.14-150400.5.6.1 * libbtrfsutil1-debuginfo-5.14-150400.5.6.1 * btrfsprogs-static-debuginfo-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * python-btrfsutil-debuginfo-5.14-150400.5.6.1 * openSUSE Leap 15.4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * openSUSE Leap Micro 5.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * openSUSE Leap Micro 5.4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Manager Proxy 4.3 (x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Manager Proxy 4.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * btrfsprogs-5.14-150400.5.6.1 * libbtrfs0-5.14-150400.5.6.1 * libbtrfs0-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debuginfo-5.14-150400.5.6.1 * btrfsprogs-debugsource-5.14-150400.5.6.1 * libbtrfs-devel-5.14-150400.5.6.1 * SUSE Manager Server 4.3 (noarch) * btrfsprogs-udev-rules-5.14-150400.5.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218029 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:36:32 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:36:32 -0000 Subject: SUSE-RU-2024:0145-1: moderate: Recommended update for btrfsprogs Message-ID: <170559579205.32350.5547113812697171639@smelt2.prg2.suse.org> # Recommended update for btrfsprogs Announcement ID: SUSE-RU-2024:0145-1 Rating: moderate References: * bsc#1218029 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for btrfsprogs fixes the following issue: * btrfs-progs: fix defrag -c option parsing (bsc#1218029) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-145=1 openSUSE-SLE-15.5-2024-145=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-145=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-145=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libbtrfs0-debuginfo-5.14-150500.10.3.1 * python-btrfsutil-5.14-150500.10.3.1 * btrfsprogs-static-5.14-150500.10.3.1 * btrfsprogs-debuginfo-5.14-150500.10.3.1 * libbtrfs-devel-5.14-150500.10.3.1 * python-btrfsutil-debuginfo-5.14-150500.10.3.1 * libbtrfs0-5.14-150500.10.3.1 * libbtrfsutil-devel-5.14-150500.10.3.1 * libbtrfsutil1-5.14-150500.10.3.1 * btrfsprogs-static-debuginfo-5.14-150500.10.3.1 * libbtrfsutil1-debuginfo-5.14-150500.10.3.1 * btrfsprogs-5.14-150500.10.3.1 * btrfsprogs-debugsource-5.14-150500.10.3.1 * openSUSE Leap 15.5 (noarch) * btrfsprogs-udev-rules-5.14-150500.10.3.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libbtrfs0-debuginfo-5.14-150500.10.3.1 * btrfsprogs-debuginfo-5.14-150500.10.3.1 * libbtrfs0-5.14-150500.10.3.1 * btrfsprogs-5.14-150500.10.3.1 * btrfsprogs-debugsource-5.14-150500.10.3.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * btrfsprogs-udev-rules-5.14-150500.10.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libbtrfs0-debuginfo-5.14-150500.10.3.1 * btrfsprogs-debuginfo-5.14-150500.10.3.1 * libbtrfs-devel-5.14-150500.10.3.1 * libbtrfs0-5.14-150500.10.3.1 * btrfsprogs-5.14-150500.10.3.1 * btrfsprogs-debugsource-5.14-150500.10.3.1 * Basesystem Module 15-SP5 (noarch) * btrfsprogs-udev-rules-5.14-150500.10.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218029 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:36:33 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 16:36:33 -0000 Subject: SUSE-RU-2024:0144-1: moderate: Recommended update for installation-images Message-ID: <170559579376.32350.9311259758682495473@smelt2.prg2.suse.org> # Recommended update for installation-images Announcement ID: SUSE-RU-2024:0144-1 Rating: moderate References: * bsc#1217968 * bsc#1218652 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for installation-images fixes the following issues: * include complete system-role-common-criteria package, merge gh#openSUSE/installation-images#681 (bsc#1217968, bsc#1218652, gh#openSUSE/installation-images#681) * upgrade 16.58.9 * * * ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-144=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-144=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * skelcd-installer-SLES-16.58.9-150500.3.6.1 * skelcd-installer-net-SLES-16.58.9-150500.3.6.1 * installation-images-SLES-16.58.9-150500.3.6.1 * installation-images-debuginfodeps-SLES-16.58.9-150500.3.6.1 * install-initrd-SLES-16.58.9-150500.3.6.1 * openSUSE Leap 15.5 (noarch) * tftpboot-installation-SLE-15-SP5-aarch64-16.58.9-150500.3.6.1 * tftpboot-installation-SLE-15-SP5-ppc64le-16.58.9-150500.3.6.1 * tftpboot-installation-SLE-15-SP5-s390x-16.58.9-150500.3.6.1 * tftpboot-installation-SLE-15-SP5-x86_64-16.58.9-150500.3.6.1 * Basesystem Module 15-SP5 (noarch) * tftpboot-installation-SLE-15-SP5-aarch64-16.58.9-150500.3.6.1 * tftpboot-installation-SLE-15-SP5-ppc64le-16.58.9-150500.3.6.1 * tftpboot-installation-SLE-15-SP5-x86_64-16.58.9-150500.3.6.1 * tftpboot-installation-SLE-15-SP5-s390x-16.58.9-150500.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217968 * https://bugzilla.suse.com/show_bug.cgi?id=1218652 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 20:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 20:30:02 -0000 Subject: SUSE-RU-2024:0161-1: moderate: Recommended update for dpdk22 Message-ID: <170560980215.13525.2061440464628720228@smelt2.prg2.suse.org> # Recommended update for dpdk22 Announcement ID: SUSE-RU-2024:0161-1 Rating: moderate References: * jsc#PED-7147 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that contains one feature can now be installed. ## Description: This update of dpdk22 fixes the following issue: * DPDK 22.11.1 is shipped to SLE Micro 5.5. (jsc#PED-7147) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-161=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-161=1 SUSE-2024-161=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-161=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-161=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-161=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-161=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * fstrm-debuginfo-0.6.1-150300.9.5.1 * libfstrm0-0.6.1-150300.9.5.1 * fstrm-0.6.1-150300.9.5.1 * libfstrm0-debuginfo-0.6.1-150300.9.5.1 * fstrm-debugsource-0.6.1-150300.9.5.1 * fstrm-devel-0.6.1-150300.9.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * openvswitch3-vtep-debuginfo-3.1.0-150500.3.13.1 * openvswitch3-debuginfo-3.1.0-150500.3.13.1 * python3-ovs3-3.1.0-150500.3.13.1 * libopenvswitch-3_1-0-3.1.0-150500.3.13.1 * openvswitch3-test-debuginfo-3.1.0-150500.3.13.1 * openvswitch3-vtep-3.1.0-150500.3.13.1 * openvswitch3-debugsource-3.1.0-150500.3.13.1 * libovn-23_03-0-debuginfo-23.03.0-150500.3.13.1 * ovn3-docker-23.03.0-150500.3.13.1 * libopenvswitch-3_1-0-debuginfo-3.1.0-150500.3.13.1 * ovn3-host-debuginfo-23.03.0-150500.3.13.1 * ovn3-23.03.0-150500.3.13.1 * openvswitch3-test-3.1.0-150500.3.13.1 * openvswitch3-ipsec-3.1.0-150500.3.13.1 * libovn-23_03-0-23.03.0-150500.3.13.1 * ovn3-central-debuginfo-23.03.0-150500.3.13.1 * openvswitch3-pki-3.1.0-150500.3.13.1 * ovn3-debuginfo-23.03.0-150500.3.13.1 * ovn3-central-23.03.0-150500.3.13.1 * ovn3-devel-23.03.0-150500.3.13.1 * ovn3-host-23.03.0-150500.3.13.1 * ovn3-vtep-debuginfo-23.03.0-150500.3.13.1 * ovn3-vtep-23.03.0-150500.3.13.1 * openvswitch3-3.1.0-150500.3.13.1 * openvswitch3-devel-3.1.0-150500.3.13.1 * openSUSE Leap 15.5 (noarch) * dpdk22-doc-22.11.1-150500.5.2.3 * ovn3-doc-23.03.0-150500.3.13.1 * python3-sortedcontainers-2.1.0-150200.3.4.1 * unbound-munin-1.6.8-150100.10.10.1 * openvswitch3-doc-3.1.0-150500.3.13.1 * dpdk22-thunderx-doc-22.11.1-150500.5.2.3 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * dpdk22-devel-static-22.11.1-150500.5.2.3 * dpdk22-debugsource-22.11.1-150500.5.2.3 * dpdk22-examples-22.11.1-150500.5.2.3 * dpdk22-kmp-default-debuginfo-22.11.1_k5.14.21_150500.55.39-150500.5.2.3 * dpdk22-debuginfo-22.11.1-150500.5.2.3 * dpdk22-devel-22.11.1-150500.5.2.3 * dpdk22-22.11.1-150500.5.2.3 * dpdk22-examples-debuginfo-22.11.1-150500.5.2.3 * dpdk22-tools-22.11.1-150500.5.2.3 * dpdk22-kmp-default-22.11.1_k5.14.21_150500.55.39-150500.5.2.3 * libdpdk-23-22.11.1-150500.5.2.3 * libdpdk-23-debuginfo-22.11.1-150500.5.2.3 * openSUSE Leap 15.5 (aarch64) * dpdk22-thunderx-debugsource-22.11.1-150500.5.2.3 * dpdk22-thunderx-examples-22.11.1-150500.5.2.3 * dpdk22-thunderx-debuginfo-22.11.1-150500.5.2.3 * dpdk22-thunderx-examples-debuginfo-22.11.1-150500.5.2.3 * dpdk22-thunderx-22.11.1-150500.5.2.3 * dpdk22-thunderx-tools-22.11.1-150500.5.2.3 * dpdk22-thunderx-kmp-default-22.11.1_k5.14.21_150500.55.39-150500.5.2.3 * dpdk22-thunderx-kmp-default-debuginfo-22.11.1_k5.14.21_150500.55.39-150500.5.2.3 * dpdk22-thunderx-devel-22.11.1-150500.5.2.3 * dpdk22-thunderx-devel-static-22.11.1-150500.5.2.3 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * unbound-anchor-1.6.8-150100.10.10.1 * fstrm-debuginfo-0.6.1-150300.9.5.1 * libfstrm0-0.6.1-150300.9.5.1 * fstrm-0.6.1-150300.9.5.1 * libfstrm0-debuginfo-0.6.1-150300.9.5.1 * unbound-devel-1.6.8-150100.10.10.1 * unbound-debugsource-1.6.8-150100.10.10.1 * unbound-python-debuginfo-1.6.8-150100.10.10.1 * libunbound2-1.6.8-150100.10.10.1 * unbound-anchor-debuginfo-1.6.8-150100.10.10.1 * fstrm-debugsource-0.6.1-150300.9.5.1 * libunbound2-debuginfo-1.6.8-150100.10.10.1 * unbound-debuginfo-1.6.8-150100.10.10.1 * unbound-python-1.6.8-150100.10.10.1 * fstrm-devel-0.6.1-150300.9.5.1 * unbound-1.6.8-150100.10.10.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * dpdk22-debugsource-22.11.1-150500.5.2.3 * dpdk22-kmp-default-debuginfo-22.11.1_k5.14.21_150500.55.39-150500.5.2.3 * dpdk22-debuginfo-22.11.1-150500.5.2.3 * dpdk22-22.11.1-150500.5.2.3 * dpdk22-tools-22.11.1-150500.5.2.3 * dpdk22-kmp-default-22.11.1_k5.14.21_150500.55.39-150500.5.2.3 * libdpdk-23-22.11.1-150500.5.2.3 * libdpdk-23-debuginfo-22.11.1-150500.5.2.3 * SUSE Linux Enterprise Micro 5.5 (aarch64) * dpdk22-thunderx-debugsource-22.11.1-150500.5.2.3 * dpdk22-thunderx-debuginfo-22.11.1-150500.5.2.3 * dpdk22-thunderx-22.11.1-150500.5.2.3 * dpdk22-thunderx-tools-22.11.1-150500.5.2.3 * dpdk22-thunderx-kmp-default-22.11.1_k5.14.21_150500.55.39-150500.5.2.3 * dpdk22-thunderx-kmp-default-debuginfo-22.11.1_k5.14.21_150500.55.39-150500.5.2.3 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * protobuf-c-debuginfo-1.3.0-150000.3.5.1 * openvswitch3-vtep-debuginfo-3.1.0-150500.3.13.1 * libfstrm0-0.6.1-150300.9.5.1 * openvswitch3-debuginfo-3.1.0-150500.3.13.1 * python3-ovs3-3.1.0-150500.3.13.1 * libopenvswitch-3_1-0-3.1.0-150500.3.13.1 * fstrm-debugsource-0.6.1-150300.9.5.1 * openvswitch3-vtep-3.1.0-150500.3.13.1 * libprotobuf-c1-debuginfo-1.3.0-150000.3.5.1 * openvswitch3-debugsource-3.1.0-150500.3.13.1 * libovn-23_03-0-debuginfo-23.03.0-150500.3.13.1 * ovn3-docker-23.03.0-150500.3.13.1 * unbound-debugsource-1.6.8-150100.10.10.1 * libopenvswitch-3_1-0-debuginfo-3.1.0-150500.3.13.1 * libunbound2-debuginfo-1.6.8-150100.10.10.1 * ovn3-host-debuginfo-23.03.0-150500.3.13.1 * ovn3-23.03.0-150500.3.13.1 * protobuf-c-debugsource-1.3.0-150000.3.5.1 * libfstrm0-debuginfo-0.6.1-150300.9.5.1 * libovn-23_03-0-23.03.0-150500.3.13.1 * ovn3-central-debuginfo-23.03.0-150500.3.13.1 * openvswitch3-pki-3.1.0-150500.3.13.1 * ovn3-debuginfo-23.03.0-150500.3.13.1 * ovn3-central-23.03.0-150500.3.13.1 * ovn3-host-23.03.0-150500.3.13.1 * ovn3-vtep-debuginfo-23.03.0-150500.3.13.1 * ovn3-vtep-23.03.0-150500.3.13.1 * openvswitch3-3.1.0-150500.3.13.1 * fstrm-debuginfo-0.6.1-150300.9.5.1 * unbound-anchor-1.6.8-150100.10.10.1 * libprotobuf-c1-1.3.0-150000.3.5.1 * libunbound2-1.6.8-150100.10.10.1 * unbound-debuginfo-1.6.8-150100.10.10.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * python3-sortedcontainers-2.1.0-150200.3.4.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * unbound-anchor-1.6.8-150100.10.10.1 * fstrm-debuginfo-0.6.1-150300.9.5.1 * libfstrm0-0.6.1-150300.9.5.1 * fstrm-0.6.1-150300.9.5.1 * libfstrm0-debuginfo-0.6.1-150300.9.5.1 * unbound-devel-1.6.8-150100.10.10.1 * unbound-debugsource-1.6.8-150100.10.10.1 * libunbound2-1.6.8-150100.10.10.1 * unbound-anchor-debuginfo-1.6.8-150100.10.10.1 * fstrm-debugsource-0.6.1-150300.9.5.1 * libunbound2-debuginfo-1.6.8-150100.10.10.1 * unbound-debuginfo-1.6.8-150100.10.10.1 * fstrm-devel-0.6.1-150300.9.5.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * unbound-python-debuginfo-1.6.8-150100.10.10.1 * unbound-debugsource-1.6.8-150100.10.10.1 * unbound-debuginfo-1.6.8-150100.10.10.1 * unbound-python-1.6.8-150100.10.10.1 * unbound-1.6.8-150100.10.10.1 * Server Applications Module 15-SP5 (aarch64 ppc64le x86_64) * dpdk22-debugsource-22.11.1-150500.5.2.3 * dpdk22-kmp-default-debuginfo-22.11.1_k5.14.21_150500.55.39-150500.5.2.3 * dpdk22-debuginfo-22.11.1-150500.5.2.3 * dpdk22-devel-22.11.1-150500.5.2.3 * dpdk22-22.11.1-150500.5.2.3 * dpdk22-tools-22.11.1-150500.5.2.3 * dpdk22-kmp-default-22.11.1_k5.14.21_150500.55.39-150500.5.2.3 * libdpdk-23-22.11.1-150500.5.2.3 * libdpdk-23-debuginfo-22.11.1-150500.5.2.3 * Server Applications Module 15-SP5 (aarch64) * dpdk22-thunderx-debugsource-22.11.1-150500.5.2.3 * dpdk22-thunderx-debuginfo-22.11.1-150500.5.2.3 * dpdk22-thunderx-22.11.1-150500.5.2.3 * dpdk22-thunderx-kmp-default-22.11.1_k5.14.21_150500.55.39-150500.5.2.3 * dpdk22-thunderx-kmp-default-debuginfo-22.11.1_k5.14.21_150500.55.39-150500.5.2.3 * dpdk22-thunderx-devel-22.11.1-150500.5.2.3 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * openvswitch3-vtep-debuginfo-3.1.0-150500.3.13.1 * openvswitch3-debuginfo-3.1.0-150500.3.13.1 * python3-ovs3-3.1.0-150500.3.13.1 * libopenvswitch-3_1-0-3.1.0-150500.3.13.1 * openvswitch3-test-debuginfo-3.1.0-150500.3.13.1 * openvswitch3-vtep-3.1.0-150500.3.13.1 * openvswitch3-debugsource-3.1.0-150500.3.13.1 * libovn-23_03-0-debuginfo-23.03.0-150500.3.13.1 * ovn3-docker-23.03.0-150500.3.13.1 * libopenvswitch-3_1-0-debuginfo-3.1.0-150500.3.13.1 * ovn3-host-debuginfo-23.03.0-150500.3.13.1 * ovn3-23.03.0-150500.3.13.1 * openvswitch3-test-3.1.0-150500.3.13.1 * openvswitch3-ipsec-3.1.0-150500.3.13.1 * libovn-23_03-0-23.03.0-150500.3.13.1 * ovn3-central-debuginfo-23.03.0-150500.3.13.1 * openvswitch3-pki-3.1.0-150500.3.13.1 * ovn3-debuginfo-23.03.0-150500.3.13.1 * ovn3-central-23.03.0-150500.3.13.1 * ovn3-devel-23.03.0-150500.3.13.1 * ovn3-host-23.03.0-150500.3.13.1 * ovn3-vtep-debuginfo-23.03.0-150500.3.13.1 * ovn3-vtep-23.03.0-150500.3.13.1 * openvswitch3-3.1.0-150500.3.13.1 * openvswitch3-devel-3.1.0-150500.3.13.1 * Server Applications Module 15-SP5 (noarch) * python3-sortedcontainers-2.1.0-150200.3.4.1 ## References: * https://jira.suse.com/browse/PED-7147 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 20:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 20:30:14 -0000 Subject: SUSE-SU-2024:0160-1: important: Security update for the Linux Kernel Message-ID: <170560981461.13525.11892638529860102688@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0160-1 Rating: important References: * bsc#1179610 * bsc#1183045 * bsc#1211162 * bsc#1211226 * bsc#1212139 * bsc#1212584 * bsc#1214117 * bsc#1214158 * bsc#1214747 * bsc#1214823 * bsc#1215237 * bsc#1215696 * bsc#1215885 * bsc#1215952 * bsc#1216032 * bsc#1216057 * bsc#1216559 * bsc#1216776 * bsc#1217036 * bsc#1217217 * bsc#1217250 * bsc#1217602 * bsc#1217692 * bsc#1217790 * bsc#1217801 * bsc#1217822 * bsc#1217927 * bsc#1217933 * bsc#1217938 * bsc#1217946 * bsc#1217947 * bsc#1217980 * bsc#1217981 * bsc#1217982 * bsc#1218056 * bsc#1218092 * bsc#1218139 * bsc#1218184 * bsc#1218229 * bsc#1218234 * bsc#1218253 * bsc#1218258 * bsc#1218335 * bsc#1218357 * bsc#1218397 * bsc#1218447 * bsc#1218461 * bsc#1218515 * bsc#1218559 * bsc#1218569 * bsc#1218643 * bsc#1218738 * jsc#PED-3459 * jsc#PED-5021 * jsc#PED-7167 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6531 * CVE-2023-6546 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6622 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * Legacy Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves 10 vulnerabilities, contains three features and has 42 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335). * CVE-2023-6606: Fixed an out-of-bounds read vulnerability in smbCalcSize in fs/smb/client/netmisc.c that could allow a local attacker to crash the system or leak internal kernel information (bsc#1217947). * CVE-2023-6610: Fixed an out-of-bounds read vulnerability in smb2_dump_detail in fs/smb/client/smb2ops.c that could allow a local attacker to crash the system or leak internal kernel information (bsc#1217946). * CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). The following non-security bugs were fixed: * Documentation: KVM: add separate directories for architecture-specific documentation (jsc#PED-7167). * Documentation: KVM: update amd-memory-encryption.rst references (jsc#PED-7167). * Documentation: KVM: update msr.rst reference (jsc#PED-7167). * Documentation: KVM: update s390-diag.rst reference (jsc#PED-7167). * Documentation: KVM: update s390-pv.rst reference (jsc#PED-7167). * Documentation: drop more IDE boot options and ide-cd.rst (git-fixes). * Documentation: qat: Use code block for qat sysfs example (git-fixes). * Drop Documentation/ide/ (git-fixes). * Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738) * Fix crash on screen resize (bsc#1218229) * Fix drm gem object underflow (bsc#1218092) * Revert "PCI/ASPM: Remove pcie_aspm_pm_state_change()" (git-fixes). * Revert "PCI: acpiphp: Reassign resources on bridge if necessary" (git- fixes). * Revert "md: unlock mddev before reap sync_thread in action_store" (git- fixes). * Revert "swiotlb: panic if nslabs is too small" (git-fixes). * Revert "xhci: Loosen RPM as default policy to cover for AMD xHC 1.1" (git- fixes). * Update: drm/vmwgfx: Keep a gem reference to user bos in surfaces * acpi: video: Add backlight=native DMI quirk for Lenovo Ideapad Z470 (git- fixes). * acpi: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects (git-fixes). * acpica: Add AML_NO_OPERAND_RESOLVE flag to Timer (git-fixes). * afs: Fix afs_server_list to be cleaned up with RCU (git-fixes). * afs: Fix dynamic root lookup DNS check (git-fixes). * afs: Fix file locking on R/O volumes to operate in local mode (git-fixes). * afs: Fix overwriting of result of DNS query (git-fixes). * afs: Fix refcount underflow from error handling race (git-fixes). * afs: Fix the dynamic root's d_delete to always delete unused dentries (git- fixes). * afs: Fix use-after-free due to get/remove race in volume tree (git-fixes). * afs: Make error on cell lookup failure consistent with OpenAFS (git-fixes). * afs: Return ENOENT if no cell DNS record can be found (git-fixes). * alsa: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro (git-fixes). * alsa: hda/hdmi: add force-connect quirk for NUC5CPYB (git-fixes). * alsa: hda/hdmi: add force-connect quirks for ASUSTeK Z170 variants (git- fixes). * alsa: hda/realtek: Add Framework laptop 16 to quirks (git-fixes). * alsa: hda/realtek: Add quirk for ASUS ROG GV302XA (git-fixes). * alsa: hda/realtek: Add supported ALC257 for ChromeOS (git-fixes). * alsa: hda/realtek: Apply mute LED quirk for HP15-db (git-fixes). * alsa: hda/realtek: Enable headset on Lenovo M90 Gen5 (git-fixes). * alsa: hda/realtek: Fix mute and mic-mute LEDs for HP ProBook 440 G6 (git- fixes). * alsa: hda/realtek: Headset Mic VREF to 100% (git-fixes). * alsa: hda/realtek: add new Framework laptop to quirks (git-fixes). * alsa: hda/realtek: enable SND_PCI_QUIRK for hp pavilion 14-ec1xxx series (git-fixes). * alsa: hda/realtek: fix mute/micmute LEDs for a HP ZBook (git-fixes). * alsa: hda/realtek: fix speakers on XPS 9530 (2023) (git-fixes). * alsa: hda: intel-dsp-cfg: add LunarLake support (git-fixes). * alsa: pcm: fix out-of-bounds in snd_pcm_state_names (git-fixes). * alsa: seq: oss: Fix racy open/close of MIDI devices (git-fixes). * alsa: usb-audio: Add Pioneer DJM-450 mixer controls (git-fixes). * alsa: usb-audio: Increase delay in MOTU M quirk (git-fixes). * apparmor: Free up __cleanup() name (jsc#PED-7167). * arm64: dts: arm: add missing cache properties (git-fixes) * arm64: dts: imx8mm: Add sound-dai-cells to micfil node (git-fixes) * arm64: dts: imx8mn: Add sound-dai-cells to micfil node (git-fixes) * arm64: dts: imx8mq-librem5: Remove dis_u3_susphy_quirk from (git-fixes) * arm64: kdump: Skip kmemleak scan reserved memory for kdump (jsc#PED-7167). * arm64: mm: Fix "rodata=on" when CONFIG_RODATA_FULL_DEFAULT_ENABLED=y (git- fixes) * arm: OMAP2+: Fix null pointer dereference and memory leak in omap_soc_device_init (git-fixes). * arm: PL011: Fix DMA support (git-fixes). * asoc: fsl_rpmsg: Fix error handler with pm_runtime_enable (git-fixes). * asoc: hdmi-codec: fix missing report for jack initial status (git-fixes). * asoc: meson: g12a-toacodec: Fix event generation (git-fixes). * asoc: meson: g12a-toacodec: Validate written enum values (git-fixes). * asoc: meson: g12a-tohdmitx: Fix event generation for S/PDIF mux (git-fixes). * asoc: meson: g12a-tohdmitx: Validate written enum values (git-fixes). * asoc: wm_adsp: fix memleak in wm_adsp_buffer_populate (git-fixes). * bitmap: unify find_bit operations (jsc#PED-7167). * block: fix revalidate performance regression (bsc#1216057). * bluetooth: Fix deadlock in vhci_send_frame (git-fixes). * bluetooth: L2CAP: Send reject on command corrupted request (git-fixes). * bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE (git- fixes). * bluetooth: btusb: Add new PID/VID 0489:e0f2 for MT7921 (bsc#1218461). * bluetooth: hci_event: Fix not checking if HCI_OP_INQUIRY has been sent (git- fixes). * bluetooth: hci_event: shut up a false-positive warning (git-fixes). * bluetooth: hci_qca: Fix the teardown problem for real (git-fixes). * bnxt: do not handle XDP in netpoll (jsc#PED-1495). * bnxt_en: Clear resource reservation during resume (jsc#PED-1495). * bnxt_en: Fix HWTSTAMP_FILTER_ALL packet timestamp logic (jsc#PED-1495). * bnxt_en: Fix max_mtu setting for multi-buf XDP (jsc#PED-1495). * bnxt_en: Fix page pool logic for page size >= 64K (jsc#PED-1495). * bnxt_en: Fix wrong return value check in bnxt_close_nic() (jsc#PED-1495). * bnxt_en: Flush XDP for bnxt_poll_nitroa0()'s NAPI (jsc#PED-1495). * bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234 git-fixes). * bus: ti-sysc: Flush posted write only after srst_udelay (git-fixes). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980). * ceph: fix type promotion bug on 32bit systems (bsc#1217982). * cleanup: Make no_free_ptr() __must_check (jsc#PED-7167). * clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217). * clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217). * clocksource: Handle negative skews in "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217). * clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217). * clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217). * clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217). * configfs-tsm: Introduce a shared ABI for attestation reports (jsc#PED-7167). * crypto: ccp - Add SEV_INIT rc error logging on init (jsc#PED-7167). * crypto: ccp - Add SEV_INIT_EX support (jsc#PED-7167). * crypto: ccp - Add a header for multiple drivers to use `__psp_pa` (jsc#PED-7167). * crypto: ccp - Add a quirk to firmware update (jsc#PED-7167). * crypto: ccp - Add psp_init_on_probe module parameter (jsc#PED-7167). * crypto: ccp - Drop TEE support for IRQ handler (jsc#PED-7167). * crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() (jsc#PED-7167). * crypto: ccp - Fail the PSP initialization when writing psp data file failed (jsc#PED-7167). * crypto: ccp - Fix the INIT_EX data file open failure (jsc#PED-7167). * crypto: ccp - Fix whitespace in sev_cmd_buffer_len() (jsc#PED-7167). * crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware (jsc#PED-7167). * crypto: ccp - Initialize PSP when reading psp data file failed (jsc#PED-7167). * crypto: ccp - Log when resetting PSP SEV state (jsc#PED-7167). * crypto: ccp - Move SEV_INIT retry for corrupted data (jsc#PED-7167). * crypto: ccp - Move some PSP mailbox bit definitions into common header (jsc#PED-7167). * crypto: ccp - Name -1 return value as SEV_RET_NO_FW_CALL (jsc#PED-7167). * crypto: ccp - Refactor out sev_fw_alloc() (jsc#PED-7167). * crypto: ccp - remove unneeded semicolon (jsc#PED-7167). * crypto: ccp: Get rid of __sev_platform_init_locked()'s local function pointer (jsc#PED-7167). * dm verity: initialize fec io before freeing it (git-fixes). * dm-verity: do not use blocking calls from tasklets (git-fixes). * dm: add cond_resched() to dm_wq_requeue_work() (git-fixes). * dm: do not attempt to queue IO under RCU protection (git-fixes). * dm: fix __send_duplicate_bios() to always allow for splitting IO (bsc#1215952). * dm: fix improper splitting for abnormal bios (bsc#1215952). * dm: verity-loadpin: Add NULL pointer check for 'bdev' parameter (git-fixes). * dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * dmaengine: ioat: Free up __cleanup() name (jsc#PED-7167). * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021) * drm/amd/amdgpu: Fix warnings in amdgpu/amdgpu_display.c (git-fixes). * drm/amdgpu/sdma5.2: add begin/end_use ring callbacks (bsc#1212139). * drm/amdgpu: Add EEPROM I2C address support for ip discovery (git-fixes). * drm/amdgpu: Add I2C EEPROM support on smu v13_0_6 (git-fixes). * drm/amdgpu: Add support for RAS table at 0x40000 (git-fixes). * drm/amdgpu: Decouple RAS EEPROM addresses from chips (git-fixes). * drm/amdgpu: Remove redundant I2C EEPROM address (git-fixes). * drm/amdgpu: Remove second moot switch to set EEPROM I2C address (git-fixes). * drm/amdgpu: Return from switch early for EEPROM I2C address (git-fixes). * drm/amdgpu: Update EEPROM I2C address for smu v13_0_0 (git-fixes). * drm/amdgpu: Update ras eeprom support for smu v13_0_0 and v13_0_10 (git- fixes). * drm/amdgpu: correct chunk_ptr to a pointer to chunk (git-fixes). * drm/amdgpu: correct the amdgpu runtime dereference usage count (git-fixes). * drm/amdgpu: fix tear down order in amdgpu_vm_pt_free (git-fixes). * drm/amdgpu: simplify amdgpu_ras_eeprom.c (git-fixes). * drm/bridge: parade-ps8640: Never store more than msg->size bytes in AUX xfer (git-fixes). * drm/bridge: ps8640: Fix size mismatch warning w/ len (git-fixes). * drm/bridge: tc358768: select CONFIG_VIDEOMODE_HELPERS (git-fixes). * drm/bridge: ti-sn65dsi86: Never store more than msg->size bytes in AUX xfer (git-fixes). * drm/i915/display: Drop check for doublescan mode in modevalid (git-fixes). * drm/i915/dp: Fix passing the correct DPCD_REV for drm_dp_set_phy_test_pattern (git-fixes). * drm/i915/dpt: Only do the POT stride remap when using DPT (git-fixes). * drm/i915/lvds: Use REG_BIT() & co (git-fixes). * drm/i915/mtl: limit second scaler vertical scaling in ver >= 14 (git-fixes). * drm/i915/sdvo: stop caching has_hdmi_monitor in struct intel_sdvo (git- fixes). * drm/i915: Fix intel_atomic_setup_scalers() plane_state handling (git-fixes). * drm/i915: Fix remapped stride with CCS on ADL+ (git-fixes). * drm/i915: Reject async flips with bigjoiner (git-fixes). * drm/i915: Relocate intel_atomic_setup_scalers() (git-fixes). * drm/i915: fix MAX_ORDER usage in i915_gem_object_get_pages_internal() (jsc#PED-7167). * drm/mediatek: Add spinlock for setting vblank event in atomic_begin (git- fixes). * drm/mgag200: Fix gamma lut not initialized for G200ER, G200EV, G200SE (git- fixes). * efi/libstub: Implement support for unaccepted memory (jsc#PED-7167). * efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory (jsc#PED-7167). * efi/unaccepted: Fix off-by-one when checking for overlapping ranges (jsc#PED-7167). * efi/unaccepted: Fix soft lockups caused by parallel memory acceptance (jsc#PED-7167). * efi/unaccepted: Make sure unaccepted table is mapped (jsc#PED-7167). * efi/unaccepted: Use ACPI reclaim memory for unaccepted memory table (jsc#PED-7167). * efi/x86: Get full memory map in allocate_e820() (jsc#PED-7167). * efi: Add unaccepted memory support (jsc#PED-7167). * efi: libstub: avoid efi_get_memory_map() for allocating the virt map (jsc#PED-7167). * efi: libstub: install boot-time memory map as config table (jsc#PED-7167). * efi: libstub: remove DT dependency from generic stub (jsc#PED-7167). * efi: libstub: remove pointless goto kludge (jsc#PED-7167). * efi: libstub: simplify efi_get_memory_map() and struct efi_boot_memmap (jsc#PED-7167). * efi: libstub: unify initrd loading between architectures (jsc#PED-7167). * floppy: fix MAX_ORDER usage (jsc#PED-7167). * fprobe: Fix to ensure the number of active retprobes is not zero (git- fixes). * fs/jfs: Add check for negative db_l2nbperpage (git-fixes). * fs/jfs: Add validity check for db_maxag and db_agpref (git-fixes). * fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount() (git- fixes). * fs/remap: constrain dedupe of EOF blocks (git-fixes). * fs: avoid empty option when generating legacy mount string (git-fixes). * fs: fix an infinite loop in iomap_fiemap (git-fixes). * fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes). * genwqe: fix MAX_ORDER usage (jsc#PED-7167). * gfs2: Add wrapper for iomap_file_buffered_write (git-fixes). * gfs2: Check sb_bsize_shift after reading superblock (git-fixes). * gfs2: Clean up function may_grant (git-fixes). * gfs2: Fix filesystem block deallocation for short writes (git-fixes). * gfs2: Fix gfs2_release for non-writers regression (git-fixes). * gfs2: Fix inode height consistency check (git-fixes). * gfs2: Fix length of holes reported at end-of-file (git-fixes). * gfs2: Fix possible data races in gfs2_show_options() (git-fixes). * gfs2: Improve gfs2_make_fs_rw error handling (git-fixes). * gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes). * gfs2: Silence "suspicious RCU usage in gfs2_permission" warning (git-fixes). * gfs2: Switch from strlcpy to strscpy (git-fixes). * gfs2: fix an oops in gfs2_permission (git-fixes). * gfs2: gfs2_setattr_size error path fix (git-fixes). * gfs2: ignore negated quota changes (git-fixes). * gfs2: jdata writepage fix (git-fixes). * gfs2: use i_lock spin_lock for inode qadata (git-fixes). * gpiolib: sysfs: Fix error handling on failed export (git-fixes). * gve: Fixes for napi_poll when budget is 0 (git-fixes). * gve: Use size_add() in call to struct_size() (git-fixes). * hid: add ALWAYS_POLL quirk for Apple kb (git-fixes). * hid: glorious: fix Glorious Model I HID report (git-fixes). * hid: hid-asus: add const to read-only outgoing usb buffer (git-fixes). * hid: hid-asus: reset the backlight brightness level on resume (git-fixes). * hid: lenovo: Restrict detection of patched firmware only to USB cptkbd (git- fixes). * hid: multitouch: Add quirk for HONOR GLO-GXXX touchpad (git-fixes). * hwmon: (acpi_power_meter) Fix 4.29 MW bug (git-fixes). * hwmon: (nzxt-kraken2) Fix error handling path in kraken2_probe() (git- fixes). * i2c: aspeed: Handle the coalesced stop conditions with the start conditions (git-fixes). * i2c: core: Fix atomic xfer check for non-preempt config (git-fixes). * i2c: designware: Fix corrupted memory seen in the ISR (git-fixes). * i40e: Fix I40E_FLAG_VF_VLAN_PRUNING value (jsc#PED-372). * i40e: Fix VF VLAN offloading when port VLAN is configured (jsc#PED-372). * i40e: Fix unexpected MFS warning message (jsc#PED-372). * i40e: Fix wrong check for I40E_TXR_FLAGS_WB_ON_ITR (jsc#PED-372). * i40e: fix misleading debug logs (jsc#PED-372). * i40e: fix potential NULL pointer dereferencing of pf->vf i40e_sync_vsi_filters() (jsc#PED-372). * i40e: fix potential memory leaks in i40e_remove() (jsc#PED-372). * i40e: prevent crash on probe if hw registers have invalid values (jsc#PED-372). * ib/mlx5: Fix init stage error handling to avoid double free of same QP and UAF (git-fixes) * ib/mlx5: Fix rdma counter binding for RAW QP (git-fixes) * igb: Avoid starting unnecessary workqueues (jsc#PED-370). * igb: Change IGB_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370). * igb: Fix potential memory leak in igb_add_ethtool_nfc_entry (jsc#PED-370). * igb: clean up in all error paths when enabling SR-IOV (jsc#PED-370). * igb: disable virtualization features on 82580 (jsc#PED-370). * igbvf: Change IGBVF_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370). * igc: Change IGC_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-375). * igc: Expose tx-usecs coalesce setting to user (jsc#PED-375). * igc: Fix ambiguity in the ethtool advertising (jsc#PED-375). * igc: Fix infinite initialization loop with early XDP redirect (jsc#PED-375). * igc: Fix the typo in the PTM Control macro (jsc#PED-375). * iio: adc: ti_am335x_adc: Fix return value check of tiadc_request_dma() (git- fixes). * iio: common: ms_sensors: ms_sensors_i2c: fix humidity conversion time table (git-fixes). * iio: imu: inv_mpu6050: fix an error code problem in inv_mpu6050_read_raw (git-fixes). * iio: triggered-buffer: prevent possible freeing of wrong buffer (git-fixes). * input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN (git-fixes). * input: ipaq-micro-keys - add error handling for devm_kmemdup (git-fixes). * input: soc_button_array - add mapping for airplane mode button (git-fixes). * input: xpad - add HyperX Clutch Gladiate Support (git-fixes). * interconnect: Treat xlate() returning NULL node as an error (git-fixes). * iomap: Fix iomap_dio_rw return value for user copies (git-fixes). * iommu: fix MAX_ORDER usage in __iommu_dma_alloc_pages() (jsc#PED-7167). * iov_iter, x86: Be consistent about the __user tag on copy_mc_to_user() (git- fixes). * jfs: fix array-index-out-of-bounds in dbFindLeaf (git-fixes). * jfs: fix array-index-out-of-bounds in diAlloc (git-fixes). * jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount (git-fixes). * jfs: validate max amount of blocks before allocation (git-fixes). * kABI: Preserve the type of rethook::handler (git-fixes). * kABI: restore void return to typec_altmode_attention (git-fixes). * kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes, as used only locally for asus-wmi stuff * kabi/severities: make snp_issue_guest_request PASS (jsc#PED-7167) * kabi: fix of_reserved_mem_* due to struct vm_struct became defined (jsc#PED-7167). * kabi: fix sev-dev due to fs_struct became defined (jsc#PED-7167). * kabi: fix struct efi after adding unaccepted memory table (jsc#PED-7167). * kabi: fix struct zone kabi after adding unaccepted_pages and NR_UNACCEPTED (jsc#PED-7167). * kbuild: Drop -Wdeclaration-after-statement (jsc#PED-7167). * kconfig: fix memory leak from range properties (git-fixes). * kprobes: consistent rcu api usage for kretprobe holder (git-fixes). * kvm: arm64: Prevent kmemleak from accessing pKVM memory (jsc#PED-7167). * kvm: s390/mm: Properly reset no-dat (git-fixes bsc#1218056). * kvm: s390: vsie: fix wrong VIR 37 when MSO is used (git-fixes bsc#1217933). * lib/vsprintf: Fix %pfwf when current node refcount == 0 (git-fixes). * libceph: use kernel_connect() (bsc#1217981). * locking: Introduce __cleanup() based infrastructure (jsc#PED-7167). * locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes). * md/bitmap: do not set max_write_behind if there is no write mostly device (git-fixes). * md/md-bitmap: hold 'reconfig_mutex' in backlog_store() (git-fixes). * md/md-bitmap: remove unnecessary local variable in backlog_store() (git- fixes). * md/raid0: add discard support for the 'original' layout (git-fixes). * md/raid10: do not call bio_start_io_acct twice for bio which experienced read error (git-fixes). * md/raid10: factor out code from wait_barrier() to stop_waiting_barrier() (git-fixes). * md/raid10: factor out dereference_rdev_and_rrdev() (git-fixes). * md/raid10: fix io loss while replacement replace rdev (git-fixes). * md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes). * md/raid10: fix memleak for 'conf->bio_split' (git-fixes). * md/raid10: fix memleak of md thread (git-fixes). * md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes). * md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git- fixes). * md/raid10: fix overflow of md/safe_mode_delay (git-fixes). * md/raid10: fix task hung in raid10d (git-fixes). * md/raid10: fix the condition to call bio_end_io_acct() (git-fixes). * md/raid10: fix wrong setting of max_corr_read_errors (git-fixes). * md/raid10: prevent soft lockup while flush writes (git-fixes). * md/raid10: use dereference_rdev_and_rrdev() to get devices (git-fixes). * md/raid1: fix error: ISO C90 forbids mixed declarations (git-fixes). * md/raid1: free the r1bio before waiting for blocked rdev (git-fixes). * md/raid1: hold the barrier until handle_read_error() finishes (git-fixes). * md/raid5-cache: fix a deadlock in r5l_exit_log() (git-fixes). * md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() (git- fixes). * md/raid5: fix miscalculation of 'end_sector' in raid5_read_one_chunk() (git- fixes). * md: Put the right device in md_seq_next (bsc#1217822). * md: Set MD_BROKEN for RAID1 and RAID10 (git-fixes). * md: avoid signed overflow in slot_store() (git-fixes). * md: do not update recovery_cp when curr_resync is ACTIVE (git-fixes). * md: drop queue limitation for RAID1 and RAID10 (git-fixes). * md: raid0: account for split bio in iostat accounting (git-fixes). * md: raid10 add nowait support (git-fixes). * md: raid1: fix potential OOB in raid1_remove_disk() (git-fixes). * md: restore 'noio_flag' for the last mddev_resume() (git-fixes). * md: select BLOCK_LEGACY_AUTOLOAD (git-fixes). * memblock: exclude MEMBLOCK_NOMAP regions from kmemleak (jsc#PED-7167). * memblock: make memblock_find_in_range method private (jsc#PED-7167). * misc: mei: client.c: fix problem of return '-EOVERFLOW' in mei_cl_write (git-fixes). * misc: mei: client.c: return negative error code in mei_cl_write (git-fixes). * mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files. * mm/page_alloc: make deferred page init free pages in MAX_ORDER blocks (jsc#PED-7167). * mm/pgtable: Fix multiple -Wstringop-overflow warnings (jsc#PED-7167). * mm/slab: Add __free() support for kvfree (jsc#PED-7167). * mm/slub: fix MAX_ORDER usage in calculate_order() (jsc#PED-7167). * mm: Add PAGE_ALIGN_DOWN macro (jsc#PED-7167). * mm: Add support for unaccepted memory (jsc#PED-7167). * mm: add pageblock_align() macro (jsc#PED-7167). * mm: add pageblock_aligned() macro (jsc#PED-7167). * mm: avoid passing 0 to __ffs() (jsc#PED-7167). * mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515). * mm: move kvmalloc-related functions to slab.h (jsc#PED-7167). * mm: new primitive kvmemdup() (jsc#PED-7167). * mm: reuse pageblock_start/end_pfn() macro (jsc#PED-7167). * mmc: meson-mx-sdhc: Fix initialization frozen issue (git-fixes). * mmc: rpmb: fixes pause retune on all RPMB partitions (git-fixes). * mmc: sdhci-sprd: Fix eMMC init failure after hw reset (git-fixes). * neighbor: tracing: Move pin6 inside CONFIG_IPV6=y section (git-fixes). * net/rose: Fix Use-After-Free in rose_ioctl (git-fixes). * net/smc: Fix pos miscalculation in statistics (bsc#1218139). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes). * net: bnxt: fix a potential use-after-free in bnxt_init_tc (jsc#PED-1495). * net: ena: Destroy correct number of xdp queues upon failure (git-fixes). * net: ena: Fix XDP redirection error (git-fixes). * net: ena: Fix xdp drops handling due to multibuf packets (git-fixes). * net: ena: Flush XDP packets on error (git-fixes). * net: mana: select PAGE_POOL (git-fixes). * net: rfkill: gpio: set GPIO direction (git-fixes). * net: usb: ax88179_178a: avoid failed operations when device is disconnected (git-fixes). * net: usb: ax88179_178a: clean up pm calls (git-fixes). * net: usb: ax88179_178a: wol optimizations (git-fixes). * net: usb: qmi_wwan: claim interface 4 for ZTE MF290 (git-fixes). * nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local (git-fixes). * nfs: Fix O_DIRECT locking issues (bsc#1211162). * nfs: Fix a few more clear_bit() instances that need release semantics (bsc#1211162). * nfs: Fix a potential data corruption (bsc#1211162). * nfs: Fix a use after free in nfs_direct_join_group() (bsc#1211162). * nfs: Fix error handling for O_DIRECT write scheduling (bsc#1211162). * nfs: More O_DIRECT accounting fixes for error paths (bsc#1211162). * nfs: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162). * nfs: Use the correct commit info in nfs_join_page_group() (bsc#1211162). * nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162). * nilfs2: fix missing error check for sb_set_blocksize call (git-fixes). * nilfs2: prevent WARNING in nilfs_sufile_set_segment_usage() (git-fixes). * nlm: Defend against file_lock changes after vfs_test_lock() (bsc#1217692). * null_blk: fix poll request timeout handling (git-fixes). * nvme-core: check for too small lba shift (bsc#1214117). * nvme-pci: Add sleep quirk for Kingston drives (git-fixes). * nvme-pci: always return an ERR_PTR from nvme_pci_alloc_dev (git-fixes). * nvme-pci: do not set the NUMA node of device if it has none (git-fixes). * nvme-pci: factor out a nvme_pci_alloc_dev helper (git-fixes). * nvme-rdma: do not try to stop unallocated queues (git-fixes). * nvme: sanitize metadata bounce buffer for reads (git-fixes). * nvmet-auth: complete a request only after freeing the dhchap pointers (git- fixes). * of: reserved_mem: Have kmemleak ignore dynamically allocated reserved mem (jsc#PED-7167). * orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git- fixes). * orangefs: Fix kmemleak in orangefs_{kernel,client}_debug_init() (git-fixes). * orangefs: Fix sysfs not cleanup when dev init failed (git-fixes). * orangefs: Fix the size of a memory allocation in orangefs_bufmap_alloc() (git-fixes). * padata: Fix refcnt handling in padata_free_shell() (git-fixes). * parport: Add support for Brainboxes IX/UC/PX parallel cards (git-fixes). * pci: loongson: Limit MRRS to 256 (git-fixes). * perf/core: fix MAX_ORDER usage in rb_alloc_aux_page() (jsc#PED-7167). * pinctrl: at91-pio4: use dedicated lock class for IRQ (git-fixes). * platform/surface: aggregator: fix recv_buf() return value (git-fixes). * platform/x86: asus-wmi: Add support for ROG X13 tablet mode (git-fixes). * platform/x86: asus-wmi: Adjust tablet/lidflip handling to use enum (git- fixes). * platform/x86: asus-wmi: Fix kbd_dock_devid tablet-switch reporting (git- fixes). * platform/x86: asus-wmi: Move i8042 filter install to shared asus-wmi code (git-fixes). * platform/x86: asus-wmi: Simplify tablet-mode-switch handling (git-fixes). * platform/x86: asus-wmi: Simplify tablet-mode-switch probing (git-fixes). * platform/x86: wmi: Allow duplicate GUIDs for drivers that use struct wmi_driver (git-fixes). * platform/x86: wmi: Skip blocks with zero instances (git-fixes). * powerpc/pseries/vas: Migration suspend waits for no in-progress open windows (bsc#1218397 ltc#204523). * qed/red_ll2: Fix undefined behavior bug in struct qed_ll2_info (jsc#PED-1526). * qed: Fix a potential use-after-free in qed_cxt_tables_alloc (jsc#PED-1526). * qed: fix LL2 RX buffer allocation (jsc#PED-1526). * qede: fix firmware halt over suspend and resume (jsc#PED-1526). * qla2xxx: add debug log for deprecated hw detected (bsc#1216032). * r8152: Add RTL8152_INACCESSIBLE checks to more loops (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_aldps_en() (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_pre_firmware_1() (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8156b_wait_loading_flash() (git-fixes). * r8152: Rename RTL8152_UNPLUG to RTL8152_INACCESSIBLE (git-fixes). * r8169: Fix PCI error on system resume (git-fixes). * rdma/bnxt_re: Correct module description string (jsc#PED-1495). * rdma/core: Use size_{add,sub,mul}() in calls to struct_size() (git-fixes) * rdma/hfi1: Use FIELD_GET() to extract Link Width (git-fixes) * rdma/hfi1: Workaround truncation compilation error (git-fixes) * rdma/hns: Add check for SL (git-fixes) * rdma/hns: Fix printing level of asynchronous events (git-fixes) * rdma/hns: Fix signed-unsigned mixed comparisons (git-fixes) * rdma/hns: Fix uninitialized ucmd in hns_roce_create_qp_common() (git-fixes) * rdma/hns: The UD mode can only be configured with DCQCN (git-fixes) * regmap: fix bogus error on regcache_sync success (git-fixes). * reiserfs: Check the return value from __getblk() (git-fixes). * reiserfs: Replace 1-element array with C99 style flex-array (git-fixes). * remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569). * reset: Fix crash when freeing non-existent optional resets (git-fixes). * restore renamed device IDs for USB HID devices (git-fixes). * rethook: Fix to use WRITE_ONCE() for rethook:: Handler (git-fixes). * rethook: Use __rcu pointer for rethook::handler (git-fixes). * ring-buffer: Do not try to put back write_stamp (git-fixes). * ring-buffer: Do not update before stamp when switching sub-buffers (git- fixes). * ring-buffer: Fix a race in rb_time_cmpxchg() for 32 bit archs (git-fixes). * ring-buffer: Fix memory leak of free page (git-fixes). * ring-buffer: Fix slowpath of interrupted event (git-fixes). * ring-buffer: Fix wake ups when buffer_percent is set to 100 (git-fixes). * ring-buffer: Fix writing to the buffer with max_data_size (git-fixes). * ring-buffer: Force absolute timestamp on discard of event (git-fixes). * ring-buffer: Have saved event hold the entire event (git-fixes). * ring-buffer: Remove useless update to write_stamp in rb_try_to_discard() (git-fixes). * s390/vx: fix save/restore of fpu kernel context (git-fixes bsc#1218357). * scsi: lpfc: use unsigned type for num_sge (bsc#1214747). * serial: 8250: 8250_omap: Clear UART_HAS_RHR_IT_DIS bit (git-fixes). * serial: 8250: 8250_omap: Do not start RX DMA on THRI interrupt (git-fixes). * serial: sc16is7xx: address RX timeout interrupt errata (git-fixes). * soundwire: stream: fix NULL pointer dereference for multi_link (git-fixes). * spi: atmel: Fix clock issue when using devices with different polarities (git-fixes). * statfs: enforce statfs[64] structure initialization (git-fixes). * supported.conf: add drivers/virt/coco/tsm (jsc#PED-7167) * swiotlb: always set the number of areas before allocating the pool (git- fixes). * swiotlb: do not panic! (git-fixes). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix debugfs reporting of reserved memory pools (git-fixes). * swiotlb: fix slot alignment checks (bsc#1216559). * swiotlb: fix the deadlock in swiotlb_do_find_slots (git-fixes). * swiotlb: mark swiotlb_memblock_alloc() as __init (git-fixes). * swiotlb: reduce the number of areas to match actual memory pool size (git- fixes). * swiotlb: reduce the swiotlb buffer size on allocation failure (git-fixes). * swiotlb: use the calculated number of areas (git-fixes). * tracing / synthetic: Disable events after testing in synth_event_gen_test_init() (git-fixes). * tracing/kprobes: Fix the description of variable length arguments (git- fixes). * tracing/kprobes: Fix the order of argument descriptions (git-fixes). * tracing/perf: Add interrupt_context_level() helper (git-fixes). * tracing/synthetic: fix kernel-doc warnings (git-fixes). * tracing: Always update snapshot buffer size (git-fixes). * tracing: Disable preemption when using the filter buffer (bsc#1217036). * tracing: Disable snapshot buffer when stopping instance tracers (git-fixes). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix blocked reader of snapshot buffer (git-fixes). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (git-fixes, bsc#1217036). * tracing: Have the user copy of synthetic event address use correct context (git-fixes). * tracing: Reuse logic from perf's get_recursion_context() (git-fixes). * tracing: Set actual size after ring buffer resize (git-fixes). * tracing: Stop current tracer when resizing buffer (git-fixes). * tracing: Update snapshot buffer on resize if it is allocated (git-fixes). * tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036). * tracing: relax trace_event_eval_update() execution with cond_resched() (git- fixes). * uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978). * ubifs: Fix memory leak of bud->log_hash (git-fixes). * ubifs: fix possible dereference after free (git-fixes). * usb-storage: Add quirk for incorrect WP on Kingston DT Ultimate 3.0 G3 (git- fixes). * usb: aqc111: check packet for fixup for true limit (git-fixes). * usb: config: fix iteration issue in 'usb_get_bos_descriptor()' (git-fixes). * usb: host: xhci-plat: fix possible kernel oops while resuming (git-fixes). * usb: hub: Guard against accesses to uninitialized BOS descriptors (git- fixes). * usb: serial: ftdi_sio: update Actisense PIDs constant names (git-fixes). * usb: serial: option: add Foxconn T99W265 with new baseline (git-fixes). * usb: serial: option: add Quectel EG912Y module support (git-fixes). * usb: serial: option: add Quectel RM500Q R13 firmware support (git-fixes). * usb: typec: bus: verify partner exists in typec_altmode_attention (git- fixes). * usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes). * usb: typec: ucsi: acpi: add quirk for ASUS Zenbook UM325 (git-fixes). * virt/coco/sev-guest: Double-buffer messages (jsc#PED-7167). * virt: coco: Add a coco/Makefile and coco/Kconfig (jsc#PED-7167). * virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT (jsc#PED-7167). * virt: sevguest: Fix passing a stack buffer as a scatterlist target (jsc#PED-7167). * virt: sevguest: Prep for kernel internal get_ext_report() (jsc#PED-7167). * virt: tdx-guest: Add Quote generation support using TSM_REPORTS (jsc#PED-7167). * vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602). * wifi: cfg80211: Add my certificate (git-fixes). * wifi: cfg80211: fix certs build to not depend on file order (git-fixes). * wifi: iwlwifi: pcie: add another missing bh-disable for rxq->lock (git- fixes). * wifi: iwlwifi: pcie: do not synchronize IRQs from IRQ (git-fixes). * wifi: mac80211: mesh: check element parsing succeeded (git-fixes). * wifi: mac80211: mesh_plink: fix matches_local logic (git-fixes). * x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes). * x86/alternatives: Disable KASAN in apply_alternatives() (git-fixes). * x86/alternatives: Disable interrupts and sync when optimizing NOPs in place (git-fixes). * x86/alternatives: Sync core before enabling interrupts (git-fixes). * x86/boot/compressed: Handle unaccepted memory (jsc#PED-7167). * x86/boot/compressed: Reserve more memory for page tables (git-fixes). * x86/boot: Add an efi.h header for the decompressor (jsc#PED-7167). * x86/boot: Centralize __pa()/__va() definitions (jsc#PED-7167). * x86/boot: Fix incorrect startup_gdt_descr.size (git-fixes). * x86/cpu/amd: Enable Zenbleed fix for AMD Custom APU 0405 (git-fixes). * x86/cpu: Do not write CSTAR MSR on Intel CPUs (jsc#PED-7167). * x86/cpu: Fix amd_check_microcode() declaration (git-fixes). * x86/efi: Safely enable unaccepted memory in UEFI (jsc#PED-7167). * x86/entry: Convert INT 0x80 emulation to IDTENTRY (bsc#1217927). * x86/entry: Do not allow external 0x80 interrupts (bsc#1217927). * x86/fpu/xstate: Prevent false-positive warning in __copy_xstate_uabi_buf() (git-fixes). * x86/fpu: Invalidate FPU state correctly on exec() (git-fixes). * x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790). * x86/purgatory: Remove LTO flags (git-fixes). * x86/resctrl: Fix kernel-doc warnings (git-fixes). * x86/sev-es: Replace open-coded hlt-loop with sev_es_terminate() (jsc#PED-7167). * x86/sev-es: Use insn_decode_mmio() for MMIO implementation (jsc#PED-7167). * x86/sev: Add SNP-specific unaccepted memory support (jsc#PED-7167). * x86/sev: Allow for use of the early boot GHCB for PSC requests (jsc#PED-7167). * x86/sev: Change npages to unsigned long in snp_accept_memory() (jsc#PED-7167). * x86/sev: Change snp_guest_issue_request()'s fw_err argument (jsc#PED-7167). * x86/sev: Fix address space sparse warning (jsc#PED-7167). * x86/sev: Get rid of special sev_es_enable_key (jsc#PED-7167). * x86/sev: Mark snp_abort() noreturn (jsc#PED-7167). * x86/sev: Put PSC struct on the stack in prep for unaccepted memory support (jsc#PED-7167). * x86/sev: Use large PSC requests if applicable (jsc#PED-7167). * x86/smp: Use dedicated cache-line for mwait_play_dead() (git-fixes). * x86/srso: Add SRSO mitigation for Hygon processors (git-fixes). * x86/srso: Fix SBPB enablement for (possible) future fixed HW (git-fixes). * x86/srso: Fix vulnerability reporting for missing microcode (git-fixes). * x86/tdx: Add unaccepted memory support (jsc#PED-7167). * x86/tdx: Disable NOTIFY_ENABLES (jsc#PED-7167). * x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub (jsc#PED-7167). * x86/tdx: Refactor try_accept_one() (jsc#PED-7167). * x86/tdx: Relax SEPT_VE_DISABLE check for debug TD (jsc#PED-7167). * x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLE (jsc#PED-7167). * x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217). * x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217). * x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217). * x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git- fixes). * xfs: Rename __xfs_attr_rmtval_remove (git-fixes). * xfs: Use kvcalloc() instead of kvzalloc() (git-fixes). * xfs: aborting inodes on shutdown may need buffer lock (git-fixes). * xfs: add selinux labels to whiteout inodes (git-fixes). * xfs: clean up "%Ld/%Lu" which does not meet C standard (git-fixes). * xfs: convert flex-array declarations in struct xfs_attrlist* (git-fixes). * xfs: convert flex-array declarations in xfs attr leaf blocks (git-fixes). * xfs: convert flex-array declarations in xfs attr shortform objects (git- fixes). * xfs: decode scrub flags in ftrace output (git-fixes). * xfs: dump log intent items that cannot be recovered due to corruption (git- fixes). * xfs: fix a bug in the online fsck directory leaf1 bestcount check (git- fixes). * xfs: fix agf_fllast when repairing an empty AGFL (git-fixes). * xfs: fix incorrect unit conversion in scrub tracepoint (git-fixes). * xfs: fix silly whitespace problems with kernel libxfs (git-fixes). * xfs: fix uninit warning in xfs_growfs_data (git-fixes). * xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes). * xfs: make sure maxlen is still congruent with prod when rounding down (git- fixes). * xfs: remove kmem_alloc_io() (git-fixes). * xfs: remove the xfs_dinode_t typedef (git-fixes). * xfs: remove the xfs_dqblk_t typedef (git-fixes). * xfs: remove the xfs_dsb_t typedef (git-fixes). * xfs: rename xfs_has_attr() (git-fixes). * xfs: replace snprintf in show functions with sysfs_emit (git-fixes). * xfs: return EINTR when a fatal signal terminates scrub (git-fixes). * xfs: sb verifier does not handle uncached sb buffer (git-fixes). * xfs: simplify two-level sysctl registration for xfs_table (git-fixes). * xfs: sysfs: use default_groups in kobj_type (git-fixes). * xfs: use swap() to make dabtree code cleaner (git-fixes). * xhci: Clear EHB bit only at end of interrupt handler (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-160=1 openSUSE-SLE-15.5-2024-160=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-160=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-160=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-160=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-160=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-160=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-160=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-160=1 ## Package List: * openSUSE Leap 15.5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (noarch) * kernel-source-vanilla-5.14.21-150500.55.44.1 * kernel-macros-5.14.21-150500.55.44.1 * kernel-docs-html-5.14.21-150500.55.44.1 * kernel-source-5.14.21-150500.55.44.1 * kernel-devel-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (ppc64le x86_64) * kernel-debug-devel-5.14.21-150500.55.44.1 * kernel-debug-debugsource-5.14.21-150500.55.44.1 * kernel-debug-livepatch-devel-5.14.21-150500.55.44.1 * kernel-debug-debuginfo-5.14.21-150500.55.44.1 * kernel-debug-devel-debuginfo-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (x86_64) * kernel-default-vdso-debuginfo-5.14.21-150500.55.44.1 * kernel-kvmsmall-vdso-5.14.21-150500.55.44.1 * kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.44.1 * kernel-debug-vdso-debuginfo-5.14.21-150500.55.44.1 * kernel-default-vdso-5.14.21-150500.55.44.1 * kernel-debug-vdso-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-5.14.21-150500.55.44.1 * kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.44.1 * kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 * kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.44.1 * kernel-kvmsmall-debugsource-5.14.21-150500.55.44.1 * kernel-default-base-rebuild-5.14.21-150500.55.44.1.150500.6.19.2 * kernel-kvmsmall-devel-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150500.55.44.1 * kernel-default-optional-5.14.21-150500.55.44.1 * kernel-default-optional-debuginfo-5.14.21-150500.55.44.1 * kselftests-kmp-default-5.14.21-150500.55.44.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.44.1 * kernel-syms-5.14.21-150500.55.44.1 * kernel-default-extra-debuginfo-5.14.21-150500.55.44.1 * kernel-obs-qa-5.14.21-150500.55.44.1 * kernel-obs-build-debugsource-5.14.21-150500.55.44.1 * gfs2-kmp-default-5.14.21-150500.55.44.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-livepatch-devel-5.14.21-150500.55.44.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.44.1 * kernel-default-devel-5.14.21-150500.55.44.1 * cluster-md-kmp-default-5.14.21-150500.55.44.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-extra-5.14.21-150500.55.44.1 * kernel-obs-build-5.14.21-150500.55.44.1 * ocfs2-kmp-default-5.14.21-150500.55.44.1 * kselftests-kmp-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-livepatch-5.14.21-150500.55.44.1 * kernel-default-debugsource-5.14.21-150500.55.44.1 * reiserfs-kmp-default-5.14.21-150500.55.44.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.44.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_44-default-1-150500.11.5.1 * kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-1-150500.11.5.1 * kernel-livepatch-SLE15-SP5_Update_9-debugsource-1-150500.11.5.1 * openSUSE Leap 15.5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150500.55.44.1 * kernel-zfcpdump-debuginfo-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (nosrc) * dtb-aarch64-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (aarch64) * dtb-allwinner-5.14.21-150500.55.44.1 * kselftests-kmp-64kb-5.14.21-150500.55.44.1 * dtb-amlogic-5.14.21-150500.55.44.1 * kernel-64kb-debugsource-5.14.21-150500.55.44.1 * dtb-arm-5.14.21-150500.55.44.1 * cluster-md-kmp-64kb-5.14.21-150500.55.44.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.44.1 * dtb-apple-5.14.21-150500.55.44.1 * dtb-renesas-5.14.21-150500.55.44.1 * dtb-freescale-5.14.21-150500.55.44.1 * dtb-broadcom-5.14.21-150500.55.44.1 * dtb-cavium-5.14.21-150500.55.44.1 * dtb-hisilicon-5.14.21-150500.55.44.1 * dtb-altera-5.14.21-150500.55.44.1 * kernel-64kb-optional-5.14.21-150500.55.44.1 * reiserfs-kmp-64kb-5.14.21-150500.55.44.1 * kernel-64kb-extra-5.14.21-150500.55.44.1 * dtb-lg-5.14.21-150500.55.44.1 * dtb-exynos-5.14.21-150500.55.44.1 * dtb-sprd-5.14.21-150500.55.44.1 * dtb-xilinx-5.14.21-150500.55.44.1 * dlm-kmp-64kb-5.14.21-150500.55.44.1 * ocfs2-kmp-64kb-5.14.21-150500.55.44.1 * kernel-64kb-optional-debuginfo-5.14.21-150500.55.44.1 * dtb-amazon-5.14.21-150500.55.44.1 * dtb-marvell-5.14.21-150500.55.44.1 * dtb-socionext-5.14.21-150500.55.44.1 * kernel-64kb-extra-debuginfo-5.14.21-150500.55.44.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.44.1 * kernel-64kb-devel-5.14.21-150500.55.44.1 * kernel-64kb-debuginfo-5.14.21-150500.55.44.1 * dlm-kmp-64kb-debuginfo-5.14.21-150500.55.44.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.44.1 * dtb-rockchip-5.14.21-150500.55.44.1 * dtb-nvidia-5.14.21-150500.55.44.1 * dtb-mediatek-5.14.21-150500.55.44.1 * kernel-64kb-livepatch-devel-5.14.21-150500.55.44.1 * dtb-apm-5.14.21-150500.55.44.1 * dtb-amd-5.14.21-150500.55.44.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.44.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.44.1 * dtb-qcom-5.14.21-150500.55.44.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.44.1 * gfs2-kmp-64kb-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.44.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150500.55.44.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (aarch64) * kernel-64kb-debuginfo-5.14.21-150500.55.44.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.44.1 * kernel-64kb-debugsource-5.14.21-150500.55.44.1 * kernel-64kb-devel-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.44.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.44.1 * kernel-default-devel-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (noarch) * kernel-devel-5.14.21-150500.55.44.1 * kernel-macros-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150500.55.44.1 * kernel-zfcpdump-debuginfo-5.14.21-150500.55.44.1 * Development Tools Module 15-SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.44.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-5.14.21-150500.55.44.1 * kernel-obs-build-5.14.21-150500.55.44.1 * kernel-syms-5.14.21-150500.55.44.1 * Development Tools Module 15-SP5 (noarch) * kernel-source-5.14.21-150500.55.44.1 * Legacy Module 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.44.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-5.14.21-150500.55.44.1 * kernel-default-debugsource-5.14.21-150500.55.44.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.44.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_44-default-1-150500.11.5.1 * kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-1-150500.11.5.1 * kernel-default-livepatch-5.14.21-150500.55.44.1 * kernel-default-debugsource-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-livepatch-devel-5.14.21-150500.55.44.1 * kernel-livepatch-SLE15-SP5_Update_9-debugsource-1-150500.11.5.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150500.55.44.1 * cluster-md-kmp-default-5.14.21-150500.55.44.1 * ocfs2-kmp-default-5.14.21-150500.55.44.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.44.1 * gfs2-kmp-default-5.14.21-150500.55.44.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-debugsource-5.14.21-150500.55.44.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.44.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.44.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.44.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.44.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * kernel-default-extra-debuginfo-5.14.21-150500.55.44.1 * kernel-default-extra-5.14.21-150500.55.44.1 * kernel-default-debugsource-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6622.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212139 * https://bugzilla.suse.com/show_bug.cgi?id=1212584 * https://bugzilla.suse.com/show_bug.cgi?id=1214117 * https://bugzilla.suse.com/show_bug.cgi?id=1214158 * https://bugzilla.suse.com/show_bug.cgi?id=1214747 * https://bugzilla.suse.com/show_bug.cgi?id=1214823 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1215952 * https://bugzilla.suse.com/show_bug.cgi?id=1216032 * https://bugzilla.suse.com/show_bug.cgi?id=1216057 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217602 * https://bugzilla.suse.com/show_bug.cgi?id=1217692 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217822 * https://bugzilla.suse.com/show_bug.cgi?id=1217927 * https://bugzilla.suse.com/show_bug.cgi?id=1217933 * https://bugzilla.suse.com/show_bug.cgi?id=1217938 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1217980 * https://bugzilla.suse.com/show_bug.cgi?id=1217981 * https://bugzilla.suse.com/show_bug.cgi?id=1217982 * https://bugzilla.suse.com/show_bug.cgi?id=1218056 * https://bugzilla.suse.com/show_bug.cgi?id=1218092 * https://bugzilla.suse.com/show_bug.cgi?id=1218139 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218229 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218335 * https://bugzilla.suse.com/show_bug.cgi?id=1218357 * https://bugzilla.suse.com/show_bug.cgi?id=1218397 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218461 * https://bugzilla.suse.com/show_bug.cgi?id=1218515 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218569 * https://bugzilla.suse.com/show_bug.cgi?id=1218643 * https://bugzilla.suse.com/show_bug.cgi?id=1218738 * https://jira.suse.com/browse/PED-3459 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-7167 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 20:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 20:30:17 -0000 Subject: SUSE-RU-2024:0159-1: moderate: Recommended update for librelp Message-ID: <170560981745.13525.9085136880610954177@smelt2.prg2.suse.org> # Recommended update for librelp Announcement ID: SUSE-RU-2024:0159-1 Rating: moderate References: * bsc#1210649 Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that has one fix can now be installed. ## Description: This update for librelp fixes the following issues: * update to librelp 1.11.0 (bsc#1210649) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-159=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-159=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-159=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * librelp-debugsource-1.11.0-150000.3.3.1 * librelp-devel-1.11.0-150000.3.3.1 * librelp0-debuginfo-1.11.0-150000.3.3.1 * librelp0-1.11.0-150000.3.3.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * librelp-debugsource-1.11.0-150000.3.3.1 * librelp-devel-1.11.0-150000.3.3.1 * librelp0-debuginfo-1.11.0-150000.3.3.1 * librelp0-1.11.0-150000.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * librelp-debugsource-1.11.0-150000.3.3.1 * librelp-devel-1.11.0-150000.3.3.1 * librelp0-debuginfo-1.11.0-150000.3.3.1 * librelp0-1.11.0-150000.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1210649 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 20:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 20:30:19 -0000 Subject: SUSE-SU-2024:0158-1: important: Security update for perl-Spreadsheet-ParseExcel Message-ID: <170560981901.13525.17222300863703206853@smelt2.prg2.suse.org> # Security update for perl-Spreadsheet-ParseExcel Announcement ID: SUSE-SU-2024:0158-1 Rating: important References: * bsc#1218414 Cross-References: * CVE-2023-7101 CVSS scores: * CVE-2023-7101 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2023-7101 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for perl-Spreadsheet-ParseExcel fixes the following issues: * CVE-2023-7101: Fixed a command injection issue when parsing an untrusted spreadsheet (bsc#1218414). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-158=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-158=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-158=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-158=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-158=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-158=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-158=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-158=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-158=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-158=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-158=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-158=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-158=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-158=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-158=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-158=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-158=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-158=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-158=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-158=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-158=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-158=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.5 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * Basesystem Module 15-SP5 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Manager Proxy 4.3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Manager Server 4.3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Enterprise Storage 7.1 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE CaaS Platform 4.0 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-7101.html * https://bugzilla.suse.com/show_bug.cgi?id=1218414 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 20:30:21 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 20:30:21 -0000 Subject: SUSE-SU-2024:0157-1: moderate: Security update for libcryptopp Message-ID: <170560982143.13525.17203255525925511338@smelt2.prg2.suse.org> # Security update for libcryptopp Announcement ID: SUSE-SU-2024:0157-1 Rating: moderate References: * bsc#1218222 Cross-References: * CVE-2023-50981 CVSS scores: * CVE-2023-50981 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-50981 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libcryptopp fixes the following issues: * CVE-2023-50981: Fixed a potential denial of service issue via crafted DER public key data (bsc#1218222). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-157=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-157=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-157=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-157=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.6.1 * libcryptopp8_6_0-8.6.0-150400.3.6.1 * libcryptopp-debugsource-8.6.0-150400.3.6.1 * libcryptopp-devel-8.6.0-150400.3.6.1 * openSUSE Leap 15.4 (x86_64) * libcryptopp8_6_0-32bit-8.6.0-150400.3.6.1 * libcryptopp8_6_0-32bit-debuginfo-8.6.0-150400.3.6.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libcryptopp8_6_0-64bit-8.6.0-150400.3.6.1 * libcryptopp8_6_0-64bit-debuginfo-8.6.0-150400.3.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.6.1 * libcryptopp8_6_0-8.6.0-150400.3.6.1 * libcryptopp-debugsource-8.6.0-150400.3.6.1 * libcryptopp-devel-8.6.0-150400.3.6.1 * openSUSE Leap 15.5 (x86_64) * libcryptopp8_6_0-32bit-8.6.0-150400.3.6.1 * libcryptopp8_6_0-32bit-debuginfo-8.6.0-150400.3.6.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.6.1 * libcryptopp8_6_0-8.6.0-150400.3.6.1 * libcryptopp-debugsource-8.6.0-150400.3.6.1 * libcryptopp-devel-8.6.0-150400.3.6.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.6.1 * libcryptopp8_6_0-8.6.0-150400.3.6.1 * libcryptopp-debugsource-8.6.0-150400.3.6.1 * libcryptopp-devel-8.6.0-150400.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50981.html * https://bugzilla.suse.com/show_bug.cgi?id=1218222 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 20:30:30 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 20:30:30 -0000 Subject: SUSE-SU-2024:0156-1: important: Security update for the Linux Kernel Message-ID: <170560983069.13525.5307515324664759335@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0156-1 Rating: important References: * bsc#1179610 * bsc#1183045 * bsc#1193285 * bsc#1211162 * bsc#1211226 * bsc#1212584 * bsc#1214747 * bsc#1214823 * bsc#1215237 * bsc#1215696 * bsc#1215885 * bsc#1216057 * bsc#1216559 * bsc#1216776 * bsc#1217036 * bsc#1217217 * bsc#1217250 * bsc#1217602 * bsc#1217692 * bsc#1217790 * bsc#1217801 * bsc#1217933 * bsc#1217938 * bsc#1217946 * bsc#1217947 * bsc#1217980 * bsc#1217981 * bsc#1217982 * bsc#1218056 * bsc#1218139 * bsc#1218184 * bsc#1218234 * bsc#1218253 * bsc#1218258 * bsc#1218335 * bsc#1218357 * bsc#1218447 * bsc#1218515 * bsc#1218559 * bsc#1218569 * bsc#1218659 * jsc#PED-3459 * jsc#PED-5021 * jsc#PED-7322 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6531 * CVE-2023-6546 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6622 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 10 vulnerabilities, contains three features and has 31 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335). * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253). * CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938). * CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250). The following non-security bugs were fixed: * Reviewed and added more information to README.SUSE (jsc#PED-5021). * Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184). * Drop drm/bridge lt9611uxc patches that have been reverted on stable trees * KVM: s390/mm: Properly reset no-dat (bsc#1218056). * KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217933). * KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322). * NFS: Fix O_DIRECT locking issues (bsc#1211162). * NFS: Fix a few more clear_bit() instances that need release semantics (bsc#1211162). * NFS: Fix a potential data corruption (bsc#1211162). * NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162). * NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162). * NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162). * NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162). * NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162). * NLM: Defend against file_lock changes after vfs_test_lock() (bsc#1217692). * Updated SPI patches for NVIDIA Grace enablement (bsc#1212584 jsc#PED-3459) * block: fix revalidate performance regression (bsc#1216057). * bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980). * ceph: fix type promotion bug on 32bit systems (bsc#1217982). * clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217). * clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217). * clocksource: Handle negative skews in "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217). * clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217). * clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217). * clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217). * dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659). * libceph: use kernel_connect() (bsc#1217981). * mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515). * net/smc: Fix pos miscalculation in statistics (bsc#1218139). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162). * remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569). * s390/vx: fix save/restore of fpu kernel context (bsc#1218357). * scsi: lpfc: use unsigned type for num_sge (bsc#1214747). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix slot alignment checks (bsc#1216559). * tracing: Disable preemption when using the filter buffer (bsc#1217036). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036). * tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036). * uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978). * vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602). * x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285). * x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790). * x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217). * x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217). * x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-156=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-156=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-156=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-156=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-156=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-156=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-156=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-156=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-156=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-156=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-156=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-156=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-156=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-156=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-156=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-156=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-156=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-156=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-debugsource-5.14.21-150400.24.103.1 * kernel-64kb-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * reiserfs-kmp-default-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Real Time 15 SP4 (nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * kernel-default-extra-5.14.21-150400.24.103.1 * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * kernel-source-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-debugsource-5.14.21-150400.24.103.1 * kernel-64kb-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * reiserfs-kmp-default-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * kernel-source-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.103.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * reiserfs-kmp-default-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Manager Server 4.3 (noarch) * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.103.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.103.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (noarch) * kernel-docs-html-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-source-vanilla-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * kernel-source-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-devel-5.14.21-150400.24.103.1 * kernel-debug-debuginfo-5.14.21-150400.24.103.1 * kernel-debug-debugsource-5.14.21-150400.24.103.1 * kernel-debug-livepatch-devel-5.14.21-150400.24.103.1 * kernel-debug-devel-debuginfo-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-5.14.21-150400.24.103.1 * kernel-kvmsmall-devel-5.14.21-150400.24.103.1 * kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.103.1 * kernel-kvmsmall-debugsource-5.14.21-150400.24.103.1 * kernel-default-base-rebuild-5.14.21-150400.24.103.1.150400.24.48.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * kernel-default-optional-5.14.21-150400.24.103.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.103.1 * reiserfs-kmp-default-5.14.21-150400.24.103.1 * ocfs2-kmp-default-5.14.21-150400.24.103.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.103.1 * cluster-md-kmp-default-5.14.21-150400.24.103.1 * dlm-kmp-default-5.14.21-150400.24.103.1 * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-livepatch-devel-5.14.21-150400.24.103.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * gfs2-kmp-default-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-obs-qa-5.14.21-150400.24.103.1 * kernel-default-extra-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * kernel-default-livepatch-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kselftests-kmp-default-5.14.21-150400.24.103.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_103-default-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-1-150400.9.3.1 * kernel-livepatch-SLE15-SP4_Update_22-debugsource-1-150400.9.3.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.103.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (aarch64) * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.103.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-extra-5.14.21-150400.24.103.1 * dtb-socionext-5.14.21-150400.24.103.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.103.1 * dtb-amazon-5.14.21-150400.24.103.1 * dtb-freescale-5.14.21-150400.24.103.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.103.1 * dtb-lg-5.14.21-150400.24.103.1 * ocfs2-kmp-64kb-5.14.21-150400.24.103.1 * dtb-mediatek-5.14.21-150400.24.103.1 * dtb-hisilicon-5.14.21-150400.24.103.1 * dtb-altera-5.14.21-150400.24.103.1 * dlm-kmp-64kb-5.14.21-150400.24.103.1 * dtb-sprd-5.14.21-150400.24.103.1 * dtb-amlogic-5.14.21-150400.24.103.1 * kernel-64kb-debugsource-5.14.21-150400.24.103.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-livepatch-devel-5.14.21-150400.24.103.1 * kernel-64kb-devel-5.14.21-150400.24.103.1 * dtb-nvidia-5.14.21-150400.24.103.1 * dtb-qcom-5.14.21-150400.24.103.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.103.1 * gfs2-kmp-64kb-5.14.21-150400.24.103.1 * kernel-64kb-debuginfo-5.14.21-150400.24.103.1 * reiserfs-kmp-64kb-5.14.21-150400.24.103.1 * dtb-xilinx-5.14.21-150400.24.103.1 * dtb-apm-5.14.21-150400.24.103.1 * dtb-apple-5.14.21-150400.24.103.1 * dtb-marvell-5.14.21-150400.24.103.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.103.1 * dtb-renesas-5.14.21-150400.24.103.1 * dtb-rockchip-5.14.21-150400.24.103.1 * kernel-64kb-optional-5.14.21-150400.24.103.1 * kselftests-kmp-64kb-5.14.21-150400.24.103.1 * dtb-amd-5.14.21-150400.24.103.1 * dtb-arm-5.14.21-150400.24.103.1 * dtb-cavium-5.14.21-150400.24.103.1 * dtb-allwinner-5.14.21-150400.24.103.1 * dtb-exynos-5.14.21-150400.24.103.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.103.1 * dtb-broadcom-5.14.21-150400.24.103.1 * cluster-md-kmp-64kb-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.103.1 * openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.103.1 * openSUSE Leap Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_103-default-1-150400.9.3.1 * kernel-default-livepatch-devel-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-livepatch-5.14.21-150400.24.103.1 * kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-1-150400.9.3.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-livepatch-SLE15-SP4_Update_22-debugsource-1-150400.9.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150400.24.103.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.103.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.103.1 * ocfs2-kmp-default-5.14.21-150400.24.103.1 * gfs2-kmp-default-5.14.21-150400.24.103.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * cluster-md-kmp-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-debugsource-5.14.21-150400.24.103.1 * kernel-64kb-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * reiserfs-kmp-default-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6622.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1193285 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212584 * https://bugzilla.suse.com/show_bug.cgi?id=1214747 * https://bugzilla.suse.com/show_bug.cgi?id=1214823 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1216057 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217602 * https://bugzilla.suse.com/show_bug.cgi?id=1217692 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217933 * https://bugzilla.suse.com/show_bug.cgi?id=1217938 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1217980 * https://bugzilla.suse.com/show_bug.cgi?id=1217981 * https://bugzilla.suse.com/show_bug.cgi?id=1217982 * https://bugzilla.suse.com/show_bug.cgi?id=1218056 * https://bugzilla.suse.com/show_bug.cgi?id=1218139 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218335 * https://bugzilla.suse.com/show_bug.cgi?id=1218357 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218515 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218569 * https://bugzilla.suse.com/show_bug.cgi?id=1218659 * https://jira.suse.com/browse/PED-3459 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-7322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 20:30:34 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 18 Jan 2024 20:30:34 -0000 Subject: SUSE-SU-2024:0155-1: important: Security update for suse-module-tools Message-ID: <170560983444.13525.1593568328094392555@smelt2.prg2.suse.org> # Security update for suse-module-tools Announcement ID: SUSE-SU-2024:0155-1 Rating: important References: * bsc#1205767 * bsc#1210335 * bsc#1217775 * jsc#PED-5731 Cross-References: * CVE-2023-1829 * CVE-2023-23559 CVSS scores: * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-23559 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L * CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves two vulnerabilities, contains one feature and has one security fix can now be installed. ## Description: This update for suse-module-tools fixes the following issues: Updated to version 15.2.19: * Added a symlink for /boot/.vmlinuz.hmac (bsc#1217775). Updated to version 15.2.18: * CVE-2023-23559: Blacklisted RNDIS modules (bsc#1205767, jsc#PED-5731). * CVE-2023-1829: Blacklisted the cls_tcindex module (bsc#1210335). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-155=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-155=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-155=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * suse-module-tools-15.2.19-150200.4.18.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * suse-module-tools-15.2.19-150200.4.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * suse-module-tools-15.2.19-150200.4.18.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-23559.html * https://bugzilla.suse.com/show_bug.cgi?id=1205767 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1217775 * https://jira.suse.com/browse/PED-5731 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Fri Jan 19 08:05:17 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:05:17 +0100 (CET) Subject: SUSE-CU-2024:242-1: Security update of suse/ltss/sle15.3/sle15 Message-ID: <20240119080517.52BCDFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.3/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:242-1 Container Tags : suse/ltss/sle15.3/bci-base:15.3 , suse/ltss/sle15.3/bci-base:15.3.3.42 , suse/ltss/sle15.3/sle15:15.3 , suse/ltss/sle15.3/sle15:15.3.3.42 Container Release : 3.42 Severity : moderate Type : security References : 1212475 1217000 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/ltss/sle15.3/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-updates at lists.suse.com Fri Jan 19 08:05:22 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:05:22 +0100 (CET) Subject: SUSE-CU-2024:243-1: Security update of suse/ltss/sle15.4/sle15 Message-ID: <20240119080522.430E3FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.4/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:243-1 Container Tags : suse/ltss/sle15.4/bci-base:15.4 , suse/ltss/sle15.4/bci-base:15.4.2.8 , suse/ltss/sle15.4/sle15:15.4 , suse/ltss/sle15.4/sle15:15.4.2.8 Container Release : 2.8 Severity : important Type : security References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/ltss/sle15.4/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-updates at lists.suse.com Fri Jan 19 08:05:43 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:05:43 +0100 (CET) Subject: SUSE-CU-2024:244-1: Security update of suse/389-ds Message-ID: <20240119080543.C7DB7FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/389-ds ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:244-1 Container Tags : suse/389-ds:2.2 , suse/389-ds:2.2-19.5 , suse/389-ds:latest Container Release : 19.5 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/389-ds was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:06:03 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:06:03 +0100 (CET) Subject: SUSE-CU-2024:245-1: Security update of bci/dotnet-aspnet Message-ID: <20240119080603.739F2FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:245-1 Container Tags : bci/dotnet-aspnet:6.0 , bci/dotnet-aspnet:6.0-21.4 , bci/dotnet-aspnet:6.0.26 , bci/dotnet-aspnet:6.0.26-21.4 Container Release : 21.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:06:22 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:06:22 +0100 (CET) Subject: SUSE-CU-2024:246-1: Security update of bci/dotnet-aspnet Message-ID: <20240119080622.3FE2FFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:246-1 Container Tags : bci/dotnet-aspnet:7.0 , bci/dotnet-aspnet:7.0-21.4 , bci/dotnet-aspnet:7.0.15 , bci/dotnet-aspnet:7.0.15-21.4 Container Release : 21.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:06:50 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:06:50 +0100 (CET) Subject: SUSE-CU-2024:248-1: Security update of bci/dotnet-sdk Message-ID: <20240119080650.48E29FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:248-1 Container Tags : bci/dotnet-sdk:6.0 , bci/dotnet-sdk:6.0-20.4 , bci/dotnet-sdk:6.0.26 , bci/dotnet-sdk:6.0.26-20.4 Container Release : 20.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:07:12 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:07:12 +0100 (CET) Subject: SUSE-CU-2024:249-1: Security update of bci/dotnet-sdk Message-ID: <20240119080712.AE4DCFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:249-1 Container Tags : bci/dotnet-sdk:7.0 , bci/dotnet-sdk:7.0-22.4 , bci/dotnet-sdk:7.0.15 , bci/dotnet-sdk:7.0.15-22.4 Container Release : 22.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:07:31 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:07:31 +0100 (CET) Subject: SUSE-CU-2024:250-1: Security update of bci/dotnet-runtime Message-ID: <20240119080731.A2C64FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:250-1 Container Tags : bci/dotnet-runtime:6.0 , bci/dotnet-runtime:6.0-20.4 , bci/dotnet-runtime:6.0.26 , bci/dotnet-runtime:6.0.26-20.4 Container Release : 20.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:07:49 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:07:49 +0100 (CET) Subject: SUSE-CU-2024:251-1: Security update of bci/dotnet-runtime Message-ID: <20240119080749.A6E7AFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:251-1 Container Tags : bci/dotnet-runtime:7.0 , bci/dotnet-runtime:7.0-22.4 , bci/dotnet-runtime:7.0.15 , bci/dotnet-runtime:7.0.15-22.4 Container Release : 22.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:07:55 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:07:55 +0100 (CET) Subject: SUSE-CU-2024:252-1: Security update of suse/git Message-ID: <20240119080755.E087CFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/git ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:252-1 Container Tags : suse/git:2.35 , suse/git:2.35-7.4 , suse/git:latest Container Release : 7.4 Severity : important Type : security References : 1211188 1211190 1218126 1218186 1218209 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 ----------------------------------------------------------------- The container suse/git was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - container:micro-image-15.5.0-15.1 updated From sle-updates at lists.suse.com Fri Jan 19 08:08:09 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:08:09 +0100 (CET) Subject: SUSE-CU-2024:253-1: Security update of bci/golang Message-ID: <20240119080809.44672FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:253-1 Container Tags : bci/golang:1.20 , bci/golang:1.20-2.7.4 , bci/golang:oldstable , bci/golang:oldstable-2.7.4 Container Release : 7.4 Severity : important Type : security References : 1206346 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:142-1 Released: Thu Jan 18 11:40:23 2024 Summary: Recommended update for go1.20 Type: recommended Severity: moderate References: 1206346 This update for go1.20 fixes the following issues: - Update to version go1.20.13 (bsc#1206346) The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - go1.20-doc-1.20.13-150000.1.38.1 updated - go1.20-1.20.13-150000.1.38.1 updated - go1.20-race-1.20.13-150000.1.38.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:08:19 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:08:19 +0100 (CET) Subject: SUSE-CU-2024:254-1: Security update of bci/golang Message-ID: <20240119080819.272CEFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:254-1 Container Tags : bci/golang:1.20-openssl , bci/golang:1.20-openssl-11.4 , bci/golang:oldstable-openssl , bci/golang:oldstable-openssl-11.4 Container Release : 11.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:08:35 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:08:35 +0100 (CET) Subject: SUSE-CU-2024:255-1: Security update of bci/golang Message-ID: <20240119080835.AFE50FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:255-1 Container Tags : bci/golang:1.21 , bci/golang:1.21-1.7.4 , bci/golang:latest , bci/golang:stable , bci/golang:stable-1.7.4 Container Release : 7.4 Severity : important Type : security References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - go1.21-doc-1.21.6-150000.1.21.1 updated - go1.21-1.21.6-150000.1.21.1 updated - go1.21-race-1.21.6-150000.1.21.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:08:45 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:08:45 +0100 (CET) Subject: SUSE-CU-2024:256-1: Security update of bci/golang Message-ID: <20240119080845.123A6FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:256-1 Container Tags : bci/golang:1.21-openssl , bci/golang:1.21-openssl-11.4 , bci/golang:latest , bci/golang:stable-openssl , bci/golang:stable-openssl-11.4 Container Release : 11.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:09:04 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:09:04 +0100 (CET) Subject: SUSE-CU-2024:258-1: Security update of bci/bci-init Message-ID: <20240119080904.AAE68FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-init ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:258-1 Container Tags : bci/bci-init:15.5 , bci/bci-init:15.5.13.4 , bci/bci-init:latest Container Release : 13.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/bci-init was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:09:22 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:09:22 +0100 (CET) Subject: SUSE-CU-2024:261-1: Security update of bci/nodejs Message-ID: <20240119080922.5D8FBFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:261-1 Container Tags : bci/node:20 , bci/node:20-5.4 , bci/node:latest , bci/nodejs:20 , bci/nodejs:20-5.4 , bci/nodejs:latest Container Release : 5.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:09:45 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:09:45 +0100 (CET) Subject: SUSE-CU-2024:262-1: Security update of bci/openjdk-devel Message-ID: <20240119080945.3DF5BFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:262-1 Container Tags : bci/openjdk-devel:11 , bci/openjdk-devel:11-13.7 Container Release : 13.7 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:bci-openjdk-11-15.5.11-13.7 updated From sle-updates at lists.suse.com Fri Jan 19 08:10:02 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:10:02 +0100 (CET) Subject: SUSE-CU-2024:263-1: Security update of bci/openjdk Message-ID: <20240119081002.49980FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:263-1 Container Tags : bci/openjdk:11 , bci/openjdk:11-13.7 Container Release : 13.7 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:10:19 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:10:19 +0100 (CET) Subject: SUSE-CU-2024:264-1: Security update of bci/openjdk Message-ID: <20240119081019.C1C7BFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:264-1 Container Tags : bci/openjdk:17 , bci/openjdk:17-15.3 , bci/openjdk:latest Container Release : 15.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:10:35 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:10:35 +0100 (CET) Subject: SUSE-CU-2024:265-1: Security update of bci/php-fpm Message-ID: <20240119081035.2F73AFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/php-fpm ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:265-1 Container Tags : bci/php-fpm:8 , bci/php-fpm:8-11.3 Container Release : 11.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/php-fpm was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Fri Jan 19 08:10:36 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:10:36 +0100 (CET) Subject: SUSE-CU-2024:266-1: Security update of suse/rmt-mariadb Message-ID: <20240119081036.F3E86FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:266-1 Container Tags : suse/mariadb:10.6 , suse/mariadb:10.6-17.3 , suse/mariadb:latest , suse/rmt-mariadb:10.6 , suse/rmt-mariadb:10.6-17.3 , suse/rmt-mariadb:latest Container Release : 17.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/rmt-mariadb was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From null at suse.de Fri Jan 19 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 19 Jan 2024 08:30:03 -0000 Subject: SUSE-RU-2024:0164-1: important: Recommended update for util-linux Message-ID: <170565300344.11120.11556002865952511826@smelt2.prg2.suse.org> # Recommended update for util-linux Announcement ID: SUSE-RU-2024:0164-1 Rating: important References: * bsc#1207987 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has one fix can now be installed. ## Description: This update for util-linux fixes the following issues: * Instead of explicitly truncating clocks.txt file, pad with whitespaces in the end of file. This is done to improve performance of libuuid on xfs. (bsc#1207987) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-164=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-164=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-164=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-164=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-164=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-164=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-164=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-164=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * python3-libmount-debuginfo-2.36.2-150300.4.38.1 * libblkid-devel-2.36.2-150300.4.38.1 * libblkid1-2.36.2-150300.4.38.1 * libuuid-devel-2.36.2-150300.4.38.1 * libfdisk-devel-static-2.36.2-150300.4.38.1 * libuuid1-2.36.2-150300.4.38.1 * libmount-devel-2.36.2-150300.4.38.1 * util-linux-2.36.2-150300.4.38.1 * libsmartcols1-2.36.2-150300.4.38.1 * util-linux-debugsource-2.36.2-150300.4.38.1 * libsmartcols-devel-2.36.2-150300.4.38.1 * python3-libmount-2.36.2-150300.4.38.1 * libblkid-devel-static-2.36.2-150300.4.38.1 * libfdisk1-2.36.2-150300.4.38.1 * libfdisk-devel-2.36.2-150300.4.38.1 * libmount1-2.36.2-150300.4.38.1 * libsmartcols-devel-static-2.36.2-150300.4.38.1 * libuuid-devel-static-2.36.2-150300.4.38.1 * python3-libmount-debugsource-2.36.2-150300.4.38.1 * util-linux-debuginfo-2.36.2-150300.4.38.1 * libuuid1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-2.36.2-150300.4.38.1 * util-linux-systemd-debugsource-2.36.2-150300.4.38.1 * libblkid1-debuginfo-2.36.2-150300.4.38.1 * libmount1-debuginfo-2.36.2-150300.4.38.1 * libmount-devel-static-2.36.2-150300.4.38.1 * libsmartcols1-debuginfo-2.36.2-150300.4.38.1 * uuidd-debuginfo-2.36.2-150300.4.38.1 * uuidd-2.36.2-150300.4.38.1 * libfdisk1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-debuginfo-2.36.2-150300.4.38.1 * openSUSE Leap 15.3 (x86_64) * libblkid-devel-32bit-2.36.2-150300.4.38.1 * libuuid-devel-32bit-2.36.2-150300.4.38.1 * libuuid1-32bit-debuginfo-2.36.2-150300.4.38.1 * libblkid1-32bit-2.36.2-150300.4.38.1 * libmount-devel-32bit-2.36.2-150300.4.38.1 * libuuid1-32bit-2.36.2-150300.4.38.1 * libfdisk1-32bit-2.36.2-150300.4.38.1 * libblkid1-32bit-debuginfo-2.36.2-150300.4.38.1 * libmount1-32bit-debuginfo-2.36.2-150300.4.38.1 * libfdisk1-32bit-debuginfo-2.36.2-150300.4.38.1 * libsmartcols1-32bit-debuginfo-2.36.2-150300.4.38.1 * libfdisk-devel-32bit-2.36.2-150300.4.38.1 * libsmartcols-devel-32bit-2.36.2-150300.4.38.1 * libmount1-32bit-2.36.2-150300.4.38.1 * libsmartcols1-32bit-2.36.2-150300.4.38.1 * openSUSE Leap 15.3 (noarch) * util-linux-lang-2.36.2-150300.4.38.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libsmartcols1-64bit-2.36.2-150300.4.38.1 * libuuid1-64bit-debuginfo-2.36.2-150300.4.38.1 * libsmartcols-devel-64bit-2.36.2-150300.4.38.1 * libuuid1-64bit-2.36.2-150300.4.38.1 * libblkid-devel-64bit-2.36.2-150300.4.38.1 * libmount1-64bit-debuginfo-2.36.2-150300.4.38.1 * libsmartcols1-64bit-debuginfo-2.36.2-150300.4.38.1 * libuuid-devel-64bit-2.36.2-150300.4.38.1 * libfdisk1-64bit-debuginfo-2.36.2-150300.4.38.1 * libblkid1-64bit-2.36.2-150300.4.38.1 * libmount-devel-64bit-2.36.2-150300.4.38.1 * libfdisk-devel-64bit-2.36.2-150300.4.38.1 * libblkid1-64bit-debuginfo-2.36.2-150300.4.38.1 * libmount1-64bit-2.36.2-150300.4.38.1 * libfdisk1-64bit-2.36.2-150300.4.38.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libblkid-devel-2.36.2-150300.4.38.1 * libblkid1-2.36.2-150300.4.38.1 * libuuid-devel-2.36.2-150300.4.38.1 * libuuid1-2.36.2-150300.4.38.1 * libmount-devel-2.36.2-150300.4.38.1 * util-linux-2.36.2-150300.4.38.1 * libsmartcols1-2.36.2-150300.4.38.1 * util-linux-debugsource-2.36.2-150300.4.38.1 * libsmartcols-devel-2.36.2-150300.4.38.1 * libblkid-devel-static-2.36.2-150300.4.38.1 * libfdisk1-2.36.2-150300.4.38.1 * libfdisk-devel-2.36.2-150300.4.38.1 * libmount1-2.36.2-150300.4.38.1 * libuuid-devel-static-2.36.2-150300.4.38.1 * util-linux-debuginfo-2.36.2-150300.4.38.1 * libuuid1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-2.36.2-150300.4.38.1 * util-linux-systemd-debugsource-2.36.2-150300.4.38.1 * libblkid1-debuginfo-2.36.2-150300.4.38.1 * libmount1-debuginfo-2.36.2-150300.4.38.1 * libsmartcols1-debuginfo-2.36.2-150300.4.38.1 * uuidd-debuginfo-2.36.2-150300.4.38.1 * uuidd-2.36.2-150300.4.38.1 * libfdisk1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-debuginfo-2.36.2-150300.4.38.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * util-linux-lang-2.36.2-150300.4.38.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libuuid1-32bit-debuginfo-2.36.2-150300.4.38.1 * libblkid1-32bit-2.36.2-150300.4.38.1 * libuuid1-32bit-2.36.2-150300.4.38.1 * libblkid1-32bit-debuginfo-2.36.2-150300.4.38.1 * libmount1-32bit-debuginfo-2.36.2-150300.4.38.1 * libmount1-32bit-2.36.2-150300.4.38.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libblkid-devel-2.36.2-150300.4.38.1 * libblkid1-2.36.2-150300.4.38.1 * libuuid-devel-2.36.2-150300.4.38.1 * libuuid1-2.36.2-150300.4.38.1 * libmount-devel-2.36.2-150300.4.38.1 * util-linux-2.36.2-150300.4.38.1 * libsmartcols1-2.36.2-150300.4.38.1 * util-linux-debugsource-2.36.2-150300.4.38.1 * libsmartcols-devel-2.36.2-150300.4.38.1 * libblkid-devel-static-2.36.2-150300.4.38.1 * libfdisk1-2.36.2-150300.4.38.1 * libfdisk-devel-2.36.2-150300.4.38.1 * libmount1-2.36.2-150300.4.38.1 * libuuid-devel-static-2.36.2-150300.4.38.1 * util-linux-debuginfo-2.36.2-150300.4.38.1 * libuuid1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-2.36.2-150300.4.38.1 * util-linux-systemd-debugsource-2.36.2-150300.4.38.1 * libblkid1-debuginfo-2.36.2-150300.4.38.1 * libmount1-debuginfo-2.36.2-150300.4.38.1 * libsmartcols1-debuginfo-2.36.2-150300.4.38.1 * uuidd-debuginfo-2.36.2-150300.4.38.1 * uuidd-2.36.2-150300.4.38.1 * libfdisk1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-debuginfo-2.36.2-150300.4.38.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * util-linux-lang-2.36.2-150300.4.38.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libuuid1-32bit-debuginfo-2.36.2-150300.4.38.1 * libblkid1-32bit-2.36.2-150300.4.38.1 * libuuid1-32bit-2.36.2-150300.4.38.1 * libblkid1-32bit-debuginfo-2.36.2-150300.4.38.1 * libmount1-32bit-debuginfo-2.36.2-150300.4.38.1 * libmount1-32bit-2.36.2-150300.4.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libblkid-devel-2.36.2-150300.4.38.1 * libblkid1-2.36.2-150300.4.38.1 * libuuid-devel-2.36.2-150300.4.38.1 * libuuid1-2.36.2-150300.4.38.1 * libmount-devel-2.36.2-150300.4.38.1 * util-linux-2.36.2-150300.4.38.1 * libsmartcols1-2.36.2-150300.4.38.1 * util-linux-debugsource-2.36.2-150300.4.38.1 * libsmartcols-devel-2.36.2-150300.4.38.1 * libblkid-devel-static-2.36.2-150300.4.38.1 * libfdisk1-2.36.2-150300.4.38.1 * libfdisk-devel-2.36.2-150300.4.38.1 * libmount1-2.36.2-150300.4.38.1 * libuuid-devel-static-2.36.2-150300.4.38.1 * util-linux-debuginfo-2.36.2-150300.4.38.1 * libuuid1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-2.36.2-150300.4.38.1 * util-linux-systemd-debugsource-2.36.2-150300.4.38.1 * libblkid1-debuginfo-2.36.2-150300.4.38.1 * libmount1-debuginfo-2.36.2-150300.4.38.1 * libsmartcols1-debuginfo-2.36.2-150300.4.38.1 * uuidd-debuginfo-2.36.2-150300.4.38.1 * uuidd-2.36.2-150300.4.38.1 * libfdisk1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-debuginfo-2.36.2-150300.4.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * util-linux-lang-2.36.2-150300.4.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libuuid1-32bit-debuginfo-2.36.2-150300.4.38.1 * libblkid1-32bit-2.36.2-150300.4.38.1 * libuuid1-32bit-2.36.2-150300.4.38.1 * libblkid1-32bit-debuginfo-2.36.2-150300.4.38.1 * libmount1-32bit-debuginfo-2.36.2-150300.4.38.1 * libmount1-32bit-2.36.2-150300.4.38.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libblkid-devel-2.36.2-150300.4.38.1 * libblkid1-2.36.2-150300.4.38.1 * libuuid-devel-2.36.2-150300.4.38.1 * libuuid1-2.36.2-150300.4.38.1 * libmount-devel-2.36.2-150300.4.38.1 * util-linux-2.36.2-150300.4.38.1 * libsmartcols1-2.36.2-150300.4.38.1 * util-linux-debugsource-2.36.2-150300.4.38.1 * libsmartcols-devel-2.36.2-150300.4.38.1 * libblkid-devel-static-2.36.2-150300.4.38.1 * libfdisk1-2.36.2-150300.4.38.1 * libfdisk-devel-2.36.2-150300.4.38.1 * libmount1-2.36.2-150300.4.38.1 * libuuid-devel-static-2.36.2-150300.4.38.1 * util-linux-debuginfo-2.36.2-150300.4.38.1 * libuuid1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-2.36.2-150300.4.38.1 * util-linux-systemd-debugsource-2.36.2-150300.4.38.1 * libblkid1-debuginfo-2.36.2-150300.4.38.1 * libmount1-debuginfo-2.36.2-150300.4.38.1 * libsmartcols1-debuginfo-2.36.2-150300.4.38.1 * uuidd-debuginfo-2.36.2-150300.4.38.1 * uuidd-2.36.2-150300.4.38.1 * libfdisk1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-debuginfo-2.36.2-150300.4.38.1 * SUSE Enterprise Storage 7.1 (noarch) * util-linux-lang-2.36.2-150300.4.38.1 * SUSE Enterprise Storage 7.1 (x86_64) * libuuid1-32bit-debuginfo-2.36.2-150300.4.38.1 * libblkid1-32bit-2.36.2-150300.4.38.1 * libuuid1-32bit-2.36.2-150300.4.38.1 * libblkid1-32bit-debuginfo-2.36.2-150300.4.38.1 * libmount1-32bit-debuginfo-2.36.2-150300.4.38.1 * libmount1-32bit-2.36.2-150300.4.38.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * util-linux-systemd-debugsource-2.36.2-150300.4.38.1 * libfdisk1-2.36.2-150300.4.38.1 * libmount1-2.36.2-150300.4.38.1 * libuuid1-2.36.2-150300.4.38.1 * libblkid1-debuginfo-2.36.2-150300.4.38.1 * libmount1-debuginfo-2.36.2-150300.4.38.1 * util-linux-2.36.2-150300.4.38.1 * libsmartcols1-2.36.2-150300.4.38.1 * libsmartcols1-debuginfo-2.36.2-150300.4.38.1 * libblkid1-2.36.2-150300.4.38.1 * util-linux-debuginfo-2.36.2-150300.4.38.1 * util-linux-debugsource-2.36.2-150300.4.38.1 * libuuid1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-2.36.2-150300.4.38.1 * libfdisk1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-debuginfo-2.36.2-150300.4.38.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * util-linux-systemd-debugsource-2.36.2-150300.4.38.1 * libfdisk1-2.36.2-150300.4.38.1 * libmount1-2.36.2-150300.4.38.1 * libuuid1-2.36.2-150300.4.38.1 * libblkid1-debuginfo-2.36.2-150300.4.38.1 * libmount1-debuginfo-2.36.2-150300.4.38.1 * util-linux-2.36.2-150300.4.38.1 * libsmartcols1-2.36.2-150300.4.38.1 * libsmartcols1-debuginfo-2.36.2-150300.4.38.1 * libblkid1-2.36.2-150300.4.38.1 * util-linux-debuginfo-2.36.2-150300.4.38.1 * util-linux-debugsource-2.36.2-150300.4.38.1 * libuuid1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-2.36.2-150300.4.38.1 * libfdisk1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-debuginfo-2.36.2-150300.4.38.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * util-linux-systemd-debugsource-2.36.2-150300.4.38.1 * libfdisk1-2.36.2-150300.4.38.1 * libmount1-2.36.2-150300.4.38.1 * libuuid1-2.36.2-150300.4.38.1 * libblkid1-debuginfo-2.36.2-150300.4.38.1 * libmount1-debuginfo-2.36.2-150300.4.38.1 * util-linux-2.36.2-150300.4.38.1 * libsmartcols1-2.36.2-150300.4.38.1 * libsmartcols1-debuginfo-2.36.2-150300.4.38.1 * libblkid1-2.36.2-150300.4.38.1 * util-linux-debuginfo-2.36.2-150300.4.38.1 * util-linux-debugsource-2.36.2-150300.4.38.1 * libuuid1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-2.36.2-150300.4.38.1 * libfdisk1-debuginfo-2.36.2-150300.4.38.1 * util-linux-systemd-debuginfo-2.36.2-150300.4.38.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1207987 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 19 08:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 19 Jan 2024 08:30:05 -0000 Subject: SUSE-RU-2024:0163-1: moderate: Recommended update for google-guice Message-ID: <170565300579.11120.1029974570494554225@smelt2.prg2.suse.org> # Recommended update for google-guice Announcement ID: SUSE-RU-2024:0163-1 Rating: moderate References: Affected Products: * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that can now be installed. ## Description: This update for google-guice fixes the following issues: * google-guice was updated from version 4.1 to 5.1.0: * Changes of version 4.2: * Added Java 9 and JPMS support * Multibindings are now in the Guice core artifact. The multibindings artifact is empty to prevent confusion during upgrading and will be removed in a later release. * Improved the performance of guice provisioning (by about 20%) by changing the way errors are reported. Guice will no longer report multiple errors during provisioning (Guice still reports multiple errors during injector creation). * Improved error messages for a missing binding. * AbstractModule.configure() is non-abstract to allow modules with only @Provides/@ProvidesIntoSet/... methods. * Added a CheckedProviders class. * Changed the way Singletons work to not rely on ThreadLocals nor WeakReferences. * Added MapBinderBinding.getEntries(Iterable). * Deprecated ProvisionListener.ProvisionInvocation .getDependencyChain(). * Ensure that Struts interceptors are populated even if they are created after the injector (Fixes #1081, #1075). * Added support for multibindings with annotations in the Guice DaggerMethodScanner. * Changes of version 4.2.1: * Added Java 10 support (updated cglib & asm). * Minor updates to the testlib extension. * Changes of version 4.2.2: * Added Java 11 support (updated cglib & asm) * Changes of version 4.2.3: * Added Java 14 support (updated asm). * Added Injector.getElements API, to expose all Element SPI types from the Injector. * Added Injector.getAllMembersInjectorInjectionPoints API, to expose injection points created by arbitrary members injection. * Added getAlternateKeys to Multibinder SPI types (MultibinderBinding, MapBinderBinding, OptionalBinderBinding), to explicitly list the other keys these bindings are available as. * Scan for (and bind) @Provides-like methods in a consistent ordering, rather than relying on the non-deterministic Class.getDeclaredMembers ordering. * Updated DaggerAdapter to work with newer dagger code. * Fixed a subtle bug with eager singleton evaluation. * Updated @RequestScope's scope annotation to the JSR330 @Scope, so it can be reused by non-Guice DI systems. * Clarified the error message when an injectable constructor is missing. * Added deprecated overloads to various Modules methods, to make it clearer when calling them is unnecessary. * Added factory methods to Modules for common Binder configuration methods, to make it easier to configure them. * Changes of version 5.0.1: * Added Java 15 support (updated asm and bug fixes). * Removed cglib as a core dependency. * Improved error messages. * Improved support for using Guice with Kotlin. * Added a mechanism to restrict who can bind types or annotations, to allow library authors to control their bindings. * Removed no-aop build variant. * Fixed 'illegal reflective access' warnings. * Changes of version 5.1.0: * Added support for Java 17. * Generate the ant build system using the maven pom files. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-163=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-163=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-163=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-163=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2024-163=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-163=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-163=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-163=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-163=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-163=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-163=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-163=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * google-guice-5.1.0-150200.3.7.1 * SUSE Enterprise Storage 7.1 (noarch) * google-guice-5.1.0-150200.3.7.1 * openSUSE Leap 15.4 (noarch) * guice-extensions-5.1.0-150200.3.7.1 * guice-bom-5.1.0-150200.3.7.1 * guice-grapher-5.1.0-150200.3.7.1 * guice-servlet-5.1.0-150200.3.7.1 * guice-throwingproviders-5.1.0-150200.3.7.1 * guice-parent-5.1.0-150200.3.7.1 * guice-assistedinject-5.1.0-150200.3.7.1 * google-guice-5.1.0-150200.3.7.1 * guice-jndi-5.1.0-150200.3.7.1 * guice-jmx-5.1.0-150200.3.7.1 * google-guice-javadoc-5.1.0-150200.3.7.1 * openSUSE Leap 15.5 (noarch) * guice-extensions-5.1.0-150200.3.7.1 * guice-bom-5.1.0-150200.3.7.1 * guice-grapher-5.1.0-150200.3.7.1 * guice-servlet-5.1.0-150200.3.7.1 * guice-throwingproviders-5.1.0-150200.3.7.1 * guice-parent-5.1.0-150200.3.7.1 * guice-assistedinject-5.1.0-150200.3.7.1 * google-guice-5.1.0-150200.3.7.1 * guice-jndi-5.1.0-150200.3.7.1 * guice-jmx-5.1.0-150200.3.7.1 * google-guice-javadoc-5.1.0-150200.3.7.1 * Development Tools Module 15-SP4 (noarch) * google-guice-5.1.0-150200.3.7.1 * Development Tools Module 15-SP5 (noarch) * google-guice-5.1.0-150200.3.7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * google-guice-5.1.0-150200.3.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * google-guice-5.1.0-150200.3.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * google-guice-5.1.0-150200.3.7.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * google-guice-5.1.0-150200.3.7.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * google-guice-5.1.0-150200.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * google-guice-5.1.0-150200.3.7.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 19 08:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 19 Jan 2024 08:30:07 -0000 Subject: SUSE-RU-2024:0162-1: moderate: Recommended update for eclipse-jgit Message-ID: <170565300715.11120.5981624661994940272@smelt2.prg2.suse.org> # Recommended update for eclipse-jgit Announcement ID: SUSE-RU-2024:0162-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.5 An update that can now be installed. ## Description: This update for eclipse-jgit fixes the following issues: * Increase `apache-sshd` version span to resolve build issues ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-162=1 ## Package List: * openSUSE Leap 15.5 (noarch) * eclipse-jgit-5.11.0-150200.3.20.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 19 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 19 Jan 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0165-1: important: Security update for xwayland Message-ID: <170566740338.4901.6515734018695294784@smelt2.prg2.suse.org> # Security update for xwayland Announcement ID: SUSE-SU-2024:0165-1 Rating: important References: * bsc#1218582 * bsc#1218583 * bsc#1218584 * bsc#1218585 * bsc#1218845 * bsc#1218846 Cross-References: * CVE-2023-6816 * CVE-2024-0229 * CVE-2024-0408 * CVE-2024-0409 * CVE-2024-21885 * CVE-2024-21886 CVSS scores: * CVE-2023-6816 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0229 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-0409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-21885 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21886 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 An update that solves six vulnerabilities can now be installed. ## Description: This update for xwayland fixes the following issues: * CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582) * CVE-2024-0229: Fixed reattaching to different master device may lead to out- of-bounds memory access (bsc#1218583) * CVE-2024-0408: Fixed SELinux unlabeled GLX PBuffer. (bsc#1218845) * CVE-2024-0409: Fixed SELinux context corruption. (bsc#1218846) * CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584) * CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-165=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-165=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * xwayland-21.1.4-150400.3.31.1 * xwayland-debuginfo-21.1.4-150400.3.31.1 * xwayland-devel-21.1.4-150400.3.31.1 * xwayland-debugsource-21.1.4-150400.3.31.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * xwayland-21.1.4-150400.3.31.1 * xwayland-debuginfo-21.1.4-150400.3.31.1 * xwayland-debugsource-21.1.4-150400.3.31.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6816.html * https://www.suse.com/security/cve/CVE-2024-0229.html * https://www.suse.com/security/cve/CVE-2024-0408.html * https://www.suse.com/security/cve/CVE-2024-0409.html * https://www.suse.com/security/cve/CVE-2024-21885.html * https://www.suse.com/security/cve/CVE-2024-21886.html * https://bugzilla.suse.com/show_bug.cgi?id=1218582 * https://bugzilla.suse.com/show_bug.cgi?id=1218583 * https://bugzilla.suse.com/show_bug.cgi?id=1218584 * https://bugzilla.suse.com/show_bug.cgi?id=1218585 * https://bugzilla.suse.com/show_bug.cgi?id=1218845 * https://bugzilla.suse.com/show_bug.cgi?id=1218846 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 19 16:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 19 Jan 2024 16:30:01 -0000 Subject: SUSE-SU-2024:0168-1: moderate: Security update for python-aiohttp Message-ID: <170568180191.29233.12561036392136469407@smelt2.prg2.suse.org> # Security update for python-aiohttp Announcement ID: SUSE-SU-2024:0168-1 Rating: moderate References: * bsc#1217682 Cross-References: * CVE-2023-49082 CVSS scores: * CVE-2023-49082 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49082 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-aiohttp fixes the following issues: Updated to version 3.8.6: * CVE-2023-49082: Fixed an HTTP header injection via a crafted method (bsc#1217682). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-168=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-168=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-168=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python311-aiohttp-debuginfo-3.8.6-150400.10.11.1 * python-aiohttp-debugsource-3.8.6-150400.10.11.1 * python311-aiohttp-3.8.6-150400.10.11.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python311-aiohttp-debuginfo-3.8.6-150400.10.11.1 * python-aiohttp-debugsource-3.8.6-150400.10.11.1 * python311-aiohttp-3.8.6-150400.10.11.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-aiohttp-debuginfo-3.8.6-150400.10.11.1 * python-aiohttp-debugsource-3.8.6-150400.10.11.1 * python311-aiohttp-3.8.6-150400.10.11.1 ## References: * https://www.suse.com/security/cve/CVE-2023-49082.html * https://bugzilla.suse.com/show_bug.cgi?id=1217682 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 19 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 19 Jan 2024 16:30:04 -0000 Subject: SUSE-SU-2024:0167-1: important: Security update for bluez Message-ID: <170568180411.29233.12264676716536456354@smelt2.prg2.suse.org> # Security update for bluez Announcement ID: SUSE-SU-2024:0167-1 Rating: important References: * bsc#1192760 * bsc#1218300 * bsc#1218301 Cross-References: * CVE-2021-41229 * CVE-2023-50229 * CVE-2023-50230 CVSS scores: * CVE-2021-41229 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2021-41229 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50229 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-50230 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves three vulnerabilities can now be installed. ## Description: This update for bluez fixes the following issues: * CVE-2021-41229: Fix leaking buffers stored in cstates cache (bsc#1192760). * CVE-2023-50229: Fixed an out of bounds write in the primary version counter for the Phone Book Access Profile implementation (bsc#1218300). * CVE-2023-50230: Fixed an out of bounds write in the secondary version counter for the Phone Book Access Profile implementation (bsc#1218301). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-167=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-167=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-167=1 ## Package List: * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * bluez-5.48-150200.13.30.1 * bluez-debuginfo-5.48-150200.13.30.1 * libbluetooth3-5.48-150200.13.30.1 * libbluetooth3-debuginfo-5.48-150200.13.30.1 * bluez-debugsource-5.48-150200.13.30.1 * bluez-devel-5.48-150200.13.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * bluez-5.48-150200.13.30.1 * bluez-debuginfo-5.48-150200.13.30.1 * libbluetooth3-5.48-150200.13.30.1 * libbluetooth3-debuginfo-5.48-150200.13.30.1 * bluez-debugsource-5.48-150200.13.30.1 * bluez-devel-5.48-150200.13.30.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * bluez-5.48-150200.13.30.1 * bluez-debuginfo-5.48-150200.13.30.1 * libbluetooth3-5.48-150200.13.30.1 * libbluetooth3-debuginfo-5.48-150200.13.30.1 * bluez-debugsource-5.48-150200.13.30.1 * bluez-devel-5.48-150200.13.30.1 ## References: * https://www.suse.com/security/cve/CVE-2021-41229.html * https://www.suse.com/security/cve/CVE-2023-50229.html * https://www.suse.com/security/cve/CVE-2023-50230.html * https://bugzilla.suse.com/show_bug.cgi?id=1192760 * https://bugzilla.suse.com/show_bug.cgi?id=1218300 * https://bugzilla.suse.com/show_bug.cgi?id=1218301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 19 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 19 Jan 2024 16:30:06 -0000 Subject: SUSE-SU-2024:0166-1: important: Security update for bluez Message-ID: <170568180600.29233.18080965583557492172@smelt2.prg2.suse.org> # Security update for bluez Announcement ID: SUSE-SU-2024:0166-1 Rating: important References: * bsc#1192760 * bsc#1218300 * bsc#1218301 Cross-References: * CVE-2021-41229 * CVE-2023-50229 * CVE-2023-50230 CVSS scores: * CVE-2021-41229 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2021-41229 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50229 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-50230 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE CaaS Platform 4.0 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 An update that solves three vulnerabilities can now be installed. ## Description: This update for bluez fixes the following issues: * CVE-2021-41229: Fix leaking buffers stored in cstates cache (bsc#1192760). * CVE-2023-50229: Fixed an out of bounds write in the primary version counter for the Phone Book Access Profile implementation (bsc#1218300). * CVE-2023-50230: Fixed an out of bounds write in the secondary version counter for the Phone Book Access Profile implementation (bsc#1218301). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-166=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-166=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-166=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * bluez-devel-5.48-150000.5.54.1 * libbluetooth3-debuginfo-5.48-150000.5.54.1 * bluez-5.48-150000.5.54.1 * libbluetooth3-5.48-150000.5.54.1 * bluez-debuginfo-5.48-150000.5.54.1 * bluez-debugsource-5.48-150000.5.54.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * bluez-devel-5.48-150000.5.54.1 * libbluetooth3-debuginfo-5.48-150000.5.54.1 * bluez-5.48-150000.5.54.1 * libbluetooth3-5.48-150000.5.54.1 * bluez-debuginfo-5.48-150000.5.54.1 * bluez-debugsource-5.48-150000.5.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * bluez-devel-5.48-150000.5.54.1 * libbluetooth3-debuginfo-5.48-150000.5.54.1 * bluez-5.48-150000.5.54.1 * libbluetooth3-5.48-150000.5.54.1 * bluez-debuginfo-5.48-150000.5.54.1 * bluez-debugsource-5.48-150000.5.54.1 * SUSE CaaS Platform 4.0 (x86_64) * bluez-devel-5.48-150000.5.54.1 * libbluetooth3-debuginfo-5.48-150000.5.54.1 * bluez-5.48-150000.5.54.1 * libbluetooth3-5.48-150000.5.54.1 * bluez-debuginfo-5.48-150000.5.54.1 * bluez-debugsource-5.48-150000.5.54.1 ## References: * https://www.suse.com/security/cve/CVE-2021-41229.html * https://www.suse.com/security/cve/CVE-2023-50229.html * https://www.suse.com/security/cve/CVE-2023-50230.html * https://bugzilla.suse.com/show_bug.cgi?id=1192760 * https://bugzilla.suse.com/show_bug.cgi?id=1218300 * https://bugzilla.suse.com/show_bug.cgi?id=1218301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Sat Jan 20 08:01:46 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:01:46 +0100 (CET) Subject: SUSE-CU-2024:267-1: Security update of suse/sle-micro/5.5/toolbox Message-ID: <20240120080146.0D683FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:267-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.138 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.138 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:03:10 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:03:10 +0100 (CET) Subject: SUSE-CU-2024:268-1: Security update of suse/sles12sp5 Message-ID: <20240120080310.0DAFAFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sles12sp5 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:268-1 Container Tags : suse/sles12sp5:6.5.556 , suse/sles12sp5:latest Container Release : 6.5.556 Severity : moderate Type : security References : 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sles12sp5 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:137-1 Released: Thu Jan 18 09:55:34 2024 Summary: Security update for pam Type: security Severity: moderate References: 1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). The following package changes have been done: - pam-1.1.8-24.56.1 updated From sle-updates at lists.suse.com Sat Jan 20 08:03:33 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:03:33 +0100 (CET) Subject: SUSE-CU-2024:269-1: Recommended update of suse/ltss/sle15.3/sle15 Message-ID: <20240120080333.BCE7AFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.3/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:269-1 Container Tags : suse/ltss/sle15.3/bci-base:15.3 , suse/ltss/sle15.3/bci-base:15.3.3.43 , suse/ltss/sle15.3/sle15:15.3 , suse/ltss/sle15.3/sle15:15.3.3.43 Container Release : 3.43 Severity : important Type : recommended References : 1207987 ----------------------------------------------------------------- The container suse/ltss/sle15.3/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:164-1 Released: Fri Jan 19 05:47:58 2024 Summary: Recommended update for util-linux Type: recommended Severity: important References: 1207987 This update for util-linux fixes the following issues: - Instead of explicitly truncating clocks.txt file, pad with whitespaces in the end of file. This is done to improve performance of libuuid on xfs. (bsc#1207987) The following package changes have been done: - libblkid1-2.36.2-150300.4.38.1 updated - libfdisk1-2.36.2-150300.4.38.1 updated - libmount1-2.36.2-150300.4.38.1 updated - libsmartcols1-2.36.2-150300.4.38.1 updated - libuuid1-2.36.2-150300.4.38.1 updated - util-linux-2.36.2-150300.4.38.1 updated From sle-updates at lists.suse.com Sat Jan 20 08:03:50 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:03:50 +0100 (CET) Subject: SUSE-CU-2024:270-1: Security update of suse/registry Message-ID: <20240120080350.15532FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/registry ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:270-1 Container Tags : suse/registry:2.8 , suse/registry:2.8-18.4 , suse/registry:latest Container Release : 18.4 Severity : moderate Type : security References : 1217000 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/registry was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) The following package changes have been done: - pam-1.3.0-150000.6.66.1 updated - container:micro-image-15.5.0-15.1 updated From sle-updates at lists.suse.com Sat Jan 20 08:04:02 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:04:02 +0100 (CET) Subject: SUSE-CU-2024:271-1: Security update of suse/nginx Message-ID: <20240120080402.7EB73FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/nginx ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:271-1 Container Tags : suse/nginx:1.21 , suse/nginx:1.21-9.4 , suse/nginx:latest Container Release : 9.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/nginx was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:04:20 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:04:20 +0100 (CET) Subject: SUSE-CU-2024:272-1: Security update of bci/nodejs Message-ID: <20240120080420.7B671FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:272-1 Container Tags : bci/node:18 , bci/node:18-15.4 , bci/nodejs:18 , bci/nodejs:18-15.4 Container Release : 15.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:05:04 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:05:04 +0100 (CET) Subject: SUSE-CU-2024:274-1: Security update of bci/openjdk-devel Message-ID: <20240120080504.85B60FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:274-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-15.10 , bci/openjdk-devel:latest Container Release : 15.10 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - google-guice-5.1.0-150200.3.7.1 updated - container:bci-openjdk-17-15.5.17-15.3 updated From sle-updates at lists.suse.com Sat Jan 20 08:05:26 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:05:26 +0100 (CET) Subject: SUSE-CU-2024:275-1: Security update of suse/pcp Message-ID: <20240120080526.E6860FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/pcp ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:275-1 Container Tags : suse/pcp:5 , suse/pcp:5-21.5 , suse/pcp:5.2 , suse/pcp:5.2-21.5 , suse/pcp:5.2.5 , suse/pcp:5.2.5-21.5 , suse/pcp:latest Container Release : 21.5 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/pcp was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:bci-bci-init-15.5-15.5-13.4 updated From sle-updates at lists.suse.com Sat Jan 20 08:05:45 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:05:45 +0100 (CET) Subject: SUSE-CU-2024:276-1: Security update of bci/php-apache Message-ID: <20240120080545.0F322FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/php-apache ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:276-1 Container Tags : bci/php-apache:8 , bci/php-apache:8-11.3 Container Release : 11.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/php-apache was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:06:01 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:01 +0100 (CET) Subject: SUSE-CU-2024:277-1: Security update of bci/php Message-ID: <20240120080601.DE729FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/php ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:277-1 Container Tags : bci/php:8 , bci/php:8-11.3 Container Release : 11.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/php was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:06:17 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:17 +0100 (CET) Subject: SUSE-CU-2024:278-1: Security update of suse/postgres Message-ID: <20240120080617.25071FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:278-1 Container Tags : suse/postgres:15 , suse/postgres:15-16.3 , suse/postgres:15.5 , suse/postgres:15.5-16.3 Container Release : 16.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:06:21 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:21 +0100 (CET) Subject: SUSE-CU-2024:279-1: Security update of suse/postgres Message-ID: <20240120080621.783EFFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:279-1 Container Tags : suse/postgres:16 , suse/postgres:16-5.3 , suse/postgres:16.1 , suse/postgres:16.1-5.3 , suse/postgres:latest Container Release : 5.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:06:38 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:38 +0100 (CET) Subject: SUSE-CU-2024:280-1: Security update of bci/python Message-ID: <20240120080638.48A7BFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:280-1 Container Tags : bci/python:3 , bci/python:3-16.3 , bci/python:3.11 , bci/python:3.11-16.3 , bci/python:latest Container Release : 16.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:06:59 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:59 +0100 (CET) Subject: SUSE-CU-2024:281-1: Security update of bci/python Message-ID: <20240120080659.446FCFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:281-1 Container Tags : bci/python:3 , bci/python:3-17.3 , bci/python:3.6 , bci/python:3.6-17.3 Container Release : 17.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:07:01 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:07:01 +0100 (CET) Subject: SUSE-CU-2024:282-1: Security update of suse/rmt-mariadb-client Message-ID: <20240120080701.0B3D9FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb-client ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:282-1 Container Tags : suse/mariadb-client:10.6 , suse/mariadb-client:10.6-14.3 , suse/mariadb-client:latest , suse/rmt-mariadb-client:10.6 , suse/rmt-mariadb-client:10.6-14.3 , suse/rmt-mariadb-client:latest Container Release : 14.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/rmt-mariadb-client was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:07:03 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:07:03 +0100 (CET) Subject: SUSE-CU-2024:266-1: Security update of suse/rmt-mariadb Message-ID: <20240120080703.AB8BDFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:266-1 Container Tags : suse/mariadb:10.6 , suse/mariadb:10.6-17.3 , suse/mariadb:latest , suse/rmt-mariadb:10.6 , suse/rmt-mariadb:10.6-17.3 , suse/rmt-mariadb:latest Container Release : 17.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/rmt-mariadb was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:07:26 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:07:26 +0100 (CET) Subject: SUSE-CU-2024:283-1: Security update of bci/ruby Message-ID: <20240120080726.AC50FFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/ruby ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:283-1 Container Tags : bci/ruby:2 , bci/ruby:2-15.3 , bci/ruby:2.5 , bci/ruby:2.5-15.3 , bci/ruby:latest Container Release : 15.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/ruby was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:07:44 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:07:44 +0100 (CET) Subject: SUSE-CU-2024:284-1: Security update of bci/rust Message-ID: <20240120080744.850FCFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:284-1 Container Tags : bci/rust:1.74 , bci/rust:1.74-2.3.3 , bci/rust:oldstable , bci/rust:oldstable-2.3.3 Container Release : 3.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:08:02 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:08:02 +0100 (CET) Subject: SUSE-CU-2024:285-1: Security update of bci/rust Message-ID: <20240120080802.F2732FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:285-1 Container Tags : bci/rust:1.75 , bci/rust:1.75-1.3.3 , bci/rust:latest , bci/rust:stable , bci/rust:stable-1.3.3 Container Release : 3.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:08:05 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:08:05 +0100 (CET) Subject: SUSE-CU-2024:286-1: Security update of bci/bci-sle15-kernel-module-devel Message-ID: <20240120080805.EB070FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:286-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.5.4 , bci/bci-sle15-kernel-module-devel:latest Container Release : 5.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - kernel-macros-5.14.21-150500.55.44.1 updated - kernel-devel-5.14.21-150500.55.44.1 updated - kernel-default-devel-5.14.21-150500.55.44.1 updated - kernel-syms-5.14.21-150500.55.44.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-updates at lists.suse.com Sat Jan 20 08:08:21 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:08:21 +0100 (CET) Subject: SUSE-CU-2024:287-1: Security update of suse/sle15 Message-ID: <20240120080821.676FEFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:287-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.74 , suse/sle15:15.5 , suse/sle15:15.5.36.5.74 Container Release : 36.5.74 Severity : important Type : security References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-updates at lists.suse.com Sun Jan 21 08:03:51 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:03:51 +0100 (CET) Subject: SUSE-CU-2024:288-1: Security update of suse/sle15 Message-ID: <20240121080351.78404FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:288-1 Container Tags : suse/sle15:15.1 , suse/sle15:15.1.6.2.866 Container Release : 6.2.866 Severity : moderate Type : security References : 1212475 1217000 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-updates at lists.suse.com Sun Jan 21 08:05:28 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:05:28 +0100 (CET) Subject: SUSE-CU-2024:289-1: Security update of suse/sle15 Message-ID: <20240121080528.2C725FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:289-1 Container Tags : suse/sle15:15.2 , suse/sle15:15.2.9.5.395 Container Release : 9.5.395 Severity : moderate Type : security References : 1212475 1217000 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-updates at lists.suse.com Sun Jan 21 08:05:52 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:05:52 +0100 (CET) Subject: SUSE-CU-2024:287-1: Security update of suse/sle15 Message-ID: <20240121080552.37AE4FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:287-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.74 , suse/sle15:15.5 , suse/sle15:15.5.36.5.74 Container Release : 36.5.74 Severity : important Type : security References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-updates at lists.suse.com Sun Jan 21 08:07:37 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:07:37 +0100 (CET) Subject: SUSE-CU-2024:295-1: Recommended update of suse/sle-micro/5.1/toolbox Message-ID: <20240121080737.C8AB2FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.1/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:295-1 Container Tags : suse/sle-micro/5.1/toolbox:12.1 , suse/sle-micro/5.1/toolbox:12.1-2.2.530 , suse/sle-micro/5.1/toolbox:latest Container Release : 2.2.530 Severity : important Type : recommended References : 1207987 ----------------------------------------------------------------- The container suse/sle-micro/5.1/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:164-1 Released: Fri Jan 19 05:47:58 2024 Summary: Recommended update for util-linux Type: recommended Severity: important References: 1207987 This update for util-linux fixes the following issues: - Instead of explicitly truncating clocks.txt file, pad with whitespaces in the end of file. This is done to improve performance of libuuid on xfs. (bsc#1207987) The following package changes have been done: - util-linux-systemd-2.36.2-150300.4.38.1 updated From sle-updates at lists.suse.com Sun Jan 21 08:09:32 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:09:32 +0100 (CET) Subject: SUSE-CU-2024:298-1: Recommended update of suse/sle-micro/5.2/toolbox Message-ID: <20240121080932.A08B1FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.2/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:298-1 Container Tags : suse/sle-micro/5.2/toolbox:12.1 , suse/sle-micro/5.2/toolbox:12.1-6.2.352 , suse/sle-micro/5.2/toolbox:latest Container Release : 6.2.352 Severity : important Type : recommended References : 1207987 ----------------------------------------------------------------- The container suse/sle-micro/5.2/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:164-1 Released: Fri Jan 19 05:47:58 2024 Summary: Recommended update for util-linux Type: recommended Severity: important References: 1207987 This update for util-linux fixes the following issues: - Instead of explicitly truncating clocks.txt file, pad with whitespaces in the end of file. This is done to improve performance of libuuid on xfs. (bsc#1207987) The following package changes have been done: - util-linux-systemd-2.36.2-150300.4.38.1 updated From null at suse.de Mon Jan 22 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 22 Jan 2024 08:30:02 -0000 Subject: SUSE-RU-2024:0169-1: moderate: Recommended update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed Message-ID: <170591220275.31972.16752521899344801870@smelt2.prg2.suse.org> # Recommended update for kernel-firmware-nvidia-gspx-G06, nvidia-open- driver-G06-signed Announcement ID: SUSE-RU-2024:0169-1 Rating: moderate References: * bsc#1215981 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed fixes the following issues: Changes in nvidia-open-driver-G06-signed: * Update to 545.29.06 * no longer try to overwrite NVreg_OpenRmEnableUnsupportedGpus driver NVreg_OpenRmEnableUnsupportedGpus driver option setting (disable it), Changes in kernel-firmware-nvidia-gspx-G06: * update firmware to version 545.29.06 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-169=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-169=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-169=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-169=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-169=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-169=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-169=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-169=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-169=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-169=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-169=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-169=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-169=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-169=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-169=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-default-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Manager Server 4.3 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * SUSE Manager Server 4.3 (x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-default-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * openSUSE Leap 15.4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * openSUSE Leap 15.4 (x86_64) * nvidia-open-driver-G06-signed-azure-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-azure-debuginfo-545.29.06_k5.14.21_150400.14.75-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-azure-545.29.06_k5.14.21_150400.14.75-150400.9.35.2 * openSUSE Leap 15.4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-default-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * openSUSE Leap 15.4 (aarch64) * nvidia-open-driver-G06-signed-64kb-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-64kb-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * Basesystem Module 15-SP5 (aarch64 nosrc) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * Public Cloud Module 15-SP4 (x86_64) * nvidia-open-driver-G06-signed-azure-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-azure-debuginfo-545.29.06_k5.14.21_150400.14.75-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-azure-545.29.06_k5.14.21_150400.14.75-150400.9.35.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * nvidia-open-driver-G06-signed-64kb-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-64kb-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-default-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * nvidia-open-driver-G06-signed-64kb-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-64kb-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-default-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-default-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * nvidia-open-driver-G06-signed-64kb-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-64kb-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-default-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-default-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-545.29.06-150400.9.18.1 * SUSE Manager Proxy 4.3 (x86_64) * nvidia-open-driver-G06-signed-debugsource-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 * nvidia-open-driver-G06-signed-default-devel-545.29.06-150400.9.35.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-545.29.06_k5.14.21_150400.24.100-150400.9.35.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215981 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 22 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 22 Jan 2024 16:30:02 -0000 Subject: SUSE-RU-2024:0171-1: important: Recommended update for ca-certificates Message-ID: <170594100227.17155.10411734618317924820@smelt2.prg2.suse.org> # Recommended update for ca-certificates Announcement ID: SUSE-RU-2024:0171-1 Rating: important References: * bsc#1216685 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for ca-certificates fixes the following issues: * Invoke trust with the --overwrite option when running update-ca-certificates (bsc#1216685) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-171=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-171=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-171=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * ca-certificates-1_201403302107-15.9.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * ca-certificates-1_201403302107-15.9.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * ca-certificates-1_201403302107-15.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1216685 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 22 20:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 22 Jan 2024 20:30:03 -0000 Subject: SUSE-SU-2024:0172-1: moderate: Security update for openssl-3 Message-ID: <170595540338.8454.12111709010770743858@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2024:0172-1 Rating: moderate References: * bsc#1218690 * bsc#1218810 Cross-References: * CVE-2023-6129 * CVE-2023-6237 CVSS scores: * CVE-2023-6129 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2023-6237 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2023-6129: Fixed vector register clobbering on PowerPC. (bsc#1218690) * CVE-2023-6237: Fixed excessive time spent checking invalid RSA public keys. (bsc#1218810) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-172=1 openSUSE-SLE-15.5-2024-172=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-172=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * openssl-3-debuginfo-3.0.8-150500.5.24.1 * libopenssl3-3.0.8-150500.5.24.1 * openssl-3-debugsource-3.0.8-150500.5.24.1 * libopenssl3-debuginfo-3.0.8-150500.5.24.1 * libopenssl-3-devel-3.0.8-150500.5.24.1 * openssl-3-3.0.8-150500.5.24.1 * openSUSE Leap 15.5 (x86_64) * libopenssl3-32bit-3.0.8-150500.5.24.1 * libopenssl3-32bit-debuginfo-3.0.8-150500.5.24.1 * libopenssl-3-devel-32bit-3.0.8-150500.5.24.1 * openSUSE Leap 15.5 (noarch) * openssl-3-doc-3.0.8-150500.5.24.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libopenssl-3-devel-64bit-3.0.8-150500.5.24.1 * libopenssl3-64bit-3.0.8-150500.5.24.1 * libopenssl3-64bit-debuginfo-3.0.8-150500.5.24.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * openssl-3-debuginfo-3.0.8-150500.5.24.1 * libopenssl3-3.0.8-150500.5.24.1 * openssl-3-debugsource-3.0.8-150500.5.24.1 * libopenssl3-debuginfo-3.0.8-150500.5.24.1 * libopenssl-3-devel-3.0.8-150500.5.24.1 * openssl-3-3.0.8-150500.5.24.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6129.html * https://www.suse.com/security/cve/CVE-2023-6237.html * https://bugzilla.suse.com/show_bug.cgi?id=1218690 * https://bugzilla.suse.com/show_bug.cgi?id=1218810 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-updates at lists.suse.com Tue Jan 23 08:03:03 2024 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 23 Jan 2024 09:03:03 +0100 (CET) Subject: SUSE-CU-2024:299-1: Recommended update of suse/sles12sp5 Message-ID: <20240123080303.02526FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sles12sp5 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:299-1 Container Tags : suse/sles12sp5:6.5.557 , suse/sles12sp5:latest Container Release : 6.5.557 Severity : important Type : recommended References : 1216685 ----------------------------------------------------------------- The container suse/sles12sp5 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:171-1 Released: Mon Jan 22 15:19:39 2024 Summary: Recommended update for ca-certificates Type: recommended Severity: important References: 1216685 This update for ca-certificates fixes the following issues: - Invoke trust with the --overwrite option when running update-ca-certificates (bsc#1216685) The following package changes have been done: - ca-certificates-1_201403302107-15.9.1 updated From null at suse.de Tue Jan 23 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 08:30:03 -0000 Subject: SUSE-RU-2024:0176-1: critical: Recommended update for suseconnect-ng Message-ID: <170599860342.3225.9746571055411033331@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0176-1 Rating: critical References: * bsc#1217961 * bsc#1218649 Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that has two fixes can now be installed. ## Description: This update for suseconnect-ng contains the following fix: * Update to version 1.6.0: * Disable EULA display for addons. (bsc#1218649 and bsc#1217961) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-176=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-176=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * suseconnect-ng-1.6.0~git0.31371c8-150300.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * suseconnect-ng-1.6.0~git0.31371c8-150300.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217961 * https://bugzilla.suse.com/show_bug.cgi?id=1218649 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 08:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 08:30:04 -0000 Subject: SUSE-RU-2024:0175-1: critical: Recommended update for suseconnect-ng Message-ID: <170599860490.3225.538016253182347085@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0175-1 Rating: critical References: * bsc#1217961 * bsc#1218649 Affected Products: * SUSE Linux Enterprise Micro 5.1 An update that has two fixes can now be installed. ## Description: This update for suseconnect-ng contains the following fix: * Update to version 1.6.0 * Disable EULA display for addons. (bsc#1218649 and bsc#1217961) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-175=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * suseconnect-ng-1.6.0~git0.31371c8-150300.3.11.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217961 * https://bugzilla.suse.com/show_bug.cgi?id=1218649 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 08:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 08:30:06 -0000 Subject: SUSE-RU-2024:0174-1: critical: Recommended update for suseconnect-ng Message-ID: <170599860661.3225.13467962646563886348@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0174-1 Rating: critical References: * bsc#1217961 * bsc#1218364 * bsc#1218649 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has three fixes can now be installed. ## Description: This update for suseconnect-ng contains the following fixes: * Update to version 1.6.0: * Disable EULA display for addons. (bsc#1218649 and bsc#1217961) * Update to version 1.5.0: * Configure docker credentials for registry authentication * Feature: Support usage from Agama + Cockpit for ALP Micro system registration. (bsc#1218364) * Add --json output option ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-174=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-174=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-174=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * suseconnect-ng-debuginfo-1.6.0~git0.31371c8-3.6.1 * suseconnect-ruby-bindings-1.6.0~git0.31371c8-3.6.1 * suseconnect-ng-1.6.0~git0.31371c8-3.6.1 * libsuseconnect-1.6.0~git0.31371c8-3.6.1 * libsuseconnect-debuginfo-1.6.0~git0.31371c8-3.6.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.6.0~git0.31371c8-3.6.1 * suseconnect-ruby-bindings-1.6.0~git0.31371c8-3.6.1 * suseconnect-ng-1.6.0~git0.31371c8-3.6.1 * libsuseconnect-1.6.0~git0.31371c8-3.6.1 * libsuseconnect-debuginfo-1.6.0~git0.31371c8-3.6.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * suseconnect-ng-debuginfo-1.6.0~git0.31371c8-3.6.1 * suseconnect-ruby-bindings-1.6.0~git0.31371c8-3.6.1 * suseconnect-ng-1.6.0~git0.31371c8-3.6.1 * libsuseconnect-1.6.0~git0.31371c8-3.6.1 * libsuseconnect-debuginfo-1.6.0~git0.31371c8-3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217961 * https://bugzilla.suse.com/show_bug.cgi?id=1218364 * https://bugzilla.suse.com/show_bug.cgi?id=1218649 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 08:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 08:30:08 -0000 Subject: SUSE-RU-2024:0173-1: critical: Recommended update for suseconnect-ng Message-ID: <170599860812.3225.17442848952300842140@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0173-1 Rating: critical References: * bsc#1217961 * bsc#1218649 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for suseconnect-ng contains the following fix: * Update to version 1.6.0: * Disable EULA display for addons. (bsc#1218649 and bsc#1217961) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-173=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-173=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-173=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libsuseconnect-1.6.0~git0.31371c8-150500.3.12.1 * suseconnect-ng-1.6.0~git0.31371c8-150500.3.12.1 * suseconnect-ng-debuginfo-1.6.0~git0.31371c8-150500.3.12.1 * suseconnect-ruby-bindings-1.6.0~git0.31371c8-150500.3.12.1 * libsuseconnect-debuginfo-1.6.0~git0.31371c8-150500.3.12.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libsuseconnect-1.6.0~git0.31371c8-150500.3.12.1 * suseconnect-ng-1.6.0~git0.31371c8-150500.3.12.1 * suseconnect-ng-debuginfo-1.6.0~git0.31371c8-150500.3.12.1 * suseconnect-ruby-bindings-1.6.0~git0.31371c8-150500.3.12.1 * libsuseconnect-debuginfo-1.6.0~git0.31371c8-150500.3.12.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * suseconnect-ng-debuginfo-1.6.0~git0.31371c8-150500.3.12.1 * suseconnect-ng-1.6.0~git0.31371c8-150500.3.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217961 * https://bugzilla.suse.com/show_bug.cgi?id=1218649 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 12:30:02 -0000 Subject: SUSE-SU-2024:0183-1: important: Security update for bluez Message-ID: <170601300290.9926.15502154662455825784@smelt2.prg2.suse.org> # Security update for bluez Announcement ID: SUSE-SU-2024:0183-1 Rating: important References: * bsc#1218300 * bsc#1218301 Cross-References: * CVE-2023-50229 * CVE-2023-50230 CVSS scores: * CVE-2023-50229 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-50230 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for bluez fixes the following issues: * CVE-2023-50229: Fixed an out of bounds write in the primary version counter for the Phone Book Access Profile implementation (bsc#1218300). * CVE-2023-50230: Fixed an out of bounds write in the secondary version counter for the Phone Book Access Profile implementation (bsc#1218301). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-183=1 openSUSE-SLE-15.5-2024-183=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-183=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-183=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-183=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-183=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * bluez-cups-debuginfo-5.65-150500.3.6.1 * bluez-deprecated-5.65-150500.3.6.1 * bluez-devel-5.65-150500.3.6.1 * bluez-obexd-debuginfo-5.65-150500.3.6.1 * bluez-test-5.65-150500.3.6.1 * bluez-test-debuginfo-5.65-150500.3.6.1 * bluez-cups-5.65-150500.3.6.1 * libbluetooth3-debuginfo-5.65-150500.3.6.1 * bluez-obexd-5.65-150500.3.6.1 * bluez-debugsource-5.65-150500.3.6.1 * libbluetooth3-5.65-150500.3.6.1 * bluez-deprecated-debuginfo-5.65-150500.3.6.1 * bluez-5.65-150500.3.6.1 * bluez-debuginfo-5.65-150500.3.6.1 * openSUSE Leap 15.5 (noarch) * bluez-zsh-completion-5.65-150500.3.6.1 * bluez-auto-enable-devices-5.65-150500.3.6.1 * openSUSE Leap 15.5 (x86_64) * bluez-devel-32bit-5.65-150500.3.6.1 * libbluetooth3-32bit-debuginfo-5.65-150500.3.6.1 * libbluetooth3-32bit-5.65-150500.3.6.1 * openSUSE Leap 15.5 (aarch64_ilp32) * bluez-devel-64bit-5.65-150500.3.6.1 * libbluetooth3-64bit-5.65-150500.3.6.1 * libbluetooth3-64bit-debuginfo-5.65-150500.3.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libbluetooth3-debuginfo-5.65-150500.3.6.1 * bluez-debuginfo-5.65-150500.3.6.1 * libbluetooth3-5.65-150500.3.6.1 * bluez-debugsource-5.65-150500.3.6.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libbluetooth3-debuginfo-5.65-150500.3.6.1 * libbluetooth3-5.65-150500.3.6.1 * bluez-debugsource-5.65-150500.3.6.1 * bluez-5.65-150500.3.6.1 * bluez-debuginfo-5.65-150500.3.6.1 * Basesystem Module 15-SP5 (noarch) * bluez-zsh-completion-5.65-150500.3.6.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * bluez-devel-5.65-150500.3.6.1 * bluez-debuginfo-5.65-150500.3.6.1 * bluez-debugsource-5.65-150500.3.6.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * bluez-cups-5.65-150500.3.6.1 * bluez-debuginfo-5.65-150500.3.6.1 * bluez-cups-debuginfo-5.65-150500.3.6.1 * bluez-debugsource-5.65-150500.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50229.html * https://www.suse.com/security/cve/CVE-2023-50230.html * https://bugzilla.suse.com/show_bug.cgi?id=1218300 * https://bugzilla.suse.com/show_bug.cgi?id=1218301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 12:30:06 -0000 Subject: SUSE-SU-2024:0182-1: important: Security update for bluez Message-ID: <170601300604.9926.573221637167938340@smelt2.prg2.suse.org> # Security update for bluez Announcement ID: SUSE-SU-2024:0182-1 Rating: important References: * bsc#1218300 * bsc#1218301 Cross-References: * CVE-2023-50229 * CVE-2023-50230 CVSS scores: * CVE-2023-50229 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-50230 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for bluez fixes the following issues: * CVE-2023-50229: Fixed an out of bounds write in the primary version counter for the Phone Book Access Profile implementation (bsc#1218300). * CVE-2023-50230: Fixed an out of bounds write in the secondary version counter for the Phone Book Access Profile implementation (bsc#1218301). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-182=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-182=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-182=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-182=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-182=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * bluez-cups-5.55-150300.3.28.1 * libbluetooth3-5.55-150300.3.28.1 * bluez-devel-5.55-150300.3.28.1 * bluez-cups-debuginfo-5.55-150300.3.28.1 * bluez-deprecated-5.55-150300.3.28.1 * bluez-deprecated-debuginfo-5.55-150300.3.28.1 * libbluetooth3-debuginfo-5.55-150300.3.28.1 * bluez-test-debuginfo-5.55-150300.3.28.1 * bluez-debuginfo-5.55-150300.3.28.1 * bluez-5.55-150300.3.28.1 * bluez-test-5.55-150300.3.28.1 * bluez-debugsource-5.55-150300.3.28.1 * openSUSE Leap 15.3 (noarch) * bluez-auto-enable-devices-5.55-150300.3.28.1 * openSUSE Leap 15.3 (x86_64) * libbluetooth3-32bit-debuginfo-5.55-150300.3.28.1 * libbluetooth3-32bit-5.55-150300.3.28.1 * bluez-devel-32bit-5.55-150300.3.28.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libbluetooth3-64bit-5.55-150300.3.28.1 * libbluetooth3-64bit-debuginfo-5.55-150300.3.28.1 * bluez-devel-64bit-5.55-150300.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libbluetooth3-5.55-150300.3.28.1 * bluez-devel-5.55-150300.3.28.1 * bluez-deprecated-5.55-150300.3.28.1 * bluez-deprecated-debuginfo-5.55-150300.3.28.1 * libbluetooth3-debuginfo-5.55-150300.3.28.1 * bluez-debuginfo-5.55-150300.3.28.1 * bluez-5.55-150300.3.28.1 * bluez-debugsource-5.55-150300.3.28.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libbluetooth3-5.55-150300.3.28.1 * bluez-devel-5.55-150300.3.28.1 * bluez-deprecated-5.55-150300.3.28.1 * bluez-deprecated-debuginfo-5.55-150300.3.28.1 * libbluetooth3-debuginfo-5.55-150300.3.28.1 * bluez-debuginfo-5.55-150300.3.28.1 * bluez-5.55-150300.3.28.1 * bluez-debugsource-5.55-150300.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libbluetooth3-5.55-150300.3.28.1 * bluez-devel-5.55-150300.3.28.1 * bluez-deprecated-5.55-150300.3.28.1 * bluez-deprecated-debuginfo-5.55-150300.3.28.1 * libbluetooth3-debuginfo-5.55-150300.3.28.1 * bluez-debuginfo-5.55-150300.3.28.1 * bluez-5.55-150300.3.28.1 * bluez-debugsource-5.55-150300.3.28.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libbluetooth3-5.55-150300.3.28.1 * bluez-devel-5.55-150300.3.28.1 * bluez-deprecated-5.55-150300.3.28.1 * bluez-deprecated-debuginfo-5.55-150300.3.28.1 * libbluetooth3-debuginfo-5.55-150300.3.28.1 * bluez-debuginfo-5.55-150300.3.28.1 * bluez-5.55-150300.3.28.1 * bluez-debugsource-5.55-150300.3.28.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50229.html * https://www.suse.com/security/cve/CVE-2023-50230.html * https://bugzilla.suse.com/show_bug.cgi?id=1218300 * https://bugzilla.suse.com/show_bug.cgi?id=1218301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 12:30:08 -0000 Subject: SUSE-RU-2024:0181-1: moderate: Recommended update for systemd Message-ID: <170601300850.9926.9145105868336707551@smelt2.prg2.suse.org> # Recommended update for systemd Announcement ID: SUSE-RU-2024:0181-1 Rating: moderate References: * bsc#1211576 * bsc#1211725 * bsc#1212207 * bsc#1215241 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that has four fixes can now be installed. ## Description: This update for systemd fixes the following issues: * man: document that PAMName= and NotifyAccess=all don't mix well * man: add brief documentation for the (sd-pam) processes created due to PAMName= * service: accept the fact that the three xyz_good() functions return ints * service: drop _pure_ decorator on static function * service: a cgroup empty notification isn't reason enough to go down (bsc#1212207) * service: add explanatory comments to control_pid_good() and cgroup_good() * service: fix main_pid_good() comment * utmp-wtmp: handle EINTR gracefully when waiting to write to tty * utmp-wtmp: fix error in case isatty() fails * sd-netlink: handle EINTR from poll() gracefully, as success * stdio-bridge: don't be bothered with EINTR * sd-bus: handle -EINTR return from bus_poll() (bsc#1215241) * libsystemd: ignore both EINTR and EAGAIN * errno-util: introduce ERRNO_IS_TRANSIENT() * man/systemd-fsck at .service: clarify passno and noauto combination in /etc/fstab (bsc#1211725) * units/initrd-parse-etc.service: Conflict with emergency.target * umount: /usr/ should never be unmounted regardless of HAVE_SPLIT_USR or not (bsc#1211576) * core/mount: Don't unmount initramfs mounts * man: describe that changing Storage= does not move existing data ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-181=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-181=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-181=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-181=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libudev-devel-228-157.57.1 * systemd-devel-228-157.57.1 * systemd-debuginfo-228-157.57.1 * systemd-debugsource-228-157.57.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * systemd-228-157.57.1 * libsystemd0-debuginfo-228-157.57.1 * libudev-devel-228-157.57.1 * udev-228-157.57.1 * udev-debuginfo-228-157.57.1 * systemd-sysvinit-228-157.57.1 * libudev1-228-157.57.1 * systemd-debugsource-228-157.57.1 * libudev1-debuginfo-228-157.57.1 * libsystemd0-228-157.57.1 * systemd-debuginfo-228-157.57.1 * systemd-devel-228-157.57.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * systemd-bash-completion-228-157.57.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libudev1-32bit-228-157.57.1 * libsystemd0-32bit-228-157.57.1 * libsystemd0-debuginfo-32bit-228-157.57.1 * systemd-32bit-228-157.57.1 * systemd-debuginfo-32bit-228-157.57.1 * libudev1-debuginfo-32bit-228-157.57.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * systemd-228-157.57.1 * libsystemd0-debuginfo-228-157.57.1 * libudev-devel-228-157.57.1 * udev-228-157.57.1 * udev-debuginfo-228-157.57.1 * systemd-sysvinit-228-157.57.1 * libudev1-228-157.57.1 * systemd-debugsource-228-157.57.1 * libudev1-debuginfo-228-157.57.1 * libsystemd0-228-157.57.1 * systemd-debuginfo-228-157.57.1 * systemd-devel-228-157.57.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * systemd-bash-completion-228-157.57.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libudev1-32bit-228-157.57.1 * libsystemd0-32bit-228-157.57.1 * libsystemd0-debuginfo-32bit-228-157.57.1 * systemd-32bit-228-157.57.1 * systemd-debuginfo-32bit-228-157.57.1 * libudev1-debuginfo-32bit-228-157.57.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * systemd-228-157.57.1 * libsystemd0-debuginfo-228-157.57.1 * libudev-devel-228-157.57.1 * udev-228-157.57.1 * udev-debuginfo-228-157.57.1 * systemd-sysvinit-228-157.57.1 * libudev1-228-157.57.1 * systemd-debugsource-228-157.57.1 * libudev1-debuginfo-228-157.57.1 * libsystemd0-228-157.57.1 * systemd-debuginfo-228-157.57.1 * systemd-devel-228-157.57.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * systemd-bash-completion-228-157.57.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libudev1-32bit-228-157.57.1 * libsystemd0-32bit-228-157.57.1 * libsystemd0-debuginfo-32bit-228-157.57.1 * systemd-32bit-228-157.57.1 * systemd-debuginfo-32bit-228-157.57.1 * libudev1-debuginfo-32bit-228-157.57.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1211576 * https://bugzilla.suse.com/show_bug.cgi?id=1211725 * https://bugzilla.suse.com/show_bug.cgi?id=1212207 * https://bugzilla.suse.com/show_bug.cgi?id=1215241 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 12:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 12:30:09 -0000 Subject: SUSE-RU-2024:0180-1: moderate: Recommended update for open-vm-tools Message-ID: <170601300990.9926.13623385641053885354@smelt2.prg2.suse.org> # Recommended update for open-vm-tools Announcement ID: SUSE-RU-2024:0180-1 Rating: moderate References: * bsc#1217796 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for open-vm-tools fixes the following issue: * Fix (bsc#1217796) - Fix outdated libxmlsec1 dependency version. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-180=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-180=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-180=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * open-vm-tools-12.3.5-4.68.8 * open-vm-tools-desktop-12.3.5-4.68.8 * open-vm-tools-debuginfo-12.3.5-4.68.8 * open-vm-tools-sdmp-debuginfo-12.3.5-4.68.8 * open-vm-tools-debugsource-12.3.5-4.68.8 * libvmtools0-12.3.5-4.68.8 * libvmtools0-debuginfo-12.3.5-4.68.8 * open-vm-tools-sdmp-12.3.5-4.68.8 * open-vm-tools-desktop-debuginfo-12.3.5-4.68.8 * open-vm-tools-salt-minion-12.3.5-4.68.8 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * open-vm-tools-12.3.5-4.68.8 * open-vm-tools-desktop-12.3.5-4.68.8 * open-vm-tools-debuginfo-12.3.5-4.68.8 * open-vm-tools-sdmp-debuginfo-12.3.5-4.68.8 * open-vm-tools-debugsource-12.3.5-4.68.8 * libvmtools0-12.3.5-4.68.8 * libvmtools0-debuginfo-12.3.5-4.68.8 * open-vm-tools-sdmp-12.3.5-4.68.8 * open-vm-tools-desktop-debuginfo-12.3.5-4.68.8 * open-vm-tools-salt-minion-12.3.5-4.68.8 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * open-vm-tools-12.3.5-4.68.8 * open-vm-tools-desktop-12.3.5-4.68.8 * open-vm-tools-debuginfo-12.3.5-4.68.8 * open-vm-tools-sdmp-debuginfo-12.3.5-4.68.8 * open-vm-tools-debugsource-12.3.5-4.68.8 * libvmtools0-12.3.5-4.68.8 * libvmtools0-debuginfo-12.3.5-4.68.8 * open-vm-tools-sdmp-12.3.5-4.68.8 * open-vm-tools-desktop-debuginfo-12.3.5-4.68.8 * open-vm-tools-salt-minion-12.3.5-4.68.8 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217796 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 12:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 12:30:12 -0000 Subject: SUSE-RU-2024:0179-1: moderate: Recommended update for ghostscript Message-ID: <170601301228.9926.2663092921914075637@smelt2.prg2.suse.org> # Recommended update for ghostscript Announcement ID: SUSE-RU-2024:0179-1 Rating: moderate References: * bsc#1191841 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that has one fix can now be installed. ## Description: This update for ghostscript fixes the following issues: * Fixed memory corruption issue while providing PDF with non-ASCII characters as input (bsc#1191841) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-179=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-179=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-179=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-179=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-23.66.1 * ghostscript-9.52-23.66.1 * ghostscript-x11-9.52-23.66.1 * ghostscript-debuginfo-9.52-23.66.1 * ghostscript-debugsource-9.52-23.66.1 * ghostscript-devel-9.52-23.66.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-23.66.1 * ghostscript-9.52-23.66.1 * ghostscript-x11-9.52-23.66.1 * ghostscript-debuginfo-9.52-23.66.1 * ghostscript-debugsource-9.52-23.66.1 * ghostscript-devel-9.52-23.66.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * ghostscript-x11-debuginfo-9.52-23.66.1 * ghostscript-9.52-23.66.1 * ghostscript-x11-9.52-23.66.1 * ghostscript-debuginfo-9.52-23.66.1 * ghostscript-debugsource-9.52-23.66.1 * ghostscript-devel-9.52-23.66.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * ghostscript-devel-9.52-23.66.1 * ghostscript-debuginfo-9.52-23.66.1 * ghostscript-debugsource-9.52-23.66.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1191841 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 12:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 12:30:13 -0000 Subject: SUSE-FU-2024:0178-1: moderate: Feature update for tomcat10, jakarta-servlet, apache-commons-jexl Message-ID: <170601301339.9926.10067533154897330085@smelt2.prg2.suse.org> # Feature update for tomcat10, jakarta-servlet, apache-commons-jexl Announcement ID: SUSE-FU-2024:0178-1 Rating: moderate References: * jsc#PED-6178 * jsc#PED-6477 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 * Web and Scripting Module 15-SP5 An update that contains two features can now be installed. ## Description: This update for tomcat10, jakarta-servlet and apache-commons-jexl fixes the following issues: tomcat10: * New package implementation of Tomcat 10.1.14 (jsc#PED-6178, jsc#PED-6377) apache-commons-jexl: * Included in SUSE Linux Enterprise 15 Service Pack 5 Web Scripting Module, as new package dependency to tomcat10 (no source changes) jakarta-servlet: * Included in SUSE Linux Enterprise 15 Service Pack 5 Web Scripting Module, as new package dependency to tomcat10 (no source changes) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-178=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-178=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-178=1 ## Package List: * openSUSE Leap 15.5 (noarch) * jakarta-servlet-5.0.0-150200.5.5.1 * tomcat10-admin-webapps-10.1.14-150200.5.5.1 * tomcat10-embed-10.1.14-150200.5.5.1 * tomcat10-el-5_0-api-10.1.14-150200.5.5.1 * tomcat10-webapps-10.1.14-150200.5.5.1 * tomcat10-servlet-6_0-api-10.1.14-150200.5.5.1 * apache-commons-jexl-2.1.1-150200.3.8.1 * jakarta-servlet-javadoc-5.0.0-150200.5.5.1 * tomcat10-docs-webapp-10.1.14-150200.5.5.1 * tomcat10-jsvc-10.1.14-150200.5.5.1 * tomcat10-jsp-3_1-api-10.1.14-150200.5.5.1 * tomcat10-10.1.14-150200.5.5.1 * apache-commons-jexl-javadoc-2.1.1-150200.3.8.1 * tomcat10-lib-10.1.14-150200.5.5.1 * SUSE Manager Server 4.3 Module 4.3 (noarch) * apache-commons-jexl-2.1.1-150200.3.8.1 * Web and Scripting Module 15-SP5 (noarch) * tomcat10-admin-webapps-10.1.14-150200.5.5.1 * jakarta-servlet-5.0.0-150200.5.5.1 * tomcat10-webapps-10.1.14-150200.5.5.1 * tomcat10-el-5_0-api-10.1.14-150200.5.5.1 * tomcat10-servlet-6_0-api-10.1.14-150200.5.5.1 * apache-commons-jexl-2.1.1-150200.3.8.1 * tomcat10-jsp-3_1-api-10.1.14-150200.5.5.1 * tomcat10-10.1.14-150200.5.5.1 * tomcat10-lib-10.1.14-150200.5.5.1 ## References: * https://jira.suse.com/browse/PED-6178 * https://jira.suse.com/browse/PED-6477 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 16:30:04 -0000 Subject: SUSE-RU-2024:0199-1: moderate: Recommended Beta update for SUSE Manager Client Tools Message-ID: <170602740468.4790.3354696892423353835@smelt2.prg2.suse.org> # Recommended Beta update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:0199-1 Rating: moderate References: * bsc#1197507 * bsc#1198903 * bsc#1200591 * bsc#1201003 * bsc#1203283 * bsc#1204126 * bsc#1205207 * bsc#1205759 * bsc#1207352 * bsc#1207830 * bsc#1208612 * bsc#1208719 * bsc#1210458 * jsc#MSQA-718 Affected Products: * SUSE Manager Client Tools Beta for Debian 11 An update that contains one feature and has 13 fixes can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 5.0.1-1 * Use localhost without ssl when running on the server * Version 4.4.10-1 * Update translation strings * Version 4.4.9-1 * Update translation strings * Version 4.4.8-1 * Add spacecmd function: cryptokey_update * Bypass traditional systems check on older SUMA instances (bsc#1208612) * Fix argument parsing of distribution_update (bsc#1210458) * Version 4.4.7-1 * Display activation key details after executing the corresponding command (bsc#1208719) * Show targetted packages before actually removing them (bsc#1207830) * Version 4.4.6-1 * Fix spacecmd not showing any output for softwarechannel_diff and softwarechannel_errata_diff (bsc#1207352) * Version 4.4.5-1 * Prevent string api parameters to be parsed as dates if not in ISO-8601 format (bsc#1205759) * Add python-dateutil dependency, required to process date values in spacecmd api calls * Remove python3-simplejson dependency * Version 4.4.4-1 * Correctly understand 'ssm' keyword on scap scheduling * Add vendor_advisory information to errata_details call (bsc#1205207) * Change default port of "Containerized Proxy configuration" 8022 * Version 4.4.3-1 * Added two missing options to schedule product migration: allow-vendor-change and remove-products-without-successor (bsc#1204126) * Changed schedule product migration to use the correct API method * Fix dict_keys not supporting indexing in systems_setconfigchannelorger * Added a warning message for traditional stack deprecation * Remove "Undefined return code" from debug messages (bsc#1203283) * Version 4.4.2-1 * Stop always showing help for valid proxy_container_config calls * Version 4.4.1-1 * Process date values in spacecmd api calls (bsc#1198903) * Improve Proxy FQDN hint message * Version 4.3.14-1 * Fix missing argument on system_listmigrationtargets (bsc#1201003) * Show correct help on calling kickstart_importjson with no arguments * Fix tracebacks on spacecmd kickstart_export (bsc#1200591) * Change proxy container config default filename to end with tar.gz * Version 4.3.13-1 * Update translation strings * Version 4.3.12-1 * Update translation strings * Version 4.3.11-1 * On full system update call schedulePackageUpdate API (bsc#1197507) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for Debian 11 zypper in -t patch SUSE-Debian-11-CLIENT-TOOLS-BETA-2024-199=1 ## Package List: * SUSE Manager Client Tools Beta for Debian 11 (all) * spacecmd-5.0.1-2.13.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1197507 * https://bugzilla.suse.com/show_bug.cgi?id=1198903 * https://bugzilla.suse.com/show_bug.cgi?id=1200591 * https://bugzilla.suse.com/show_bug.cgi?id=1201003 * https://bugzilla.suse.com/show_bug.cgi?id=1203283 * https://bugzilla.suse.com/show_bug.cgi?id=1204126 * https://bugzilla.suse.com/show_bug.cgi?id=1205207 * https://bugzilla.suse.com/show_bug.cgi?id=1205759 * https://bugzilla.suse.com/show_bug.cgi?id=1207352 * https://bugzilla.suse.com/show_bug.cgi?id=1207830 * https://bugzilla.suse.com/show_bug.cgi?id=1208612 * https://bugzilla.suse.com/show_bug.cgi?id=1208719 * https://bugzilla.suse.com/show_bug.cgi?id=1210458 * https://jira.suse.com/browse/MSQA-718 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 16:30:09 -0000 Subject: SUSE-RU-2024:0198-1: moderate: Recommended Beta update for SUSE Manager Client Tools Message-ID: <170602740906.4790.9493595651082963792@smelt2.prg2.suse.org> # Recommended Beta update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:0198-1 Rating: moderate References: * bsc#1197507 * bsc#1198903 * bsc#1200122 * bsc#1200149 * bsc#1200163 * bsc#1200591 * bsc#1201003 * bsc#1203283 * bsc#1204126 * bsc#1205207 * bsc#1205759 * bsc#1207352 * bsc#1207830 * bsc#1208612 * bsc#1208719 * bsc#1210458 * bsc#1213691 * bsc#1217832 * jsc#ECO-3319 * jsc#MSQA-718 Affected Products: * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 An update that contains two features and has 18 fixes can now be installed. ## Description: This update fixes the following issues: scap-security-guide: * Switch buggy journald plugindir remediation to write into journald.conf. (bsc#1217832) * Updated to 0.1.70 (jsc#ECO-3319) * Add openembedded distro support (#10793) * Remove DRAFT wording for OpenShift STIG (#11100) * Remove test-function-check_playbook_file_removed_and_added test (#10982) * scap-security-guide: Add Poky support (#11046) * Updated to 0.1.69 (jsc#ECO-3319) * Introduce a JSON build manifest (#10761) * Introduce a script to compare ComplianceAsCode versions (#10768) * Introduce CCN profiles for RHEL9 (#10860) * Map rules to components (#10609) * products/anolis23: supports Anolis OS 23 (#10548) * Render components to HTML (#10709) * Store rendered control files (#10656) * Test and use rules to components mapping (#10693) * Use distributed product properties (#10554) revert patch that breaks the SLE hardening (bsc#1213691) * Updated to 0.1.68 (jsc#ECO-3319) * Bump OL8 STIG version to V1R6 * Introduce a Product class, make the project work with it * Introduce Fedora and Firefox CaC profiles for common workstation users * OL7 DISA STIG v2r11 update * Publish rendered policy artifacts * Update ANSSI BP-028 to version 2.0 * Updated to 0.1.67 (jsc#ECO-3319) * Add utils/controlrefcheck.py * RHEL 9 STIG Update Q1 2023 * Include warning for NetworkManager keyfiles in RHEL9 * OL7 stig v2r10 update * Bump version of OL8 STIG to V1R5 * Various enhancements to SLE profiles * Updated to 0.1.66 (jsc#ECO-3319) * Ubuntu 22.04 CIS * OL7 stig v2r9 update * Bump OL8 STIG version to V1R4 * Update RHEL7 STIG to V3R10 * Update RHEL8 STIG to V1R9 * Introduce CIS RHEL9 profiles * Also various SUSE profile fixes were done * Updated to 0.1.65 (jsc#ECO-3319) * Introduce cui profile for OL9 * Remove Support for OVAL 5.10 * Rename account_passwords_pam_faillock_audit * CI ansible hardening and rename of existing Bash hardening * Update contributors list for v0.1.65 release * various SUSE profile specific fixes * Require sudo, as remediations touch sudo config or use sudo. * Enable ubuntu 2204 build * Updated to 0.1.64 (jsc#ECO-3319) * Introduce ol9 stig profile * Introduce Ol9 anssi profiles * Update RHEL8 STIG to V1R7 * Introduce e8 profile for OL9 * Update RHEL7 STIG to V3R8 * some SUSE profile fixes * Added several RPM requires that are needed by the SUSE remediation scripts. (e.g. awk is not necessary installed) * Updated to 0.1.63 (jsc#ECO-3319) * multiple bugfixes in SUSE profiles * Expand project guidelines * Add Draft OCP4 STIG profile * Add anssi_bp28_intermediary profile * add products/uos20 to support UnionTech OS Server 20 * products/alinux3: Add CIS Alibaba Cloud Linux 3 profiles * Remove WRLinux Products * Update CIS RHEL8 Benchmark for v2.0.0 * Fixed: stig: /etc/shadow group owner should not be root but shadow (bsc#1200149) * Fixed: sles15_script-stig.sh: remediation_functions: No such file or directory (bsc#1200163) * Fixed: SLES-15-010130 - The SUSE operating system must initiate a session lock after a 15-minute period of inactivity (bsc#1200122) * Fix the build for RHEL 7 and clones (python-setuptools is used) * Fix the build for RHEL 9 and clones * Convert one bash emitter to new jinja method. (bsc#1200163) * Add python3-setuptools for all builds (so it is also used on debian and centos flavors) * Updated to 0.1.62 (jsc#ECO-3319) * Update rhel8 stig to v1r6 * OL7 STIG v2r7 update * Initial definition of ANSSI BP28 minmal profile for SLE * Updated to 0.1.61 (jsc#ECO-3319) * Stop building PCI-DSS-centric XCCDF benchmark for RHEL 7 * Introduce OL9 product * Implement handling of logical expressions in platform definitions * Bump disk size constraints to 7gb to avoid occasional disk fulls failures. spacecmd: * Version 5.0.1-1 * Use localhost without ssl when running on the server * Version 4.4.10-1 * Update translation strings * Version 4.4.9-1 * Version 4.4.8-1 * Add spacecmd function: cryptokey_update * Bypass traditional systems check on older SUMA instances (bsc#1208612) * fix argument parsing of distribution_update (bsc#1210458) * Version 4.4.7-1 * remove pylint check at build time * Display activation key details after executing the corresponding command (bsc#1208719) * Show targetted packages before actually removing them (bsc#1207830) * Version 4.4.6-1 * Fix spacecmd not showing any output for softwarechannel_diff and softwarechannel_errata_diff (bsc#1207352) * Version 4.4.5-1 * Prevent string api parameters to be parsed as dates if not in ISO-8601 format (bsc#1205759) * Add python-dateutil dependency, required to process date values in spacecmd api calls * Remove python3-simplejson dependency * Version 4.4.4-1 * Correctly understand 'ssm' keyword on scap scheduling * Add vendor_advisory information to errata_details call (bsc#1205207) * Change default port of "Containerized Proxy configuration" 8022 * Version 4.4.3-1 * Added two missing options to schedule product migration: allow-vendor-change and remove-products-without-successor (bsc#1204126) * Changed schedule product migration to use the correct API method * Fix dict_keys not supporting indexing in systems_setconfigchannelorger * Added a warning message for traditional stack deprecation * Remove "Undefined return code" from debug messages (bsc#1203283) * Version 4.4.2-1 * Stop always showing help for valid proxy_container_config calls * Version 4.4.1-1 * Process date values in spacecmd api calls (bsc#1198903) * Improve Proxy FQDN hint message * Version 4.3.14-1 * Fix missing argument on system_listmigrationtargets (bsc#1201003) * Show correct help on calling kickstart_importjson with no arguments * Fix tracebacks on spacecmd kickstart_export (bsc#1200591) * Change proxy container config default filename to end with tar.gz * Version 4.3.13-1 * Update translation strings * Version 4.3.12-1 * Update translation strings * Version 4.3.11-1 * on full system update call schedulePackageUpdate API (bsc#1197507) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 zypper in -t patch SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2024-198=1 ## Package List: * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 (all) * spacecmd-5.0.1-2.36.1 * scap-security-guide-ubuntu-0.1.70-2.15.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1197507 * https://bugzilla.suse.com/show_bug.cgi?id=1198903 * https://bugzilla.suse.com/show_bug.cgi?id=1200122 * https://bugzilla.suse.com/show_bug.cgi?id=1200149 * https://bugzilla.suse.com/show_bug.cgi?id=1200163 * https://bugzilla.suse.com/show_bug.cgi?id=1200591 * https://bugzilla.suse.com/show_bug.cgi?id=1201003 * https://bugzilla.suse.com/show_bug.cgi?id=1203283 * https://bugzilla.suse.com/show_bug.cgi?id=1204126 * https://bugzilla.suse.com/show_bug.cgi?id=1205207 * https://bugzilla.suse.com/show_bug.cgi?id=1205759 * https://bugzilla.suse.com/show_bug.cgi?id=1207352 * https://bugzilla.suse.com/show_bug.cgi?id=1207830 * https://bugzilla.suse.com/show_bug.cgi?id=1208612 * https://bugzilla.suse.com/show_bug.cgi?id=1208719 * https://bugzilla.suse.com/show_bug.cgi?id=1210458 * https://bugzilla.suse.com/show_bug.cgi?id=1213691 * https://bugzilla.suse.com/show_bug.cgi?id=1217832 * https://jira.suse.com/browse/ECO-3319 * https://jira.suse.com/browse/MSQA-718 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 20:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 20:30:04 -0000 Subject: SUSE-SU-2024:0200-1: important: Security update for redis7 Message-ID: <170604180426.29864.6245119952524480159@smelt2.prg2.suse.org> # Security update for redis7 Announcement ID: SUSE-SU-2024:0200-1 Rating: important References: * bsc#1212119 * bsc#1216376 Cross-References: * CVE-2023-45145 CVSS scores: * CVE-2023-45145 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-45145 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for redis7 fixes the following issues: * CVE-2023-45145: Fixed a potential permission bypass due to a race condition during UNIX socket creation (bsc#1216376). The following non-security issues were fixed: * Redis services are no longer disabled after an upgrade (bsc#1212119). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-200=1 openSUSE-SLE-15.5-2024-200=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-200=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * redis7-debugsource-7.0.8-150500.3.9.1 * redis7-7.0.8-150500.3.9.1 * redis7-debuginfo-7.0.8-150500.3.9.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * redis7-debugsource-7.0.8-150500.3.9.1 * redis7-7.0.8-150500.3.9.1 * redis7-debuginfo-7.0.8-150500.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45145.html * https://bugzilla.suse.com/show_bug.cgi?id=1212119 * https://bugzilla.suse.com/show_bug.cgi?id=1216376 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 20:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 20:30:05 -0000 Subject: SUSE-RU-2024:0198-1: moderate: Recommended Beta update for SUSE Manager Client Tools Message-ID: <170604180543.29864.1095248802957380125@smelt2.prg2.suse.org> # Recommended Beta update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:0198-1 Rating: moderate References: * bsc#1197507 * bsc#1198903 * bsc#1200122 * bsc#1200149 * bsc#1200163 * bsc#1200591 * bsc#1201003 * bsc#1203283 * bsc#1204126 * bsc#1205207 * bsc#1205759 * bsc#1207352 * bsc#1207830 * bsc#1208612 * bsc#1208719 * bsc#1210458 * bsc#1213691 * bsc#1217832 * jsc#ECO-3319 * jsc#MSQA-718 Affected Products: * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 An update that contains two features and has 18 fixes can now be installed. ## Description: This update fixes the following issues: scap-security-guide: * Switch buggy journald plugindir remediation to write into journald.conf. (bsc#1217832) * Updated to 0.1.70 (jsc#ECO-3319) * Add openembedded distro support (#10793) * Remove DRAFT wording for OpenShift STIG (#11100) * Remove test-function-check_playbook_file_removed_and_added test (#10982) * scap-security-guide: Add Poky support (#11046) * Updated to 0.1.69 (jsc#ECO-3319) * Introduce a JSON build manifest (#10761) * Introduce a script to compare ComplianceAsCode versions (#10768) * Introduce CCN profiles for RHEL9 (#10860) * Map rules to components (#10609) * products/anolis23: supports Anolis OS 23 (#10548) * Render components to HTML (#10709) * Store rendered control files (#10656) * Test and use rules to components mapping (#10693) * Use distributed product properties (#10554) revert patch that breaks the SLE hardening (bsc#1213691) * Updated to 0.1.68 (jsc#ECO-3319) * Bump OL8 STIG version to V1R6 * Introduce a Product class, make the project work with it * Introduce Fedora and Firefox CaC profiles for common workstation users * OL7 DISA STIG v2r11 update * Publish rendered policy artifacts * Update ANSSI BP-028 to version 2.0 * Updated to 0.1.67 (jsc#ECO-3319) * Add utils/controlrefcheck.py * RHEL 9 STIG Update Q1 2023 * Include warning for NetworkManager keyfiles in RHEL9 * OL7 stig v2r10 update * Bump version of OL8 STIG to V1R5 * Various enhancements to SLE profiles * Updated to 0.1.66 (jsc#ECO-3319) * Ubuntu 22.04 CIS * OL7 stig v2r9 update * Bump OL8 STIG version to V1R4 * Update RHEL7 STIG to V3R10 * Update RHEL8 STIG to V1R9 * Introduce CIS RHEL9 profiles * Also various SUSE profile fixes were done * Updated to 0.1.65 (jsc#ECO-3319) * Introduce cui profile for OL9 * Remove Support for OVAL 5.10 * Rename account_passwords_pam_faillock_audit * CI ansible hardening and rename of existing Bash hardening * Update contributors list for v0.1.65 release * various SUSE profile specific fixes * Require sudo, as remediations touch sudo config or use sudo. * Enable ubuntu 2204 build * Updated to 0.1.64 (jsc#ECO-3319) * Introduce ol9 stig profile * Introduce Ol9 anssi profiles * Update RHEL8 STIG to V1R7 * Introduce e8 profile for OL9 * Update RHEL7 STIG to V3R8 * some SUSE profile fixes * Added several RPM requires that are needed by the SUSE remediation scripts. (e.g. awk is not necessary installed) * Updated to 0.1.63 (jsc#ECO-3319) * multiple bugfixes in SUSE profiles * Expand project guidelines * Add Draft OCP4 STIG profile * Add anssi_bp28_intermediary profile * add products/uos20 to support UnionTech OS Server 20 * products/alinux3: Add CIS Alibaba Cloud Linux 3 profiles * Remove WRLinux Products * Update CIS RHEL8 Benchmark for v2.0.0 * Fixed: stig: /etc/shadow group owner should not be root but shadow (bsc#1200149) * Fixed: sles15_script-stig.sh: remediation_functions: No such file or directory (bsc#1200163) * Fixed: SLES-15-010130 - The SUSE operating system must initiate a session lock after a 15-minute period of inactivity (bsc#1200122) * Fix the build for RHEL 7 and clones (python-setuptools is used) * Fix the build for RHEL 9 and clones * Convert one bash emitter to new jinja method. (bsc#1200163) * Add python3-setuptools for all builds (so it is also used on debian and centos flavors) * Updated to 0.1.62 (jsc#ECO-3319) * Update rhel8 stig to v1r6 * OL7 STIG v2r7 update * Initial definition of ANSSI BP28 minmal profile for SLE * Updated to 0.1.61 (jsc#ECO-3319) * Stop building PCI-DSS-centric XCCDF benchmark for RHEL 7 * Introduce OL9 product * Implement handling of logical expressions in platform definitions * Bump disk size constraints to 7gb to avoid occasional disk fulls failures. spacecmd: * Version 5.0.1-1 * Use localhost without ssl when running on the server * Version 4.4.10-1 * Update translation strings * Version 4.4.9-1 * Version 4.4.8-1 * Add spacecmd function: cryptokey_update * Bypass traditional systems check on older SUMA instances (bsc#1208612) * fix argument parsing of distribution_update (bsc#1210458) * Version 4.4.7-1 * remove pylint check at build time * Display activation key details after executing the corresponding command (bsc#1208719) * Show targetted packages before actually removing them (bsc#1207830) * Version 4.4.6-1 * Fix spacecmd not showing any output for softwarechannel_diff and softwarechannel_errata_diff (bsc#1207352) * Version 4.4.5-1 * Prevent string api parameters to be parsed as dates if not in ISO-8601 format (bsc#1205759) * Add python-dateutil dependency, required to process date values in spacecmd api calls * Remove python3-simplejson dependency * Version 4.4.4-1 * Correctly understand 'ssm' keyword on scap scheduling * Add vendor_advisory information to errata_details call (bsc#1205207) * Change default port of "Containerized Proxy configuration" 8022 * Version 4.4.3-1 * Added two missing options to schedule product migration: allow-vendor-change and remove-products-without-successor (bsc#1204126) * Changed schedule product migration to use the correct API method * Fix dict_keys not supporting indexing in systems_setconfigchannelorger * Added a warning message for traditional stack deprecation * Remove "Undefined return code" from debug messages (bsc#1203283) * Version 4.4.2-1 * Stop always showing help for valid proxy_container_config calls * Version 4.4.1-1 * Process date values in spacecmd api calls (bsc#1198903) * Improve Proxy FQDN hint message * Version 4.3.14-1 * Fix missing argument on system_listmigrationtargets (bsc#1201003) * Show correct help on calling kickstart_importjson with no arguments * Fix tracebacks on spacecmd kickstart_export (bsc#1200591) * Change proxy container config default filename to end with tar.gz * Version 4.3.13-1 * Update translation strings * Version 4.3.12-1 * Update translation strings * Version 4.3.11-1 * on full system update call schedulePackageUpdate API (bsc#1197507) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 zypper in -t patch SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2024-198=1 ## Package List: * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 (all) * scap-security-guide-ubuntu-0.1.70-2.15.1 * spacecmd-5.0.1-2.36.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1197507 * https://bugzilla.suse.com/show_bug.cgi?id=1198903 * https://bugzilla.suse.com/show_bug.cgi?id=1200122 * https://bugzilla.suse.com/show_bug.cgi?id=1200149 * https://bugzilla.suse.com/show_bug.cgi?id=1200163 * https://bugzilla.suse.com/show_bug.cgi?id=1200591 * https://bugzilla.suse.com/show_bug.cgi?id=1201003 * https://bugzilla.suse.com/show_bug.cgi?id=1203283 * https://bugzilla.suse.com/show_bug.cgi?id=1204126 * https://bugzilla.suse.com/show_bug.cgi?id=1205207 * https://bugzilla.suse.com/show_bug.cgi?id=1205759 * https://bugzilla.suse.com/show_bug.cgi?id=1207352 * https://bugzilla.suse.com/show_bug.cgi?id=1207830 * https://bugzilla.suse.com/show_bug.cgi?id=1208612 * https://bugzilla.suse.com/show_bug.cgi?id=1208719 * https://bugzilla.suse.com/show_bug.cgi?id=1210458 * https://bugzilla.suse.com/show_bug.cgi?id=1213691 * https://bugzilla.suse.com/show_bug.cgi?id=1217832 * https://jira.suse.com/browse/ECO-3319 * https://jira.suse.com/browse/MSQA-718 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 20:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 20:30:07 -0000 Subject: SUSE-RU-2024:0197-1: moderate: Recommended Beta update for SUSE Manager Client Tools Message-ID: <170604180706.29864.2065426696157183012@smelt2.prg2.suse.org> # Recommended Beta update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:0197-1 Rating: moderate References: * bsc#1208612 * bsc#1210458 * jsc#MSQA-718 Affected Products: * SUSE Manager Client Tools Beta for Debian 12 An update that contains one feature and has two fixes can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 5.0.1-1 * Use localhost without ssl when running on the server * Version 4.4.10-1 * Update translation strings * Version 4.4.9-1 * Update translation strings * Version 4.4.8-1 * Add spacecmd function: cryptokey_update * Bypass traditional systems check on older SUMA instances (bsc#1208612) * Fix argument parsing of distribution_update (bsc#1210458) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for Debian 12 zypper in -t patch SUSE-Debian-12-CLIENT-TOOLS-BETA-2024-197=1 ## Package List: * SUSE Manager Client Tools Beta for Debian 12 (all) * spacecmd-5.0.1-3.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1208612 * https://bugzilla.suse.com/show_bug.cgi?id=1210458 * https://jira.suse.com/browse/MSQA-718 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 20:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 23 Jan 2024 20:30:22 -0000 Subject: SUSE-SU-2024:0196-1: moderate: Security Beta update for SUSE Manager Client Tools and Salt Message-ID: <170604182289.29864.11405922990095689694@smelt2.prg2.suse.org> # Security Beta update for SUSE Manager Client Tools and Salt Announcement ID: SUSE-SU-2024:0196-1 Rating: moderate References: * bsc#1172110 * bsc#1176460 * bsc#1180816 * bsc#1180942 * bsc#1181119 * bsc#1181935 * bsc#1183684 * bsc#1187725 * bsc#1188061 * bsc#1188571 * bsc#1189520 * bsc#1191454 * bsc#1192154 * bsc#1192383 * bsc#1192696 * bsc#1192763 * bsc#1193492 * bsc#1193686 * bsc#1193688 * bsc#1197507 * bsc#1198903 * bsc#1199810 * bsc#1200142 * bsc#1200480 * bsc#1200591 * bsc#1200968 * bsc#1200970 * bsc#1201003 * bsc#1201059 * bsc#1201535 * bsc#1201539 * bsc#1202614 * bsc#1202945 * bsc#1203283 * bsc#1203596 * bsc#1203597 * bsc#1203599 * bsc#1204032 * bsc#1204126 * bsc#1204302 * bsc#1204303 * bsc#1204304 * bsc#1204305 * bsc#1204501 * bsc#1205207 * bsc#1205225 * bsc#1205227 * bsc#1205599 * bsc#1205759 * bsc#1207352 * bsc#1207749 * bsc#1207750 * bsc#1207830 * bsc#1208046 * bsc#1208049 * bsc#1208060 * bsc#1208062 * bsc#1208065 * bsc#1208270 * bsc#1208293 * bsc#1208298 * bsc#1208612 * bsc#1208692 * bsc#1208719 * bsc#1208819 * bsc#1208821 * bsc#1208965 * bsc#1209113 * bsc#1209645 * bsc#1210458 * bsc#1210640 * bsc#1210907 * bsc#1211525 * bsc#1212099 * bsc#1212100 * bsc#1212279 * bsc#1212641 * bsc#1218843 * bsc#1218844 * jsc#MSQA-718 * jsc#PED-2145 * jsc#PED-2617 * jsc#PED-3576 * jsc#PED-3694 * jsc#PED-4556 * jsc#PED-5405 * jsc#PED-5406 * jsc#SLE-23422 * jsc#SLE-23439 * jsc#SLE-23631 * jsc#SLE-24133 * jsc#SLE-24565 * jsc#SLE-24791 Cross-References: * CVE-2020-7753 * CVE-2021-20178 * CVE-2021-20180 * CVE-2021-20191 * CVE-2021-20228 * CVE-2021-3447 * CVE-2021-3583 * CVE-2021-3620 * CVE-2021-36222 * CVE-2021-3711 * CVE-2021-3807 * CVE-2021-3918 * CVE-2021-41174 * CVE-2021-41244 * CVE-2021-43138 * CVE-2021-43798 * CVE-2021-43813 * CVE-2021-43815 * CVE-2022-0155 * CVE-2022-23552 * CVE-2022-27664 * CVE-2022-29170 * CVE-2022-31097 * CVE-2022-31107 * CVE-2022-31123 * CVE-2022-31130 * CVE-2022-32149 * CVE-2022-35957 * CVE-2022-36062 * CVE-2022-39201 * CVE-2022-39229 * CVE-2022-39306 * CVE-2022-39307 * CVE-2022-39324 * CVE-2022-41715 * CVE-2022-41723 * CVE-2022-46146 * CVE-2023-0507 * CVE-2023-0594 * CVE-2023-1387 * CVE-2023-1410 * CVE-2023-2183 * CVE-2023-2801 * CVE-2023-3128 CVSS scores: * CVE-2020-7753 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-20178 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2021-20178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-20180 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2021-20180 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-20191 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2021-20191 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-20228 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2021-20228 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-3447 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2021-3447 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-3583 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2021-3583 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2021-3620 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2021-3620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-36222 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-36222 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3711 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-3711 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-3807 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3918 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-3918 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-41174 ( SUSE ): 6.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N * CVE-2021-41174 ( NVD ): 6.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N * CVE-2021-41244 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2021-41244 ( NVD ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-43138 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2021-43138 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2021-43798 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-43798 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-43813 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-43813 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-43815 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-43815 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-0155 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2022-23552 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2022-23552 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2022-27664 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-27664 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-29170 ( SUSE ): 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L * CVE-2022-29170 ( NVD ): 8.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N * CVE-2022-31097 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2022-31097 ( NVD ): 8.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N * CVE-2022-31107 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L * CVE-2022-31107 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-31123 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2022-31123 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-31130 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2022-31130 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-32149 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-32149 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-35957 ( SUSE ): 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-35957 ( NVD ): 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-36062 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L * CVE-2022-36062 ( NVD ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L * CVE-2022-39201 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2022-39201 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-39229 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-39229 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-39306 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2022-39306 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2022-39307 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2022-39307 ( NVD ): 6.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L * CVE-2022-39324 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L * CVE-2022-39324 ( NVD ): 6.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L * CVE-2022-41715 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41715 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-46146 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-46146 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0507 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-0507 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-0594 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-0594 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-1387 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N * CVE-2023-1387 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N * CVE-2023-1410 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N * CVE-2023-1410 ( NVD ): 6.2 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:N * CVE-2023-2183 ( SUSE ): 4.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N * CVE-2023-2183 ( NVD ): 4.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N * CVE-2023-2801 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2801 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3128 ( SUSE ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L * CVE-2023-3128 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Client Tools Beta for SLE 15 * SUSE Manager Client Tools Beta for SLE Micro 5 An update that solves 44 vulnerabilities, contains 14 features and has 35 security fixes can now be installed. ## Description: This update fixes the following issues: ansible: * Update to version 2.9.27 (jsc#SLE-23631) (jsc#SLE-24133) * bsc#1187725 CVE-2021-3620 ansible-connection module discloses sensitive info in traceback error message (in 2.9.27) * bsc#1188061 CVE-2021-3583 Template Injection through yaml multi-line strings with ansible facts used in template. (in 2.9.23) * bsc#1176460 gh#ansible/ansible#72094 ansible module nmcli is broken in ansible 2.9.13 (in 2.9.15) * Update to 2.9.22: * CVE-2021-3447 (bsc#1183684) multiple modules expose secured values * CVE-2021-20228 (bsc#1181935) basic.py no_log with fallback option * CVE-2021-20191 (bsc#1181119) multiple collections exposes secured values * CVE-2021-20180 (bsc#1180942) bitbucket_pipeline_variable exposes sensitive values * CVE-2021-20178 (bsc#1180816) user data leak in snmp_facts module dracut-saltboot: * Update to version 0.1.1681904360.84ef141 * Load network configuration even when missing protocol version (bsc#1210640) * Update to verion 0.1.1674034019.a93ff61 * Install copied wicked config as client.xml (bsc#1205599) * Update to version 0.1.1673279145.e7616bd * Add failsafe stop file when salt-minion does not stop (bsc#1172110) * Copy existing wicked config instead of generating new (bsc#1205599) * Update to version 0.1.1665997480.587fa10 * Add dependencies on xz and gzip to support compressed images * Update to version 0.1.1661440542.6cbe0da * Use standard susemanager.conf * Move image services to dracut-saltboot package * Use salt bundle * Require e2fsprogs (bsc#1202614) * Update to version 0.1.1657643023.0d694ce * Update dracut-saltboot dependencies (bsc#1200970) * Fix network loading when ipappend is used in pxe config * Add new information messages golang-github-QubitProducts-exporter_exporter: * Remove license file from %doc * Exclude s390 arch * Adapted to build on Enterprise Linux. * Fix build for RedHat 7 * Require Go >= 1.14 also for CentOS * Add support for CentOS * Replace %{?systemd_requires} with %{?systemd_ordering} golang-github-boynux-squid_exporter: * Exclude s390 architecture (gh#SUSE/spacewalk#19050) * Enhanced to build on Enterprise Linux 8. golang-github-lusitaniae-apache_exporter: * Do not strip if SUSE Linux Enterprise 15 SP3 * Exclude debug for RHEL >= 8 * Build with Go >= 1.20 when the OS is not RHEL * Spec file clean up * Fix apparmor profile for SLE 12 * Do not build with apparmor profile for SLE 12 * Upgrade to version 1.0.0 (jsc#PED-5405) * Improved flag parsing * Added support for custom headers * Build with Go 1.19 * Build using promu * Add _service file * Fix sandboxing options * Upgrade to version 0.13.4 * Fix denial of service vulnerability (CVE-2022-32149, bsc#1204501) * Upgrade to version 0.13.3 * Fix uncontrolled resource consumption (CVE-2022-41723, bsc#1208270) * Upgrade to version 0.13.1 * Fix panic caused by missing flagConfig options * Upgrade to version 0.13.0 * Fix authentication bypass vulnarability (CVE-2022-46146, bsc#1208046) * Corrected comment in AppArmor profile * Added AppArmor profile * Added sandboxing options to systemd service unit * Exclude s390 architecture (gh#SUSE/spacewalk#19050) * Update to upstream release 0.11.0 (jsc#SLE-24791) * Add TLS support * Switch to logger, please check --log.level and --log.format flags * Update to version 0.10.1 * Bugfix: Reset ProxyBalancer metrics on each scrape to remove stale data * Update to version 0.10.0 * Add Apache Proxy and other metrics * Update to version 0.8.0 * Change commandline flags * Add metrics: Apache version, request duration total * Adapted to build on Enterprise Linux 8 * Require building with Go 1.15 * Add support for RedHat 8 * Adjust dependencies on spec file * Disable dwarf compression in go build * Add support for Red Hat * Add %license macro for LICENSE file golang-github-prometheus-prometheus: * Update to 2.45.0 (jsc#PED-5406): * [FEATURE] API: New limit parameter to limit the number of items returned by `/api/v1/status/tsdb` endpoint. * [FEATURE] Config: Add limits to global config. * [FEATURE] Consul SD: Added support for `path_prefix`. * [FEATURE] Native histograms: Add option to scrape both classic and native histograms. * [FEATURE] Native histograms: Added support for two more arithmetic operators `avg_over_time` and `sum_over_time`. * [FEATURE] Promtool: When providing the block id, only one block will be loaded and analyzed. * [FEATURE] Remote-write: New Azure ad configuration to support remote writing directly to Azure Monitor workspace. * [FEATURE] TSDB: Samples per chunk are now configurable with flag `storage.tsdb.samples-per-chunk`. By default set to its former value 120. * [ENHANCEMENT] Native histograms: bucket size can now be limited to avoid scrape fails. * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL sooner. * [BUGFIX] Native histograms: ChunkSeries iterator now checks if a new sample can be appended to the open chunk. * [BUGFIX] Native histograms: Fix Histogram Appender `Appendable()` segfault. * [BUGFIX] Native histograms: Fix setting reset header to gauge histograms in seriesToChunkEncoder. * [BUGFIX] TSDB: Tombstone intervals are not modified after Get() call. * [BUGFIX] TSDB: Use path/filepath to set the WAL directory. * Update to 2.44.0: * [FEATURE] Remote-read: Handle native histograms. * [FEATURE] Promtool: Health and readiness check of prometheus server in CLI. * [FEATURE] PromQL: Add `query_samples_total` metric, the total number of samples loaded by all queries. * [ENHANCEMENT] Storage: Optimise buffer used to iterate through samples. * [ENHANCEMENT] Scrape: Reduce memory allocations on target labels. * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` / `bottomk()`. * [ENHANCEMENT] Rules API: Allow filtering by rule name. * [ENHANCEMENT] Native Histograms: Various fixes and improvements. * [ENHANCEMENT] UI: Search of scraping pools is now case-insensitive. * [ENHANCEMENT] TSDB: Add an affirmative log message for successful WAL repair. * [BUGFIX] TSDB: Block compaction failed when shutting down. * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the write-behind log was deleted. * Update to 2.43.1 * [BUGFIX] Labels: Set() after Del() would be ignored, which broke some relabeling rules. * Update to 2.43.0: * [FEATURE] Promtool: Add HTTP client configuration to query commands. * [FEATURE] Scrape: Add `include_scrape_configs` to include scrape configs from different files. * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from proxied requests. * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read proxies from env variables. * [ENHANCEMENT] API: Add support for setting lookback delta per query via the API. * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499 if a request is canceled. * [ENHANCEMENT] Scrape: Allow exemplars for all metric types. * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders size. * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot with index that is ahead of WAL. * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to be more comprehensible. * [ENHANCEMENT] UI: Scope `group by` labels to metric in autocompletion. * [BUGFIX] Scrape: Fix `prometheus_target_scrape_pool_target_limit` metric not set before reloading. * [BUGFIX] TSDB: Correctly update `prometheus_tsdb_head_chunks_removed_total` and `prometheus_tsdb_head_chunks` metrics when reading WAL. * [BUGFIX] TSDB: Use the correct unit (seconds) when recording out-of-order append deltas in the `prometheus_tsdb_sample_ooo_delta` metric. * Update to 2.42.0: This release comes with a bunch of feature coverage for native histograms and breaking changes. If you are trying native histograms already, we recommend you remove the `wal` directory when upgrading. Because the old WAL record for native histograms is not backward compatible in v2.42.0, this will lead to some data loss for the latest data. Additionally, if you scrape "float histograms" or use recording rules on native histograms in v2.42.0 (which writes float histograms), it is a one-way street since older versions do not support float histograms. * [CHANGE] **breaking** TSDB: Changed WAL record format for the experimental native histograms. * [FEATURE] Add 'keep_firing_for' field to alerting rules. * [FEATURE] Promtool: Add support of selecting timeseries for TSDB dump. * [ENHANCEMENT] Agent: Native histogram support. * [ENHANCEMENT] Rules: Support native histograms in recording rules. * [ENHANCEMENT] SD: Add container ID as a meta label for pod targets for Kubernetes. * [ENHANCEMENT] SD: Add VM size label to azure service discovery. * [ENHANCEMENT] Support native histograms in federation. * [ENHANCEMENT] TSDB: Add gauge histogram support. * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that represents buckets as float64 values. * [ENHANCEMENT] UI: Show individual scrape pools on /targets page. * Update to 2.41.0: * [FEATURE] Relabeling: Add keepequal and dropequal relabel actions. * [FEATURE] Add support for HTTP proxy headers. * [ENHANCEMENT] Reload private certificates when changed on disk. * [ENHANCEMENT] Add max_version to specify maximum TLS version in tls_config. * [ENHANCEMENT] Add goos and goarch labels to prometheus_build_info. * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs. * [ENHANCEMENT] SD: Add new metric prometheus_sd_file_watcher_errors_total. * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling. * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in iterators. * [ENHANCEMENT] TSDB: Optimize postings offset table reading. * [BUGFIX] Scrape: Validate the metric name, label names, and label values after relabeling. * [BUGFIX] Remote Write receiver and rule manager: Fix error handling. * Update to 2.40.7: * [BUGFIX] TSDB: Fix queries involving negative buckets of native histograms. * Update to 2.40.5: * [BUGFIX] TSDB: Fix queries involving native histograms due to improper reset of iterators. * Update to 2.40.3: * [BUGFIX] TSDB: Fix compaction after a deletion is called. * Update to 2.40.2: * [BUGFIX] UI: Fix black-on-black metric name color in dark mode. * Update to 2.40.1: * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit architecture. * [BUGFIX] Scrape: Fix accept headers. * Update to 2.40.0: * [FEATURE] Add experimental support for native histograms. Enable with the flag --enable-feature=native-histograms. * [FEATURE] SD: Add service discovery for OVHcloud. * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding. * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved sorting speed. * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds __meta_consul_partition label. Adds partition config in consul_sd_config. * [BUGFIX] API: Fix API error codes for /api/v1/labels and /api/v1/series. * Update to 2.39.1: * [BUGFIX] Rules: Fix notifier relabel changing the labels on active alerts. * Update to 2.39.0: * [FEATURE] experimental TSDB: Add support for ingesting out-of-order samples. This is configured via out_of_order_time_window field in the config file; check config file docs for more info. * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also respond to a HEAD request on top of existing GET support. * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label. * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label. * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region label. * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory. * [ENHANCEMENT] TSDB: Improve WAL replay timings. * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary data in the memory. * [ENHANCEMENT] TSDB: Allow overlapping blocks by default. \--storage.tsdb.allow-overlapping-blocks now has no effect. * [ENHANCEMENT] UI: Click to copy label-value pair from query result to clipboard. * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak. * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus startup. * [BUGFIX] PromQL: Properly close file descriptor when logging unfinished queries. * [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired. * Update to 2.38.0: * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint that allows pretty-formatting PromQL expressions. * [FEATURE]: UI: Add support for formatting PromQL expressions in the UI. * [FEATURE]: DNS SD: Support MX records for discovering targets. * [FEATURE]: Templates: Add toTime() template function that allows converting sample timestamps to Go time.Time values. * [ENHANCEMENT]: Kubernetes SD: Add __meta_kubernetes_service_port_number meta label indicating the service port number. __meta_kubernetes_pod_container_image meta label indicating the container image. * [ENHANCEMENT]: PromQL: When a query panics, also log the query itself alongside the panic message. * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve the contrast ratio. * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding locks and using atomic types instead. * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature flag, which omits or removes any default HTTP (:80) or HTTPS (:443) ports in the target's scrape address. * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the type="exemplar" label instead of type="unknown" for exemplar records. * [BUGFIX]: TSDB: Fix race condition around allocating series IDs during chunk snapshot loading. * Remove npm_licenses.tar.bz2 during "make clean" * Remove web-ui archives during "make clean". * Require promu >= 0.14.0 for building * Drop: * Upgrade to version 2.37.6 * Require Go 1.19 * Upgrade to version 2.37.5 * [SECURITY] Security upgrade from go and upstream dependencies that include security fixes to the net/http and os packages. * Upgrade to version 2.37.4 * [SECURITY] Fix basic authentication bypass vulnerability (CVE-2022-46146, bsc#1208049, jsc#PED-3576). * Upgrade to version 2.37.3 * [BUGFIX] Update our regexp library to fix upstream CVE-2022-41715. * Upgrade to version 2.37.2 * Upgrade to version 2.37.1 * [BUGFIX] Properly close file descriptor when logging unfinished queries. * [BUGFIX] TSDB: In the WAL watcher metrics, expose the * Upgrade to version 2.37.0 * [FEATURE] Nomad SD: New service discovery for Nomad built-in service discovery. * [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for endpoint role. * [ENHANCEMENT] PromQL: Optimise creation of signature with/without labels. * [ENHANCEMENT] TSDB: Memory optimizations. * [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL. * [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent header. * [BUGFIX] Alerting: Fix Alertmanager targets not being updated when alerts were queued. * [BUGFIX] Hetzner SD: Make authentication files relative to Prometheus config file. * [BUGFIX] Promtool: Fix promtool check config not erroring properly on failures. * [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on reloads. * [BUGFIX] TSDB: Don't increment prometheus_tsdb_compactions_failed_total when context is canceled. * [BUGFIX] TSDB: Fix panic if series is not found when deleting series. * [BUGFIX] TSDB: Increase prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence errors. * [BUGFIX] Uyuni SD: Make authentication files relative to Prometheus configuration file and fix default configuration values. * Upgrade to version 2.36.2 * [BUGFIX] Fix serving of static assets like fonts and favicon. * Upgrade to version 2.36.1 * [BUGFIX] promtool: Add --lint-fatal option. * Upgrade to version 2.36.0 * [FEATURE] Add lowercase and uppercase relabel action. * [FEATURE] SD: Add IONOS Cloud integration. * [FEATURE] SD: Add Vultr integration. * [FEATURE] SD: Add Linode SD failure count metric. * [FEATURE] Add prometheus_ready metric. * [ENHANCEMENT] Add stripDomain to template function. * [ENHANCEMENT] UI: Enable active search through dropped targets. * [ENHANCEMENT] promtool: support matchers when querying label * [ENHANCEMENT] Add agent mode identifier. * [BUGFIX] Changing TotalQueryableSamples from int to int64. * [BUGFIX] tsdb/agent: Ignore duplicate exemplars. * [BUGFIX] TSDB: Fix chunk overflow appending samples at a variable rate. * [BUGFIX] Stop rule manager before TSDB is stopped. * Upgrade to version 2.35.0 * [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts. * [CHANGE] promtool: Add new flag --lint (enabled by default) for the commands check rules and check config, resulting in a new exit code (3) for linter errors. * [FEATURE] Support for automatically setting the variable GOMAXPROCS to the container CPU limit. Enable with the flag \--enable-feature=auto-gomaxprocs. * [FEATURE] PromQL: Extend statistics with total and peak number of samples in a query. Additionally, per-step statistics are available with --enable- feature=promql-per-step-stats and using stats=all in the query API. Enable with the flag \--enable-feature=per-step-stats. * [ENHANCEMENT] TSDB: more efficient sorting of postings read from WAL at startup. * [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures. * [ENHANCEMENT] Azure SD: Add an optional resource_group configuration. * [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1 EndpointSlice (previously only discovery.k8s.io/v1beta1 EndpointSlice was supported). * [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to discovered pods. * [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch OAuth2 tokens. * [ENHANCEMENT] Configuration: Add the ability to disable HTTP2. * [ENHANCEMENT] Config: Support overriding minimum TLS version. * [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io. * [BUGFIX] Fix OpenMetrics parser to sort uppercase labels correctly. * [BUGFIX] UI: Fix scrape interval and duration tooltip not showing on target page. * [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is false. * [BUGFIX] Agent: Fix ID collision when loading a WAL with multiple segments. * [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing the queue. * Upgrade to version 2.34.0 * [CHANGE] UI: Classic UI removed. * [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based tracing. * [ENHANCEMENT] TSDB: Disable the chunk write queue by default and allow configuration with the experimental flag \--storage.tsdb.head-chunks-write- queue-size. * [ENHANCEMENT] HTTP SD: Add a failure counter. * [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests. * [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni. * [ENHANCEMENT] Scrape: Log when an invalid media type is encountered during a scrape. * [ENHANCEMENT] Scrape: Accept application/openmetrics-text;version=1.0.0 in addition to version=0.0.1. * [ENHANCEMENT] Remote-read: Add an option to not use external labels as selectors for remote read. * [ENHANCEMENT] UI: Optimize the alerts page and add a search bar. * [ENHANCEMENT] UI: Improve graph colors that were hard to see. * [ENHANCEMENT] Config: Allow escaping of $ with $$ when using environment variables with external labels. * [BUGFIX] PromQL: Properly return an error from histogram_quantile when metrics have the same labelset. * [BUGFIX] UI: Fix bug that sets the range input to the resolution. * [BUGFIX] TSDB: Fix a query panic when memory-snapshot-on-shutdown is enabled. * [BUGFIX] Parser: Specify type in metadata parser errors. * [BUGFIX] Scrape: Fix label limit changes not applying. * Upgrade to version 2.33.5 * [BUGFIX] Remote-write: Fix deadlock between adding to queue and getting batch. * Upgrade to version 2.33.4 * [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the disk. * Upgrade to version 2.33.3 * [BUGFIX] Azure SD: Fix a regression when public IP Address isn't set. * Upgrade to version 2.33.2 * [BUGFIX] Azure SD: Fix panic when public IP Address isn't set. * [BUGFIX] Remote-write: Fix deadlock when stopping a shard. * Upgrade to version 2.33.1 * [BUGFIX] SD: Fix no such file or directory in K8s SD when not running inside K8s. * Upgrade to version 2.33.0 * [CHANGE] PromQL: Promote negative offset and @ modifer to stable features. * [CHANGE] Web: Promote remote-write-receiver to stable. * [FEATURE] Config: Add stripPort template function. * [FEATURE] Promtool: Add cardinality analysis to check metrics, enabled by flag --extended. * [FEATURE] SD: Enable target discovery in own K8s namespace. * [FEATURE] SD: Add provider ID label in K8s SD. * [FEATURE] Web: Add limit field to the rules API. * [ENHANCEMENT] Remote-write: Avoid allocations by buffering concrete structs instead of interfaces. * [ENHANCEMENT] Remote-write: Log time series details for out-of-order samples in remote write receiver. * [ENHANCEMENT] Remote-write: Shard up more when backlogged. * [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar ingest performance. * [ENHANCEMENT] TSDB: Avoid allocations when popping from the intersected postings heap. * [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding latency spikes in remote-write. * [ENHANCEMENT] TSDB: Improve label matching performance. * [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar. * [ENHANCEMENT] UI: Optimize the target page and add a search bar. * [BUGFIX] Promtool: Make exit codes more consistent. * [BUGFIX] Promtool: Fix flakiness of rule testing. * [BUGFIX] Remote-write: Update prometheus_remote_storage_queue_highest_sent_timestamp_seconds metric when write irrecoverably fails. * [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator. * [BUGFIX] TSDB: CompactBlockMetas should produce correct mint/maxt for overlapping blocks. * [BUGFIX] TSDB: Fix logging of exemplar storage size. * [BUGFIX] UI: Fix overlapping click targets for the alert state checkboxes. * [BUGFIX] UI: Fix Unhealthy filter on target page to actually display only Unhealthy targets. * [BUGFIX] UI: Fix autocompletion when expression is empty. * [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write. * Fix authentication bypass by updating Prometheus Exporter Toolkit to version 0.7.3 (CVE-2022-46146, bsc#1208049) * Fix uncontrolled resource consumption by updating Go to version 1.20.1 (CVE-2022-41723, bsc#1208298) * Restructure the spec to build web assets online * Makefile grafana: * Update to version 9.5.8: * Features and enhancements GenericOAuth: Set sub as auth id * Bug fixes: DataSourceProxy: Fix url validation error handling * Update to version 9.5.7: Alerting: Sort NumberCaptureValues in EvaluationString Alerting: Improve performance of matching captures Alerting: No longer silence paused alerts during legacy migration Alerting: Remove and revert flag alertingBigTransactions Alerting: Migrate unknown NoData\Error settings to the default Tracing: supply Grafana build version Tempo: Escape regex-sensitive characters in span name before building promql query Plugins: Only configure plugin proxy transport once Alerting: Fix unique violation when updating rule group with title chains/cycles Prometheus: Version detect bug Prometheus: Fix heatmap format with no data Database: Change getExistingDashboardByTitleAndFolder to get dashboard by title, not slug Alerting: Convert 'Both' type Prometheus queries to 'Range' in SQLStore: Fix Postgres dialect treating "false" migrator default as true Alerting: Support newer http_config struct InfluxDB: Interpolate retention policies StatusHistory: Fix rendering of value-mapped null Alerting: Fix provenance guard checks for Alertmanager configuration to not cause panic when compared nested objects AnonymousAuth: Fix concurrent read-write crash AzureMonitor: Ensure legacy properties containing template variables are correctly migrated Explore: Remove data source onboarding page Dashboard: Re-align Save form Azure Monitor: Fix bug that did not show alert rule preview Histogram: Respect min/max panel settings for x-axis Heatmap: Fix color rendering for value ranges < 1 Heatmap: Handle unsorted timestamps in calculate mode Google Cloud Monitor: Fix mem usage for dropdown AzureMonitor: Fix logs query multi-resource and timespan values Utils: Reimplement util.GetRandomString to avoid modulo bias Alerting: Fix matching labels with spaces in their values Dashboard: Fix applying timezone to datetime variables Dashboard: Fix panel description event triggering every time panel is rendered Tempo: Fix get label values based on CoreApp type Heatmap: Fix log scale editor Dashboard: Fix disappearing panel when viewed panel is refreshed Prometheus: Fix bug in creating autocomplete queries with labels Prometheus: Fix Query Inspector expression range value Alerting: Fix migration failing if alert_configuration table is not empty InfluxDB: Fix querying retention policies on flux mode * Update to version 9.5.6: * Bug fixes Dashboard: Fix library panels in collapsed rows not getting updated Auth: Add and document option for enabling email lookup * Update to version 9.5.5: Security: Fix authentication bypass using Azure AD OAuth (bsc#1212641, CVE-2023-3128, jsc#PED-3694). Auth: Show invite button if disable login form is set to false. Azure: Fix Kusto auto-completion for Azure datasources. RBAC: Remove legacy AC editor and admin role on new dashboard route. API: Revert allowing editors to access GET /datasources. Settings: Add ability to override skip_org_role_sync with Env variables. * Update to version 9.5.3: Query: Prevent crash while executing concurrent mixed queries (bsc#1212099, CVE-2023-2801). Alerting: Require alert.notifications:write permissions to test receivers and templates (bsc#1212100, CVE-2023-2183). * Update to version 9.5.2: Alerting: Scheduler use rule fingerprint instead of version. Explore: Update table min height. DataLinks: Encoded URL fixed. TimeSeries: Fix leading null-fill for missing intervals. Dashboard: Revert fixed header shown on mobile devices in the new panel header. PostgreSQL: Fix TLS certificate issue by downgrading lib/pq. Provisioning: Fix provisioning issues with legacy alerting and data source permissions. Alerting: Fix misleading status code in provisioning API. Loki: Fix log samples using `instant` queries. Panel Header: Implement new Panel Header on Angular Panels. Azure Monitor: Fix bug that was not showing resources for certain locations. Alerting: Fix panic when reparenting receivers to groups following an attempted rename via Provisioning. Cloudwatch Logs: Clarify Cloudwatch Logs Limits. * Update to 9.5.1 Loki Variable Query Editor: Fix bug when the query is updated Expressions: Fix expression load with legacy UID -100 * Update to 9.5.0 (CVE-2023-1387, bsc#1210907, jsc#PED-3694) * Breaking changes * default named retention policies won't be used to query. Users who have a default named retention policy in their influxdb database, have to rename it to something else. Having default named retention policy is not breaking anything. We will make sure to use the actual default retention policy under the hood. To change the hardcoded retention policy in the dashboard.json, users must they select the right retention policy from dropdown and save the panel/dashboard. * Grafana Alerting rules with NoDataState configuration set to Alerting will now respect "For" duration. * Users who use LDAP role sync to only sync Viewer, Editor and Admin roles, but grant Grafana Server Admin role manually will not be able to do that anymore. After this change, LDAP role sync will override any manual changes to Grafana Server Admin role assignments. If grafana_admin is left unset in LDAP role mapping configuration, it will default to false. API keys: Add deprecation to api keys. API: Enable serving Swagger UI by default and add docs and guidelines. API: Permit Cache-Control (browser caching) for datasource resources. Accessibility: Make row actions keyboard accessible. Admin/Plugins: Set category filter in connections link. Alerting: Add CustomDetails field in PagerDuty contact point. Alerting: Add dashboard and panel links to rule and instance annotations. Alerting: Add filter and remove funcs for custom labels and Alerting: Add fuzzy search to alert list view. Alerting: Add metrics for active receiver and integrations. Alerting: Better printing of labels. Alerting: Create new state history "fanout" backend that dispatches to multiple other backends at once. Alerting: Enable preview for recording rules. Alerting: Fetch all applied alerting configurations. Alerting: Introduce proper feature toggles for common state history backend combinations. Alerting: Make time range query parameters not required when querying Loki. Alerting: New notification policies view. Alerting: No longer index state history log streams by instance labels. Alerting: Respect "For" Duration for NoData alerts. Alerting: Support filtering rules by multiple datasources. Alerting: Switch to snappy-compressed-protobuf for outgoing push requests to Loki. Angular: Prevent angular from loading when disabled. Auth: Add Generic oauth skip org role sync setting. Auth: Add feature flag to move token rotation to client. Auth: Show user sync external Authentication status. Backend: Use sdk version 0.148.0. Chore: Add stat for remote cache config. Chore: Replace short UID generation with more standard UUIDs. Chore: Use DOMPurify to sanitize strings rather than js-xss. CloudMonitoring: Add possibility to use path for private key. CloudWatch Logs: Update default timeout to 30m. CloudWatch: Add AWS/IotSiteWise namespace and metrics. CloudWatch: Add account support to variable queries. CloudWatch: Make deeplinks work for us-gov and china regions. Cloudwatch: Add MeteredIOBytes metric for EFS. Command Palette: Display dashboard location. Command palette: Enable folder searching. Connections: Turn on feature toggle by default. Cookies: Provide a mechanism for per user control over cookies. Dashboard Datasource: Update Query List & Improve UX. Dashboard: Add a feature that creates a table panel when a spreadsheet file is dropped on the dashboard. Dashboard: Add new visualization/row/library panel/pasted panel is now a dropdown menu. Dashboard: Add value format for requests per minute. Dashboard: Empty/No Panels dashboard with a new design. Dashboard: When dashboard is not found show message instead of empty page. Dashboards: Enable feature flag newPanelChromeUI by default. Dataplane: Support timeSeriesLong without transform. Datasources: Add user_agent header customization for outgoing HTTP requests. Datasources: Use getDefaultQuery in annotations editors. Docs: Add documentation on how to debug backend plugins. Docs: Deprecate dashboard previews. Elasticsearch: Detect Elasticsearch version. Elasticsearch: Run Explore queries trough data source backend. Explore: Add range option to internal data links. Explore: Add transformations to correlation data links. Explore: Support mixed data sources for supplementary query. Extensions: Expose an enum for available placements. Feat: Changing link destination for get more plugins. Feat: Linking to plugin details page rather than externally for new datasources. FieldMatchers: Add match by value (reducer). Flame graph: Add context menu. Flame graph: Add metadata above flame graph. Geomap: Improve tooltip url for photos layer. Geomap: Release night / day layer. InfluxDB: Move database information into jsondata. Jaeger and Zipkin: Config & docs upgrade. LDAP: Allow setting minimum TLS version and accepted ciphers. Live: Remove (alpha) ability to configure live pipelines. Logger: Add feature toggle for errors in HTTP request logs. Login: Allow custom name and icon for social providers. Logs Panel: Refactor style generation to improve rendering performance. Logs: Add millisecond to timestamp in log line. Logs: Rename dedup to deduplicate. Loki Query Editor: Make Monaco the default editor. Loki: Add unpack query builder hint. Loki: Add descriptions to query builder operations. Loki: Add placeholder to the loki query editor. Loki: Always fetch for new label keys in the QueryBuilder. Loki: Display error with label filter conflicts. Loki: Improve the display of loki query stats. MSSQL/Postgres: List views in table dropdown as well. MSSQL: Update forked go-mssqldb dependency. Metrics: Update comment to mention folders instead of dashboards. Navigation: Enable new navigation by default. NodeGraph: Support icons for nodes. Notifications: Enable display of trace ID by default. Packaging: Start Grafana service after InfluxDB. Panel Header: Add CancelQuery option to panel header. Panel: Show multiple errors info in the inspector. PanelChrome: Add option to show actions on the right side (actions = leftItems). Phlare: Allow variables in labelSelector (in query). Plugin: Skip preloading disabled app plugins. Plugins: Add optional logger for plugin requests sent to backend plugins. Plugins: Extend panel menu with commands from plugins. Plugins: Extend panel menu with links from plugins. Plugins: Improve instrumentation by adding metrics and tracing. Plugins: Support for distributed tracing in backend plugins SDK. Plugins: Support for link extensions. Profiling: Enable flame graph & Phlare/Parca data sources for all users. Prometheus Datasource: Improve Prom query variable editor. Prometheus Metrics: Add missing stat_total_teams metric. Prometheus/Loki: Run query explicitly instead of onblur in panel edit. Prometheus: Browser resource caching. Prometheus: Improve prometheus query variable editor. Prometheus: Use $__rate_interval for rate queries generated by metric browser. Pubdash: Email sharing handle dashboard deleted. PublicDashboards: Backfills share column with default value. PublicDashboards: Configuration modal redesign. PublicDashboards: Email sharing. PublicDashboards: Enable creation when dashboard has template variables. PublicDashboards: Paused or deleted public dashboard screen. QueryHistory: Improve handling of mixed datasource entries. Rendering: Experimental support to use JWTs as auth method. SQL Datasources: Add back help content. Schema: Remove exclusion for timeseries and update imports. Search: Improvements for starred dashboard search. Select: Show icon in the grafana/ui Select component. Service accounts: Creation logic simplification. Service accounts: Remove Add API keys buttons and remove one state of migrating for API keys tab. SplitOpen: Update API to accept multiple queries. Stat Panel: Add an option for a non-gradient/solid background. Stat: Add ability to remove default single-color background gradient. SupportBundles: Add OAuth bundle collectors. Table Panel: Add ability to use text color for value or hide value in gauge cell. Table: Introduce sparkline cell type. Tempo: Config and doc updates. Tempo: Update service graph view and docs. TraceView: Add key and url escaping of json tag values. TraceView: Reworked header. Tracing: Add more detail to HTTP Outgoing Request. Tracing: Docs and config improvements for Tempo/Jaeger/Zipkin. Tracing: Support multiple OTel propagators. Transformations: Support time format when converting time to strings. Transformers: Support adding the row index using calculate field transformer. Units: Format currency with negative before the symbol. API: Fix "Updated by" Column in dashboard versions table. AccessControl: Allow editors to access GET /api/datasources. Alerting: Add "backend" label to state history writes metrics. Alerting: Add alert instance labels to Loki log lines in addition to stream labels. Alerting: Elide requests to Loki if nothing should be recorded. Alerting: Fix DatasourceUID and RefID missing for DatasourceNoData alerts. Alerting: Fix ambiguous handling of equals in labels when bucketing Loki state history streams. Alerting: Fix attachment of external labels to Loki state history log streams. Alerting: Fix creating a recording rule when having multiple datasources. Alerting: Fix explore link in alert detail view. Alerting: Fix share URL for Prometheus rules on subpath. Alerting: Fix stats that display alert count when using unified alerting. Alerting: Hide mute timing actions when dealing with vanilla prometheus. Alerting: Paginate result previews. Alerting: Prometheus-compatible Alertmanager timings editor. Alerting: Update scheduler to get updates only from database. Alerting: Use a completely isolated context for state history writes. Alerting: Use displayNameFromDS if available in preview. Annotation List: Fix panel not updating when variable is changed. Annotations: Ignore unique constraint violations for tags. Auth: Fix orgrole picker disabled if isSynced user. AzureMonitor: Fix Log Analytics portal links. BrowseDashboards: Fix move to General folder not working. Catalog: Show install error with incompatible version. Chore: Update Grafana to use Alertmanager v0.25.1-0.20230308154952-78fedf89728b. CloudMonitoring: Add project selector for MQL editor[fix]. CloudWatch Logs: Fix running logs queries with expressions. CloudWatch Logs: Fix to make log queries use a relative time if available. CloudWatch Logs: Revert "Queries in an expression should run synchronously". CloudWatch: Fix cachedQueries insights not being updated for metric queries. Cloudwatch: Pass refId from query for expression queries. Dashboards: Evaluate provisioned dashboard titles in a backwards compatible way. Dashboards: Fix broken internal data links. Database: Don't sleep 10ms before every request. Elasticsearch: Fix processing of response with multiple group by for alerting. Elasticsearch: Handle multiple annotation structures. Email: Mark HTML comments as "safe" in email templates. ErrorHandling: Fixes issues with bad error messages. ErrorView: Better detection of no-data responses. Explore: Make DataSourcePicker visible on small screens. Fix: DataLinks from data sources override user defined data link. Fix: Top table rendering and update docs. Frontend: Fix broken links in /plugins when pathname has a trailing slash. Geomap: Fix route layer zoom behavior. Google Cloud Monitoring: Fix project variable. HeatMap: Sort y buckets when all bucket names are numeric. InfluxDB: Fix querying with hardcoded retention policy. InfluxDB: Fix sending retention policy with InfluxQL queries. KVStore: Include database field in migration. LDAP: Always synchronize Server Admin role through role sync if role sync is enabled. Library panels: Ensure pagination controls are always correctly displayed. Loki: Fix autocomplete situations with multiple escaped quotes. MegaMenu: Fixes mega menu showing scroll indicator when it shouldn't. Navigation: Redirect to root page when switching organization. Navigation: Scrolled hamburger menu links now navigate correctly in Safari. NestedFolders: Fix nested folder deletion. New Panel Header: Fix when clicking submenu item the parent menu item onClick get's triggered. Phlare: Fix error when there are no profileTypes to send from backend. PieChart: Show long labels properly. PluginExtensions: Fixed issue with incorrect type being exposed when configuring an extension. Plugins: Ensure proxy route bodies are valid JSON. Plugins: Fix width for README pages with tables. Plugins: Markdown fetch retry with lowercase. Plugins: Skip instrumenting plugin build info for core and bundled plugins. PublicDashboards: Query collapsed panels inside rows. Query Splitting: Fix for handling queries with no requestId. SQL Datasources: Fix variable throwing error if query returns no data. SQL Datasources: Prevent Call Stack Overflows with Large Numbers of Values for Variable. SQLStore: Fix SQLite error propagation if query retries are disabled. Stat Panel: Fix issue with clipping text values. Table Panel: Fix panel migration for options cell type. Table: Fix migrations from old angular table for cell color modes. Table: Fixes issue with pagination summary causing scrollbar. Table: Fixes table panel gauge alignment. TablePanel: Fix table cells overflowing when there are multiple data links. TablePanel: fix footer bug; no footer calculated values after "hidden" column override. Templating: Allow percent encoding of variable with custom all. Tempo: Set default limit if none is provided for traceql queries. TimeSeries: Don't extend stepped interpolation to graph edges. TimeSeries: Improve stacking direction heuristic. Trace View: Update the queryType to traceql for checking if same trace when clicking span link. TraceView: Don't require preferredVisualisationType to render. Utils: Reimplement util.GetRandomString to avoid modulo bias. XYChart: Add all dataset columns in tooltip. * Plugin development fixes & changes DateTimePicker: Can now select time correctly. Grafana UI: Fix tooltip prop of button component. DateTimePicker: Add min date support to calendar. GrafanaUI: Implement new component Toggletip. ContextMenu: Fix padding and show border based on items. * Update to 9.4.7 (2023-03-16) Alerting: Update scheduler to receive rule updates only from database. Influxdb: Re-introduce backend migration feature toggle. Security: Fixes for CVE-2023-1410. The InfluxDB backend migration feature toggle (influxdbBackendMigration) has been reintroduced in this version as issues were discovered with backend processing of InfluxDB data. Unless this feature toggle is enabled, all InfluxDB data will be parsed in the frontend. This frontend processing is the default behavior. In Grafana 9.4.4, InfluxDB data parsing started to be handled in the backend. If you have upgraded to 9.4.4 and then added new transformations on InfluxDB data, those panels will fail to render. To resolve this either: Remove the affected panel and re-create it or edit the `time` field as `Time` in `panel.json` or `dashboard.json` as the exporter toolkit has been updated by upstream * Install wrapper scripts under /usr/sbin * Install actual binaries under /usr/libexec/grafana (or /usr/lib under older distributions) and create a simlink for wrapper scripts and the service (which expect the binary to be under /usr/share/grafana/bin) * Update to 9.4.3 Alerting: Use background context for maintenance function. * Update to 9.4.2 Alerting: Fix boolean default in migration from false to 0. * Update to 9.4.0 Alerting: Add endpoint for querying state history. Alerting: Add label query parameters to state history endpoint. Alerting: Add static label to all state history entries. Alerting: Mark AM configuration as applied. Azure Monitor: Enable multiple resource queries. Query Caching: Add per-panel query caching TTL. Table: Add row number column option. Tempo: Remove tempoApmTable feature flag. Transformations: Selectively apply transformation to queries. AccessControl: Clear user permission cache for update org user role. Alerting: Fix handling of special floating-point cases when writing observed values to annotations. Auth: Rotate token patch. ContextMenu: Consider y coord when determining bottom collision. Elasticsearch: Fix consistent label order in alerting. Explore: Fix graph not updating when changing config. Heatmap: Support heatmap rows with non- timeseries X axis. Login: Fix panic when a user is upserted by a background process. MSSQL: Add support for macro function calls. MySQL: Quote identifiers that include special characters. Navigation: Sign in button now works correctly when served under a sub path. Nested Folder: Fix for SQLite not to overwrite the parent on restarts. PanelChrome: Adds display mode to support transparent option. Plugins: Case-sensitive routes for standalone pages. Plugins: Prefer to use the data source UID when querying. SQLStore: Fix folder migration for MySQL < 5.7. Search: Fix not being able to clear sort value. Tempo: Fix span name being dropped from the query. PanelChrome: Implement hover header. * Update to 9.3.7 Alerting: Validate that tags are 100 characters or less. Expressions: Fixes the issue showing expressions editor. Logs: Fix stats not being updated when log results change. Plugins: Fix circular reference in customOptions leading to MarshalJSON errors. Time Series Panel: Fix legend text selection in Firefox. * Update to 9.3.6 QueryEditorRow: Fixes issue loading query editor when data source variable selected. * Update to 9.3.4 Prometheus: Add default editor configuration. TextPanel: Refactor to functional component. Alerting: Fix webhook to use correct key for decrypting token. Alerting: Set error annotation on EvaluationError regardless of underlying error type. Datasources: Fix Proxy by UID Failing for UIDs with a Hyphen. Fix creating of span link with no tags. Elasticsearch: Fix failing requests when using SigV4. Elasticsearch: Fix toggle-settings are not shown correctly. Explore: Be sure time range key bindings are mounted after clear. Explore: Unsync time ranges when a pane is closed. Logs: Lines with long words do not break properly. Loki: Fix misaligned derived fields settings. Query Builder: Fix max width of input component to prevent overflows. Search: Auto focus input elements. Search: Fix empty folder message showing when by starred dashboards. Table Panel: Fix image of image cell overflowing table cell and cells ignoring text alignment setting when a data link is added. * Update to 9.3.2 Graphite: Process multiple queries to Graphite plugin. API: Fix delete user failure due to quota not enabled. Accessibility: Improved keyboard accessibility in BarGauge. Accessibility: Improved keyboard accessibility in BigValue. Alerting: Use the QuotaTargetSrv instead of the QuotaTarget in quota check. AzureMonitor: Automate location retrieval. AzureMonitor: Fix bad request when setting dimensions. BarChart: Fix value mappings. Build: Streamline and sync dockerfiles. Build: Unified dockerfile for all builds. CloudWatch: Fix - make sure dimensions are propagated to alert query editor. Cloudwatch: Fix deeplink with default region. Command Palette: Fix not being able to type if triggered whilst another modal is open. Command Palette: Maintain page state when changing theme. Dashboards: Fix 'Make Editable' button not working in Dashboard Settings. Dashboards: Show error when data source is missing. Datasource: Fix - apply default query also to queries in new panels. Dropdown: Menu now closes correctly when selecting options on touch devices. Influx: Query segment menus now position correctly near the bottom of the screen. Login: Fix failure to login a new user via an external provider if quota are enabled. Loki/Prometheus: Fix wrong queries executed in split view. Loki: Fix wrongly escaped label values when using LabelFilter. Navigation: Prevent app crash when importing a dashboard with a uid of `home`. Panel Edit: Fix data links edit icons being off screen when provided title is too long. Prometheus: Fix exemplar fill color to match series color in time series. Prometheus: Fix exemplars not respecting corresponding series display status. StateTimeline: Fix negative infinity legend/tooltip from thresholds. Table: Fixes row border style not showing and colored rows blending together. Tempo: Fix TraceQL autocomplete issues. TimePicker: Prevent TimePicker overflowing viewport on small screens. TimeRangePicker: Fix recently ranges only not showing all recent ranges. TimeZonePicker: Scroll menu correctly when using keyboard controls. * Update to 9.3.1 Connections: Update "Your connections/Data sources" page. Accessibility: Increase badge constrast to be WCAG AA compliant. * Update to 9.3.0 Alerting: Enable interpolation for notification policies in file provisioning. Azure Monitor Logs: Avoid warning when the response is empty. Azure Monitor: Add support to customized routes. Canvas: Add icon value mapping. CloudWatch: Cross-account querying support. Docs: Update `merge-pull-request.md` regarding backport policies. GaugePanel: Setting the neutral-point of a gauge. Geomap: Improve location editor. Internationalization: Enable internationalization by default. Logs: Add `Download logs` button to log log-browser. Loki: Add `gzip` compression to resource calls. Loki: Add improvements to loki label browser. Loki: Make label browser accessible in query builder. Loki: Remove raw query toggle. Middleware: Add CSP Report Only support. Navigation: Prevent viewer role accessing dashboard creation, import and folder creation. OAuth: Refactor OAuth parameters handling to support obtaining refresh tokens for Google OAuth. Oauth: Display friendly error message when role_attribute_strict=true and no valid role found. Preferences: Add confirmation modal when saving org preferences. PublicDashboards: Orphaned public dashboard deletion script added. Query Editor: Hide overflow for long query names. Solo Panel: Configurable timezone. TablePanel: Add support for Count calculation per column or per entire dataset. Tempo: Send the correct start time when making a TraceQL query. Various Panels: Remove beta label from Bar Chart, Candlestick, Histogram, State Timeline, & Status History Panels. Access Control: Clear user's permission cache after resource creation. Accessibility: Improve keyboard accessibility in `AnnoListPanel`. Accessibility: Improve keyboard accessibility in `Collapse`. `GettingStarted` panel. Accessibility: Improve keyboard accessibility of `FilterPill`. Admin: Fix broken links to image assets in email templates. Azure Monitor: Fix namespace selection for storageaccounts. Calcs: Fix difference percent in legend. DataLinks: Improve Data-Links AutoComplete Logic. Explore: Fix a11y issue with logs navigation buttons. Heatmap: Fix blurry text & rendering. Heatmap: Fix tooltip y range of top and bottom buckets in calculated heatmaps. Logs: Fix misalignment of LogRows. Navigation: Stop clearing search state when opening a result in a new tab. OptionsUI: SliderValueEditor does not get auto focused on slider change. PanelEdit: Fixes bug with not remembering panel options pane collapse/expand state. Quota: Fix failure in store due to missing scope parameters. Quota: Fix failure when checking session limits. StateTimeline: Prevent label text from overflowing state rects. Tempo: Fix search table duration unit. TraceView: Fix broken rendering when scrolling in Dashboard panel in Firefox. GrafanaUI: Add disabled option for menu items. * Update to 9.2.4 Access Control: Add an endpoint for setting several managed resource permissions. Accessibility: Increase `Select` placeholder contrast to be WCAG AA compliant. Alerting: Append org ID to alert notification URLs. Alerting: Make the Grouped view the default one for Rules. Build: Remove unnecessary alpine package updates. Google Cloud Monitoring: Set frame interval to draw null values. Instrumentation: Expose when the binary was built as a gauge. Loki: Preserve `X-ID-Token` header. Search: Reduce requests in folder view. TimeSeries: More thorough detection of negative values for auto-stacking direction. Alerting: Attempt to preserve UID from migrated legacy channel. Alerting: Fix response is not returned for invalid Duration in Provisioning API. Alerting: Fix screenshot is not taken for stale series. Auth: Fix admins not seeing pending invites. MSSQL/Postgres: Fix visual query editor filter disappearing. Tempo: Fix dropdown issue on tag field focus. Timeseries: Fix null pointer when matching fill below to field. Toolkit: Fix Webpack less-loader config. * Update to 9.2.3 Docs: Add information about DB version support to upgrade guide. Footer: Update footer release notes link to Github changelog. Prometheus: Do not drop errors in streaming parser. Prometheus: Flavor/version configuration. Prometheus: Provide label values match parameter API when supported prometheus instance is configured. Security: Upgrade x/text to version unaffected by CVE-2022-32149. Auth: Fix GF_AUTH_JWT_URL_LOGIN env variable doesn't work. Live: Explicitly reply with http 200. Prometheus: Fix builder operation mode changing multiselect to single select behaviour. Security: Fix vulnerabilities in webpack loader- utils. * Update to 9.2.2 Alerting: Add support for wecom apiapp. Canvas: Improve resource picker initialization. Canvas: Improve text element readability. CloudWatch: Make sure adoption tracking is done on valid, migrated queries. Dashboard: Alerts user to incorrect tag format for JSON import. MSSQL: Support tables from all schemas. Opentsdb: Allow template variables for filter keys. QueryEditor: Revert components from grafana-ui. Browse: Fix General folder not showing in FolderPicker. Elasticsearch: Fix calculation of trimEdges in alert mode. Elasticsearch: Fix trimEdges delete logic in alert mode. GoogleOAuth: Unlock User Admin UI. LogContext: Fix wrong color of `show context` icon in light theme. Loki: Fix adding of adhoc filters to stream selector when query with empty stream selector. Loki: Fix double stringified log-lines when copied via Copy button. Loki: Fix explain section about $__interval variable. Loki: Remove already selected options from next label filter options in builder. NodeGraph: Fix rendering issues when values of arc are over 1. PublicDashboards: Fix hidden queries execution. Tempo: Fix Node Graph visualization type in dashboard. TimeSeries: Fix stacking when first value is negative zero. TimeseriesPanel: Fix variables in data links. User: Fix externalUserId not being populated. We added some components a bit too early to @grafana/ui in 9.2 so we are moving them back to @grafana/experimental. If you used any of these components AccessoryButton EditorFieldGroup EditorHeader EditorField EditorRow EditorList EditorRows EditorSwitch FlexItem Stack InlineSelect InputGroup Space Please use them from grafana/experimental from now on. * Update to 9.2.1 Alerting: Improve notification policies created during migration. AzureAD: Add option to force fetch the groups from the Graph API. Docs: Note end of release notes publication. Inspect: Handle JSON tab crash when the provided object is too big to stringify. TablePanel: Footer now updates values on column filtering. Alerting: Fix email image embedding on Windows. Alerting: Fix mathexp.NoData for ConditionsCmd. Legacy Alerting: Fix duration calculation when testing a rule. Loki: Propagate additional headers from Grafana to Loki when querying data. Search: Sort alphabetically in the folder view, increase the limit of the folder search from 50 to 1000. TablePanel: Fix last table column to be centered. Grafana UI: Export prop types for queryfield, modal and field components. Toolkit: Fix `Cannot use import statement outside...` error in tests. * Update to 9.2.0 Alerting: Add Notification error feedback on contact points view. Alerting: Allow created by to be manually set when there's no creator for silences. Alerting: Expose info about notification delivery errors in a new /receivers endpoint. Alerting: Update imported prometheus alertmanager version. Alerting: Write and Delete multiple alert instances. Core: Implement aria attributes for query rows, improve a11y. DevEnv: Adds docker block for clickhouse. Docker: removes unneccesary use of edge repo. Explore: Revert split pane resize feature. Frontend: Make local storage items propagate to different tabs immediately. PublicDashboards: Allow disabling an existent public dashboard if it. QueryEditorRow: Only pass error to query editor if panel is not in a loading state. XYChart: Beta release. Alerting: Start ticker only when scheduler starts. Alerting: Fix pq: missing FROM- clause for table "a". AzureMonitor: Correctly update subscriptions value in ARG editor. Chore: Regenerate swagger specification and fix validation failures. Correlations: Only return correlation for which both source and target datasources exist. Explore: Prevent panes from disappearing when resizing window in split view. Links: Fix opening links from different orgs on the same tab. LogContext: Fix scroll position in upper context group. Logs: Show copy button independently from context. Loki/Prometheus: Fix adding of ad hoc filters when jumping from dashboard to explore. Loki: Add support for range aggregations with by grouping. Loki: Fix label-value escaping in context query. Loki: Fix redundant escaping in adhoc filter with regex match. PanelEdit: Fixes resize pane border and spacing issues. RBAC: Redirect to /login when forceLogin is set. Security: Fix CVE-2022-27664. StateTimeline: Fix tooltip showing erroneously in shared crosshair dashboards. Tempo: Fix unexpected trimming of leading zeroes in traceID. Tracing: Fix bug where errors are not reported to OpenTelemetry. * Update to 9.1.8 Alerting: Fix evaluation interval validation. Alerting: Fix migration to create rules with group index 1. Alerting: Fix migration to not add label "alertname". Azure Monitor: Fix empty Logs response for Alerting. Azure Monitor: Fix subscription selector when changing data sources. Google Cloud Monitoring: Fix bucket bound for distributions. * Update to 9.1.7 CloudWatch: Add missing AWS/Prometheus metrics. Explore: Add feature tracking events. Graphite: Add error information to graphite queries tracing. Prometheus: Restore FromAlert header. Search: Add search index configuration options. Thresholds: Add option for dashed line style. Alerting: Fix default query's data source when no default datasource specified. Alerting: Fix mathexp.NoData cannot be reduced. Alerting: Skip unsupported file types on provisioning. AzureMonitor: Ensure resourceURI template variable is migrated. Dashboard: Fix plugin dashboard save as button. Docs: Fix decimals: auto docs for panel edit. Fix: RBAC handle `error no resolver` found. LibraryPanelSearch: Refactor and fix hyphen issue. Live: Fix live streaming with `live-service-web-worker` feature flag enabled. QueryField: Fix wrong cursor position on autocomplete. * Update to 9.1.6 DataSource: Adding possibility to hide queries from the inspector. Inspect: Hide Actions tab when it is empty. PanelMenu: Remove hide legend action as it was showing on all panel types. Provisioning Contact points: Support disableResolveMessage via YAML. PublicDashboards: Support subpaths when generating pubdash url. Alerting: Fix legacy migration crash when rule name is too long. Alerting: Fix send resolved notifications. Azure Monitor: Fix migration issue with MetricDefinitionsQuery template variable query types. Browse: Hide dashboard actions if user does not have enough permission. ElasticSearch: Fix dispatching queries at a wrong time. Panel: Disable legends when showLegend is false prior to schema v37. Prometheus: Fix metadata requests for browser access mode. Search: Avoid requesting all dashboards when in Folder View. TablePanel/StatPanel: Fix values not being visible when background transparent. * Update to 9.1.5 Alerting: Sanitize invalid label/annotation names for external alertmanagers. Alerting: Telegram: Truncate long messages to avoid send error. DisplayProcessor: Handle reverse-ordered data when auto-showing millis. Heatmap: Add option to reverse color scheme. PluginLoader: Alias slate-react as @grafana/slate-react. Search: Add substring matcher, to bring back the old dashboard search behavior. Traces: More visible span colors. Alerting: Fix incorrect propagation of org ID and other fields in rule provisioning endpoints. Alerting: Resetting the notification policy tree to the default policy will also restore default contact points. AzureMonitor: Fix custom namespaces. AzureMonitor: Fix issue where custom metric namespaces are not included in the metric namespace list. CloudWatch: Fix display name of metric and namespace. Cloudwatch: Fix annotation query serialization issue. Dashboard: Fix issue where unsaved changes warning would appear even after save, and not being able to change library panels. Dashboard: Hide overflow content for single left pane. Loki: Fix a bug where adding adhoc filters was not possible. * Update to 9.1.4 GrafanaUI: Fixes Chrome issue for various query fields. * Update to 9.1.3 API: Do not expose user input in datasource error responses. Library Panel: Allow to delete them when deprecated. Plugins Catalog: Allow to filter plugins using special characters. Alerting: Fix UI bug when setting custom notification policy group by. AppRootPage: Fix issue navigating between two app plugin pages. Correlations: Use correct fallback handlers. RBAC: Fix deleting empty snapshots. LibraryElements: Fix inability to delete library panels under MySQL. Metrics: fix `grafana_database_conn_*` metrics, and add new `go_sql_stats_*` metrics as eventual replacement. TestData DB: Fix node graph not showing when the `Data type` field is set to `random`. * Deprecations The `grafana_database_conn_*` metrics are deprecated, and will be removed in a future version of Grafana. Use the `go_sql_stats_*` metrics instead. * Update to 9.1.2 AdHoc variable: Correctly preselect datasource when provisioning. AzureMonitor: Added ARG query function for template variables. Dashboards: Persist details message when navigating through dashboard save drawer's tabs. Dashboards: Correctly migrate mixed data source targets. Elasticsearch: Use millisecond intervals for alerting. Elasticsearch: Use millisecond intervals in frontend. Geomap: Local color range. Plugins Catalog: Use appSubUrl to generate plugins catalog urls. Rendering: Add support for renderer token. Alerting: Fix saving of screenshots uploaded with a signed url. AngularPanels: Fixing changing angular panel options not taking having affect when coming back from panel edit. Explore: Improve a11y of query row collapse button. Geomap: Fix tooltip display. QueryEditorRow: Filter data on mount. Search: Show all dashboards in the folder view. Tracing: Fix the event attributes in opentelemetry tracing. GrafanaUI: Fix styles for invalid selects & DataSourcePicker. * Update to 9.1.1 Cloud Monitoring: Support SLO burn rate. Schema: Restore "hidden" in LegendDisplayMode. Timeseries: Revert the timezone(s) property name change back to singular. Alerting: Fix links in Microsoft Teams notifications. Alerting: Fix notifications for Microsoft Teams. Alerting: Fix width of Adaptive Cards in Teams notifications. ColorPickerInput: Fix popover in disabled state. Decimals: Fixes auto decimals to behave the same for positive and negative values. Loki: Fix unique log row id generation. Plugins: Fix file extension in development authentication guide. TimeSeries: Fix jumping legend issue. TimeSeries: Fix memory leak on viz re-init caused by KeyboardPlugin. TimePicker: Fixes relative timerange of less than a day not displaying. GrafanaUI: Fixes ClipboardButton to always keep multi line content. * Update to 9.1.0 API: Allow creating teams with a user defined identifier. Alerting: Adds interval and For to alert rule details. Alerting: Extend PUT rule-group route to write the entire rule group rather than top-level fields only. Alerting: Use Adaptive Cards in Teams notifications. Azure Monitor: Add Network Insights Dashboard. Chore: Improve logging of unrecoverable errors. Correlations: Add UpdateCorrelation HTTP API. Dashboard: Reverted the changes of hiding multi-select and all variable in the datasource picker. Geomap: Add alpha day/night layer. Geomap: Add measuring tools. GrafanaUI: Add success state to ClipboardButton. Heatmap: Replace the heatmap panel with new implementation. KVStore: Allow empty value in kv_store. Prometheus: Promote Azure auth flag to configuration. Search: Display only dashboards in General folder of Search Folder View. Status history/State timeline: Support datalinks. Transform: Add a limit transform. Transformations: Add standard deviation and variance reducers. API: Fix snapshot responses. Access Control: Fix permission error during dashboard creation flow. Access Control: Set permissions for Grafana's test data source. Alerting: Fix migration failure. BarGauge: Show empty bar when value, minValue and maxValue are all equal. Dashboard: Fix color of bold and italics text in panel description tooltip. Loki: Fix passing of query with defaults to code mode. Loki: Fix producing correct log volume query for query with comments. Loki: Fix showing of unusable labels field in detected fields. Tracing: Fix OpenTelemetry Jaeger context propagation. Alerting: AlertingProxy to elevate permissions for request forwarded to data proxy when RBAC enabled. Plugins: Only pass `rootUrls` field in request when not empty. Alert notifications to Microsoft Teams now use Adaptive Cards instead of Office 365 Connector Cards. Starting at 9.1.0, existing heatmap panels will start using a new implementation. This can be disabled by setting the `useLegacyHeatmapPanel` feature flag to true. It can be tested on a single dashbobard by adding `?__feature.useLegacyHeatmapPanel=true` to any dashboard URL. The most notable changes are: Significantly improved rendering performance When calculating heatmaps, the buckets are now placed on reasonable borders (1m, 5m, 30s etc) Round cells are no longer supported * Update to 9.0.9 AuthNZ: Security fixes for CVE-2022-35957 and CVE-2022-36062. * Update to 9.0.8 Alerting: Hide "no rules" message when we are fetching from data sources. Alerting: AlertingProxy to elevate permissions for request forwarded to data proxy when RBAC enabled. * Update to 9.0.7 CloudMonitoring: Remove link setting for SLO queries. GrafanaUI: Render PageToolbar's leftItems regardless of title's presence. * Update to 9.0.6 Access Control: Allow org admins to invite new users to their organization. Grafana/toolkit: Fix incorrect image and font generation for plugin builds. Prometheus: Fix adding of multiple values for regex operator. UI/Card: Fix card items always having pointer cursor. * Update to 9.0.5 Access control: Show dashboard settings to users who can edit dashboard. Alerting: Allow the webhook notifier to support a custom Authorization header. Plugins: Add signature wildcard globbing for dedicated private plugin type. Prometheus: Don't show errors from unsuccessful API checks like rules or exemplar checks. Access control: Allow organisation admins to add existing users to org. Alerting: Fix alert panel instance- based rules filtering. Apps: Fixes navigation between different app plugin pages. Cloudwatch: Upgrade grafana-aws-sdk to fix auth issue with secret keys. Loki: Fix `show context` not working in some occasions. RBAC: Fix permissions on dashboards and folders created by anonymous users. * Update to 9.0.4 Browse/Search: Make browser back work properly when visiting Browse or search. Logs: Improve getLogRowContext API. Loki: Improve handling of empty responses. Plugins: Always validate root URL if specified in signature manfiest. Preferences: Get home dashboard from teams. SQLStore: Support Upserting multiple rows. Traces: Add more template variables in Tempo & Zipkin. Traces: Remove serviceMap feature flag. Access Control: Fix missing folder permissions. Access control: Fix org user removal for OSS users. Alerting: Fix Slack notifications. Alerting: Preserve new-lines from custom email templates in rendered email. Log: Fix text logging for unsupported types. Loki: Fix incorrect TopK value type in query builder. * Update to 9.0.3 Access Control: Allow dashboard admins to query org users. Alerting: Add method to provisioning API for obtaining a group and its rules. Alerting: Allow filtering of contact points by name. Alerting: Disable /api/admin/pause-all-alerts with Unified Alerting. Annotations: Use point marker for short time range annotations. AzureMonitor: Update UI to experimental package. AzureMonitor: Update resource and namespace metadata. CloudWatch: Remove simplejson in favor of 'encoding/json'. DashboardRow: Collapse shortcut prevent to move the collapsed rows. Navigation: Highlight active nav item when Grafana is served from subpath. Plugins: InfluxDB datasource - set epoch query param value as "ms". Plugins: InfluxDB update time range query. StateTimeline: Try to sort time field. API: Do not validate/save legacy alerts when saving a dashboard if legacy alerting is disabled. Alerting: Add method to reset notification policy tree back to the default. Alerting: Fix Teams notifier not failing on 200 response with error. Alerting: Fix bug where state did not change between Alerting and Error. Alerting: Fix consistency errors in OpenAPI documentation. Alerting: Fix normalization of alert states for panel Alerting: Provisioning API respects global rule quota. CSRF: Fix additional headers option. Chore: Bump parse-url to 6.0.2 to fix security vulnerabilities. Chore: Fix CVE-2020-7753. Chore: Fix CVE-2021-3807. Chore: Fix CVE-2021-3918. Chore: Fix CVE-2021-43138. Chore: Fix CVE-2022-0155. Dashboard: Fixes tooltip issue with TimePicker and Setting buttons. Dashboard: Prevent unnecessary scrollbar when viewing single panel. Logs: Fixed wrapping log lines from detected fields. Loki: Add missing operators in label filter expression. Loki: Fix error when changing operations with different parameters. Loki: Fix suggesting of correct operations in query builder. Plugins: InfluxDB variable interpolation fix for influxdbBackendMigration feature flag. SQLstore: Fix fetching an inexistent playlist. Security: Fixes for CVE-2022-31107 and CVE-2022-31097. Snapshots: Fix deleting external snapshots when using RBAC. Table: Fix scrollbar being hidden by pagination. Templating: Changing between variables with the same name now correctly triggers a dashboard refresh. Time series panel: Fix an issue with stacks being not complete due to the incorrect data frame length. * Update to 9.0.2 Alerting: Add support for images in Pushover alerts. Alerting: Don't stop the migration when alert rule tags are invalid. Alerting: Skip the default data source if incompatible. AzureMonitor: Parse non-fatal errors for Logs. OAuth: Restore debug log behavior. Plugins: Improved handling of symlinks. Alerting: Code-gen parsing of URL parameters and fix related bugs. Annotations: Fix annotation autocomplete causing panels to crash. Barchart: Fix warning not showing. CloudWatch: Enable custom session duration in AWS plugin auth. Dashboards: Fixes issue with the initial panel layout counting as an unsaved change. Plugins: Use a Grafana specific SDK logger implementation for core plugins. Search: Fix pagination in the new search page. * Update to 9.0.1 Alerting: Add support for image annotation in Alertmanager alerts. Alerting: Add support for images in SensuGo alerts. Alerting: Add support for images in Threema alerts. Alerting: Adds Mimir to Alertmanager data source implementation. Alerting: Invalid setting of enabled for unified alerting should return error. AzureMonitor: Clean namespace when changing the resource. AzureMonitor: Update supported namespaces and filter resources by the right type. CLI: Allow relative symlinks in zip archives when installing plugins. Dashboard: Don't show unsaved changes modal for automatic schema changes. Dashboard: Unsaved changes warning should not trigger when only pluginVersion has changed. Expression: Execute hidden expressions. Geomap: Support showing tooltip content on click (not just hover). Heatmap: Remove alpha flag from new heatmap panel. Instrumentation: Define handlers for requests that are not handled with named handlers. Log Panel: Improve log row hover contrast and visibility. Logs: Handle backend- mode errors in histogram. Loki: Do not show histogram for instant queries. Loki: Handle data source configs with path in the url. Loki: Handle invalid query type values. OAuth: Redirect to login if no oauth module is found or if module is not configured. OptionsUI: Move internal options editors out of @grafana/ui. Prometheus: Don't show undefined for step in collapsed options in query editor when value is "auto". Prometheus: Show query patterns in all editor modes for Prometheus and Loki. Tempo: Add link to Tempo Search with node service selected. Time Series Panel: Add Null Filling and "No Value" Support. TimeSeries: Add an option to set legend width. Timeseries: Improve cursor Y sync behavior. Traces: Do not use red in span colors as this looks like an error. Alerting: Fix AM config overwrite when SQLite db is locked during sync. Alerting: Fix alert instances filtering for prom rules. Alerting: Fix alert rule page crashing when datasource contained URL unsafe characters. Alerting: Fix automatically select newly created folder option. Alerting: Fix removal of notification policy without labels matchers. CloudWatch: Allow hidden queries to be executed in case an ID is provided. Dashboard: Prevent non-repeating panels being dropped from repeated rows when collapsed/expanded. Dashboards: Fix folder picker not showing correct results when typing too fast. Datasource: Prevent panic when proxying for non-existing data source. Explore: Fix log context scroll to bottom. Explore: Revert "Remove support for compact format URLs". Expressions: Fixes dashboard schema migration issue that casued Expression datasource to be set on panel level. Formatting: Fixes valueFormats for a value of 0. GrafanaData: Fix week start for non-English browsers. LibraryPanel: Resizing a library panel to 6x3 no longer crashes the dashboard on startup. LogRow: Fix placement of icon. Loki: Fix bug in labels framing. Loki: Fix issues with using query patterns. Loki: Fix showing of duplicated label values in dropdown in query builder. MSSQL: Fix ParseFloat error. Panels: Fixes issue with showing 'Cannot visualize data' when query returned 0 rows. Playlists: Disable Create Playlist buttons for users with viewer role. Plugins: Fix typo in plugin data frames documentation. Prometheus: Fix body not being included in resource calls if they are POST. RolePicker: Fix submenu position on horizontal space overflow. Tracing: Fix trace links in traces panel. Support for compact Explore URLs is deprecated and will be removed in a future release. Until then, when navigating to Explore using the deprecated format the URLs are automatically converted. If you have existing links pointing to Explore update them using the format generated by Explore upon navigation. You can identify a compact URL by its format. Compact URLs have the left (and optionally right) url parameter as an array of strings, for example `&left=["now-1h","now"...]`. The standard explore URLs follow a key/value pattern, for example `&left={"datasource":"test"...}`. Please be sure to check your dashboards for any hardcoded links to Explore and update them to the standard URL pattern. * Update to 9.0.0 API: Add GET /api/annotations/:annotationId endpoint. API: Add endpoint for updating a data source by its UID. AccessControl: Add enterprise only setting for rbac permission cache. AccessControl: Document basic roles changes and provisioning V2. AccessControl: Enable RBAC by default. AddDataSourceConfig: Remove deprecated checkHealth prop. Alerting: Add Image URLs to Microsoft Teams notifier. Alerting: Add RBAC actions and role for provisioning API routes. Alerting: Add Screenshot URLs to Pagerduty Notifier. Alerting: Add a "Reason" to Alert Instances to show underlying cause of state. Alerting: Add a general screenshot service and alerting- specific image service. Alerting: Add image url or file attachment to email notifications. Alerting: Add image_urls to OpsGenie notification details. Alerting: Add notification policy flow chart. Alerting: Attach image URL to alerts in Webhook notifier format. Alerting: Attach image URLs or upload files to Discord Alerting: Attach image URLs to Google Chat notifications. Alerting: Attach screenshot data to Unified Alerting Alerting: Create folder for alerting when start from the scratch. Alerting: Modify alertmanager endpoints for proxying using the datasource UID. Alerting: Modify endpoint for testing a datasource rule using the UID. Alerting: Modify prometheus endpoints for proxying using the datasource UID. Alerting: State Manager takes screenshots. Alerting: Use UID scope for folders authorization. Alerting: modify ruler endpoints for proxying using the datasource UID. Angular: Adds back two angular directives that are still used by remaining angular bits and plugins. Azure Monitor: Add Resource Picker to Metrics Queries. Azure Monitor: Add search feature to resource picker. AzureMonitor: Add support for selecting multiple options when using the equals and not equals dimension filters. AzureMonitor: Remove deprecated code. Build: Change names to PascalCase to match. Chore: Remove deprecated DataSourceAPI methods. Chore: Upgrade typescript to 4.6.4. Cloud Monitoring: Use new annotation API. CloudMonitoring: Allow to set a custom value or disable graph_period. CloudWatch: Add generic filter component to variable editor. CloudWatch: Added missing AWS/AppRunner metrics. CloudWatch: Enable support for dynamic labels with migrated alias patterns. Cloudwatch: Pass label in deep link. Cloudwatch: Use new annotation API. Dashboard: Validate dashboards against schema on save. DashboardPickerByID: Add option to exclude dashboards. DashboardPickerById: Add optionLabel prop. Dashboards: Display values of 0 with the configured decimal places. Data: Remove deprecated types and functions from valueMappings. Elasticsearch: Remove browser access mode. Elasticsearch: Remove support for versions after their end of the life (<7.10.0). Encryption: Add support for multiple data keys per day. Encryption: Enable envelope encryption by default. Explore: Remove support for legacy, compact format URLs. Explore: Skip Angular error handling when Angular support is disabled. Explore: simplify support for multiple query editors. FeatureToggles: Support changing feature toggles with URL parameters. FileUpload: Make component accessible by keyboard navigation. Formatting: Make SI number formats more robust. Graph: Deprecate Graph (old) and make it no longer a visualization option for new panels. IconButton: IconButtons are now correctly aligned in Safari. Logger: Enable new logging format by default. Loki: Add more query patterns. Loki: Enable new visual query builder by default. Loki: use the same dataframe-format for both live and normal queries. OAuth: Make allowed email domain case insensitive. Panels: Use the No value option when showing the no data message. Plugins: Remove plugin list panel. Query History: Enable new query history by default. QueryEditorRow: Show query errors next to query in a consistent way across Grafana. SAML: Implement Name Templates for assertion_attribute_name option. Service accounts: Do not display service accounts assigned to team. Settings: Use Grafana Azure SDK to pass Azure env vars for external plugins. Shortcuts: Add shortcut to show shortcuts to the list of shortcuts. Traces Panel: Add new Traces Panel visualization. Traces: Filter by service/span name and operation in Tempo and Jaeger. Transformations: Allow more complex regex expressions in `Rename by regex`. grafana/ui: Add default type="button" to