From null at suse.de Mon Jun 3 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 08:30:02 -0000 Subject: SUSE-SU-2024:1895-1: important: Security update for glibc Message-ID: <171740340259.1713.10739640343592391605@smelt2.prg2.suse.org> # Security update for glibc Announcement ID: SUSE-SU-2024:1895-1 Rating: important References: * bsc#1221940 * bsc#1223423 * bsc#1223424 * bsc#1223425 Cross-References: * CVE-2024-33599 * CVE-2024-33600 * CVE-2024-33601 * CVE-2024-33602 CVSS scores: * CVE-2024-33599 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-33600 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-33601 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-33602 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves four vulnerabilities can now be installed. ## Description: This update for glibc fixes the following issues: * CVE-2024-33599: Fixed a stack-based buffer overflow in netgroup cache in nscd (bsc#1223423) * CVE-2024-33600: Avoid null pointer crashes after notfound response in nscd (bsc#1223424) * CVE-2024-33600: Do not send missing not-found response in addgetnetgrentX in nscd (bsc#1223424) * CVE-2024-33601, CVE-2024-33602: Fixed use of two buffers in addgetnetgrentX ( bsc#1223425) * CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425) * Avoid creating userspace live patching prologue for _start routine (bsc#1221940) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1895=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1895=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1895=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1895=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1895=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1895=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1895=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1895=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1895=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1895=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1895=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1895=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1895=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1895=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1895=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1895=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1895=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1895=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1895=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1895=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1895=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1895=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1895=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1895=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1895=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1895=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586 i686) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-devel-static-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * glibc-extra-debuginfo-2.31-150300.83.1 * glibc-utils-src-debugsource-2.31-150300.83.1 * glibc-utils-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-utils-debuginfo-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * openSUSE Leap 15.3 (noarch) * glibc-info-2.31-150300.83.1 * glibc-html-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * openSUSE Leap 15.3 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-utils-32bit-debuginfo-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-utils-32bit-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-devel-32bit-2.31-150300.83.1 * glibc-devel-32bit-debuginfo-2.31-150300.83.1 * glibc-devel-static-32bit-2.31-150300.83.1 * glibc-profile-32bit-2.31-150300.83.1 * openSUSE Leap 15.3 (aarch64_ilp32) * glibc-profile-64bit-2.31-150300.83.1 * glibc-64bit-debuginfo-2.31-150300.83.1 * glibc-utils-64bit-2.31-150300.83.1 * glibc-64bit-2.31-150300.83.1 * glibc-locale-base-64bit-debuginfo-2.31-150300.83.1 * glibc-devel-64bit-debuginfo-2.31-150300.83.1 * glibc-locale-base-64bit-2.31-150300.83.1 * glibc-utils-64bit-debuginfo-2.31-150300.83.1 * glibc-devel-static-64bit-2.31-150300.83.1 * glibc-devel-64bit-2.31-150300.83.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * glibc-utils-src-debugsource-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-utils-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-devel-static-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-utils-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * openSUSE Leap 15.5 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-utils-32bit-debuginfo-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-utils-32bit-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-devel-32bit-2.31-150300.83.1 * glibc-devel-32bit-debuginfo-2.31-150300.83.1 * glibc-devel-static-32bit-2.31-150300.83.1 * glibc-profile-32bit-2.31-150300.83.1 * openSUSE Leap 15.5 (noarch) * glibc-info-2.31-150300.83.1 * glibc-html-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * Basesystem Module 15-SP5 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * Basesystem Module 15-SP5 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.31-150300.83.1 * glibc-utils-src-debugsource-2.31-150300.83.1 * glibc-utils-2.31-150300.83.1 * glibc-devel-static-2.31-150300.83.1 * glibc-utils-debuginfo-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * Development Tools Module 15-SP5 (x86_64) * glibc-devel-32bit-2.31-150300.83.1 * glibc-devel-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * glibc-utils-src-debugsource-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-utils-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-devel-static-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-utils-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-devel-32bit-2.31-150300.83.1 * glibc-devel-32bit-debuginfo-2.31-150300.83.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * glibc-utils-src-debugsource-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-utils-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-devel-static-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-utils-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-devel-32bit-2.31-150300.83.1 * glibc-devel-32bit-debuginfo-2.31-150300.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * glibc-utils-src-debugsource-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-utils-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-devel-static-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-utils-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-devel-32bit-2.31-150300.83.1 * glibc-devel-32bit-debuginfo-2.31-150300.83.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * glibc-utils-src-debugsource-2.31-150300.83.1 * glibc-devel-static-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-utils-debuginfo-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-utils-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-32bit-debuginfo-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-devel-32bit-2.31-150300.83.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * glibc-utils-src-debugsource-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-utils-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-devel-static-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-utils-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-devel-32bit-2.31-150300.83.1 * glibc-devel-32bit-debuginfo-2.31-150300.83.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * glibc-utils-src-debugsource-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-utils-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-devel-static-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-utils-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-devel-32bit-2.31-150300.83.1 * glibc-devel-32bit-debuginfo-2.31-150300.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * glibc-utils-src-debugsource-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-utils-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-devel-static-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-utils-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-devel-32bit-2.31-150300.83.1 * glibc-devel-32bit-debuginfo-2.31-150300.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * glibc-utils-src-debugsource-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-utils-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-devel-static-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-utils-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-devel-32bit-2.31-150300.83.1 * glibc-devel-32bit-debuginfo-2.31-150300.83.1 * SUSE Manager Proxy 4.3 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Manager Proxy 4.3 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Manager Server 4.3 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Manager Server 4.3 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-devel-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-extra-2.31-150300.83.1 * glibc-extra-debuginfo-2.31-150300.83.1 * glibc-utils-src-debugsource-2.31-150300.83.1 * nscd-debuginfo-2.31-150300.83.1 * glibc-utils-2.31-150300.83.1 * nscd-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-devel-static-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-utils-debuginfo-2.31-150300.83.1 * glibc-profile-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Enterprise Storage 7.1 (noarch) * glibc-info-2.31-150300.83.1 * glibc-lang-2.31-150300.83.1 * glibc-i18ndata-2.31-150300.83.1 * SUSE Enterprise Storage 7.1 (x86_64) * glibc-locale-base-32bit-2.31-150300.83.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-debuginfo-2.31-150300.83.1 * glibc-32bit-2.31-150300.83.1 * glibc-devel-32bit-2.31-150300.83.1 * glibc-devel-32bit-debuginfo-2.31-150300.83.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * glibc-locale-base-debuginfo-2.31-150300.83.1 * glibc-debugsource-2.31-150300.83.1 * glibc-devel-2.31-150300.83.1 * glibc-2.31-150300.83.1 * glibc-locale-base-2.31-150300.83.1 * glibc-debuginfo-2.31-150300.83.1 * glibc-locale-2.31-150300.83.1 ## References: * https://www.suse.com/security/cve/CVE-2024-33599.html * https://www.suse.com/security/cve/CVE-2024-33600.html * https://www.suse.com/security/cve/CVE-2024-33601.html * https://www.suse.com/security/cve/CVE-2024-33602.html * https://bugzilla.suse.com/show_bug.cgi?id=1221940 * https://bugzilla.suse.com/show_bug.cgi?id=1223423 * https://bugzilla.suse.com/show_bug.cgi?id=1223424 * https://bugzilla.suse.com/show_bug.cgi?id=1223425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 08:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 08:30:07 -0000 Subject: SUSE-SU-2024:1894-1: important: Security update for bind Message-ID: <171740340755.1713.12404389456042328882@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2024:1894-1 Rating: important References: * bsc#1219823 * bsc#1219826 * bsc#1219851 Cross-References: * CVE-2023-4408 * CVE-2023-50387 * CVE-2023-50868 CVSS scores: * CVE-2023-4408 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2023-50387: Fixed validating DNS messages containing a lot of DNSSEC signatures that could have let to a denial-of-service (bsc#1219823). * CVE-2023-50868: Fixed NSEC3 closest encloser proof that could have let to a denial-of-service (bsc#1219826). * CVE-2023-4408: Fixed parsing DNS messages with many different names that could have let to a denial-of-service (bsc#1219851). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1894=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1894=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1894=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1894=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * bind-devel-9.11.22-3.52.1 * bind-debugsource-9.11.22-3.52.1 * bind-debuginfo-9.11.22-3.52.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * bind-chrootenv-9.11.22-3.52.1 * liblwres161-debuginfo-9.11.22-3.52.1 * libirs161-9.11.22-3.52.1 * bind-utils-debuginfo-9.11.22-3.52.1 * libbind9-161-9.11.22-3.52.1 * libisc1107-9.11.22-3.52.1 * libisc1107-debuginfo-9.11.22-3.52.1 * bind-utils-9.11.22-3.52.1 * bind-debuginfo-9.11.22-3.52.1 * libbind9-161-debuginfo-9.11.22-3.52.1 * libirs161-debuginfo-9.11.22-3.52.1 * liblwres161-9.11.22-3.52.1 * bind-9.11.22-3.52.1 * libisccfg163-9.11.22-3.52.1 * libisccfg163-debuginfo-9.11.22-3.52.1 * libdns1110-debuginfo-9.11.22-3.52.1 * libisccc161-debuginfo-9.11.22-3.52.1 * bind-debugsource-9.11.22-3.52.1 * libdns1110-9.11.22-3.52.1 * libisccc161-9.11.22-3.52.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * python-bind-9.11.22-3.52.1 * bind-doc-9.11.22-3.52.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libisc1107-32bit-9.11.22-3.52.1 * libisc1107-debuginfo-32bit-9.11.22-3.52.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * bind-chrootenv-9.11.22-3.52.1 * liblwres161-debuginfo-9.11.22-3.52.1 * libirs161-9.11.22-3.52.1 * bind-utils-debuginfo-9.11.22-3.52.1 * libbind9-161-9.11.22-3.52.1 * libisc1107-9.11.22-3.52.1 * libisc1107-debuginfo-9.11.22-3.52.1 * bind-utils-9.11.22-3.52.1 * bind-debuginfo-9.11.22-3.52.1 * libbind9-161-debuginfo-9.11.22-3.52.1 * libirs161-debuginfo-9.11.22-3.52.1 * liblwres161-9.11.22-3.52.1 * bind-9.11.22-3.52.1 * libisccfg163-9.11.22-3.52.1 * libisccfg163-debuginfo-9.11.22-3.52.1 * libdns1110-debuginfo-9.11.22-3.52.1 * libisccc161-debuginfo-9.11.22-3.52.1 * bind-debugsource-9.11.22-3.52.1 * libdns1110-9.11.22-3.52.1 * libisccc161-9.11.22-3.52.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * python-bind-9.11.22-3.52.1 * bind-doc-9.11.22-3.52.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libisc1107-32bit-9.11.22-3.52.1 * libisc1107-debuginfo-32bit-9.11.22-3.52.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * bind-chrootenv-9.11.22-3.52.1 * liblwres161-debuginfo-9.11.22-3.52.1 * libirs161-9.11.22-3.52.1 * bind-utils-debuginfo-9.11.22-3.52.1 * libbind9-161-9.11.22-3.52.1 * libisc1107-9.11.22-3.52.1 * libisc1107-debuginfo-9.11.22-3.52.1 * bind-utils-9.11.22-3.52.1 * bind-debuginfo-9.11.22-3.52.1 * libbind9-161-debuginfo-9.11.22-3.52.1 * libirs161-debuginfo-9.11.22-3.52.1 * liblwres161-9.11.22-3.52.1 * bind-9.11.22-3.52.1 * libisccfg163-9.11.22-3.52.1 * libisccfg163-debuginfo-9.11.22-3.52.1 * libdns1110-debuginfo-9.11.22-3.52.1 * libisccc161-debuginfo-9.11.22-3.52.1 * bind-debugsource-9.11.22-3.52.1 * libdns1110-9.11.22-3.52.1 * libisccc161-9.11.22-3.52.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * python-bind-9.11.22-3.52.1 * bind-doc-9.11.22-3.52.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libisc1107-32bit-9.11.22-3.52.1 * libisc1107-debuginfo-32bit-9.11.22-3.52.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4408.html * https://www.suse.com/security/cve/CVE-2023-50387.html * https://www.suse.com/security/cve/CVE-2023-50868.html * https://bugzilla.suse.com/show_bug.cgi?id=1219823 * https://bugzilla.suse.com/show_bug.cgi?id=1219826 * https://bugzilla.suse.com/show_bug.cgi?id=1219851 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 08:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 08:30:09 -0000 Subject: SUSE-SU-2024:1893-1: important: Security update for gstreamer-plugins-base Message-ID: <171740340968.1713.9340805725782355436@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1893-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1893=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1893=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1893=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1893=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-1893=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * typelib-1_0-GstAudio-1_0-1.8.3-13.15.1 * gstreamer-plugins-base-debuginfo-1.8.3-13.15.1 * typelib-1_0-GstPbutils-1_0-1.8.3-13.15.1 * typelib-1_0-GstVideo-1_0-1.8.3-13.15.1 * typelib-1_0-GstRtp-1_0-1.8.3-13.15.1 * typelib-1_0-GstAllocators-1_0-1.8.3-13.15.1 * typelib-1_0-GstRtsp-1_0-1.8.3-13.15.1 * typelib-1_0-GstSdp-1_0-1.8.3-13.15.1 * typelib-1_0-GstTag-1_0-1.8.3-13.15.1 * gstreamer-plugins-base-devel-1.8.3-13.15.1 * typelib-1_0-GstFft-1_0-1.8.3-13.15.1 * gstreamer-plugins-base-debugsource-1.8.3-13.15.1 * typelib-1_0-GstApp-1_0-1.8.3-13.15.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libgstrtp-1_0-0-debuginfo-1.8.3-13.15.1 * libgstapp-1_0-0-1.8.3-13.15.1 * libgstrtsp-1_0-0-1.8.3-13.15.1 * libgstallocators-1_0-0-debuginfo-1.8.3-13.15.1 * libgstsdp-1_0-0-1.8.3-13.15.1 * gstreamer-plugins-base-debuginfo-1.8.3-13.15.1 * libgstallocators-1_0-0-1.8.3-13.15.1 * libgstvideo-1_0-0-1.8.3-13.15.1 * libgstriff-1_0-0-1.8.3-13.15.1 * libgstfft-1_0-0-debuginfo-1.8.3-13.15.1 * libgstriff-1_0-0-debuginfo-1.8.3-13.15.1 * libgstapp-1_0-0-debuginfo-1.8.3-13.15.1 * libgstaudio-1_0-0-debuginfo-1.8.3-13.15.1 * libgstrtsp-1_0-0-debuginfo-1.8.3-13.15.1 * libgstpbutils-1_0-0-1.8.3-13.15.1 * libgstfft-1_0-0-1.8.3-13.15.1 * gstreamer-plugins-base-debugsource-1.8.3-13.15.1 * libgstaudio-1_0-0-1.8.3-13.15.1 * libgstsdp-1_0-0-debuginfo-1.8.3-13.15.1 * libgstvideo-1_0-0-debuginfo-1.8.3-13.15.1 * gstreamer-plugins-base-1.8.3-13.15.1 * libgstpbutils-1_0-0-debuginfo-1.8.3-13.15.1 * libgsttag-1_0-0-1.8.3-13.15.1 * libgsttag-1_0-0-debuginfo-1.8.3-13.15.1 * libgstrtp-1_0-0-1.8.3-13.15.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * gstreamer-plugins-base-lang-1.8.3-13.15.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * gstreamer-plugins-base-debuginfo-32bit-1.8.3-13.15.1 * libgstaudio-1_0-0-32bit-1.8.3-13.15.1 * libgstapp-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * libgstpbutils-1_0-0-32bit-1.8.3-13.15.1 * libgstaudio-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * libgsttag-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * libgsttag-1_0-0-32bit-1.8.3-13.15.1 * libgstvideo-1_0-0-32bit-1.8.3-13.15.1 * libgstpbutils-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * libgstapp-1_0-0-32bit-1.8.3-13.15.1 * libgstvideo-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libgstrtp-1_0-0-debuginfo-1.8.3-13.15.1 * libgstapp-1_0-0-1.8.3-13.15.1 * libgstrtsp-1_0-0-1.8.3-13.15.1 * libgstallocators-1_0-0-debuginfo-1.8.3-13.15.1 * libgstsdp-1_0-0-1.8.3-13.15.1 * gstreamer-plugins-base-debuginfo-1.8.3-13.15.1 * libgstallocators-1_0-0-1.8.3-13.15.1 * libgstvideo-1_0-0-1.8.3-13.15.1 * libgstriff-1_0-0-1.8.3-13.15.1 * libgstfft-1_0-0-debuginfo-1.8.3-13.15.1 * libgstriff-1_0-0-debuginfo-1.8.3-13.15.1 * libgstapp-1_0-0-debuginfo-1.8.3-13.15.1 * libgstaudio-1_0-0-debuginfo-1.8.3-13.15.1 * libgstrtsp-1_0-0-debuginfo-1.8.3-13.15.1 * libgstpbutils-1_0-0-1.8.3-13.15.1 * libgstfft-1_0-0-1.8.3-13.15.1 * gstreamer-plugins-base-debugsource-1.8.3-13.15.1 * libgstaudio-1_0-0-1.8.3-13.15.1 * libgstsdp-1_0-0-debuginfo-1.8.3-13.15.1 * libgstvideo-1_0-0-debuginfo-1.8.3-13.15.1 * gstreamer-plugins-base-1.8.3-13.15.1 * libgstpbutils-1_0-0-debuginfo-1.8.3-13.15.1 * libgsttag-1_0-0-1.8.3-13.15.1 * libgsttag-1_0-0-debuginfo-1.8.3-13.15.1 * libgstrtp-1_0-0-1.8.3-13.15.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * gstreamer-plugins-base-lang-1.8.3-13.15.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * gstreamer-plugins-base-debuginfo-32bit-1.8.3-13.15.1 * libgstaudio-1_0-0-32bit-1.8.3-13.15.1 * libgstapp-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * libgstpbutils-1_0-0-32bit-1.8.3-13.15.1 * libgstaudio-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * libgsttag-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * libgsttag-1_0-0-32bit-1.8.3-13.15.1 * libgstvideo-1_0-0-32bit-1.8.3-13.15.1 * libgstpbutils-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * libgstapp-1_0-0-32bit-1.8.3-13.15.1 * libgstvideo-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libgstrtp-1_0-0-debuginfo-1.8.3-13.15.1 * libgstapp-1_0-0-1.8.3-13.15.1 * libgstrtsp-1_0-0-1.8.3-13.15.1 * libgstallocators-1_0-0-debuginfo-1.8.3-13.15.1 * libgstsdp-1_0-0-1.8.3-13.15.1 * gstreamer-plugins-base-debuginfo-1.8.3-13.15.1 * libgstallocators-1_0-0-1.8.3-13.15.1 * libgstvideo-1_0-0-1.8.3-13.15.1 * libgstriff-1_0-0-1.8.3-13.15.1 * libgstfft-1_0-0-debuginfo-1.8.3-13.15.1 * libgstriff-1_0-0-debuginfo-1.8.3-13.15.1 * libgstapp-1_0-0-debuginfo-1.8.3-13.15.1 * libgstaudio-1_0-0-debuginfo-1.8.3-13.15.1 * libgstrtsp-1_0-0-debuginfo-1.8.3-13.15.1 * libgstpbutils-1_0-0-1.8.3-13.15.1 * libgstfft-1_0-0-1.8.3-13.15.1 * gstreamer-plugins-base-debugsource-1.8.3-13.15.1 * libgstaudio-1_0-0-1.8.3-13.15.1 * libgstsdp-1_0-0-debuginfo-1.8.3-13.15.1 * libgstvideo-1_0-0-debuginfo-1.8.3-13.15.1 * gstreamer-plugins-base-1.8.3-13.15.1 * libgstpbutils-1_0-0-debuginfo-1.8.3-13.15.1 * libgsttag-1_0-0-1.8.3-13.15.1 * libgsttag-1_0-0-debuginfo-1.8.3-13.15.1 * libgstrtp-1_0-0-1.8.3-13.15.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * gstreamer-plugins-base-lang-1.8.3-13.15.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * gstreamer-plugins-base-debuginfo-32bit-1.8.3-13.15.1 * libgstaudio-1_0-0-32bit-1.8.3-13.15.1 * libgstapp-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * libgstpbutils-1_0-0-32bit-1.8.3-13.15.1 * libgstaudio-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * libgsttag-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * libgsttag-1_0-0-32bit-1.8.3-13.15.1 * libgstvideo-1_0-0-32bit-1.8.3-13.15.1 * libgstpbutils-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * libgstapp-1_0-0-32bit-1.8.3-13.15.1 * libgstvideo-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * typelib-1_0-GstAudio-1_0-1.8.3-13.15.1 * gstreamer-plugins-base-debuginfo-1.8.3-13.15.1 * libgstfft-1_0-0-debuginfo-32bit-1.8.3-13.15.1 * typelib-1_0-GstPbutils-1_0-1.8.3-13.15.1 * typelib-1_0-GstVideo-1_0-1.8.3-13.15.1 * gstreamer-plugins-base-debuginfo-32bit-1.8.3-13.15.1 * typelib-1_0-GstTag-1_0-1.8.3-13.15.1 * libgstfft-1_0-0-32bit-1.8.3-13.15.1 * gstreamer-plugins-base-debugsource-1.8.3-13.15.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 08:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 08:30:12 -0000 Subject: SUSE-SU-2024:1892-1: moderate: Security update for tiff Message-ID: <171740341298.1713.7759415981265727359@smelt2.prg2.suse.org> # Security update for tiff Announcement ID: SUSE-SU-2024:1892-1 Rating: moderate References: * bsc#1212233 Cross-References: * CVE-2023-3164 CVSS scores: * CVE-2023-3164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-3164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for tiff fixes the following issues: * CVE-2023-3164: Fixed a heap buffer overflow in tiffcrop. (bsc#1212233) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1892=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1892=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1892=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1892=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * tiff-debugsource-4.0.9-44.83.1 * tiff-4.0.9-44.83.1 * tiff-debuginfo-4.0.9-44.83.1 * libtiff5-debuginfo-4.0.9-44.83.1 * libtiff5-4.0.9-44.83.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libtiff5-32bit-4.0.9-44.83.1 * libtiff5-debuginfo-32bit-4.0.9-44.83.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.0.9-44.83.1 * tiff-4.0.9-44.83.1 * tiff-debuginfo-4.0.9-44.83.1 * libtiff5-debuginfo-4.0.9-44.83.1 * libtiff5-4.0.9-44.83.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libtiff5-32bit-4.0.9-44.83.1 * libtiff5-debuginfo-32bit-4.0.9-44.83.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * tiff-debugsource-4.0.9-44.83.1 * tiff-4.0.9-44.83.1 * tiff-debuginfo-4.0.9-44.83.1 * libtiff5-debuginfo-4.0.9-44.83.1 * libtiff5-4.0.9-44.83.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libtiff5-32bit-4.0.9-44.83.1 * libtiff5-debuginfo-32bit-4.0.9-44.83.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.0.9-44.83.1 * libtiff-devel-4.0.9-44.83.1 * tiff-debuginfo-4.0.9-44.83.1 ## References: * https://www.suse.com/security/cve/CVE-2023-3164.html * https://bugzilla.suse.com/show_bug.cgi?id=1212233 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 08:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 08:30:15 -0000 Subject: SUSE-RU-2024:1891-1: moderate: Recommended update for csp-billing-adapter Message-ID: <171740341516.1713.163341926272292476@smelt2.prg2.suse.org> # Recommended update for csp-billing-adapter Announcement ID: SUSE-RU-2024:1891-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that can now be installed. ## Description: This update for csp-billing-adapter fixes the following issues: * csp-billing-adapter was updated to version 0.10.0: * Added free trial feature ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1891=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1891=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1891=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1891=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-1891=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python3-csp-billing-adapter-0.10.0-150400.9.14.1 * csp-billing-adapter-service-0.10.0-150400.9.14.1 * openSUSE Leap 15.6 (noarch) * python3-csp-billing-adapter-0.10.0-150400.9.14.1 * csp-billing-adapter-service-0.10.0-150400.9.14.1 * Public Cloud Module 15-SP4 (noarch) * python3-csp-billing-adapter-0.10.0-150400.9.14.1 * csp-billing-adapter-service-0.10.0-150400.9.14.1 * Public Cloud Module 15-SP5 (noarch) * python3-csp-billing-adapter-0.10.0-150400.9.14.1 * csp-billing-adapter-service-0.10.0-150400.9.14.1 * Public Cloud Module 15-SP6 (noarch) * python3-csp-billing-adapter-0.10.0-150400.9.14.1 * csp-billing-adapter-service-0.10.0-150400.9.14.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 08:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 08:30:16 -0000 Subject: SUSE-RU-2024:1890-1: moderate: Recommended update for patterns-wsl Message-ID: <171740341639.1713.1462826988068879614@smelt2.prg2.suse.org> # Recommended update for patterns-wsl Announcement ID: SUSE-RU-2024:1890-1 Rating: moderate References: * jsc#PED-308 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for patterns-wsl fixes the following issues: * `wslg.conf` is now provided by a new package named `patterns-wsl-tmpfiles` which is required by `patterns-wsl-systemd`: * WSL uses `/etc/zypp/zypp.conf:solver.onlyRequires = true` by default * Ensure creation of the file `wslg.conf` if it doesn't exist ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1890=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1890=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1890=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1890=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1890=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1890=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1890=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1890=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1890=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1890=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1890=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1890=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1890=1 ## Package List: * openSUSE Leap 15.4 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 * openSUSE Leap 15.5 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 * openSUSE Leap 15.6 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 * Basesystem Module 15-SP5 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 * Basesystem Module 15-SP6 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 * SUSE Manager Proxy 4.3 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 * SUSE Manager Server 4.3 (noarch) * patterns-wsl-gui-20240327-150400.3.11.1 * patterns-wsl-base-20240327-150400.3.11.1 * patterns-wsl-systemd-20240327-150400.3.11.1 * patterns-wsl-tmpfiles-20240327-150400.3.11.1 ## References: * https://jira.suse.com/browse/PED-308 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 08:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 08:30:20 -0000 Subject: SUSE-RU-2024:1889-1: moderate: Recommended update for container-suseconnect Message-ID: <171740342037.1713.17471029466289171148@smelt2.prg2.suse.org> # Recommended update for container-suseconnect Announcement ID: SUSE-RU-2024:1889-1 Rating: moderate References: * bsc#1219855 Affected Products: * Containers Module 15-SP5 * Containers Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for container-suseconnect fixes the following issues: Update to 2.5.0: * Upgrade to go 1.21 * Allow setting of SCC credentials via environment variables * Bump github.com/urfave/cli/v2 from 2.25.7 to 2.27.1 * Use switch instead of else if construction * Add system token header to query SCC subscriptions (bsc#1219855) * Use the FIPS capable go1.21-openssl to build. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1889=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-1889=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1889=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1889=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1889=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1889=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1889=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1889=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1889=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1889=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1889=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1889=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1889=1 ## Package List: * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.5.0-150000.4.53.2 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.5.0-150000.4.53.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * container-suseconnect-2.5.0-150000.4.53.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * container-suseconnect-2.5.0-150000.4.53.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * container-suseconnect-2.5.0-150000.4.53.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * container-suseconnect-2.5.0-150000.4.53.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.5.0-150000.4.53.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.5.0-150000.4.53.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.5.0-150000.4.53.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * container-suseconnect-2.5.0-150000.4.53.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * container-suseconnect-2.5.0-150000.4.53.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * container-suseconnect-2.5.0-150000.4.53.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * container-suseconnect-2.5.0-150000.4.53.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219855 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 12:30:03 -0000 Subject: SUSE-RU-2024:1898-1: moderate: Recommended update for iputils Message-ID: <171741780399.5697.1628173406941739708@smelt2.prg2.suse.org> # Recommended update for iputils Announcement ID: SUSE-RU-2024:1898-1 Rating: moderate References: * bsc#1224877 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for iputils fixes the following issues: * Backport proposed fix for regression in upstream commit 4db1de6 (bsc#1224877) * "arping: Fix 1s delay on exit for unsolicited arpings", Backport upstream fix (bsc#1224877) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1898=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1898=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1898=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1898=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1898=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1898=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1898=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1898=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1898=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1898=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1898=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1898=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1898=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1898=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1898=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1898=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1898=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * iputils-debuginfo-20211215-150400.3.8.2 * rarpd-debuginfo-20211215-150400.3.8.2 * rarpd-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * rarpd-debuginfo-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * rarpd-20211215-150400.3.8.2 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * rarpd-debuginfo-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * rarpd-20211215-150400.3.8.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * rarpd-debuginfo-20211215-150400.3.8.2 * rarpd-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * rarpd-debuginfo-20211215-150400.3.8.2 * rarpd-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * rarpd-debuginfo-20211215-150400.3.8.2 * rarpd-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * rarpd-debuginfo-20211215-150400.3.8.2 * rarpd-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * SUSE Manager Proxy 4.3 (x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * rarpd-debuginfo-20211215-150400.3.8.2 * rarpd-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * rarpd-debuginfo-20211215-150400.3.8.2 * rarpd-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * iputils-debuginfo-20211215-150400.3.8.2 * rarpd-debuginfo-20211215-150400.3.8.2 * rarpd-20211215-150400.3.8.2 * iputils-debugsource-20211215-150400.3.8.2 * iputils-20211215-150400.3.8.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224877 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 12:30:07 -0000 Subject: SUSE-RU-2024:1897-1: moderate: Recommended update for postfix Message-ID: <171741780761.5697.12146671068624656397@smelt2.prg2.suse.org> # Recommended update for postfix Announcement ID: SUSE-RU-2024:1897-1 Rating: moderate References: * bsc#1223264 * bsc#1224207 Affected Products: * Basesystem Module 15-SP6 * Legacy Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has two fixes can now be installed. ## Description: This update for postfix fixes the following issues: * config.postfix needs updating (bsc#1224207) * chkconfig to systemctl * Link Cyrus lmtp only if this exsists * /usr/lib64/sasl2 does not need to exist * Fetch timezone via readlink from /etc/localtime * Set inet_interfaces to loopback-only instead of localhost as proposed in man 5 postconf (bsc#1223264) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1897=1 openSUSE-SLE-15.6-2024-1897=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1897=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-1897=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1897=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * postfix-bdb-3.8.4-150600.3.3.1 * postfix-bdb-lmdb-debuginfo-3.8.4-150600.3.3.1 * postfix-3.8.4-150600.3.3.1 * postfix-ldap-debuginfo-3.8.4-150600.3.3.1 * postfix-mysql-debuginfo-3.8.4-150600.3.3.1 * postfix-debugsource-3.8.4-150600.3.3.1 * postfix-mysql-3.8.4-150600.3.3.1 * postfix-postgresql-3.8.4-150600.3.3.1 * postfix-debuginfo-3.8.4-150600.3.3.1 * postfix-postgresql-debuginfo-3.8.4-150600.3.3.1 * postfix-bdb-debugsource-3.8.4-150600.3.3.1 * postfix-bdb-debuginfo-3.8.4-150600.3.3.1 * postfix-ldap-3.8.4-150600.3.3.1 * postfix-bdb-lmdb-3.8.4-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * postfix-doc-3.8.4-150600.3.3.1 * postfix-devel-3.8.4-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * postfix-3.8.4-150600.3.3.1 * postfix-ldap-debuginfo-3.8.4-150600.3.3.1 * postfix-debugsource-3.8.4-150600.3.3.1 * postfix-debuginfo-3.8.4-150600.3.3.1 * postfix-ldap-3.8.4-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * postfix-doc-3.8.4-150600.3.3.1 * postfix-devel-3.8.4-150600.3.3.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * postfix-bdb-3.8.4-150600.3.3.1 * postfix-bdb-lmdb-debuginfo-3.8.4-150600.3.3.1 * postfix-bdb-debugsource-3.8.4-150600.3.3.1 * postfix-bdb-debuginfo-3.8.4-150600.3.3.1 * postfix-bdb-lmdb-3.8.4-150600.3.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * postfix-mysql-3.8.4-150600.3.3.1 * postfix-debuginfo-3.8.4-150600.3.3.1 * postfix-mysql-debuginfo-3.8.4-150600.3.3.1 * postfix-debugsource-3.8.4-150600.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223264 * https://bugzilla.suse.com/show_bug.cgi?id=1224207 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 12:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 12:30:09 -0000 Subject: SUSE-SU-2024:1896-1: moderate: Security update for squid Message-ID: <171741780970.5697.13515030480582618577@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2024:1896-1 Rating: moderate References: * bsc#1225417 Cross-References: * CVE-2024-33427 CVSS scores: * CVE-2024-33427 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2024-33427: Fixed possible buffer overread that could have led to a denial-of-service (bsc#1225417). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1896=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1896=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1896=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * squid-5.7-150400.3.29.2 * squid-debugsource-5.7-150400.3.29.2 * squid-debuginfo-5.7-150400.3.29.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * squid-5.7-150400.3.29.2 * squid-debugsource-5.7-150400.3.29.2 * squid-debuginfo-5.7-150400.3.29.2 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * squid-5.7-150400.3.29.2 * squid-debugsource-5.7-150400.3.29.2 * squid-debuginfo-5.7-150400.3.29.2 ## References: * https://www.suse.com/security/cve/CVE-2024-33427.html * https://bugzilla.suse.com/show_bug.cgi?id=1225417 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:01 -0000 Subject: SUSE-OU-2024:1920-1: low: Optional update for update-test-trivial Message-ID: <171743220121.12355.10919049606998126499@smelt2.prg2.suse.org> # Optional update for update-test-trivial Announcement ID: SUSE-OU-2024:1920-1 Rating: low References: Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for update-test-trivial fixes the following issue: * Test maintenance workflow for new products. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1920=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1920=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1920=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * update-test-32bit-pkg-32bit-5.1-150200.39.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * update-test-security-5.1-150200.39.1 * update-test-relogin-suggested-5.1-150200.39.1 * update-test-feature-5.1-150200.39.1 * update-test-affects-package-manager-5.1-150200.39.1 * update-test-reboot-needed-5.1-150200.39.1 * update-test-broken-5.1-150200.39.1 * update-test-retracted-5.1-150200.39.1 * update-test-trivial-5.1-150200.39.1 * update-test-interactive-5.1-150200.39.1 * update-test-32bit-pkg-5.1-150200.39.1 * update-test-optional-5.1-150200.39.1 * openSUSE Leap 15.6 (x86_64) * update-test-32bit-pkg-32bit-5.1-150200.39.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * update-test-security-5.1-150200.39.1 * update-test-relogin-suggested-5.1-150200.39.1 * update-test-feature-5.1-150200.39.1 * update-test-affects-package-manager-5.1-150200.39.1 * update-test-reboot-needed-5.1-150200.39.1 * update-test-broken-5.1-150200.39.1 * update-test-retracted-5.1-150200.39.1 * update-test-trivial-5.1-150200.39.1 * update-test-interactive-5.1-150200.39.1 * update-test-32bit-pkg-5.1-150200.39.1 * update-test-optional-5.1-150200.39.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * update-test-security-5.1-150200.39.1 * update-test-relogin-suggested-5.1-150200.39.1 * update-test-feature-5.1-150200.39.1 * update-test-affects-package-manager-5.1-150200.39.1 * update-test-reboot-needed-5.1-150200.39.1 * update-test-broken-5.1-150200.39.1 * update-test-retracted-5.1-150200.39.1 * update-test-trivial-5.1-150200.39.1 * update-test-interactive-5.1-150200.39.1 * update-test-32bit-pkg-5.1-150200.39.1 * update-test-optional-5.1-150200.39.1 * Basesystem Module 15-SP6 (aarch64_ilp32) * update-test-32bit-pkg-64bit-5.1-150200.39.1 * Basesystem Module 15-SP6 (x86_64) * update-test-32bit-pkg-32bit-5.1-150200.39.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:05 -0000 Subject: SUSE-RU-2024:1919-1: moderate: Recommended update for HANA-Firewall Message-ID: <171743220557.12355.7223264938127373416@smelt2.prg2.suse.org> # Recommended update for HANA-Firewall Announcement ID: SUSE-RU-2024:1919-1 Rating: moderate References: * bsc#1221231 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SAP Applications Module 15-SP2 * SAP Applications Module 15-SP3 * SAP Applications Module 15-SP4 * SAP Applications Module 15-SP5 * SAP Applications Module 15-SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for HANA-Firewall fixes the following issue: * HANA-Firewall creates insufficient configuration (bsc#1221231) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1919=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1919=1 * SAP Applications Module 15-SP2 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP2-2024-1919=1 * SAP Applications Module 15-SP3 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP3-2024-1919=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1919=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1919=1 * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1919=1 ## Package List: * openSUSE Leap 15.5 (ppc64le x86_64) * HANA-Firewall-2.0.4-150000.3.9.3 * HANA-Firewall-debuginfo-2.0.4-150000.3.9.3 * openSUSE Leap 15.6 (ppc64le x86_64) * HANA-Firewall-2.0.4-150000.3.9.3 * HANA-Firewall-debuginfo-2.0.4-150000.3.9.3 * SAP Applications Module 15-SP2 (ppc64le x86_64) * HANA-Firewall-2.0.4-150000.3.9.3 * HANA-Firewall-debuginfo-2.0.4-150000.3.9.3 * SAP Applications Module 15-SP3 (ppc64le x86_64) * HANA-Firewall-2.0.4-150000.3.9.3 * HANA-Firewall-debuginfo-2.0.4-150000.3.9.3 * SAP Applications Module 15-SP4 (ppc64le x86_64) * HANA-Firewall-2.0.4-150000.3.9.3 * HANA-Firewall-debuginfo-2.0.4-150000.3.9.3 * SAP Applications Module 15-SP5 (ppc64le x86_64) * HANA-Firewall-2.0.4-150000.3.9.3 * HANA-Firewall-debuginfo-2.0.4-150000.3.9.3 * SAP Applications Module 15-SP6 (ppc64le x86_64) * HANA-Firewall-2.0.4-150000.3.9.3 * HANA-Firewall-debuginfo-2.0.4-150000.3.9.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221231 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:06 -0000 Subject: SUSE-RU-2024:1918-1: moderate: Recommended update for python-Twisted Message-ID: <171743220676.12355.103496203164521694@smelt2.prg2.suse.org> # Recommended update for python-Twisted Announcement ID: SUSE-RU-2024:1918-1 Rating: moderate References: * bsc#1224109 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Python 3 Module 15-SP5 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for python-Twisted fixes the following issue: * Fix update-alternatives post script (bsc#1224109) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1918=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1918=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1918=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1918=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-1918=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-1918=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python311-Twisted-conch_nacl-22.10.0-150400.5.20.1 * python311-Twisted-contextvars-22.10.0-150400.5.20.1 * python311-Twisted-serial-22.10.0-150400.5.20.1 * python311-Twisted-conch-22.10.0-150400.5.20.1 * python311-Twisted-22.10.0-150400.5.20.1 * python311-Twisted-all_non_platform-22.10.0-150400.5.20.1 * python311-Twisted-tls-22.10.0-150400.5.20.1 * python311-Twisted-http2-22.10.0-150400.5.20.1 * openSUSE Leap 15.5 (noarch) * python311-Twisted-conch_nacl-22.10.0-150400.5.20.1 * python311-Twisted-contextvars-22.10.0-150400.5.20.1 * python311-Twisted-serial-22.10.0-150400.5.20.1 * python311-Twisted-conch-22.10.0-150400.5.20.1 * python311-Twisted-22.10.0-150400.5.20.1 * python311-Twisted-all_non_platform-22.10.0-150400.5.20.1 * python311-Twisted-tls-22.10.0-150400.5.20.1 * python311-Twisted-http2-22.10.0-150400.5.20.1 * openSUSE Leap 15.6 (noarch) * python311-Twisted-conch_nacl-22.10.0-150400.5.20.1 * python311-Twisted-contextvars-22.10.0-150400.5.20.1 * python311-Twisted-serial-22.10.0-150400.5.20.1 * python311-Twisted-conch-22.10.0-150400.5.20.1 * python311-Twisted-22.10.0-150400.5.20.1 * python311-Twisted-all_non_platform-22.10.0-150400.5.20.1 * python311-Twisted-tls-22.10.0-150400.5.20.1 * python311-Twisted-http2-22.10.0-150400.5.20.1 * Public Cloud Module 15-SP4 (noarch) * python311-Twisted-22.10.0-150400.5.20.1 * python311-Twisted-tls-22.10.0-150400.5.20.1 * Python 3 Module 15-SP5 (noarch) * python311-Twisted-conch_nacl-22.10.0-150400.5.20.1 * python311-Twisted-contextvars-22.10.0-150400.5.20.1 * python311-Twisted-serial-22.10.0-150400.5.20.1 * python311-Twisted-conch-22.10.0-150400.5.20.1 * python311-Twisted-22.10.0-150400.5.20.1 * python311-Twisted-all_non_platform-22.10.0-150400.5.20.1 * python311-Twisted-tls-22.10.0-150400.5.20.1 * python311-Twisted-http2-22.10.0-150400.5.20.1 * Python 3 Module 15-SP6 (noarch) * python311-Twisted-conch_nacl-22.10.0-150400.5.20.1 * python311-Twisted-contextvars-22.10.0-150400.5.20.1 * python311-Twisted-serial-22.10.0-150400.5.20.1 * python311-Twisted-conch-22.10.0-150400.5.20.1 * python311-Twisted-22.10.0-150400.5.20.1 * python311-Twisted-all_non_platform-22.10.0-150400.5.20.1 * python311-Twisted-tls-22.10.0-150400.5.20.1 * python311-Twisted-http2-22.10.0-150400.5.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224109 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:08 -0000 Subject: SUSE-RU-2024:1917-1: moderate: Recommended update for lifecycle-data-sle-live-patching Message-ID: <171743220804.12355.17048922430495063619@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-live-patching Announcement ID: SUSE-RU-2024:1917-1 Rating: moderate References: * bsc#1020320 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 12 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for lifecycle-data-sle-live-patching fixes the following issue: * Added data for 4_12_14-122_201. (bsc#1020320) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12 zypper in -t patch SUSE-SLE-Live-Patching-12-2024-1917=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-1917=1 ## Package List: * SUSE Linux Enterprise Live Patching 12 (noarch) * lifecycle-data-sle-live-patching-1-10.146.1 * SUSE Linux Enterprise Live Patching 12-SP5 (noarch) * lifecycle-data-sle-live-patching-1-10.146.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1020320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:09 -0000 Subject: SUSE-RU-2024:1916-1: moderate: Recommended update for lifecycle-data-sle-module-live-patching Message-ID: <171743220921.12355.2170625346355154920@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-module-live-patching Announcement ID: SUSE-RU-2024:1916-1 Rating: moderate References: * bsc#1020320 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for lifecycle-data-sle-module-live-patching fixes the following issues: * Added data for: 5_14_21-150400_24_111, 5_14_21-150400_24_116, 5_14_21-150500_55_52, 5_14_21-150500_55_59, 5_3_18-150200_24_183, 5_3_18-150200_24_188, 5_3_18-150300_59_153, 5_3_18-150300_59_158, +kernel- livepatch-5_14_21-150400_15_71-rt, +kernel- livepatch-5_14_21-150500_13_38-rt, _, +kernel- livepatch-5_14_21-150500_13_43-rt, +kernel- livepatch-5_14_21-150500_13_47-rt,_. (bsc#1020320) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1916=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1916=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-1916=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1916=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1916=1 * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-1916=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-1916=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.111.1 * SUSE Linux Enterprise Live Patching 15-SP5 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.111.1 * SUSE Linux Enterprise Live Patching 15-SP6 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.111.1 * openSUSE Leap 15.5 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.111.1 * openSUSE Leap 15.6 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.111.1 * SUSE Linux Enterprise Live Patching 15-SP2 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.111.1 * SUSE Linux Enterprise Live Patching 15-SP3 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.111.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1020320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:10 -0000 Subject: SUSE-RU-2024:1915-1: moderate: Recommended update for xfsprogs Message-ID: <171743221024.12355.8219556580937304362@smelt2.prg2.suse.org> # Recommended update for xfsprogs Announcement ID: SUSE-RU-2024:1915-1 Rating: moderate References: Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that can now be installed. ## Description: This update for xfsprogs fixes the following issue: * update to 6.7.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1915=1 openSUSE-SLE-15.6-2024-1915=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1915=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1915=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * xfsprogs-scrub-6.7.0-150600.3.3.1 * libhandle1-debuginfo-6.7.0-150600.3.3.1 * xfsprogs-debugsource-6.7.0-150600.3.3.1 * xfsprogs-debuginfo-6.7.0-150600.3.3.1 * xfsprogs-6.7.0-150600.3.3.1 * libhandle1-6.7.0-150600.3.3.1 * xfsprogs-devel-6.7.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libhandle1-debuginfo-6.7.0-150600.3.3.1 * xfsprogs-debugsource-6.7.0-150600.3.3.1 * xfsprogs-debuginfo-6.7.0-150600.3.3.1 * xfsprogs-6.7.0-150600.3.3.1 * libhandle1-6.7.0-150600.3.3.1 * xfsprogs-devel-6.7.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * xfsprogs-scrub-6.7.0-150600.3.3.1 * xfsprogs-debugsource-6.7.0-150600.3.3.1 * xfsprogs-debuginfo-6.7.0-150600.3.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:13 -0000 Subject: SUSE-RU-2024:1914-1: moderate: Recommended update for perl-DBD-SQLite Message-ID: <171743221344.12355.16784458905883882628@smelt2.prg2.suse.org> # Recommended update for perl-DBD-SQLite Announcement ID: SUSE-RU-2024:1914-1 Rating: moderate References: * bsc#1218946 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for perl-DBD-SQLite fixes the following issues: * Remove sqlite files when building with system libraries * Avoiding having wrong sqlite version when checking with the perl module (bsc#1218946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1914=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1914=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1914=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1914=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1914=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1914=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1914=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1914=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1914=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1914=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1914=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1914=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1914=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1914=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1914=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1914=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1914=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * SUSE Manager Proxy 4.3 (x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * perl-DBD-SQLite-debugsource-1.66-150300.3.12.1 * perl-DBD-SQLite-debuginfo-1.66-150300.3.12.1 * perl-DBD-SQLite-1.66-150300.3.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:14 -0000 Subject: SUSE-RU-2024:1913-1: moderate: Recommended update for pgaudit Message-ID: <171743221473.12355.15545691534279732055@smelt2.prg2.suse.org> # Recommended update for pgaudit Announcement ID: SUSE-RU-2024:1913-1 Rating: moderate References: * jsc#PED-8344 Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains one feature can now be installed. ## Description: This update for pgaudit fixes the following issues: * Add postgresql16-pgaudit ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1913=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1913=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * postgresql13-pgaudit-debugsource-1.5.2-150600.13.5.1 * postgresql12-pgaudit-1.4.3-150600.13.5.1 * postgresql15-pgaudit-debugsource-1.7.0-150600.13.5.1 * postgresql12-pgaudit-debuginfo-1.4.3-150600.13.5.1 * postgresql14-pgaudit-1.6.2-150600.13.5.1 * postgresql14-pgaudit-debugsource-1.6.2-150600.13.5.1 * postgresql16-pgaudit-debugsource-16.0-150600.13.5.1 * postgresql15-pgaudit-1.7.0-150600.13.5.1 * postgresql12-pgaudit-debugsource-1.4.3-150600.13.5.1 * postgresql16-pgaudit-debuginfo-16.0-150600.13.5.1 * postgresql13-pgaudit-1.5.2-150600.13.5.1 * postgresql15-pgaudit-debuginfo-1.7.0-150600.13.5.1 * postgresql14-pgaudit-debuginfo-1.6.2-150600.13.5.1 * postgresql16-pgaudit-16.0-150600.13.5.1 * postgresql13-pgaudit-debuginfo-1.5.2-150600.13.5.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * postgresql16-pgaudit-debugsource-16.0-150600.13.5.1 * postgresql16-pgaudit-16.0-150600.13.5.1 * postgresql16-pgaudit-debuginfo-16.0-150600.13.5.1 ## References: * https://jira.suse.com/browse/PED-8344 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:15 -0000 Subject: SUSE-RU-2024:1912-1: low: Recommended update for python-recommonmark Message-ID: <171743221563.12355.15709860261731226352@smelt2.prg2.suse.org> # Recommended update for python-recommonmark Announcement ID: SUSE-RU-2024:1912-1 Rating: low References: * jsc#PED-8481 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 An update that contains one feature can now be installed. ## Description: This update for python-recommonmark fixes the following issues: * Rename changelog and the SPEC file to python3- form (jsc#PED-8481). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1912=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1912=1 ## Package List: * openSUSE Leap 15.5 (noarch) * python3-recommonmark-0.5.0-150100.3.3.1 * openSUSE Leap 15.6 (noarch) * python3-recommonmark-0.5.0-150100.3.3.1 ## References: * https://jira.suse.com/browse/PED-8481 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:17 -0000 Subject: SUSE-SU-2024:1911-1: moderate: Security update for squid Message-ID: <171743221791.12355.15881655823054299990@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2024:1911-1 Rating: moderate References: * bsc#1225417 Cross-References: * CVE-2024-33427 CVSS scores: * CVE-2024-33427 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2024-33427: Fixed possible buffer overread that could have led to a denial-of-service (bsc#1225417). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1911=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1911=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1911=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * squid-4.17-4.47.1 * squid-debuginfo-4.17-4.47.1 * squid-debugsource-4.17-4.47.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * squid-4.17-4.47.1 * squid-debuginfo-4.17-4.47.1 * squid-debugsource-4.17-4.47.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * squid-4.17-4.47.1 * squid-debuginfo-4.17-4.47.1 * squid-debugsource-4.17-4.47.1 ## References: * https://www.suse.com/security/cve/CVE-2024-33427.html * https://bugzilla.suse.com/show_bug.cgi?id=1225417 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:19 -0000 Subject: SUSE-SU-2024:1910-1: important: Security update for gstreamer-plugins-base Message-ID: <171743221996.12355.12428337594017452521@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1910-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1910=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1910=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1910=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1910=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1910=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1910=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1910=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1910=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1910=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1910=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1910=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1910=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1910=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1910=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1910=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 (x86_64) * libgstrtp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstAllocators-1_0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-devel-1.20.1-150400.3.8.2 * typelib-1_0-GstApp-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLX11-1_0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstRtp-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstTag-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstRtsp-1_0-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLEGL-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstSdp-1_0-1.20.1-150400.3.8.2 * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstAudio-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstGL-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstfft-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstGLWayland-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstVideo-1_0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstPbutils-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-1.20.1-150400.3.8.2 * libgstfft-1_0-0-debuginfo-1.20.1-150400.3.8.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * gstreamer-plugins-base-lang-1.20.1-150400.3.8.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libgstrtp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstAllocators-1_0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-devel-1.20.1-150400.3.8.2 * typelib-1_0-GstApp-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLX11-1_0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstRtp-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstTag-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstRtsp-1_0-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLEGL-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstSdp-1_0-1.20.1-150400.3.8.2 * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstAudio-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstGL-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstfft-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstGLWayland-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstVideo-1_0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstPbutils-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-1.20.1-150400.3.8.2 * libgstfft-1_0-0-debuginfo-1.20.1-150400.3.8.2 * SUSE Manager Server 4.3 (noarch) * gstreamer-plugins-base-lang-1.20.1-150400.3.8.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libgstrtp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstAllocators-1_0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-devel-1.20.1-150400.3.8.2 * typelib-1_0-GstApp-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLX11-1_0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstRtp-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstTag-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstRtsp-1_0-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLEGL-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstSdp-1_0-1.20.1-150400.3.8.2 * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstAudio-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstGL-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstfft-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstGLWayland-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstVideo-1_0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstPbutils-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-1.20.1-150400.3.8.2 * libgstfft-1_0-0-debuginfo-1.20.1-150400.3.8.2 * openSUSE Leap 15.4 (x86_64) * libgstsdp-1_0-0-32bit-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-32bit-1.20.1-150400.3.8.2 * libgstapp-1_0-0-32bit-debuginfo-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-32bit-debuginfo-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-32bit-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-32bit-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-32bit-debuginfo-1.20.1-150400.3.8.2 * libgstgl-1_0-0-32bit-debuginfo-1.20.1-150400.3.8.2 * libgstfft-1_0-0-32bit-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-32bit-debuginfo-1.20.1-150400.3.8.2 * libgstapp-1_0-0-32bit-1.20.1-150400.3.8.2 * gstreamer-plugins-base-devel-32bit-1.20.1-150400.3.8.2 * libgstriff-1_0-0-32bit-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-32bit-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-32bit-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-32bit-debuginfo-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-32bit-1.20.1-150400.3.8.2 * gstreamer-plugins-base-32bit-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-32bit-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-32bit-1.20.1-150400.3.8.2 * libgstriff-1_0-0-32bit-debuginfo-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-32bit-debuginfo-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-32bit-1.20.1-150400.3.8.2 * libgstfft-1_0-0-32bit-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-32bit-debuginfo-1.20.1-150400.3.8.2 * libgstgl-1_0-0-32bit-1.20.1-150400.3.8.2 * libgsttag-1_0-0-32bit-1.20.1-150400.3.8.2 * openSUSE Leap 15.4 (noarch) * gstreamer-plugins-base-lang-1.20.1-150400.3.8.2 * openSUSE Leap 15.4 (aarch64_ilp32) * libgstaudio-1_0-0-64bit-debuginfo-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-64bit-1.20.1-150400.3.8.2 * libgstgl-1_0-0-64bit-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-64bit-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-64bit-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-devel-64bit-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-64bit-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-64bit-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-64bit-debuginfo-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-64bit-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-64bit-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-64bit-debuginfo-1.20.1-150400.3.8.2 * libgstgl-1_0-0-64bit-debuginfo-1.20.1-150400.3.8.2 * libgstriff-1_0-0-64bit-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-64bit-1.20.1-150400.3.8.2 * libgsttag-1_0-0-64bit-1.20.1-150400.3.8.2 * libgstfft-1_0-0-64bit-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-64bit-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-64bit-debuginfo-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-64bit-debuginfo-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-64bit-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-64bit-1.20.1-150400.3.8.2 * libgstriff-1_0-0-64bit-1.20.1-150400.3.8.2 * libgstapp-1_0-0-64bit-1.20.1-150400.3.8.2 * libgstapp-1_0-0-64bit-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-64bit-debuginfo-1.20.1-150400.3.8.2 * libgstfft-1_0-0-64bit-1.20.1-150400.3.8.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libgstrtp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstAllocators-1_0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-devel-1.20.1-150400.3.8.2 * typelib-1_0-GstApp-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLX11-1_0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstRtp-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstTag-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstRtsp-1_0-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLEGL-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstSdp-1_0-1.20.1-150400.3.8.2 * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstAudio-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstGL-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstfft-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstGLWayland-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstVideo-1_0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstPbutils-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-1.20.1-150400.3.8.2 * libgstfft-1_0-0-debuginfo-1.20.1-150400.3.8.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gstreamer-plugins-base-lang-1.20.1-150400.3.8.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libgstrtp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstAllocators-1_0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-devel-1.20.1-150400.3.8.2 * typelib-1_0-GstApp-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLX11-1_0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstRtp-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstTag-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstRtsp-1_0-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLEGL-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstSdp-1_0-1.20.1-150400.3.8.2 * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstAudio-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstGL-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstfft-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstGLWayland-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstVideo-1_0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstPbutils-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-1.20.1-150400.3.8.2 * libgstfft-1_0-0-debuginfo-1.20.1-150400.3.8.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gstreamer-plugins-base-lang-1.20.1-150400.3.8.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libgstrtp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstAllocators-1_0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-devel-1.20.1-150400.3.8.2 * typelib-1_0-GstApp-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLX11-1_0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstRtp-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstTag-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstRtsp-1_0-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLEGL-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstSdp-1_0-1.20.1-150400.3.8.2 * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstAudio-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstGL-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstfft-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstGLWayland-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstVideo-1_0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstPbutils-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-1.20.1-150400.3.8.2 * libgstfft-1_0-0-debuginfo-1.20.1-150400.3.8.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * gstreamer-plugins-base-lang-1.20.1-150400.3.8.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libgstrtp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstAllocators-1_0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-devel-1.20.1-150400.3.8.2 * typelib-1_0-GstApp-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLX11-1_0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstRtp-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstTag-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstRtsp-1_0-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLEGL-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstSdp-1_0-1.20.1-150400.3.8.2 * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstAudio-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstGL-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstfft-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstGLWayland-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstVideo-1_0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstPbutils-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-1.20.1-150400.3.8.2 * libgstfft-1_0-0-debuginfo-1.20.1-150400.3.8.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * gstreamer-plugins-base-lang-1.20.1-150400.3.8.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libgstrtp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstAllocators-1_0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-devel-1.20.1-150400.3.8.2 * typelib-1_0-GstApp-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLX11-1_0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstRtp-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstTag-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstRtsp-1_0-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLEGL-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstSdp-1_0-1.20.1-150400.3.8.2 * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstAudio-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstGL-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstfft-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstGLWayland-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstVideo-1_0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstPbutils-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-1.20.1-150400.3.8.2 * libgstfft-1_0-0-debuginfo-1.20.1-150400.3.8.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gstreamer-plugins-base-lang-1.20.1-150400.3.8.2 * SUSE Manager Proxy 4.3 (x86_64) * libgstrtp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstAllocators-1_0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-debuginfo-1.20.1-150400.3.8.2 * gstreamer-plugins-base-devel-1.20.1-150400.3.8.2 * typelib-1_0-GstApp-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLX11-1_0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstRtp-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstTag-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstRtsp-1_0-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgsttag-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-1.20.1-150400.3.8.2 * typelib-1_0-GstGLEGL-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstSdp-1_0-1.20.1-150400.3.8.2 * libgsttag-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstpbutils-1_0-0-1.20.1-150400.3.8.2 * libgstallocators-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstAudio-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstGL-1_0-1.20.1-150400.3.8.2 * libgstapp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstfft-1_0-0-1.20.1-150400.3.8.2 * libgstgl-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstGLWayland-1_0-1.20.1-150400.3.8.2 * typelib-1_0-GstVideo-1_0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-1.20.1-150400.3.8.2 * libgstrtp-1_0-0-debuginfo-1.20.1-150400.3.8.2 * typelib-1_0-GstPbutils-1_0-1.20.1-150400.3.8.2 * gstreamer-plugins-base-debugsource-1.20.1-150400.3.8.2 * libgstgl-1_0-0-1.20.1-150400.3.8.2 * libgstsdp-1_0-0-1.20.1-150400.3.8.2 * libgstaudio-1_0-0-1.20.1-150400.3.8.2 * libgstriff-1_0-0-1.20.1-150400.3.8.2 * libgstvideo-1_0-0-debuginfo-1.20.1-150400.3.8.2 * libgstrtsp-1_0-0-1.20.1-150400.3.8.2 * libgstfft-1_0-0-debuginfo-1.20.1-150400.3.8.2 * SUSE Manager Proxy 4.3 (noarch) * gstreamer-plugins-base-lang-1.20.1-150400.3.8.2 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:23 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:23 -0000 Subject: SUSE-SU-2024:1909-1: important: Security update for ffmpeg-4 Message-ID: <171743222358.12355.9976587359850887172@smelt2.prg2.suse.org> # Security update for ffmpeg-4 Announcement ID: SUSE-SU-2024:1909-1 Rating: important References: * bsc#1186586 * bsc#1223437 Cross-References: * CVE-2020-22021 * CVE-2023-51794 CVSS scores: * CVE-2020-22021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2020-22021 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-51794 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for ffmpeg-4 fixes the following issues: * CVE-2020-22021: Fixed buffer overflow vulnerability in filter_edges function in libavfilter/vf_yadif.c (bsc#1186586). * CVE-2023-51794: Fixed a heap buffer overflow in libavfilter. (bsc#1223437) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1909=1 openSUSE-SLE-15.6-2024-1909=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1909=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-1909=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * ffmpeg-4-4.4-150600.13.5.1 * libswresample3_9-4.4-150600.13.5.1 * ffmpeg-4-private-devel-4.4-150600.13.5.1 * libavfilter7_110-4.4-150600.13.5.1 * libavutil56_70-debuginfo-4.4-150600.13.5.1 * ffmpeg-4-debuginfo-4.4-150600.13.5.1 * libswscale5_9-debuginfo-4.4-150600.13.5.1 * ffmpeg-4-libswresample-devel-4.4-150600.13.5.1 * libavutil56_70-4.4-150600.13.5.1 * ffmpeg-4-debugsource-4.4-150600.13.5.1 * ffmpeg-4-libavformat-devel-4.4-150600.13.5.1 * ffmpeg-4-libavfilter-devel-4.4-150600.13.5.1 * ffmpeg-4-libavdevice-devel-4.4-150600.13.5.1 * libavresample4_0-4.4-150600.13.5.1 * ffmpeg-4-libavcodec-devel-4.4-150600.13.5.1 * libpostproc55_9-debuginfo-4.4-150600.13.5.1 * libavfilter7_110-debuginfo-4.4-150600.13.5.1 * libavdevice58_13-debuginfo-4.4-150600.13.5.1 * libavdevice58_13-4.4-150600.13.5.1 * libavformat58_76-4.4-150600.13.5.1 * ffmpeg-4-libavutil-devel-4.4-150600.13.5.1 * libavformat58_76-debuginfo-4.4-150600.13.5.1 * libswscale5_9-4.4-150600.13.5.1 * libavresample4_0-debuginfo-4.4-150600.13.5.1 * libavcodec58_134-4.4-150600.13.5.1 * ffmpeg-4-libavresample-devel-4.4-150600.13.5.1 * libpostproc55_9-4.4-150600.13.5.1 * libswresample3_9-debuginfo-4.4-150600.13.5.1 * ffmpeg-4-libpostproc-devel-4.4-150600.13.5.1 * libavcodec58_134-debuginfo-4.4-150600.13.5.1 * ffmpeg-4-libswscale-devel-4.4-150600.13.5.1 * openSUSE Leap 15.6 (x86_64) * libswresample3_9-32bit-4.4-150600.13.5.1 * libavdevice58_13-32bit-debuginfo-4.4-150600.13.5.1 * libswscale5_9-32bit-4.4-150600.13.5.1 * libavcodec58_134-32bit-debuginfo-4.4-150600.13.5.1 * libavresample4_0-32bit-debuginfo-4.4-150600.13.5.1 * libavutil56_70-32bit-4.4-150600.13.5.1 * libavformat58_76-32bit-debuginfo-4.4-150600.13.5.1 * libavutil56_70-32bit-debuginfo-4.4-150600.13.5.1 * libavfilter7_110-32bit-4.4-150600.13.5.1 * libavfilter7_110-32bit-debuginfo-4.4-150600.13.5.1 * libavcodec58_134-32bit-4.4-150600.13.5.1 * libpostproc55_9-32bit-debuginfo-4.4-150600.13.5.1 * libavresample4_0-32bit-4.4-150600.13.5.1 * libpostproc55_9-32bit-4.4-150600.13.5.1 * libavformat58_76-32bit-4.4-150600.13.5.1 * libswscale5_9-32bit-debuginfo-4.4-150600.13.5.1 * libswresample3_9-32bit-debuginfo-4.4-150600.13.5.1 * libavdevice58_13-32bit-4.4-150600.13.5.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libavdevice58_13-64bit-debuginfo-4.4-150600.13.5.1 * libavformat58_76-64bit-4.4-150600.13.5.1 * libavresample4_0-64bit-4.4-150600.13.5.1 * libpostproc55_9-64bit-4.4-150600.13.5.1 * libavcodec58_134-64bit-4.4-150600.13.5.1 * libswscale5_9-64bit-debuginfo-4.4-150600.13.5.1 * libavformat58_76-64bit-debuginfo-4.4-150600.13.5.1 * libswresample3_9-64bit-debuginfo-4.4-150600.13.5.1 * libavfilter7_110-64bit-debuginfo-4.4-150600.13.5.1 * libavcodec58_134-64bit-debuginfo-4.4-150600.13.5.1 * libavdevice58_13-64bit-4.4-150600.13.5.1 * libswscale5_9-64bit-4.4-150600.13.5.1 * libavutil56_70-64bit-debuginfo-4.4-150600.13.5.1 * libpostproc55_9-64bit-debuginfo-4.4-150600.13.5.1 * libavutil56_70-64bit-4.4-150600.13.5.1 * libavresample4_0-64bit-debuginfo-4.4-150600.13.5.1 * libswresample3_9-64bit-4.4-150600.13.5.1 * libavfilter7_110-64bit-4.4-150600.13.5.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * ffmpeg-4-4.4-150600.13.5.1 * libswresample3_9-4.4-150600.13.5.1 * ffmpeg-4-private-devel-4.4-150600.13.5.1 * libavfilter7_110-4.4-150600.13.5.1 * libavutil56_70-debuginfo-4.4-150600.13.5.1 * ffmpeg-4-debuginfo-4.4-150600.13.5.1 * libswscale5_9-debuginfo-4.4-150600.13.5.1 * ffmpeg-4-libswresample-devel-4.4-150600.13.5.1 * libavutil56_70-4.4-150600.13.5.1 * ffmpeg-4-debugsource-4.4-150600.13.5.1 * ffmpeg-4-libavformat-devel-4.4-150600.13.5.1 * ffmpeg-4-libavfilter-devel-4.4-150600.13.5.1 * ffmpeg-4-libavdevice-devel-4.4-150600.13.5.1 * libavresample4_0-4.4-150600.13.5.1 * ffmpeg-4-libavcodec-devel-4.4-150600.13.5.1 * libpostproc55_9-debuginfo-4.4-150600.13.5.1 * libavfilter7_110-debuginfo-4.4-150600.13.5.1 * libavdevice58_13-debuginfo-4.4-150600.13.5.1 * libavdevice58_13-4.4-150600.13.5.1 * libavformat58_76-4.4-150600.13.5.1 * ffmpeg-4-libavutil-devel-4.4-150600.13.5.1 * libavformat58_76-debuginfo-4.4-150600.13.5.1 * libswscale5_9-4.4-150600.13.5.1 * libavresample4_0-debuginfo-4.4-150600.13.5.1 * libavcodec58_134-4.4-150600.13.5.1 * ffmpeg-4-libavresample-devel-4.4-150600.13.5.1 * libpostproc55_9-4.4-150600.13.5.1 * libswresample3_9-debuginfo-4.4-150600.13.5.1 * ffmpeg-4-libpostproc-devel-4.4-150600.13.5.1 * libavcodec58_134-debuginfo-4.4-150600.13.5.1 * ffmpeg-4-libswscale-devel-4.4-150600.13.5.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * libavutil56_70-debuginfo-4.4-150600.13.5.1 * ffmpeg-4-debuginfo-4.4-150600.13.5.1 * libavcodec58_134-4.4-150600.13.5.1 * libswresample3_9-4.4-150600.13.5.1 * libswscale5_9-debuginfo-4.4-150600.13.5.1 * libavutil56_70-4.4-150600.13.5.1 * ffmpeg-4-debugsource-4.4-150600.13.5.1 * libavformat58_76-4.4-150600.13.5.1 * libswresample3_9-debuginfo-4.4-150600.13.5.1 * libavformat58_76-debuginfo-4.4-150600.13.5.1 * libswscale5_9-4.4-150600.13.5.1 * libavcodec58_134-debuginfo-4.4-150600.13.5.1 ## References: * https://www.suse.com/security/cve/CVE-2020-22021.html * https://www.suse.com/security/cve/CVE-2023-51794.html * https://bugzilla.suse.com/show_bug.cgi?id=1186586 * https://bugzilla.suse.com/show_bug.cgi?id=1223437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:26 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:26 -0000 Subject: SUSE-SU-2024:1908-1: important: Security update for ffmpeg Message-ID: <171743222601.12355.11816188091830179576@smelt2.prg2.suse.org> # Security update for ffmpeg Announcement ID: SUSE-SU-2024:1908-1 Rating: important References: * bsc#1223437 Cross-References: * CVE-2023-51794 CVSS scores: * CVE-2023-51794 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Affected Products: * Desktop Applications Module 15-SP5 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for ffmpeg fixes the following issues: * CVE-2023-51794: Fixed a heap buffer overflow in libavfilter. (bsc#1223437) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-1908=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1908=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1908=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1908=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1908=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1908=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1908=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1908=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1908=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1908=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1908=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1908=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1908=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1908=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-1908=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-1908=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1908=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1908=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1908=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1908=1 ## Package List: * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libavfilter6-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libavfilter6-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libavdevice57-debuginfo-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * ffmpeg-3.4.2-150200.11.47.1 * libavdevice57-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libavfilter6-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libavfilter6-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libavdevice57-debuginfo-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * ffmpeg-3.4.2-150200.11.47.1 * libavdevice57-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libavresample-devel-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libavresample-devel-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * libavcodec-devel-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libavresample-devel-3.4.2-150200.11.47.1 * libavformat-devel-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libavresample-devel-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libavresample-devel-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libavresample-devel-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libavresample-devel-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * libavformat-devel-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libavcodec-devel-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libavresample-devel-3.4.2-150200.11.47.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * libavformat-devel-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libavcodec-devel-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libavresample-devel-3.4.2-150200.11.47.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libavresample-devel-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavfilter6-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libavfilter6-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * ffmpeg-private-devel-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavdevice-devel-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * libavcodec-devel-3.4.2-150200.11.47.1 * libavdevice57-debuginfo-3.4.2-150200.11.47.1 * libavfilter-devel-3.4.2-150200.11.47.1 * ffmpeg-3.4.2-150200.11.47.1 * libavdevice57-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libavresample-devel-3.4.2-150200.11.47.1 * libavformat-devel-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * openSUSE Leap 15.5 (x86_64) * libavresample3-32bit-3.4.2-150200.11.47.1 * libavcodec57-32bit-3.4.2-150200.11.47.1 * libpostproc54-32bit-3.4.2-150200.11.47.1 * libpostproc54-32bit-debuginfo-3.4.2-150200.11.47.1 * libavfilter6-32bit-3.4.2-150200.11.47.1 * libavutil55-32bit-3.4.2-150200.11.47.1 * libswscale4-32bit-debuginfo-3.4.2-150200.11.47.1 * libavutil55-32bit-debuginfo-3.4.2-150200.11.47.1 * libswresample2-32bit-3.4.2-150200.11.47.1 * libavcodec57-32bit-debuginfo-3.4.2-150200.11.47.1 * libavformat57-32bit-debuginfo-3.4.2-150200.11.47.1 * libavdevice57-32bit-debuginfo-3.4.2-150200.11.47.1 * libswscale4-32bit-3.4.2-150200.11.47.1 * libswresample2-32bit-debuginfo-3.4.2-150200.11.47.1 * libavresample3-32bit-debuginfo-3.4.2-150200.11.47.1 * libavdevice57-32bit-3.4.2-150200.11.47.1 * libavfilter6-32bit-debuginfo-3.4.2-150200.11.47.1 * libavformat57-32bit-3.4.2-150200.11.47.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavfilter6-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libavfilter6-debuginfo-3.4.2-150200.11.47.1 * libavformat57-debuginfo-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * ffmpeg-private-devel-3.4.2-150200.11.47.1 * libavformat57-3.4.2-150200.11.47.1 * libavdevice-devel-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * libavcodec-devel-3.4.2-150200.11.47.1 * libavdevice57-debuginfo-3.4.2-150200.11.47.1 * libavfilter-devel-3.4.2-150200.11.47.1 * ffmpeg-3.4.2-150200.11.47.1 * libavdevice57-3.4.2-150200.11.47.1 * libavresample3-debuginfo-3.4.2-150200.11.47.1 * libavresample-devel-3.4.2-150200.11.47.1 * libavformat-devel-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libavresample3-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * openSUSE Leap 15.6 (x86_64) * libavresample3-32bit-3.4.2-150200.11.47.1 * libavcodec57-32bit-3.4.2-150200.11.47.1 * libpostproc54-32bit-3.4.2-150200.11.47.1 * libpostproc54-32bit-debuginfo-3.4.2-150200.11.47.1 * libavfilter6-32bit-3.4.2-150200.11.47.1 * libavutil55-32bit-3.4.2-150200.11.47.1 * libswscale4-32bit-debuginfo-3.4.2-150200.11.47.1 * libavutil55-32bit-debuginfo-3.4.2-150200.11.47.1 * libswresample2-32bit-3.4.2-150200.11.47.1 * libavcodec57-32bit-debuginfo-3.4.2-150200.11.47.1 * libavformat57-32bit-debuginfo-3.4.2-150200.11.47.1 * libavdevice57-32bit-debuginfo-3.4.2-150200.11.47.1 * libswscale4-32bit-3.4.2-150200.11.47.1 * libswresample2-32bit-debuginfo-3.4.2-150200.11.47.1 * libavresample3-32bit-debuginfo-3.4.2-150200.11.47.1 * libavdevice57-32bit-3.4.2-150200.11.47.1 * libavfilter6-32bit-debuginfo-3.4.2-150200.11.47.1 * libavformat57-32bit-3.4.2-150200.11.47.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libavcodec57-debuginfo-3.4.2-150200.11.47.1 * libavutil55-3.4.2-150200.11.47.1 * ffmpeg-debugsource-3.4.2-150200.11.47.1 * libavutil55-debuginfo-3.4.2-150200.11.47.1 * libswscale4-3.4.2-150200.11.47.1 * libswresample-devel-3.4.2-150200.11.47.1 * libpostproc-devel-3.4.2-150200.11.47.1 * libswscale4-debuginfo-3.4.2-150200.11.47.1 * libswscale-devel-3.4.2-150200.11.47.1 * libpostproc54-debuginfo-3.4.2-150200.11.47.1 * libavcodec57-3.4.2-150200.11.47.1 * libpostproc54-3.4.2-150200.11.47.1 * libavutil-devel-3.4.2-150200.11.47.1 * ffmpeg-debuginfo-3.4.2-150200.11.47.1 * libswresample2-debuginfo-3.4.2-150200.11.47.1 * libswresample2-3.4.2-150200.11.47.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51794.html * https://bugzilla.suse.com/show_bug.cgi?id=1223437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:30 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:30 -0000 Subject: SUSE-SU-2024:1907-1: important: Security update for ffmpeg-4 Message-ID: <171743223048.12355.4825300766186749641@smelt2.prg2.suse.org> # Security update for ffmpeg-4 Announcement ID: SUSE-SU-2024:1907-1 Rating: important References: * bsc#1186586 * bsc#1223437 Cross-References: * CVE-2020-22021 * CVE-2023-51794 CVSS scores: * CVE-2020-22021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2020-22021 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-51794 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for ffmpeg-4 fixes the following issues: * CVE-2020-22021: Fixed a buffer overflow vulnerability in filter_edges() (bsc#1186586) * CVE-2023-51794: Fixed a heap buffer overflow in libavfilter. (bsc#1223437) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1907=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1907=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1907=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1907=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1907=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1907=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1907=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1907=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-1907=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libavresample4_0-4.4-150400.3.32.1 * libavcodec58_134-debuginfo-4.4-150400.3.32.1 * libavformat58_76-debuginfo-4.4-150400.3.32.1 * libavutil56_70-4.4-150400.3.32.1 * ffmpeg-4-libswscale-devel-4.4-150400.3.32.1 * ffmpeg-4-debuginfo-4.4-150400.3.32.1 * libswscale5_9-4.4-150400.3.32.1 * libavfilter7_110-4.4-150400.3.32.1 * libpostproc55_9-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-libavfilter-devel-4.4-150400.3.32.1 * libavfilter7_110-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-libavutil-devel-4.4-150400.3.32.1 * libavresample4_0-debuginfo-4.4-150400.3.32.1 * libswresample3_9-4.4-150400.3.32.1 * ffmpeg-4-4.4-150400.3.32.1 * libavdevice58_13-4.4-150400.3.32.1 * ffmpeg-4-libavresample-devel-4.4-150400.3.32.1 * libpostproc55_9-4.4-150400.3.32.1 * ffmpeg-4-private-devel-4.4-150400.3.32.1 * ffmpeg-4-debugsource-4.4-150400.3.32.1 * libavformat58_76-4.4-150400.3.32.1 * ffmpeg-4-libpostproc-devel-4.4-150400.3.32.1 * libavdevice58_13-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-libavdevice-devel-4.4-150400.3.32.1 * libavutil56_70-debuginfo-4.4-150400.3.32.1 * libswscale5_9-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-libswresample-devel-4.4-150400.3.32.1 * ffmpeg-4-libavformat-devel-4.4-150400.3.32.1 * libswresample3_9-debuginfo-4.4-150400.3.32.1 * libavcodec58_134-4.4-150400.3.32.1 * ffmpeg-4-libavcodec-devel-4.4-150400.3.32.1 * openSUSE Leap 15.4 (x86_64) * libavfilter7_110-32bit-4.4-150400.3.32.1 * libavresample4_0-32bit-debuginfo-4.4-150400.3.32.1 * libswresample3_9-32bit-debuginfo-4.4-150400.3.32.1 * libavdevice58_13-32bit-4.4-150400.3.32.1 * libpostproc55_9-32bit-debuginfo-4.4-150400.3.32.1 * libavcodec58_134-32bit-4.4-150400.3.32.1 * libavdevice58_13-32bit-debuginfo-4.4-150400.3.32.1 * libavutil56_70-32bit-debuginfo-4.4-150400.3.32.1 * libswscale5_9-32bit-4.4-150400.3.32.1 * libavresample4_0-32bit-4.4-150400.3.32.1 * libavutil56_70-32bit-4.4-150400.3.32.1 * libavcodec58_134-32bit-debuginfo-4.4-150400.3.32.1 * libswscale5_9-32bit-debuginfo-4.4-150400.3.32.1 * libavformat58_76-32bit-4.4-150400.3.32.1 * libavfilter7_110-32bit-debuginfo-4.4-150400.3.32.1 * libavformat58_76-32bit-debuginfo-4.4-150400.3.32.1 * libpostproc55_9-32bit-4.4-150400.3.32.1 * libswresample3_9-32bit-4.4-150400.3.32.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libswresample3_9-64bit-debuginfo-4.4-150400.3.32.1 * libavfilter7_110-64bit-4.4-150400.3.32.1 * libavformat58_76-64bit-4.4-150400.3.32.1 * libavresample4_0-64bit-debuginfo-4.4-150400.3.32.1 * libavdevice58_13-64bit-debuginfo-4.4-150400.3.32.1 * libavdevice58_13-64bit-4.4-150400.3.32.1 * libavcodec58_134-64bit-4.4-150400.3.32.1 * libavformat58_76-64bit-debuginfo-4.4-150400.3.32.1 * libavfilter7_110-64bit-debuginfo-4.4-150400.3.32.1 * libswresample3_9-64bit-4.4-150400.3.32.1 * libavresample4_0-64bit-4.4-150400.3.32.1 * libavcodec58_134-64bit-debuginfo-4.4-150400.3.32.1 * libpostproc55_9-64bit-debuginfo-4.4-150400.3.32.1 * libavutil56_70-64bit-debuginfo-4.4-150400.3.32.1 * libpostproc55_9-64bit-4.4-150400.3.32.1 * libswscale5_9-64bit-4.4-150400.3.32.1 * libswscale5_9-64bit-debuginfo-4.4-150400.3.32.1 * libavutil56_70-64bit-4.4-150400.3.32.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libavresample4_0-4.4-150400.3.32.1 * libavcodec58_134-debuginfo-4.4-150400.3.32.1 * libavformat58_76-debuginfo-4.4-150400.3.32.1 * libavutil56_70-4.4-150400.3.32.1 * ffmpeg-4-libswscale-devel-4.4-150400.3.32.1 * ffmpeg-4-debuginfo-4.4-150400.3.32.1 * libswscale5_9-4.4-150400.3.32.1 * libavfilter7_110-4.4-150400.3.32.1 * libpostproc55_9-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-libavfilter-devel-4.4-150400.3.32.1 * libavfilter7_110-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-libavutil-devel-4.4-150400.3.32.1 * libavresample4_0-debuginfo-4.4-150400.3.32.1 * libswresample3_9-4.4-150400.3.32.1 * ffmpeg-4-4.4-150400.3.32.1 * libavdevice58_13-4.4-150400.3.32.1 * ffmpeg-4-libavresample-devel-4.4-150400.3.32.1 * libpostproc55_9-4.4-150400.3.32.1 * ffmpeg-4-private-devel-4.4-150400.3.32.1 * ffmpeg-4-debugsource-4.4-150400.3.32.1 * libavformat58_76-4.4-150400.3.32.1 * ffmpeg-4-libpostproc-devel-4.4-150400.3.32.1 * libavdevice58_13-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-libavdevice-devel-4.4-150400.3.32.1 * libavutil56_70-debuginfo-4.4-150400.3.32.1 * libswscale5_9-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-libswresample-devel-4.4-150400.3.32.1 * ffmpeg-4-libavformat-devel-4.4-150400.3.32.1 * libswresample3_9-debuginfo-4.4-150400.3.32.1 * libavcodec58_134-4.4-150400.3.32.1 * ffmpeg-4-libavcodec-devel-4.4-150400.3.32.1 * openSUSE Leap 15.5 (x86_64) * libavfilter7_110-32bit-4.4-150400.3.32.1 * libavresample4_0-32bit-debuginfo-4.4-150400.3.32.1 * libswresample3_9-32bit-debuginfo-4.4-150400.3.32.1 * libavdevice58_13-32bit-4.4-150400.3.32.1 * libpostproc55_9-32bit-debuginfo-4.4-150400.3.32.1 * libavcodec58_134-32bit-4.4-150400.3.32.1 * libavdevice58_13-32bit-debuginfo-4.4-150400.3.32.1 * libavutil56_70-32bit-debuginfo-4.4-150400.3.32.1 * libswscale5_9-32bit-4.4-150400.3.32.1 * libavresample4_0-32bit-4.4-150400.3.32.1 * libavutil56_70-32bit-4.4-150400.3.32.1 * libavcodec58_134-32bit-debuginfo-4.4-150400.3.32.1 * libswscale5_9-32bit-debuginfo-4.4-150400.3.32.1 * libavformat58_76-32bit-4.4-150400.3.32.1 * libavfilter7_110-32bit-debuginfo-4.4-150400.3.32.1 * libavformat58_76-32bit-debuginfo-4.4-150400.3.32.1 * libpostproc55_9-32bit-4.4-150400.3.32.1 * libswresample3_9-32bit-4.4-150400.3.32.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libavresample4_0-4.4-150400.3.32.1 * libavcodec58_134-debuginfo-4.4-150400.3.32.1 * libavformat58_76-debuginfo-4.4-150400.3.32.1 * libavutil56_70-4.4-150400.3.32.1 * ffmpeg-4-libswscale-devel-4.4-150400.3.32.1 * ffmpeg-4-debuginfo-4.4-150400.3.32.1 * libswscale5_9-4.4-150400.3.32.1 * libavfilter7_110-4.4-150400.3.32.1 * libpostproc55_9-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-libavfilter-devel-4.4-150400.3.32.1 * libavfilter7_110-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-libavutil-devel-4.4-150400.3.32.1 * libavresample4_0-debuginfo-4.4-150400.3.32.1 * libswresample3_9-4.4-150400.3.32.1 * ffmpeg-4-4.4-150400.3.32.1 * libavdevice58_13-4.4-150400.3.32.1 * ffmpeg-4-libavresample-devel-4.4-150400.3.32.1 * libpostproc55_9-4.4-150400.3.32.1 * ffmpeg-4-private-devel-4.4-150400.3.32.1 * ffmpeg-4-debugsource-4.4-150400.3.32.1 * libavformat58_76-4.4-150400.3.32.1 * ffmpeg-4-libpostproc-devel-4.4-150400.3.32.1 * libavdevice58_13-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-libavdevice-devel-4.4-150400.3.32.1 * libavutil56_70-debuginfo-4.4-150400.3.32.1 * libswscale5_9-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-libswresample-devel-4.4-150400.3.32.1 * ffmpeg-4-libavformat-devel-4.4-150400.3.32.1 * libswresample3_9-debuginfo-4.4-150400.3.32.1 * libavcodec58_134-4.4-150400.3.32.1 * ffmpeg-4-libavcodec-devel-4.4-150400.3.32.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libpostproc55_9-4.4-150400.3.32.1 * libavcodec58_134-debuginfo-4.4-150400.3.32.1 * libswresample3_9-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-debugsource-4.4-150400.3.32.1 * libavformat58_76-debuginfo-4.4-150400.3.32.1 * libswresample3_9-4.4-150400.3.32.1 * libavutil56_70-4.4-150400.3.32.1 * libavcodec58_134-4.4-150400.3.32.1 * ffmpeg-4-debuginfo-4.4-150400.3.32.1 * libavformat58_76-4.4-150400.3.32.1 * libpostproc55_9-debuginfo-4.4-150400.3.32.1 * libavutil56_70-debuginfo-4.4-150400.3.32.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libpostproc55_9-4.4-150400.3.32.1 * libavcodec58_134-debuginfo-4.4-150400.3.32.1 * libswresample3_9-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-debugsource-4.4-150400.3.32.1 * libavformat58_76-debuginfo-4.4-150400.3.32.1 * libswresample3_9-4.4-150400.3.32.1 * libavutil56_70-4.4-150400.3.32.1 * libavcodec58_134-4.4-150400.3.32.1 * ffmpeg-4-debuginfo-4.4-150400.3.32.1 * libavformat58_76-4.4-150400.3.32.1 * libpostproc55_9-debuginfo-4.4-150400.3.32.1 * libavutil56_70-debuginfo-4.4-150400.3.32.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libswscale5_9-debuginfo-4.4-150400.3.32.1 * libpostproc55_9-4.4-150400.3.32.1 * libavcodec58_134-debuginfo-4.4-150400.3.32.1 * libswresample3_9-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-debugsource-4.4-150400.3.32.1 * libavformat58_76-debuginfo-4.4-150400.3.32.1 * libswresample3_9-4.4-150400.3.32.1 * libavutil56_70-4.4-150400.3.32.1 * libavcodec58_134-4.4-150400.3.32.1 * ffmpeg-4-debuginfo-4.4-150400.3.32.1 * libswscale5_9-4.4-150400.3.32.1 * libavformat58_76-4.4-150400.3.32.1 * libpostproc55_9-debuginfo-4.4-150400.3.32.1 * libavutil56_70-debuginfo-4.4-150400.3.32.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libpostproc55_9-4.4-150400.3.32.1 * libavcodec58_134-debuginfo-4.4-150400.3.32.1 * libswresample3_9-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-debugsource-4.4-150400.3.32.1 * libavformat58_76-debuginfo-4.4-150400.3.32.1 * libswresample3_9-4.4-150400.3.32.1 * libavutil56_70-4.4-150400.3.32.1 * libavcodec58_134-4.4-150400.3.32.1 * ffmpeg-4-debuginfo-4.4-150400.3.32.1 * libavformat58_76-4.4-150400.3.32.1 * libpostproc55_9-debuginfo-4.4-150400.3.32.1 * libavutil56_70-debuginfo-4.4-150400.3.32.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libpostproc55_9-4.4-150400.3.32.1 * libavcodec58_134-debuginfo-4.4-150400.3.32.1 * libswresample3_9-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-debugsource-4.4-150400.3.32.1 * libavformat58_76-debuginfo-4.4-150400.3.32.1 * libswresample3_9-4.4-150400.3.32.1 * libavutil56_70-4.4-150400.3.32.1 * libavcodec58_134-4.4-150400.3.32.1 * ffmpeg-4-debuginfo-4.4-150400.3.32.1 * libavformat58_76-4.4-150400.3.32.1 * libpostproc55_9-debuginfo-4.4-150400.3.32.1 * libavutil56_70-debuginfo-4.4-150400.3.32.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * libswscale5_9-debuginfo-4.4-150400.3.32.1 * libavcodec58_134-debuginfo-4.4-150400.3.32.1 * libswresample3_9-debuginfo-4.4-150400.3.32.1 * ffmpeg-4-debugsource-4.4-150400.3.32.1 * libavformat58_76-debuginfo-4.4-150400.3.32.1 * libswresample3_9-4.4-150400.3.32.1 * libavutil56_70-4.4-150400.3.32.1 * libavcodec58_134-4.4-150400.3.32.1 * ffmpeg-4-debuginfo-4.4-150400.3.32.1 * libswscale5_9-4.4-150400.3.32.1 * libavformat58_76-4.4-150400.3.32.1 * libavutil56_70-debuginfo-4.4-150400.3.32.1 ## References: * https://www.suse.com/security/cve/CVE-2020-22021.html * https://www.suse.com/security/cve/CVE-2023-51794.html * https://bugzilla.suse.com/show_bug.cgi?id=1186586 * https://bugzilla.suse.com/show_bug.cgi?id=1223437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:36 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:36 -0000 Subject: SUSE-RU-2024:1905-1: moderate: Recommended update for gtk4 Message-ID: <171743223630.12355.11394863796507652186@smelt2.prg2.suse.org> # Recommended update for gtk4 Announcement ID: SUSE-RU-2024:1905-1 Rating: moderate References: * bsc#1221052 Affected Products: * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for gtk4 fixes the following issues: * Fix icon rendering on big-endian s390x (bsc#1221052) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-1905=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1905=1 openSUSE-SLE-15.6-2024-1905=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1905=1 ## Package List: * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * gtk4-devel-tools-4.12.4-150600.3.3.1 * gtk4-debuginfo-4.12.4-150600.3.3.1 * gtk4-devel-4.12.4-150600.3.3.1 * gtk4-devel-tools-debuginfo-4.12.4-150600.3.3.1 * gtk4-debugsource-4.12.4-150600.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * gtk4-devel-tools-4.12.4-150600.3.3.1 * gtk4-debuginfo-4.12.4-150600.3.3.1 * gtk4-devel-4.12.4-150600.3.3.1 * gtk4-devel-tools-debuginfo-4.12.4-150600.3.3.1 * gtk4-tools-4.12.4-150600.3.3.1 * libgtk-4-1-4.12.4-150600.3.3.1 * gettext-its-gtk4-4.12.4-150600.3.3.1 * libgtk-4-1-debuginfo-4.12.4-150600.3.3.1 * typelib-1_0-Gtk-4_0-4.12.4-150600.3.3.1 * gtk4-tools-debuginfo-4.12.4-150600.3.3.1 * gtk4-debugsource-4.12.4-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gtk4-branding-upstream-4.12.4-150600.3.3.1 * gtk4-docs-4.12.4-150600.3.3.1 * gtk4-schema-4.12.4-150600.3.3.1 * gtk4-lang-4.12.4-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * gtk4-tools-4.12.4-150600.3.3.1 * gtk4-debuginfo-4.12.4-150600.3.3.1 * libgtk-4-1-4.12.4-150600.3.3.1 * gettext-its-gtk4-4.12.4-150600.3.3.1 * libgtk-4-1-debuginfo-4.12.4-150600.3.3.1 * typelib-1_0-Gtk-4_0-4.12.4-150600.3.3.1 * gtk4-tools-debuginfo-4.12.4-150600.3.3.1 * gtk4-debugsource-4.12.4-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gtk4-schema-4.12.4-150600.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221052 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:33 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:33 -0000 Subject: SUSE-SU-2024:1906-1: moderate: Security update for 389-ds Message-ID: <171743223365.12355.16230867803909400490@smelt2.prg2.suse.org> # Security update for 389-ds Announcement ID: SUSE-SU-2024:1906-1 Rating: moderate References: * bsc#1219836 Cross-References: * CVE-2024-1062 CVSS scores: * CVE-2024-1062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for 389-ds fixes the following issues: * Update to version 2.2.8~git65.347aae6: * CVE-2024-1062: Resolved possible denial of service when audit logging is enabled. (bsc#1219836) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1906=1 openSUSE-SLE-15.6-2024-1906=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1906=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * 389-ds-debuginfo-2.2.8~git65.347aae6-150600.8.3.1 * 389-ds-snmp-debuginfo-2.2.8~git65.347aae6-150600.8.3.1 * 389-ds-snmp-2.2.8~git65.347aae6-150600.8.3.1 * libsvrcore0-debuginfo-2.2.8~git65.347aae6-150600.8.3.1 * 389-ds-devel-2.2.8~git65.347aae6-150600.8.3.1 * 389-ds-debugsource-2.2.8~git65.347aae6-150600.8.3.1 * lib389-2.2.8~git65.347aae6-150600.8.3.1 * libsvrcore0-2.2.8~git65.347aae6-150600.8.3.1 * 389-ds-2.2.8~git65.347aae6-150600.8.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * 389-ds-debuginfo-2.2.8~git65.347aae6-150600.8.3.1 * libsvrcore0-debuginfo-2.2.8~git65.347aae6-150600.8.3.1 * 389-ds-devel-2.2.8~git65.347aae6-150600.8.3.1 * 389-ds-debugsource-2.2.8~git65.347aae6-150600.8.3.1 * lib389-2.2.8~git65.347aae6-150600.8.3.1 * libsvrcore0-2.2.8~git65.347aae6-150600.8.3.1 * 389-ds-2.2.8~git65.347aae6-150600.8.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-1062.html * https://bugzilla.suse.com/show_bug.cgi?id=1219836 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:38 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:38 -0000 Subject: SUSE-RU-2024:1904-1: moderate: Recommended update for mutter Message-ID: <171743223886.12355.1579250409302857631@smelt2.prg2.suse.org> # Recommended update for mutter Announcement ID: SUSE-RU-2024:1904-1 Rating: moderate References: * bsc#1219505 Affected Products: * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for mutter fixes the following issues: * Allows input method to work in Chromium/Electron-based apps with Wayland Ozone platform, which only has text-input-v1 support (bsc#1219505) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1904=1 openSUSE-SLE-15.6-2024-1904=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-1904=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * mutter-45.3-150600.5.3.1 * mutter-debuginfo-45.3-150600.5.3.1 * mutter-debugsource-45.3-150600.5.3.1 * mutter-devel-45.3-150600.5.3.1 * openSUSE Leap 15.6 (noarch) * mutter-lang-45.3-150600.5.3.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * mutter-45.3-150600.5.3.1 * mutter-debuginfo-45.3-150600.5.3.1 * mutter-debugsource-45.3-150600.5.3.1 * mutter-devel-45.3-150600.5.3.1 * Desktop Applications Module 15-SP6 (noarch) * mutter-lang-45.3-150600.5.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219505 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:41 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:41 -0000 Subject: SUSE-RU-2024:1903-1: moderate: Recommended update for mozilla-nss Message-ID: <171743224175.12355.1396772401350922633@smelt2.prg2.suse.org> # Recommended update for mozilla-nss Announcement ID: SUSE-RU-2024:1903-1 Rating: moderate References: * bsc#1223724 * jsc#PED-6358 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that contains one feature and has one fix can now be installed. ## Description: This update for mozilla-nss fixes the following issues: * Fixed startup crash of Firefox when using FIPS-mode (bsc#1223724). * Added "Provides: nss" so other RPMs that require 'nss' can be installed (jsc#PED-6358). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1903=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1903=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1903=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1903=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1903=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1903=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1903=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1903=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1903=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1903=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * mozilla-nss-3.90.2-150000.3.111.1 * mozilla-nss-certs-3.90.2-150000.3.111.1 * mozilla-nss-devel-3.90.2-150000.3.111.1 * libsoftokn3-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-3.90.2-150000.3.111.1 * mozilla-nss-tools-3.90.2-150000.3.111.1 * mozilla-nss-debugsource-3.90.2-150000.3.111.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.111.1 * libsoftokn3-3.90.2-150000.3.111.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-32bit-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.111.1 * libsoftokn3-32bit-3.90.2-150000.3.111.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-32bit-3.90.2-150000.3.111.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * mozilla-nss-3.90.2-150000.3.111.1 * mozilla-nss-certs-3.90.2-150000.3.111.1 * mozilla-nss-devel-3.90.2-150000.3.111.1 * libsoftokn3-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-3.90.2-150000.3.111.1 * mozilla-nss-tools-3.90.2-150000.3.111.1 * mozilla-nss-debugsource-3.90.2-150000.3.111.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.111.1 * libsoftokn3-3.90.2-150000.3.111.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-32bit-3.90.2-150000.3.111.1 * mozilla-nss-32bit-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.111.1 * libsoftokn3-32bit-3.90.2-150000.3.111.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-32bit-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-32bit-3.90.2-150000.3.111.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * mozilla-nss-3.90.2-150000.3.111.1 * mozilla-nss-certs-3.90.2-150000.3.111.1 * mozilla-nss-devel-3.90.2-150000.3.111.1 * libsoftokn3-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-3.90.2-150000.3.111.1 * mozilla-nss-tools-3.90.2-150000.3.111.1 * mozilla-nss-debugsource-3.90.2-150000.3.111.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.111.1 * libsoftokn3-3.90.2-150000.3.111.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-32bit-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.111.1 * libsoftokn3-32bit-3.90.2-150000.3.111.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-32bit-3.90.2-150000.3.111.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * mozilla-nss-3.90.2-150000.3.111.1 * mozilla-nss-certs-3.90.2-150000.3.111.1 * mozilla-nss-devel-3.90.2-150000.3.111.1 * libsoftokn3-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-3.90.2-150000.3.111.1 * mozilla-nss-tools-3.90.2-150000.3.111.1 * mozilla-nss-debugsource-3.90.2-150000.3.111.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.111.1 * libsoftokn3-3.90.2-150000.3.111.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-32bit-3.90.2-150000.3.111.1 * mozilla-nss-32bit-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.111.1 * libsoftokn3-32bit-3.90.2-150000.3.111.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-32bit-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-32bit-3.90.2-150000.3.111.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * mozilla-nss-3.90.2-150000.3.111.1 * mozilla-nss-certs-3.90.2-150000.3.111.1 * mozilla-nss-devel-3.90.2-150000.3.111.1 * libsoftokn3-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-3.90.2-150000.3.111.1 * mozilla-nss-tools-3.90.2-150000.3.111.1 * mozilla-nss-debugsource-3.90.2-150000.3.111.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.111.1 * libsoftokn3-3.90.2-150000.3.111.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-32bit-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.111.1 * libsoftokn3-32bit-3.90.2-150000.3.111.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-32bit-3.90.2-150000.3.111.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * mozilla-nss-3.90.2-150000.3.111.1 * mozilla-nss-certs-3.90.2-150000.3.111.1 * mozilla-nss-devel-3.90.2-150000.3.111.1 * libsoftokn3-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-3.90.2-150000.3.111.1 * mozilla-nss-tools-3.90.2-150000.3.111.1 * mozilla-nss-debugsource-3.90.2-150000.3.111.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.111.1 * libsoftokn3-3.90.2-150000.3.111.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-32bit-3.90.2-150000.3.111.1 * mozilla-nss-32bit-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.111.1 * libsoftokn3-32bit-3.90.2-150000.3.111.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-32bit-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-32bit-3.90.2-150000.3.111.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.111.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * mozilla-nss-3.90.2-150000.3.111.1 * mozilla-nss-certs-3.90.2-150000.3.111.1 * mozilla-nss-devel-3.90.2-150000.3.111.1 * libsoftokn3-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-3.90.2-150000.3.111.1 * mozilla-nss-tools-3.90.2-150000.3.111.1 * mozilla-nss-debugsource-3.90.2-150000.3.111.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.111.1 * libsoftokn3-3.90.2-150000.3.111.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-debuginfo-3.90.2-150000.3.111.1 * SUSE Enterprise Storage 7.1 (x86_64) * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-32bit-3.90.2-150000.3.111.1 * mozilla-nss-32bit-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.111.1 * libsoftokn3-32bit-3.90.2-150000.3.111.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-sysinit-32bit-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-32bit-3.90.2-150000.3.111.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * mozilla-nss-3.90.2-150000.3.111.1 * mozilla-nss-certs-3.90.2-150000.3.111.1 * libsoftokn3-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-3.90.2-150000.3.111.1 * mozilla-nss-tools-3.90.2-150000.3.111.1 * mozilla-nss-debugsource-3.90.2-150000.3.111.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-debuginfo-3.90.2-150000.3.111.1 * libsoftokn3-3.90.2-150000.3.111.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * mozilla-nss-3.90.2-150000.3.111.1 * mozilla-nss-certs-3.90.2-150000.3.111.1 * libsoftokn3-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-3.90.2-150000.3.111.1 * mozilla-nss-tools-3.90.2-150000.3.111.1 * mozilla-nss-debugsource-3.90.2-150000.3.111.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-debuginfo-3.90.2-150000.3.111.1 * libsoftokn3-3.90.2-150000.3.111.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-debuginfo-3.90.2-150000.3.111.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * mozilla-nss-3.90.2-150000.3.111.1 * mozilla-nss-certs-3.90.2-150000.3.111.1 * libsoftokn3-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-3.90.2-150000.3.111.1 * mozilla-nss-tools-3.90.2-150000.3.111.1 * mozilla-nss-debugsource-3.90.2-150000.3.111.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.111.1 * libfreebl3-debuginfo-3.90.2-150000.3.111.1 * libsoftokn3-3.90.2-150000.3.111.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.111.1 * mozilla-nss-debuginfo-3.90.2-150000.3.111.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223724 * https://jira.suse.com/browse/PED-6358 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:45 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:45 -0000 Subject: SUSE-SU-2024:1900-1: low: Security update for poppler Message-ID: <171743224537.12355.4823263123440695915@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2024:1900-1 Rating: low References: * bsc#1223375 Cross-References: * CVE-2024-4141 CVSS scores: * CVE-2024-4141 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2024-4141: Fixed out-of-bounds array write (bsc#1223375). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1900=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-1900=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libpoppler-glib8-debuginfo-22.01.0-150400.3.19.1 * poppler-tools-22.01.0-150400.3.19.1 * libpoppler-cpp0-22.01.0-150400.3.19.1 * libpoppler117-22.01.0-150400.3.19.1 * libpoppler-qt6-devel-22.01.0-150400.3.19.1 * poppler-qt6-debugsource-22.01.0-150400.3.19.1 * libpoppler-qt6-3-22.01.0-150400.3.19.1 * poppler-debugsource-22.01.0-150400.3.19.1 * libpoppler-qt5-1-22.01.0-150400.3.19.1 * libpoppler-qt6-3-debuginfo-22.01.0-150400.3.19.1 * typelib-1_0-Poppler-0_18-22.01.0-150400.3.19.1 * libpoppler-glib-devel-22.01.0-150400.3.19.1 * poppler-qt5-debugsource-22.01.0-150400.3.19.1 * libpoppler-glib8-22.01.0-150400.3.19.1 * libpoppler-cpp0-debuginfo-22.01.0-150400.3.19.1 * libpoppler-qt5-devel-22.01.0-150400.3.19.1 * libpoppler-qt5-1-debuginfo-22.01.0-150400.3.19.1 * poppler-tools-debuginfo-22.01.0-150400.3.19.1 * libpoppler117-debuginfo-22.01.0-150400.3.19.1 * libpoppler-devel-22.01.0-150400.3.19.1 * openSUSE Leap 15.4 (x86_64) * libpoppler-qt5-1-32bit-22.01.0-150400.3.19.1 * libpoppler117-32bit-debuginfo-22.01.0-150400.3.19.1 * libpoppler-cpp0-32bit-22.01.0-150400.3.19.1 * libpoppler117-32bit-22.01.0-150400.3.19.1 * libpoppler-qt5-1-32bit-debuginfo-22.01.0-150400.3.19.1 * libpoppler-glib8-32bit-22.01.0-150400.3.19.1 * libpoppler-cpp0-32bit-debuginfo-22.01.0-150400.3.19.1 * libpoppler-glib8-32bit-debuginfo-22.01.0-150400.3.19.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libpoppler-qt5-1-64bit-22.01.0-150400.3.19.1 * libpoppler-qt5-1-64bit-debuginfo-22.01.0-150400.3.19.1 * libpoppler-glib8-64bit-22.01.0-150400.3.19.1 * libpoppler117-64bit-debuginfo-22.01.0-150400.3.19.1 * libpoppler-glib8-64bit-debuginfo-22.01.0-150400.3.19.1 * libpoppler117-64bit-22.01.0-150400.3.19.1 * libpoppler-cpp0-64bit-22.01.0-150400.3.19.1 * libpoppler-cpp0-64bit-debuginfo-22.01.0-150400.3.19.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * poppler-debugsource-22.01.0-150400.3.19.1 * libpoppler117-22.01.0-150400.3.19.1 * libpoppler117-debuginfo-22.01.0-150400.3.19.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4141.html * https://bugzilla.suse.com/show_bug.cgi?id=1223375 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:43 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:43 -0000 Subject: SUSE-SU-2024:1901-1: low: Security update for poppler Message-ID: <171743224395.12355.2041522802817805997@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2024:1901-1 Rating: low References: * bsc#1223375 Cross-References: * CVE-2024-4141 CVSS scores: * CVE-2024-4141 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2024-4141: Fixed out-of-bounds array write (bsc#1223375). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1901=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libpoppler44-0.24.4-14.47.1 * libpoppler44-debuginfo-0.24.4-14.47.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4141.html * https://bugzilla.suse.com/show_bug.cgi?id=1223375 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:48 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:48 -0000 Subject: SUSE-SU-2024:1899-1: low: Security update for poppler Message-ID: <171743224805.12355.17186140922499891821@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2024:1899-1 Rating: low References: * bsc#1223375 Cross-References: * CVE-2024-4141 CVSS scores: * CVE-2024-4141 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2024-4141: Fixed out-of-bounds array write (bsc#1223375). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1899=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1899=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1899=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1899=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libpoppler-devel-0.43.0-16.46.1 * libpoppler-cpp0-0.43.0-16.46.1 * libpoppler-glib-devel-0.43.0-16.46.1 * libpoppler-cpp0-debuginfo-0.43.0-16.46.1 * poppler-debugsource-0.43.0-16.46.1 * typelib-1_0-Poppler-0_18-0.43.0-16.46.1 * libpoppler-qt4-devel-0.43.0-16.46.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libpoppler60-debuginfo-0.43.0-16.46.1 * poppler-tools-0.43.0-16.46.1 * libpoppler-glib8-0.43.0-16.46.1 * poppler-debugsource-0.43.0-16.46.1 * libpoppler-qt4-4-0.43.0-16.46.1 * libpoppler-glib8-debuginfo-0.43.0-16.46.1 * poppler-tools-debuginfo-0.43.0-16.46.1 * libpoppler60-0.43.0-16.46.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libpoppler-qt4-4-debuginfo-0.43.0-16.46.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libpoppler60-debuginfo-0.43.0-16.46.1 * poppler-tools-0.43.0-16.46.1 * libpoppler-glib8-0.43.0-16.46.1 * poppler-debugsource-0.43.0-16.46.1 * libpoppler-qt4-4-0.43.0-16.46.1 * libpoppler-glib8-debuginfo-0.43.0-16.46.1 * poppler-tools-debuginfo-0.43.0-16.46.1 * libpoppler60-0.43.0-16.46.1 * SUSE Linux Enterprise Server 12 SP5 (ppc64le s390x x86_64) * libpoppler-qt4-4-debuginfo-0.43.0-16.46.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libpoppler60-debuginfo-0.43.0-16.46.1 * libpoppler-qt4-4-debuginfo-0.43.0-16.46.1 * poppler-tools-0.43.0-16.46.1 * libpoppler-glib8-0.43.0-16.46.1 * poppler-debugsource-0.43.0-16.46.1 * libpoppler-qt4-4-0.43.0-16.46.1 * libpoppler-glib8-debuginfo-0.43.0-16.46.1 * poppler-tools-debuginfo-0.43.0-16.46.1 * libpoppler60-0.43.0-16.46.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4141.html * https://bugzilla.suse.com/show_bug.cgi?id=1223375 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 3 16:30:50 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Jun 2024 16:30:50 -0000 Subject: SUSE-SU-2024:1271-2: moderate: Security update for gnutls Message-ID: <171743225011.12355.2012405062506485559@smelt2.prg2.suse.org> # Security update for gnutls Announcement ID: SUSE-SU-2024:1271-2 Rating: moderate References: * bsc#1221242 * bsc#1221746 * bsc#1221747 Cross-References: * CVE-2024-28834 * CVE-2024-28835 CVSS scores: * CVE-2024-28834 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-28835 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for gnutls fixes the following issues: * CVE-2024-28834: Fixed side-channel in the deterministic ECDSA (bsc#1221746) * CVE-2024-28835: Fixed denial of service during certificate chain verification (bsc#1221747) Other fixes: \- jitterentropy: Release the memory of the entropy collector when using jitterentropy with phtreads as there is also a pre-intitization done in the main thread (bsc#1221242) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1271=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1271=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1271=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1271=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1271=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1271=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1271=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1271=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libgnutlsxx28-3.7.3-150400.4.44.1 * libgnutls30-hmac-3.7.3-150400.4.44.1 * gnutls-debugsource-3.7.3-150400.4.44.1 * libgnutls30-3.7.3-150400.4.44.1 * gnutls-debuginfo-3.7.3-150400.4.44.1 * libgnutlsxx-devel-3.7.3-150400.4.44.1 * libgnutlsxx28-debuginfo-3.7.3-150400.4.44.1 * libgnutls-devel-3.7.3-150400.4.44.1 * libgnutls30-debuginfo-3.7.3-150400.4.44.1 * gnutls-3.7.3-150400.4.44.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libgnutls30-32bit-debuginfo-3.7.3-150400.4.44.1 * libgnutls30-32bit-3.7.3-150400.4.44.1 * libgnutls30-hmac-32bit-3.7.3-150400.4.44.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libgnutlsxx28-3.7.3-150400.4.44.1 * libgnutls30-hmac-3.7.3-150400.4.44.1 * gnutls-debugsource-3.7.3-150400.4.44.1 * libgnutls30-3.7.3-150400.4.44.1 * gnutls-debuginfo-3.7.3-150400.4.44.1 * libgnutlsxx-devel-3.7.3-150400.4.44.1 * libgnutlsxx28-debuginfo-3.7.3-150400.4.44.1 * libgnutls-devel-3.7.3-150400.4.44.1 * libgnutls30-debuginfo-3.7.3-150400.4.44.1 * gnutls-3.7.3-150400.4.44.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libgnutls30-32bit-debuginfo-3.7.3-150400.4.44.1 * libgnutls30-32bit-3.7.3-150400.4.44.1 * libgnutls30-hmac-32bit-3.7.3-150400.4.44.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libgnutlsxx28-3.7.3-150400.4.44.1 * libgnutls30-hmac-3.7.3-150400.4.44.1 * gnutls-debugsource-3.7.3-150400.4.44.1 * libgnutls30-3.7.3-150400.4.44.1 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.44.1 * gnutls-debuginfo-3.7.3-150400.4.44.1 * libgnutlsxx-devel-3.7.3-150400.4.44.1 * libgnutls30-32bit-3.7.3-150400.4.44.1 * libgnutlsxx28-debuginfo-3.7.3-150400.4.44.1 * libgnutls-devel-3.7.3-150400.4.44.1 * libgnutls30-debuginfo-3.7.3-150400.4.44.1 * libgnutls30-hmac-32bit-3.7.3-150400.4.44.1 * gnutls-3.7.3-150400.4.44.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libgnutlsxx28-3.7.3-150400.4.44.1 * libgnutls30-hmac-3.7.3-150400.4.44.1 * gnutls-debugsource-3.7.3-150400.4.44.1 * libgnutls30-3.7.3-150400.4.44.1 * gnutls-debuginfo-3.7.3-150400.4.44.1 * libgnutlsxx-devel-3.7.3-150400.4.44.1 * libgnutlsxx28-debuginfo-3.7.3-150400.4.44.1 * libgnutls-devel-3.7.3-150400.4.44.1 * libgnutls30-debuginfo-3.7.3-150400.4.44.1 * gnutls-3.7.3-150400.4.44.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libgnutls30-32bit-debuginfo-3.7.3-150400.4.44.1 * libgnutls30-32bit-3.7.3-150400.4.44.1 * libgnutls30-hmac-32bit-3.7.3-150400.4.44.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libgnutlsxx28-3.7.3-150400.4.44.1 * libgnutls30-hmac-3.7.3-150400.4.44.1 * gnutls-debugsource-3.7.3-150400.4.44.1 * libgnutls30-3.7.3-150400.4.44.1 * gnutls-debuginfo-3.7.3-150400.4.44.1 * libgnutlsxx-devel-3.7.3-150400.4.44.1 * libgnutlsxx28-debuginfo-3.7.3-150400.4.44.1 * libgnutls-devel-3.7.3-150400.4.44.1 * libgnutls30-debuginfo-3.7.3-150400.4.44.1 * gnutls-3.7.3-150400.4.44.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libgnutls30-32bit-debuginfo-3.7.3-150400.4.44.1 * libgnutls30-32bit-3.7.3-150400.4.44.1 * libgnutls30-hmac-32bit-3.7.3-150400.4.44.1 * SUSE Manager Proxy 4.3 (x86_64) * libgnutlsxx28-3.7.3-150400.4.44.1 * libgnutls30-hmac-3.7.3-150400.4.44.1 * gnutls-debugsource-3.7.3-150400.4.44.1 * libgnutls30-3.7.3-150400.4.44.1 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.44.1 * gnutls-debuginfo-3.7.3-150400.4.44.1 * libgnutlsxx-devel-3.7.3-150400.4.44.1 * libgnutls30-32bit-3.7.3-150400.4.44.1 * libgnutlsxx28-debuginfo-3.7.3-150400.4.44.1 * libgnutls-devel-3.7.3-150400.4.44.1 * libgnutls30-debuginfo-3.7.3-150400.4.44.1 * libgnutls30-hmac-32bit-3.7.3-150400.4.44.1 * gnutls-3.7.3-150400.4.44.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libgnutlsxx28-3.7.3-150400.4.44.1 * libgnutls30-hmac-3.7.3-150400.4.44.1 * gnutls-debugsource-3.7.3-150400.4.44.1 * libgnutls30-3.7.3-150400.4.44.1 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.44.1 * gnutls-debuginfo-3.7.3-150400.4.44.1 * libgnutlsxx-devel-3.7.3-150400.4.44.1 * libgnutls30-32bit-3.7.3-150400.4.44.1 * libgnutlsxx28-debuginfo-3.7.3-150400.4.44.1 * libgnutls-devel-3.7.3-150400.4.44.1 * libgnutls30-debuginfo-3.7.3-150400.4.44.1 * libgnutls30-hmac-32bit-3.7.3-150400.4.44.1 * gnutls-3.7.3-150400.4.44.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libgnutlsxx28-3.7.3-150400.4.44.1 * libgnutls30-hmac-3.7.3-150400.4.44.1 * gnutls-debugsource-3.7.3-150400.4.44.1 * libgnutls30-3.7.3-150400.4.44.1 * gnutls-debuginfo-3.7.3-150400.4.44.1 * libgnutlsxx-devel-3.7.3-150400.4.44.1 * libgnutlsxx28-debuginfo-3.7.3-150400.4.44.1 * libgnutls-devel-3.7.3-150400.4.44.1 * libgnutls30-debuginfo-3.7.3-150400.4.44.1 * gnutls-3.7.3-150400.4.44.1 * SUSE Manager Server 4.3 (x86_64) * libgnutls30-32bit-debuginfo-3.7.3-150400.4.44.1 * libgnutls30-32bit-3.7.3-150400.4.44.1 * libgnutls30-hmac-32bit-3.7.3-150400.4.44.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28834.html * https://www.suse.com/security/cve/CVE-2024-28835.html * https://bugzilla.suse.com/show_bug.cgi?id=1221242 * https://bugzilla.suse.com/show_bug.cgi?id=1221746 * https://bugzilla.suse.com/show_bug.cgi?id=1221747 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 4 08:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 04 Jun 2024 08:30:01 -0000 Subject: SUSE-RU-2024:1921-1: important: Recommended update for azure-cli Message-ID: <171748980177.1137.9341459502383382042@smelt2.prg2.suse.org> # Recommended update for azure-cli Announcement ID: SUSE-RU-2024:1921-1 Rating: important References: * bsc#1224326 Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for azure-cli fixes the following issues: * Add Obsoletes for deprecated azure-cli-taskhelp package to fix dependency issues (bsc#1224326) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1921=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1921=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1921=1 ## Package List: * openSUSE Leap 15.4 (noarch) * azure-cli-2.58.0-150400.14.9.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * azure-cli-test-2.58.0-150400.14.9.1 * Public Cloud Module 15-SP4 (noarch) * azure-cli-2.58.0-150400.14.9.1 * Public Cloud Module 15-SP5 (noarch) * azure-cli-2.58.0-150400.14.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224326 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 4 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 04 Jun 2024 12:30:02 -0000 Subject: SUSE-SU-2024:1923-1: important: Security update for unbound Message-ID: <171750420236.24252.11389109159232670411@smelt2.prg2.suse.org> # Security update for unbound Announcement ID: SUSE-SU-2024:1923-1 Rating: important References: * bsc#1202031 * bsc#1202033 * bsc#1203643 * bsc#1219823 * bsc#1219826 * jsc#PED-8333 Cross-References: * CVE-2022-30698 * CVE-2022-30699 * CVE-2022-3204 * CVE-2023-50387 * CVE-2023-50868 CVSS scores: * CVE-2022-30698 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-30698 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-30699 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-30699 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-3204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3204 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves five vulnerabilities and contains one feature can now be installed. ## Description: This update for unbound fixes the following issues: unbound was updated to 1.20.0: * A lot of bugfixes and added features. For a complete list take a look at the changelog located at: /usr/share/doc/packages/unbound/Changelog or https://www.nlnetlabs.nl/projects/unbound/download/ Some Noteworthy Changes: * Removed DLV. The DLV has been decommisioned since unbound 1.5.4 and has been advised to stop using it since. The use of dlv options displays a warning. * Remove EDNS lame procedure, do not re-query without EDNS after timeout. * Add DNS over HTTPS * libunbound has been upgraded to major version 8 Security Fixes: * CVE-2023-50387: DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers. [bsc#1219823] * CVE-2023-50868: NSEC3 closest encloser proof can exhaust CPU. [bsc#1219826] * CVE-2022-30698: Novel "ghost domain names" attack by introducing subdomain delegations. [bsc#1202033] * CVE-2022-30699: Novel "ghost domain names" attack by updating almost expired delegation information. [bsc#1202031] * CVE-2022-3204: NRDelegation attack leads to uncontrolled resource consumption (Non-Responsive Delegation Attack). [bsc#1203643] Packaging Changes: * Use prefixes instead of sudo in unbound.service * Remove no longer necessary BuildRequires: libfstrm-devel and libprotobuf-c- devel ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1923=1 openSUSE-SLE-15.6-2024-1923=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1923=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1923=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libunbound-devel-mini-debugsource-1.20.0-150600.23.3.1 * unbound-1.20.0-150600.23.3.1 * libunbound8-1.20.0-150600.23.3.1 * libunbound-devel-mini-debuginfo-1.20.0-150600.23.3.1 * libunbound8-debuginfo-1.20.0-150600.23.3.1 * unbound-anchor-debuginfo-1.20.0-150600.23.3.1 * unbound-debugsource-1.20.0-150600.23.3.1 * unbound-debuginfo-1.20.0-150600.23.3.1 * unbound-devel-1.20.0-150600.23.3.1 * unbound-python-1.20.0-150600.23.3.1 * unbound-anchor-1.20.0-150600.23.3.1 * unbound-python-debuginfo-1.20.0-150600.23.3.1 * libunbound-devel-mini-1.20.0-150600.23.3.1 * openSUSE Leap 15.6 (noarch) * unbound-munin-1.20.0-150600.23.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * unbound-debugsource-1.20.0-150600.23.3.1 * libunbound8-1.20.0-150600.23.3.1 * unbound-anchor-debuginfo-1.20.0-150600.23.3.1 * libunbound8-debuginfo-1.20.0-150600.23.3.1 * unbound-devel-1.20.0-150600.23.3.1 * unbound-debuginfo-1.20.0-150600.23.3.1 * unbound-anchor-1.20.0-150600.23.3.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * unbound-1.20.0-150600.23.3.1 * unbound-debugsource-1.20.0-150600.23.3.1 * unbound-python-1.20.0-150600.23.3.1 * unbound-debuginfo-1.20.0-150600.23.3.1 * unbound-python-debuginfo-1.20.0-150600.23.3.1 ## References: * https://www.suse.com/security/cve/CVE-2022-30698.html * https://www.suse.com/security/cve/CVE-2022-30699.html * https://www.suse.com/security/cve/CVE-2022-3204.html * https://www.suse.com/security/cve/CVE-2023-50387.html * https://www.suse.com/security/cve/CVE-2023-50868.html * https://bugzilla.suse.com/show_bug.cgi?id=1202031 * https://bugzilla.suse.com/show_bug.cgi?id=1202033 * https://bugzilla.suse.com/show_bug.cgi?id=1203643 * https://bugzilla.suse.com/show_bug.cgi?id=1219823 * https://bugzilla.suse.com/show_bug.cgi?id=1219826 * https://jira.suse.com/browse/PED-8333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 4 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 04 Jun 2024 12:30:05 -0000 Subject: SUSE-SU-2024:1922-1: moderate: Security update for mariadb104 Message-ID: <171750420514.24252.9257194029871409794@smelt2.prg2.suse.org> # Security update for mariadb104 Announcement ID: SUSE-SU-2024:1922-1 Rating: moderate References: * bsc#1217405 Cross-References: * CVE-2023-22084 CVSS scores: * CVE-2023-22084 ( SUSE ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-22084 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for mariadb104 fixes the following issues: * Update to 10.4.33: * CVE-2023-22084: Fixed a bug that allowed high privileged attackers with network access via multiple protocols to compromise the server. (bsc#1217405) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1922=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * mariadb104-debuginfo-10.4.33-150100.3.8.1 * mariadb104-bench-debuginfo-10.4.33-150100.3.8.1 * mariadb104-10.4.33-150100.3.8.1 * mariadb104-bench-10.4.33-150100.3.8.1 * mariadb104-client-debuginfo-10.4.33-150100.3.8.1 * mariadb104-rpm-macros-10.4.33-150100.3.8.1 * mariadb104-test-10.4.33-150100.3.8.1 * mariadb104-client-10.4.33-150100.3.8.1 * mariadb104-test-debuginfo-10.4.33-150100.3.8.1 * mariadb104-galera-10.4.33-150100.3.8.1 * mariadb104-debugsource-10.4.33-150100.3.8.1 * mariadb104-tools-10.4.33-150100.3.8.1 * mariadb104-tools-debuginfo-10.4.33-150100.3.8.1 * libmariadbd104-devel-10.4.33-150100.3.8.1 * openSUSE Leap 15.6 (noarch) * mariadb104-errormessages-10.4.33-150100.3.8.1 ## References: * https://www.suse.com/security/cve/CVE-2023-22084.html * https://bugzilla.suse.com/show_bug.cgi?id=1217405 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 5 08:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 05 Jun 2024 08:30:01 -0000 Subject: SUSE-RU-2024:1924-1: moderate: Recommended update for obs-service-replace_using_package_version Message-ID: <171757620120.15547.9582693886523076962@smelt2.prg2.suse.org> # Recommended update for obs-service-replace_using_package_version Announcement ID: SUSE-RU-2024:1924-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 An update that can now be installed. ## Description: This update for obs-service-replace_using_package_version fixes the following issues: obs-service-replace_using_package_version was updated to version 1702495728.72fe58b: * Changes in version 1702495728.72fe58b: * Bump version: 0.0.8 to 0.0.9 * Bump actions/setup-python from 4.7.1 to 5.0.0 * Workaround integration test failures due to PEP 668 marker * Bump actions/setup-python from 4.6.1 to 4.7.1 * Bump actions/checkout from 3 to 4 * Report the package name that is missing (#56) * Bump pytest-container from 0.1.1 to 0.2.0 * Drop mock dependency, stdlib has it * Bump actions/setup-python from 4.5.0 to 4.6.1 * Bump version: 0.0.7 to 0.0.8 * Changes in version 1681202780.6d8bb3c: * Run unit & install test only for the system python * Add python 3.11 tox environment * Switch to using rpm.labelCompare instead of parse_version * Fix copyright strings * Fix test_find_package_version * Bump mock from 4.0.3 to 5.0.1 * Bump pytest-xdist from 2.5.0 to 3.0.2 * Bump tox from 3.25.1 to 3.28.0 * Bump Gr1N/setup-poetry from 7 to 8 * Bump pytest-container from 0.0.2 to 0.1.1 * Bump actions/setup-python from 4.3.0 to 4.5.0 * Changes in version 1680160876.6dcaef0: * Bump version: 0.0.6 to 0.0.7 * Fix default value for empty or missing version * Bump flake8 from 5.0.1 to 5.0.4 * Changes in version 1668090256.71deb28: * Bump version: 0.0.5 to 0.0.6 * Link to the official poetry installation guide * Update replace_using_package_version.service * Update README.md * Update integration_tests/test_version_extraction.py * Update replace_using_package_version.service * Attempt to read version from obsinfo if no version is found * Add Leap 15.4 & SLE 15 SP4 to the CI * Changes in version 1668085498.ab6de1e: * Bump version: 0.0.4 to 0.0.5 * Remove the rpm signkeys in the CI environment * Adapt tests to mock subprocess.check_output * Ignore stderr on successful command executions * Changes in version 1667988064.d72b7ba: * Bump version: 0.0.3 to 0.0.4 * Update obs-service-replace_using_package_version.spec * Adapt spec to the current project setup * Bump actions/setup-python from 3 to 4.3.0 * Bump pytest-cov from 3.0.0 to 4.0.0 * Bump flake8 from 4.0.1 to 5.0.1 * Bump tox from 3.24.5 to 3.25.1 * Bump actions/cache from 2 to 3 * Bump actions/checkout from 2 to 3 * Bump actions/setup-python from 2 to 3 * Bump pytest from 6.2.5 to 7.0.1 * Switch from custom run_command to using check_output * Remove additional space from pyproject.toml * Replace travis CI badge with GitHub Actions badge * Make the file parameter default to the build recipe * Add integration tests using pytest_container * Bump coverage from 6.3 to 6.3.1 * Switch from travis-ci to github actions * Remove trailing whitespace * Switch to poetry instead of using setup.py * Correct spelling & gramar in .service * Add missing closing description element to .service * Follow the python package naming conventions ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1924=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1924=1 ## Package List: * openSUSE Leap 15.5 (noarch) * obs-service-replace_using_package_version-0.0.9-150000.3.9.1 * openSUSE Leap 15.6 (noarch) * obs-service-replace_using_package_version-0.0.9-150000.3.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 5 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 05 Jun 2024 12:30:04 -0000 Subject: SUSE-SU-2024:1925-1: important: Security update for python-PyMySQL Message-ID: <171759060428.26990.10523208424368949746@smelt2.prg2.suse.org> # Security update for python-PyMySQL Announcement ID: SUSE-SU-2024:1925-1 Rating: important References: * bsc#1225070 Cross-References: * CVE-2024-36039 CVSS scores: * CVE-2024-36039 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for python-PyMySQL fixes the following issues: * CVE-2024-36039: Fixed SQL injection when used with untrusted JSON input (bsc#1225070). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1925=1 SUSE-2024-1925=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-PyMySQL-1.1.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-36039.html * https://bugzilla.suse.com/show_bug.cgi?id=1225070 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 5 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 05 Jun 2024 16:30:05 -0000 Subject: SUSE-RU-2024:1930-1: moderate: Recommended update for SAPHanaSR-angi Message-ID: <171760500540.31622.14324034791949120012@smelt2.prg2.suse.org> # Recommended update for SAPHanaSR-angi Announcement ID: SUSE-RU-2024:1930-1 Rating: moderate References: * bsc#1218333 * bsc#1218696 * bsc#1218698 * bsc#1218699 * jsc#PED-6402 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SAP Applications Module 15-SP5 * SAP Applications Module 15-SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains one feature and has four fixes can now be installed. ## Description: This update for SAPHanaSR-angi fixes the following issues: SAPHanaSR-angi was updated to version 1.2.7: * Version 1.2.7: * Package SAPHanaSR-angi and SAPHanaFilesystem RA are now in state 'supported' * Added feature HANA 'FAST-STOP' and parameter 'ON_FAIL_ACTION' * Added new demo script SAPHanaSR-upgrade-to-angi-demo * Added crm config examples * Adapted syntax of `susHanaSR.py` * Fixed the hexdump log for empty node states * Catch monitor calls for non-cloned resources and report them as unsupported instead of 'command not found' (bsc#1218333) * `susChkSrv.py` \- relocate function logTimestamp() * `susHanaSR.py` \- catch possible I/O error * Security improvements (bsc#1218696, bsc#1218698 and bsc#1218699) * Removed instance parameter "REMOVE_SAP_SOCKETS", no longer supported * Add detailed timing log messages for runtime information * Add cache/live value optimization * New `man` pages: * SAPHanaSR_upgrade_to_angi.7 * SAPHanaSR-upgrade-to-angi-demo.8 * Updated `man` pages: * SAPHanaSR.7 * SAPHanaSR-ScaleOut.7 * SAPHanaSR_basic_cluster.7 * SAPHanaSR-ScaleOut_basic_cluster.7 * SAPHanaSR_maintenance_examples.7 * ocf_suse_SAPHana.7 * ocf_suse_SAPHanaController.7 * ocf_suse_SAPHanaFilesystem.7 * susChkSrv.py.7 * susHanaSR.py.7 * susHanaSrMultiTarget.py.7 * SAPHanaSR-manageProvider.8 * SAPHanaSR-showAttr.8 * SAPHanaSR-replay-archive.8 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-1930=1 openSUSE-SLE-15.5-2024-1930=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1930=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1930=1 * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1930=1 ## Package List: * openSUSE Leap 15.5 (noarch) * SAPHanaSR-angi-1.2.7-150500.3.9.1 * openSUSE Leap 15.6 (noarch) * SAPHanaSR-angi-1.2.7-150500.3.9.1 * SAP Applications Module 15-SP5 (noarch) * SAPHanaSR-angi-1.2.7-150500.3.9.1 * SAP Applications Module 15-SP6 (noarch) * SAPHanaSR-angi-1.2.7-150500.3.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218333 * https://bugzilla.suse.com/show_bug.cgi?id=1218696 * https://bugzilla.suse.com/show_bug.cgi?id=1218698 * https://bugzilla.suse.com/show_bug.cgi?id=1218699 * https://jira.suse.com/browse/PED-6402 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 5 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 05 Jun 2024 16:30:06 -0000 Subject: SUSE-RU-2024:1929-1: moderate: Recommended update for SAPHanaSR Message-ID: <171760500643.31622.9066175182645983962@smelt2.prg2.suse.org> # Recommended update for SAPHanaSR Announcement ID: SUSE-RU-2024:1929-1 Rating: moderate References: Affected Products: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that can now be installed. ## Description: This update for SAPHanaSR fixes the following issues: SAPHanaSR was updated to version 0.162.4: * Version 0.162.4: * Unified `global.ini` examples * Added demo script SAPHanaSR-upgrade-to-angi-demo * Updated `man` pages: * SAPHanaSR_basic_cluster.7 * SAPHanaSR_maintenance_examples.7 * SAPHanaSR_upgrade_to_angi.7 * SAPHanaSR-manageProvider.8 * SAPHanaSR-upgrade-to-angi-demo.8 * SAPHanaSR.py.7 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SAP-12-SP5-2024-1929=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * SAPHanaSR-doc-0.162.4-3.42.1 * SAPHanaSR-0.162.4-3.42.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 5 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 05 Jun 2024 16:30:07 -0000 Subject: SUSE-RU-2024:1928-1: moderate: Recommended update for SAPHanaSR Message-ID: <171760500733.31622.17926279389261559178@smelt2.prg2.suse.org> # Recommended update for SAPHanaSR Announcement ID: SUSE-RU-2024:1928-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SAP Applications Module 15-SP2 * SAP Applications Module 15-SP3 * SAP Applications Module 15-SP4 * SAP Applications Module 15-SP5 * SAP Applications Module 15-SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for SAPHanaSR fixes the following issues: SAPHanaSR was updated to version 0.162.4: * Version 0.162.4: * Unified `global.ini` examples * Added demo script SAPHanaSR-upgrade-to-angi-demo * Updated `man` pages: * SAPHanaSR_basic_cluster.7 * SAPHanaSR_maintenance_examples.7 * SAPHanaSR_upgrade_to_angi.7 * SAPHanaSR-manageProvider.8 * SAPHanaSR-upgrade-to-angi-demo.8 * SAPHanaSR.py.7 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1928=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1928=1 * SAP Applications Module 15-SP2 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP2-2024-1928=1 * SAP Applications Module 15-SP3 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP3-2024-1928=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1928=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1928=1 * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1928=1 ## Package List: * openSUSE Leap 15.5 (noarch) * SAPHanaSR-doc-0.162.4-150000.4.44.1 * SAPHanaSR-0.162.4-150000.4.44.1 * openSUSE Leap 15.6 (noarch) * SAPHanaSR-doc-0.162.4-150000.4.44.1 * SAPHanaSR-0.162.4-150000.4.44.1 * SAP Applications Module 15-SP2 (noarch) * SAPHanaSR-doc-0.162.4-150000.4.44.1 * SAPHanaSR-0.162.4-150000.4.44.1 * SAP Applications Module 15-SP3 (noarch) * SAPHanaSR-doc-0.162.4-150000.4.44.1 * SAPHanaSR-0.162.4-150000.4.44.1 * SAP Applications Module 15-SP4 (noarch) * SAPHanaSR-doc-0.162.4-150000.4.44.1 * SAPHanaSR-0.162.4-150000.4.44.1 * SAP Applications Module 15-SP5 (noarch) * SAPHanaSR-doc-0.162.4-150000.4.44.1 * SAPHanaSR-0.162.4-150000.4.44.1 * SAP Applications Module 15-SP6 (noarch) * SAPHanaSR-doc-0.162.4-150000.4.44.1 * SAPHanaSR-0.162.4-150000.4.44.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 5 16:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 05 Jun 2024 16:30:08 -0000 Subject: SUSE-RU-2024:1927-1: moderate: Recommended update for SAPHanaSR-ScaleOut Message-ID: <171760500887.31622.11946465450935811017@smelt2.prg2.suse.org> # Recommended update for SAPHanaSR-ScaleOut Announcement ID: SUSE-RU-2024:1927-1 Rating: moderate References: * bsc#1218901 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SAP Applications Module 15-SP2 * SAP Applications Module 15-SP3 * SAP Applications Module 15-SP4 * SAP Applications Module 15-SP5 * SAP Applications Module 15-SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for SAPHanaSR-ScaleOut fixes the following issues: SAPHanaSR-ScaleOut was updated to version 0.185.3: * Version 0.185.3: * Fixed the hexdump log for empty node states * Fixed exception handling in function 'logTimestamp' of HA/DR provider SAPHanaSrMultiTarget.py (bsc#1218901) * Updated `man` pages: * SAPHanaSR-ScaleOut.7 * SAPHanaSR.py.7 * SAPHanaSrMultiTarget.py.7 * SAPHanaSR_maintenance_examples.7 * SAPHanaSR_upgrade_to_angi.7 * SAPHanaSR-showAttr.8 * SAPHanaSR-manageProvider.8 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1927=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1927=1 * SAP Applications Module 15-SP2 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP2-2024-1927=1 * SAP Applications Module 15-SP3 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP3-2024-1927=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1927=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1927=1 * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1927=1 ## Package List: * openSUSE Leap 15.5 (noarch) * SAPHanaSR-ScaleOut-0.185.3-150000.45.1 * SAPHanaSR-ScaleOut-doc-0.185.3-150000.45.1 * openSUSE Leap 15.6 (noarch) * SAPHanaSR-ScaleOut-0.185.3-150000.45.1 * SAPHanaSR-ScaleOut-doc-0.185.3-150000.45.1 * SAP Applications Module 15-SP2 (noarch) * SAPHanaSR-ScaleOut-0.185.3-150000.45.1 * SAPHanaSR-ScaleOut-doc-0.185.3-150000.45.1 * SAP Applications Module 15-SP3 (noarch) * SAPHanaSR-ScaleOut-0.185.3-150000.45.1 * SAPHanaSR-ScaleOut-doc-0.185.3-150000.45.1 * SAP Applications Module 15-SP4 (noarch) * SAPHanaSR-ScaleOut-0.185.3-150000.45.1 * SAPHanaSR-ScaleOut-doc-0.185.3-150000.45.1 * SAP Applications Module 15-SP5 (noarch) * SAPHanaSR-ScaleOut-0.185.3-150000.45.1 * SAPHanaSR-ScaleOut-doc-0.185.3-150000.45.1 * SAP Applications Module 15-SP6 (noarch) * SAPHanaSR-ScaleOut-0.185.3-150000.45.1 * SAPHanaSR-ScaleOut-doc-0.185.3-150000.45.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218901 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 5 16:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 05 Jun 2024 16:30:10 -0000 Subject: SUSE-RU-2024:1926-1: moderate: Recommended update for SAPHanaSR-ScaleOut Message-ID: <171760501073.31622.7369483166404216182@smelt2.prg2.suse.org> # Recommended update for SAPHanaSR-ScaleOut Announcement ID: SUSE-RU-2024:1926-1 Rating: moderate References: * bsc#1218901 Affected Products: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for SAPHanaSR-ScaleOut fixes the following issue: * Version bump with fixes: * Fix the hexdump log for empty node states * Fix exception handling in function 'logTimestamp' of HA/DR provider SAPHanaSrMultiTarget.py (bsc#1218901) * update man pages: SAPHanaSR-ScaleOut.7 SAPHanaSR.py.7 SAPHanaSrMultiTarget.py.7 SAPHanaSR_maintenance_examples.7 SAPHanaSR_upgrade_to_angi.7 SAPHanaSR-showAttr.8 SAPHanaSR-manageProvider.8 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SAP-12-SP5-2024-1926=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * SAPHanaSR-ScaleOut-0.185.3-3.41.5 * SAPHanaSR-ScaleOut-doc-0.185.3-3.41.5 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218901 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 6 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 06 Jun 2024 08:30:02 -0000 Subject: SUSE-RU-2024:1933-1: moderate: Recommended update for libvirt Message-ID: <171766260272.20967.2225829209138796221@smelt2.prg2.suse.org> # Recommended update for libvirt Announcement ID: SUSE-RU-2024:1933-1 Rating: moderate References: * bsc#1220714 * bsc#1224327 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for libvirt fixes the following issues: * rpc: Don't warn about "max_client_requests" in single-threaded daemons (bsc#1224327) * security: Ensure file exists before attempting to restore label (bsc#1220714) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-1933=1 openSUSE-SLE-15.5-2024-1933=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1933=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1933=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1933=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libvirt-daemon-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-lxc-9.0.0-150500.6.23.1 * libvirt-nss-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-config-network-9.0.0-150500.6.23.1 * libvirt-daemon-driver-nwfilter-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-lxc-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-9.0.0-150500.6.23.1 * libvirt-daemon-driver-interface-debuginfo-9.0.0-150500.6.23.1 * libvirt-client-qemu-9.0.0-150500.6.23.1 * libvirt-daemon-driver-nodedev-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-9.0.0-150500.6.23.1 * libvirt-debugsource-9.0.0-150500.6.23.1 * libvirt-daemon-driver-network-debuginfo-9.0.0-150500.6.23.1 * libvirt-lock-sanlock-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-lxc-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-nwfilter-9.0.0-150500.6.23.1 * libvirt-daemon-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-disk-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-nodedev-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-hooks-9.0.0-150500.6.23.1 * libvirt-client-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-interface-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-core-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-scsi-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-mpath-debuginfo-9.0.0-150500.6.23.1 * wireshark-plugin-libvirt-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-disk-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.23.1 * libvirt-libs-9.0.0-150500.6.23.1 * libvirt-daemon-driver-qemu-9.0.0-150500.6.23.1 * libvirt-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.23.1 * libvirt-daemon-driver-qemu-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-gluster-debuginfo-9.0.0-150500.6.23.1 * libvirt-libs-debuginfo-9.0.0-150500.6.23.1 * libvirt-lock-sanlock-9.0.0-150500.6.23.1 * libvirt-nss-9.0.0-150500.6.23.1 * libvirt-daemon-config-nwfilter-9.0.0-150500.6.23.1 * libvirt-devel-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-logical-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-qemu-9.0.0-150500.6.23.1 * libvirt-daemon-driver-secret-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-core-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-secret-9.0.0-150500.6.23.1 * libvirt-daemon-driver-network-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-logical-9.0.0-150500.6.23.1 * wireshark-plugin-libvirt-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-gluster-9.0.0-150500.6.23.1 * libvirt-client-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.23.1 * openSUSE Leap 15.5 (x86_64) * libvirt-devel-32bit-9.0.0-150500.6.23.1 * libvirt-daemon-driver-libxl-9.0.0-150500.6.23.1 * libvirt-client-32bit-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-libxl-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-xen-9.0.0-150500.6.23.1 * openSUSE Leap 15.5 (noarch) * libvirt-doc-9.0.0-150500.6.23.1 * openSUSE Leap 15.5 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-rbd-debuginfo-9.0.0-150500.6.23.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libvirt-client-64bit-debuginfo-9.0.0-150500.6.23.1 * libvirt-devel-64bit-9.0.0-150500.6.23.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libvirt-daemon-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-nwfilter-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-9.0.0-150500.6.23.1 * libvirt-daemon-driver-interface-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-nodedev-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-9.0.0-150500.6.23.1 * libvirt-debugsource-9.0.0-150500.6.23.1 * libvirt-daemon-driver-network-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-nwfilter-9.0.0-150500.6.23.1 * libvirt-daemon-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-disk-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-nodedev-debuginfo-9.0.0-150500.6.23.1 * libvirt-client-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-interface-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-core-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-scsi-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-mpath-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-disk-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.23.1 * libvirt-libs-9.0.0-150500.6.23.1 * libvirt-daemon-driver-qemu-9.0.0-150500.6.23.1 * libvirt-libs-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.23.1 * libvirt-daemon-driver-qemu-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-logical-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-qemu-9.0.0-150500.6.23.1 * libvirt-daemon-driver-secret-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-core-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-secret-9.0.0-150500.6.23.1 * libvirt-daemon-driver-network-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-logical-9.0.0-150500.6.23.1 * libvirt-client-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.23.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-rbd-debuginfo-9.0.0-150500.6.23.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libvirt-libs-9.0.0-150500.6.23.1 * libvirt-debugsource-9.0.0-150500.6.23.1 * libvirt-libs-debuginfo-9.0.0-150500.6.23.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libvirt-daemon-debuginfo-9.0.0-150500.6.23.1 * libvirt-nss-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-config-network-9.0.0-150500.6.23.1 * libvirt-daemon-driver-nwfilter-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-9.0.0-150500.6.23.1 * libvirt-daemon-driver-interface-debuginfo-9.0.0-150500.6.23.1 * libvirt-client-qemu-9.0.0-150500.6.23.1 * libvirt-daemon-driver-nodedev-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-9.0.0-150500.6.23.1 * libvirt-debugsource-9.0.0-150500.6.23.1 * libvirt-daemon-driver-network-debuginfo-9.0.0-150500.6.23.1 * libvirt-lock-sanlock-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-nwfilter-9.0.0-150500.6.23.1 * libvirt-daemon-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-disk-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-nodedev-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-hooks-9.0.0-150500.6.23.1 * libvirt-client-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-interface-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-core-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-scsi-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-mpath-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-disk-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.23.1 * libvirt-nss-9.0.0-150500.6.23.1 * libvirt-daemon-driver-qemu-9.0.0-150500.6.23.1 * libvirt-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.23.1 * libvirt-daemon-driver-qemu-debuginfo-9.0.0-150500.6.23.1 * libvirt-lock-sanlock-9.0.0-150500.6.23.1 * libvirt-daemon-config-nwfilter-9.0.0-150500.6.23.1 * libvirt-devel-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-logical-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-qemu-9.0.0-150500.6.23.1 * libvirt-daemon-driver-secret-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-core-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-driver-secret-9.0.0-150500.6.23.1 * libvirt-daemon-driver-network-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-logical-9.0.0-150500.6.23.1 * libvirt-client-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.23.1 * Server Applications Module 15-SP5 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.23.1 * libvirt-daemon-driver-storage-rbd-debuginfo-9.0.0-150500.6.23.1 * Server Applications Module 15-SP5 (noarch) * libvirt-doc-9.0.0-150500.6.23.1 * Server Applications Module 15-SP5 (x86_64) * libvirt-daemon-driver-libxl-9.0.0-150500.6.23.1 * libvirt-daemon-driver-libxl-debuginfo-9.0.0-150500.6.23.1 * libvirt-daemon-xen-9.0.0-150500.6.23.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220714 * https://bugzilla.suse.com/show_bug.cgi?id=1224327 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 6 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 06 Jun 2024 12:30:04 -0000 Subject: SUSE-RU-2024:1934-1: moderate: Recommended update for sles15-image Message-ID: <171767700422.24773.6146286589066232125@smelt2.prg2.suse.org> # Recommended update for sles15-image Announcement ID: SUSE-RU-2024:1934-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.6 An update that can now be installed. ## Description: This update for sles15-image fixes the following issues: * update to SUSE LLC and use https (it's 2024) * use more specific lifecycle url * remove deprecated label duplication as those labels are inherited into all derived containers as well causing confusion * set supportlevel to released and L3 * use the base-container-images landing page * rename kiwi file to match package name * move artifacthub.io labels outside labelling helper to avoid duplication ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1934=1 ## Package List: * openSUSE Leap 15.6 (noarch) * container:sles15-image-15.0.0-47.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 12:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 12:30:01 -0000 Subject: SUSE-SU-2024:1937-1: moderate: Security update for python-docker Message-ID: <171776340154.6431.10507869357746596461@smelt2.prg2.suse.org> # Security update for python-docker Announcement ID: SUSE-SU-2024:1937-1 Rating: moderate References: * bsc#1224788 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-docker fixes the following issues: * CVE-2024-35195: Fixed missing certificate verification (bsc#1224788). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1937=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1937=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1937=1 ## Package List: * Public Cloud Module 15-SP5 (noarch) * python311-docker-7.0.0-150400.8.7.1 * openSUSE Leap 15.4 (noarch) * python311-docker-7.0.0-150400.8.7.1 * Public Cloud Module 15-SP4 (noarch) * python311-docker-7.0.0-150400.8.7.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1224788 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 12:30:04 -0000 Subject: SUSE-SU-2024:1936-1: moderate: Security update for go1.21 Message-ID: <171776340450.6431.13575043965241117786@smelt2.prg2.suse.org> # Security update for go1.21 Announcement ID: SUSE-SU-2024:1936-1 Rating: moderate References: * bsc#1212475 * bsc#1225973 * bsc#1225974 Cross-References: * CVE-2024-24789 * CVE-2024-24790 CVSS scores: * CVE-2024-24789 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-24790 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for go1.21 fixes the following issues: go1.21.11 release (bsc#1212475). * CVE-2024-24789: Fixed mishandling of corrupt central directory record in archive/zip (bsc#1225973). * CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (bsc#1225974). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1936=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * go1.21-1.21.11-1.36.1 * go1.21-doc-1.21.11-1.36.1 ## References: * https://www.suse.com/security/cve/CVE-2024-24789.html * https://www.suse.com/security/cve/CVE-2024-24790.html * https://bugzilla.suse.com/show_bug.cgi?id=1212475 * https://bugzilla.suse.com/show_bug.cgi?id=1225973 * https://bugzilla.suse.com/show_bug.cgi?id=1225974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 12:30:06 -0000 Subject: SUSE-SU-2024:1935-1: moderate: Security update for go1.22 Message-ID: <171776340602.6431.8737838232797918659@smelt2.prg2.suse.org> # Security update for go1.22 Announcement ID: SUSE-SU-2024:1935-1 Rating: moderate References: * bsc#1218424 * bsc#1225973 * bsc#1225974 Cross-References: * CVE-2024-24789 * CVE-2024-24790 CVSS scores: * CVE-2024-24789 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-24790 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for go1.22 fixes the following issues: go1.21.11 release (bsc#1212475). * CVE-2024-24789: Fixed mishandling of corrupt central directory record in archive/zip (bsc#1225973). * CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (bsc#1225974). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1935=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * go1.22-doc-1.22.4-1.12.1 * go1.22-1.22.4-1.12.1 ## References: * https://www.suse.com/security/cve/CVE-2024-24789.html * https://www.suse.com/security/cve/CVE-2024-24790.html * https://bugzilla.suse.com/show_bug.cgi?id=1218424 * https://bugzilla.suse.com/show_bug.cgi?id=1225973 * https://bugzilla.suse.com/show_bug.cgi?id=1225974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 16:30:04 -0000 Subject: SUSE-RU-2024:1953-1: moderate: Recommended update for scap-security-guide Message-ID: <171777780401.11264.18247186224184074971@smelt2.prg2.suse.org> # Recommended update for scap-security-guide Announcement ID: SUSE-RU-2024:1953-1 Rating: moderate References: * jsc#ECO-3319 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for scap-security-guide fixes the following issues: scap-security-guide was updated to 0.1.72 (jsc#ECO-3319): * ANSSI BP 028 profile for debian12 (#11368) * Control for BSI APP.4.4 (#11342) * update to CIS RHEL 7 and RHEL 8 profiles aligning them with the latest benchmarks * various fixes to SLE profiles * add openeuler to -redhat package ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1953=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1953=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1953=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1953=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1953=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1953=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1953=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1953=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1953=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1953=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1953=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1953=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1953=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1953=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1953=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1953=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1953=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1953=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1953=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-1953=1 ## Package List: * Basesystem Module 15-SP5 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * Basesystem Module 15-SP6 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Manager Proxy 4.3 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Manager Server 4.3 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Enterprise Storage 7.1 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * openSUSE Leap 15.5 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * openSUSE Leap 15.6 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 * scap-security-guide-ubuntu-0.1.72-150000.1.78.2 * scap-security-guide-redhat-0.1.72-150000.1.78.2 * scap-security-guide-debian-0.1.72-150000.1.78.2 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * scap-security-guide-0.1.72-150000.1.78.2 ## References: * https://jira.suse.com/browse/ECO-3319 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 16:30:05 -0000 Subject: SUSE-RU-2024:1952-1: moderate: Recommended update for socat Message-ID: <171777780573.11264.9347451399039150508@smelt2.prg2.suse.org> # Recommended update for socat Announcement ID: SUSE-RU-2024:1952-1 Rating: moderate References: * bsc#1160293 * jsc#PED-8413 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains one feature and has one fix can now be installed. ## Description: This update for socat fixes the following issues: Update to 1.8.0.0: * Support for network namespaces (option netns) * TCP client now automatically tries all addresses (IPv4 and IPv6) provided by nameserver until success * Implementation of POSIX message queue (mq) control and access on Linux (addresses POSIXMQ-READ and following) * New wrapper script socat-chain.sh allows to stack two addresses, e.g.HTTP proxy connect over SSL * New script socat-mux.sh allows n-to-1 / 1-to-n communications * New script socat-broker.sh allows group communications * Experimental socks5 client feature * Address ACCEPT-FD for systemd "inetd" mode * UDP-Lite and DCCP address types * Addresses SOCKETPAIR and SHELL * New option bind-tmpname allows forked off children to bind UNIX domain client sockets to random unique pathes * New option retrieve-vlan (with INTERFACE addresses) now makes kernel keep VLAN tags in incoming packets * Simple statistics output with Socat option --statistics and with SIGUSR1 * A couple of new options, many fixes and corrections, see file CHANGES * Note: This version introduces "socat1", linking to "socat" Update to 1.7.4.4: * FIX: In error.c msg2() there was a stack overflow on long messages: The terminating \0 Byte was written behind the last position. * FIX: UDP-RECVFROM with fork sometimes terminated when multiple packets arrived. * FIX: a couple of weaknesses and errors when accessing invalid or incompatible file system entries with UNIX domain, file, and generic addresses. * FIX: bad parser error message on "socat /tmp/x\"x/x -" Update to 1.7.4.3: * fixes the TCP_INFO issue that broke building on non-Linux platforms. Update to version 1.7.4.2: * Fixes a lot of bugs, e.g., for options -r and -R. * Further bugfixes, see the CHANGES file Update to 1.7.4.1: Security: * Buffer size option (-b) is internally doubled for CR-CRLF conversion, but not checked for integer overflow. This could lead to heap based buffer overflow, assuming the attacker could provide this parameter. * Many further bugfixes and new features, see the CHANGES file Update to version 1.7.3.4: * bugfix release, see the CHANGES file for all changes Update to version 1.7.3.3: * bugfix release, see the CHANGES file for all changes * We HAVE_SSLv23_*_method, just not as functions, but macros add the relevant defines in the command line so support for autonegotiation of the highest TLS version is restored. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1952=1 openSUSE-SLE-15.6-2024-1952=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1952=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * socat-debugsource-1.8.0.0-150600.20.3.1 * socat-1.8.0.0-150600.20.3.1 * socat-debuginfo-1.8.0.0-150600.20.3.1 * socat-extra-1.8.0.0-150600.20.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * socat-debugsource-1.8.0.0-150600.20.3.1 * socat-1.8.0.0-150600.20.3.1 * socat-debuginfo-1.8.0.0-150600.20.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1160293 * https://jira.suse.com/browse/PED-8413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 16:30:07 -0000 Subject: SUSE-RU-2024:1951-1: moderate: Recommended update for libbpf Message-ID: <171777780713.11264.16037145158673929190@smelt2.prg2.suse.org> # Recommended update for libbpf Announcement ID: SUSE-RU-2024:1951-1 Rating: moderate References: * bsc#1221101 Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for libbpf fixes the following issues: * Fixed potential null pointer dereference in bpf_object__collect_prog_relos() (bsc#1221101) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1951=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1951=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1951=1 openSUSE-SLE-15.6-2024-1951=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libbpf-debugsource-1.2.2-150600.3.3.1 * libbpf1-1.2.2-150600.3.3.1 * libbpf1-debuginfo-1.2.2-150600.3.3.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libbpf-debugsource-1.2.2-150600.3.3.1 * libbpf-devel-1.2.2-150600.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libbpf-debugsource-1.2.2-150600.3.3.1 * libbpf1-debuginfo-1.2.2-150600.3.3.1 * libbpf-devel-static-1.2.2-150600.3.3.1 * libbpf-devel-1.2.2-150600.3.3.1 * libbpf1-1.2.2-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libbpf1-32bit-1.2.2-150600.3.3.1 * libbpf1-32bit-debuginfo-1.2.2-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libbpf1-64bit-1.2.2-150600.3.3.1 * libbpf1-64bit-debuginfo-1.2.2-150600.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221101 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 16:30:09 -0000 Subject: SUSE-SU-2024:1950-1: moderate: Security update for glib2 Message-ID: <171777780946.11264.7513944638990417852@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2024:1950-1 Rating: moderate References: * bsc#1224044 Cross-References: * CVE-2024-34397 CVSS scores: * CVE-2024-34397 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: Update to version 2.78.6: * Fix a regression with IBus caused by the fix for CVE-2024-34397 Changes in version 2.78.5: * Fix CVE-2024-34397: GDBus signal subscriptions for well-known names are vulnerable to unicast spoofing. (bsc#1224044) * Bugs fixed: * gvfs-udisks2-volume-monitor SIGSEGV in g_content_type_guess_for_tree() due to filename with bad encoding * gcontenttype: Make filename valid utf-8 string before processing. * gdbusconnection: Don't deliver signals if the sender doesn't match. Changes in version 2.78.4: * Bugs fixed: * Fix generated RST anchors for methods, signals and properties. * docs/reference: depend on a native gtk-doc. * gobject_gdb.py: Do not break bt on optimized build. * gregex: clean up usage of _GRegex.jit_status. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1950=1 openSUSE-SLE-15.6-2024-1950=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1950=1 ## Package List: * openSUSE Leap 15.6 (noarch) * gio-branding-upstream-2.78.6-150600.4.3.1 * gio-branding-SLE-15-150600.35.2.1 * glib2-lang-2.78.6-150600.4.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * glib2-devel-debuginfo-2.78.6-150600.4.3.1 * glib2-tools-2.78.6-150600.4.3.1 * libgobject-2_0-0-debuginfo-2.78.6-150600.4.3.1 * libgthread-2_0-0-debuginfo-2.78.6-150600.4.3.1 * libgio-2_0-0-2.78.6-150600.4.3.1 * libgmodule-2_0-0-2.78.6-150600.4.3.1 * libglib-2_0-0-debuginfo-2.78.6-150600.4.3.1 * libgobject-2_0-0-2.78.6-150600.4.3.1 * glib2-tests-devel-debuginfo-2.78.6-150600.4.3.1 * glib2-devel-2.78.6-150600.4.3.1 * libglib-2_0-0-2.78.6-150600.4.3.1 * libgthread-2_0-0-2.78.6-150600.4.3.1 * glib2-tests-devel-2.78.6-150600.4.3.1 * glib2-debugsource-2.78.6-150600.4.3.1 * libgio-2_0-0-debuginfo-2.78.6-150600.4.3.1 * glib2-tools-debuginfo-2.78.6-150600.4.3.1 * libgmodule-2_0-0-debuginfo-2.78.6-150600.4.3.1 * glib2-devel-static-2.78.6-150600.4.3.1 * glib2-doc-2.78.6-150600.4.3.1 * openSUSE Leap 15.6 (x86_64) * glib2-devel-32bit-2.78.6-150600.4.3.1 * libgio-2_0-0-32bit-2.78.6-150600.4.3.1 * libgthread-2_0-0-32bit-2.78.6-150600.4.3.1 * libgobject-2_0-0-32bit-2.78.6-150600.4.3.1 * libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.3.1 * libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.3.1 * glib2-devel-32bit-debuginfo-2.78.6-150600.4.3.1 * glib2-tools-32bit-2.78.6-150600.4.3.1 * glib2-tools-32bit-debuginfo-2.78.6-150600.4.3.1 * libgmodule-2_0-0-32bit-2.78.6-150600.4.3.1 * libglib-2_0-0-32bit-2.78.6-150600.4.3.1 * libgthread-2_0-0-32bit-debuginfo-2.78.6-150600.4.3.1 * libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.3.1 * libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * glib2-devel-64bit-2.78.6-150600.4.3.1 * libgmodule-2_0-0-64bit-debuginfo-2.78.6-150600.4.3.1 * libglib-2_0-0-64bit-2.78.6-150600.4.3.1 * glib2-devel-64bit-debuginfo-2.78.6-150600.4.3.1 * libgio-2_0-0-64bit-2.78.6-150600.4.3.1 * libgthread-2_0-0-64bit-debuginfo-2.78.6-150600.4.3.1 * libglib-2_0-0-64bit-debuginfo-2.78.6-150600.4.3.1 * libgio-2_0-0-64bit-debuginfo-2.78.6-150600.4.3.1 * libgthread-2_0-0-64bit-2.78.6-150600.4.3.1 * glib2-tools-64bit-debuginfo-2.78.6-150600.4.3.1 * libgobject-2_0-0-64bit-2.78.6-150600.4.3.1 * libgobject-2_0-0-64bit-debuginfo-2.78.6-150600.4.3.1 * glib2-tools-64bit-2.78.6-150600.4.3.1 * libgmodule-2_0-0-64bit-2.78.6-150600.4.3.1 * Basesystem Module 15-SP6 (noarch) * gio-branding-SLE-15-150600.35.2.1 * glib2-lang-2.78.6-150600.4.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * glib2-devel-debuginfo-2.78.6-150600.4.3.1 * glib2-tools-2.78.6-150600.4.3.1 * libgobject-2_0-0-debuginfo-2.78.6-150600.4.3.1 * libgthread-2_0-0-debuginfo-2.78.6-150600.4.3.1 * libgio-2_0-0-2.78.6-150600.4.3.1 * libgmodule-2_0-0-2.78.6-150600.4.3.1 * libglib-2_0-0-debuginfo-2.78.6-150600.4.3.1 * libgobject-2_0-0-2.78.6-150600.4.3.1 * libglib-2_0-0-2.78.6-150600.4.3.1 * glib2-devel-2.78.6-150600.4.3.1 * libgthread-2_0-0-2.78.6-150600.4.3.1 * glib2-debugsource-2.78.6-150600.4.3.1 * libgio-2_0-0-debuginfo-2.78.6-150600.4.3.1 * glib2-tools-debuginfo-2.78.6-150600.4.3.1 * libgmodule-2_0-0-debuginfo-2.78.6-150600.4.3.1 * Basesystem Module 15-SP6 (x86_64) * libgio-2_0-0-32bit-2.78.6-150600.4.3.1 * libgobject-2_0-0-32bit-2.78.6-150600.4.3.1 * libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.3.1 * libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.3.1 * libgmodule-2_0-0-32bit-2.78.6-150600.4.3.1 * libglib-2_0-0-32bit-2.78.6-150600.4.3.1 * libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.3.1 * libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-34397.html * https://bugzilla.suse.com/show_bug.cgi?id=1224044 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 16:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 16:30:11 -0000 Subject: SUSE-SU-2024:1949-1: moderate: Security update for openssl-1_1 Message-ID: <171777781179.11264.10940755203441965832@smelt2.prg2.suse.org> # Security update for openssl-1_1 Announcement ID: SUSE-SU-2024:1949-1 Rating: moderate References: * bsc#1222548 Cross-References: * CVE-2024-2511 CVSS scores: * CVE-2024-2511 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-1_1 fixes the following issues: * CVE-2024-2511: Fixed unconstrained session cache growth in TLSv1.3 (bsc#1222548). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1949=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1949=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1949=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1949=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1949=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1949=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1949=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1949=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1949=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1949=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1949=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1949=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1949=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1949=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1949=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * openssl-1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * openSUSE Leap 15.4 (x86_64) * libopenssl1_1-32bit-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.66.2 * openSUSE Leap 15.4 (noarch) * openssl-1_1-doc-1.1.1l-150400.7.66.2 * openSUSE Leap 15.4 (aarch64_ilp32) * libopenssl-1_1-devel-64bit-1.1.1l-150400.7.66.2 * libopenssl1_1-64bit-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-64bit-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-64bit-1.1.1l-150400.7.66.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libopenssl1_1-32bit-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libopenssl1_1-32bit-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-32bit-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libopenssl1_1-32bit-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libopenssl1_1-32bit-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.66.2 * SUSE Manager Proxy 4.3 (x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-32bit-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.66.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-32bit-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.66.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * openssl-1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debugsource-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-1.1.1l-150400.7.66.2 * libopenssl1_1-1.1.1l-150400.7.66.2 * openssl-1_1-debuginfo-1.1.1l-150400.7.66.2 * libopenssl1_1-debuginfo-1.1.1l-150400.7.66.2 * SUSE Manager Server 4.3 (x86_64) * libopenssl1_1-32bit-1.1.1l-150400.7.66.2 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.66.2 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.66.2 ## References: * https://www.suse.com/security/cve/CVE-2024-2511.html * https://bugzilla.suse.com/show_bug.cgi?id=1222548 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 16:30:14 -0000 Subject: SUSE-SU-2024:1948-1: moderate: Security update for python-Jinja2 Message-ID: <171777781421.11264.16538344217468174666@smelt2.prg2.suse.org> # Security update for python-Jinja2 Announcement ID: SUSE-SU-2024:1948-1 Rating: moderate References: * bsc#1223980 Cross-References: * CVE-2024-34064 CVSS scores: * CVE-2024-34064 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Affected Products: * Advanced Systems Management Module 12 * Public Cloud Module 12 * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that solves one vulnerability can now be installed. ## Description: This update for python-Jinja2 fixes the following issues: * CVE-2024-34064: Fixed HTML attribute injection when passing user input as keys to xmlattr filter (bsc#1223980) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2024-1948=1 * Advanced Systems Management Module 12 zypper in -t patch SUSE-SLE-Module-Adv-Systems-Management-12-2024-1948=1 * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2024-1948=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (noarch) * python-Jinja2-2.8-19.26.1 * python3-Jinja2-2.8-19.26.1 * Advanced Systems Management Module 12 (noarch) * python-Jinja2-2.8-19.26.1 * python3-Jinja2-2.8-19.26.1 * Public Cloud Module 12 (noarch) * python-Jinja2-2.8-19.26.1 * python3-Jinja2-2.8-19.26.1 ## References: * https://www.suse.com/security/cve/CVE-2024-34064.html * https://bugzilla.suse.com/show_bug.cgi?id=1223980 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 16:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 16:30:17 -0000 Subject: SUSE-SU-2024:1947-1: moderate: Security update for openssl-3 Message-ID: <171777781724.11264.6943497984315169831@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2024:1947-1 Rating: moderate References: * bsc#1222548 * bsc#1224388 Cross-References: * CVE-2024-2511 * CVE-2024-4603 CVSS scores: * CVE-2024-2511 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-4603 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2024-2511: Fixed unconstrained session cache growth in TLSv1.3 (bsc#1222548). * CVE-2024-4603: Fixed DSA parameter checks for excessive sizes before validating (bsc#1224388). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1947=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1947=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1947=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1947=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1947=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1947=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1947=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1947=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1947=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1947=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1947=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1947=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1947=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1947=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1947=1 ## Package List: * SUSE Manager Proxy 4.3 (x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * openssl-3-3.0.8-150400.4.54.1 * libopenssl-3-devel-3.0.8-150400.4.54.1 * openssl-3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * openssl-3-3.0.8-150400.4.54.1 * libopenssl-3-devel-3.0.8-150400.4.54.1 * openssl-3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * openssl-3-3.0.8-150400.4.54.1 * libopenssl-3-devel-3.0.8-150400.4.54.1 * openssl-3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * openssl-3-3.0.8-150400.4.54.1 * libopenssl-3-devel-3.0.8-150400.4.54.1 * openssl-3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * openSUSE Leap 15.4 (x86_64) * libopenssl-3-devel-32bit-3.0.8-150400.4.54.1 * libopenssl3-32bit-3.0.8-150400.4.54.1 * libopenssl3-32bit-debuginfo-3.0.8-150400.4.54.1 * openSUSE Leap 15.4 (noarch) * openssl-3-doc-3.0.8-150400.4.54.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libopenssl3-64bit-3.0.8-150400.4.54.1 * libopenssl-3-devel-64bit-3.0.8-150400.4.54.1 * libopenssl3-64bit-debuginfo-3.0.8-150400.4.54.1 * openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * openssl-3-3.0.8-150400.4.54.1 * libopenssl-3-devel-3.0.8-150400.4.54.1 * openssl-3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * openssl-3-3.0.8-150400.4.54.1 * libopenssl-3-devel-3.0.8-150400.4.54.1 * openssl-3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * openssl-3-3.0.8-150400.4.54.1 * libopenssl-3-devel-3.0.8-150400.4.54.1 * openssl-3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * openssl-3-3.0.8-150400.4.54.1 * libopenssl-3-devel-3.0.8-150400.4.54.1 * openssl-3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.54.1 * openssl-3-3.0.8-150400.4.54.1 * libopenssl-3-devel-3.0.8-150400.4.54.1 * openssl-3-debuginfo-3.0.8-150400.4.54.1 * libopenssl3-3.0.8-150400.4.54.1 * openssl-3-debugsource-3.0.8-150400.4.54.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2511.html * https://www.suse.com/security/cve/CVE-2024-4603.html * https://bugzilla.suse.com/show_bug.cgi?id=1222548 * https://bugzilla.suse.com/show_bug.cgi?id=1224388 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 16:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 16:30:19 -0000 Subject: SUSE-SU-2024:1946-1: moderate: Security update for python-requests Message-ID: <171777781943.11264.2141608909099755441@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2024:1946-1 Rating: moderate References: * bsc#1224788 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * Advanced Systems Management Module 12 * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that solves one vulnerability can now be installed. ## Description: This update for python-requests fixes the following issues: * CVE-2024-35195: Fixed cert verification regardless of changes to the value of `verify` (bsc#1224788). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2024-1946=1 * Advanced Systems Management Module 12 zypper in -t patch SUSE-SLE-Module-Adv-Systems-Management-12-2024-1946=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (noarch) * python3-requests-2.11.1-6.37.1 * python-requests-2.11.1-6.37.1 * Advanced Systems Management Module 12 (noarch) * python3-requests-2.11.1-6.37.1 * python-requests-2.11.1-6.37.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1224788 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 20:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 20:30:03 -0000 Subject: SUSE-RU-2024:1955-1: moderate: Recommended update for postgresql13 Message-ID: <171779220307.27754.2275386166496736880@smelt2.prg2.suse.org> # Recommended update for postgresql13 Announcement ID: SUSE-RU-2024:1955-1 Rating: moderate References: * bsc#1224051 Affected Products: * Galera for Ericsson 15 SP5 * openSUSE Leap 15.5 * openSUSE Leap 15.6 An update that has one fix can now be installed. ## Description: This update for postgresql13 fixes the following issues: PostgreSQL upgrade to version 13.15 (bsc#1224051): Bug fixes: * Fix incompatibility with LLVM 18. * Prepare for PostgreSQL 17. * Make sure all compilation and doc generation happens in %build. * Require LLVM <= 17 for now, because LLVM 18 doesn't seem to work. * Remove constraints file because improved memory usage for s390x * Use %patch -P N instead of deprecated %patchN. Release notes: * https://www.postgresql.org/docs/release/13.15/ ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1955=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1955=1 * Galera for Ericsson 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-ERICSSON-2024-1955=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * postgresql13-contrib-debuginfo-13.15-150200.5.58.1 * postgresql13-plpython-13.15-150200.5.58.1 * postgresql13-server-devel-debuginfo-13.15-150200.5.58.1 * postgresql13-llvmjit-debuginfo-13.15-150200.5.58.1 * postgresql13-pltcl-13.15-150200.5.58.1 * postgresql13-13.15-150200.5.58.1 * postgresql13-plpython-debuginfo-13.15-150200.5.58.1 * postgresql13-test-13.15-150200.5.58.1 * postgresql13-devel-13.15-150200.5.58.1 * postgresql13-server-13.15-150200.5.58.1 * postgresql13-pltcl-debuginfo-13.15-150200.5.58.1 * postgresql13-debuginfo-13.15-150200.5.58.1 * postgresql13-plperl-debuginfo-13.15-150200.5.58.1 * postgresql13-llvmjit-13.15-150200.5.58.1 * postgresql13-server-debuginfo-13.15-150200.5.58.1 * postgresql13-plperl-13.15-150200.5.58.1 * postgresql13-debugsource-13.15-150200.5.58.1 * postgresql13-llvmjit-devel-13.15-150200.5.58.1 * postgresql13-devel-debuginfo-13.15-150200.5.58.1 * postgresql13-server-devel-13.15-150200.5.58.1 * postgresql13-contrib-13.15-150200.5.58.1 * openSUSE Leap 15.5 (noarch) * postgresql13-docs-13.15-150200.5.58.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * postgresql13-contrib-debuginfo-13.15-150200.5.58.1 * postgresql13-plpython-13.15-150200.5.58.1 * postgresql13-server-devel-debuginfo-13.15-150200.5.58.1 * postgresql13-llvmjit-debuginfo-13.15-150200.5.58.1 * postgresql13-pltcl-13.15-150200.5.58.1 * postgresql13-13.15-150200.5.58.1 * postgresql13-plpython-debuginfo-13.15-150200.5.58.1 * postgresql13-test-13.15-150200.5.58.1 * postgresql13-devel-13.15-150200.5.58.1 * postgresql13-server-13.15-150200.5.58.1 * postgresql13-pltcl-debuginfo-13.15-150200.5.58.1 * postgresql13-debuginfo-13.15-150200.5.58.1 * postgresql13-plperl-debuginfo-13.15-150200.5.58.1 * postgresql13-llvmjit-13.15-150200.5.58.1 * postgresql13-server-debuginfo-13.15-150200.5.58.1 * postgresql13-plperl-13.15-150200.5.58.1 * postgresql13-debugsource-13.15-150200.5.58.1 * postgresql13-llvmjit-devel-13.15-150200.5.58.1 * postgresql13-devel-debuginfo-13.15-150200.5.58.1 * postgresql13-server-devel-13.15-150200.5.58.1 * postgresql13-contrib-13.15-150200.5.58.1 * openSUSE Leap 15.6 (noarch) * postgresql13-docs-13.15-150200.5.58.1 * Galera for Ericsson 15 SP5 (x86_64) * postgresql13-contrib-debuginfo-13.15-150200.5.58.1 * postgresql13-server-devel-debuginfo-13.15-150200.5.58.1 * postgresql13-pltcl-13.15-150200.5.58.1 * postgresql13-13.15-150200.5.58.1 * postgresql13-pltcl-debuginfo-13.15-150200.5.58.1 * postgresql13-plpython-debuginfo-13.15-150200.5.58.1 * postgresql13-debuginfo-13.15-150200.5.58.1 * postgresql13-devel-debuginfo-13.15-150200.5.58.1 * postgresql13-plperl-debuginfo-13.15-150200.5.58.1 * postgresql13-plpython-13.15-150200.5.58.1 * postgresql13-server-debuginfo-13.15-150200.5.58.1 * postgresql13-server-devel-13.15-150200.5.58.1 * postgresql13-contrib-13.15-150200.5.58.1 * postgresql13-devel-13.15-150200.5.58.1 * postgresql13-debugsource-13.15-150200.5.58.1 * postgresql13-server-13.15-150200.5.58.1 * postgresql13-plperl-13.15-150200.5.58.1 * Galera for Ericsson 15 SP5 (noarch) * postgresql13-docs-13.15-150200.5.58.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224051 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 20:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 20:30:04 -0000 Subject: SUSE-RU-2024:1954-1: moderate: Recommended update for glibc Message-ID: <171779220478.27754.18354012816689211168@smelt2.prg2.suse.org> # Recommended update for glibc Announcement ID: SUSE-RU-2024:1954-1 Rating: moderate References: * bsc#1221482 Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for glibc fixes the following issues: * Also include stat64 in the 32-bit libc_nonshared.a workaround (bsc#1221482) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1954=1 openSUSE-SLE-15.6-2024-1954=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1954=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1954=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586 i686) * glibc-debugsource-2.38-150600.14.5.1 * glibc-locale-base-2.38-150600.14.5.1 * libnsl1-2.38-150600.14.5.1 * glibc-locale-2.38-150600.14.5.1 * glibc-devel-static-2.38-150600.14.5.1 * libnsl1-debuginfo-2.38-150600.14.5.1 * glibc-devel-debuginfo-2.38-150600.14.5.1 * glibc-locale-base-debuginfo-2.38-150600.14.5.1 * glibc-2.38-150600.14.5.1 * glibc-debuginfo-2.38-150600.14.5.1 * glibc-profile-2.38-150600.14.5.1 * glibc-devel-2.38-150600.14.5.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * glibc-utils-debuginfo-2.38-150600.14.5.1 * glibc-utils-src-debugsource-2.38-150600.14.5.1 * glibc-extra-debuginfo-2.38-150600.14.5.1 * glibc-utils-2.38-150600.14.5.1 * nscd-2.38-150600.14.5.1 * nscd-debuginfo-2.38-150600.14.5.1 * glibc-extra-2.38-150600.14.5.1 * openSUSE Leap 15.6 (noarch) * glibc-lang-2.38-150600.14.5.1 * glibc-info-2.38-150600.14.5.1 * glibc-i18ndata-2.38-150600.14.5.1 * glibc-html-2.38-150600.14.5.1 * openSUSE Leap 15.6 (x86_64) * glibc-profile-32bit-2.38-150600.14.5.1 * glibc-locale-base-32bit-debuginfo-2.38-150600.14.5.1 * glibc-32bit-2.38-150600.14.5.1 * libnsl1-32bit-2.38-150600.14.5.1 * glibc-devel-32bit-2.38-150600.14.5.1 * glibc-utils-32bit-debuginfo-2.38-150600.14.5.1 * glibc-utils-32bit-2.38-150600.14.5.1 * glibc-devel-32bit-debuginfo-2.38-150600.14.5.1 * glibc-32bit-debuginfo-2.38-150600.14.5.1 * glibc-devel-static-32bit-2.38-150600.14.5.1 * glibc-locale-base-32bit-2.38-150600.14.5.1 * libnsl1-32bit-debuginfo-2.38-150600.14.5.1 * openSUSE Leap 15.6 (aarch64_ilp32) * glibc-64bit-2.38-150600.14.5.1 * glibc-devel-static-64bit-2.38-150600.14.5.1 * glibc-utils-64bit-2.38-150600.14.5.1 * glibc-locale-base-64bit-2.38-150600.14.5.1 * libnsl1-64bit-debuginfo-2.38-150600.14.5.1 * libnsl1-64bit-2.38-150600.14.5.1 * glibc-devel-64bit-debuginfo-2.38-150600.14.5.1 * glibc-utils-64bit-debuginfo-2.38-150600.14.5.1 * glibc-profile-64bit-2.38-150600.14.5.1 * glibc-devel-64bit-2.38-150600.14.5.1 * glibc-64bit-debuginfo-2.38-150600.14.5.1 * glibc-locale-base-64bit-debuginfo-2.38-150600.14.5.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.38-150600.14.5.1 * glibc-locale-base-2.38-150600.14.5.1 * libnsl1-2.38-150600.14.5.1 * nscd-debuginfo-2.38-150600.14.5.1 * glibc-extra-debuginfo-2.38-150600.14.5.1 * glibc-locale-2.38-150600.14.5.1 * libnsl1-debuginfo-2.38-150600.14.5.1 * nscd-2.38-150600.14.5.1 * glibc-devel-debuginfo-2.38-150600.14.5.1 * glibc-locale-base-debuginfo-2.38-150600.14.5.1 * glibc-2.38-150600.14.5.1 * glibc-debuginfo-2.38-150600.14.5.1 * glibc-profile-2.38-150600.14.5.1 * glibc-devel-2.38-150600.14.5.1 * glibc-extra-2.38-150600.14.5.1 * Basesystem Module 15-SP6 (noarch) * glibc-info-2.38-150600.14.5.1 * glibc-lang-2.38-150600.14.5.1 * glibc-i18ndata-2.38-150600.14.5.1 * Basesystem Module 15-SP6 (x86_64) * glibc-locale-base-32bit-debuginfo-2.38-150600.14.5.1 * glibc-32bit-2.38-150600.14.5.1 * libnsl1-32bit-2.38-150600.14.5.1 * glibc-32bit-debuginfo-2.38-150600.14.5.1 * glibc-locale-base-32bit-2.38-150600.14.5.1 * libnsl1-32bit-debuginfo-2.38-150600.14.5.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.38-150600.14.5.1 * glibc-utils-debuginfo-2.38-150600.14.5.1 * glibc-utils-src-debugsource-2.38-150600.14.5.1 * glibc-utils-2.38-150600.14.5.1 * glibc-devel-static-2.38-150600.14.5.1 * glibc-debuginfo-2.38-150600.14.5.1 * Development Tools Module 15-SP6 (x86_64) * glibc-devel-32bit-debuginfo-2.38-150600.14.5.1 * glibc-devel-32bit-2.38-150600.14.5.1 * glibc-32bit-debuginfo-2.38-150600.14.5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221482 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 20:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 20:30:05 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171779220561.27754.1330186368729365807@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 20:33:08 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 20:33:08 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171779238830.29940.13793599862081616361@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 20:36:10 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 20:36:10 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171779257054.27754.17904873454759652279@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 7 20:39:12 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 07 Jun 2024 20:39:12 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171779275272.29940.7389140418483082094@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 08:30:03 -0000 Subject: SUSE-RU-2024:1959-1: moderate: Recommended update for libserf Message-ID: <171800820302.24171.8780716952043654897@smelt2.prg2.suse.org> # Recommended update for libserf Announcement ID: SUSE-RU-2024:1959-1 Rating: moderate References: * bsc#1221211 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for libserf fixes the following issues: * Fix build with openSSL 3 by removing usage of ERR_GET_FUNC (bsc#1221211) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1959=1 SUSE-2024-1959=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1959=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libserf-devel-1.3.9-150600.18.3.2 * libserf-1-1-1.3.9-150600.18.3.2 * libserf-1-1-debuginfo-1.3.9-150600.18.3.2 * libserf-debugsource-1.3.9-150600.18.3.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libserf-devel-1.3.9-150600.18.3.2 * libserf-1-1-1.3.9-150600.18.3.2 * libserf-1-1-debuginfo-1.3.9-150600.18.3.2 * libserf-debugsource-1.3.9-150600.18.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221211 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 08:30:03 -0000 Subject: SUSE-RU-2024:1958-1: moderate: Recommended update for bcc Message-ID: <171800820390.24171.2572604264527753271@smelt2.prg2.suse.org> # Recommended update for bcc Announcement ID: SUSE-RU-2024:1958-1 Rating: moderate References: Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for bcc fixes the following issue: * Remove bcc-devel's requirement on llvm-devel ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1958=1 openSUSE-SLE-15.6-2024-1958=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1958=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * bcc-tools-0.29.1-150600.5.3.2 * bcc-debugsource-0.29.1-150600.5.3.2 * bcc-debuginfo-0.29.1-150600.5.3.2 * libbcc0-debuginfo-0.29.1-150600.5.3.2 * bcc-devel-0.29.1-150600.5.3.2 * libbcc0-0.29.1-150600.5.3.2 * bcc-tools-debuginfo-0.29.1-150600.5.3.2 * openSUSE Leap 15.6 (noarch) * bcc-docs-0.29.1-150600.5.3.2 * python3-bcc-0.29.1-150600.5.3.2 * bcc-examples-0.29.1-150600.5.3.2 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * bcc-tools-0.29.1-150600.5.3.2 * bcc-debugsource-0.29.1-150600.5.3.2 * bcc-debuginfo-0.29.1-150600.5.3.2 * libbcc0-debuginfo-0.29.1-150600.5.3.2 * bcc-devel-0.29.1-150600.5.3.2 * libbcc0-0.29.1-150600.5.3.2 * bcc-tools-debuginfo-0.29.1-150600.5.3.2 * Development Tools Module 15-SP6 (noarch) * bcc-docs-0.29.1-150600.5.3.2 * python3-bcc-0.29.1-150600.5.3.2 * bcc-examples-0.29.1-150600.5.3.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 08:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 08:30:05 -0000 Subject: SUSE-FU-2024:1957-1: moderate: Feature update for sap-convergent-resource-agents Message-ID: <171800820504.24171.14958342673020524753@smelt2.prg2.suse.org> # Feature update for sap-convergent-resource-agents Announcement ID: SUSE-FU-2024:1957-1 Rating: moderate References: * jsc#PED-7175 * jsc#PED-7176 Affected Products: * openSUSE Leap 15.4 * SAP Applications Module 15-SP4 * SAP Applications Module 15-SP5 * SAP Applications Module 15-SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains two features can now be installed. ## Description: This update for sap-convergent-resource-agents fixes the following issues: * Implementation of `sap-convergent-resource-agents` a new resource agent to control the Convergent Mediation control zone components. This package is supported only in the context of SAP RISE (jsc#PED-7175, jsc#PED-7176) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1957=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1957=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1957=1 * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1957=1 ## Package List: * openSUSE Leap 15.4 (noarch) * sap-convergent-resource-agents-1.0.0-150400.9.3.2 * SAP Applications Module 15-SP4 (noarch) * sap-convergent-resource-agents-1.0.0-150400.9.3.2 * SAP Applications Module 15-SP5 (noarch) * sap-convergent-resource-agents-1.0.0-150400.9.3.2 * SAP Applications Module 15-SP6 (noarch) * sap-convergent-resource-agents-1.0.0-150400.9.3.2 ## References: * https://jira.suse.com/browse/PED-7175 * https://jira.suse.com/browse/PED-7176 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 08:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 08:30:06 -0000 Subject: SUSE-RU-2024:1956-1: moderate: Recommended update for google-errorprone, guava Message-ID: <171800820632.24171.14473764578024872522@smelt2.prg2.suse.org> # Recommended update for google-errorprone, guava Announcement ID: SUSE-RU-2024:1956-1 Rating: moderate References: Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for google-errorprone, guava fixes the following issues: guava: * guava was updated to version 33.1.0: * Changes of version 33.1.0: * Updated our Error Prone dependency to 2.26.1, which includes a JPMS-ready jar of annotations. If you use the Error Prone annotations in a modular build of your own code, you may need to add a requires line for them. * base: Added a Duration overload for Suppliers.memoizeWithExpiration. * base: Deprecated the remaining two overloads of Throwables.propagateIfPossible. They won't be deleted, but we recommend migrating off them. * cache: Fixed a bug that could cause false "recursive load" reports during refresh. * graph: Changed the return types of transitiveClosure() and reachableNodes() to Immutable* types. reachableNodes() already returned an immutable object (even though that was not reflected in the declared return type); transitiveClosure() used to return a mutable object. The old signatures remain available, so this change does not break binary compatibility. * graph: Changed the behavior of views returned by graph accessor methods that take a graph element as input: They now throw IllegalStateException when that element is removed from the graph. * hash: Optimized Checksum-based hash functions for Java 9+. * testing: Exposed FakeTicker Duration methods to Android users. * util.concurrent: Deprecated the constructors of UncheckedExecutionException and ExecutionError that don't accept a cause. We won't remove these constructors, but we recommend migrating off them, as users of those classes often assume that instances will contain a cause. * util.concurrent: Improved the correctness of racy accesses for J2ObjC users. * Changes of version 33.0.0: * This version of guava-android contains some package-private methods whose signature includes the Java 8 Collector API. This is a test to identify any problems before we expose those methods publicly to users. Please report any problems that you encounter. * Changed various classes to catch Exception instead of RuntimeException even when only RuntimeException is theoretically possible. This can help code that throws undeclared exceptions, as some bytecode rewriters (e.g., Robolectric) and languages (e.g., Kotlin) do. * Added an Automatic-Module-Name to failureaccess, Guava's one strong runtime dependency. * reflect: In guava-android only, removed Invokable.getAnnotatedReturnType() and Parameter.getAnnotatedType(). These methods never worked in an Android VM, and to reflect that, they were born @Deprecated, @Beta, and @DoNotCall. They're now preventing us from rolling out some new Android compatibility testing. This is the only binary-incompatible change in this release, and it should have no effect in practice. Still, we bump the major version number to follow Semantic Versioning. * util.concurrent: Changed our implementations to avoid eagerly initializing loggers during class loading. This can help performance, especially under Android. * Changes of version 32.1.3: * Changed Gradle Metadata to include dependency versions directly. This may address "Could not find some-dependency" errors that some users have reported (which might be a result of users' excluding guava-parent). * collect: Changed Multisets.unmodifiableMultiset(set) .removeIf(predicate) to throw an exception always, even if nothing matches predicate. * graph: Fixed the behavior of Graph/ValueGraph views for a node when that node is removed from the graph. * io: Fixed Files.createTempDir and FileBackedOutputStream under Windows services, a rare use case. (The fix actually covers only Java 9+ because Java 8 would require an additional approach. Let us know if you need support under Java 8.) * net: Made MediaType.parse allow and skip over whitespace around the / and = separator tokens in addition to the ; separator, for which it was already being allowed. * util.concurrent: Tweaked Futures.getChecked constructor-selection behavior: The method continues to prefer to call constructors with a String parameter, but now it breaks ties based on whether the constructor has a Throwable parameter. Beyond that, the choice of constructor remains undefined. (For this and other reasons, we discourage the use of getChecked.) * Changes of version 32.1.2: * Removed the section of our Gradle metadata that caused Gradle to report conflicts with listenablefuture. * Changed our Maven project to avoid affecting which version of Mockito our Gradle users see. * collect: Under J2CL, exposed ImmutableList and ImmutableSet methods copyOf and of for JavaScript usage. * net: Optimized InternetDomainName construction. * Changes of version 32.1.1: * Fixed our broken Gradle metadata from 32.1.0. Sorry again for the trouble. If you use Gradle, please still read the release notes from that version: You may still see errors from the new checking that the metadata enables, and the release notes discuss how to fix those errors. * Changes of version 32.1.0: * collect: Tweaked more nullness annotations. * hash: Enhanced crc32c() to use Java's hardware-accelerated implementation where available. * util.concurrent: Added Duration-based default methods to ListeningExecutorService. * Began updating Javadoc to focus less on APIs that have been superseded by additions to the JDK. We're also looking to add more documentation that directs users to JDK equivalents for our APIs. Further PRs welcome! * Fixed some problems with using Guava from a Java Agent. (But we don't test that configuration, and we don't know how well we'll be able to keep it working.) * Fixed BootstrapMethodError when using CacheBuilder from a custom system class loader. (As with the previous item, we're not sure how well we'll be able to keep this use case working.) * Suppressed a harmless unusable-by-js warning seen by users of guava-gwt. * Fix version mismatch in the ant build files. * The binaries are compatible with java 1.8 google-errorprone, google-errorprone-annotations: * google-errorprone and google-errorprone-annotations were updated to version 2.26.1: * Changes of version 2.26.1: * Fixes the module name: from 'com.google.errorprone.annotation' to 'com.google.errorprone.annotations'. Amends the OSGi build not to include 'Automatic-Module-Name' in the MANIFEST.MF for the 'annotations' project. * Changes of version 2.26.0: * The 'annotations' artifact now includes a module-info.java for Java Platform Module System support. * Disabled checks passed to -XepPatchChecks are now ignored, instead of causing a crash. * New checks: * SystemConsoleNull: Null-checking System.console() is not a reliable way to detect if the console is connected to a terminal. * EnumOrdinal: Discourage uses of Enum.ordinal() * Closed issues: * Add module-info.java * 2.19.x: Exception thrown when a disabled check is passed to -XepPatchChecks * Ignore disabled checks passed to -XepPatchChecks * feat: add jpms definition for annotations * Add the 'compile' goal for 'compile-java9' * Changes of version 2.25.0: * New checks: * JUnitIncompatibleType: Detects incompatible types passed to an assertion, similar to TruthIncompatibleType * RedundantSetterCall: Detects fields set twice in the same chained expression. Generalization of previous ProtoRedundantSet check to also handle AutoValue. * Closed issues: * Crash in UnnecessaryStringBuilder * Fix typos * Add support for specifying badEnclosingTypes for BadImport via flags * Some BugPattern docs are missing code examples * Remove incorrect statement from BugPattern index doc * Do not report NonFinalStaticField findings for fields modified in @BeforeAll methods * Changes of version 2.24.1: * Add an assertion to try to help debug * Changes of version 2.24.0: * New checks: * MultipleNullnessAnnotations: Discourage multiple nullness annotations * NullableTypeParameter: Discourage nullness annotations on type parameters * NullableWildcard: Discourage nullness annotations on wildcards * SuperCallToObjectMethod: Generalization of SuperEqualsIsObjectEquals, now covers hashCode * Changes of version 2.23.0: * New checks: DuplicateDateFormatField, NonFinalStaticField, StringCharset, StringFormatWithLiteral, SuperEqualsIsObjectEquals * Bug fixes and improvements * Changes of version 2.22.0: * New checks: * ClosingStandardOutputStreams: Prevents accidentally closing System.{out,err} with try-with-resources * TruthContainsExactlyElementsInUsage: containsExactly is preferred over containsExactlyElementsIn when creating new iterables * UnnecessaryAsync: detects unnecessary use of async primitives in local (and hence single-threaded) scopes * ReturnAtTheEndOfVoidFunction: detects unnecessary return statements at the end of void functions * MultimapKeys: Suggests using keySet() instead of iterating over Multimap.keys(), which does not collapse duplicates * Bug fixes and improvements: * Don't complain about literal IP addresses in AddressSelection * Prevent SuggestedFixes#renameMethod from modifying return type declaration * Fix UnusedVariable false positives for private record parameters * When running in conservative mode, no longer assume that implementations of Map.get, etc. return null * CanIgnoreReturnValueSuggester: Support additional exempting method annotations * UnusedVariable: exclude junit5's @RegisterExtension * Support running all available patch checks * Upgrade java-diff-utils 4.0 -> 4.12 * Flag unused Refaster template parameters * Support @SuppressWarnings("all") * Prevent Refaster UMemberSelect from matching method parameters * MissingDefault : Don't require // fall out comments on expression switches * Skip UnnecessaryLambda findings for usages in enhanced for loops * Fix bug where nested MissingBraces violations' suggested fixes result in broken code * Add support for specifying exemptPrefixes/exemptNames for UnusedVariable via flags * UnusedMethod: Added exempting variable annotations * Changes of version 2.21.1: * Handle overlapping ranges in suppressedRegions * Add AddressSelection to discourage APIs that convert a hostname to a single address * Changes of version 2.21.0: * New Checkers: * AttemptedNegativeZero: Prevents accidental use of -0, which is the same as 0. The floating-point negative zero is -0.0. * ICCProfileGetInstance: Warns on uses of ICC_Profile.getInstance(String), due to JDK-8191622. * MutableGuiceModule: Fields in Guice modules should be final. * NullableOptional: Discourages @Nullable-annotated Optionals. * OverridingMethodInconsistentArgumentNamesChecker: Arguments of overriding method are inconsistent with overridden method. * Fixed issues: * Avoid MemberName IOOBE on lambda parameters inside overriding methods * Improve LockOnNonEnclosingClassLiteral documentation * Security scan reported high CVE for com.google.guava:guava:31.1-jre * Upgrade guava to 32.0.1 * Proposal: checker to prevent other checkers from calling javac methods that changed across JDKs * Add support in ASTHelpersSuggestions for getEnclosedElements * Changes of version 2.20.0: * This release is compatible with early-access builds of JDK 21. * New Checkers: InlineTrivialConstant, UnnecessaryStringBuilder, BanClassLoader, DereferenceWithNullBranch, DoNotUseRuleChain, LockOnNonEnclosingClassLiteral, MissingRefasterAnnotation, NamedLikeContextualKeyword, NonApiType * Fixes issues: * Introduce MissingRefasterAnnotation checker * Fix minor typo in URepeated * Drop unused constant Template#AUTOBOXING_DEFAULT * Introduce command-line flag -XepAllSuggestionsAsWarnings * JDK21 compatibility * Add OSGi runtime metadata to error-prone's MANIFEST.MF files * Use EISOP Checker Framework version 3.34.0-eisop1 * NotJavadoc pattern does not allow Javadoc on module declarations * ErrorProneInjector incorrectly picks up the no-args constructor * Several high CVEs related to dependency com.google.protobuf:protobuf-java:3.19.2 * Upgrade protobuf-java to 3.19.6 * Changes of version 2.19.1: * This release fixes a binary compatibility issue when running on JDK 11 * Changes of version 2.19.0: * New Checkers: NotJavadoc, StringCaseLocaleUsage, UnnecessaryTestMethodPrefix * Fixes issues: * Exclude inner classes annotated with @Nested from ClassCanBeStatic rule * Optimize VisitorState#getSymbolFromName * ClassCanBeStatic: Exclude JUnit @Nested classes * BadImport: flag static import of newInstance methods * Support given for enforcing DirectInvocationOnMock: issue 3396 * Handle yield statement case in ASTHelpers#targetType * Should ASTHelpers.getSymbol(Tree) be annotated with @Nullable? * Fix '@' character in javadoc code snippets * Replace guava cache with caffeine * Discourage APIs locale-dependent APIs like String.to{Lower,Upper}Case * Introduce StringCaseLocaleUsage check * Changes of version 2.18.0: * New Checkers: InjectOnBugCheckers, LabelledBreakTarget, UnusedLabel, YodaCondition * Fixes issues: * @SuppressWarnings("InlineFormatString") doesn't work * Refaster: support method invocation type argument inlining * java.lang.IllegalArgumentException: Cannot edit synthetic AST nodes with specific record constructor * Rename class to match filename * Optimize VisitorState#getSymbolFromName * refactor: refactor bad smell UnusedLabel * LambdaFunctionalInterface crash with IllegalArgumentException when processing an enum constructor taking a lambda * Fix JDK 20-ea build compatibility * UngroupedOverloads: ignore generated constructors * [errorprone 2.17.0] NPE in StatementSwitchToExpressionSwitch.analyzeSwitchTree * StatementSwitchToExpressionSwitch: handle empty statement blocks * StatementSwitchToExpressionSwitch: only trigger on compatible target versions * Fix Finalize bugpattern to match protected finalize() * Make MemoizeConstantVisitorStateLookups check suppressible * Changes of version 2.17.0: * New Checkers: AvoidObjectArrays, Finalize, IgnoredPureGetter, ImpossibleNullComparison, MathAbsoluteNegative, NewFileSystem, StatementSwitchToExpressionSwitch, UnqualifiedYield * Fixed issues: * InvalidParam warning on Javadoc for Java record components * UnusedMethod flags @JsonValue methods as unused * UnusedMethod: Add more JPA lifecycle annotations or make annotations configurable * UnusedMethod: Support additional exempting method annotations * Have InvalidParam support records * Fix -XepDisableAllWarnings flag when passed on its own * ASTHelpersSuggestions does not flag call to packge() on com.sun.tools.javac.code.Symbol.ClassSymbol * @SupressWarnings on record compact constructor causes crash * Changes of version 2.16.0: * New Checkers: ASTHelpersSuggestions, CanIgnoreReturnValueSuggester, LenientFormatStringValidation, UnnecessarilyUsedValue * Fixed issues: * Avoid using non-ASCII Unicode characters outside of comments and literals * NullPointerException thrown during analysis * NPE analysing new style switch statement (2.14.0) * ImmutableChecker handles null types * Drop pre-JDK 11 logic from Refaster's Inliner class * Changes of version 2.15.0: * New Checkers: BuilderReturnThis, CanIgnoreReturnValueSuggester, CannotMockFinalClass, CannotMockFinalMethod, DirectInvocationOnMock, ExtendsObject, MockNotUsedInProduction, NoCanIgnoreReturnValueOnClasses, NullArgumentForNonNullParameter, SelfAlwaysReturnsThis, UnsafeWildcard, UnusedTypeParameter * Changes of version 2.14.0: * New checkers: BanJNDI, EmptyTopLevelDeclaration, ErroneousBitwiseExpression, FuzzyEqualsShouldNotBeUsedInEqualsMethod, Interruption, NullableOnContainingClass * Changes of version 2.13.1: * Fix a crash in UnnecessaryBoxedVariable * Include the unicode character in the diagnostic message * Changes of version 2.13.0: * Handle all annotations with the simple name Generated in -XepDisableWarningsInGeneratedCode * Reconcile BugChecker#isSuppressed with suppression handling in ErrorProneScanner * Fix a bug in enclosingPackage * Improve performance of fix application * Implicitly treat @AutoBuilder setter methods as @CanIgnoreReturnValue. * Remove some obsolete checks (PublicConstructorForAbstractClass, HashCodeToString) * Changes of version 2.12.1: * This release adds an infrastructure optimization to AppliedFix source code processing. * Changes of version 2.12.0: * New checks: BoxedPrimitiveEquality, DoubleBraceInitialization, IgnoredPureGetter, LockOnBoxedPrimitive, IncorrectMainMethod, LongDoubleConversion, RobolectricShadowDirectlyOn, StaticAssignmentOfThrowable, UnnecessaryLongToIntConversion, Varifier * Do not require maven-javadoc-plugin as it's not being used ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1956=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1956=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1956=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1956=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1956=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1956=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1956=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1956=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1956=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1956=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1956=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1956=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1956=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1956=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1956=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1956=1 ## Package List: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * guava-33.1.0-150200.3.10.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * guava-33.1.0-150200.3.10.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * guava-33.1.0-150200.3.10.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * guava-33.1.0-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * guava-33.1.0-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * guava-33.1.0-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * guava-33.1.0-150200.3.10.1 * SUSE Enterprise Storage 7.1 (noarch) * guava-33.1.0-150200.3.10.1 * openSUSE Leap 15.5 (noarch) * guava-javadoc-33.1.0-150200.3.10.1 * google-errorprone-annotation-2.26.1-150200.5.6.1 * google-errorprone-parent-2.26.1-150200.5.6.1 * google-errorprone-docgen_processor-2.26.1-150200.5.6.1 * google-errorprone-javadoc-2.26.1-150200.5.6.1 * guava-33.1.0-150200.3.10.1 * google-errorprone-type_annotations-2.26.1-150200.5.6.1 * guava-testlib-33.1.0-150200.3.10.1 * openSUSE Leap 15.6 (noarch) * guava-javadoc-33.1.0-150200.3.10.1 * google-errorprone-annotation-2.26.1-150200.5.6.1 * google-errorprone-parent-2.26.1-150200.5.6.1 * google-errorprone-docgen_processor-2.26.1-150200.5.6.1 * google-errorprone-javadoc-2.26.1-150200.5.6.1 * guava-33.1.0-150200.3.10.1 * google-errorprone-type_annotations-2.26.1-150200.5.6.1 * guava-testlib-33.1.0-150200.3.10.1 * Development Tools Module 15-SP5 (noarch) * guava-33.1.0-150200.3.10.1 * Development Tools Module 15-SP6 (noarch) * guava-33.1.0-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * guava-33.1.0-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * guava-33.1.0-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * guava-33.1.0-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * guava-33.1.0-150200.3.10.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 12:30:03 -0000 Subject: SUSE-SU-2024:1963-1: important: Security update for apache2 Message-ID: <171802260347.12735.4124027694686802156@smelt2.prg2.suse.org> # Security update for apache2 Announcement ID: SUSE-SU-2024:1963-1 Rating: important References: * bsc#1221401 * bsc#1222330 * bsc#1222332 Cross-References: * CVE-2023-38709 * CVE-2024-24795 * CVE-2024-27316 CVSS scores: * CVE-2023-38709 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-24795 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-27316 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27316 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for apache2 fixes the following issues: * CVE-2023-38709: Fixed HTTP response splitting (bsc#1222330). * CVE-2024-24795: Fixed HTTP response splitting in multiple modules (bsc#1222332). * CVE-2024-27316: Fixed HTTP/2 CONTINUATION frames can be utilized for DoS attacks (bsc#1221401). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1963=1 openSUSE-SLE-15.6-2024-1963=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1963=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1963=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1963=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * apache2-prefork-debuginfo-2.4.58-150600.5.3.1 * apache2-event-2.4.58-150600.5.3.1 * apache2-debuginfo-2.4.58-150600.5.3.1 * apache2-debugsource-2.4.58-150600.5.3.1 * apache2-utils-2.4.58-150600.5.3.1 * apache2-worker-2.4.58-150600.5.3.1 * apache2-2.4.58-150600.5.3.1 * apache2-utils-debugsource-2.4.58-150600.5.3.1 * apache2-devel-2.4.58-150600.5.3.1 * apache2-event-debugsource-2.4.58-150600.5.3.1 * apache2-utils-debuginfo-2.4.58-150600.5.3.1 * apache2-prefork-debugsource-2.4.58-150600.5.3.1 * apache2-worker-debugsource-2.4.58-150600.5.3.1 * apache2-event-debuginfo-2.4.58-150600.5.3.1 * apache2-prefork-2.4.58-150600.5.3.1 * apache2-worker-debuginfo-2.4.58-150600.5.3.1 * openSUSE Leap 15.6 (noarch) * apache2-manual-2.4.58-150600.5.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-prefork-debuginfo-2.4.58-150600.5.3.1 * apache2-debuginfo-2.4.58-150600.5.3.1 * apache2-debugsource-2.4.58-150600.5.3.1 * apache2-2.4.58-150600.5.3.1 * apache2-prefork-debugsource-2.4.58-150600.5.3.1 * apache2-prefork-2.4.58-150600.5.3.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-event-2.4.58-150600.5.3.1 * apache2-debuginfo-2.4.58-150600.5.3.1 * apache2-debugsource-2.4.58-150600.5.3.1 * apache2-event-debugsource-2.4.58-150600.5.3.1 * apache2-event-debuginfo-2.4.58-150600.5.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-utils-2.4.58-150600.5.3.1 * apache2-worker-2.4.58-150600.5.3.1 * apache2-utils-debugsource-2.4.58-150600.5.3.1 * apache2-devel-2.4.58-150600.5.3.1 * apache2-utils-debuginfo-2.4.58-150600.5.3.1 * apache2-worker-debugsource-2.4.58-150600.5.3.1 * apache2-worker-debuginfo-2.4.58-150600.5.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-38709.html * https://www.suse.com/security/cve/CVE-2024-24795.html * https://www.suse.com/security/cve/CVE-2024-27316.html * https://bugzilla.suse.com/show_bug.cgi?id=1221401 * https://bugzilla.suse.com/show_bug.cgi?id=1222330 * https://bugzilla.suse.com/show_bug.cgi?id=1222332 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 12:30:06 -0000 Subject: SUSE-SU-2024:1962-1: moderate: Security update for libvirt Message-ID: <171802260607.12735.5187403284775288292@smelt2.prg2.suse.org> # Security update for libvirt Announcement ID: SUSE-SU-2024:1962-1 Rating: moderate References: * bsc#1222584 * bsc#1223849 Cross-References: * CVE-2024-4418 CVSS scores: * CVE-2024-4418 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for libvirt fixes the following issues: * CVE-2024-4418: Fixed a stack use-after-free by ensuring temporary GSource is removed from client event loop. (bsc#1223849) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1962=1 SUSE-2024-1962=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1962=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1962=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libvirt-daemon-proxy-10.0.0-150600.8.3.1 * libvirt-libs-10.0.0-150600.8.3.1 * libvirt-daemon-plugin-lockd-10.0.0-150600.8.3.1 * libvirt-daemon-driver-lxc-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-logical-10.0.0-150600.8.3.1 * libvirt-daemon-lock-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-10.0.0-150600.8.3.1 * libvirt-daemon-driver-nodedev-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-logical-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-plugin-lockd-debuginfo-10.0.0-150600.8.3.1 * wireshark-plugin-libvirt-10.0.0-150600.8.3.1 * libvirt-daemon-driver-interface-10.0.0-150600.8.3.1 * libvirt-daemon-driver-network-10.0.0-150600.8.3.1 * libvirt-daemon-driver-lxc-10.0.0-150600.8.3.1 * libvirt-daemon-log-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-qemu-10.0.0-150600.8.3.1 * libvirt-daemon-driver-interface-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-qemu-debuginfo-10.0.0-150600.8.3.1 * libvirt-10.0.0-150600.8.3.1 * libvirt-client-qemu-10.0.0-150600.8.3.1 * libvirt-libs-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-scsi-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-core-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-core-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-common-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-nwfilter-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-log-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-disk-10.0.0-150600.8.3.1 * libvirt-daemon-driver-nodedev-10.0.0-150600.8.3.1 * libvirt-devel-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-gluster-10.0.0-150600.8.3.1 * libvirt-daemon-common-10.0.0-150600.8.3.1 * libvirt-debugsource-10.0.0-150600.8.3.1 * libvirt-daemon-driver-qemu-10.0.0-150600.8.3.1 * libvirt-daemon-plugin-sanlock-10.0.0-150600.8.3.1 * libvirt-daemon-lock-debuginfo-10.0.0-150600.8.3.1 * libvirt-nss-10.0.0-150600.8.3.1 * libvirt-client-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-gluster-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-iscsi-direct-10.0.0-150600.8.3.1 * libvirt-daemon-plugin-sanlock-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-config-nwfilter-10.0.0-150600.8.3.1 * libvirt-daemon-config-network-10.0.0-150600.8.3.1 * libvirt-daemon-lxc-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-10.0.0-150600.8.3.1 * wireshark-plugin-libvirt-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-network-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-scsi-10.0.0-150600.8.3.1 * libvirt-daemon-proxy-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-nwfilter-10.0.0-150600.8.3.1 * libvirt-client-10.0.0-150600.8.3.1 * libvirt-daemon-driver-secret-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-iscsi-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-mpath-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-secret-10.0.0-150600.8.3.1 * libvirt-daemon-10.0.0-150600.8.3.1 * libvirt-daemon-hooks-10.0.0-150600.8.3.1 * libvirt-nss-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-disk-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-mpath-10.0.0-150600.8.3.1 * openSUSE Leap 15.6 (x86_64) * libvirt-client-32bit-debuginfo-10.0.0-150600.8.3.1 * libvirt-devel-32bit-10.0.0-150600.8.3.1 * libvirt-daemon-xen-10.0.0-150600.8.3.1 * libvirt-daemon-driver-libxl-10.0.0-150600.8.3.1 * libvirt-daemon-driver-libxl-debuginfo-10.0.0-150600.8.3.1 * openSUSE Leap 15.6 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-rbd-debuginfo-10.0.0-150600.8.3.1 * openSUSE Leap 15.6 (noarch) * libvirt-doc-10.0.0-150600.8.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libvirt-devel-64bit-10.0.0-150600.8.3.1 * libvirt-client-64bit-debuginfo-10.0.0-150600.8.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libvirt-libs-10.0.0-150600.8.3.1 * libvirt-libs-debuginfo-10.0.0-150600.8.3.1 * libvirt-debugsource-10.0.0-150600.8.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libvirt-daemon-proxy-10.0.0-150600.8.3.1 * libvirt-daemon-plugin-lockd-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-logical-10.0.0-150600.8.3.1 * libvirt-daemon-lock-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-10.0.0-150600.8.3.1 * libvirt-daemon-driver-nodedev-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-logical-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-plugin-lockd-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-interface-10.0.0-150600.8.3.1 * libvirt-daemon-driver-network-10.0.0-150600.8.3.1 * libvirt-daemon-log-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-qemu-10.0.0-150600.8.3.1 * libvirt-daemon-driver-interface-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-qemu-debuginfo-10.0.0-150600.8.3.1 * libvirt-10.0.0-150600.8.3.1 * libvirt-client-qemu-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-scsi-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-core-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-core-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-common-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-nwfilter-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-log-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-disk-10.0.0-150600.8.3.1 * libvirt-daemon-driver-nodedev-10.0.0-150600.8.3.1 * libvirt-devel-10.0.0-150600.8.3.1 * libvirt-daemon-common-10.0.0-150600.8.3.1 * libvirt-debugsource-10.0.0-150600.8.3.1 * libvirt-daemon-driver-qemu-10.0.0-150600.8.3.1 * libvirt-daemon-plugin-sanlock-10.0.0-150600.8.3.1 * libvirt-daemon-lock-debuginfo-10.0.0-150600.8.3.1 * libvirt-nss-10.0.0-150600.8.3.1 * libvirt-client-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-iscsi-direct-10.0.0-150600.8.3.1 * libvirt-daemon-plugin-sanlock-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-config-nwfilter-10.0.0-150600.8.3.1 * libvirt-daemon-config-network-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-network-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-scsi-10.0.0-150600.8.3.1 * libvirt-daemon-proxy-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-nwfilter-10.0.0-150600.8.3.1 * libvirt-client-10.0.0-150600.8.3.1 * libvirt-daemon-driver-secret-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-iscsi-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-mpath-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-secret-10.0.0-150600.8.3.1 * libvirt-daemon-10.0.0-150600.8.3.1 * libvirt-daemon-hooks-10.0.0-150600.8.3.1 * libvirt-nss-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-disk-debuginfo-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-mpath-10.0.0-150600.8.3.1 * Server Applications Module 15-SP6 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-10.0.0-150600.8.3.1 * libvirt-daemon-driver-storage-rbd-debuginfo-10.0.0-150600.8.3.1 * Server Applications Module 15-SP6 (noarch) * libvirt-doc-10.0.0-150600.8.3.1 * Server Applications Module 15-SP6 (x86_64) * libvirt-daemon-xen-10.0.0-150600.8.3.1 * libvirt-daemon-driver-libxl-10.0.0-150600.8.3.1 * libvirt-daemon-driver-libxl-debuginfo-10.0.0-150600.8.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4418.html * https://bugzilla.suse.com/show_bug.cgi?id=1222584 * https://bugzilla.suse.com/show_bug.cgi?id=1223849 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 12:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 12:30:09 -0000 Subject: SUSE-SU-2024:1961-1: moderate: Security update for squid Message-ID: <171802260993.12735.15880075058108360019@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2024:1961-1 Rating: moderate References: * bsc#1225417 Cross-References: * CVE-2024-33427 CVSS scores: * CVE-2024-33427 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2024-33427: Fixed possible buffer overread that could have led to a denial-of-service (bsc#1225417). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1961=1 openSUSE-SLE-15.6-2024-1961=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1961=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * squid-debuginfo-6.9-150600.3.3.2 * squid-debugsource-6.9-150600.3.3.2 * squid-6.9-150600.3.3.2 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * squid-debuginfo-6.9-150600.3.3.2 * squid-debugsource-6.9-150600.3.3.2 * squid-6.9-150600.3.3.2 ## References: * https://www.suse.com/security/cve/CVE-2024-33427.html * https://bugzilla.suse.com/show_bug.cgi?id=1225417 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 12:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 12:30:12 -0000 Subject: SUSE-RU-2024:1960-1: moderate: Recommended update for openldap2 Message-ID: <171802261277.12735.10733578511688190069@smelt2.prg2.suse.org> # Recommended update for openldap2 Announcement ID: SUSE-RU-2024:1960-1 Rating: moderate References: * bsc#1217985 * bsc#1220787 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that has two fixes can now be installed. ## Description: This update for openldap2 fixes the following issue: * Increase DH param minimums to 2048 bits (bsc#1220787) * Null pointer deref in referrals as part of ldap_chain_response() (bsc#1217985) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1960=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1960=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1960=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1960=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * openldap2-debugsource-2.4.41-22.24.2 * openldap2-debuginfo-2.4.41-22.24.2 * openldap2-back-perl-2.4.41-22.24.2 * openldap2-devel-2.4.41-22.24.2 * openldap2-back-perl-debuginfo-2.4.41-22.24.2 * openldap2-devel-static-2.4.41-22.24.2 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * openldap2-ppolicy-check-password-debuginfo-1.2-22.24.2 * openldap2-debugsource-2.4.41-22.24.2 * openldap2-back-meta-debuginfo-2.4.41-22.24.2 * openldap2-debuginfo-2.4.41-22.24.2 * libldap-2_4-2-debuginfo-2.4.41-22.24.2 * libldap-2_4-2-2.4.41-22.24.2 * openldap2-client-2.4.41-22.24.2 * openldap2-client-debuginfo-2.4.41-22.24.2 * openldap2-ppolicy-check-password-1.2-22.24.2 * openldap2-2.4.41-22.24.2 * openldap2-back-meta-2.4.41-22.24.2 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * openldap2-doc-2.4.41-22.24.2 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libldap-2_4-2-debuginfo-32bit-2.4.41-22.24.2 * libldap-2_4-2-32bit-2.4.41-22.24.2 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * openldap2-ppolicy-check-password-debuginfo-1.2-22.24.2 * openldap2-debugsource-2.4.41-22.24.2 * openldap2-back-meta-debuginfo-2.4.41-22.24.2 * openldap2-debuginfo-2.4.41-22.24.2 * libldap-2_4-2-debuginfo-2.4.41-22.24.2 * libldap-2_4-2-2.4.41-22.24.2 * openldap2-client-2.4.41-22.24.2 * openldap2-client-debuginfo-2.4.41-22.24.2 * openldap2-ppolicy-check-password-1.2-22.24.2 * openldap2-2.4.41-22.24.2 * openldap2-back-meta-2.4.41-22.24.2 * SUSE Linux Enterprise Server 12 SP5 (noarch) * openldap2-doc-2.4.41-22.24.2 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libldap-2_4-2-debuginfo-32bit-2.4.41-22.24.2 * libldap-2_4-2-32bit-2.4.41-22.24.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * openldap2-ppolicy-check-password-debuginfo-1.2-22.24.2 * openldap2-debugsource-2.4.41-22.24.2 * openldap2-back-meta-debuginfo-2.4.41-22.24.2 * openldap2-debuginfo-2.4.41-22.24.2 * libldap-2_4-2-debuginfo-2.4.41-22.24.2 * libldap-2_4-2-2.4.41-22.24.2 * openldap2-client-2.4.41-22.24.2 * openldap2-client-debuginfo-2.4.41-22.24.2 * openldap2-ppolicy-check-password-1.2-22.24.2 * openldap2-2.4.41-22.24.2 * openldap2-back-meta-2.4.41-22.24.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * openldap2-doc-2.4.41-22.24.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libldap-2_4-2-debuginfo-32bit-2.4.41-22.24.2 * libldap-2_4-2-32bit-2.4.41-22.24.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217985 * https://bugzilla.suse.com/show_bug.cgi?id=1220787 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 12:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 12:30:13 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171802261332.12735.78641995022249968@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 12:33:15 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 12:33:15 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171802279592.25050.3739232358572559253@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 12:36:18 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 12:36:18 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171802297865.11523.131730972557533832@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 12:39:22 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 12:39:22 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171802316250.24909.12482457801414866435@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 16:30:04 -0000 Subject: SUSE-SU-2024:1966-1: moderate: Security update for aws-nitro-enclaves-cli Message-ID: <171803700456.13597.7820361881448088853@smelt2.prg2.suse.org> # Security update for aws-nitro-enclaves-cli Announcement ID: SUSE-SU-2024:1966-1 Rating: moderate References: * bsc#1218501 Cross-References: * CVE-2023-50711 CVSS scores: * CVE-2023-50711 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L * CVE-2023-50711 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for aws-nitro-enclaves-cli fixes the following issues: * CVE-2023-50711: Fixed out of bounds memory accesses in embedded vmm-sys-util (bsc#1218501). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-1966=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1966=1 openSUSE-SLE-15.6-2024-1966=1 ## Package List: * Public Cloud Module 15-SP6 (aarch64 x86_64) * aws-nitro-enclaves-cli-debugsource-1.3.0~git1.db34c02-150600.10.3.1 * aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.3.0~git1.db34c02-150600.10.3.1 * aws-nitro-enclaves-cli-debuginfo-1.3.0~git1.db34c02-150600.10.3.1 * system-group-ne-1.3.0~git1.db34c02-150600.10.3.1 * aws-nitro-enclaves-cli-1.3.0~git1.db34c02-150600.10.3.1 * aws-nitro-enclaves-binaryblobs-upstream-1.3.0~git1.db34c02-150600.10.3.1 * openSUSE Leap 15.6 (aarch64 x86_64) * aws-nitro-enclaves-cli-debugsource-1.3.0~git1.db34c02-150600.10.3.1 * aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.3.0~git1.db34c02-150600.10.3.1 * aws-nitro-enclaves-cli-debuginfo-1.3.0~git1.db34c02-150600.10.3.1 * system-group-ne-1.3.0~git1.db34c02-150600.10.3.1 * aws-nitro-enclaves-cli-1.3.0~git1.db34c02-150600.10.3.1 * aws-nitro-enclaves-binaryblobs-upstream-1.3.0~git1.db34c02-150600.10.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50711.html * https://bugzilla.suse.com/show_bug.cgi?id=1218501 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 16:30:06 -0000 Subject: SUSE-RU-2024:1965-1: moderate: Recommended update for kiwi-templates-Minimal-s390x Message-ID: <171803700623.13597.428265918815307313@smelt2.prg2.suse.org> # Recommended update for kiwi-templates-Minimal-s390x Announcement ID: SUSE-RU-2024:1965-1 Rating: moderate References: * bsc#1223257 Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for kiwi-templates-Minimal-s390x fixes the following issues: * Add "rw" to the kernel cmdline of remaining flavors * [s390x] firewalld is not running after firstboot ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1965=1 openSUSE-SLE-15.6-2024-1965=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1965=1 ## Package List: * openSUSE Leap 15.6 (noarch) * kiwi-templates-Minimal-s390x-15.6-150600.5.4.3 * Development Tools Module 15-SP6 (noarch) * kiwi-templates-Minimal-s390x-15.6-150600.5.4.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223257 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 16:30:07 -0000 Subject: SUSE-RU-2024:1964-1: moderate: Recommended update for kiwi-templates-Minimal-s390x Message-ID: <171803700739.13597.1970857636564194236@smelt2.prg2.suse.org> # Recommended update for kiwi-templates-Minimal-s390x Announcement ID: SUSE-RU-2024:1964-1 Rating: moderate References: * bsc#1223257 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for kiwi-templates-Minimal-s390x fixes the following issue: * [s390x] firewalld is not running after firstboot (bsc#1223257) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-1964=1 openSUSE-SLE-15.5-2024-1964=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1964=1 ## Package List: * openSUSE Leap 15.5 (noarch) * kiwi-templates-Minimal-s390x-15.5-150500.5.9.2 * Development Tools Module 15-SP5 (noarch) * kiwi-templates-Minimal-s390x-15.5-150500.5.9.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223257 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 16:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 16:30:08 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171803700806.13597.17568547292105420444@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 16:33:09 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 16:33:09 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171803718942.13597.16396717507368125285@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 16:36:10 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 16:36:10 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171803737099.16150.5103981093785177192@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 16:39:13 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 16:39:13 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171803755340.20981.3192248881474766422@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:02 -0000 Subject: SUSE-SU-2024:1971-1: important: Security update for frr Message-ID: <171805140288.26110.15789049888080511637@smelt2.prg2.suse.org> # Security update for frr Announcement ID: SUSE-SU-2024:1971-1 Rating: important References: * bsc#1222526 * bsc#1222528 * bsc#1223786 Cross-References: * CVE-2024-31950 * CVE-2024-31951 * CVE-2024-34088 CVSS scores: * CVE-2024-31950 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-31951 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-34088 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for frr fixes the following issues: * CVE-2024-34088: Fixed null pointer via get_edge() function can trigger a denial of service (bsc#1223786). * CVE-2024-31951: Fixed buffer overflow in ospf_te_parse_ext_link (bsc#1222528). * CVE-2024-31950: Fixed buffer overflow and daemon crash in ospf_te_parse_ri (bsc#1222526). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-1971=1 openSUSE-SLE-15.5-2024-1971=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1971=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1971=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1971=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libfrr0-8.4-150500.4.23.1 * libfrrcares0-debuginfo-8.4-150500.4.23.1 * libfrrospfapiclient0-debuginfo-8.4-150500.4.23.1 * frr-debugsource-8.4-150500.4.23.1 * libfrr_pb0-8.4-150500.4.23.1 * libfrrzmq0-8.4-150500.4.23.1 * libfrrzmq0-debuginfo-8.4-150500.4.23.1 * libfrrcares0-8.4-150500.4.23.1 * libfrrfpm_pb0-8.4-150500.4.23.1 * libfrrospfapiclient0-8.4-150500.4.23.1 * libfrr_pb0-debuginfo-8.4-150500.4.23.1 * libfrrsnmp0-8.4-150500.4.23.1 * frr-8.4-150500.4.23.1 * libfrr0-debuginfo-8.4-150500.4.23.1 * libfrrfpm_pb0-debuginfo-8.4-150500.4.23.1 * libmlag_pb0-8.4-150500.4.23.1 * libfrrsnmp0-debuginfo-8.4-150500.4.23.1 * frr-debuginfo-8.4-150500.4.23.1 * frr-devel-8.4-150500.4.23.1 * libmlag_pb0-debuginfo-8.4-150500.4.23.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libfrr0-8.4-150500.4.23.1 * libfrrcares0-debuginfo-8.4-150500.4.23.1 * libfrrospfapiclient0-debuginfo-8.4-150500.4.23.1 * frr-debugsource-8.4-150500.4.23.1 * libfrr_pb0-8.4-150500.4.23.1 * libfrrzmq0-8.4-150500.4.23.1 * libfrrzmq0-debuginfo-8.4-150500.4.23.1 * libfrrcares0-8.4-150500.4.23.1 * libfrrfpm_pb0-8.4-150500.4.23.1 * libfrrospfapiclient0-8.4-150500.4.23.1 * libfrr_pb0-debuginfo-8.4-150500.4.23.1 * libfrrsnmp0-8.4-150500.4.23.1 * frr-8.4-150500.4.23.1 * libfrr0-debuginfo-8.4-150500.4.23.1 * libfrrfpm_pb0-debuginfo-8.4-150500.4.23.1 * libmlag_pb0-8.4-150500.4.23.1 * libfrrsnmp0-debuginfo-8.4-150500.4.23.1 * frr-debuginfo-8.4-150500.4.23.1 * frr-devel-8.4-150500.4.23.1 * libmlag_pb0-debuginfo-8.4-150500.4.23.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libfrr0-8.4-150500.4.23.1 * libfrrcares0-debuginfo-8.4-150500.4.23.1 * libfrrospfapiclient0-debuginfo-8.4-150500.4.23.1 * frr-debugsource-8.4-150500.4.23.1 * libfrr_pb0-8.4-150500.4.23.1 * libfrrzmq0-8.4-150500.4.23.1 * libfrrzmq0-debuginfo-8.4-150500.4.23.1 * libfrrcares0-8.4-150500.4.23.1 * libfrrfpm_pb0-8.4-150500.4.23.1 * libfrrospfapiclient0-8.4-150500.4.23.1 * libfrr_pb0-debuginfo-8.4-150500.4.23.1 * libfrrsnmp0-8.4-150500.4.23.1 * frr-8.4-150500.4.23.1 * libfrr0-debuginfo-8.4-150500.4.23.1 * libfrrfpm_pb0-debuginfo-8.4-150500.4.23.1 * libmlag_pb0-8.4-150500.4.23.1 * libfrrsnmp0-debuginfo-8.4-150500.4.23.1 * frr-debuginfo-8.4-150500.4.23.1 * frr-devel-8.4-150500.4.23.1 * libmlag_pb0-debuginfo-8.4-150500.4.23.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libfrr0-8.4-150500.4.23.1 * libfrrcares0-debuginfo-8.4-150500.4.23.1 * libfrrospfapiclient0-debuginfo-8.4-150500.4.23.1 * frr-debugsource-8.4-150500.4.23.1 * libfrr_pb0-8.4-150500.4.23.1 * libfrrzmq0-8.4-150500.4.23.1 * libfrrzmq0-debuginfo-8.4-150500.4.23.1 * libfrrcares0-8.4-150500.4.23.1 * libfrrfpm_pb0-8.4-150500.4.23.1 * libfrrospfapiclient0-8.4-150500.4.23.1 * libfrr_pb0-debuginfo-8.4-150500.4.23.1 * libfrrsnmp0-8.4-150500.4.23.1 * frr-8.4-150500.4.23.1 * libfrr0-debuginfo-8.4-150500.4.23.1 * libfrrfpm_pb0-debuginfo-8.4-150500.4.23.1 * libmlag_pb0-8.4-150500.4.23.1 * libfrrsnmp0-debuginfo-8.4-150500.4.23.1 * frr-debuginfo-8.4-150500.4.23.1 * frr-devel-8.4-150500.4.23.1 * libmlag_pb0-debuginfo-8.4-150500.4.23.1 ## References: * https://www.suse.com/security/cve/CVE-2024-31950.html * https://www.suse.com/security/cve/CVE-2024-31951.html * https://www.suse.com/security/cve/CVE-2024-34088.html * https://bugzilla.suse.com/show_bug.cgi?id=1222526 * https://bugzilla.suse.com/show_bug.cgi?id=1222528 * https://bugzilla.suse.com/show_bug.cgi?id=1223786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:05 -0000 Subject: SUSE-SU-2024:1970-1: moderate: Security update for go1.22 Message-ID: <171805140500.26110.12382308957416962087@smelt2.prg2.suse.org> # Security update for go1.22 Announcement ID: SUSE-SU-2024:1970-1 Rating: moderate References: * bsc#1218424 * bsc#1225973 * bsc#1225974 Cross-References: * CVE-2024-24789 * CVE-2024-24790 CVSS scores: * CVE-2024-24789 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-24790 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for go1.22 fixes the following issues: go1.21.11 release (bsc#1212475). * CVE-2024-24789: Fixed mishandling of corrupt central directory record in archive/zip (bsc#1225973). * CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (bsc#1225974). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1970=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1970=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1970=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1970=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * go1.22-1.22.4-150000.1.18.1 * go1.22-doc-1.22.4-150000.1.18.1 * go1.22-race-1.22.4-150000.1.18.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.22-1.22.4-150000.1.18.1 * go1.22-doc-1.22.4-150000.1.18.1 * go1.22-race-1.22.4-150000.1.18.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * go1.22-1.22.4-150000.1.18.1 * go1.22-doc-1.22.4-150000.1.18.1 * go1.22-race-1.22.4-150000.1.18.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.22-1.22.4-150000.1.18.1 * go1.22-doc-1.22.4-150000.1.18.1 * go1.22-race-1.22.4-150000.1.18.1 ## References: * https://www.suse.com/security/cve/CVE-2024-24789.html * https://www.suse.com/security/cve/CVE-2024-24790.html * https://bugzilla.suse.com/show_bug.cgi?id=1218424 * https://bugzilla.suse.com/show_bug.cgi?id=1225973 * https://bugzilla.suse.com/show_bug.cgi?id=1225974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:06 -0000 Subject: SUSE-SU-2024:1969-1: moderate: Security update for go1.21 Message-ID: <171805140695.26110.318933448690505472@smelt2.prg2.suse.org> # Security update for go1.21 Announcement ID: SUSE-SU-2024:1969-1 Rating: moderate References: * bsc#1212475 * bsc#1225973 * bsc#1225974 Cross-References: * CVE-2024-24789 * CVE-2024-24790 CVSS scores: * CVE-2024-24789 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-24790 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for go1.21 fixes the following issues: go1.21.11 release (bsc#1212475). * CVE-2024-24789: Fixed mishandling of corrupt central directory record in archive/zip (bsc#1225973). * CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (bsc#1225974). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1969=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1969=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1969=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1969=1 ## Package List: * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * go1.21-1.21.11-150000.1.36.1 * go1.21-race-1.21.11-150000.1.36.1 * go1.21-doc-1.21.11-150000.1.36.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.21-1.21.11-150000.1.36.1 * go1.21-race-1.21.11-150000.1.36.1 * go1.21-doc-1.21.11-150000.1.36.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * go1.21-1.21.11-150000.1.36.1 * go1.21-race-1.21.11-150000.1.36.1 * go1.21-doc-1.21.11-150000.1.36.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.21-1.21.11-150000.1.36.1 * go1.21-race-1.21.11-150000.1.36.1 * go1.21-doc-1.21.11-150000.1.36.1 ## References: * https://www.suse.com/security/cve/CVE-2024-24789.html * https://www.suse.com/security/cve/CVE-2024-24790.html * https://bugzilla.suse.com/show_bug.cgi?id=1212475 * https://bugzilla.suse.com/show_bug.cgi?id=1225973 * https://bugzilla.suse.com/show_bug.cgi?id=1225974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:10 -0000 Subject: SUSE-SU-2024:1968-1: moderate: Security update for python-Brotli Message-ID: <171805141044.26110.7754936641174217172@smelt2.prg2.suse.org> # Security update for python-Brotli Announcement ID: SUSE-SU-2024:1968-1 Rating: moderate References: * bsc#1175825 Cross-References: * CVE-2020-8927 CVSS scores: * CVE-2020-8927 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2020-8927 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Affected Products: * openSUSE Leap 15.5 * Python 3 Module 15-SP6 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for python-Brotli fixes the following issues: * CVE-2020-8927: Fixed integer overflow when input chunk is larger than 2GiB. (bsc#1175825) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1968=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-1968=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1968=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-Brotli-debugsource-1.0.7-150200.3.3.1 * python3-Brotli-1.0.7-150200.3.3.1 * python3-Brotli-debuginfo-1.0.7-150200.3.3.1 * python-Brotli-debuginfo-1.0.7-150200.3.3.1 * Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python-Brotli-debugsource-1.0.7-150200.3.3.1 * python3-Brotli-1.0.7-150200.3.3.1 * python3-Brotli-debuginfo-1.0.7-150200.3.3.1 * python-Brotli-debuginfo-1.0.7-150200.3.3.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-Brotli-debugsource-1.0.7-150200.3.3.1 * python3-Brotli-1.0.7-150200.3.3.1 * python3-Brotli-debuginfo-1.0.7-150200.3.3.1 * python-Brotli-debuginfo-1.0.7-150200.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2020-8927.html * https://bugzilla.suse.com/show_bug.cgi?id=1175825 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:12 -0000 Subject: SUSE-SU-2024:1967-1: low: Security update for poppler Message-ID: <171805141208.26110.1362278620117244263@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2024:1967-1 Rating: low References: * bsc#1223375 Cross-References: * CVE-2024-4141 CVSS scores: * CVE-2024-4141 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2024-4141: Fixed out-of-bounds array write (bsc#1223375). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1967=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1967=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * poppler-debugsource-0.79.0-150200.3.29.1 * libpoppler89-0.79.0-150200.3.29.1 * libpoppler89-debuginfo-0.79.0-150200.3.29.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * poppler-debugsource-0.79.0-150200.3.29.1 * libpoppler89-0.79.0-150200.3.29.1 * libpoppler89-debuginfo-0.79.0-150200.3.29.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4141.html * https://bugzilla.suse.com/show_bug.cgi?id=1223375 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:12 -0000 Subject: SUSE-SU-2024:1945-1: important: Security update for gstreamer-plugins-base Message-ID: <171805141297.26110.10784826416257824960@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2024:1945-1 Rating: important References: * bsc#1224806 Cross-References: * CVE-2024-4453 CVSS scores: * CVE-2024-4453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1945=1 openSUSE-SLE-15.6-2024-1945=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1945=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstgl-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-32bit-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgstpbutils-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstriff-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-64bit-1.24.0-150600.3.3.1 * libgstapp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstfft-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-64bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-64bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-1.24.0-150600.3.3.1 * libgstgl-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-64bit-debuginfo-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * typelib-1_0-GstTag-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstAllocators-1_0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-1.24.0-150600.3.3.1 * libgstapp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstPbutils-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgstpbutils-1_0-0-1.24.0-150600.3.3.1 * libgstriff-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGL-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLWayland-1_0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstgl-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstVideo-1_0-1.24.0-150600.3.3.1 * libgstrtp-1_0-0-1.24.0-150600.3.3.1 * libgstgl-1_0-0-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-devel-1.24.0-150600.3.3.1 * typelib-1_0-GstRtsp-1_0-1.24.0-150600.3.3.1 * libgstsdp-1_0-0-1.24.0-150600.3.3.1 * gstreamer-plugins-base-1.24.0-150600.3.3.1 * libgstriff-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstApp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstGLX11-1_0-1.24.0-150600.3.3.1 * libgstrtsp-1_0-0-1.24.0-150600.3.3.1 * typelib-1_0-GstAudio-1_0-1.24.0-150600.3.3.1 * libgsttag-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-debuginfo-1.24.0-150600.3.3.1 * typelib-1_0-GstGLEGL-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstRtp-1_0-1.24.0-150600.3.3.1 * typelib-1_0-GstSdp-1_0-1.24.0-150600.3.3.1 * libgstallocators-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-debuginfo-1.24.0-150600.3.3.1 * libgstfft-1_0-0-1.24.0-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-base-lang-1.24.0-150600.3.3.1 * SUSE Package Hub 15 15-SP6 (x86_64) * gstreamer-plugins-base-debuginfo-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-1.24.0-150600.3.3.1 * libgsttag-1_0-0-32bit-1.24.0-150600.3.3.1 * gstreamer-plugins-base-32bit-debuginfo-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-1.24.0-150600.3.3.1 * libgstaudio-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 * gstreamer-plugins-base-debugsource-1.24.0-150600.3.3.1 * libgstvideo-1_0-0-32bit-debuginfo-1.24.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4453.html * https://bugzilla.suse.com/show_bug.cgi?id=1224806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:16 -0000 Subject: SUSE-SU-2024:1944-1: important: Security update for webkit2gtk3 Message-ID: <171805141620.26110.11729192995614552588@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:1944-1 Rating: important References: * bsc#1222010 * bsc#1225071 Cross-References: * CVE-2023-42843 * CVE-2023-42950 * CVE-2023-42956 * CVE-2024-23252 * CVE-2024-23254 * CVE-2024-23263 * CVE-2024-23280 * CVE-2024-23284 * CVE-2024-27834 CVSS scores: * CVE-2023-42843 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2023-42950 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42950 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42956 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42956 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-23252 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-23254 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-23263 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-23280 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-23284 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-27834 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves nine vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * Update to version 2.44.2 (bsc#1225071): * CVE-2024-23252: Fixed a vulnerability where processed web content may lead to a denial-of-service. (bsc#1222010) * CVE-2024-23254: Fixed a vulnerability where a malicious website may exfiltrate audio data cross-origin. (bsc#1222010) * CVE-2024-23263: Fixed a vulnerability where processed maliciously crafted web content may prevent Content Security Policy from being enforced. (bsc#1222010) * CVE-2024-23280: Fixed a vulnerability where a maliciously crafted webpage may be able to fingerprint the user. (bsc#1222010) * CVE-2024-23284: Fixed a vulnerability where processed maliciously crafted web content may prevent Content Security Policy from being enforced. (bsc#1222010) * CVE-2023-42950: Fixed a vulnerability where processed maliciously crafted web content may lead to arbitrary code execution. (bsc#1222010) * CVE-2023-42956: Fixed a vulnerability where processed web content may lead to a denial-of-service. (bsc#1222010) * CVE-2023-42843: Fixed a vulnerability where visiting a malicious website may lead to address bar spoofing. (bsc#1222010) * CVE-2024-27834: Fixed a vulnerability where an attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. (bsc#1225071) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1944=1 openSUSE-SLE-15.6-2024-1944=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1944=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-1944=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1944=1 ## Package List: * openSUSE Leap 15.6 (noarch) * WebKitGTK-4.1-lang-2.44.2-150600.12.3.1 * WebKitGTK-6.0-lang-2.44.2-150600.12.3.1 * WebKitGTK-4.0-lang-2.44.2-150600.12.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-JavaScriptCore-4_1-2.44.2-150600.12.3.1 * webkit2gtk3-soup2-devel-2.44.2-150600.12.3.1 * webkit-jsc-6.0-debuginfo-2.44.2-150600.12.3.1 * webkit2gtk-4_0-injected-bundles-2.44.2-150600.12.3.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150600.12.3.1 * libjavascriptcoregtk-6_0-1-2.44.2-150600.12.3.1 * webkit2gtk4-debugsource-2.44.2-150600.12.3.1 * webkit-jsc-4-debuginfo-2.44.2-150600.12.3.1 * webkit2gtk4-devel-2.44.2-150600.12.3.1 * webkit2gtk3-minibrowser-debuginfo-2.44.2-150600.12.3.1 * webkitgtk-6_0-injected-bundles-2.44.2-150600.12.3.1 * webkit2gtk3-soup2-minibrowser-debuginfo-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_0-18-2.44.2-150600.12.3.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150600.12.3.1 * webkit-jsc-4.1-debuginfo-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150600.12.3.1 * typelib-1_0-WebKit2-4_1-2.44.2-150600.12.3.1 * webkit2gtk3-soup2-debugsource-2.44.2-150600.12.3.1 * typelib-1_0-WebKit-6_0-2.44.2-150600.12.3.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.44.2-150600.12.3.1 * libwebkit2gtk-4_1-0-debuginfo-2.44.2-150600.12.3.1 * typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150600.12.3.1 * webkit2gtk4-minibrowser-debuginfo-2.44.2-150600.12.3.1 * typelib-1_0-WebKit2-4_0-2.44.2-150600.12.3.1 * webkit2gtk-4_1-injected-bundles-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_1-0-2.44.2-150600.12.3.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150600.12.3.1 * webkit2gtk3-debugsource-2.44.2-150600.12.3.1 * webkit2gtk4-minibrowser-2.44.2-150600.12.3.1 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150600.12.3.1 * webkit-jsc-4-2.44.2-150600.12.3.1 * libwebkitgtk-6_0-4-debuginfo-2.44.2-150600.12.3.1 * webkit-jsc-4.1-2.44.2-150600.12.3.1 * webkit2gtk3-devel-2.44.2-150600.12.3.1 * webkit2gtk3-minibrowser-2.44.2-150600.12.3.1 * typelib-1_0-JavaScriptCore-6_0-2.44.2-150600.12.3.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.44.2-150600.12.3.1 * libwebkitgtk-6_0-4-2.44.2-150600.12.3.1 * webkit-jsc-6.0-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150600.12.3.1 * libwebkit2gtk-4_1-0-2.44.2-150600.12.3.1 * libwebkit2gtk-4_0-37-2.44.2-150600.12.3.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150600.12.3.1 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150600.12.3.1 * webkit2gtk3-soup2-minibrowser-2.44.2-150600.12.3.1 * openSUSE Leap 15.6 (x86_64) * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_0-18-32bit-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_1-0-32bit-2.44.2-150600.12.3.1 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.44.2-150600.12.3.1 * libwebkit2gtk-4_1-0-32bit-debuginfo-2.44.2-150600.12.3.1 * libwebkit2gtk-4_0-37-32bit-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.44.2-150600.12.3.1 * libwebkit2gtk-4_1-0-32bit-2.44.2-150600.12.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.44.2-150600.12.3.1 * libwebkit2gtk-4_0-37-64bit-debuginfo-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_0-18-64bit-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_1-0-64bit-2.44.2-150600.12.3.1 * libwebkit2gtk-4_0-37-64bit-2.44.2-150600.12.3.1 * libwebkit2gtk-4_1-0-64bit-2.44.2-150600.12.3.1 * libwebkit2gtk-4_1-0-64bit-debuginfo-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.44.2-150600.12.3.1 * Basesystem Module 15-SP6 (noarch) * WebKitGTK-6.0-lang-2.44.2-150600.12.3.1 * WebKitGTK-4.0-lang-2.44.2-150600.12.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * webkit2gtk3-soup2-devel-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_0-18-2.44.2-150600.12.3.1 * webkit2gtk-4_0-injected-bundles-2.44.2-150600.12.3.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150600.12.3.1 * typelib-1_0-WebKit2-4_0-2.44.2-150600.12.3.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150600.12.3.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150600.12.3.1 * webkit2gtk3-soup2-debugsource-2.44.2-150600.12.3.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.44.2-150600.12.3.1 * libwebkitgtk-6_0-4-2.44.2-150600.12.3.1 * libjavascriptcoregtk-6_0-1-2.44.2-150600.12.3.1 * libwebkit2gtk-4_0-37-2.44.2-150600.12.3.1 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150600.12.3.1 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150600.12.3.1 * webkit2gtk4-debugsource-2.44.2-150600.12.3.1 * libwebkitgtk-6_0-4-debuginfo-2.44.2-150600.12.3.1 * webkitgtk-6_0-injected-bundles-2.44.2-150600.12.3.1 * Desktop Applications Module 15-SP6 (noarch) * WebKitGTK-4.1-lang-2.44.2-150600.12.3.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * webkit2gtk3-devel-2.44.2-150600.12.3.1 * typelib-1_0-JavaScriptCore-4_1-2.44.2-150600.12.3.1 * webkit2gtk-4_1-injected-bundles-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_1-0-2.44.2-150600.12.3.1 * typelib-1_0-WebKit2-4_1-2.44.2-150600.12.3.1 * webkit2gtk3-debugsource-2.44.2-150600.12.3.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150600.12.3.1 * libwebkit2gtk-4_1-0-2.44.2-150600.12.3.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150600.12.3.1 * libwebkit2gtk-4_1-0-debuginfo-2.44.2-150600.12.3.1 * typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150600.12.3.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * typelib-1_0-JavaScriptCore-6_0-2.44.2-150600.12.3.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.44.2-150600.12.3.1 * webkit2gtk4-debugsource-2.44.2-150600.12.3.1 * typelib-1_0-WebKit-6_0-2.44.2-150600.12.3.1 * webkit2gtk4-devel-2.44.2-150600.12.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-42843.html * https://www.suse.com/security/cve/CVE-2023-42950.html * https://www.suse.com/security/cve/CVE-2023-42956.html * https://www.suse.com/security/cve/CVE-2024-23252.html * https://www.suse.com/security/cve/CVE-2024-23254.html * https://www.suse.com/security/cve/CVE-2024-23263.html * https://www.suse.com/security/cve/CVE-2024-23280.html * https://www.suse.com/security/cve/CVE-2024-23284.html * https://www.suse.com/security/cve/CVE-2024-27834.html * https://bugzilla.suse.com/show_bug.cgi?id=1222010 * https://bugzilla.suse.com/show_bug.cgi?id=1225071 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:18 -0000 Subject: SUSE-SU-2024:1943-1: important: Security update for util-linux Message-ID: <171805141895.26110.14738566123590330847@smelt2.prg2.suse.org> # Security update for util-linux Announcement ID: SUSE-SU-2024:1943-1 Rating: important References: * bsc#1218609 * bsc#1220117 * bsc#1221831 * bsc#1223605 Cross-References: * CVE-2024-28085 CVSS scores: * CVE-2024-28085 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has three security fixes can now be installed. ## Description: This update for util-linux fixes the following issues: * CVE-2024-28085: Properly neutralize escape sequences in wall to avoid potential account takeover. (bsc#1221831) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1943=1 SUSE-2024-1943=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1943=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1943=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libblkid-devel-2.39.3-150600.4.3.1 * libfdisk1-2.39.3-150600.4.3.1 * python-libmount-debugsource-2.39.3-150600.4.3.1 * libsmartcols1-debuginfo-2.39.3-150600.4.3.1 * util-linux-2.39.3-150600.4.3.1 * libuuid-devel-static-2.39.3-150600.4.3.1 * libfdisk-devel-static-2.39.3-150600.4.3.1 * uuidd-debuginfo-2.39.3-150600.4.3.1 * libuuid1-debuginfo-2.39.3-150600.4.3.1 * libblkid1-debuginfo-2.39.3-150600.4.3.1 * python3-libmount-2.39.3-150600.4.3.1 * libblkid-devel-static-2.39.3-150600.4.3.1 * util-linux-tty-tools-2.39.3-150600.4.3.1 * libmount-devel-static-2.39.3-150600.4.3.1 * libfdisk-devel-2.39.3-150600.4.3.1 * python3-libmount-debuginfo-2.39.3-150600.4.3.1 * util-linux-systemd-2.39.3-150600.4.3.1 * libuuid1-2.39.3-150600.4.3.1 * util-linux-debuginfo-2.39.3-150600.4.3.1 * libuuid-devel-2.39.3-150600.4.3.1 * libfdisk1-debuginfo-2.39.3-150600.4.3.1 * uuidd-2.39.3-150600.4.3.1 * libmount-devel-2.39.3-150600.4.3.1 * libblkid1-2.39.3-150600.4.3.1 * libsmartcols-devel-2.39.3-150600.4.3.1 * libmount1-2.39.3-150600.4.3.1 * util-linux-tty-tools-debuginfo-2.39.3-150600.4.3.1 * libsmartcols1-2.39.3-150600.4.3.1 * util-linux-debugsource-2.39.3-150600.4.3.1 * util-linux-systemd-debuginfo-2.39.3-150600.4.3.1 * util-linux-systemd-debugsource-2.39.3-150600.4.3.1 * libsmartcols-devel-static-2.39.3-150600.4.3.1 * libmount1-debuginfo-2.39.3-150600.4.3.1 * openSUSE Leap 15.6 (x86_64) * libsmartcols1-32bit-debuginfo-2.39.3-150600.4.3.1 * libsmartcols1-32bit-2.39.3-150600.4.3.1 * libmount1-32bit-2.39.3-150600.4.3.1 * libfdisk-devel-32bit-2.39.3-150600.4.3.1 * libuuid1-32bit-2.39.3-150600.4.3.1 * libmount-devel-32bit-2.39.3-150600.4.3.1 * libmount1-32bit-debuginfo-2.39.3-150600.4.3.1 * libsmartcols-devel-32bit-2.39.3-150600.4.3.1 * libuuid1-32bit-debuginfo-2.39.3-150600.4.3.1 * libblkid1-32bit-debuginfo-2.39.3-150600.4.3.1 * libuuid-devel-32bit-2.39.3-150600.4.3.1 * libblkid-devel-32bit-2.39.3-150600.4.3.1 * libfdisk1-32bit-debuginfo-2.39.3-150600.4.3.1 * libblkid1-32bit-2.39.3-150600.4.3.1 * libfdisk1-32bit-2.39.3-150600.4.3.1 * openSUSE Leap 15.6 (noarch) * util-linux-lang-2.39.3-150600.4.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libsmartcols1-64bit-debuginfo-2.39.3-150600.4.3.1 * libfdisk1-64bit-debuginfo-2.39.3-150600.4.3.1 * libmount1-64bit-2.39.3-150600.4.3.1 * libsmartcols-devel-64bit-2.39.3-150600.4.3.1 * libblkid1-64bit-debuginfo-2.39.3-150600.4.3.1 * libmount1-64bit-debuginfo-2.39.3-150600.4.3.1 * libmount-devel-64bit-2.39.3-150600.4.3.1 * libuuid1-64bit-2.39.3-150600.4.3.1 * libblkid1-64bit-2.39.3-150600.4.3.1 * libfdisk1-64bit-2.39.3-150600.4.3.1 * libsmartcols1-64bit-2.39.3-150600.4.3.1 * libuuid1-64bit-debuginfo-2.39.3-150600.4.3.1 * libuuid-devel-64bit-2.39.3-150600.4.3.1 * libblkid-devel-64bit-2.39.3-150600.4.3.1 * libfdisk-devel-64bit-2.39.3-150600.4.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libblkid-devel-2.39.3-150600.4.3.1 * libfdisk1-2.39.3-150600.4.3.1 * libsmartcols1-debuginfo-2.39.3-150600.4.3.1 * util-linux-2.39.3-150600.4.3.1 * libuuid-devel-static-2.39.3-150600.4.3.1 * libuuid1-debuginfo-2.39.3-150600.4.3.1 * libblkid1-debuginfo-2.39.3-150600.4.3.1 * libblkid-devel-static-2.39.3-150600.4.3.1 * util-linux-tty-tools-2.39.3-150600.4.3.1 * libfdisk-devel-2.39.3-150600.4.3.1 * util-linux-systemd-2.39.3-150600.4.3.1 * libuuid1-2.39.3-150600.4.3.1 * util-linux-debuginfo-2.39.3-150600.4.3.1 * libuuid-devel-2.39.3-150600.4.3.1 * libfdisk1-debuginfo-2.39.3-150600.4.3.1 * libmount-devel-2.39.3-150600.4.3.1 * libblkid1-2.39.3-150600.4.3.1 * libsmartcols-devel-2.39.3-150600.4.3.1 * libmount1-2.39.3-150600.4.3.1 * util-linux-tty-tools-debuginfo-2.39.3-150600.4.3.1 * libsmartcols1-2.39.3-150600.4.3.1 * util-linux-debugsource-2.39.3-150600.4.3.1 * util-linux-systemd-debuginfo-2.39.3-150600.4.3.1 * util-linux-systemd-debugsource-2.39.3-150600.4.3.1 * libmount1-debuginfo-2.39.3-150600.4.3.1 * Basesystem Module 15-SP6 (noarch) * util-linux-lang-2.39.3-150600.4.3.1 * Basesystem Module 15-SP6 (x86_64) * libmount1-32bit-2.39.3-150600.4.3.1 * libuuid1-32bit-2.39.3-150600.4.3.1 * libuuid1-32bit-debuginfo-2.39.3-150600.4.3.1 * libblkid1-32bit-debuginfo-2.39.3-150600.4.3.1 * libmount1-32bit-debuginfo-2.39.3-150600.4.3.1 * libblkid1-32bit-2.39.3-150600.4.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * uuidd-debuginfo-2.39.3-150600.4.3.1 * util-linux-systemd-debugsource-2.39.3-150600.4.3.1 * util-linux-systemd-debuginfo-2.39.3-150600.4.3.1 * uuidd-2.39.3-150600.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28085.html * https://bugzilla.suse.com/show_bug.cgi?id=1218609 * https://bugzilla.suse.com/show_bug.cgi?id=1220117 * https://bugzilla.suse.com/show_bug.cgi?id=1221831 * https://bugzilla.suse.com/show_bug.cgi?id=1223605 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:22 -0000 Subject: SUSE-RU-2024:1942-1: moderate: Recommended update for gnome-control-center Message-ID: <171805142201.26110.16635981320686334629@smelt2.prg2.suse.org> # Recommended update for gnome-control-center Announcement ID: SUSE-RU-2024:1942-1 Rating: moderate References: * bsc#1222099 Affected Products: * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 An update that has one fix can now be installed. ## Description: This update for gnome-control-center fixes the following issue: * Add info page to toolbar view instead of navigation page to prevent hiding close button (bsc#1222099) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1942=1 openSUSE-SLE-15.6-2024-1942=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-1942=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-1942=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * gnome-control-center-debugsource-45.2-150600.4.3.2 * gnome-control-center-45.2-150600.4.3.2 * gnome-control-center-debuginfo-45.2-150600.4.3.2 * openSUSE Leap 15.6 (noarch) * gnome-control-center-user-faces-45.2-150600.4.3.2 * gnome-control-center-devel-45.2-150600.4.3.2 * gnome-control-center-goa-45.2-150600.4.3.2 * gnome-control-center-lang-45.2-150600.4.3.2 * gnome-control-center-color-45.2-150600.4.3.2 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * gnome-control-center-debugsource-45.2-150600.4.3.2 * gnome-control-center-45.2-150600.4.3.2 * gnome-control-center-debuginfo-45.2-150600.4.3.2 * Desktop Applications Module 15-SP6 (noarch) * gnome-control-center-lang-45.2-150600.4.3.2 * gnome-control-center-devel-45.2-150600.4.3.2 * SUSE Linux Enterprise Workstation Extension 15 SP6 (noarch) * gnome-control-center-color-45.2-150600.4.3.2 * gnome-control-center-goa-45.2-150600.4.3.2 * gnome-control-center-user-faces-45.2-150600.4.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222099 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:24 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:24 -0000 Subject: SUSE-SU-2024:1941-1: important: Security update for sssd Message-ID: <171805142453.26110.17360938139577485479@smelt2.prg2.suse.org> # Security update for sssd Announcement ID: SUSE-SU-2024:1941-1 Rating: important References: * bsc#1223050 * bsc#1223100 * jsc#PED-7677 Cross-References: * CVE-2023-3758 CVSS scores: * CVE-2023-3758 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability, contains one feature and has one security fix can now be installed. ## Description: This update for sssd fixes the following issues: * CVE-2023-3758: Fixed race condition during authorization leads to GPO policies functioning inconsistently (bsc#1223100). The following non-security bugs were fixed: * Use the name from the cached entries when updating them to avoid capitalization problems (bsc#1223050). * Extend sssctl command line tool to manage the cached GPOs; (jsc#PED-7677). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1941=1 openSUSE-SLE-15.6-2024-1941=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1941=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python3-sss_nss_idmap-debuginfo-2.9.3-150600.3.3.1 * sssd-dbus-2.9.3-150600.3.3.1 * libsss_simpleifp0-debuginfo-2.9.3-150600.3.3.1 * sssd-krb5-2.9.3-150600.3.3.1 * sssd-kcm-debuginfo-2.9.3-150600.3.3.1 * libsss_certmap-devel-2.9.3-150600.3.3.1 * libsss_idmap-devel-2.9.3-150600.3.3.1 * python3-ipa_hbac-debuginfo-2.9.3-150600.3.3.1 * libipa_hbac0-debuginfo-2.9.3-150600.3.3.1 * sssd-debugsource-2.9.3-150600.3.3.1 * python3-sss-murmur-debuginfo-2.9.3-150600.3.3.1 * python3-sssd-config-2.9.3-150600.3.3.1 * python3-ipa_hbac-2.9.3-150600.3.3.1 * sssd-ipa-debuginfo-2.9.3-150600.3.3.1 * libsss_idmap0-2.9.3-150600.3.3.1 * libsss_idmap0-debuginfo-2.9.3-150600.3.3.1 * sssd-2.9.3-150600.3.3.1 * libsss_nss_idmap0-debuginfo-2.9.3-150600.3.3.1 * sssd-ldap-debuginfo-2.9.3-150600.3.3.1 * sssd-winbind-idmap-debuginfo-2.9.3-150600.3.3.1 * sssd-ad-2.9.3-150600.3.3.1 * libsss_certmap0-2.9.3-150600.3.3.1 * libsss_nss_idmap-devel-2.9.3-150600.3.3.1 * sssd-kcm-2.9.3-150600.3.3.1 * sssd-ipa-2.9.3-150600.3.3.1 * libsss_certmap0-debuginfo-2.9.3-150600.3.3.1 * sssd-debuginfo-2.9.3-150600.3.3.1 * sssd-ad-debuginfo-2.9.3-150600.3.3.1 * libnfsidmap-sss-debuginfo-2.9.3-150600.3.3.1 * sssd-ldap-2.9.3-150600.3.3.1 * libsss_simpleifp0-2.9.3-150600.3.3.1 * libnfsidmap-sss-2.9.3-150600.3.3.1 * sssd-proxy-2.9.3-150600.3.3.1 * sssd-tools-2.9.3-150600.3.3.1 * libsss_simpleifp-devel-2.9.3-150600.3.3.1 * libsss_nss_idmap0-2.9.3-150600.3.3.1 * python3-sssd-config-debuginfo-2.9.3-150600.3.3.1 * sssd-dbus-debuginfo-2.9.3-150600.3.3.1 * sssd-krb5-common-2.9.3-150600.3.3.1 * sssd-krb5-common-debuginfo-2.9.3-150600.3.3.1 * python3-sss_nss_idmap-2.9.3-150600.3.3.1 * libipa_hbac-devel-2.9.3-150600.3.3.1 * sssd-krb5-debuginfo-2.9.3-150600.3.3.1 * sssd-winbind-idmap-2.9.3-150600.3.3.1 * sssd-tools-debuginfo-2.9.3-150600.3.3.1 * python3-sss-murmur-2.9.3-150600.3.3.1 * sssd-proxy-debuginfo-2.9.3-150600.3.3.1 * libipa_hbac0-2.9.3-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * sssd-32bit-2.9.3-150600.3.3.1 * sssd-32bit-debuginfo-2.9.3-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * sssd-64bit-2.9.3-150600.3.3.1 * sssd-64bit-debuginfo-2.9.3-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * sssd-dbus-2.9.3-150600.3.3.1 * libsss_simpleifp0-debuginfo-2.9.3-150600.3.3.1 * sssd-krb5-2.9.3-150600.3.3.1 * libipa_hbac0-2.9.3-150600.3.3.1 * sssd-kcm-debuginfo-2.9.3-150600.3.3.1 * libsss_certmap-devel-2.9.3-150600.3.3.1 * libsss_idmap-devel-2.9.3-150600.3.3.1 * libipa_hbac0-debuginfo-2.9.3-150600.3.3.1 * sssd-debugsource-2.9.3-150600.3.3.1 * python3-sssd-config-2.9.3-150600.3.3.1 * sssd-ipa-debuginfo-2.9.3-150600.3.3.1 * libsss_idmap0-2.9.3-150600.3.3.1 * libsss_idmap0-debuginfo-2.9.3-150600.3.3.1 * sssd-ldap-debuginfo-2.9.3-150600.3.3.1 * libsss_nss_idmap0-debuginfo-2.9.3-150600.3.3.1 * sssd-winbind-idmap-debuginfo-2.9.3-150600.3.3.1 * sssd-ad-2.9.3-150600.3.3.1 * libsss_certmap0-2.9.3-150600.3.3.1 * libsss_nss_idmap-devel-2.9.3-150600.3.3.1 * sssd-kcm-2.9.3-150600.3.3.1 * sssd-ipa-2.9.3-150600.3.3.1 * libsss_certmap0-debuginfo-2.9.3-150600.3.3.1 * sssd-debuginfo-2.9.3-150600.3.3.1 * sssd-ad-debuginfo-2.9.3-150600.3.3.1 * sssd-ldap-2.9.3-150600.3.3.1 * libsss_simpleifp0-2.9.3-150600.3.3.1 * sssd-proxy-2.9.3-150600.3.3.1 * sssd-tools-2.9.3-150600.3.3.1 * libsss_simpleifp-devel-2.9.3-150600.3.3.1 * libsss_nss_idmap0-2.9.3-150600.3.3.1 * python3-sssd-config-debuginfo-2.9.3-150600.3.3.1 * sssd-dbus-debuginfo-2.9.3-150600.3.3.1 * sssd-krb5-common-2.9.3-150600.3.3.1 * sssd-krb5-common-debuginfo-2.9.3-150600.3.3.1 * sssd-krb5-debuginfo-2.9.3-150600.3.3.1 * libipa_hbac-devel-2.9.3-150600.3.3.1 * sssd-winbind-idmap-2.9.3-150600.3.3.1 * sssd-tools-debuginfo-2.9.3-150600.3.3.1 * sssd-proxy-debuginfo-2.9.3-150600.3.3.1 * sssd-2.9.3-150600.3.3.1 * Basesystem Module 15-SP6 (x86_64) * sssd-32bit-2.9.3-150600.3.3.1 * sssd-32bit-debuginfo-2.9.3-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-3758.html * https://bugzilla.suse.com/show_bug.cgi?id=1223050 * https://bugzilla.suse.com/show_bug.cgi?id=1223100 * https://jira.suse.com/browse/PED-7677 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:27 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:27 -0000 Subject: SUSE-RU-2024:1940-1: moderate: Recommended update for suseconnect-ng Message-ID: <171805142719.26110.6818835402126920103@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:1940-1 Rating: moderate References: * bsc#1220679 * bsc#1223107 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Version update * Fix certificate import for Yast when using a registration proxy with self- signed SSL certificate (bsc#1223107) * Allow "\--rollback" flag to run on readonly filesystem (bsc#1220679) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1940=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1940=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1940=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1940=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1940=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1940=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1940=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1940=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1940=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1940=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1940=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1940=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1940=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1940=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1940=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libsuseconnect-1.9.0-150400.3.31.2 * suseconnect-ruby-bindings-1.9.0-150400.3.31.2 * suseconnect-ng-1.9.0-150400.3.31.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * suseconnect-ng-1.9.0-150400.3.31.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.9.0-150400.3.31.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.9.0-150400.3.31.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.9.0-150400.3.31.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.9.0-150400.3.31.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.9.0-150400.3.31.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsuseconnect-1.9.0-150400.3.31.2 * suseconnect-ruby-bindings-1.9.0-150400.3.31.2 * suseconnect-ng-1.9.0-150400.3.31.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsuseconnect-1.9.0-150400.3.31.2 * suseconnect-ruby-bindings-1.9.0-150400.3.31.2 * suseconnect-ng-1.9.0-150400.3.31.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libsuseconnect-1.9.0-150400.3.31.2 * suseconnect-ruby-bindings-1.9.0-150400.3.31.2 * suseconnect-ng-1.9.0-150400.3.31.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libsuseconnect-1.9.0-150400.3.31.2 * suseconnect-ruby-bindings-1.9.0-150400.3.31.2 * suseconnect-ng-1.9.0-150400.3.31.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsuseconnect-1.9.0-150400.3.31.2 * suseconnect-ruby-bindings-1.9.0-150400.3.31.2 * suseconnect-ng-1.9.0-150400.3.31.2 * SUSE Manager Proxy 4.3 (x86_64) * libsuseconnect-1.9.0-150400.3.31.2 * suseconnect-ruby-bindings-1.9.0-150400.3.31.2 * suseconnect-ng-1.9.0-150400.3.31.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libsuseconnect-1.9.0-150400.3.31.2 * suseconnect-ruby-bindings-1.9.0-150400.3.31.2 * suseconnect-ng-1.9.0-150400.3.31.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libsuseconnect-1.9.0-150400.3.31.2 * suseconnect-ruby-bindings-1.9.0-150400.3.31.2 * suseconnect-ng-1.9.0-150400.3.31.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220679 * https://bugzilla.suse.com/show_bug.cgi?id=1223107 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:32 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:32 -0000 Subject: SUSE-SU-2024:1939-1: moderate: Security update for python-idna Message-ID: <171805143253.26110.4973199174102176481@smelt2.prg2.suse.org> # Security update for python-idna Announcement ID: SUSE-SU-2024:1939-1 Rating: moderate References: * bsc#1222842 Cross-References: * CVE-2024-3651 CVSS scores: * CVE-2024-3651 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Python 3 Module 15-SP5 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-idna fixes the following issues: * CVE-2024-3651: Fixed a denial of service via resource consumption through specially crafted inputs to idna.encode() (bsc#1222842) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1939=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1939=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1939=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1939=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-1939=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-1939=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python311-idna-3.4-150400.11.10.1 * openSUSE Leap 15.5 (noarch) * python311-idna-3.4-150400.11.10.1 * openSUSE Leap 15.6 (noarch) * python311-idna-3.4-150400.11.10.1 * Public Cloud Module 15-SP4 (noarch) * python311-idna-3.4-150400.11.10.1 * Python 3 Module 15-SP5 (noarch) * python311-idna-3.4-150400.11.10.1 * Python 3 Module 15-SP6 (noarch) * python311-idna-3.4-150400.11.10.1 ## References: * https://www.suse.com/security/cve/CVE-2024-3651.html * https://bugzilla.suse.com/show_bug.cgi?id=1222842 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:30 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:30 -0000 Subject: SUSE-SU-2024:0613-2: important: Security update for libxml2 Message-ID: <171805143029.26110.13781421337172491537@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2024:0613-2 Rating: important References: * bsc#1219576 Cross-References: * CVE-2024-25062 CVSS scores: * CVE-2024-25062 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25062 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-25062: Fixed use-after-free in XMLReader (bsc#1219576). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-613=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-613=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-613=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-613=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-613=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-613=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-613=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-613=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-613=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-613=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-613=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-613=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-613=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-613=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-613=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * python311-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-devel-2.9.14-150400.5.28.1 * python311-libxml2-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libxml2-2-32bit-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-32bit-2.9.14-150400.5.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * python311-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-devel-2.9.14-150400.5.28.1 * python311-libxml2-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libxml2-2-32bit-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-32bit-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * python311-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-32bit-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-32bit-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-devel-2.9.14-150400.5.28.1 * python311-libxml2-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * python311-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-devel-2.9.14-150400.5.28.1 * python311-libxml2-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * openSUSE Leap 15.4 (x86_64) * libxml2-2-32bit-debuginfo-2.9.14-150400.5.28.1 * libxml2-devel-32bit-2.9.14-150400.5.28.1 * libxml2-2-32bit-2.9.14-150400.5.28.1 * openSUSE Leap 15.4 (noarch) * libxml2-doc-2.9.14-150400.5.28.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libxml2-devel-64bit-2.9.14-150400.5.28.1 * libxml2-2-64bit-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-64bit-2.9.14-150400.5.28.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * python311-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-devel-2.9.14-150400.5.28.1 * python311-libxml2-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libxml2-2-32bit-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-32bit-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * python311-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-devel-2.9.14-150400.5.28.1 * python311-libxml2-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libxml2-2-32bit-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-32bit-2.9.14-150400.5.28.1 * SUSE Manager Proxy 4.3 (x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-32bit-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-32bit-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-devel-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-32bit-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-32bit-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-devel-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-devel-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Manager Server 4.3 (x86_64) * libxml2-2-32bit-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-32bit-2.9.14-150400.5.28.1 ## References: * https://www.suse.com/security/cve/CVE-2024-25062.html * https://bugzilla.suse.com/show_bug.cgi?id=1219576 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 10 20:30:34 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 10 Jun 2024 20:30:34 -0000 Subject: SUSE-SU-2024:1938-1: moderate: Security update for python-docker Message-ID: <171805143457.26110.2785696836430677801@smelt2.prg2.suse.org> # Security update for python-docker Announcement ID: SUSE-SU-2024:1938-1 Rating: moderate References: * bsc#1224788 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for python-docker fixes the following issues: * CVE-2024-35195: Fix failure with updated python-requests. (bsc#1224788) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1938=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1938=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1938=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1938=1 ## Package List: * openSUSE Leap 15.5 (noarch) * python3-docker-4.2.0-150200.3.5.1 * openSUSE Leap 15.6 (noarch) * python3-docker-4.2.0-150200.3.5.1 * SUSE Package Hub 15 15-SP5 (noarch) * python3-docker-4.2.0-150200.3.5.1 * SUSE Package Hub 15 15-SP6 (noarch) * python3-docker-4.2.0-150200.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1224788 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 08:30:46 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 08:30:46 -0000 Subject: SUSE-SU-2024:1979-1: important: Security update for the Linux Kernel Message-ID: <171809464666.19927.17191072331294912131@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:1979-1 Rating: important References: * bsc#1065729 * bsc#1101816 * bsc#1181674 * bsc#1185902 * bsc#1187716 * bsc#1188616 * bsc#1190317 * bsc#1190795 * bsc#1191452 * bsc#1194591 * bsc#1197760 * bsc#1206213 * bsc#1206646 * bsc#1207186 * bsc#1209657 * bsc#1210335 * bsc#1215702 * bsc#1216702 * bsc#1217169 * bsc#1217519 * bsc#1220487 * bsc#1220854 * bsc#1220928 * bsc#1221044 * bsc#1221081 * bsc#1221086 * bsc#1221977 * bsc#1221994 * bsc#1222619 * bsc#1222627 * bsc#1222667 * bsc#1222671 * bsc#1222893 * bsc#1222894 * bsc#1223023 * bsc#1223046 * bsc#1223048 * bsc#1223084 * bsc#1223138 * bsc#1223207 * bsc#1223360 * bsc#1223384 * bsc#1223633 * bsc#1223653 * bsc#1223666 * bsc#1223671 * bsc#1223738 * bsc#1223752 * bsc#1223834 * bsc#1223922 * bsc#1223932 * bsc#1223948 * bsc#1224096 * bsc#1224174 * bsc#1224181 * bsc#1224347 * bsc#1224482 * bsc#1224511 * bsc#1224525 * bsc#1224566 * bsc#1224580 * bsc#1224592 * bsc#1224601 * bsc#1224607 * bsc#1224621 * bsc#1224644 * bsc#1224645 * bsc#1224648 * bsc#1224650 * bsc#1224663 * bsc#1224671 * bsc#1224676 * bsc#1224680 * bsc#1224682 * bsc#1224725 * bsc#1224728 * bsc#1224733 * bsc#1224738 * bsc#1224747 * bsc#1224749 * bsc#1224759 * bsc#1224803 * bsc#1224827 * bsc#1224830 * bsc#1224831 * bsc#1224834 * bsc#1224838 * bsc#1224841 * bsc#1224844 * bsc#1224846 * bsc#1224847 * bsc#1224849 * bsc#1224854 * bsc#1224859 * bsc#1224867 * bsc#1224880 * bsc#1224882 * bsc#1224888 * bsc#1224889 * bsc#1224892 * bsc#1224893 * bsc#1224899 * bsc#1224904 * bsc#1224907 * bsc#1224916 * bsc#1224917 * bsc#1224922 * bsc#1224926 * bsc#1224930 * bsc#1224931 * bsc#1224942 * bsc#1224954 * bsc#1224957 * bsc#1224959 * bsc#1224960 * bsc#1224961 * bsc#1224963 * bsc#1224966 * bsc#1224968 * bsc#1224981 * bsc#1224982 * bsc#1224983 * bsc#1224987 * bsc#1224990 * bsc#1224996 * bsc#1225008 * bsc#1225009 * bsc#1225010 * bsc#1225022 * bsc#1225026 * bsc#1225030 * bsc#1225054 * bsc#1225058 * bsc#1225059 * bsc#1225060 * bsc#1225062 * bsc#1225082 * bsc#1225084 * bsc#1225086 * bsc#1225092 * bsc#1225096 * bsc#1225112 * bsc#1225124 * bsc#1225128 * bsc#1225132 * bsc#1225141 * bsc#1225143 * bsc#1225144 * bsc#1225151 * bsc#1225153 * bsc#1225155 * bsc#1225157 * bsc#1225164 * bsc#1225177 * bsc#1225189 * bsc#1225192 * bsc#1225193 * bsc#1225198 * bsc#1225201 * bsc#1225207 * bsc#1225208 * bsc#1225222 * bsc#1225230 * bsc#1225242 * bsc#1225244 * bsc#1225247 * bsc#1225251 * bsc#1225252 * bsc#1225256 * bsc#1225303 * bsc#1225318 * bsc#1225322 * bsc#1225329 * bsc#1225330 * bsc#1225336 * bsc#1225347 * bsc#1225351 * bsc#1225354 * bsc#1225355 * bsc#1225360 * bsc#1225366 * bsc#1225367 * bsc#1225384 * bsc#1225390 * bsc#1225404 * bsc#1225409 * bsc#1225411 * bsc#1225438 * bsc#1225453 * bsc#1225479 * bsc#1225482 * bsc#1225506 * bsc#1225549 * bsc#1225560 * bsc#1225572 * bsc#1225640 * bsc#1225708 * bsc#1225764 Cross-References: * CVE-2021-46933 * CVE-2021-47074 * CVE-2021-47162 * CVE-2021-47171 * CVE-2021-47188 * CVE-2021-47206 * CVE-2021-47220 * CVE-2021-47229 * CVE-2021-47231 * CVE-2021-47235 * CVE-2021-47236 * CVE-2021-47237 * CVE-2021-47238 * CVE-2021-47239 * CVE-2021-47245 * CVE-2021-47246 * CVE-2021-47248 * CVE-2021-47249 * CVE-2021-47250 * CVE-2021-47252 * CVE-2021-47254 * CVE-2021-47258 * CVE-2021-47260 * CVE-2021-47261 * CVE-2021-47265 * CVE-2021-47269 * CVE-2021-47274 * CVE-2021-47276 * CVE-2021-47277 * CVE-2021-47280 * CVE-2021-47281 * CVE-2021-47284 * CVE-2021-47285 * CVE-2021-47288 * CVE-2021-47301 * CVE-2021-47302 * CVE-2021-47305 * CVE-2021-47307 * CVE-2021-47308 * CVE-2021-47310 * CVE-2021-47311 * CVE-2021-47314 * CVE-2021-47315 * CVE-2021-47319 * CVE-2021-47320 * CVE-2021-47321 * CVE-2021-47323 * CVE-2021-47324 * CVE-2021-47330 * CVE-2021-47334 * CVE-2021-47337 * CVE-2021-47343 * CVE-2021-47344 * CVE-2021-47345 * CVE-2021-47347 * CVE-2021-47352 * CVE-2021-47353 * CVE-2021-47355 * CVE-2021-47356 * CVE-2021-47357 * CVE-2021-47361 * CVE-2021-47362 * CVE-2021-47369 * CVE-2021-47375 * CVE-2021-47378 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47391 * CVE-2021-47397 * CVE-2021-47400 * CVE-2021-47401 * CVE-2021-47404 * CVE-2021-47409 * CVE-2021-47416 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47431 * CVE-2021-47435 * CVE-2021-47436 * CVE-2021-47456 * CVE-2021-47458 * CVE-2021-47460 * CVE-2021-47469 * CVE-2021-47472 * CVE-2021-47473 * CVE-2021-47478 * CVE-2021-47480 * CVE-2021-47483 * CVE-2021-47485 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47500 * CVE-2021-47506 * CVE-2021-47509 * CVE-2021-47511 * CVE-2021-47523 * CVE-2021-47541 * CVE-2021-47548 * CVE-2021-47565 * CVE-2022-48686 * CVE-2022-48697 * CVE-2022-48704 * CVE-2022-48708 * CVE-2022-48710 * CVE-2023-0160 * CVE-2023-1829 * CVE-2023-42755 * CVE-2023-47233 * CVE-2023-52527 * CVE-2023-52586 * CVE-2023-52591 * CVE-2023-52655 * CVE-2023-52664 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52691 * CVE-2023-52696 * CVE-2023-52698 * CVE-2023-52703 * CVE-2023-52730 * CVE-2023-52732 * CVE-2023-52741 * CVE-2023-52742 * CVE-2023-52747 * CVE-2023-52759 * CVE-2023-52774 * CVE-2023-52781 * CVE-2023-52796 * CVE-2023-52803 * CVE-2023-52821 * CVE-2023-52864 * CVE-2023-52865 * CVE-2023-52867 * CVE-2023-52875 * CVE-2023-52880 * CVE-2024-26625 * CVE-2024-26752 * CVE-2024-26775 * CVE-2024-26828 * CVE-2024-26846 * CVE-2024-26874 * CVE-2024-26900 * CVE-2024-26915 * CVE-2024-26920 * CVE-2024-26921 * CVE-2024-26934 * CVE-2024-26957 * CVE-2024-26958 * CVE-2024-26984 * CVE-2024-26996 * CVE-2024-27059 * CVE-2024-27062 * CVE-2024-27396 * CVE-2024-27398 * CVE-2024-27401 * CVE-2024-27419 * CVE-2024-27436 * CVE-2024-35789 * CVE-2024-35791 * CVE-2024-35809 * CVE-2024-35811 * CVE-2024-35830 * CVE-2024-35849 * CVE-2024-35877 * CVE-2024-35878 * CVE-2024-35887 * CVE-2024-35895 * CVE-2024-35914 * CVE-2024-35932 * CVE-2024-35935 * CVE-2024-35936 * CVE-2024-35944 * CVE-2024-35955 * CVE-2024-35969 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-36015 * CVE-2024-36029 * CVE-2024-36954 CVSS scores: * CVE-2021-46933 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-46933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47074 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47237 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47248 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47249 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47250 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47311 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47319 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47337 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47343 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47345 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47352 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47355 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47357 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47548 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48686 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42755 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-42755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52586 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 180 vulnerabilities and has 18 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948). Update blacklist.conf: remove entry * CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854). * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201). * CVE-2022-48697: Fix a use-after-free (bsc#1223922). Update blacklist.conf: drop entry from it * CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023). * CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354) * CVE-2023-42755: Check user supplied offsets (bsc#1215702). * CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747). * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930). * CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831). * CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222 CVE-2023-52732). * CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644) * CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506) * CVE-2024-36029: Pervent access to suspended controller (bsc#1225708 CVE-2024-36029) * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086) * CVE-2021-47352: Add validation for used length (bsc#1225124). * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621) * CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390). * CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645) * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). * CVE-2021-47423: Fix file release memory leak (bsc#1225366). * CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230). * CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355). * CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650). * CVE-2021-47500: Fixed trigger reference couting (bsc#1225360). * CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738). * CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208). * CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411). * CVE-2021-47509: Limit the period size to 16MB (bsc#1225409). * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525). * CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566) * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580). * CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960, CVE-2021-47277). * CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725). * CVE-2021-47401: Fix stack information leak (bsc#1225242). * CVE-2023-52867: Fix possible buffer overflow (bsc#1225009). * CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022). * CVE-2021-47265: Verify port when creating flow rule (bsc#1224957) * CVE-2021-47362: Update intermediate power state for SI (bsc#1225153). * CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151). * CVE-2023-52864: Fix opening of char device (bsc#1225132). * CVE-2022-48708: Fix potential NULL dereference (bsc#1224942). * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648). * CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847) * CVE-2023-52730: Fix possible resource leaks in some error paths (bsc#1224956). * CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup() (bsc#1225141). * CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838) * CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671). * CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931) * CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880) * CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082) * CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827) * CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733). * CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803). * CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983). * CVE-2024-35789: Clear fast rx for non-4addr in VLAN netdev (bsc#1224749). * CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680). * CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112). * CVE-2021-47357: Fix possible use-after-free in ia_module_exit() (bsc#1225144). * CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096). * CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086). * CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer (bsc#1224663) * CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907). * CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666). * CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081). * CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834). * CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633) * CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487). * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096). * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169). * CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046). * CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181). * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627). * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653). * CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932) * CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894). * CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207) * CVE-2024-26996: Fix UAF ncm object at re-bind after usb transport error (bsc#1223752). * CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (bsc#1223048) * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). The following non-security bugs were fixed: * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes). * assoc_array: Fix BUG_ON during garbage collect. * autofs: fix a leak in autofs_expire_indirect() (git-fixes) * Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes). * btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes) * btrfs: check if root is readonly while setting security xattr (git-fixes) * btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes) * btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes) * btrfs: do not stop integrity writeback too early (git-fixes) * btrfs: Explicitly handle btrfs_update_root failure (git-fixes) * btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes) * btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes) * btrfs: fix deadlock when writing out space cache (git-fixes) * Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes) * btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes) * btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes) * btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes) * btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes) * btrfs: fix race when deleting quota root from the dirty cow roots list (git- fixes) * btrfs: fix range_end calculation in extent_write_locked_range (git-fixes) * btrfs: fix return value mixup in btrfs_get_extent (git-fixes) * btrfs: fix unaligned access in readdir (git-fixes) * btrfs: limit device extents to the device size (git-fixes) * btrfs: prevent to set invalid default subvolid (git-fixes) * btrfs: record delayed inode root in transaction (git-fixes) * btrfs: scrub: reject unsupported scrub flags (git-fixes) * btrfs: send: ensure send_fd is writable (git-fixes) * btrfs: send: in case of IO error log it (git-fixes) * btrfs: send: limit number of clones and allocated memory size (git-fixes) * btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include * btrfs: tree-checker: add missing return after error in root_item (git-fixes) * btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes) * btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes) * btrfs: tree-checker: fix inline ref size in error messages (git-fixes) * btrfs: tree-checker: Fix misleading group system information (git-fixes) * btrfs: undo writable superblocke when sprouting fails (git-fixes) * btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes) * ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes) * ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes) * ecryptfs: fix kernel panic with null dev_name (git-fixes) * ecryptfs: Fix typo in message (git-fixes) * ep_create_wakeup_source(): dentry name can change under you (git-fixes) * exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes) * fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes) * fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes) * ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git- fixes). * ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git- fixes). * kprobes: Fix possible use-after-free issue on kprobe registration (git- fixes). * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059). * l2tp: pass correct message length to ip6_append_data (git-fixes). * lib/mpi: use kcalloc in mpi_resize (git-fixes). * list: fix a data-race around ep->rdllist (git-fixes). * net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes). * net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes). * net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes). * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes). * net: usb: sr9700: stop lying about skb->truesize (git-fixes). * net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360). * net/smc: fix fallback failed while sendmsg with fastopen (git-fixes). * netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes). * netfilter: nft_compat: explicitly reject ERROR and standard target (git- fixes). * netfilter: x_tables: set module owner for icmp(6) matches (git-fixes). * nfc: change order inside nfc_se_io error path (git-fixes). * powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes). * ppdev: Add an error check in register_device (git-fixes). * rds: avoid unenecessary cong_update in loop transport (git-fixes). * rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes). * ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes). * ring-buffer: Fix a race between readers and resize checks (bsc#1222893). * rxrpc: Do not put crypto buffers on the stack (git-fixes). * rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes). * rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls (git-fixes). * rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git- fixes). * rxrpc: Work around usercopy check (git-fixes). * s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347). * s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062). * tcp: tcp_make_synack() can be called from process context (git-fixes). * tracing: Fix blocked reader of snapshot buffer (git-fixes). * tracing: hide unused ftrace_event_id_fops (git-fixes). * tracing: Use .flush() call to wake up readers (git-fixes). * tracing: Use strncpy instead of memcpy when copying comm in trace.c (git- fixes). * usb: aqc111: stop lying about skb->truesize (git-fixes). * wifi: cfg80211: avoid leaking stack data into trace (git-fixes). * wifi: radiotap: fix kernel-doc notation warnings (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1979=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1979=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1979=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.188.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-azure-base-4.12.14-16.188.1 * kernel-syms-azure-4.12.14-16.188.1 * kernel-azure-debuginfo-4.12.14-16.188.1 * kernel-azure-devel-4.12.14-16.188.1 * kernel-azure-base-debuginfo-4.12.14-16.188.1 * kernel-azure-debugsource-4.12.14-16.188.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-devel-azure-4.12.14-16.188.1 * kernel-source-azure-4.12.14-16.188.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.188.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-azure-base-4.12.14-16.188.1 * kernel-syms-azure-4.12.14-16.188.1 * kernel-azure-debuginfo-4.12.14-16.188.1 * kernel-azure-devel-4.12.14-16.188.1 * kernel-azure-base-debuginfo-4.12.14-16.188.1 * kernel-azure-debugsource-4.12.14-16.188.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-devel-azure-4.12.14-16.188.1 * kernel-source-azure-4.12.14-16.188.1 * SUSE Linux Enterprise Server 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.188.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-azure-base-4.12.14-16.188.1 * kernel-syms-azure-4.12.14-16.188.1 * kernel-azure-debuginfo-4.12.14-16.188.1 * kernel-azure-devel-4.12.14-16.188.1 * kernel-azure-base-debuginfo-4.12.14-16.188.1 * kernel-azure-debugsource-4.12.14-16.188.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-devel-azure-4.12.14-16.188.1 * kernel-source-azure-4.12.14-16.188.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46933.html * https://www.suse.com/security/cve/CVE-2021-47074.html * https://www.suse.com/security/cve/CVE-2021-47162.html * https://www.suse.com/security/cve/CVE-2021-47171.html * https://www.suse.com/security/cve/CVE-2021-47188.html * https://www.suse.com/security/cve/CVE-2021-47206.html * https://www.suse.com/security/cve/CVE-2021-47220.html * https://www.suse.com/security/cve/CVE-2021-47229.html * https://www.suse.com/security/cve/CVE-2021-47231.html * https://www.suse.com/security/cve/CVE-2021-47235.html * https://www.suse.com/security/cve/CVE-2021-47236.html * https://www.suse.com/security/cve/CVE-2021-47237.html * https://www.suse.com/security/cve/CVE-2021-47238.html * https://www.suse.com/security/cve/CVE-2021-47239.html * https://www.suse.com/security/cve/CVE-2021-47245.html * https://www.suse.com/security/cve/CVE-2021-47246.html * https://www.suse.com/security/cve/CVE-2021-47248.html * https://www.suse.com/security/cve/CVE-2021-47249.html * https://www.suse.com/security/cve/CVE-2021-47250.html * https://www.suse.com/security/cve/CVE-2021-47252.html * https://www.suse.com/security/cve/CVE-2021-47254.html * https://www.suse.com/security/cve/CVE-2021-47258.html * https://www.suse.com/security/cve/CVE-2021-47260.html * https://www.suse.com/security/cve/CVE-2021-47261.html * https://www.suse.com/security/cve/CVE-2021-47265.html * https://www.suse.com/security/cve/CVE-2021-47269.html * https://www.suse.com/security/cve/CVE-2021-47274.html * https://www.suse.com/security/cve/CVE-2021-47276.html * https://www.suse.com/security/cve/CVE-2021-47277.html * https://www.suse.com/security/cve/CVE-2021-47280.html * https://www.suse.com/security/cve/CVE-2021-47281.html * https://www.suse.com/security/cve/CVE-2021-47284.html * https://www.suse.com/security/cve/CVE-2021-47285.html * https://www.suse.com/security/cve/CVE-2021-47288.html * https://www.suse.com/security/cve/CVE-2021-47301.html * https://www.suse.com/security/cve/CVE-2021-47302.html * https://www.suse.com/security/cve/CVE-2021-47305.html * https://www.suse.com/security/cve/CVE-2021-47307.html * https://www.suse.com/security/cve/CVE-2021-47308.html * https://www.suse.com/security/cve/CVE-2021-47310.html * https://www.suse.com/security/cve/CVE-2021-47311.html * https://www.suse.com/security/cve/CVE-2021-47314.html * https://www.suse.com/security/cve/CVE-2021-47315.html * https://www.suse.com/security/cve/CVE-2021-47319.html * https://www.suse.com/security/cve/CVE-2021-47320.html * https://www.suse.com/security/cve/CVE-2021-47321.html * https://www.suse.com/security/cve/CVE-2021-47323.html * https://www.suse.com/security/cve/CVE-2021-47324.html * https://www.suse.com/security/cve/CVE-2021-47330.html * https://www.suse.com/security/cve/CVE-2021-47334.html * https://www.suse.com/security/cve/CVE-2021-47337.html * https://www.suse.com/security/cve/CVE-2021-47343.html * https://www.suse.com/security/cve/CVE-2021-47344.html * https://www.suse.com/security/cve/CVE-2021-47345.html * https://www.suse.com/security/cve/CVE-2021-47347.html * https://www.suse.com/security/cve/CVE-2021-47352.html * https://www.suse.com/security/cve/CVE-2021-47353.html * https://www.suse.com/security/cve/CVE-2021-47355.html * https://www.suse.com/security/cve/CVE-2021-47356.html * https://www.suse.com/security/cve/CVE-2021-47357.html * https://www.suse.com/security/cve/CVE-2021-47361.html * https://www.suse.com/security/cve/CVE-2021-47362.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47397.html * https://www.suse.com/security/cve/CVE-2021-47400.html * https://www.suse.com/security/cve/CVE-2021-47401.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47409.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47435.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47458.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47469.html * https://www.suse.com/security/cve/CVE-2021-47472.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47478.html * https://www.suse.com/security/cve/CVE-2021-47480.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47509.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47523.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47548.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2022-48686.html * https://www.suse.com/security/cve/CVE-2022-48697.html * https://www.suse.com/security/cve/CVE-2022-48704.html * https://www.suse.com/security/cve/CVE-2022-48708.html * https://www.suse.com/security/cve/CVE-2022-48710.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-42755.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52527.html * https://www.suse.com/security/cve/CVE-2023-52586.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52698.html * https://www.suse.com/security/cve/CVE-2023-52703.html * https://www.suse.com/security/cve/CVE-2023-52730.html * https://www.suse.com/security/cve/CVE-2023-52732.html * https://www.suse.com/security/cve/CVE-2023-52741.html * https://www.suse.com/security/cve/CVE-2023-52742.html * https://www.suse.com/security/cve/CVE-2023-52747.html * https://www.suse.com/security/cve/CVE-2023-52759.html * https://www.suse.com/security/cve/CVE-2023-52774.html * https://www.suse.com/security/cve/CVE-2023-52781.html * https://www.suse.com/security/cve/CVE-2023-52796.html * https://www.suse.com/security/cve/CVE-2023-52803.html * https://www.suse.com/security/cve/CVE-2023-52821.html * https://www.suse.com/security/cve/CVE-2023-52864.html * https://www.suse.com/security/cve/CVE-2023-52865.html * https://www.suse.com/security/cve/CVE-2023-52867.html * https://www.suse.com/security/cve/CVE-2023-52875.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2024-26625.html * https://www.suse.com/security/cve/CVE-2024-26752.html * https://www.suse.com/security/cve/CVE-2024-26775.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26874.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26915.html * https://www.suse.com/security/cve/CVE-2024-26920.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26958.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-27059.html * https://www.suse.com/security/cve/CVE-2024-27062.html * https://www.suse.com/security/cve/CVE-2024-27396.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27401.html * https://www.suse.com/security/cve/CVE-2024-27419.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35791.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35877.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35935.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35944.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35969.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-36015.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1101816 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1185902 * https://bugzilla.suse.com/show_bug.cgi?id=1187716 * https://bugzilla.suse.com/show_bug.cgi?id=1188616 * https://bugzilla.suse.com/show_bug.cgi?id=1190317 * https://bugzilla.suse.com/show_bug.cgi?id=1190795 * https://bugzilla.suse.com/show_bug.cgi?id=1191452 * https://bugzilla.suse.com/show_bug.cgi?id=1194591 * https://bugzilla.suse.com/show_bug.cgi?id=1197760 * https://bugzilla.suse.com/show_bug.cgi?id=1206213 * https://bugzilla.suse.com/show_bug.cgi?id=1206646 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1215702 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217519 * https://bugzilla.suse.com/show_bug.cgi?id=1220487 * https://bugzilla.suse.com/show_bug.cgi?id=1220854 * https://bugzilla.suse.com/show_bug.cgi?id=1220928 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221081 * https://bugzilla.suse.com/show_bug.cgi?id=1221086 * https://bugzilla.suse.com/show_bug.cgi?id=1221977 * https://bugzilla.suse.com/show_bug.cgi?id=1221994 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222627 * https://bugzilla.suse.com/show_bug.cgi?id=1222667 * https://bugzilla.suse.com/show_bug.cgi?id=1222671 * https://bugzilla.suse.com/show_bug.cgi?id=1222893 * https://bugzilla.suse.com/show_bug.cgi?id=1222894 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223048 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223207 * https://bugzilla.suse.com/show_bug.cgi?id=1223360 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223653 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223738 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223834 * https://bugzilla.suse.com/show_bug.cgi?id=1223922 * https://bugzilla.suse.com/show_bug.cgi?id=1223932 * https://bugzilla.suse.com/show_bug.cgi?id=1223948 * https://bugzilla.suse.com/show_bug.cgi?id=1224096 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224181 * https://bugzilla.suse.com/show_bug.cgi?id=1224347 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224525 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224580 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224621 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224645 * https://bugzilla.suse.com/show_bug.cgi?id=1224648 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224725 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224759 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224827 * https://bugzilla.suse.com/show_bug.cgi?id=1224830 * https://bugzilla.suse.com/show_bug.cgi?id=1224831 * https://bugzilla.suse.com/show_bug.cgi?id=1224834 * https://bugzilla.suse.com/show_bug.cgi?id=1224838 * https://bugzilla.suse.com/show_bug.cgi?id=1224841 * https://bugzilla.suse.com/show_bug.cgi?id=1224844 * https://bugzilla.suse.com/show_bug.cgi?id=1224846 * https://bugzilla.suse.com/show_bug.cgi?id=1224847 * https://bugzilla.suse.com/show_bug.cgi?id=1224849 * https://bugzilla.suse.com/show_bug.cgi?id=1224854 * https://bugzilla.suse.com/show_bug.cgi?id=1224859 * https://bugzilla.suse.com/show_bug.cgi?id=1224867 * https://bugzilla.suse.com/show_bug.cgi?id=1224880 * https://bugzilla.suse.com/show_bug.cgi?id=1224882 * https://bugzilla.suse.com/show_bug.cgi?id=1224888 * https://bugzilla.suse.com/show_bug.cgi?id=1224889 * https://bugzilla.suse.com/show_bug.cgi?id=1224892 * https://bugzilla.suse.com/show_bug.cgi?id=1224893 * https://bugzilla.suse.com/show_bug.cgi?id=1224899 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224916 * https://bugzilla.suse.com/show_bug.cgi?id=1224917 * https://bugzilla.suse.com/show_bug.cgi?id=1224922 * https://bugzilla.suse.com/show_bug.cgi?id=1224926 * https://bugzilla.suse.com/show_bug.cgi?id=1224930 * https://bugzilla.suse.com/show_bug.cgi?id=1224931 * https://bugzilla.suse.com/show_bug.cgi?id=1224942 * https://bugzilla.suse.com/show_bug.cgi?id=1224954 * https://bugzilla.suse.com/show_bug.cgi?id=1224957 * https://bugzilla.suse.com/show_bug.cgi?id=1224959 * https://bugzilla.suse.com/show_bug.cgi?id=1224960 * https://bugzilla.suse.com/show_bug.cgi?id=1224961 * https://bugzilla.suse.com/show_bug.cgi?id=1224963 * https://bugzilla.suse.com/show_bug.cgi?id=1224966 * https://bugzilla.suse.com/show_bug.cgi?id=1224968 * https://bugzilla.suse.com/show_bug.cgi?id=1224981 * https://bugzilla.suse.com/show_bug.cgi?id=1224982 * https://bugzilla.suse.com/show_bug.cgi?id=1224983 * https://bugzilla.suse.com/show_bug.cgi?id=1224987 * https://bugzilla.suse.com/show_bug.cgi?id=1224990 * https://bugzilla.suse.com/show_bug.cgi?id=1224996 * https://bugzilla.suse.com/show_bug.cgi?id=1225008 * https://bugzilla.suse.com/show_bug.cgi?id=1225009 * https://bugzilla.suse.com/show_bug.cgi?id=1225010 * https://bugzilla.suse.com/show_bug.cgi?id=1225022 * https://bugzilla.suse.com/show_bug.cgi?id=1225026 * https://bugzilla.suse.com/show_bug.cgi?id=1225030 * https://bugzilla.suse.com/show_bug.cgi?id=1225054 * https://bugzilla.suse.com/show_bug.cgi?id=1225058 * https://bugzilla.suse.com/show_bug.cgi?id=1225059 * https://bugzilla.suse.com/show_bug.cgi?id=1225060 * https://bugzilla.suse.com/show_bug.cgi?id=1225062 * https://bugzilla.suse.com/show_bug.cgi?id=1225082 * https://bugzilla.suse.com/show_bug.cgi?id=1225084 * https://bugzilla.suse.com/show_bug.cgi?id=1225086 * https://bugzilla.suse.com/show_bug.cgi?id=1225092 * https://bugzilla.suse.com/show_bug.cgi?id=1225096 * https://bugzilla.suse.com/show_bug.cgi?id=1225112 * https://bugzilla.suse.com/show_bug.cgi?id=1225124 * https://bugzilla.suse.com/show_bug.cgi?id=1225128 * https://bugzilla.suse.com/show_bug.cgi?id=1225132 * https://bugzilla.suse.com/show_bug.cgi?id=1225141 * https://bugzilla.suse.com/show_bug.cgi?id=1225143 * https://bugzilla.suse.com/show_bug.cgi?id=1225144 * https://bugzilla.suse.com/show_bug.cgi?id=1225151 * https://bugzilla.suse.com/show_bug.cgi?id=1225153 * https://bugzilla.suse.com/show_bug.cgi?id=1225155 * https://bugzilla.suse.com/show_bug.cgi?id=1225157 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225177 * https://bugzilla.suse.com/show_bug.cgi?id=1225189 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225198 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225222 * https://bugzilla.suse.com/show_bug.cgi?id=1225230 * https://bugzilla.suse.com/show_bug.cgi?id=1225242 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225247 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225252 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225322 * https://bugzilla.suse.com/show_bug.cgi?id=1225329 * https://bugzilla.suse.com/show_bug.cgi?id=1225330 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225347 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225409 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225438 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225479 * https://bugzilla.suse.com/show_bug.cgi?id=1225482 * https://bugzilla.suse.com/show_bug.cgi?id=1225506 * https://bugzilla.suse.com/show_bug.cgi?id=1225549 * https://bugzilla.suse.com/show_bug.cgi?id=1225560 * https://bugzilla.suse.com/show_bug.cgi?id=1225572 * https://bugzilla.suse.com/show_bug.cgi?id=1225640 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 08:30:52 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 08:30:52 -0000 Subject: SUSE-SU-2024:1978-1: important: Security update for the Linux Kernel Message-ID: <171809465214.19927.358975880526681425@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:1978-1 Rating: important References: * bsc#1220960 * bsc#1222619 * bsc#1224904 * bsc#1225026 * bsc#1225030 * bsc#1225060 * bsc#1225177 * bsc#1225208 * bsc#1225318 * bsc#1225411 Cross-References: * CVE-2021-47104 * CVE-2021-47321 * CVE-2021-47323 * CVE-2021-47324 * CVE-2021-47347 * CVE-2021-47383 * CVE-2021-47391 * CVE-2021-47485 * CVE-2021-47511 * CVE-2023-52880 * CVE-2024-26929 * CVE-2024-26930 CVSS scores: * CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 11 SP4 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 An update that solves 12 vulnerabilities can now be installed. ## Description: The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960). * CVE-2021-47321: Fixed possible use-after-free by calling del_timer_sync() (bsc#1225060). * CVE-2021-47324: Fixed possible use-after-free in wdt_startup() (bsc#1225030). * CVE-2021-47323: Fixed possible use-after-free in wdt_turnoff() (bsc#1225026). * CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208). * CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411). * CVE-2021-47391: Ensure rdma_addr_cancel() happens before issuing more requests (bsc#1225318) * CVE-2021-47347: Fixed possible buffer overflow in wl1251_cmd_scan (bsc#1225177). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-1978=1 * SUSE Linux Enterprise Server 11 SP4 zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-1978=1 ## Package List: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 (nosrc x86_64) * kernel-xen-3.0.101-108.156.1 * kernel-trace-3.0.101-108.156.1 * kernel-ec2-3.0.101-108.156.1 * kernel-default-3.0.101-108.156.1 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 (x86_64) * kernel-default-devel-3.0.101-108.156.1 * kernel-ec2-base-3.0.101-108.156.1 * kernel-source-3.0.101-108.156.1 * kernel-xen-base-3.0.101-108.156.1 * kernel-xen-devel-3.0.101-108.156.1 * kernel-syms-3.0.101-108.156.1 * kernel-trace-base-3.0.101-108.156.1 * kernel-default-base-3.0.101-108.156.1 * kernel-trace-devel-3.0.101-108.156.1 * kernel-ec2-devel-3.0.101-108.156.1 * SUSE Linux Enterprise Server 11 SP4 (nosrc x86_64) * kernel-xen-3.0.101-108.156.1 * kernel-trace-3.0.101-108.156.1 * kernel-ec2-3.0.101-108.156.1 * kernel-default-3.0.101-108.156.1 * SUSE Linux Enterprise Server 11 SP4 (x86_64) * kernel-default-devel-3.0.101-108.156.1 * kernel-ec2-base-3.0.101-108.156.1 * kernel-source-3.0.101-108.156.1 * kernel-xen-base-3.0.101-108.156.1 * kernel-xen-devel-3.0.101-108.156.1 * kernel-syms-3.0.101-108.156.1 * kernel-trace-base-3.0.101-108.156.1 * kernel-default-base-3.0.101-108.156.1 * kernel-trace-devel-3.0.101-108.156.1 * kernel-ec2-devel-3.0.101-108.156.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47104.html * https://www.suse.com/security/cve/CVE-2021-47321.html * https://www.suse.com/security/cve/CVE-2021-47323.html * https://www.suse.com/security/cve/CVE-2021-47324.html * https://www.suse.com/security/cve/CVE-2021-47347.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://bugzilla.suse.com/show_bug.cgi?id=1220960 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1225026 * https://bugzilla.suse.com/show_bug.cgi?id=1225030 * https://bugzilla.suse.com/show_bug.cgi?id=1225060 * https://bugzilla.suse.com/show_bug.cgi?id=1225177 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 08:30:54 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 08:30:54 -0000 Subject: SUSE-SU-2024:1977-1: important: Security update for glibc Message-ID: <171809465468.19927.448583991286756229@smelt2.prg2.suse.org> # Security update for glibc Announcement ID: SUSE-SU-2024:1977-1 Rating: important References: * bsc#1222992 * bsc#1223423 * bsc#1223424 * bsc#1223425 Cross-References: * CVE-2024-2961 * CVE-2024-33599 * CVE-2024-33600 * CVE-2024-33601 * CVE-2024-33602 CVSS scores: * CVE-2024-2961 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-33599 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-33600 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-33601 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-33602 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves five vulnerabilities can now be installed. ## Description: This update for glibc fixes the following issues: * nscd: Release read lock after resetting timeout * nscd: Fix use-after-free in addgetnetgrentX (BZ #23520) * CVE-2024-33599; nscd: Stack-based buffer overflow in netgroup cache (bsc#1223423, BZ #31677) * CVE-2024-33600; nscd: Avoid null pointer crashes after notfound response (bsc#1223424, BZ #31678) * CVE-2024-33600: nscd: Do not send missing not-found response in addgetnetgrentX (bsc#1223424, BZ #31678) * CVE-2024-33601, CVE-2024-33602: netgroup: Use two buffers in addgetnetgrentX (bsc#1223425, BZ #31680) * CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425) * CVE-2024-2961: iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (bsc#1222992) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1977=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1977=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1977=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * glibc-debugsource-2.26-150000.13.73.1 * glibc-utils-2.26-150000.13.73.1 * glibc-profile-2.26-150000.13.73.1 * glibc-devel-debuginfo-2.26-150000.13.73.1 * glibc-extra-2.26-150000.13.73.1 * glibc-2.26-150000.13.73.1 * glibc-devel-2.26-150000.13.73.1 * glibc-extra-debuginfo-2.26-150000.13.73.1 * glibc-locale-base-debuginfo-2.26-150000.13.73.1 * glibc-locale-base-2.26-150000.13.73.1 * glibc-utils-debuginfo-2.26-150000.13.73.1 * glibc-debuginfo-2.26-150000.13.73.1 * glibc-locale-2.26-150000.13.73.1 * glibc-utils-src-debugsource-2.26-150000.13.73.1 * nscd-2.26-150000.13.73.1 * nscd-debuginfo-2.26-150000.13.73.1 * glibc-devel-static-2.26-150000.13.73.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * glibc-info-2.26-150000.13.73.1 * glibc-i18ndata-2.26-150000.13.73.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (nosrc) * glibc-utils-src-2.26-150000.13.73.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * glibc-32bit-debuginfo-2.26-150000.13.73.1 * glibc-locale-base-32bit-2.26-150000.13.73.1 * glibc-32bit-2.26-150000.13.73.1 * glibc-devel-32bit-debuginfo-2.26-150000.13.73.1 * glibc-locale-base-32bit-debuginfo-2.26-150000.13.73.1 * glibc-devel-32bit-2.26-150000.13.73.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.26-150000.13.73.1 * glibc-utils-2.26-150000.13.73.1 * glibc-profile-2.26-150000.13.73.1 * glibc-devel-debuginfo-2.26-150000.13.73.1 * glibc-extra-2.26-150000.13.73.1 * glibc-2.26-150000.13.73.1 * glibc-devel-2.26-150000.13.73.1 * glibc-extra-debuginfo-2.26-150000.13.73.1 * glibc-locale-base-debuginfo-2.26-150000.13.73.1 * glibc-locale-base-2.26-150000.13.73.1 * glibc-utils-debuginfo-2.26-150000.13.73.1 * glibc-debuginfo-2.26-150000.13.73.1 * glibc-locale-2.26-150000.13.73.1 * glibc-utils-src-debugsource-2.26-150000.13.73.1 * nscd-2.26-150000.13.73.1 * nscd-debuginfo-2.26-150000.13.73.1 * glibc-devel-static-2.26-150000.13.73.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * glibc-info-2.26-150000.13.73.1 * glibc-i18ndata-2.26-150000.13.73.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (nosrc) * glibc-utils-src-2.26-150000.13.73.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * glibc-32bit-debuginfo-2.26-150000.13.73.1 * glibc-locale-base-32bit-2.26-150000.13.73.1 * glibc-32bit-2.26-150000.13.73.1 * glibc-devel-32bit-debuginfo-2.26-150000.13.73.1 * glibc-locale-base-32bit-debuginfo-2.26-150000.13.73.1 * glibc-devel-32bit-2.26-150000.13.73.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * glibc-debugsource-2.26-150000.13.73.1 * glibc-utils-2.26-150000.13.73.1 * glibc-profile-2.26-150000.13.73.1 * glibc-devel-debuginfo-2.26-150000.13.73.1 * glibc-extra-2.26-150000.13.73.1 * glibc-2.26-150000.13.73.1 * glibc-devel-2.26-150000.13.73.1 * glibc-extra-debuginfo-2.26-150000.13.73.1 * glibc-locale-base-debuginfo-2.26-150000.13.73.1 * glibc-locale-base-2.26-150000.13.73.1 * glibc-utils-debuginfo-2.26-150000.13.73.1 * glibc-debuginfo-2.26-150000.13.73.1 * glibc-locale-2.26-150000.13.73.1 * glibc-utils-src-debugsource-2.26-150000.13.73.1 * nscd-2.26-150000.13.73.1 * nscd-debuginfo-2.26-150000.13.73.1 * glibc-devel-static-2.26-150000.13.73.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * glibc-info-2.26-150000.13.73.1 * glibc-i18ndata-2.26-150000.13.73.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc) * glibc-utils-src-2.26-150000.13.73.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * glibc-32bit-debuginfo-2.26-150000.13.73.1 * glibc-locale-base-32bit-2.26-150000.13.73.1 * glibc-32bit-2.26-150000.13.73.1 * glibc-devel-32bit-debuginfo-2.26-150000.13.73.1 * glibc-locale-base-32bit-debuginfo-2.26-150000.13.73.1 * glibc-devel-32bit-2.26-150000.13.73.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2961.html * https://www.suse.com/security/cve/CVE-2024-33599.html * https://www.suse.com/security/cve/CVE-2024-33600.html * https://www.suse.com/security/cve/CVE-2024-33601.html * https://www.suse.com/security/cve/CVE-2024-33602.html * https://bugzilla.suse.com/show_bug.cgi?id=1222992 * https://bugzilla.suse.com/show_bug.cgi?id=1223423 * https://bugzilla.suse.com/show_bug.cgi?id=1223424 * https://bugzilla.suse.com/show_bug.cgi?id=1223425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 08:30:58 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 08:30:58 -0000 Subject: SUSE-SU-2024:1976-1: important: Security update for webkit2gtk3 Message-ID: <171809465847.19927.18042847148420647260@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:1976-1 Rating: important References: * bsc#1215868 * bsc#1215869 * bsc#1215870 * bsc#1218033 * bsc#1222905 * bsc#1225071 Cross-References: * CVE-2023-42843 * CVE-2023-42950 * CVE-2023-42956 * CVE-2024-23226 * CVE-2024-23252 * CVE-2024-23254 * CVE-2024-23263 * CVE-2024-23280 * CVE-2024-23284 * CVE-2024-27834 CVSS scores: * CVE-2023-42843 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2023-42950 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42950 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42956 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42956 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-23226 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23252 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-23254 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-23263 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-23280 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-23284 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-27834 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * Update to version 2.44.2 (bsc#1225071) * CVE-2024-27834: Fixed a vulnerability where an attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. (bsc#1225071) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1976=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1976=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1976=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1976=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-1976=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * webkit2gtk3-debugsource-2.44.2-4.7.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-4.7.1 * webkit2gtk3-devel-2.44.2-4.7.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libwebkit2gtk-4_0-37-2.44.2-4.7.1 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-4.7.1 * typelib-1_0-JavaScriptCore-4_0-2.44.2-4.7.1 * webkit2gtk3-debugsource-2.44.2-4.7.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-4.7.1 * webkit2gtk-4_0-injected-bundles-2.44.2-4.7.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-4.7.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-4.7.1 * typelib-1_0-WebKit2-4_0-2.44.2-4.7.1 * libjavascriptcoregtk-4_0-18-2.44.2-4.7.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * libwebkit2gtk3-lang-2.44.2-4.7.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_0-37-2.44.2-4.7.1 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-4.7.1 * typelib-1_0-JavaScriptCore-4_0-2.44.2-4.7.1 * webkit2gtk3-debugsource-2.44.2-4.7.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-4.7.1 * webkit2gtk-4_0-injected-bundles-2.44.2-4.7.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-4.7.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-4.7.1 * typelib-1_0-WebKit2-4_0-2.44.2-4.7.1 * libjavascriptcoregtk-4_0-18-2.44.2-4.7.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * libwebkit2gtk3-lang-2.44.2-4.7.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libwebkit2gtk-4_0-37-2.44.2-4.7.1 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-4.7.1 * typelib-1_0-JavaScriptCore-4_0-2.44.2-4.7.1 * webkit2gtk3-debugsource-2.44.2-4.7.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-4.7.1 * webkit2gtk-4_0-injected-bundles-2.44.2-4.7.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-4.7.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-4.7.1 * typelib-1_0-WebKit2-4_0-2.44.2-4.7.1 * libjavascriptcoregtk-4_0-18-2.44.2-4.7.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * libwebkit2gtk3-lang-2.44.2-4.7.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * libjavascriptcoregtk-4_0-18-32bit-2.44.2-4.7.1 ## References: * https://www.suse.com/security/cve/CVE-2023-42843.html * https://www.suse.com/security/cve/CVE-2023-42950.html * https://www.suse.com/security/cve/CVE-2023-42956.html * https://www.suse.com/security/cve/CVE-2024-23226.html * https://www.suse.com/security/cve/CVE-2024-23252.html * https://www.suse.com/security/cve/CVE-2024-23254.html * https://www.suse.com/security/cve/CVE-2024-23263.html * https://www.suse.com/security/cve/CVE-2024-23280.html * https://www.suse.com/security/cve/CVE-2024-23284.html * https://www.suse.com/security/cve/CVE-2024-27834.html * https://bugzilla.suse.com/show_bug.cgi?id=1215868 * https://bugzilla.suse.com/show_bug.cgi?id=1215869 * https://bugzilla.suse.com/show_bug.cgi?id=1215870 * https://bugzilla.suse.com/show_bug.cgi?id=1218033 * https://bugzilla.suse.com/show_bug.cgi?id=1222905 * https://bugzilla.suse.com/show_bug.cgi?id=1225071 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 08:31:00 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 08:31:00 -0000 Subject: SUSE-SU-2024:1975-1: important: Security update for unrar Message-ID: <171809466093.19927.1481760966378928833@smelt2.prg2.suse.org> # Security update for unrar Announcement ID: SUSE-SU-2024:1975-1 Rating: important References: * bsc#1225661 Cross-References: * CVE-2024-33899 CVSS scores: * CVE-2024-33899 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for unrar fixes the following issues: * CVE-2024-33899: Fixed a denial of service via ANSI escape squences. (bsc#1225661) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1975=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1975=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1975=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1975=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * unrar-debugsource-5.6.1-4.11.1 * libunrar5_6_1-5.6.1-4.11.1 * libunrar-devel-5.6.1-4.11.1 * unrar-debuginfo-5.6.1-4.11.1 * libunrar5_6_1-debuginfo-5.6.1-4.11.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * unrar-5.6.1-4.11.1 * unrar-debugsource-5.6.1-4.11.1 * unrar-debuginfo-5.6.1-4.11.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * unrar-5.6.1-4.11.1 * unrar-debugsource-5.6.1-4.11.1 * unrar-debuginfo-5.6.1-4.11.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * unrar-5.6.1-4.11.1 * unrar-debugsource-5.6.1-4.11.1 * unrar-debuginfo-5.6.1-4.11.1 ## References: * https://www.suse.com/security/cve/CVE-2024-33899.html * https://bugzilla.suse.com/show_bug.cgi?id=1225661 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 08:31:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 08:31:04 -0000 Subject: SUSE-SU-2024:1974-1: moderate: Security update for rmt-server Message-ID: <171809466431.19927.3516533242851980666@smelt2.prg2.suse.org> # Security update for rmt-server Announcement ID: SUSE-SU-2024:1974-1 Rating: moderate References: * bsc#1203171 * bsc#1225997 * jsc#PED-7982 * jsc#PED-8018 Cross-References: * CVE-2024-28103 CVSS scores: * CVE-2024-28103 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability, contains two features and has one security fix can now be installed. ## Description: This update for rmt-server fixes the following issues: * Update to version 2.17 * CVE-2024-28103: Fixed Permissions-Policy that was only served on responses with an HTML related Content-Type. (bsc#1225997) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-1974=1 openSUSE-SLE-15.5-2024-1974=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1974=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1974=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-1974=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1974=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1974=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * rmt-server-2.17-150500.3.16.1 * rmt-server-pubcloud-2.17-150500.3.16.1 * rmt-server-debuginfo-2.17-150500.3.16.1 * rmt-server-debugsource-2.17-150500.3.16.1 * rmt-server-config-2.17-150500.3.16.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * rmt-server-2.17-150500.3.16.1 * rmt-server-pubcloud-2.17-150500.3.16.1 * rmt-server-debuginfo-2.17-150500.3.16.1 * rmt-server-debugsource-2.17-150500.3.16.1 * rmt-server-config-2.17-150500.3.16.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.17-150500.3.16.1 * rmt-server-debugsource-2.17-150500.3.16.1 * rmt-server-pubcloud-2.17-150500.3.16.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.17-150500.3.16.1 * rmt-server-debugsource-2.17-150500.3.16.1 * rmt-server-pubcloud-2.17-150500.3.16.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rmt-server-2.17-150500.3.16.1 * rmt-server-debuginfo-2.17-150500.3.16.1 * rmt-server-debugsource-2.17-150500.3.16.1 * rmt-server-config-2.17-150500.3.16.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * rmt-server-2.17-150500.3.16.1 * rmt-server-debuginfo-2.17-150500.3.16.1 * rmt-server-debugsource-2.17-150500.3.16.1 * rmt-server-config-2.17-150500.3.16.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28103.html * https://bugzilla.suse.com/show_bug.cgi?id=1203171 * https://bugzilla.suse.com/show_bug.cgi?id=1225997 * https://jira.suse.com/browse/PED-7982 * https://jira.suse.com/browse/PED-8018 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 08:31:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 08:31:07 -0000 Subject: SUSE-SU-2024:1973-1: moderate: Security update for rmt-server Message-ID: <171809466766.19927.11329440529844313061@smelt2.prg2.suse.org> # Security update for rmt-server Announcement ID: SUSE-SU-2024:1973-1 Rating: moderate References: * bsc#1203171 * bsc#1225997 * jsc#PED-7982 * jsc#PED-8018 Cross-References: * CVE-2024-28103 CVSS scores: * CVE-2024-28103 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * Public Cloud Module 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Proxy 4.1 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Server 4.1 An update that solves one vulnerability, contains two features and has one security fix can now be installed. ## Description: This update for rmt-server fixes the following issues: * Update to version 2.17 * CVE-2024-28103: Fixed Permissions-Policy that was only served on responses with an HTML related Content-Type. (bsc#1225997) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1973=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1973=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1973=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1973=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * rmt-server-config-2.17-150200.3.45.1 * rmt-server-debuginfo-2.17-150200.3.45.1 * rmt-server-debugsource-2.17-150200.3.45.1 * rmt-server-2.17-150200.3.45.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.17-150200.3.45.1 * rmt-server-pubcloud-2.17-150200.3.45.1 * rmt-server-debugsource-2.17-150200.3.45.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * rmt-server-config-2.17-150200.3.45.1 * rmt-server-debuginfo-2.17-150200.3.45.1 * rmt-server-debugsource-2.17-150200.3.45.1 * rmt-server-2.17-150200.3.45.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * rmt-server-config-2.17-150200.3.45.1 * rmt-server-debuginfo-2.17-150200.3.45.1 * rmt-server-debugsource-2.17-150200.3.45.1 * rmt-server-2.17-150200.3.45.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28103.html * https://bugzilla.suse.com/show_bug.cgi?id=1203171 * https://bugzilla.suse.com/show_bug.cgi?id=1225997 * https://jira.suse.com/browse/PED-7982 * https://jira.suse.com/browse/PED-8018 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 08:31:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 08:31:10 -0000 Subject: SUSE-RU-2024:1972-1: moderate: Recommended update for sssd Message-ID: <171809467059.19927.10341943460510793997@smelt2.prg2.suse.org> # Recommended update for sssd Announcement ID: SUSE-RU-2024:1972-1 Rating: moderate References: * bsc#1223050 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that has one fix can now be installed. ## Description: This update for sssd fixes the following issues: * Use the name from the cached entries when updating them to avoid capitalization problems (bsc#1223050) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1972=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1972=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1972=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1972=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libsss_idmap-devel-1.16.1-7.65.1 * libipa_hbac-devel-1.16.1-7.65.1 * sssd-debugsource-1.16.1-7.65.1 * libsss_nss_idmap-devel-1.16.1-7.65.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libsss_certmap0-1.16.1-7.65.1 * sssd-ipa-1.16.1-7.65.1 * libipa_hbac0-debuginfo-1.16.1-7.65.1 * sssd-ldap-1.16.1-7.65.1 * libsss_nss_idmap0-debuginfo-1.16.1-7.65.1 * libipa_hbac0-1.16.1-7.65.1 * sssd-krb5-common-1.16.1-7.65.1 * sssd-common-1.16.1-7.65.1 * sssd-krb5-common-debuginfo-1.16.1-7.65.1 * sssd-proxy-debuginfo-1.16.1-7.65.1 * libsss_simpleifp0-1.16.1-7.65.1 * sssd-ldap-debuginfo-1.16.1-7.65.1 * python-sssd-config-debuginfo-1.16.1-7.65.1 * libsss_idmap0-1.16.1-7.65.1 * sssd-krb5-debuginfo-1.16.1-7.65.1 * sssd-debugsource-1.16.1-7.65.1 * sssd-ad-1.16.1-7.65.1 * python-sssd-config-1.16.1-7.65.1 * libsss_certmap0-debuginfo-1.16.1-7.65.1 * libsss_nss_idmap0-1.16.1-7.65.1 * sssd-proxy-1.16.1-7.65.1 * sssd-krb5-1.16.1-7.65.1 * libsss_simpleifp0-debuginfo-1.16.1-7.65.1 * sssd-tools-1.16.1-7.65.1 * libsss_idmap0-debuginfo-1.16.1-7.65.1 * sssd-1.16.1-7.65.1 * sssd-ad-debuginfo-1.16.1-7.65.1 * sssd-ipa-debuginfo-1.16.1-7.65.1 * sssd-tools-debuginfo-1.16.1-7.65.1 * sssd-common-debuginfo-1.16.1-7.65.1 * sssd-dbus-debuginfo-1.16.1-7.65.1 * sssd-dbus-1.16.1-7.65.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64) * libsss_nss_idmap-devel-1.16.1-7.65.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * sssd-common-debuginfo-32bit-1.16.1-7.65.1 * sssd-common-32bit-1.16.1-7.65.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libsss_certmap0-1.16.1-7.65.1 * sssd-ipa-1.16.1-7.65.1 * libipa_hbac0-debuginfo-1.16.1-7.65.1 * sssd-ldap-1.16.1-7.65.1 * libsss_nss_idmap0-debuginfo-1.16.1-7.65.1 * libipa_hbac0-1.16.1-7.65.1 * sssd-krb5-common-1.16.1-7.65.1 * sssd-common-1.16.1-7.65.1 * sssd-krb5-common-debuginfo-1.16.1-7.65.1 * sssd-proxy-debuginfo-1.16.1-7.65.1 * libsss_simpleifp0-1.16.1-7.65.1 * sssd-ldap-debuginfo-1.16.1-7.65.1 * python-sssd-config-debuginfo-1.16.1-7.65.1 * libsss_idmap0-1.16.1-7.65.1 * sssd-krb5-debuginfo-1.16.1-7.65.1 * sssd-debugsource-1.16.1-7.65.1 * sssd-ad-1.16.1-7.65.1 * python-sssd-config-1.16.1-7.65.1 * libsss_certmap0-debuginfo-1.16.1-7.65.1 * libsss_nss_idmap0-1.16.1-7.65.1 * sssd-proxy-1.16.1-7.65.1 * sssd-krb5-1.16.1-7.65.1 * libsss_simpleifp0-debuginfo-1.16.1-7.65.1 * sssd-tools-1.16.1-7.65.1 * libsss_idmap0-debuginfo-1.16.1-7.65.1 * sssd-1.16.1-7.65.1 * sssd-ad-debuginfo-1.16.1-7.65.1 * sssd-ipa-debuginfo-1.16.1-7.65.1 * sssd-tools-debuginfo-1.16.1-7.65.1 * sssd-common-debuginfo-1.16.1-7.65.1 * sssd-dbus-debuginfo-1.16.1-7.65.1 * sssd-dbus-1.16.1-7.65.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64) * libsss_nss_idmap-devel-1.16.1-7.65.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * sssd-common-debuginfo-32bit-1.16.1-7.65.1 * sssd-common-32bit-1.16.1-7.65.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libsss_certmap0-1.16.1-7.65.1 * sssd-ipa-1.16.1-7.65.1 * libipa_hbac0-debuginfo-1.16.1-7.65.1 * sssd-ldap-1.16.1-7.65.1 * libsss_nss_idmap0-debuginfo-1.16.1-7.65.1 * libipa_hbac0-1.16.1-7.65.1 * sssd-krb5-common-1.16.1-7.65.1 * sssd-common-1.16.1-7.65.1 * sssd-krb5-common-debuginfo-1.16.1-7.65.1 * sssd-proxy-debuginfo-1.16.1-7.65.1 * libsss_simpleifp0-1.16.1-7.65.1 * sssd-ldap-debuginfo-1.16.1-7.65.1 * python-sssd-config-debuginfo-1.16.1-7.65.1 * libsss_idmap0-1.16.1-7.65.1 * sssd-krb5-debuginfo-1.16.1-7.65.1 * sssd-debugsource-1.16.1-7.65.1 * sssd-ad-1.16.1-7.65.1 * python-sssd-config-1.16.1-7.65.1 * libsss_certmap0-debuginfo-1.16.1-7.65.1 * libsss_nss_idmap0-1.16.1-7.65.1 * sssd-proxy-1.16.1-7.65.1 * sssd-krb5-1.16.1-7.65.1 * libsss_simpleifp0-debuginfo-1.16.1-7.65.1 * sssd-tools-1.16.1-7.65.1 * libsss_idmap0-debuginfo-1.16.1-7.65.1 * sssd-1.16.1-7.65.1 * sssd-ad-debuginfo-1.16.1-7.65.1 * sssd-ipa-debuginfo-1.16.1-7.65.1 * sssd-tools-debuginfo-1.16.1-7.65.1 * sssd-common-debuginfo-1.16.1-7.65.1 * sssd-dbus-debuginfo-1.16.1-7.65.1 * sssd-dbus-1.16.1-7.65.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * sssd-common-debuginfo-32bit-1.16.1-7.65.1 * sssd-common-32bit-1.16.1-7.65.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223050 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:30:02 -0000 Subject: SUSE-SU-2024:1991-1: important: Security update for unbound Message-ID: <171810900286.28588.17729192176494784174@smelt2.prg2.suse.org> # Security update for unbound Announcement ID: SUSE-SU-2024:1991-1 Rating: important References: * bsc#1202031 * bsc#1202033 * bsc#1203643 * bsc#1219823 * bsc#1219826 * jsc#PED-8333 Cross-References: * CVE-2022-30698 * CVE-2022-30699 * CVE-2022-3204 * CVE-2023-50387 * CVE-2023-50868 CVSS scores: * CVE-2022-30698 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-30698 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-30699 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-30699 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-3204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3204 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and contains one feature can now be installed. ## Description: This update for unbound fixes the following issues: unbound was updated to 1.20.0: * A lot of bugfixes and added features. For a complete list take a look at the changelog located at: /usr/share/doc/packages/unbound/Changelog or https://www.nlnetlabs.nl/projects/unbound/download/ Some Noteworthy Changes: * Removed DLV. The DLV has been decommisioned since unbound 1.5.4 and has been advised to stop using it since. The use of dlv options displays a warning. * Remove EDNS lame procedure, do not re-query without EDNS after timeout. * Add DNS over HTTPS * libunbound has been upgraded to major version 8 Security Fixes: * CVE-2023-50387: DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers. [bsc#1219823] * CVE-2023-50868: NSEC3 closest encloser proof can exhaust CPU. [bsc#1219826] * CVE-2022-30698: Novel "ghost domain names" attack by introducing subdomain delegations. [bsc#1202033] * CVE-2022-30699: Novel "ghost domain names" attack by updating almost expired delegation information. [bsc#1202031] * CVE-2022-3204: NRDelegation attack leads to uncontrolled resource consumption (Non-Responsive Delegation Attack). [bsc#1203643] Packaging Changes: * Use prefixes instead of sudo in unbound.service * Remove no longer necessary BuildRequires: libfstrm-devel and libprotobuf-c- devel ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1991=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1991=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1991=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1991=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1991=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1991=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1991=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1991=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1991=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1991=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1991=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1991=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1991=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1991=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1991=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1991=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1991=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1991=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1991=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Manager Proxy 4.3 (x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * unbound-python-debuginfo-1.20.0-150100.10.13.1 * unbound-1.20.0-150100.10.13.1 * unbound-python-1.20.0-150100.10.13.1 * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * openSUSE Leap 15.5 (noarch) * unbound-munin-1.20.0-150100.10.13.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * unbound-python-debuginfo-1.20.0-150100.10.13.1 * unbound-1.20.0-150100.10.13.1 * unbound-python-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libunbound8-1.20.0-150100.10.13.1 * unbound-devel-1.20.0-150100.10.13.1 * unbound-debugsource-1.20.0-150100.10.13.1 * unbound-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-debuginfo-1.20.0-150100.10.13.1 * unbound-anchor-1.20.0-150100.10.13.1 * libunbound8-debuginfo-1.20.0-150100.10.13.1 ## References: * https://www.suse.com/security/cve/CVE-2022-30698.html * https://www.suse.com/security/cve/CVE-2022-30699.html * https://www.suse.com/security/cve/CVE-2022-3204.html * https://www.suse.com/security/cve/CVE-2023-50387.html * https://www.suse.com/security/cve/CVE-2023-50868.html * https://bugzilla.suse.com/show_bug.cgi?id=1202031 * https://bugzilla.suse.com/show_bug.cgi?id=1202033 * https://bugzilla.suse.com/show_bug.cgi?id=1203643 * https://bugzilla.suse.com/show_bug.cgi?id=1219823 * https://bugzilla.suse.com/show_bug.cgi?id=1219826 * https://jira.suse.com/browse/PED-8333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:30:05 -0000 Subject: SUSE-SU-2024:1990-1: important: Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed Message-ID: <171810900530.28588.17352961099155327912@smelt2.prg2.suse.org> # Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open- driver-G06-signed Announcement ID: SUSE-SU-2024:1990-1 Rating: important References: * bsc#1223356 Cross-References: * CVE-2024-0090 * CVE-2024-0091 * CVE-2024-0092 CVSS scores: * CVE-2024-0090 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-0091 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed fixes the following issues: Security Update 550.90.07: * CVE-2024-0090: Fixed out of bounds write (bsc#1223356). * CVE-2024-0092: Fixed incorrect exception handling (bsc#1223356). * CVE-2024-0091: Fixed untrusted pointer dereference (bsc#1223356). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-1990=1 openSUSE-SLE-15.5-2024-1990=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1990=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1990=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1990=1 ## Package List: * openSUSE Leap 15.5 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1 * openSUSE Leap 15.5 (x86_64) * nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1 * nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1 * nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.90.07_k5.14.21_150500.33.54-150500.3.47.1 * openSUSE Leap 15.5 (aarch64 x86_64) * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 * nvidia-open-driver-G06-signed-debugsource-550.90.07-150500.3.47.1 * nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 * openSUSE Leap 15.5 (aarch64) * nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 * nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 * Basesystem Module 15-SP5 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1 * Basesystem Module 15-SP5 (aarch64) * nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 * nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 * Basesystem Module 15-SP5 (aarch64 x86_64) * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 * nvidia-open-driver-G06-signed-debugsource-550.90.07-150500.3.47.1 * nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 * Public Cloud Module 15-SP5 (x86_64) * nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1 * nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1 * nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.90.07_k5.14.21_150500.33.54-150500.3.47.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0090.html * https://www.suse.com/security/cve/CVE-2024-0091.html * https://www.suse.com/security/cve/CVE-2024-0092.html * https://bugzilla.suse.com/show_bug.cgi?id=1223356 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:30:07 -0000 Subject: SUSE-SU-2024:1989-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <171810900737.28588.6109137888255119100@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:1989-1 Rating: important References: * bsc#1224119 Cross-References: * CVE-2024-3727 CVSS scores: * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * Containers Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Bump github.com/containers/image/v5 (bsc#1224119, CVE-2024-3727) * Remove SLE15 SP4 from the distro check (end of general support) * Add LABEL with source URL ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1989=1 openSUSE-SLE-15.6-2024-1989=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-1989=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * containerized-data-importer-uploadserver-1.58.0-150600.3.3.2 * containerized-data-importer-controller-1.58.0-150600.3.3.2 * containerized-data-importer-cloner-1.58.0-150600.3.3.2 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150600.3.3.2 * containerized-data-importer-manifests-1.58.0-150600.3.3.2 * containerized-data-importer-api-1.58.0-150600.3.3.2 * containerized-data-importer-operator-debuginfo-1.58.0-150600.3.3.2 * containerized-data-importer-importer-1.58.0-150600.3.3.2 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150600.3.3.2 * obs-service-cdi_containers_meta-1.58.0-150600.3.3.2 * containerized-data-importer-operator-1.58.0-150600.3.3.2 * containerized-data-importer-importer-debuginfo-1.58.0-150600.3.3.2 * containerized-data-importer-api-debuginfo-1.58.0-150600.3.3.2 * containerized-data-importer-controller-debuginfo-1.58.0-150600.3.3.2 * containerized-data-importer-cloner-debuginfo-1.58.0-150600.3.3.2 * containerized-data-importer-uploadproxy-1.58.0-150600.3.3.2 * Containers Module 15-SP6 (x86_64) * containerized-data-importer-manifests-1.58.0-150600.3.3.2 ## References: * https://www.suse.com/security/cve/CVE-2024-3727.html * https://bugzilla.suse.com/show_bug.cgi?id=1224119 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:30:11 -0000 Subject: SUSE-SU-2024:1988-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <171810901113.28588.8185647451075953@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:1988-1 Rating: important References: * bsc#1224119 Cross-References: * CVE-2024-3727 CVSS scores: * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: Rebuild against current updated packages and go compiler. * Bump github.com/containers/image/v5 (bsc#1224119, CVE-2024-3727) * Add LABEL with source URL ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1988=1 SUSE-2024-1988=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1988=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1988=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.15.1 * containerized-data-importer-cloner-1.58.0-150500.6.15.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.15.1 * containerized-data-importer-api-debuginfo-1.58.0-150500.6.15.1 * containerized-data-importer-controller-1.58.0-150500.6.15.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.15.1 * containerized-data-importer-api-1.58.0-150500.6.15.1 * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.15.1 * containerized-data-importer-manifests-1.58.0-150500.6.15.1 * obs-service-cdi_containers_meta-1.58.0-150500.6.15.1 * containerized-data-importer-operator-1.58.0-150500.6.15.1 * containerized-data-importer-importer-1.58.0-150500.6.15.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.15.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.15.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.15.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.15.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.15.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.15.1 ## References: * https://www.suse.com/security/cve/CVE-2024-3727.html * https://bugzilla.suse.com/show_bug.cgi?id=1224119 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:30:13 -0000 Subject: SUSE-SU-2024:1987-1: important: Security update for skopeo Message-ID: <171810901320.28588.4275560967356034201@smelt2.prg2.suse.org> # Security update for skopeo Announcement ID: SUSE-SU-2024:1987-1 Rating: important References: * bsc#1224123 Cross-References: * CVE-2024-28180 * CVE-2024-3727 CVSS scores: * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for skopeo fixes the following issues: * Update to version 1.14.4: * CVE-2024-3727: Fixed a vulnerability that allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, resource exhaustion, local path traversal and other attacks. (bsc#1224123) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1987=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1987=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1987=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1987=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1987=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1987=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1987=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1987=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1987=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1987=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1987=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1987=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1987=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1987=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1987=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1987=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1987=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1987=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * Basesystem Module 15-SP6 (noarch) * skopeo-bash-completion-1.14.4-150300.11.11.1 * skopeo-zsh-completion-1.14.4-150300.11.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * SUSE Manager Proxy 4.3 (x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * openSUSE Leap 15.3 (noarch) * skopeo-bash-completion-1.14.4-150300.11.11.1 * skopeo-fish-completion-1.14.4-150300.11.11.1 * skopeo-zsh-completion-1.14.4-150300.11.11.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.14.4-150300.11.11.1 * skopeo-1.14.4-150300.11.11.1 * openSUSE Leap 15.6 (noarch) * skopeo-bash-completion-1.14.4-150300.11.11.1 * skopeo-fish-completion-1.14.4-150300.11.11.1 * skopeo-zsh-completion-1.14.4-150300.11.11.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28180.html * https://www.suse.com/security/cve/CVE-2024-3727.html * https://bugzilla.suse.com/show_bug.cgi?id=1224123 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:30:15 -0000 Subject: SUSE-SU-2024:1986-1: moderate: Security update for rmt-server Message-ID: <171810901561.28588.6442254896941895327@smelt2.prg2.suse.org> # Security update for rmt-server Announcement ID: SUSE-SU-2024:1986-1 Rating: moderate References: * bsc#1203171 * bsc#1225997 * jsc#PED-7982 * jsc#PED-8018 Cross-References: * CVE-2024-28103 CVSS scores: * CVE-2024-28103 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability, contains two features and has one security fix can now be installed. ## Description: This update for rmt-server fixes the following issues: * Update to version 2.17 * CVE-2024-28103: Fixed Permissions-Policy that was only served on responses with an HTML related Content-Type. (bsc#1225997) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1986=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1986=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1986=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1986=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1986=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1986=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1986=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1986=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1986=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.17-150400.3.25.1 * rmt-server-pubcloud-2.17-150400.3.25.1 * rmt-server-debugsource-2.17-150400.3.25.1 * rmt-server-config-2.17-150400.3.25.1 * rmt-server-2.17-150400.3.25.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.17-150400.3.25.1 * rmt-server-pubcloud-2.17-150400.3.25.1 * rmt-server-debugsource-2.17-150400.3.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * rmt-server-2.17-150400.3.25.1 * rmt-server-debugsource-2.17-150400.3.25.1 * rmt-server-config-2.17-150400.3.25.1 * rmt-server-debuginfo-2.17-150400.3.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * rmt-server-2.17-150400.3.25.1 * rmt-server-debugsource-2.17-150400.3.25.1 * rmt-server-config-2.17-150400.3.25.1 * rmt-server-debuginfo-2.17-150400.3.25.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * rmt-server-2.17-150400.3.25.1 * rmt-server-debugsource-2.17-150400.3.25.1 * rmt-server-config-2.17-150400.3.25.1 * rmt-server-debuginfo-2.17-150400.3.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * rmt-server-2.17-150400.3.25.1 * rmt-server-debugsource-2.17-150400.3.25.1 * rmt-server-config-2.17-150400.3.25.1 * rmt-server-debuginfo-2.17-150400.3.25.1 * SUSE Manager Proxy 4.3 (x86_64) * rmt-server-2.17-150400.3.25.1 * rmt-server-debugsource-2.17-150400.3.25.1 * rmt-server-config-2.17-150400.3.25.1 * rmt-server-debuginfo-2.17-150400.3.25.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * rmt-server-2.17-150400.3.25.1 * rmt-server-debugsource-2.17-150400.3.25.1 * rmt-server-config-2.17-150400.3.25.1 * rmt-server-debuginfo-2.17-150400.3.25.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * rmt-server-2.17-150400.3.25.1 * rmt-server-debugsource-2.17-150400.3.25.1 * rmt-server-config-2.17-150400.3.25.1 * rmt-server-debuginfo-2.17-150400.3.25.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28103.html * https://bugzilla.suse.com/show_bug.cgi?id=1203171 * https://bugzilla.suse.com/show_bug.cgi?id=1225997 * https://jira.suse.com/browse/PED-7982 * https://jira.suse.com/browse/PED-8018 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:30:17 -0000 Subject: SUSE-SU-2024:1985-1: moderate: Security update for mariadb Message-ID: <171810901782.28588.1959337927268880126@smelt2.prg2.suse.org> # Security update for mariadb Announcement ID: SUSE-SU-2024:1985-1 Rating: moderate References: * bsc#1217405 * bsc#1225983 Cross-References: * CVE-2023-22084 * CVE-2024-21096 CVSS scores: * CVE-2023-22084 ( SUSE ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-22084 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-21096 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * Galera for Ericsson 15 SP4 * Galera for Ericsson 15 SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for mariadb fixes the following issues: * CVE-2024-21096: Fixed mysqldump unspecified vulnerability (bsc#1225983). * CVE-2023-22084: Fixed a vulnerability allows high privileged attacker with network access via multiple protocols to compromise the server (bsc#1217405). * Update to 10.6.18. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1985=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1985=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1985=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1985=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1985=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1985=1 * Galera for Ericsson 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-ERICSSON-2024-1985=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1985=1 * Galera for Ericsson 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-ERICSSON-2024-1985=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1985=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1985=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1985=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1985=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * mariadb-bench-debuginfo-10.6.18-150400.3.33.1 * mariadb-debugsource-10.6.18-150400.3.33.1 * mariadb-test-debuginfo-10.6.18-150400.3.33.1 * mariadb-rpm-macros-10.6.18-150400.3.33.1 * libmariadbd-devel-10.6.18-150400.3.33.1 * mariadb-tools-10.6.18-150400.3.33.1 * mariadb-tools-debuginfo-10.6.18-150400.3.33.1 * mariadb-client-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-10.6.18-150400.3.33.1 * mariadb-galera-10.6.18-150400.3.33.1 * mariadb-test-10.6.18-150400.3.33.1 * mariadb-client-10.6.18-150400.3.33.1 * mariadb-bench-10.6.18-150400.3.33.1 * mariadb-10.6.18-150400.3.33.1 * mariadb-debuginfo-10.6.18-150400.3.33.1 * openSUSE Leap 15.4 (noarch) * mariadb-errormessages-10.6.18-150400.3.33.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * mariadb-bench-debuginfo-10.6.18-150400.3.33.1 * mariadb-debugsource-10.6.18-150400.3.33.1 * mariadb-test-debuginfo-10.6.18-150400.3.33.1 * mariadb-rpm-macros-10.6.18-150400.3.33.1 * libmariadbd-devel-10.6.18-150400.3.33.1 * mariadb-tools-10.6.18-150400.3.33.1 * mariadb-tools-debuginfo-10.6.18-150400.3.33.1 * mariadb-client-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-10.6.18-150400.3.33.1 * mariadb-galera-10.6.18-150400.3.33.1 * mariadb-test-10.6.18-150400.3.33.1 * mariadb-client-10.6.18-150400.3.33.1 * mariadb-bench-10.6.18-150400.3.33.1 * mariadb-10.6.18-150400.3.33.1 * mariadb-debuginfo-10.6.18-150400.3.33.1 * openSUSE Leap 15.5 (noarch) * mariadb-errormessages-10.6.18-150400.3.33.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * mariadb-galera-10.6.18-150400.3.33.1 * mariadb-debuginfo-10.6.18-150400.3.33.1 * mariadb-debugsource-10.6.18-150400.3.33.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * mariadb-debugsource-10.6.18-150400.3.33.1 * libmariadbd-devel-10.6.18-150400.3.33.1 * mariadb-tools-10.6.18-150400.3.33.1 * mariadb-tools-debuginfo-10.6.18-150400.3.33.1 * mariadb-client-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-10.6.18-150400.3.33.1 * mariadb-client-10.6.18-150400.3.33.1 * mariadb-10.6.18-150400.3.33.1 * mariadb-debuginfo-10.6.18-150400.3.33.1 * Server Applications Module 15-SP5 (noarch) * mariadb-errormessages-10.6.18-150400.3.33.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * mariadb-debugsource-10.6.18-150400.3.33.1 * libmariadbd-devel-10.6.18-150400.3.33.1 * mariadb-tools-10.6.18-150400.3.33.1 * mariadb-tools-debuginfo-10.6.18-150400.3.33.1 * mariadb-client-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-10.6.18-150400.3.33.1 * mariadb-client-10.6.18-150400.3.33.1 * mariadb-10.6.18-150400.3.33.1 * mariadb-debuginfo-10.6.18-150400.3.33.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * mariadb-errormessages-10.6.18-150400.3.33.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * mariadb-debugsource-10.6.18-150400.3.33.1 * libmariadbd-devel-10.6.18-150400.3.33.1 * mariadb-tools-10.6.18-150400.3.33.1 * mariadb-tools-debuginfo-10.6.18-150400.3.33.1 * mariadb-client-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-10.6.18-150400.3.33.1 * mariadb-client-10.6.18-150400.3.33.1 * mariadb-10.6.18-150400.3.33.1 * mariadb-debuginfo-10.6.18-150400.3.33.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * mariadb-errormessages-10.6.18-150400.3.33.1 * Galera for Ericsson 15 SP4 (x86_64) * mariadb-galera-10.6.18-150400.3.33.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * mariadb-debugsource-10.6.18-150400.3.33.1 * libmariadbd-devel-10.6.18-150400.3.33.1 * mariadb-tools-10.6.18-150400.3.33.1 * mariadb-tools-debuginfo-10.6.18-150400.3.33.1 * mariadb-client-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-10.6.18-150400.3.33.1 * mariadb-client-10.6.18-150400.3.33.1 * mariadb-10.6.18-150400.3.33.1 * mariadb-debuginfo-10.6.18-150400.3.33.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * mariadb-errormessages-10.6.18-150400.3.33.1 * Galera for Ericsson 15 SP5 (x86_64) * mariadb-galera-10.6.18-150400.3.33.1 * mariadb-debuginfo-10.6.18-150400.3.33.1 * mariadb-debugsource-10.6.18-150400.3.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * mariadb-debugsource-10.6.18-150400.3.33.1 * libmariadbd-devel-10.6.18-150400.3.33.1 * mariadb-tools-10.6.18-150400.3.33.1 * mariadb-tools-debuginfo-10.6.18-150400.3.33.1 * mariadb-client-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-10.6.18-150400.3.33.1 * mariadb-client-10.6.18-150400.3.33.1 * mariadb-10.6.18-150400.3.33.1 * mariadb-debuginfo-10.6.18-150400.3.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * mariadb-errormessages-10.6.18-150400.3.33.1 * SUSE Manager Proxy 4.3 (x86_64) * mariadb-debugsource-10.6.18-150400.3.33.1 * libmariadbd-devel-10.6.18-150400.3.33.1 * mariadb-tools-10.6.18-150400.3.33.1 * mariadb-tools-debuginfo-10.6.18-150400.3.33.1 * mariadb-client-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-10.6.18-150400.3.33.1 * mariadb-client-10.6.18-150400.3.33.1 * mariadb-10.6.18-150400.3.33.1 * mariadb-debuginfo-10.6.18-150400.3.33.1 * SUSE Manager Proxy 4.3 (noarch) * mariadb-errormessages-10.6.18-150400.3.33.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * mariadb-debugsource-10.6.18-150400.3.33.1 * libmariadbd-devel-10.6.18-150400.3.33.1 * mariadb-tools-10.6.18-150400.3.33.1 * mariadb-tools-debuginfo-10.6.18-150400.3.33.1 * mariadb-client-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-10.6.18-150400.3.33.1 * mariadb-client-10.6.18-150400.3.33.1 * mariadb-10.6.18-150400.3.33.1 * mariadb-debuginfo-10.6.18-150400.3.33.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * mariadb-errormessages-10.6.18-150400.3.33.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * mariadb-debugsource-10.6.18-150400.3.33.1 * libmariadbd-devel-10.6.18-150400.3.33.1 * mariadb-tools-10.6.18-150400.3.33.1 * mariadb-tools-debuginfo-10.6.18-150400.3.33.1 * mariadb-client-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-debuginfo-10.6.18-150400.3.33.1 * libmariadbd19-10.6.18-150400.3.33.1 * mariadb-client-10.6.18-150400.3.33.1 * mariadb-10.6.18-150400.3.33.1 * mariadb-debuginfo-10.6.18-150400.3.33.1 * SUSE Manager Server 4.3 (noarch) * mariadb-errormessages-10.6.18-150400.3.33.1 ## References: * https://www.suse.com/security/cve/CVE-2023-22084.html * https://www.suse.com/security/cve/CVE-2024-21096.html * https://bugzilla.suse.com/show_bug.cgi?id=1217405 * https://bugzilla.suse.com/show_bug.cgi?id=1225983 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:30:21 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:30:21 -0000 Subject: SUSE-SU-2024:1984-1: moderate: Security update for aws-nitro-enclaves-cli Message-ID: <171810902124.28588.4801881923847530147@smelt2.prg2.suse.org> # Security update for aws-nitro-enclaves-cli Announcement ID: SUSE-SU-2024:1984-1 Rating: moderate References: * bsc#1218501 Cross-References: * CVE-2023-50711 CVSS scores: * CVE-2023-50711 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L * CVE-2023-50711 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for aws-nitro-enclaves-cli fixes the following issues: * CVE-2023-50711: Fixed out of bounds memory accesses in embedded vmm-sys-util (bsc#1218501). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1984=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1984=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1984=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1984=1 ## Package List: * openSUSE Leap 15.4 (aarch64 x86_64) * aws-nitro-enclaves-cli-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-cli-debugsource-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-cli-debuginfo-1.3.0~git1.db34c02-150400.3.6.1 * system-group-ne-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-binaryblobs-upstream-1.3.0~git1.db34c02-150400.3.6.1 * openSUSE Leap 15.5 (aarch64 x86_64) * aws-nitro-enclaves-cli-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-cli-debugsource-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-cli-debuginfo-1.3.0~git1.db34c02-150400.3.6.1 * system-group-ne-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-binaryblobs-upstream-1.3.0~git1.db34c02-150400.3.6.1 * Public Cloud Module 15-SP4 (aarch64 x86_64) * aws-nitro-enclaves-cli-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-cli-debugsource-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-cli-debuginfo-1.3.0~git1.db34c02-150400.3.6.1 * system-group-ne-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-binaryblobs-upstream-1.3.0~git1.db34c02-150400.3.6.1 * Public Cloud Module 15-SP5 (aarch64 x86_64) * aws-nitro-enclaves-cli-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-cli-debugsource-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-cli-debuginfo-1.3.0~git1.db34c02-150400.3.6.1 * system-group-ne-1.3.0~git1.db34c02-150400.3.6.1 * aws-nitro-enclaves-binaryblobs-upstream-1.3.0~git1.db34c02-150400.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50711.html * https://bugzilla.suse.com/show_bug.cgi?id=1218501 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:30:22 -0000 Subject: SUSE-RU-2024:1809-2: moderate: Recommended update for libbpf Message-ID: <171810902294.28588.10253672231159723651@smelt2.prg2.suse.org> # Recommended update for libbpf Announcement ID: SUSE-RU-2024:1809-2 Rating: moderate References: * bsc#1221101 Affected Products: * Development Tools Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for libbpf fixes the following issues: * Fixed potential null pointer dereference in bpf_object__collect_prog_relos() (bsc#1221101) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1809=1 ## Package List: * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libbpf-devel-1.1.0-150500.3.3.1 * libbpf-debugsource-1.1.0-150500.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221101 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:30:24 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:30:24 -0000 Subject: SUSE-RU-2024:1284-2: moderate: Recommended update for yast2-packager Message-ID: <171810902457.28588.1273796561434906789@smelt2.prg2.suse.org> # Recommended update for yast2-packager Announcement ID: SUSE-RU-2024:1284-2 Rating: moderate References: * bsc#1201816 * bsc#1220567 Affected Products: * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for yast2-packager, yast2-registration fixes the following issues: * Reimplemented hardcoded product mapping to support the migration from SLE_HPC to SLES SP6+ (bsc#1220567) * Do not fail when the installation URL contains a space (bsc#1201816) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1284=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1284=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1284=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1284=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1284=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1284=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1284=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * yast2-packager-4.4.35-150400.3.11.1 * SUSE Linux Enterprise High Performance Computing 15 SP4 (noarch) * yast2-registration-4.4.24-150400.3.9.2 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * yast2-packager-4.4.35-150400.3.11.1 * SUSE Linux Enterprise Server 15 SP4 (noarch) * yast2-registration-4.4.24-150400.3.9.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * yast2-packager-4.4.35-150400.3.11.1 * SUSE Manager Server 4.3 (noarch) * yast2-registration-4.4.24-150400.3.9.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * yast2-packager-4.4.35-150400.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * yast2-registration-4.4.24-150400.3.9.2 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * yast2-packager-4.4.35-150400.3.11.1 * SUSE Linux Enterprise Desktop 15 SP4 (noarch) * yast2-registration-4.4.24-150400.3.9.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * yast2-packager-4.4.35-150400.3.11.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * yast2-registration-4.4.24-150400.3.9.2 * SUSE Manager Proxy 4.3 (x86_64) * yast2-packager-4.4.35-150400.3.11.1 * SUSE Manager Proxy 4.3 (noarch) * yast2-registration-4.4.24-150400.3.9.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1201816 * https://bugzilla.suse.com/show_bug.cgi?id=1220567 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:30:57 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:30:57 -0000 Subject: SUSE-SU-2024:1983-1: important: Security update for the Linux Kernel Message-ID: <171810905716.28588.2612356748072282731@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:1983-1 Rating: important References: * bsc#1065729 * bsc#1101816 * bsc#1141539 * bsc#1181674 * bsc#1185902 * bsc#1187716 * bsc#1188616 * bsc#1190317 * bsc#1190795 * bsc#1191452 * bsc#1194591 * bsc#1197760 * bsc#1197894 * bsc#1203935 * bsc#1206213 * bsc#1206646 * bsc#1207186 * bsc#1209657 * bsc#1210335 * bsc#1215702 * bsc#1216702 * bsc#1217169 * bsc#1217519 * bsc#1218917 * bsc#1220487 * bsc#1220513 * bsc#1220854 * bsc#1220928 * bsc#1221044 * bsc#1221081 * bsc#1221086 * bsc#1221543 * bsc#1221545 * bsc#1221816 * bsc#1221977 * bsc#1221994 * bsc#1222559 * bsc#1222619 * bsc#1222627 * bsc#1222667 * bsc#1222671 * bsc#1222793 * bsc#1222893 * bsc#1222894 * bsc#1223023 * bsc#1223046 * bsc#1223048 * bsc#1223084 * bsc#1223119 * bsc#1223138 * bsc#1223207 * bsc#1223360 * bsc#1223384 * bsc#1223432 * bsc#1223509 * bsc#1223512 * bsc#1223539 * bsc#1223540 * bsc#1223626 * bsc#1223627 * bsc#1223633 * bsc#1223653 * bsc#1223666 * bsc#1223671 * bsc#1223712 * bsc#1223715 * bsc#1223738 * bsc#1223744 * bsc#1223752 * bsc#1223802 * bsc#1223819 * bsc#1223834 * bsc#1223922 * bsc#1223923 * bsc#1223931 * bsc#1223932 * bsc#1223948 * bsc#1223969 * bsc#1224096 * bsc#1224174 * bsc#1224181 * bsc#1224347 * bsc#1224482 * bsc#1224511 * bsc#1224525 * bsc#1224566 * bsc#1224580 * bsc#1224592 * bsc#1224601 * bsc#1224607 * bsc#1224621 * bsc#1224644 * bsc#1224645 * bsc#1224648 * bsc#1224650 * bsc#1224663 * bsc#1224671 * bsc#1224676 * bsc#1224680 * bsc#1224682 * bsc#1224725 * bsc#1224728 * bsc#1224733 * bsc#1224738 * bsc#1224747 * bsc#1224749 * bsc#1224759 * bsc#1224803 * bsc#1224827 * bsc#1224830 * bsc#1224831 * bsc#1224834 * bsc#1224838 * bsc#1224841 * bsc#1224844 * bsc#1224846 * bsc#1224847 * bsc#1224849 * bsc#1224854 * bsc#1224859 * bsc#1224867 * bsc#1224880 * bsc#1224882 * bsc#1224888 * bsc#1224889 * bsc#1224892 * bsc#1224893 * bsc#1224899 * bsc#1224904 * bsc#1224907 * bsc#1224916 * bsc#1224917 * bsc#1224922 * bsc#1224926 * bsc#1224930 * bsc#1224931 * bsc#1224942 * bsc#1224954 * bsc#1224956 * bsc#1224957 * bsc#1224959 * bsc#1224960 * bsc#1224961 * bsc#1224963 * bsc#1224966 * bsc#1224968 * bsc#1224981 * bsc#1224982 * bsc#1224983 * bsc#1224987 * bsc#1224990 * bsc#1224996 * bsc#1225008 * bsc#1225009 * bsc#1225010 * bsc#1225022 * bsc#1225026 * bsc#1225030 * bsc#1225054 * bsc#1225058 * bsc#1225059 * bsc#1225060 * bsc#1225062 * bsc#1225082 * bsc#1225084 * bsc#1225086 * bsc#1225092 * bsc#1225096 * bsc#1225112 * bsc#1225124 * bsc#1225128 * bsc#1225132 * bsc#1225141 * bsc#1225143 * bsc#1225144 * bsc#1225151 * bsc#1225153 * bsc#1225155 * bsc#1225157 * bsc#1225164 * bsc#1225177 * bsc#1225189 * bsc#1225192 * bsc#1225193 * bsc#1225198 * bsc#1225201 * bsc#1225207 * bsc#1225208 * bsc#1225222 * bsc#1225230 * bsc#1225242 * bsc#1225244 * bsc#1225247 * bsc#1225251 * bsc#1225252 * bsc#1225256 * bsc#1225303 * bsc#1225318 * bsc#1225322 * bsc#1225329 * bsc#1225330 * bsc#1225336 * bsc#1225347 * bsc#1225351 * bsc#1225354 * bsc#1225355 * bsc#1225360 * bsc#1225366 * bsc#1225367 * bsc#1225384 * bsc#1225390 * bsc#1225404 * bsc#1225409 * bsc#1225411 * bsc#1225438 * bsc#1225453 * bsc#1225479 * bsc#1225482 * bsc#1225506 * bsc#1225549 * bsc#1225560 * bsc#1225572 * bsc#1225640 * bsc#1225708 * bsc#1225764 Cross-References: * CVE-2021-46933 * CVE-2021-46955 * CVE-2021-47074 * CVE-2021-47113 * CVE-2021-47131 * CVE-2021-47162 * CVE-2021-47171 * CVE-2021-47188 * CVE-2021-47206 * CVE-2021-47220 * CVE-2021-47229 * CVE-2021-47231 * CVE-2021-47235 * CVE-2021-47236 * CVE-2021-47237 * CVE-2021-47238 * CVE-2021-47239 * CVE-2021-47245 * CVE-2021-47246 * CVE-2021-47248 * CVE-2021-47249 * CVE-2021-47250 * CVE-2021-47252 * CVE-2021-47254 * CVE-2021-47258 * CVE-2021-47260 * CVE-2021-47261 * CVE-2021-47265 * CVE-2021-47269 * CVE-2021-47274 * CVE-2021-47276 * CVE-2021-47277 * CVE-2021-47280 * CVE-2021-47281 * CVE-2021-47284 * CVE-2021-47285 * CVE-2021-47288 * CVE-2021-47301 * CVE-2021-47302 * CVE-2021-47305 * CVE-2021-47307 * CVE-2021-47308 * CVE-2021-47310 * CVE-2021-47311 * CVE-2021-47314 * CVE-2021-47315 * CVE-2021-47319 * CVE-2021-47320 * CVE-2021-47321 * CVE-2021-47323 * CVE-2021-47324 * CVE-2021-47330 * CVE-2021-47334 * CVE-2021-47337 * CVE-2021-47343 * CVE-2021-47344 * CVE-2021-47345 * CVE-2021-47347 * CVE-2021-47352 * CVE-2021-47353 * CVE-2021-47355 * CVE-2021-47356 * CVE-2021-47357 * CVE-2021-47361 * CVE-2021-47362 * CVE-2021-47369 * CVE-2021-47375 * CVE-2021-47378 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47391 * CVE-2021-47397 * CVE-2021-47400 * CVE-2021-47401 * CVE-2021-47404 * CVE-2021-47409 * CVE-2021-47416 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47431 * CVE-2021-47435 * CVE-2021-47436 * CVE-2021-47456 * CVE-2021-47458 * CVE-2021-47460 * CVE-2021-47469 * CVE-2021-47472 * CVE-2021-47473 * CVE-2021-47478 * CVE-2021-47480 * CVE-2021-47483 * CVE-2021-47485 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47500 * CVE-2021-47506 * CVE-2021-47509 * CVE-2021-47511 * CVE-2021-47523 * CVE-2021-47541 * CVE-2021-47548 * CVE-2021-47565 * CVE-2022-48636 * CVE-2022-48650 * CVE-2022-48672 * CVE-2022-48686 * CVE-2022-48697 * CVE-2022-48702 * CVE-2022-48704 * CVE-2022-48708 * CVE-2022-48710 * CVE-2023-0160 * CVE-2023-1829 * CVE-2023-42755 * CVE-2023-47233 * CVE-2023-52527 * CVE-2023-52586 * CVE-2023-52591 * CVE-2023-52646 * CVE-2023-52653 * CVE-2023-52655 * CVE-2023-52664 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52691 * CVE-2023-52696 * CVE-2023-52698 * CVE-2023-52703 * CVE-2023-52730 * CVE-2023-52732 * CVE-2023-52741 * CVE-2023-52742 * CVE-2023-52747 * CVE-2023-52759 * CVE-2023-52774 * CVE-2023-52781 * CVE-2023-52796 * CVE-2023-52803 * CVE-2023-52821 * CVE-2023-52864 * CVE-2023-52865 * CVE-2023-52867 * CVE-2023-52875 * CVE-2023-52880 * CVE-2024-0639 * CVE-2024-26625 * CVE-2024-26739 * CVE-2024-26752 * CVE-2024-26775 * CVE-2024-26791 * CVE-2024-26828 * CVE-2024-26846 * CVE-2024-26874 * CVE-2024-26876 * CVE-2024-26900 * CVE-2024-26915 * CVE-2024-26920 * CVE-2024-26921 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-26931 * CVE-2024-26934 * CVE-2024-26957 * CVE-2024-26958 * CVE-2024-26984 * CVE-2024-26996 * CVE-2024-27008 * CVE-2024-27054 * CVE-2024-27059 * CVE-2024-27062 * CVE-2024-27388 * CVE-2024-27396 * CVE-2024-27398 * CVE-2024-27401 * CVE-2024-27419 * CVE-2024-27436 * CVE-2024-35789 * CVE-2024-35791 * CVE-2024-35809 * CVE-2024-35811 * CVE-2024-35830 * CVE-2024-35849 * CVE-2024-35877 * CVE-2024-35878 * CVE-2024-35887 * CVE-2024-35895 * CVE-2024-35914 * CVE-2024-35932 * CVE-2024-35935 * CVE-2024-35936 * CVE-2024-35944 * CVE-2024-35955 * CVE-2024-35969 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-36015 * CVE-2024-36029 * CVE-2024-36954 CVSS scores: * CVE-2021-46933 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-46933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47074 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47131 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47237 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47248 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47249 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47250 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47311 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47319 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47337 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47343 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47345 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47352 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47355 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47357 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47548 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-48672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48686 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42755 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-42755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52586 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Real Time 12 SP5 * SUSE Linux Enterprise Server 12 SP5 An update that solves 199 vulnerabilities and has 26 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948). * CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854). * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201). * CVE-2022-48697: Fix a use-after-free (bsc#1223922). * CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023). * CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354) * CVE-2023-42755: Check user supplied offsets (bsc#1215702). * CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747). * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930). * CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831). * CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222). * CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644) * CVE-2021-47548: Fixed a possible array out-of-bounds (bsc#1225506) * CVE-2024-36029: Pervent access to suspended controller (bsc#1225708) * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086) * CVE-2021-47352: Add validation for used length (bsc#1225124). * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621) * CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390). * CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645) * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). * CVE-2021-47423: Fix file release memory leak (bsc#1225366). * CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230). * CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355). * CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650). * CVE-2021-47500: Fixed trigger reference couting (bsc#1225360). * CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738). * CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208). * CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411). * CVE-2021-47509: Limit the period size to 16MB (bsc#1225409). * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525). * CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566) * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580). * CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960). * CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725). * CVE-2021-47401: Fix stack information leak (bsc#1225242). * CVE-2023-52867: Fix possible buffer overflow (bsc#1225009). * CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022). * CVE-2021-47265: Verify port when creating flow rule (bsc#1224957) * CVE-2021-47362: Update intermediate power state for SI (bsc#1225153). * CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151). * CVE-2023-52864: Fix opening of char device (bsc#1225132). * CVE-2022-48708: Fix potential NULL dereference (bsc#1224942). * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648). * CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847) * CVE-2023-52730: Fix possible resource leaks in some error paths (bsc#1224956). * CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup() (bsc#1225141). * CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838) * CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671). * CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931) * CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880) * CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082) * CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827) * CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733). * CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803). * CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983). * CVE-2024-35789: Clear fast rx for non-4addr sta VLAN changes (bsc#1224749). * CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680). * CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112). * CVE-2021-47357: Fix possible use-after-free in ia_module_exit() (bsc#1225144). * CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096). * CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086). * CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer (bzg#1224663) * CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907). * CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666). * CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081). * CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834). * CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633) * CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487). * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096). * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169). * CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046). * CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181). * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627). * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653). * CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932) * CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894). * CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207) * CVE-2024-26996: Fix UAF ncm object at re-bind after usb ep transport error (bsc#1223752). * CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (bsc#1223048) * CVE-2022-48702: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923). * CVE-2022-48672: Fix off-by-one error in unflatten_dt_nodes() (bsc#1223931). * CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543). * CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793) * CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513). * CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917). * CVE-2024-27008: Fix out of bounds access (bsc#1223802). * CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). The following non-security bugs were fixed: * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes). * assoc_array: Fix BUG_ON during garbage collect. * autofs: fix a leak in autofs_expire_indirect() (git-fixes) * Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes). * btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes) * btrfs: check if root is readonly while setting security xattr (git-fixes) * btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes) * btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes) * btrfs: do not stop integrity writeback too early (git-fixes) * btrfs: Explicitly handle btrfs_update_root failure (git-fixes) * btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes) * btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes) * btrfs: fix deadlock when writing out space cache (git-fixes) * Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes) * btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes) * btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes) * btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes) * btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes) * btrfs: fix race when deleting quota root from the dirty cow roots list (git- fixes) * btrfs: fix range_end calculation in extent_write_locked_range (git-fixes) * btrfs: fix return value mixup in btrfs_get_extent (git-fixes) * btrfs: fix unaligned access in readdir (git-fixes) * btrfs: limit device extents to the device size (git-fixes) * btrfs: prevent to set invalid default subvolid (git-fixes) * btrfs: record delayed inode root in transaction (git-fixes) * btrfs: scrub: reject unsupported scrub flags (git-fixes) * btrfs: send: ensure send_fd is writable (git-fixes) * btrfs: send: in case of IO error log it (git-fixes) * btrfs: send: limit number of clones and allocated memory size (git-fixes) * btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include * btrfs: tree-checker: add missing return after error in root_item (git-fixes) * btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes) * btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes) * btrfs: tree-checker: fix inline ref size in error messages (git-fixes) * btrfs: tree-checker: Fix misleading group system information (git-fixes) * btrfs: undo writable superblocke when sprouting fails (git-fixes) * btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes) * ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes) * ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes) * ecryptfs: fix kernel panic with null dev_name (git-fixes) * ecryptfs: Fix typo in message (git-fixes) * ep_create_wakeup_source(): dentry name can change under you (git-fixes) * exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes) * fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes) * fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes) * ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git- fixes). * ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git- fixes). * kprobes: Fix possible use-after-free issue on kprobe registration (git- fixes). * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059). * l2tp: pass correct message length to ip6_append_data (git-fixes). * lib/mpi: use kcalloc in mpi_resize (git-fixes). * list: fix a data-race around ep->rdllist (git-fixes). * net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes). * net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes). * net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes). * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes). * net: usb: sr9700: stop lying about skb->truesize (git-fixes). * net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360). * net/smc: fix fallback failed while sendmsg with fastopen (git-fixes). * net/tls: Remove the context from the list in tls_device_down (bsc#1221545). * netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes). * netfilter: nft_compat: explicitly reject ERROR and standard target (git- fixes). * netfilter: x_tables: set module owner for icmp(6) matches (git-fixes). * nfc: change order inside nfc_se_io error path (git-fixes). * powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes). * ppdev: Add an error check in register_device (git-fixes). * printk: Disable passing console lock owner completely during panic() (bsc#1197894). * printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969). * rds: avoid unenecessary cong_update in loop transport (git-fixes). * rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes). * ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes). * ring-buffer: Fix a race between readers and resize checks (bsc#1222893). * rxrpc: Do not put crypto buffers on the stack (git-fixes). * rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes). * rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls (git-fixes). * rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git- fixes). * rxrpc: Work around usercopy check (git-fixes). * s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347). * s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062). * tcp: tcp_make_synack() can be called from process context (git-fixes). * tls: Fix context leak on tls_device_down (bsc#1221545). * tracing: Fix blocked reader of snapshot buffer (git-fixes). * tracing: hide unused ftrace_event_id_fops (git-fixes). * tracing: Use .flush() call to wake up readers (git-fixes). * tracing: Use strncpy instead of memcpy when copying comm in trace.c (git- fixes). * tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540). * usb: aqc111: stop lying about skb->truesize (git-fixes). * wifi: cfg80211: avoid leaking stack data into trace (git-fixes). * wifi: radiotap: fix kernel-doc notation warnings (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Real Time 12 SP5 zypper in -t patch SUSE-SLE-RT-12-SP5-2024-1983=1 ## Package List: * SUSE Linux Enterprise Real Time 12 SP5 (x86_64) * gfs2-kmp-rt-debuginfo-4.12.14-10.188.1 * kernel-rt-devel-4.12.14-10.188.1 * kernel-rt-debugsource-4.12.14-10.188.1 * kernel-rt_debug-debugsource-4.12.14-10.188.1 * cluster-md-kmp-rt-debuginfo-4.12.14-10.188.1 * dlm-kmp-rt-debuginfo-4.12.14-10.188.1 * cluster-md-kmp-rt-4.12.14-10.188.1 * kernel-rt_debug-devel-debuginfo-4.12.14-10.188.1 * kernel-syms-rt-4.12.14-10.188.1 * ocfs2-kmp-rt-debuginfo-4.12.14-10.188.1 * gfs2-kmp-rt-4.12.14-10.188.1 * kernel-rt-debuginfo-4.12.14-10.188.1 * kernel-rt-devel-debuginfo-4.12.14-10.188.1 * kernel-rt-base-4.12.14-10.188.1 * kernel-rt-base-debuginfo-4.12.14-10.188.1 * ocfs2-kmp-rt-4.12.14-10.188.1 * dlm-kmp-rt-4.12.14-10.188.1 * kernel-rt_debug-debuginfo-4.12.14-10.188.1 * kernel-rt_debug-devel-4.12.14-10.188.1 * SUSE Linux Enterprise Real Time 12 SP5 (noarch) * kernel-devel-rt-4.12.14-10.188.1 * kernel-source-rt-4.12.14-10.188.1 * SUSE Linux Enterprise Real Time 12 SP5 (nosrc x86_64) * kernel-rt-4.12.14-10.188.1 * kernel-rt_debug-4.12.14-10.188.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46933.html * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47074.html * https://www.suse.com/security/cve/CVE-2021-47113.html * https://www.suse.com/security/cve/CVE-2021-47131.html * https://www.suse.com/security/cve/CVE-2021-47162.html * https://www.suse.com/security/cve/CVE-2021-47171.html * https://www.suse.com/security/cve/CVE-2021-47188.html * https://www.suse.com/security/cve/CVE-2021-47206.html * https://www.suse.com/security/cve/CVE-2021-47220.html * https://www.suse.com/security/cve/CVE-2021-47229.html * https://www.suse.com/security/cve/CVE-2021-47231.html * https://www.suse.com/security/cve/CVE-2021-47235.html * https://www.suse.com/security/cve/CVE-2021-47236.html * https://www.suse.com/security/cve/CVE-2021-47237.html * https://www.suse.com/security/cve/CVE-2021-47238.html * https://www.suse.com/security/cve/CVE-2021-47239.html * https://www.suse.com/security/cve/CVE-2021-47245.html * https://www.suse.com/security/cve/CVE-2021-47246.html * https://www.suse.com/security/cve/CVE-2021-47248.html * https://www.suse.com/security/cve/CVE-2021-47249.html * https://www.suse.com/security/cve/CVE-2021-47250.html * https://www.suse.com/security/cve/CVE-2021-47252.html * https://www.suse.com/security/cve/CVE-2021-47254.html * https://www.suse.com/security/cve/CVE-2021-47258.html * https://www.suse.com/security/cve/CVE-2021-47260.html * https://www.suse.com/security/cve/CVE-2021-47261.html * https://www.suse.com/security/cve/CVE-2021-47265.html * https://www.suse.com/security/cve/CVE-2021-47269.html * https://www.suse.com/security/cve/CVE-2021-47274.html * https://www.suse.com/security/cve/CVE-2021-47276.html * https://www.suse.com/security/cve/CVE-2021-47277.html * https://www.suse.com/security/cve/CVE-2021-47280.html * https://www.suse.com/security/cve/CVE-2021-47281.html * https://www.suse.com/security/cve/CVE-2021-47284.html * https://www.suse.com/security/cve/CVE-2021-47285.html * https://www.suse.com/security/cve/CVE-2021-47288.html * https://www.suse.com/security/cve/CVE-2021-47301.html * https://www.suse.com/security/cve/CVE-2021-47302.html * https://www.suse.com/security/cve/CVE-2021-47305.html * https://www.suse.com/security/cve/CVE-2021-47307.html * https://www.suse.com/security/cve/CVE-2021-47308.html * https://www.suse.com/security/cve/CVE-2021-47310.html * https://www.suse.com/security/cve/CVE-2021-47311.html * https://www.suse.com/security/cve/CVE-2021-47314.html * https://www.suse.com/security/cve/CVE-2021-47315.html * https://www.suse.com/security/cve/CVE-2021-47319.html * https://www.suse.com/security/cve/CVE-2021-47320.html * https://www.suse.com/security/cve/CVE-2021-47321.html * https://www.suse.com/security/cve/CVE-2021-47323.html * https://www.suse.com/security/cve/CVE-2021-47324.html * https://www.suse.com/security/cve/CVE-2021-47330.html * https://www.suse.com/security/cve/CVE-2021-47334.html * https://www.suse.com/security/cve/CVE-2021-47337.html * https://www.suse.com/security/cve/CVE-2021-47343.html * https://www.suse.com/security/cve/CVE-2021-47344.html * https://www.suse.com/security/cve/CVE-2021-47345.html * https://www.suse.com/security/cve/CVE-2021-47347.html * https://www.suse.com/security/cve/CVE-2021-47352.html * https://www.suse.com/security/cve/CVE-2021-47353.html * https://www.suse.com/security/cve/CVE-2021-47355.html * https://www.suse.com/security/cve/CVE-2021-47356.html * https://www.suse.com/security/cve/CVE-2021-47357.html * https://www.suse.com/security/cve/CVE-2021-47361.html * https://www.suse.com/security/cve/CVE-2021-47362.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47397.html * https://www.suse.com/security/cve/CVE-2021-47400.html * https://www.suse.com/security/cve/CVE-2021-47401.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47409.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47435.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47458.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47469.html * https://www.suse.com/security/cve/CVE-2021-47472.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47478.html * https://www.suse.com/security/cve/CVE-2021-47480.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47509.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47523.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47548.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2022-48636.html * https://www.suse.com/security/cve/CVE-2022-48650.html * https://www.suse.com/security/cve/CVE-2022-48672.html * https://www.suse.com/security/cve/CVE-2022-48686.html * https://www.suse.com/security/cve/CVE-2022-48697.html * https://www.suse.com/security/cve/CVE-2022-48702.html * https://www.suse.com/security/cve/CVE-2022-48704.html * https://www.suse.com/security/cve/CVE-2022-48708.html * https://www.suse.com/security/cve/CVE-2022-48710.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-42755.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52527.html * https://www.suse.com/security/cve/CVE-2023-52586.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52646.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52698.html * https://www.suse.com/security/cve/CVE-2023-52703.html * https://www.suse.com/security/cve/CVE-2023-52730.html * https://www.suse.com/security/cve/CVE-2023-52732.html * https://www.suse.com/security/cve/CVE-2023-52741.html * https://www.suse.com/security/cve/CVE-2023-52742.html * https://www.suse.com/security/cve/CVE-2023-52747.html * https://www.suse.com/security/cve/CVE-2023-52759.html * https://www.suse.com/security/cve/CVE-2023-52774.html * https://www.suse.com/security/cve/CVE-2023-52781.html * https://www.suse.com/security/cve/CVE-2023-52796.html * https://www.suse.com/security/cve/CVE-2023-52803.html * https://www.suse.com/security/cve/CVE-2023-52821.html * https://www.suse.com/security/cve/CVE-2023-52864.html * https://www.suse.com/security/cve/CVE-2023-52865.html * https://www.suse.com/security/cve/CVE-2023-52867.html * https://www.suse.com/security/cve/CVE-2023-52875.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2024-0639.html * https://www.suse.com/security/cve/CVE-2024-26625.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26752.html * https://www.suse.com/security/cve/CVE-2024-26775.html * https://www.suse.com/security/cve/CVE-2024-26791.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26874.html * https://www.suse.com/security/cve/CVE-2024-26876.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26915.html * https://www.suse.com/security/cve/CVE-2024-26920.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-26931.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26958.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27054.html * https://www.suse.com/security/cve/CVE-2024-27059.html * https://www.suse.com/security/cve/CVE-2024-27062.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27396.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27401.html * https://www.suse.com/security/cve/CVE-2024-27419.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35791.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35877.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35935.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35944.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35969.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-36015.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1101816 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1185902 * https://bugzilla.suse.com/show_bug.cgi?id=1187716 * https://bugzilla.suse.com/show_bug.cgi?id=1188616 * https://bugzilla.suse.com/show_bug.cgi?id=1190317 * https://bugzilla.suse.com/show_bug.cgi?id=1190795 * https://bugzilla.suse.com/show_bug.cgi?id=1191452 * https://bugzilla.suse.com/show_bug.cgi?id=1194591 * https://bugzilla.suse.com/show_bug.cgi?id=1197760 * https://bugzilla.suse.com/show_bug.cgi?id=1197894 * https://bugzilla.suse.com/show_bug.cgi?id=1203935 * https://bugzilla.suse.com/show_bug.cgi?id=1206213 * https://bugzilla.suse.com/show_bug.cgi?id=1206646 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1215702 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217519 * https://bugzilla.suse.com/show_bug.cgi?id=1218917 * https://bugzilla.suse.com/show_bug.cgi?id=1220487 * https://bugzilla.suse.com/show_bug.cgi?id=1220513 * https://bugzilla.suse.com/show_bug.cgi?id=1220854 * https://bugzilla.suse.com/show_bug.cgi?id=1220928 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221081 * https://bugzilla.suse.com/show_bug.cgi?id=1221086 * https://bugzilla.suse.com/show_bug.cgi?id=1221543 * https://bugzilla.suse.com/show_bug.cgi?id=1221545 * https://bugzilla.suse.com/show_bug.cgi?id=1221816 * https://bugzilla.suse.com/show_bug.cgi?id=1221977 * https://bugzilla.suse.com/show_bug.cgi?id=1221994 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222627 * https://bugzilla.suse.com/show_bug.cgi?id=1222667 * https://bugzilla.suse.com/show_bug.cgi?id=1222671 * https://bugzilla.suse.com/show_bug.cgi?id=1222793 * https://bugzilla.suse.com/show_bug.cgi?id=1222893 * https://bugzilla.suse.com/show_bug.cgi?id=1222894 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223048 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223119 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223207 * https://bugzilla.suse.com/show_bug.cgi?id=1223360 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223432 * https://bugzilla.suse.com/show_bug.cgi?id=1223509 * https://bugzilla.suse.com/show_bug.cgi?id=1223512 * https://bugzilla.suse.com/show_bug.cgi?id=1223539 * https://bugzilla.suse.com/show_bug.cgi?id=1223540 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223627 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223653 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223738 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223819 * https://bugzilla.suse.com/show_bug.cgi?id=1223834 * https://bugzilla.suse.com/show_bug.cgi?id=1223922 * https://bugzilla.suse.com/show_bug.cgi?id=1223923 * https://bugzilla.suse.com/show_bug.cgi?id=1223931 * https://bugzilla.suse.com/show_bug.cgi?id=1223932 * https://bugzilla.suse.com/show_bug.cgi?id=1223948 * https://bugzilla.suse.com/show_bug.cgi?id=1223969 * https://bugzilla.suse.com/show_bug.cgi?id=1224096 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224181 * https://bugzilla.suse.com/show_bug.cgi?id=1224347 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224525 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224580 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224621 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224645 * https://bugzilla.suse.com/show_bug.cgi?id=1224648 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224725 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224759 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224827 * https://bugzilla.suse.com/show_bug.cgi?id=1224830 * https://bugzilla.suse.com/show_bug.cgi?id=1224831 * https://bugzilla.suse.com/show_bug.cgi?id=1224834 * https://bugzilla.suse.com/show_bug.cgi?id=1224838 * https://bugzilla.suse.com/show_bug.cgi?id=1224841 * https://bugzilla.suse.com/show_bug.cgi?id=1224844 * https://bugzilla.suse.com/show_bug.cgi?id=1224846 * https://bugzilla.suse.com/show_bug.cgi?id=1224847 * https://bugzilla.suse.com/show_bug.cgi?id=1224849 * https://bugzilla.suse.com/show_bug.cgi?id=1224854 * https://bugzilla.suse.com/show_bug.cgi?id=1224859 * https://bugzilla.suse.com/show_bug.cgi?id=1224867 * https://bugzilla.suse.com/show_bug.cgi?id=1224880 * https://bugzilla.suse.com/show_bug.cgi?id=1224882 * https://bugzilla.suse.com/show_bug.cgi?id=1224888 * https://bugzilla.suse.com/show_bug.cgi?id=1224889 * https://bugzilla.suse.com/show_bug.cgi?id=1224892 * https://bugzilla.suse.com/show_bug.cgi?id=1224893 * https://bugzilla.suse.com/show_bug.cgi?id=1224899 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224916 * https://bugzilla.suse.com/show_bug.cgi?id=1224917 * https://bugzilla.suse.com/show_bug.cgi?id=1224922 * https://bugzilla.suse.com/show_bug.cgi?id=1224926 * https://bugzilla.suse.com/show_bug.cgi?id=1224930 * https://bugzilla.suse.com/show_bug.cgi?id=1224931 * https://bugzilla.suse.com/show_bug.cgi?id=1224942 * https://bugzilla.suse.com/show_bug.cgi?id=1224954 * https://bugzilla.suse.com/show_bug.cgi?id=1224956 * https://bugzilla.suse.com/show_bug.cgi?id=1224957 * https://bugzilla.suse.com/show_bug.cgi?id=1224959 * https://bugzilla.suse.com/show_bug.cgi?id=1224960 * https://bugzilla.suse.com/show_bug.cgi?id=1224961 * https://bugzilla.suse.com/show_bug.cgi?id=1224963 * https://bugzilla.suse.com/show_bug.cgi?id=1224966 * https://bugzilla.suse.com/show_bug.cgi?id=1224968 * https://bugzilla.suse.com/show_bug.cgi?id=1224981 * https://bugzilla.suse.com/show_bug.cgi?id=1224982 * https://bugzilla.suse.com/show_bug.cgi?id=1224983 * https://bugzilla.suse.com/show_bug.cgi?id=1224987 * https://bugzilla.suse.com/show_bug.cgi?id=1224990 * https://bugzilla.suse.com/show_bug.cgi?id=1224996 * https://bugzilla.suse.com/show_bug.cgi?id=1225008 * https://bugzilla.suse.com/show_bug.cgi?id=1225009 * https://bugzilla.suse.com/show_bug.cgi?id=1225010 * https://bugzilla.suse.com/show_bug.cgi?id=1225022 * https://bugzilla.suse.com/show_bug.cgi?id=1225026 * https://bugzilla.suse.com/show_bug.cgi?id=1225030 * https://bugzilla.suse.com/show_bug.cgi?id=1225054 * https://bugzilla.suse.com/show_bug.cgi?id=1225058 * https://bugzilla.suse.com/show_bug.cgi?id=1225059 * https://bugzilla.suse.com/show_bug.cgi?id=1225060 * https://bugzilla.suse.com/show_bug.cgi?id=1225062 * https://bugzilla.suse.com/show_bug.cgi?id=1225082 * https://bugzilla.suse.com/show_bug.cgi?id=1225084 * https://bugzilla.suse.com/show_bug.cgi?id=1225086 * https://bugzilla.suse.com/show_bug.cgi?id=1225092 * https://bugzilla.suse.com/show_bug.cgi?id=1225096 * https://bugzilla.suse.com/show_bug.cgi?id=1225112 * https://bugzilla.suse.com/show_bug.cgi?id=1225124 * https://bugzilla.suse.com/show_bug.cgi?id=1225128 * https://bugzilla.suse.com/show_bug.cgi?id=1225132 * https://bugzilla.suse.com/show_bug.cgi?id=1225141 * https://bugzilla.suse.com/show_bug.cgi?id=1225143 * https://bugzilla.suse.com/show_bug.cgi?id=1225144 * https://bugzilla.suse.com/show_bug.cgi?id=1225151 * https://bugzilla.suse.com/show_bug.cgi?id=1225153 * https://bugzilla.suse.com/show_bug.cgi?id=1225155 * https://bugzilla.suse.com/show_bug.cgi?id=1225157 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225177 * https://bugzilla.suse.com/show_bug.cgi?id=1225189 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225198 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225222 * https://bugzilla.suse.com/show_bug.cgi?id=1225230 * https://bugzilla.suse.com/show_bug.cgi?id=1225242 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225247 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225252 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225322 * https://bugzilla.suse.com/show_bug.cgi?id=1225329 * https://bugzilla.suse.com/show_bug.cgi?id=1225330 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225347 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225409 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225438 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225479 * https://bugzilla.suse.com/show_bug.cgi?id=1225482 * https://bugzilla.suse.com/show_bug.cgi?id=1225506 * https://bugzilla.suse.com/show_bug.cgi?id=1225549 * https://bugzilla.suse.com/show_bug.cgi?id=1225560 * https://bugzilla.suse.com/show_bug.cgi?id=1225572 * https://bugzilla.suse.com/show_bug.cgi?id=1225640 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:31:01 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:31:01 -0000 Subject: SUSE-SU-2024:1982-1: important: Security update for bind Message-ID: <171810906179.28588.7539222963922409460@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2024:1982-1 Rating: important References: * bsc#1219823 * bsc#1219826 * bsc#1219851 * bsc#1219852 * bsc#1219854 Cross-References: * CVE-2023-4408 * CVE-2023-50387 * CVE-2023-50868 * CVE-2023-5517 * CVE-2023-6516 CVSS scores: * CVE-2023-4408 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-5517 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6516 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves five vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2023-4408: Fixed denial of service during DNS message parsing with different names (bsc#1219851) * CVE-2023-50387: Fixed denial of service during DNS messages validation with DNSSEC signatures (bsc#1219823) * CVE-2023-50868: Fixed denial of service during NSEC3 closest encloser proof preparation (bsc#1219826) * CVE-2023-5517: Fixed denial of service caused by specific queries with nxdomain-redirect enabled (bsc#1219852) * CVE-2023-6516: Fixed denial of service caused by specific queries that continuously triggered cache database maintenance (bsc#1219854) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1982=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1982=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1982=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1982=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1982=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1982=1 ## Package List: * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libns1604-debuginfo-9.16.6-150300.22.44.1 * bind-debugsource-9.16.6-150300.22.44.1 * libisccfg1600-debuginfo-9.16.6-150300.22.44.1 * bind-utils-9.16.6-150300.22.44.1 * libisc1606-debuginfo-9.16.6-150300.22.44.1 * libisc1606-9.16.6-150300.22.44.1 * libdns1605-9.16.6-150300.22.44.1 * libisccfg1600-9.16.6-150300.22.44.1 * libisccc1600-debuginfo-9.16.6-150300.22.44.1 * libbind9-1600-9.16.6-150300.22.44.1 * bind-utils-debuginfo-9.16.6-150300.22.44.1 * libirs1601-9.16.6-150300.22.44.1 * bind-9.16.6-150300.22.44.1 * bind-debuginfo-9.16.6-150300.22.44.1 * libdns1605-debuginfo-9.16.6-150300.22.44.1 * libirs1601-debuginfo-9.16.6-150300.22.44.1 * bind-chrootenv-9.16.6-150300.22.44.1 * libirs-devel-9.16.6-150300.22.44.1 * libns1604-9.16.6-150300.22.44.1 * bind-devel-9.16.6-150300.22.44.1 * libbind9-1600-debuginfo-9.16.6-150300.22.44.1 * libisccc1600-9.16.6-150300.22.44.1 * SUSE Enterprise Storage 7.1 (noarch) * bind-doc-9.16.6-150300.22.44.1 * python3-bind-9.16.6-150300.22.44.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libns1604-debuginfo-9.16.6-150300.22.44.1 * bind-debugsource-9.16.6-150300.22.44.1 * libisccfg1600-debuginfo-9.16.6-150300.22.44.1 * bind-utils-9.16.6-150300.22.44.1 * libisc1606-debuginfo-9.16.6-150300.22.44.1 * libisc1606-9.16.6-150300.22.44.1 * libdns1605-9.16.6-150300.22.44.1 * libisccfg1600-9.16.6-150300.22.44.1 * libisccc1600-debuginfo-9.16.6-150300.22.44.1 * libbind9-1600-9.16.6-150300.22.44.1 * bind-utils-debuginfo-9.16.6-150300.22.44.1 * libirs1601-9.16.6-150300.22.44.1 * bind-9.16.6-150300.22.44.1 * bind-debuginfo-9.16.6-150300.22.44.1 * libdns1605-debuginfo-9.16.6-150300.22.44.1 * libirs1601-debuginfo-9.16.6-150300.22.44.1 * bind-chrootenv-9.16.6-150300.22.44.1 * libirs-devel-9.16.6-150300.22.44.1 * libns1604-9.16.6-150300.22.44.1 * bind-devel-9.16.6-150300.22.44.1 * libbind9-1600-debuginfo-9.16.6-150300.22.44.1 * libisccc1600-9.16.6-150300.22.44.1 * openSUSE Leap 15.3 (noarch) * bind-doc-9.16.6-150300.22.44.1 * python3-bind-9.16.6-150300.22.44.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libisc1606-debuginfo-9.16.6-150300.22.44.1 * libisc1606-9.16.6-150300.22.44.1 * bind-debugsource-9.16.6-150300.22.44.1 * libirs1601-9.16.6-150300.22.44.1 * libisccfg1600-debuginfo-9.16.6-150300.22.44.1 * bind-debuginfo-9.16.6-150300.22.44.1 * libdns1605-debuginfo-9.16.6-150300.22.44.1 * libirs1601-debuginfo-9.16.6-150300.22.44.1 * libirs-devel-9.16.6-150300.22.44.1 * libdns1605-9.16.6-150300.22.44.1 * libisccfg1600-9.16.6-150300.22.44.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libns1604-debuginfo-9.16.6-150300.22.44.1 * bind-debugsource-9.16.6-150300.22.44.1 * libisccfg1600-debuginfo-9.16.6-150300.22.44.1 * bind-utils-9.16.6-150300.22.44.1 * libisc1606-debuginfo-9.16.6-150300.22.44.1 * libisc1606-9.16.6-150300.22.44.1 * libdns1605-9.16.6-150300.22.44.1 * libisccfg1600-9.16.6-150300.22.44.1 * libisccc1600-debuginfo-9.16.6-150300.22.44.1 * libbind9-1600-9.16.6-150300.22.44.1 * bind-utils-debuginfo-9.16.6-150300.22.44.1 * libirs1601-9.16.6-150300.22.44.1 * bind-9.16.6-150300.22.44.1 * bind-debuginfo-9.16.6-150300.22.44.1 * libdns1605-debuginfo-9.16.6-150300.22.44.1 * libirs1601-debuginfo-9.16.6-150300.22.44.1 * bind-chrootenv-9.16.6-150300.22.44.1 * libirs-devel-9.16.6-150300.22.44.1 * libns1604-9.16.6-150300.22.44.1 * bind-devel-9.16.6-150300.22.44.1 * libbind9-1600-debuginfo-9.16.6-150300.22.44.1 * libisccc1600-9.16.6-150300.22.44.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * bind-doc-9.16.6-150300.22.44.1 * python3-bind-9.16.6-150300.22.44.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libns1604-debuginfo-9.16.6-150300.22.44.1 * bind-debugsource-9.16.6-150300.22.44.1 * libisccfg1600-debuginfo-9.16.6-150300.22.44.1 * bind-utils-9.16.6-150300.22.44.1 * libisc1606-debuginfo-9.16.6-150300.22.44.1 * libisc1606-9.16.6-150300.22.44.1 * libdns1605-9.16.6-150300.22.44.1 * libisccfg1600-9.16.6-150300.22.44.1 * libisccc1600-debuginfo-9.16.6-150300.22.44.1 * libbind9-1600-9.16.6-150300.22.44.1 * bind-utils-debuginfo-9.16.6-150300.22.44.1 * libirs1601-9.16.6-150300.22.44.1 * bind-9.16.6-150300.22.44.1 * bind-debuginfo-9.16.6-150300.22.44.1 * libdns1605-debuginfo-9.16.6-150300.22.44.1 * libirs1601-debuginfo-9.16.6-150300.22.44.1 * bind-chrootenv-9.16.6-150300.22.44.1 * libirs-devel-9.16.6-150300.22.44.1 * libns1604-9.16.6-150300.22.44.1 * bind-devel-9.16.6-150300.22.44.1 * libbind9-1600-debuginfo-9.16.6-150300.22.44.1 * libisccc1600-9.16.6-150300.22.44.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * bind-doc-9.16.6-150300.22.44.1 * python3-bind-9.16.6-150300.22.44.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libns1604-debuginfo-9.16.6-150300.22.44.1 * bind-debugsource-9.16.6-150300.22.44.1 * libisccfg1600-debuginfo-9.16.6-150300.22.44.1 * bind-utils-9.16.6-150300.22.44.1 * libisc1606-debuginfo-9.16.6-150300.22.44.1 * libisc1606-9.16.6-150300.22.44.1 * libdns1605-9.16.6-150300.22.44.1 * libisccfg1600-9.16.6-150300.22.44.1 * libisccc1600-debuginfo-9.16.6-150300.22.44.1 * libbind9-1600-9.16.6-150300.22.44.1 * bind-utils-debuginfo-9.16.6-150300.22.44.1 * libirs1601-9.16.6-150300.22.44.1 * bind-9.16.6-150300.22.44.1 * bind-debuginfo-9.16.6-150300.22.44.1 * libdns1605-debuginfo-9.16.6-150300.22.44.1 * libirs1601-debuginfo-9.16.6-150300.22.44.1 * bind-chrootenv-9.16.6-150300.22.44.1 * libirs-devel-9.16.6-150300.22.44.1 * libns1604-9.16.6-150300.22.44.1 * bind-devel-9.16.6-150300.22.44.1 * libbind9-1600-debuginfo-9.16.6-150300.22.44.1 * libisccc1600-9.16.6-150300.22.44.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * bind-doc-9.16.6-150300.22.44.1 * python3-bind-9.16.6-150300.22.44.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4408.html * https://www.suse.com/security/cve/CVE-2023-50387.html * https://www.suse.com/security/cve/CVE-2023-50868.html * https://www.suse.com/security/cve/CVE-2023-5517.html * https://www.suse.com/security/cve/CVE-2023-6516.html * https://bugzilla.suse.com/show_bug.cgi?id=1219823 * https://bugzilla.suse.com/show_bug.cgi?id=1219826 * https://bugzilla.suse.com/show_bug.cgi?id=1219851 * https://bugzilla.suse.com/show_bug.cgi?id=1219852 * https://bugzilla.suse.com/show_bug.cgi?id=1219854 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:31:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:31:06 -0000 Subject: SUSE-SU-2024:1981-1: moderate: Security update for iperf Message-ID: <171810906697.28588.8691075765978839823@smelt2.prg2.suse.org> # Security update for iperf Announcement ID: SUSE-SU-2024:1981-1 Rating: moderate References: * bsc#1224262 Cross-References: * CVE-2024-26306 CVSS scores: * CVE-2024-26306 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for iperf fixes the following issues: * Update to version 3.17.1 * CVE-2024-26306: Fixed a vulnerability that could led to marvin attack if the authentication option is used. (bsc#1224262) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1981=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1981=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1981=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1981=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1981=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libiperf0-debuginfo-3.17.1-150000.3.9.1 * iperf-debuginfo-3.17.1-150000.3.9.1 * iperf-devel-3.17.1-150000.3.9.1 * libiperf0-3.17.1-150000.3.9.1 * iperf-3.17.1-150000.3.9.1 * iperf-debugsource-3.17.1-150000.3.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libiperf0-debuginfo-3.17.1-150000.3.9.1 * iperf-debuginfo-3.17.1-150000.3.9.1 * iperf-devel-3.17.1-150000.3.9.1 * libiperf0-3.17.1-150000.3.9.1 * iperf-3.17.1-150000.3.9.1 * iperf-debugsource-3.17.1-150000.3.9.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libiperf0-debuginfo-3.17.1-150000.3.9.1 * iperf-debuginfo-3.17.1-150000.3.9.1 * iperf-devel-3.17.1-150000.3.9.1 * libiperf0-3.17.1-150000.3.9.1 * iperf-3.17.1-150000.3.9.1 * iperf-debugsource-3.17.1-150000.3.9.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libiperf0-debuginfo-3.17.1-150000.3.9.1 * iperf-debuginfo-3.17.1-150000.3.9.1 * iperf-devel-3.17.1-150000.3.9.1 * libiperf0-3.17.1-150000.3.9.1 * iperf-3.17.1-150000.3.9.1 * iperf-debugsource-3.17.1-150000.3.9.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libiperf0-debuginfo-3.17.1-150000.3.9.1 * iperf-debuginfo-3.17.1-150000.3.9.1 * libiperf0-3.17.1-150000.3.9.1 * iperf-3.17.1-150000.3.9.1 * iperf-debugsource-3.17.1-150000.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26306.html * https://bugzilla.suse.com/show_bug.cgi?id=1224262 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 12:31:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 12:31:08 -0000 Subject: SUSE-SU-2024:1980-1: low: Security update for poppler Message-ID: <171810906884.28588.7262651298499592171@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2024:1980-1 Rating: low References: * bsc#1223375 Cross-References: * CVE-2024-4141 CVSS scores: * CVE-2024-4141 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2024-4141: Fixed out-of-bounds array write (bsc#1223375). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-1980=1 openSUSE-SLE-15.5-2024-1980=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1980=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1980=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libpoppler-glib8-debuginfo-23.01.0-150500.3.8.1 * poppler-qt6-debugsource-23.01.0-150500.3.8.1 * libpoppler-glib-devel-23.01.0-150500.3.8.1 * libpoppler-qt5-1-debuginfo-23.01.0-150500.3.8.1 * libpoppler126-debuginfo-23.01.0-150500.3.8.1 * libpoppler-cpp0-debuginfo-23.01.0-150500.3.8.1 * poppler-tools-debuginfo-23.01.0-150500.3.8.1 * poppler-qt5-debugsource-23.01.0-150500.3.8.1 * libpoppler-qt5-devel-23.01.0-150500.3.8.1 * libpoppler-qt6-3-23.01.0-150500.3.8.1 * poppler-tools-23.01.0-150500.3.8.1 * libpoppler-qt6-3-debuginfo-23.01.0-150500.3.8.1 * libpoppler-qt6-devel-23.01.0-150500.3.8.1 * libpoppler-devel-23.01.0-150500.3.8.1 * libpoppler-cpp0-23.01.0-150500.3.8.1 * libpoppler126-23.01.0-150500.3.8.1 * libpoppler-qt5-1-23.01.0-150500.3.8.1 * typelib-1_0-Poppler-0_18-23.01.0-150500.3.8.1 * poppler-debugsource-23.01.0-150500.3.8.1 * libpoppler-glib8-23.01.0-150500.3.8.1 * openSUSE Leap 15.5 (x86_64) * libpoppler-qt5-1-32bit-debuginfo-23.01.0-150500.3.8.1 * libpoppler126-32bit-23.01.0-150500.3.8.1 * libpoppler-cpp0-32bit-debuginfo-23.01.0-150500.3.8.1 * libpoppler-glib8-32bit-23.01.0-150500.3.8.1 * libpoppler-cpp0-32bit-23.01.0-150500.3.8.1 * libpoppler-qt5-1-32bit-23.01.0-150500.3.8.1 * libpoppler126-32bit-debuginfo-23.01.0-150500.3.8.1 * libpoppler-glib8-32bit-debuginfo-23.01.0-150500.3.8.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libpoppler126-64bit-23.01.0-150500.3.8.1 * libpoppler126-64bit-debuginfo-23.01.0-150500.3.8.1 * libpoppler-qt5-1-64bit-23.01.0-150500.3.8.1 * libpoppler-qt5-1-64bit-debuginfo-23.01.0-150500.3.8.1 * libpoppler-glib8-64bit-23.01.0-150500.3.8.1 * libpoppler-cpp0-64bit-debuginfo-23.01.0-150500.3.8.1 * libpoppler-glib8-64bit-debuginfo-23.01.0-150500.3.8.1 * libpoppler-cpp0-64bit-23.01.0-150500.3.8.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libpoppler-glib8-debuginfo-23.01.0-150500.3.8.1 * libpoppler-glib-devel-23.01.0-150500.3.8.1 * libpoppler126-debuginfo-23.01.0-150500.3.8.1 * libpoppler-cpp0-debuginfo-23.01.0-150500.3.8.1 * poppler-tools-debuginfo-23.01.0-150500.3.8.1 * poppler-tools-23.01.0-150500.3.8.1 * libpoppler-devel-23.01.0-150500.3.8.1 * libpoppler-cpp0-23.01.0-150500.3.8.1 * libpoppler126-23.01.0-150500.3.8.1 * typelib-1_0-Poppler-0_18-23.01.0-150500.3.8.1 * poppler-debugsource-23.01.0-150500.3.8.1 * libpoppler-glib8-23.01.0-150500.3.8.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libpoppler-qt5-1-debuginfo-23.01.0-150500.3.8.1 * libpoppler-cpp0-debuginfo-23.01.0-150500.3.8.1 * poppler-qt5-debugsource-23.01.0-150500.3.8.1 * libpoppler-qt5-devel-23.01.0-150500.3.8.1 * libpoppler-devel-23.01.0-150500.3.8.1 * libpoppler-cpp0-23.01.0-150500.3.8.1 * libpoppler-qt5-1-23.01.0-150500.3.8.1 * poppler-debugsource-23.01.0-150500.3.8.1 * SUSE Package Hub 15 15-SP5 (x86_64) * libpoppler-glib8-32bit-debuginfo-23.01.0-150500.3.8.1 * libpoppler126-32bit-23.01.0-150500.3.8.1 * libpoppler126-32bit-debuginfo-23.01.0-150500.3.8.1 * libpoppler-glib8-32bit-23.01.0-150500.3.8.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4141.html * https://bugzilla.suse.com/show_bug.cgi?id=1223375 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 16:30:06 -0000 Subject: SUSE-RU-2024:1997-1: moderate: Recommended update for e2fsprogs Message-ID: <171812340608.15554.7938630260929758245@smelt2.prg2.suse.org> # Recommended update for e2fsprogs Announcement ID: SUSE-RU-2024:1997-1 Rating: moderate References: * bsc#1223596 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for e2fsprogs fixes the following issues: * EA Inode handling fixes: * e2fsck: add more checks for ea inode consistency (bsc#1223596) * e2fsck: fix golden output of several tests (bsc#1223596) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1997=1 SUSE-2024-1997=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1997=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1997=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libcom_err2-debuginfo-1.47.0-150600.4.3.2 * libcom_err-devel-1.47.0-150600.4.3.2 * libext2fs-devel-1.47.0-150600.4.3.2 * e2fsprogs-debuginfo-1.47.0-150600.4.3.2 * libext2fs2-debuginfo-1.47.0-150600.4.3.2 * fuse2fs-debuginfo-1.47.0-150600.4.3.2 * fuse2fs-debugsource-1.47.0-150600.4.3.2 * e2fsprogs-scrub-1.47.0-150600.4.3.2 * fuse2fs-1.47.0-150600.4.3.2 * libcom_err-devel-static-1.47.0-150600.4.3.2 * libcom_err2-1.47.0-150600.4.3.2 * libext2fs2-1.47.0-150600.4.3.2 * libext2fs-devel-static-1.47.0-150600.4.3.2 * e2fsprogs-1.47.0-150600.4.3.2 * e2fsprogs-debugsource-1.47.0-150600.4.3.2 * e2fsprogs-devel-1.47.0-150600.4.3.2 * openSUSE Leap 15.6 (x86_64) * libcom_err2-32bit-1.47.0-150600.4.3.2 * e2fsprogs-32bit-debuginfo-1.47.0-150600.4.3.2 * libext2fs-devel-32bit-1.47.0-150600.4.3.2 * libcom_err-devel-32bit-1.47.0-150600.4.3.2 * libext2fs2-32bit-debuginfo-1.47.0-150600.4.3.2 * libext2fs2-32bit-1.47.0-150600.4.3.2 * libcom_err2-32bit-debuginfo-1.47.0-150600.4.3.2 * openSUSE Leap 15.6 (aarch64_ilp32) * libcom_err2-64bit-debuginfo-1.47.0-150600.4.3.2 * libext2fs-devel-64bit-1.47.0-150600.4.3.2 * libcom_err-devel-64bit-1.47.0-150600.4.3.2 * libext2fs2-64bit-1.47.0-150600.4.3.2 * libext2fs2-64bit-debuginfo-1.47.0-150600.4.3.2 * libcom_err2-64bit-1.47.0-150600.4.3.2 * e2fsprogs-64bit-debuginfo-1.47.0-150600.4.3.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libcom_err2-debuginfo-1.47.0-150600.4.3.2 * libcom_err-devel-1.47.0-150600.4.3.2 * libext2fs-devel-1.47.0-150600.4.3.2 * e2fsprogs-debuginfo-1.47.0-150600.4.3.2 * libext2fs2-debuginfo-1.47.0-150600.4.3.2 * libcom_err-devel-static-1.47.0-150600.4.3.2 * libext2fs2-1.47.0-150600.4.3.2 * libcom_err2-1.47.0-150600.4.3.2 * libext2fs-devel-static-1.47.0-150600.4.3.2 * e2fsprogs-1.47.0-150600.4.3.2 * e2fsprogs-debugsource-1.47.0-150600.4.3.2 * e2fsprogs-devel-1.47.0-150600.4.3.2 * Basesystem Module 15-SP6 (x86_64) * libcom_err2-32bit-debuginfo-1.47.0-150600.4.3.2 * libcom_err2-32bit-1.47.0-150600.4.3.2 * e2fsprogs-32bit-debuginfo-1.47.0-150600.4.3.2 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * fuse2fs-debugsource-1.47.0-150600.4.3.2 * fuse2fs-debuginfo-1.47.0-150600.4.3.2 * fuse2fs-1.47.0-150600.4.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223596 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 16:30:07 -0000 Subject: SUSE-RU-2024:1996-1: moderate: Recommended update for python-grpcio Message-ID: <171812340745.15554.11218724669276237599@smelt2.prg2.suse.org> # Recommended update for python-grpcio Announcement ID: SUSE-RU-2024:1996-1 Rating: moderate References: * bsc#1208794 * bsc#1226102 * jsc#PED-6697 Affected Products: * openSUSE Leap 15.6 An update that contains one feature and has two fixes can now be installed. ## Description: This update for python-grpcio fixes the following issues: * Update fork in 15 SP6 (bsc#1226102) * Version update in SLE 15 SP4 and later (jsc#PED-6697) * Build setup using aarch64 kernels, this release contains refinements, improvements, and bug fixes (bsc#1208794) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1996=1 openSUSE-SLE-15.6-2024-1996=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python311-grpcio-1.60.1-150600.16.3.3 * python-grpcio-debugsource-1.60.1-150600.16.3.3 * python311-grpcio-debuginfo-1.60.1-150600.16.3.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1208794 * https://bugzilla.suse.com/show_bug.cgi?id=1226102 * https://jira.suse.com/browse/PED-6697 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 16:30:09 -0000 Subject: SUSE-RU-2024:1995-1: moderate: Recommended update for libteam Message-ID: <171812340994.15554.3388643835635329334@smelt2.prg2.suse.org> # Recommended update for libteam Announcement ID: SUSE-RU-2024:1995-1 Rating: moderate References: * bsc#1224798 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for libteam fixes the following issue: * teamd: lw: arp_ping: bitmask VID in VLAN BPF filter (bsc#1224798) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1995=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1995=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1995=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1995=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1995=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1995=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1995=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1995=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1995=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1995=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1995=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1995=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1995=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1995=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1995=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1995=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1995=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1995=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1995=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1995=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1995=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * python-libteam-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * python-libteam-debuginfo-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * python-libteam-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * python-libteam-debuginfo-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libteam-tools-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libteam-tools-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * python-libteam-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * python-libteam-debuginfo-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * python-libteam-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * python-libteam-debuginfo-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * python-libteam-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * python-libteam-debuginfo-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * python-libteam-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * python-libteam-debuginfo-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * python-libteam-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * python-libteam-debuginfo-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * python-libteam-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * python-libteam-debuginfo-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Manager Proxy 4.3 (x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libteam-tools-1.27-150000.4.15.2 * libteamdctl0-1.27-150000.4.15.2 * libteam-debuginfo-1.27-150000.4.15.2 * libteam-tools-debuginfo-1.27-150000.4.15.2 * python-libteam-1.27-150000.4.15.2 * libteam-devel-1.27-150000.4.15.2 * libteam5-debuginfo-1.27-150000.4.15.2 * libteamdctl0-debuginfo-1.27-150000.4.15.2 * libteam5-1.27-150000.4.15.2 * python-libteam-debuginfo-1.27-150000.4.15.2 * libteam-debugsource-1.27-150000.4.15.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224798 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 16:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 16:30:11 -0000 Subject: SUSE-RU-2024:1994-1: moderate: Recommended update for iputils Message-ID: <171812341124.15554.11499947560626029821@smelt2.prg2.suse.org> # Recommended update for iputils Announcement ID: SUSE-RU-2024:1994-1 Rating: moderate References: Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for iputils fixes the following issue: * After upstream merged the fix, update git commit hashes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-1994=1 openSUSE-SLE-15.5-2024-1994=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1994=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1994=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1994=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1994=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * iputils-debugsource-20221126-150500.3.8.2 * iputils-debuginfo-20221126-150500.3.8.2 * iputils-20221126-150500.3.8.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * iputils-debugsource-20221126-150500.3.8.2 * iputils-debuginfo-20221126-150500.3.8.2 * iputils-20221126-150500.3.8.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * iputils-debugsource-20221126-150500.3.8.2 * iputils-debuginfo-20221126-150500.3.8.2 * iputils-20221126-150500.3.8.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * iputils-debugsource-20221126-150500.3.8.2 * iputils-debuginfo-20221126-150500.3.8.2 * iputils-20221126-150500.3.8.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * iputils-debugsource-20221126-150500.3.8.2 * iputils-debuginfo-20221126-150500.3.8.2 * iputils-20221126-150500.3.8.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 11 16:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 11 Jun 2024 16:30:12 -0000 Subject: SUSE-RU-2024:1993-1: moderate: Recommended update for sssd Message-ID: <171812341253.15554.791522649582448219@smelt2.prg2.suse.org> # Recommended update for sssd Announcement ID: SUSE-RU-2024:1993-1 Rating: moderate References: * bsc#1223050 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for sssd fixes the following issues: * Use the name from the cached entries when updating them to avoid capitalization problems (bsc#1223050) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1993=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1993=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-1993=1 openSUSE-SLE-15.5-2024-1993=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libsss_idmap0-debuginfo-2.5.2-150500.10.20.2 * sssd-common-debuginfo-2.5.2-150500.10.20.2 * sssd-debugsource-2.5.2-150500.10.20.2 * libsss_nss_idmap0-2.5.2-150500.10.20.2 * sssd-krb5-common-debuginfo-2.5.2-150500.10.20.2 * libsss_idmap0-2.5.2-150500.10.20.2 * sssd-2.5.2-150500.10.20.2 * sssd-common-2.5.2-150500.10.20.2 * sssd-ldap-2.5.2-150500.10.20.2 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.20.2 * libsss_certmap0-2.5.2-150500.10.20.2 * sssd-ldap-debuginfo-2.5.2-150500.10.20.2 * libsss_certmap0-debuginfo-2.5.2-150500.10.20.2 * sssd-krb5-common-2.5.2-150500.10.20.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-sssd-config-2.5.2-150500.10.20.2 * sssd-dbus-debuginfo-2.5.2-150500.10.20.2 * sssd-ipa-debuginfo-2.5.2-150500.10.20.2 * sssd-ad-debuginfo-2.5.2-150500.10.20.2 * sssd-krb5-debuginfo-2.5.2-150500.10.20.2 * libsss_simpleifp0-debuginfo-2.5.2-150500.10.20.2 * sssd-tools-debuginfo-2.5.2-150500.10.20.2 * sssd-ipa-2.5.2-150500.10.20.2 * libsss_certmap0-2.5.2-150500.10.20.2 * libipa_hbac0-debuginfo-2.5.2-150500.10.20.2 * sssd-dbus-2.5.2-150500.10.20.2 * sssd-winbind-idmap-2.5.2-150500.10.20.2 * libsss_idmap0-debuginfo-2.5.2-150500.10.20.2 * libsss_nss_idmap-devel-2.5.2-150500.10.20.2 * libsss_idmap-devel-2.5.2-150500.10.20.2 * libipa_hbac0-2.5.2-150500.10.20.2 * sssd-common-2.5.2-150500.10.20.2 * sssd-kcm-debuginfo-2.5.2-150500.10.20.2 * sssd-ldap-2.5.2-150500.10.20.2 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.20.2 * sssd-debugsource-2.5.2-150500.10.20.2 * libsss_certmap-devel-2.5.2-150500.10.20.2 * sssd-kcm-2.5.2-150500.10.20.2 * sssd-ldap-debuginfo-2.5.2-150500.10.20.2 * sssd-krb5-common-2.5.2-150500.10.20.2 * libipa_hbac-devel-2.5.2-150500.10.20.2 * sssd-proxy-2.5.2-150500.10.20.2 * sssd-common-debuginfo-2.5.2-150500.10.20.2 * sssd-tools-2.5.2-150500.10.20.2 * libsss_simpleifp0-2.5.2-150500.10.20.2 * libsss_nss_idmap0-2.5.2-150500.10.20.2 * sssd-krb5-common-debuginfo-2.5.2-150500.10.20.2 * sssd-2.5.2-150500.10.20.2 * sssd-ad-2.5.2-150500.10.20.2 * sssd-krb5-2.5.2-150500.10.20.2 * libsss_idmap0-2.5.2-150500.10.20.2 * sssd-winbind-idmap-debuginfo-2.5.2-150500.10.20.2 * libsss_simpleifp-devel-2.5.2-150500.10.20.2 * libsss_certmap0-debuginfo-2.5.2-150500.10.20.2 * python3-sssd-config-debuginfo-2.5.2-150500.10.20.2 * sssd-proxy-debuginfo-2.5.2-150500.10.20.2 * Basesystem Module 15-SP5 (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150500.10.20.2 * sssd-common-32bit-2.5.2-150500.10.20.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * python3-sssd-config-2.5.2-150500.10.20.2 * sssd-dbus-debuginfo-2.5.2-150500.10.20.2 * sssd-ipa-debuginfo-2.5.2-150500.10.20.2 * sssd-ad-debuginfo-2.5.2-150500.10.20.2 * python3-sss-murmur-2.5.2-150500.10.20.2 * sssd-krb5-debuginfo-2.5.2-150500.10.20.2 * libsss_simpleifp0-debuginfo-2.5.2-150500.10.20.2 * sssd-tools-debuginfo-2.5.2-150500.10.20.2 * libnfsidmap-sss-debuginfo-2.5.2-150500.10.20.2 * sssd-ipa-2.5.2-150500.10.20.2 * libsss_certmap0-2.5.2-150500.10.20.2 * libipa_hbac0-debuginfo-2.5.2-150500.10.20.2 * sssd-dbus-2.5.2-150500.10.20.2 * sssd-winbind-idmap-2.5.2-150500.10.20.2 * libsss_idmap0-debuginfo-2.5.2-150500.10.20.2 * libsss_nss_idmap-devel-2.5.2-150500.10.20.2 * libsss_idmap-devel-2.5.2-150500.10.20.2 * libipa_hbac0-2.5.2-150500.10.20.2 * sssd-common-2.5.2-150500.10.20.2 * sssd-kcm-debuginfo-2.5.2-150500.10.20.2 * sssd-ldap-2.5.2-150500.10.20.2 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.20.2 * sssd-debugsource-2.5.2-150500.10.20.2 * libsss_certmap-devel-2.5.2-150500.10.20.2 * python3-sss_nss_idmap-2.5.2-150500.10.20.2 * sssd-kcm-2.5.2-150500.10.20.2 * sssd-ldap-debuginfo-2.5.2-150500.10.20.2 * python3-sss_nss_idmap-debuginfo-2.5.2-150500.10.20.2 * sssd-krb5-common-2.5.2-150500.10.20.2 * libipa_hbac-devel-2.5.2-150500.10.20.2 * sssd-proxy-2.5.2-150500.10.20.2 * sssd-common-debuginfo-2.5.2-150500.10.20.2 * sssd-tools-2.5.2-150500.10.20.2 * libsss_simpleifp0-2.5.2-150500.10.20.2 * libsss_nss_idmap0-2.5.2-150500.10.20.2 * python3-ipa_hbac-debuginfo-2.5.2-150500.10.20.2 * sssd-krb5-common-debuginfo-2.5.2-150500.10.20.2 * sssd-2.5.2-150500.10.20.2 * sssd-ad-2.5.2-150500.10.20.2 * sssd-krb5-2.5.2-150500.10.20.2 * python3-ipa_hbac-2.5.2-150500.10.20.2 * libsss_idmap0-2.5.2-150500.10.20.2 * sssd-winbind-idmap-debuginfo-2.5.2-150500.10.20.2 * libsss_simpleifp-devel-2.5.2-150500.10.20.2 * libnfsidmap-sss-2.5.2-150500.10.20.2 * python3-sss-murmur-debuginfo-2.5.2-150500.10.20.2 * libsss_certmap0-debuginfo-2.5.2-150500.10.20.2 * python3-sssd-config-debuginfo-2.5.2-150500.10.20.2 * sssd-proxy-debuginfo-2.5.2-150500.10.20.2 * openSUSE Leap 15.5 (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150500.10.20.2 * sssd-common-32bit-2.5.2-150500.10.20.2 * openSUSE Leap 15.5 (aarch64_ilp32) * sssd-common-64bit-2.5.2-150500.10.20.2 * sssd-common-64bit-debuginfo-2.5.2-150500.10.20.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223050 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 08:30:03 -0000 Subject: SUSE-RU-2024:2004-1: moderate: Recommended update for yast2-iscsi-client Message-ID: <171818100324.4407.5633655512417941932@smelt2.prg2.suse.org> # Recommended update for yast2-iscsi-client Announcement ID: SUSE-RU-2024:2004-1 Rating: moderate References: * bsc#1225432 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for yast2-iscsi-client fixes the following issue: * Don't leak passwords to the log (bsc#1225432) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2004=1 openSUSE-SLE-15.5-2024-2004=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2004=1 ## Package List: * openSUSE Leap 15.5 (noarch) * yast2-iscsi-client-4.5.9-150500.3.6.2 * Basesystem Module 15-SP5 (noarch) * yast2-iscsi-client-4.5.9-150500.3.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1225432 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 08:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 08:30:05 -0000 Subject: SUSE-SU-2024:2003-1: important: Security update for cups Message-ID: <171818100561.4407.11234304432967649426@smelt2.prg2.suse.org> # Security update for cups Announcement ID: SUSE-SU-2024:2003-1 Rating: important References: * bsc#1223179 * bsc#1225365 Cross-References: * CVE-2024-35235 CVSS scores: * CVE-2024-35235 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP5 * Desktop Applications Module 15-SP6 * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for cups fixes the following issues: * CVE-2024-35235: Fixed a bug in cupsd that could allow an attacker to change the permissions of other files in the system. (bsc#1225365) * Handle local 'Negotiate' authentication response for cli clients (bsc#1223179) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2003=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2003=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2003=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2003=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2003=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2003=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2003=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2003=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2003=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2003=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2003=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2003=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2003=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2003=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2003=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2003=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2003=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2003=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2003=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2003=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2003=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2003=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2003=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2003=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2003=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2003=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2003=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2003=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2003=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2003=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2003=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2003=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * openSUSE Leap 15.5 (x86_64) * cups-devel-32bit-2.2.7-150000.3.59.1 * libcupscgi1-32bit-2.2.7-150000.3.59.1 * libcupsimage2-32bit-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-32bit-2.2.7-150000.3.59.1 * libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-32bit-2.2.7-150000.3.59.1 * libcupsmime1-32bit-debuginfo-2.2.7-150000.3.59.1 * libcups2-32bit-2.2.7-150000.3.59.1 * libcupsmime1-32bit-2.2.7-150000.3.59.1 * libcupscgi1-32bit-debuginfo-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * openSUSE Leap 15.6 (x86_64) * cups-devel-32bit-2.2.7-150000.3.59.1 * libcupscgi1-32bit-2.2.7-150000.3.59.1 * libcupsimage2-32bit-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-32bit-2.2.7-150000.3.59.1 * libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-32bit-2.2.7-150000.3.59.1 * libcupsmime1-32bit-debuginfo-2.2.7-150000.3.59.1 * libcups2-32bit-2.2.7-150000.3.59.1 * libcupsmime1-32bit-2.2.7-150000.3.59.1 * libcupscgi1-32bit-debuginfo-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * Desktop Applications Module 15-SP5 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * Desktop Applications Module 15-SP6 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libcupscgi1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * cups-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * libcups2-32bit-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Manager Proxy 4.3 (x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Manager Server 4.3 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcupsmime1-2.2.7-150000.3.59.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * cups-ddk-debuginfo-2.2.7-150000.3.59.1 * libcupscgi1-2.2.7-150000.3.59.1 * cups-2.2.7-150000.3.59.1 * libcupscgi1-debuginfo-2.2.7-150000.3.59.1 * libcupsppdc1-2.2.7-150000.3.59.1 * cups-client-debuginfo-2.2.7-150000.3.59.1 * cups-devel-2.2.7-150000.3.59.1 * cups-ddk-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * libcupsimage2-2.2.7-150000.3.59.1 * cups-client-2.2.7-150000.3.59.1 * libcupsmime1-debuginfo-2.2.7-150000.3.59.1 * libcupsimage2-debuginfo-2.2.7-150000.3.59.1 * SUSE Enterprise Storage 7.1 (x86_64) * libcups2-32bit-2.2.7-150000.3.59.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * cups-debuginfo-2.2.7-150000.3.59.1 * cups-debugsource-2.2.7-150000.3.59.1 * libcups2-debuginfo-2.2.7-150000.3.59.1 * libcups2-2.2.7-150000.3.59.1 * cups-config-2.2.7-150000.3.59.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35235.html * https://bugzilla.suse.com/show_bug.cgi?id=1223179 * https://bugzilla.suse.com/show_bug.cgi?id=1225365 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 08:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 08:30:08 -0000 Subject: SUSE-SU-2024:2002-1: important: Security update for cups Message-ID: <171818100862.4407.13988126316040864775@smelt2.prg2.suse.org> # Security update for cups Announcement ID: SUSE-SU-2024:2002-1 Rating: important References: * bsc#1225365 Cross-References: * CVE-2024-35235 CVSS scores: * CVE-2024-35235 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for cups fixes the following issues: * CVE-2024-35235: Fixed a bug in cupsd that could allow an attacker to change the permissions of other files in the system. (bsc#1225365) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2002=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2002=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2002=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2002=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * cups-debugsource-1.7.5-20.49.1 * cups-ddk-debuginfo-1.7.5-20.49.1 * cups-devel-1.7.5-20.49.1 * cups-debuginfo-1.7.5-20.49.1 * cups-ddk-1.7.5-20.49.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * cups-debugsource-1.7.5-20.49.1 * cups-client-debuginfo-1.7.5-20.49.1 * cups-1.7.5-20.49.1 * cups-debuginfo-1.7.5-20.49.1 * cups-client-1.7.5-20.49.1 * cups-libs-1.7.5-20.49.1 * cups-libs-debuginfo-1.7.5-20.49.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * cups-libs-32bit-1.7.5-20.49.1 * cups-libs-debuginfo-32bit-1.7.5-20.49.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * cups-debugsource-1.7.5-20.49.1 * cups-client-debuginfo-1.7.5-20.49.1 * cups-1.7.5-20.49.1 * cups-debuginfo-1.7.5-20.49.1 * cups-client-1.7.5-20.49.1 * cups-libs-1.7.5-20.49.1 * cups-libs-debuginfo-1.7.5-20.49.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * cups-libs-32bit-1.7.5-20.49.1 * cups-libs-debuginfo-32bit-1.7.5-20.49.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * cups-debugsource-1.7.5-20.49.1 * cups-client-debuginfo-1.7.5-20.49.1 * cups-1.7.5-20.49.1 * cups-debuginfo-1.7.5-20.49.1 * cups-client-1.7.5-20.49.1 * cups-libs-1.7.5-20.49.1 * cups-libs-debuginfo-1.7.5-20.49.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * cups-libs-32bit-1.7.5-20.49.1 * cups-libs-debuginfo-32bit-1.7.5-20.49.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35235.html * https://bugzilla.suse.com/show_bug.cgi?id=1225365 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 08:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 08:30:12 -0000 Subject: SUSE-RU-2024:2000-1: moderate: Recommended update for Java Message-ID: <171818101200.4407.16095943540251665052@smelt2.prg2.suse.org> # Recommended update for Java Announcement ID: SUSE-RU-2024:2000-1 Rating: moderate References: Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for Java fixes the following issues: javadoc-parser: * Deliver javadoc-parser RPM package to meet new dependency requirements (no source changes) maven-filtering was updated to version 3.3.2: * Build against the plexus-build-api0 package containing sonatype plexus build api * Version 3.3.2: * Changes: * pick correct hamcrest dependency * Prefer commons lang to plexus utils * MSHARED-1214: move tag back to HEAD * MSHARED-1216: Use caching output stream * Bump org.codehaus.plexus:plexus-utils from 3.0.16 to 3.0.24 in /src/test/resources * Fix typos and grammar * Fix 'licenced' typo in PR template * refactor IncrementalResourceFilteringTest * MSHARED-1340: Require Maven 3.6.3+ * Bump commons-io:commons-io from 2.11.0 to 2.15.1 * Bump org.apache.commons:commons-lang3 from 3.12.0 to 3.14.0 * MSHARED-1339: Bump org.apache.maven.shared:maven-shared-components from 39 to 41 * MSHARED-1290: Fix PropertyUtils cycle detection results in false positives * MSHARED-1285: use an up-to-date scanner instead the newscanner * Bump org.codehaus.plexus:plexus-testing from 1.2.0 to 1.3.0 * Bump org.codehaus.plexus:plexus-interpolation from 1.26 to 1.27 * Bump org.codehaus.plexus:plexus-utils from 3.5.1 to 4.0.0 * Bump release-drafter/release-drafter from 5 to 6 * Bump org.junit.jupiter:junit-jupiter-api from 5.10.1 to 5.10.2 * MSHARED-1351: Fix console message when origin is baseDir * MSHARED-1050: Fix ConcurrentModificationException for maven-filtering * MSHARED-1330: Always overwrite files * Version 3.3.1: * Changes: * MSHARED-1175: Copying x resources from rel/path to rel/path * MSHARED-1213: Bug: filtering existing but 0 byte file * MSHARED-1199: Upgrade parent pom to 39 * MSHARED-1112: Ignore setting permissions on non existing dest files/symlinks * MSHARED-1144: remove rendundant error message * Version 3.3.0: * Changes: * Fixed cloning of MavenResourcesExecution's instances using copyOf() method * MRESOURCES-258: Copying and filtering logic is delegated to FileUtils * replace deprecated methods * replace deprecated code in favor of Java 7 core and apache commons libraries declare dependencies * MSHARED-1080: Parent POM 36, Java8, drop legacy. maven-plugin-tools: * Build against the plexus-build-api0 package containing sonatype plexus build api * Added dependency on plexus-xml where relevant modello was updated to version 2.4.0: * Build against the new codehaus plexus build api 1.2.0 * Build all modello plugins * Version 2.4.0: * New features and improvements: * Keep license structure * Support addition of license header to generated files * Make generated code - Java 8 based by default * threadsafety * Bugs fixed: * Revert snakeyaml to 1.33 (as 2.x is not fully compatible with 1.x). * Version 2.3.0: * Changes: * Kill off dead Plexus * Fix for #366 * Version 2.2.0: * Changes: * Parse javadoc tags in xdoc generator (only @since is supported atm) * Use generic in Xpp3Reader for JDK 5+ * Get rid of usage deprecated Reader/WriterFactory * Make spotless plugin work with Java 21 * Support java source property being discovered as 1.x * Fix thread safety issues by not using singletons for generators * Improve discovering javaSource based on maven.compiler properties, default as 8 * Switch Plexus Annotation to JSR-330 * Make spotless plugin work with Java 21 * Add dependency on plexus-xml where relevant plexus-build-api was updated to version 1.2.0: * Version 1.2.0: * Potentially breaking changes: * change package to org.codehaus.plexus.build * New features and improvements: * Convert to JSR 330 component * Bump sisu-maven-plugin from 0.3.5 to 0.9.0.M2 * Switch to parent 13 and reformat * Use a CachingOutputStream when using the build context * Reuse plexus-pom action for CI * Add README and LICENSE * Remove ThreadBuildContext * Bugs fixed: * Store Objects in the DefaultContext in a map * Let the DefaultBuildContext delegate to the legacy build-api plexus-build-api0 was implemented at version 0.0.8: * New package plexus-xml: * Deliver plexus-xml RPM package to meet new dependency requirements (no source changes) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2000=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2000=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2000=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2000=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2000=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2000=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2000=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2000=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2000=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2000=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2000=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2000=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2000=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2000=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2000=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2000=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * SUSE Enterprise Storage 7.1 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * openSUSE Leap 15.5 (noarch) * maven-plugin-tools-api-3.13.0-150200.3.12.2 * plexus-build-api-javadoc-1.2.0-150200.3.7.1 * maven-plugin-tools-beanshell-3.13.0-150200.3.12.2 * plexus-xml-javadoc-3.0.0-150200.5.5.1 * javadoc-parser-0.3.1-150200.5.5.1 * maven-plugin-tools-javadoc-3.13.0-150200.3.12.2 * maven-plugin-tools-generators-3.13.0-150200.3.12.2 * javadoc-parser-javadoc-0.3.1-150200.5.5.1 * maven-plugin-tools-ant-3.13.0-150200.3.12.2 * plexus-build-api0-0.0.8-150200.5.5.2 * plexus-build-api0-javadoc-0.0.8-150200.5.5.2 * maven-script-ant-3.13.0-150200.3.12.2 * modello-maven-plugin-2.4.0-150200.3.10.1 * maven-plugin-tools-java-3.13.0-150200.3.12.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * maven-plugin-plugin-3.13.0-150200.3.12.1 * maven-plugin-tools-model-3.13.0-150200.3.12.2 * modello-maven-plugin-javadoc-2.4.0-150200.3.10.1 * plexus-xml-3.0.0-150200.5.5.1 * maven-script-beanshell-3.13.0-150200.3.12.2 * maven-plugin-plugin-javadoc-3.13.0-150200.3.12.1 * maven-plugin-tools-annotations-3.13.0-150200.3.12.2 * modello-javadoc-2.4.0-150200.3.10.1 * plexus-build-api-1.2.0-150200.3.7.1 * maven-plugin-plugin-bootstrap-3.13.0-150200.3.12.1 * maven-filtering-javadoc-3.3.2-150200.3.7.2 * modello-2.4.0-150200.3.10.1 * openSUSE Leap 15.6 (noarch) * maven-plugin-tools-api-3.13.0-150200.3.12.2 * plexus-build-api-javadoc-1.2.0-150200.3.7.1 * maven-plugin-tools-beanshell-3.13.0-150200.3.12.2 * plexus-xml-javadoc-3.0.0-150200.5.5.1 * javadoc-parser-0.3.1-150200.5.5.1 * maven-plugin-tools-javadoc-3.13.0-150200.3.12.2 * maven-plugin-tools-generators-3.13.0-150200.3.12.2 * javadoc-parser-javadoc-0.3.1-150200.5.5.1 * maven-plugin-tools-ant-3.13.0-150200.3.12.2 * plexus-build-api0-0.0.8-150200.5.5.2 * plexus-build-api0-javadoc-0.0.8-150200.5.5.2 * maven-script-ant-3.13.0-150200.3.12.2 * modello-maven-plugin-2.4.0-150200.3.10.1 * maven-plugin-tools-java-3.13.0-150200.3.12.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * maven-plugin-plugin-3.13.0-150200.3.12.1 * maven-plugin-tools-model-3.13.0-150200.3.12.2 * modello-maven-plugin-javadoc-2.4.0-150200.3.10.1 * plexus-xml-3.0.0-150200.5.5.1 * maven-script-beanshell-3.13.0-150200.3.12.2 * maven-plugin-plugin-javadoc-3.13.0-150200.3.12.1 * maven-plugin-tools-annotations-3.13.0-150200.3.12.2 * modello-javadoc-2.4.0-150200.3.10.1 * plexus-build-api-1.2.0-150200.3.7.1 * maven-plugin-plugin-bootstrap-3.13.0-150200.3.12.1 * maven-filtering-javadoc-3.3.2-150200.3.7.2 * modello-2.4.0-150200.3.10.1 * Development Tools Module 15-SP5 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * Development Tools Module 15-SP6 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * plexus-build-api0-0.0.8-150200.5.5.2 * maven-filtering-3.3.2-150200.3.7.2 * maven-plugin-annotations-3.13.0-150200.3.12.2 * plexus-xml-3.0.0-150200.5.5.1 * plexus-build-api-1.2.0-150200.3.7.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 08:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 08:30:14 -0000 Subject: SUSE-RU-2024:1999-1: moderate: Recommended update for yast2-registration Message-ID: <171818101460.4407.6162467613124583198@smelt2.prg2.suse.org> # Recommended update for yast2-registration Announcement ID: SUSE-RU-2024:1999-1 Rating: moderate References: * bsc#1223301 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for yast2-registration fixes the following issue: * Ensure add_on_others in autoyast profile are added (bsc#1223301) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1999=1 SUSE-2024-1999=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1999=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1999=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1999=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1999=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1999=1 ## Package List: * openSUSE Leap 15.5 (noarch) * yast2-registration-4.5.10-150500.3.6.2 * SUSE Linux Enterprise High Performance Computing 15 SP5 (noarch) * yast2-registration-4.5.10-150500.3.6.2 * SUSE Linux Enterprise Server 15 SP5 (noarch) * yast2-registration-4.5.10-150500.3.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * yast2-registration-4.5.10-150500.3.6.2 * SUSE Linux Enterprise Desktop 15 SP5 (noarch) * yast2-registration-4.5.10-150500.3.6.2 * Basesystem Module 15-SP5 (noarch) * yast2-registration-4.5.10-150500.3.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 08:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 08:30:15 -0000 Subject: SUSE-RU-2024:1998-1: moderate: Recommended update for yast2-registration Message-ID: <171818101586.4407.13054118136790784174@smelt2.prg2.suse.org> # Recommended update for yast2-registration Announcement ID: SUSE-RU-2024:1998-1 Rating: moderate References: * bsc#1223301 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for yast2-registration fixes the following issue: * Ensure add_on_others in autoyast profile are added (bsc#1223301) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-1998=1 openSUSE-SLE-15.6-2024-1998=1 * SUSE Linux Enterprise High Performance Computing 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-1998=1 * SUSE Linux Enterprise Server 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-1998=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-1998=1 * SUSE Linux Enterprise Desktop 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-1998=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1998=1 ## Package List: * openSUSE Leap 15.6 (noarch) * yast2-registration-4.6.2-150600.3.3.2 * SUSE Linux Enterprise High Performance Computing 15 SP6 (noarch) * yast2-registration-4.6.2-150600.3.3.2 * SUSE Linux Enterprise Server 15 SP6 (noarch) * yast2-registration-4.6.2-150600.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * yast2-registration-4.6.2-150600.3.3.2 * SUSE Linux Enterprise Desktop 15 SP6 (noarch) * yast2-registration-4.6.2-150600.3.3.2 * Basesystem Module 15-SP6 (noarch) * yast2-registration-4.6.2-150600.3.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 12:32:06 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 12:32:06 -0000 Subject: SUSE-SU-2024:2008-1: important: Security update for the Linux Kernel Message-ID: <171819552658.12684.14099405898454158595@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:2008-1 Rating: important References: * bsc#1065729 * bsc#1141539 * bsc#1174585 * bsc#1181674 * bsc#1187716 * bsc#1190569 * bsc#1191949 * bsc#1192107 * bsc#1193983 * bsc#1194288 * bsc#1194869 * bsc#1196956 * bsc#1197915 * bsc#1200465 * bsc#1205205 * bsc#1207284 * bsc#1207361 * bsc#1207948 * bsc#1208149 * bsc#1209657 * bsc#1209799 * bsc#1209834 * bsc#1209980 * bsc#1210335 * bsc#1213863 * bsc#1214852 * bsc#1215322 * bsc#1215702 * bsc#1216358 * bsc#1216702 * bsc#1217169 * bsc#1217339 * bsc#1217515 * bsc#1218447 * bsc#1220021 * bsc#1220267 * bsc#1220363 * bsc#1220783 * bsc#1221044 * bsc#1221081 * bsc#1221615 * bsc#1221777 * bsc#1221816 * bsc#1221829 * bsc#1222011 * bsc#1222374 * bsc#1222385 * bsc#1222413 * bsc#1222464 * bsc#1222513 * bsc#1222559 * bsc#1222561 * bsc#1222608 * bsc#1222619 * bsc#1222627 * bsc#1222721 * bsc#1222765 * bsc#1222770 * bsc#1222783 * bsc#1222793 * bsc#1222838 * bsc#1222870 * bsc#1222893 * bsc#1222960 * bsc#1222961 * bsc#1222974 * bsc#1222975 * bsc#1222976 * bsc#1223011 * bsc#1223023 * bsc#1223027 * bsc#1223031 * bsc#1223043 * bsc#1223046 * bsc#1223048 * bsc#1223049 * bsc#1223084 * bsc#1223113 * bsc#1223119 * bsc#1223137 * bsc#1223138 * bsc#1223140 * bsc#1223188 * bsc#1223203 * bsc#1223207 * bsc#1223315 * bsc#1223360 * bsc#1223384 * bsc#1223390 * bsc#1223432 * bsc#1223489 * bsc#1223505 * bsc#1223532 * bsc#1223575 * bsc#1223595 * bsc#1223626 * bsc#1223627 * bsc#1223628 * bsc#1223631 * bsc#1223633 * bsc#1223638 * bsc#1223650 * bsc#1223653 * bsc#1223666 * bsc#1223670 * bsc#1223671 * bsc#1223675 * bsc#1223677 * bsc#1223678 * bsc#1223679 * bsc#1223698 * bsc#1223712 * bsc#1223715 * bsc#1223717 * bsc#1223718 * bsc#1223737 * bsc#1223738 * bsc#1223741 * bsc#1223744 * bsc#1223747 * bsc#1223748 * bsc#1223750 * bsc#1223752 * bsc#1223754 * bsc#1223756 * bsc#1223757 * bsc#1223762 * bsc#1223769 * bsc#1223770 * bsc#1223779 * bsc#1223780 * bsc#1223781 * bsc#1223788 * bsc#1223802 * bsc#1223819 * bsc#1223823 * bsc#1223826 * bsc#1223828 * bsc#1223829 * bsc#1223837 * bsc#1223842 * bsc#1223843 * bsc#1223844 * bsc#1223847 * bsc#1223858 * bsc#1223875 * bsc#1223879 * bsc#1223895 * bsc#1223959 * bsc#1223961 * bsc#1223991 * bsc#1223996 * bsc#1224020 * bsc#1224076 * bsc#1224096 * bsc#1224098 * bsc#1224099 * bsc#1224137 * bsc#1224166 * bsc#1224174 * bsc#1224177 * bsc#1224180 * bsc#1224181 * bsc#1224187 * bsc#1224331 * bsc#1224346 * bsc#1224423 * bsc#1224432 * bsc#1224437 * bsc#1224438 * bsc#1224442 * bsc#1224443 * bsc#1224445 * bsc#1224449 * bsc#1224479 * bsc#1224482 * bsc#1224487 * bsc#1224488 * bsc#1224492 * bsc#1224494 * bsc#1224495 * bsc#1224502 * bsc#1224508 * bsc#1224509 * bsc#1224511 * bsc#1224519 * bsc#1224524 * bsc#1224525 * bsc#1224530 * bsc#1224531 * bsc#1224534 * bsc#1224535 * bsc#1224537 * bsc#1224541 * bsc#1224543 * bsc#1224549 * bsc#1224550 * bsc#1224558 * bsc#1224559 * bsc#1224566 * bsc#1224567 * bsc#1224571 * bsc#1224575 * bsc#1224576 * bsc#1224579 * bsc#1224580 * bsc#1224581 * bsc#1224582 * bsc#1224586 * bsc#1224587 * bsc#1224592 * bsc#1224598 * bsc#1224601 * bsc#1224607 * bsc#1224608 * bsc#1224611 * bsc#1224615 * bsc#1224617 * bsc#1224618 * bsc#1224621 * bsc#1224622 * bsc#1224624 * bsc#1224627 * bsc#1224628 * bsc#1224629 * bsc#1224632 * bsc#1224636 * bsc#1224637 * bsc#1224638 * bsc#1224640 * bsc#1224643 * bsc#1224644 * bsc#1224645 * bsc#1224647 * bsc#1224648 * bsc#1224649 * bsc#1224650 * bsc#1224651 * bsc#1224657 * bsc#1224659 * bsc#1224660 * bsc#1224663 * bsc#1224664 * bsc#1224665 * bsc#1224666 * bsc#1224667 * bsc#1224668 * bsc#1224671 * bsc#1224672 * bsc#1224676 * bsc#1224678 * bsc#1224679 * bsc#1224680 * bsc#1224681 * bsc#1224682 * bsc#1224685 * bsc#1224686 * bsc#1224692 * bsc#1224697 * bsc#1224699 * bsc#1224701 * bsc#1224703 * bsc#1224705 * bsc#1224707 * bsc#1224717 * bsc#1224718 * bsc#1224721 * bsc#1224722 * bsc#1224723 * bsc#1224725 * bsc#1224727 * bsc#1224728 * bsc#1224729 * bsc#1224730 * bsc#1224731 * bsc#1224732 * bsc#1224733 * bsc#1224736 * bsc#1224738 * bsc#1224739 * bsc#1224740 * bsc#1224747 * bsc#1224749 * bsc#1224759 * bsc#1224763 * bsc#1224764 * bsc#1224765 * bsc#1224766 * bsc#1224794 * bsc#1224795 * bsc#1224796 * bsc#1224803 * bsc#1224816 * bsc#1224895 * bsc#1224898 * bsc#1224900 * bsc#1224901 * bsc#1224902 * bsc#1224903 * bsc#1224904 * bsc#1224905 * bsc#1224907 * bsc#1224909 * bsc#1224910 * bsc#1224911 * bsc#1224912 * bsc#1224913 * bsc#1224914 * bsc#1224915 * bsc#1224920 * bsc#1224928 * bsc#1224929 * bsc#1224930 * bsc#1224931 * bsc#1224932 * bsc#1224936 * bsc#1224937 * bsc#1224941 * bsc#1224942 * bsc#1224944 * bsc#1224945 * bsc#1224947 * bsc#1224956 * bsc#1224988 * bsc#1224992 * bsc#1225000 * bsc#1225003 * bsc#1225005 * bsc#1225008 * bsc#1225009 * bsc#1225022 * bsc#1225031 * bsc#1225032 * bsc#1225036 * bsc#1225041 * bsc#1225044 * bsc#1225053 * bsc#1225076 * bsc#1225077 * bsc#1225082 * bsc#1225085 * bsc#1225086 * bsc#1225092 * bsc#1225095 * bsc#1225096 * bsc#1225097 * bsc#1225106 * bsc#1225108 * bsc#1225109 * bsc#1225114 * bsc#1225118 * bsc#1225121 * bsc#1225122 * bsc#1225123 * bsc#1225125 * bsc#1225126 * bsc#1225127 * bsc#1225129 * bsc#1225131 * bsc#1225132 * bsc#1225138 * bsc#1225139 * bsc#1225145 * bsc#1225151 * bsc#1225153 * bsc#1225156 * bsc#1225158 * bsc#1225160 * bsc#1225161 * bsc#1225164 * bsc#1225167 * bsc#1225180 * bsc#1225183 * bsc#1225184 * bsc#1225186 * bsc#1225187 * bsc#1225189 * bsc#1225190 * bsc#1225191 * bsc#1225192 * bsc#1225193 * bsc#1225195 * bsc#1225198 * bsc#1225201 * bsc#1225203 * bsc#1225205 * bsc#1225206 * bsc#1225207 * bsc#1225208 * bsc#1225209 * bsc#1225210 * bsc#1225214 * bsc#1225222 * bsc#1225223 * bsc#1225224 * bsc#1225225 * bsc#1225227 * bsc#1225228 * bsc#1225229 * bsc#1225230 * bsc#1225232 * bsc#1225233 * bsc#1225235 * bsc#1225236 * bsc#1225237 * bsc#1225238 * bsc#1225239 * bsc#1225240 * bsc#1225241 * bsc#1225242 * bsc#1225243 * bsc#1225244 * bsc#1225245 * bsc#1225246 * bsc#1225247 * bsc#1225248 * bsc#1225249 * bsc#1225250 * bsc#1225251 * bsc#1225252 * bsc#1225253 * bsc#1225254 * bsc#1225255 * bsc#1225256 * bsc#1225257 * bsc#1225258 * bsc#1225259 * bsc#1225260 * bsc#1225261 * bsc#1225262 * bsc#1225263 * bsc#1225268 * bsc#1225301 * bsc#1225303 * bsc#1225304 * bsc#1225306 * bsc#1225316 * bsc#1225318 * bsc#1225320 * bsc#1225321 * bsc#1225322 * bsc#1225323 * bsc#1225326 * bsc#1225327 * bsc#1225328 * bsc#1225329 * bsc#1225330 * bsc#1225331 * bsc#1225332 * bsc#1225333 * bsc#1225334 * bsc#1225335 * bsc#1225336 * bsc#1225337 * bsc#1225338 * bsc#1225339 * bsc#1225341 * bsc#1225342 * bsc#1225344 * bsc#1225346 * bsc#1225347 * bsc#1225351 * bsc#1225353 * bsc#1225354 * bsc#1225355 * bsc#1225357 * bsc#1225358 * bsc#1225360 * bsc#1225361 * bsc#1225366 * bsc#1225367 * bsc#1225368 * bsc#1225369 * bsc#1225370 * bsc#1225372 * bsc#1225373 * bsc#1225374 * bsc#1225375 * bsc#1225376 * bsc#1225377 * bsc#1225379 * bsc#1225380 * bsc#1225382 * bsc#1225383 * bsc#1225384 * bsc#1225386 * bsc#1225387 * bsc#1225388 * bsc#1225390 * bsc#1225392 * bsc#1225393 * bsc#1225396 * bsc#1225400 * bsc#1225404 * bsc#1225405 * bsc#1225408 * bsc#1225409 * bsc#1225410 * bsc#1225411 * bsc#1225424 * bsc#1225425 * bsc#1225427 * bsc#1225431 * bsc#1225435 * bsc#1225436 * bsc#1225437 * bsc#1225438 * bsc#1225439 * bsc#1225441 * bsc#1225442 * bsc#1225443 * bsc#1225444 * bsc#1225445 * bsc#1225446 * bsc#1225447 * bsc#1225450 * bsc#1225453 * bsc#1225455 * bsc#1225461 * bsc#1225463 * bsc#1225464 * bsc#1225466 * bsc#1225467 * bsc#1225468 * bsc#1225471 * bsc#1225472 * bsc#1225478 * bsc#1225479 * bsc#1225480 * bsc#1225482 * bsc#1225483 * bsc#1225486 * bsc#1225488 * bsc#1225490 * bsc#1225492 * bsc#1225495 * bsc#1225499 * bsc#1225500 * bsc#1225501 * bsc#1225502 * bsc#1225506 * bsc#1225508 * bsc#1225510 * bsc#1225513 * bsc#1225515 * bsc#1225529 * bsc#1225530 * bsc#1225532 * bsc#1225534 * bsc#1225535 * bsc#1225548 * bsc#1225549 * bsc#1225550 * bsc#1225553 * bsc#1225554 * bsc#1225555 * bsc#1225556 * bsc#1225557 * bsc#1225559 * bsc#1225560 * bsc#1225565 * bsc#1225566 * bsc#1225568 * bsc#1225569 * bsc#1225570 * bsc#1225571 * bsc#1225572 * bsc#1225577 * bsc#1225583 * bsc#1225584 * bsc#1225587 * bsc#1225588 * bsc#1225589 * bsc#1225590 * bsc#1225591 * bsc#1225592 * bsc#1225593 * bsc#1225595 * bsc#1225599 * bsc#1225616 * bsc#1225640 * bsc#1225642 * bsc#1225705 * bsc#1225708 * bsc#1225715 * bsc#1225720 * bsc#1225722 * bsc#1225734 * bsc#1225735 * bsc#1225747 * bsc#1225748 * bsc#1225756 * bsc#1225761 * bsc#1225766 * bsc#1225775 * bsc#1225810 * bsc#1225820 * bsc#1225829 * bsc#1225835 * bsc#1225842 * jsc#PED-3259 * jsc#PED-7167 Cross-References: * CVE-2020-36788 * CVE-2021-39698 * CVE-2021-4148 * CVE-2021-42327 * CVE-2021-43056 * CVE-2021-47200 * CVE-2021-47358 * CVE-2021-47359 * CVE-2021-47360 * CVE-2021-47361 * CVE-2021-47362 * CVE-2021-47363 * CVE-2021-47364 * CVE-2021-47365 * CVE-2021-47366 * CVE-2021-47367 * CVE-2021-47368 * CVE-2021-47369 * CVE-2021-47370 * CVE-2021-47371 * CVE-2021-47372 * CVE-2021-47373 * CVE-2021-47374 * CVE-2021-47375 * CVE-2021-47376 * CVE-2021-47378 * CVE-2021-47379 * CVE-2021-47380 * CVE-2021-47381 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47384 * CVE-2021-47385 * CVE-2021-47386 * CVE-2021-47387 * CVE-2021-47388 * CVE-2021-47389 * CVE-2021-47390 * CVE-2021-47391 * CVE-2021-47392 * CVE-2021-47393 * CVE-2021-47394 * CVE-2021-47395 * CVE-2021-47396 * CVE-2021-47397 * CVE-2021-47398 * CVE-2021-47399 * CVE-2021-47400 * CVE-2021-47401 * CVE-2021-47402 * CVE-2021-47403 * CVE-2021-47404 * CVE-2021-47405 * CVE-2021-47406 * CVE-2021-47407 * CVE-2021-47408 * CVE-2021-47409 * CVE-2021-47410 * CVE-2021-47412 * CVE-2021-47413 * CVE-2021-47414 * CVE-2021-47415 * CVE-2021-47416 * CVE-2021-47417 * CVE-2021-47418 * CVE-2021-47419 * CVE-2021-47420 * CVE-2021-47421 * CVE-2021-47422 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47425 * CVE-2021-47426 * CVE-2021-47427 * CVE-2021-47428 * CVE-2021-47429 * CVE-2021-47430 * CVE-2021-47431 * CVE-2021-47433 * CVE-2021-47434 * CVE-2021-47435 * CVE-2021-47436 * CVE-2021-47437 * CVE-2021-47438 * CVE-2021-47439 * CVE-2021-47440 * CVE-2021-47441 * CVE-2021-47442 * CVE-2021-47443 * CVE-2021-47444 * CVE-2021-47445 * CVE-2021-47446 * CVE-2021-47447 * CVE-2021-47448 * CVE-2021-47449 * CVE-2021-47450 * CVE-2021-47451 * CVE-2021-47452 * CVE-2021-47453 * CVE-2021-47454 * CVE-2021-47455 * CVE-2021-47456 * CVE-2021-47457 * CVE-2021-47458 * CVE-2021-47459 * CVE-2021-47460 * CVE-2021-47461 * CVE-2021-47462 * CVE-2021-47463 * CVE-2021-47464 * CVE-2021-47465 * CVE-2021-47466 * CVE-2021-47467 * CVE-2021-47468 * CVE-2021-47469 * CVE-2021-47470 * CVE-2021-47471 * CVE-2021-47472 * CVE-2021-47473 * CVE-2021-47474 * CVE-2021-47475 * CVE-2021-47476 * CVE-2021-47477 * CVE-2021-47478 * CVE-2021-47479 * CVE-2021-47480 * CVE-2021-47481 * CVE-2021-47482 * CVE-2021-47483 * CVE-2021-47484 * CVE-2021-47485 * CVE-2021-47486 * CVE-2021-47488 * CVE-2021-47489 * CVE-2021-47490 * CVE-2021-47491 * CVE-2021-47492 * CVE-2021-47493 * CVE-2021-47494 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47498 * CVE-2021-47499 * CVE-2021-47500 * CVE-2021-47501 * CVE-2021-47502 * CVE-2021-47503 * CVE-2021-47504 * CVE-2021-47505 * CVE-2021-47506 * CVE-2021-47507 * CVE-2021-47508 * CVE-2021-47509 * CVE-2021-47510 * CVE-2021-47511 * CVE-2021-47512 * CVE-2021-47513 * CVE-2021-47514 * CVE-2021-47516 * CVE-2021-47518 * CVE-2021-47520 * CVE-2021-47521 * CVE-2021-47522 * CVE-2021-47523 * CVE-2021-47524 * CVE-2021-47525 * CVE-2021-47526 * CVE-2021-47527 * CVE-2021-47528 * CVE-2021-47529 * CVE-2021-47530 * CVE-2021-47531 * CVE-2021-47532 * CVE-2021-47533 * CVE-2021-47534 * CVE-2021-47535 * CVE-2021-47536 * CVE-2021-47537 * CVE-2021-47540 * CVE-2021-47541 * CVE-2021-47542 * CVE-2021-47544 * CVE-2021-47548 * CVE-2021-47549 * CVE-2021-47550 * CVE-2021-47551 * CVE-2021-47552 * CVE-2021-47553 * CVE-2021-47554 * CVE-2021-47555 * CVE-2021-47556 * CVE-2021-47557 * CVE-2021-47558 * CVE-2021-47559 * CVE-2021-47560 * CVE-2021-47562 * CVE-2021-47563 * CVE-2021-47564 * CVE-2021-47565 * CVE-2021-47569 * CVE-2022-48633 * CVE-2022-48662 * CVE-2022-48669 * CVE-2022-48689 * CVE-2022-48691 * CVE-2022-48699 * CVE-2022-48705 * CVE-2022-48708 * CVE-2022-48709 * CVE-2022-48710 * CVE-2023-0160 * CVE-2023-1829 * CVE-2023-42755 * CVE-2023-47233 * CVE-2023-52586 * CVE-2023-52591 * CVE-2023-52618 * CVE-2023-52642 * CVE-2023-52643 * CVE-2023-52644 * CVE-2023-52646 * CVE-2023-52650 * CVE-2023-52653 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52656 * CVE-2023-52657 * CVE-2023-52659 * CVE-2023-52660 * CVE-2023-52661 * CVE-2023-52662 * CVE-2023-52664 * CVE-2023-52669 * CVE-2023-52671 * CVE-2023-52674 * CVE-2023-52676 * CVE-2023-52678 * CVE-2023-52679 * CVE-2023-52680 * CVE-2023-52683 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52690 * CVE-2023-52691 * CVE-2023-52692 * CVE-2023-52693 * CVE-2023-52694 * CVE-2023-52696 * CVE-2023-52698 * CVE-2023-52699 * CVE-2023-52702 * CVE-2023-52703 * CVE-2023-52705 * CVE-2023-52707 * CVE-2023-52708 * CVE-2023-52730 * CVE-2023-52731 * CVE-2023-52732 * CVE-2023-52733 * CVE-2023-52736 * CVE-2023-52738 * CVE-2023-52739 * CVE-2023-52740 * CVE-2023-52741 * CVE-2023-52742 * CVE-2023-52743 * CVE-2023-52744 * CVE-2023-52745 * CVE-2023-52746 * CVE-2023-52747 * CVE-2023-52753 * CVE-2023-52754 * CVE-2023-52756 * CVE-2023-52757 * CVE-2023-52759 * CVE-2023-52763 * CVE-2023-52764 * CVE-2023-52766 * CVE-2023-52773 * CVE-2023-52774 * CVE-2023-52777 * CVE-2023-52781 * CVE-2023-52788 * CVE-2023-52789 * CVE-2023-52791 * CVE-2023-52795 * CVE-2023-52796 * CVE-2023-52798 * CVE-2023-52799 * CVE-2023-52800 * CVE-2023-52803 * CVE-2023-52804 * CVE-2023-52805 * CVE-2023-52806 * CVE-2023-52807 * CVE-2023-52808 * CVE-2023-52809 * CVE-2023-52810 * CVE-2023-52811 * CVE-2023-52814 * CVE-2023-52815 * CVE-2023-52816 * CVE-2023-52817 * CVE-2023-52818 * CVE-2023-52819 * CVE-2023-52821 * CVE-2023-52825 * CVE-2023-52826 * CVE-2023-52832 * CVE-2023-52833 * CVE-2023-52834 * CVE-2023-52838 * CVE-2023-52840 * CVE-2023-52841 * CVE-2023-52844 * CVE-2023-52847 * CVE-2023-52851 * CVE-2023-52853 * CVE-2023-52854 * CVE-2023-52855 * CVE-2023-52856 * CVE-2023-52858 * CVE-2023-52860 * CVE-2023-52861 * CVE-2023-52864 * CVE-2023-52865 * CVE-2023-52867 * CVE-2023-52868 * CVE-2023-52870 * CVE-2023-52871 * CVE-2023-52872 * CVE-2023-52873 * CVE-2023-52875 * CVE-2023-52876 * CVE-2023-52877 * CVE-2023-52878 * CVE-2023-52880 * CVE-2023-6531 * CVE-2024-2201 * CVE-2024-26597 * CVE-2024-26643 * CVE-2024-26679 * CVE-2024-26692 * CVE-2024-26698 * CVE-2024-26700 * CVE-2024-26715 * CVE-2024-26739 * CVE-2024-26742 * CVE-2024-26748 * CVE-2024-26758 * CVE-2024-26764 * CVE-2024-26775 * CVE-2024-26777 * CVE-2024-26778 * CVE-2024-26788 * CVE-2024-26791 * CVE-2024-26801 * CVE-2024-26822 * CVE-2024-26828 * CVE-2024-26829 * CVE-2024-26838 * CVE-2024-26839 * CVE-2024-26840 * CVE-2024-26846 * CVE-2024-26859 * CVE-2024-26870 * CVE-2024-26874 * CVE-2024-26876 * CVE-2024-26877 * CVE-2024-26880 * CVE-2024-26889 * CVE-2024-26894 * CVE-2024-26900 * CVE-2024-26907 * CVE-2024-26915 * CVE-2024-26916 * CVE-2024-26919 * CVE-2024-26920 * CVE-2024-26921 * CVE-2024-26922 * CVE-2024-26925 * CVE-2024-26928 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-26931 * CVE-2024-26933 * CVE-2024-26934 * CVE-2024-269355 * CVE-2024-26937 * CVE-2024-26938 * CVE-2024-26939 * CVE-2024-26940 * CVE-2024-26943 * CVE-2024-26957 * CVE-2024-26958 * CVE-2024-26964 * CVE-2024-26974 * CVE-2024-26977 * CVE-2024-26979 * CVE-2024-26984 * CVE-2024-26988 * CVE-2024-26989 * CVE-2024-26994 * CVE-2024-26996 * CVE-2024-26997 * CVE-2024-26999 * CVE-2024-27000 * CVE-2024-27001 * CVE-2024-27004 * CVE-2024-27008 * CVE-2024-27028 * CVE-2024-27037 * CVE-2024-27042 * CVE-2024-27045 * CVE-2024-27047 * CVE-2024-27051 * CVE-2024-27052 * CVE-2024-27053 * CVE-2024-27054 * CVE-2024-27059 * CVE-2024-27072 * CVE-2024-27073 * CVE-2024-27074 * CVE-2024-27075 * CVE-2024-27076 * CVE-2024-27077 * CVE-2024-27078 * CVE-2024-27388 * CVE-2024-27393 * CVE-2024-27395 * CVE-2024-27396 * CVE-2024-27398 * CVE-2024-27399 * CVE-2024-27400 * CVE-2024-27401 * CVE-2024-27405 * CVE-2024-27410 * CVE-2024-27412 * CVE-2024-27413 * CVE-2024-27416 * CVE-2024-27417 * CVE-2024-27419 * CVE-2024-27431 * CVE-2024-27435 * CVE-2024-27436 * CVE-2024-35789 * CVE-2024-35791 * CVE-2024-35796 * CVE-2024-35799 * CVE-2024-35801 * CVE-2024-35804 * CVE-2024-35806 * CVE-2024-35809 * CVE-2024-35811 * CVE-2024-35812 * CVE-2024-35813 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35821 * CVE-2024-35822 * CVE-2024-35823 * CVE-2024-35825 * CVE-2024-35828 * CVE-2024-35829 * CVE-2024-35830 * CVE-2024-35833 * CVE-2024-35845 * CVE-2024-35847 * CVE-2024-35849 * CVE-2024-35851 * CVE-2024-35852 * CVE-2024-35854 * CVE-2024-35860 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35865 * CVE-2024-35866 * CVE-2024-35867 * CVE-2024-35868 * CVE-2024-35869 * CVE-2024-35870 * CVE-2024-35872 * CVE-2024-35875 * CVE-2024-35877 * CVE-2024-35878 * CVE-2024-35879 * CVE-2024-35885 * CVE-2024-35887 * CVE-2024-35895 * CVE-2024-35901 * CVE-2024-35904 * CVE-2024-35905 * CVE-2024-35907 * CVE-2024-35912 * CVE-2024-35914 * CVE-2024-35915 * CVE-2024-35922 * CVE-2024-35924 * CVE-2024-35930 * CVE-2024-35932 * CVE-2024-35933 * CVE-2024-35935 * CVE-2024-35936 * CVE-2024-35938 * CVE-2024-35939 * CVE-2024-35940 * CVE-2024-35943 * CVE-2024-35944 * CVE-2024-35947 * CVE-2024-35950 * CVE-2024-35951 * CVE-2024-35952 * CVE-2024-35955 * CVE-2024-35959 * CVE-2024-35963 * CVE-2024-35964 * CVE-2024-35965 * CVE-2024-35966 * CVE-2024-35967 * CVE-2024-35969 * CVE-2024-35973 * CVE-2024-35976 * CVE-2024-35978 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-35989 * CVE-2024-35990 * CVE-2024-35998 * CVE-2024-35999 * CVE-2024-36006 * CVE-2024-36007 * CVE-2024-36012 * CVE-2024-36014 * CVE-2024-36015 * CVE-2024-36016 * CVE-2024-36026 * CVE-2024-36029 * CVE-2024-36032 * CVE-2024-36880 * CVE-2024-36893 * CVE-2024-36896 * CVE-2024-36897 * CVE-2024-36906 * CVE-2024-36918 * CVE-2024-36924 * CVE-2024-36926 * CVE-2024-36928 * CVE-2024-36931 * CVE-2024-36938 * CVE-2024-36940 * CVE-2024-36941 * CVE-2024-36942 * CVE-2024-36944 * CVE-2024-36947 * CVE-2024-36950 * CVE-2024-36952 * CVE-2024-36955 * CVE-2024-36959 CVSS scores: * CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-4148 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-4148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-42327 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-42327 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47358 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47364 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47365 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47366 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2021-47367 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47368 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47371 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47372 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47373 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47379 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47389 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2021-47390 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47394 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47398 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47407 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47414 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47418 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47420 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47421 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47429 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47439 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47448 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2021-47449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47452 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47466 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47467 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47470 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47474 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47475 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47476 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47477 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47488 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47489 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47490 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47504 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47508 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47510 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47513 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47514 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47520 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47520 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47524 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47525 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47525 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47526 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47528 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47529 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47530 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47531 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47533 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2021-47537 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47544 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2021-47548 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47550 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47553 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47556 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47569 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48689 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48709 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42755 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-42755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52586 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52618 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52642 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52656 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52702 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52707 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52731 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52739 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52745 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52746 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52756 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52773 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52795 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52807 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52815 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52861 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26597 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26597 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26715 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26877 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26880 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26907 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-26907 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26933 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26939 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27051 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27052 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27053 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35869 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35998 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35999 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36016 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36938 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Real Time Module 15-SP5 An update that solves 561 vulnerabilities, contains two features and has 39 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506) * CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959) * CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961) * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). * CVE-2023-42755: Check user supplied offsets (bsc#1215702). * CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081). * CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615). * CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187). * CVE-2023-52660: Fiedx IRQ handling due to shared interrupts (bsc#1224443). * CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747). * CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729). * CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727). * CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608). * CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628). * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (CVE-2023-52698 bsc#1224621) * CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr() (bsc#1225114) * CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548). * CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085). * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930). * CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs (bsc#1225097). * CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936). * CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339). * CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829). * CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385). * CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464). * CVE-2024-26715: Fixed NULL pointer dereference in dwc3_gadget_suspend (bsc#1222561). * CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes bsc#1222608). * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627). * CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793) * CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). * CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119). * CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046). * CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207) * CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847). * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390). * CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532). * CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679). * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653). * CVE-2024-27042: Fixed potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (bsc#1223823). * CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098). * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181). * CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr() (bsc#1224721) * CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759) * CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718). * CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725). * CVE-2024-35799: Prevent crash when disable stream (bsc#1224740). * CVE-2024-35804: Mark target gfn of emulated atomic instruction as dirty (bsc#1224638). * CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502). * CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636). * CVE-2024-35860: struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765). * CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668). * CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664). * CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678). * CVE-2024-35869: Guarantee refcounted children from parent session (bsc#1224679). * CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672). * CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530). * CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665). * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525). * CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671). * CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524). * CVE-2024-35885: Stop interface during shutdown (bsc#1224519). * CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488). * CVE-2024-35907: Call request_irq() after NAPI initialized (bsc#1224492). * CVE-2024-35924: Limit read size on v1.2 (bsc#1224657). * CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535). * CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649). * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648). * CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701). * CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666). * CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581). * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580). * CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb (bsc#1224586). * CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575). * CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549). * CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550). * CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541). * CVE-2024-36007: Fixed warning during rehash (bsc#1224543). * CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761). The following non-security bugs were fixed: * 9p: explicitly deny setlease attempts (git-fixes). * ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes). * ACPI: disable -Wstringop-truncation (git-fixes). * ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes). * ACPI: LPSS: Advertise number of chip selects via property (git-fixes). * admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes). * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * ALSA: core: Fix NULL module pointer assignment at card init (git-fixes). * ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes). * ALSA: line6: Zero-initialize message buffers (stable-fixes). * ARM: 9381/1: kasan: clear stale stack poison (git-fixes). * ASoC: Intel: avs: Fix ASRC module initialization (git-fixes). * ASoC: Intel: avs: Fix potential integer overflow (git-fixes). * ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes). * ASoC: Intel: Disable route checks for Skylake boards (git-fixes). * ASoC: kirkwood: Fix potential NULL dereference (git-fixes). * ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes). * ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes). * ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes). * ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes). * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes). * ata: pata_legacy: make legacy_exit() work again (git-fixes). * ata: sata_gemini: Check clk_enable() result (stable-fixes). * autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166). * Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes). * Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes). * Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358). * Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes). * Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes). * Bluetooth: qca: add missing firmware sanity checks (git-fixes). * Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes). * Bluetooth: qca: fix firmware check error path (git-fixes). * Bluetooth: qca: fix info leak when fetching fw build id (git-fixes). * Bluetooth: qca: fix NVM configuration parsing (git-fixes). * bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git- fixes) * bpf: decouple prune and jump points (bsc#1225756). * bpf: fix precision backtracking instruction iteration (bsc#1225756). * bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes). * bpf: handle ldimm64 properly in check_cfg() (bsc#1225756). * bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756). * bpf: remove unnecessary prune and jump points (bsc#1225756). * btrfs: add error messages to all unrecognized mount options (git-fixes) * btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes) * btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes) * btrfs: extend locking to all space_info members accesses (git-fixes) * btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes) * btrfs: fix fallocate to use file_modified to update permissions consistently (git-fixes) * btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes) * btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes) * btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes) * btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes) * btrfs: fix silent failure when deleting root reference (git-fixes) * btrfs: fix use-after-free after failure to create a snapshot (git-fixes) * btrfs: free exchange changeset on failures (git-fixes) * btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git- fixes) * btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes) * btrfs: prevent copying too big compressed lzo segment (git-fixes) * btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes) * btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes) * btrfs: repair super block num_devices automatically (git-fixes) * btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes) * btrfs: send: ensure send_fd is writable (git-fixes) * btrfs: send: handle path ref underflow in header iterate_inode_ref() (git- fixes) * btrfs: send: in case of IO error log it (git-fixes) * btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes) * btrfs: tree-checker: check item_size for dev_item (git-fixes) * btrfs: tree-checker: check item_size for inode_item (git-fixes) * cifs: account for primary channel in the interface list (bsc#1224020). * cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020). * cifs: distribute channels across interfaces based on speed (bsc#1224020). * cifs: do not pass cifs_sb when trying to add channels (bsc#1224020). * cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020). * cifs: fix charset issue in reconnection (bsc#1224020). * cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020). * cifs: handle cases where a channel is closed (bsc#1224020). * cifs: handle cases where multiple sessions share connection (bsc#1224020). * cifs: reconnect work should have reference on server struct (bsc#1224020). * clk: Do not hold prepare_lock when calling kref_put() (stable-fixes). * clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes). * counter: stm32-lptimer-cnt: Provide defines for clock polarities (git- fixes). * counter: stm32-timer-cnt: Provide defines for slave mode selection (git- fixes). * cppc_cpufreq: Fix possible null pointer dereference (git-fixes). * cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes). * cpumask: Add for_each_cpu_from() (bsc#1225053). * crypto: bcm - Fix pointer arithmetic (git-fixes). * crypto: ccp - drop platform ifdef checks (git-fixes). * crypto: ecdsa - Fix module auto-load on add-key (git-fixes). * crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes). * dmaengine: axi-dmac: fix possible race in remove() (git-fixes). * dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes). * dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes). * dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575). * docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes). * drivers/nvme: Add quirks for device 126f:2262 (git-fixes). * drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes). * drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes). * drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes). * drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes). * drm/amd: Flush GFXOFF requests in prepare stage (git-fixes). * drm/amdgpu: Refine IB schedule error logging (stable-fixes). * drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git- fixes). * drm/arm/malidp: fix a possible null pointer dereference (git-fixes). * drm/bridge: anx7625: Do not log an error when DSI host can't be found (git- fixes). * drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git- fixes). * drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: icn6211: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: tc358775: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes). * drm/connector: Add \n to message about demoting connector force-probes (git- fixes). * drm/i915/bios: Fix parsing backlight BDB data (git-fixes). * drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes). * drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes). * drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes). * drm/meson: dw-hdmi: power up phy on device init (git-fixes). * drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes). * drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes). * drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes). * drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes). * drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes). * drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes). * drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes). * drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes). * drm: vc4: Fix possible null pointer dereference (git-fixes). * dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes) * dyndbg: fix old BUG_ON in >control parser (stable-fixes). * efi: libstub: only free priv.runtime_map when allocated (git-fixes). * extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes). * fail_function: fix wrong use of fei_attr_remove(). * fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes). * fbdev: shmobile: fix snprintf truncation (git-fixes). * fbdev: sisfb: hide unused variables (git-fixes). * firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes). * firmware: dmi-id: add a release callback function (git-fixes). * firmware: raspberrypi: Use correct device for DMA mappings (git-fixes). * fs/9p: drop inodes immediately on non-.L too (git-fixes). * fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes). * fs/9p: translate O_TRUNC into OTRUNC (git-fixes). * gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes). * gpio: wcove: Use -ENOTSUPP consistently (stable-fixes). * gpu: host1x: Do not setup DMA for virtual devices (stable-fixes). * HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes). * hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git- fixes). * hwmon: (corsair-cpro) Use a separate buffer for sending commands (git- fixes). * hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes). * hwmon: (lm70) fix links in doc and comments (git-fixes). * hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes). * i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes). * i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes). * IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes) * idpf: extend tx watchdog timeout (bsc#1224137). * iio: core: Leave private pointer NULL when no private data supplied (git- fixes). * iio: pressure: dps310: support negative temperature values (git-fixes). * Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes). * Input: ims-pcu - fix printf string overflow (git-fixes). * Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes). * iomap: Fix inline extent handling in iomap_readpage (git-fixes) * iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes) * iomap: Support partial direct I/O on user copy failures (git-fixes) * iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331) * io_uring/unix: drop usage of io_uring socket (git-fixes). * irqchip/gic-v3-its: Prevent double free on error (git-fixes). * jffs2: prevent xattr node from overflowing the eraseblock (git-fixes). * kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756). * kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959) * KEYS: trusted: Do not use WARN when encode fails (git-fixes). * KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes). * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794). * KVM: x86: Delete duplicate documentation for KVM_X86_SET_MSR_FILTER (git- fixes). * leds: pwm: Disable PWM when going to suspend (git-fixes). * libsubcmd: Fix parse-options memory leak (git-fixes). * locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes). * media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes). * media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes). * media: mc: mark the media devnode as registered from the, start (git-fixes). * media: ngene: Add dvb_ca_en50221_init return value check (git-fixes). * media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes). * mei: me: add lunar lake point M DID (stable-fixes). * mfd: intel-lpss: Revert "Add missing check for platform_get_resource" (git- fixes). * mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git- fixes). * mfd: tqmx86: Specify IO port register range more precisely (git-fixes). * mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes). * mlxbf_gige: Fix intermittent no ip issue (git-fixes). * mlxbf_gige: stop PHY during open() error paths (git-fixes). * mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes). * mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes). * mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes). * mtd: rawnand: hynix: fixed typo (git-fixes). * net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959) * netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961) * net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959) * net: nfc: remove inappropriate attrs check (stable-fixes). * net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes). * net: usb: ax88179_178a: fix link status when link is set to down/up (git- fixes). * net:usb:qmi_wwan: support Rolling modules (stable-fixes). * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes). * net: usb: sr9700: stop lying about skb->truesize (git-fixes). * net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360). * nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git- fixes). * nfc: nci: Fix uninit-value in nci_rx_work (git-fixes). * nilfs2: fix out-of-range warning (git-fixes). * nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes). * nilfs2: fix use-after-free of timer for log writer thread (git-fixes). * nilfs2: make superblock data array index computation sparse friendly (git- fixes). * nvme: ensure disabling pairs with unquiesce (bsc#1224534). * nvme: fix miss command type check (git-fixes). * nvme: fix multipath batched completion accounting (git-fixes). * nvme-multipath: fix io accounting on failover (git-fixes). * nvmet: fix ns enable/disable possible hang (git-fixes). * PCI: dwc: Detect iATU settings after getting "addr_space" resource (git- fixes). * PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes). * PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes). * PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes). * PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes). * PCI: tegra194: Fix probe path for Endpoint mode (git-fixes). * pinctrl: armada-37xx: remove an unused variable (git-fixes). * pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes). * pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes). * pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes). * pinctrl/meson: fix typo in PDM's pin name (git-fixes). * pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git- fixes). * platform/x86/intel-uncore-freq: Do not present root domain on error (git- fixes). * platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git- fixes). * powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740). * powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740). * powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740). * powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729). * powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes). * powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783). * powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869). * powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869). * power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes). * ppdev: Add an error check in register_device (git-fixes). * printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616). * qibfs: fix dentry leak (git-fixes) * RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git- fixes) * RDMA/hns: Fix deadlock on SRQ async events. (git-fixes) * RDMA/hns: Fix GMV table pagesize (git-fixes) * RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes) * RDMA/hns: Fix UAF for cq async event (git-fixes) * RDMA/hns: Modify the print level of CQE error (git-fixes) * RDMA/hns: Use complete parentheses in macros (git-fixes) * RDMA/IPoIB: Fix format truncation compilation errors (git-fixes) * RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes) * RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes) * RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes) * RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes) * RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes) * RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes) * RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes) * RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes) * regulator: bd71828: Do not overwrite runtime voltages (git-fixes). * regulator: core: fix debugfs creation regression (git-fixes). * regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes). * remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes). * Rename colliding patches before origin/cve/linux-5.14-LTSS -> SLE15-SP5 merge * Revert "cifs: reconnect work should have reference on server struct" (git- fixes, bsc#1224020). * Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes). * ring-buffer: Fix a race between readers and resize checks (git-fixes). * s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795). * s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796). * s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346). * s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139). * s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138). * sched/topology: Optimize topology_span_sane() (bsc#1225053). * scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes). * scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes). * scsi: core: Consult supported VPD page list prior to fetching page (git- fixes). * scsi: core: Fix unremoved procfs host directory regression (git-fixes). * scsi: csiostor: Avoid function pointer casts (git-fixes). * scsi: libfc: Do not schedule abort twice (git-fixes). * scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes). * scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842). * scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842). * scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842). * scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842). * scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842). * scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842). * scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842). * scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842). * scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git- fixes). * scsi: mylex: Fix sysfs buffer lengths (git-fixes). * scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes). * scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git- fixes). * selftests/pidfd: Fix config for pidfd_setns_test (git-fixes). * serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes). * serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable- fixes). * serial: max3100: Fix bitwise types (git-fixes). * serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git- fixes). * serial: max3100: Update uart_driver_registered on driver removal (git- fixes). * serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git- fixes). * serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes). * serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes). * smb3: show beginning time for per share stats (bsc#1224020). * smb: client: ensure to try all targets when finding nested links (bsc#1224020). * smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020). * smb: client: get rid of dfs code dep in namespace.c (bsc#1224020). * smb: client: get rid of dfs naming in automount code (bsc#1224020). * smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020). * smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020). * smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020). * smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020). * soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes). * soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes). * Sort recent BHI patches * speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes). * spmi: Add a check for remove callback when removing a SPMI driver (git- fixes). * spmi: hisi-spmi-controller: Do not override device identifier (git-fixes). * swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331). * swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331) * swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331) * swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331) * sysv: do not call sb_bread() with pointers_lock held (git-fixes). * thermal/drivers/tsens: Fix null pointer dereference (git-fixes). * tools/latency-collector: Fix -Wformat-security compile warns (git-fixes). * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535) * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes). * tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes). * tracing: hide unused ftrace_event_id_fops (git-fixes). * tty: n_gsm: fix missing receive state reset after mode switch (git-fixes). * tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes). * Update patches.suse/ring-buffer-Fix-a-race-between-readers-and-resize- checks.patch (bsc#1222893). * Update patches.suse/scsi-qedf-Don-t-process-stag-work-during-unload.patch (bsc#1214852) * Update patches.suse/scsi-qedf-Wait-for-stag-work-during-unload.patch (bsc#1214852) * usb: aqc111: stop lying about skb->truesize (git-fixes). * USB: core: Add hub_get() and hub_put() routines (git-fixes). * USB: core: Fix access violation during port device removal (git-fixes). * USB: core: Fix deadlock in port "disable" sysfs attribute (git-fixes). * usb: dwc3: core: Prevent phy suspend during init (Git-fixes). * usb: gadget: u_audio: Clear uac pointer when freed (git-fixes). * usb: typec: tipd: fix event checking for tps6598x (git-fixes). * usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes). * VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes). * VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes). * vmci: prevent speculation leaks by sanitizing event in event_deliver() (git- fixes). * watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git- fixes). * watchdog: ixp4xx: Make sure restart always works (git-fixes). * watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes). * wifi: ar5523: enable proper endpoint verification (git-fixes). * wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes). * wifi: ath10k: poll service ready message before failing (git-fixes). * wifi: ath10k: populate board data for WCN3990 (git-fixes). * wifi: ath11k: do not force enable power save on non-running vdevs (git- fixes). * wifi: carl9170: add a proper sanity check for endpoints (git-fixes). * wifi: carl9170: re-fix fortified-memset warning (git-fixes). * wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes). * wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes). * wifi: mwl8k: initialize cmd->addr[] properly (git-fixes). * x86/boot: Ignore NMIs during very early boot (git-fixes). * x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes). * x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git- fixes). * x86/bugs: Fix BHI documentation (git-fixes). * x86/bugs: Fix BHI handling of RRSBA (git-fixes). * x86/bugs: Fix BHI retpoline check (git-fixes). * x86/bugs: Fix return type of spectre_bhi_state() (git-fixes). * x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git- fixes). * x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git- fixes). * x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes). * x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes). * x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes). * x86/lib: Fix overflow when counting digits (git-fixes). * x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes). * x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes). * x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes). * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git- fixes). * x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes). * x86/tdx: Preserve shared bit on mprotect() (git-fixes). * xfs: add missing cmap->br_state = XFS_EXT_NORM update (git-fixes). * xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git- fixes). * xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes). * xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes). * xfs: fix inode reservation space for removing transaction (git-fixes). * xfs: shrink failure needs to hold AGI buffer (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2008=1 openSUSE-SLE-15.5-2024-2008=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2008=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2008=1 * SUSE Real Time Module 15-SP5 zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-2008=1 ## Package List: * openSUSE Leap 15.5 (noarch) * kernel-devel-rt-5.14.21-150500.13.58.1 * kernel-source-rt-5.14.21-150500.13.58.1 * openSUSE Leap 15.5 (x86_64) * ocfs2-kmp-rt-5.14.21-150500.13.58.1 * kernel-rt-vdso-5.14.21-150500.13.58.1 * reiserfs-kmp-rt-5.14.21-150500.13.58.1 * cluster-md-kmp-rt-5.14.21-150500.13.58.1 * kernel-rt-livepatch-devel-5.14.21-150500.13.58.1 * kernel-syms-rt-5.14.21-150500.13.58.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.58.1 * kernel-rt-extra-debuginfo-5.14.21-150500.13.58.1 * kernel-rt-livepatch-5.14.21-150500.13.58.1 * kernel-rt_debug-vdso-5.14.21-150500.13.58.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.58.1 * kernel-rt_debug-devel-5.14.21-150500.13.58.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.58.1 * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.58.1 * dlm-kmp-rt-5.14.21-150500.13.58.1 * kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.58.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.58.1 * kernel-livepatch-5_14_21-150500_13_58-rt-debuginfo-1-150500.11.3.1 * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.58.1 * kernel-rt-debuginfo-5.14.21-150500.13.58.1 * gfs2-kmp-rt-5.14.21-150500.13.58.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.58.1 * kernel-rt-devel-5.14.21-150500.13.58.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.58.1 * kselftests-kmp-rt-5.14.21-150500.13.58.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.58.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.58.1 * kernel-rt-extra-5.14.21-150500.13.58.1 * kernel-livepatch-SLE15-SP5-RT_Update_16-debugsource-1-150500.11.3.1 * kernel-rt-optional-debuginfo-5.14.21-150500.13.58.1 * kernel-rt-optional-5.14.21-150500.13.58.1 * kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1 * kernel-rt-debugsource-5.14.21-150500.13.58.1 * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.58.1 * openSUSE Leap 15.5 (nosrc x86_64) * kernel-rt_debug-5.14.21-150500.13.58.1 * kernel-rt-5.14.21-150500.13.58.1 * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.58.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * kernel-rt-debuginfo-5.14.21-150500.13.58.1 * kernel-rt-debugsource-5.14.21-150500.13.58.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * kernel-source-rt-5.14.21-150500.13.58.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_16-debugsource-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_13_58-rt-debuginfo-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1 * SUSE Real Time Module 15-SP5 (x86_64) * ocfs2-kmp-rt-5.14.21-150500.13.58.1 * kernel-rt-vdso-5.14.21-150500.13.58.1 * cluster-md-kmp-rt-5.14.21-150500.13.58.1 * kernel-syms-rt-5.14.21-150500.13.58.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.58.1 * kernel-rt_debug-vdso-5.14.21-150500.13.58.1 * kernel-rt_debug-devel-5.14.21-150500.13.58.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.58.1 * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.58.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.58.1 * dlm-kmp-rt-5.14.21-150500.13.58.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.58.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.58.1 * kernel-rt-debuginfo-5.14.21-150500.13.58.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.58.1 * gfs2-kmp-rt-5.14.21-150500.13.58.1 * kernel-rt-devel-5.14.21-150500.13.58.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.58.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.58.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.58.1 * kernel-rt-debugsource-5.14.21-150500.13.58.1 * SUSE Real Time Module 15-SP5 (noarch) * kernel-devel-rt-5.14.21-150500.13.58.1 * kernel-source-rt-5.14.21-150500.13.58.1 * SUSE Real Time Module 15-SP5 (nosrc x86_64) * kernel-rt_debug-5.14.21-150500.13.58.1 * kernel-rt-5.14.21-150500.13.58.1 ## References: * https://www.suse.com/security/cve/CVE-2020-36788.html * https://www.suse.com/security/cve/CVE-2021-39698.html * https://www.suse.com/security/cve/CVE-2021-4148.html * https://www.suse.com/security/cve/CVE-2021-42327.html * https://www.suse.com/security/cve/CVE-2021-43056.html * https://www.suse.com/security/cve/CVE-2021-47200.html * https://www.suse.com/security/cve/CVE-2021-47358.html * https://www.suse.com/security/cve/CVE-2021-47359.html * https://www.suse.com/security/cve/CVE-2021-47360.html * https://www.suse.com/security/cve/CVE-2021-47361.html * https://www.suse.com/security/cve/CVE-2021-47362.html * https://www.suse.com/security/cve/CVE-2021-47363.html * https://www.suse.com/security/cve/CVE-2021-47364.html * https://www.suse.com/security/cve/CVE-2021-47365.html * https://www.suse.com/security/cve/CVE-2021-47366.html * https://www.suse.com/security/cve/CVE-2021-47367.html * https://www.suse.com/security/cve/CVE-2021-47368.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47370.html * https://www.suse.com/security/cve/CVE-2021-47371.html * https://www.suse.com/security/cve/CVE-2021-47372.html * https://www.suse.com/security/cve/CVE-2021-47373.html * https://www.suse.com/security/cve/CVE-2021-47374.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47376.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47379.html * https://www.suse.com/security/cve/CVE-2021-47380.html * https://www.suse.com/security/cve/CVE-2021-47381.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47384.html * https://www.suse.com/security/cve/CVE-2021-47385.html * https://www.suse.com/security/cve/CVE-2021-47386.html * https://www.suse.com/security/cve/CVE-2021-47387.html * https://www.suse.com/security/cve/CVE-2021-47388.html * https://www.suse.com/security/cve/CVE-2021-47389.html * https://www.suse.com/security/cve/CVE-2021-47390.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47392.html * https://www.suse.com/security/cve/CVE-2021-47393.html * https://www.suse.com/security/cve/CVE-2021-47394.html * https://www.suse.com/security/cve/CVE-2021-47395.html * https://www.suse.com/security/cve/CVE-2021-47396.html * https://www.suse.com/security/cve/CVE-2021-47397.html * https://www.suse.com/security/cve/CVE-2021-47398.html * https://www.suse.com/security/cve/CVE-2021-47399.html * https://www.suse.com/security/cve/CVE-2021-47400.html * https://www.suse.com/security/cve/CVE-2021-47401.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47403.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47405.html * https://www.suse.com/security/cve/CVE-2021-47406.html * https://www.suse.com/security/cve/CVE-2021-47407.html * https://www.suse.com/security/cve/CVE-2021-47408.html * https://www.suse.com/security/cve/CVE-2021-47409.html * https://www.suse.com/security/cve/CVE-2021-47410.html * https://www.suse.com/security/cve/CVE-2021-47412.html * https://www.suse.com/security/cve/CVE-2021-47413.html * https://www.suse.com/security/cve/CVE-2021-47414.html * https://www.suse.com/security/cve/CVE-2021-47415.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47417.html * https://www.suse.com/security/cve/CVE-2021-47418.html * https://www.suse.com/security/cve/CVE-2021-47419.html * https://www.suse.com/security/cve/CVE-2021-47420.html * https://www.suse.com/security/cve/CVE-2021-47421.html * https://www.suse.com/security/cve/CVE-2021-47422.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47425.html * https://www.suse.com/security/cve/CVE-2021-47426.html * https://www.suse.com/security/cve/CVE-2021-47427.html * https://www.suse.com/security/cve/CVE-2021-47428.html * https://www.suse.com/security/cve/CVE-2021-47429.html * https://www.suse.com/security/cve/CVE-2021-47430.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47433.html * https://www.suse.com/security/cve/CVE-2021-47434.html * https://www.suse.com/security/cve/CVE-2021-47435.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47437.html * https://www.suse.com/security/cve/CVE-2021-47438.html * https://www.suse.com/security/cve/CVE-2021-47439.html * https://www.suse.com/security/cve/CVE-2021-47440.html * https://www.suse.com/security/cve/CVE-2021-47441.html * https://www.suse.com/security/cve/CVE-2021-47442.html * https://www.suse.com/security/cve/CVE-2021-47443.html * https://www.suse.com/security/cve/CVE-2021-47444.html * https://www.suse.com/security/cve/CVE-2021-47445.html * https://www.suse.com/security/cve/CVE-2021-47446.html * https://www.suse.com/security/cve/CVE-2021-47447.html * https://www.suse.com/security/cve/CVE-2021-47448.html * https://www.suse.com/security/cve/CVE-2021-47449.html * https://www.suse.com/security/cve/CVE-2021-47450.html * https://www.suse.com/security/cve/CVE-2021-47451.html * https://www.suse.com/security/cve/CVE-2021-47452.html * https://www.suse.com/security/cve/CVE-2021-47453.html * https://www.suse.com/security/cve/CVE-2021-47454.html * https://www.suse.com/security/cve/CVE-2021-47455.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47457.html * https://www.suse.com/security/cve/CVE-2021-47458.html * https://www.suse.com/security/cve/CVE-2021-47459.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47461.html * https://www.suse.com/security/cve/CVE-2021-47462.html * https://www.suse.com/security/cve/CVE-2021-47463.html * https://www.suse.com/security/cve/CVE-2021-47464.html * https://www.suse.com/security/cve/CVE-2021-47465.html * https://www.suse.com/security/cve/CVE-2021-47466.html * https://www.suse.com/security/cve/CVE-2021-47467.html * https://www.suse.com/security/cve/CVE-2021-47468.html * https://www.suse.com/security/cve/CVE-2021-47469.html * https://www.suse.com/security/cve/CVE-2021-47470.html * https://www.suse.com/security/cve/CVE-2021-47471.html * https://www.suse.com/security/cve/CVE-2021-47472.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47474.html * https://www.suse.com/security/cve/CVE-2021-47475.html * https://www.suse.com/security/cve/CVE-2021-47476.html * https://www.suse.com/security/cve/CVE-2021-47477.html * https://www.suse.com/security/cve/CVE-2021-47478.html * https://www.suse.com/security/cve/CVE-2021-47479.html * https://www.suse.com/security/cve/CVE-2021-47480.html * https://www.suse.com/security/cve/CVE-2021-47481.html * https://www.suse.com/security/cve/CVE-2021-47482.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47484.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47486.html * https://www.suse.com/security/cve/CVE-2021-47488.html * https://www.suse.com/security/cve/CVE-2021-47489.html * https://www.suse.com/security/cve/CVE-2021-47490.html * https://www.suse.com/security/cve/CVE-2021-47491.html * https://www.suse.com/security/cve/CVE-2021-47492.html * https://www.suse.com/security/cve/CVE-2021-47493.html * https://www.suse.com/security/cve/CVE-2021-47494.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47498.html * https://www.suse.com/security/cve/CVE-2021-47499.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47501.html * https://www.suse.com/security/cve/CVE-2021-47502.html * https://www.suse.com/security/cve/CVE-2021-47503.html * https://www.suse.com/security/cve/CVE-2021-47504.html * https://www.suse.com/security/cve/CVE-2021-47505.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47507.html * https://www.suse.com/security/cve/CVE-2021-47508.html * https://www.suse.com/security/cve/CVE-2021-47509.html * https://www.suse.com/security/cve/CVE-2021-47510.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47512.html * https://www.suse.com/security/cve/CVE-2021-47513.html * https://www.suse.com/security/cve/CVE-2021-47514.html * https://www.suse.com/security/cve/CVE-2021-47516.html * https://www.suse.com/security/cve/CVE-2021-47518.html * https://www.suse.com/security/cve/CVE-2021-47520.html * https://www.suse.com/security/cve/CVE-2021-47521.html * https://www.suse.com/security/cve/CVE-2021-47522.html * https://www.suse.com/security/cve/CVE-2021-47523.html * https://www.suse.com/security/cve/CVE-2021-47524.html * https://www.suse.com/security/cve/CVE-2021-47525.html * https://www.suse.com/security/cve/CVE-2021-47526.html * https://www.suse.com/security/cve/CVE-2021-47527.html * https://www.suse.com/security/cve/CVE-2021-47528.html * https://www.suse.com/security/cve/CVE-2021-47529.html * https://www.suse.com/security/cve/CVE-2021-47530.html * https://www.suse.com/security/cve/CVE-2021-47531.html * https://www.suse.com/security/cve/CVE-2021-47532.html * https://www.suse.com/security/cve/CVE-2021-47533.html * https://www.suse.com/security/cve/CVE-2021-47534.html * https://www.suse.com/security/cve/CVE-2021-47535.html * https://www.suse.com/security/cve/CVE-2021-47536.html * https://www.suse.com/security/cve/CVE-2021-47537.html * https://www.suse.com/security/cve/CVE-2021-47540.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47542.html * https://www.suse.com/security/cve/CVE-2021-47544.html * https://www.suse.com/security/cve/CVE-2021-47548.html * https://www.suse.com/security/cve/CVE-2021-47549.html * https://www.suse.com/security/cve/CVE-2021-47550.html * https://www.suse.com/security/cve/CVE-2021-47551.html * https://www.suse.com/security/cve/CVE-2021-47552.html * https://www.suse.com/security/cve/CVE-2021-47553.html * https://www.suse.com/security/cve/CVE-2021-47554.html * https://www.suse.com/security/cve/CVE-2021-47555.html * https://www.suse.com/security/cve/CVE-2021-47556.html * https://www.suse.com/security/cve/CVE-2021-47557.html * https://www.suse.com/security/cve/CVE-2021-47558.html * https://www.suse.com/security/cve/CVE-2021-47559.html * https://www.suse.com/security/cve/CVE-2021-47560.html * https://www.suse.com/security/cve/CVE-2021-47562.html * https://www.suse.com/security/cve/CVE-2021-47563.html * https://www.suse.com/security/cve/CVE-2021-47564.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2021-47569.html * https://www.suse.com/security/cve/CVE-2022-48633.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2022-48669.html * https://www.suse.com/security/cve/CVE-2022-48689.html * https://www.suse.com/security/cve/CVE-2022-48691.html * https://www.suse.com/security/cve/CVE-2022-48699.html * https://www.suse.com/security/cve/CVE-2022-48705.html * https://www.suse.com/security/cve/CVE-2022-48708.html * https://www.suse.com/security/cve/CVE-2022-48709.html * https://www.suse.com/security/cve/CVE-2022-48710.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-42755.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52586.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52618.html * https://www.suse.com/security/cve/CVE-2023-52642.html * https://www.suse.com/security/cve/CVE-2023-52643.html * https://www.suse.com/security/cve/CVE-2023-52644.html * https://www.suse.com/security/cve/CVE-2023-52646.html * https://www.suse.com/security/cve/CVE-2023-52650.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52656.html * https://www.suse.com/security/cve/CVE-2023-52657.html * https://www.suse.com/security/cve/CVE-2023-52659.html * https://www.suse.com/security/cve/CVE-2023-52660.html * https://www.suse.com/security/cve/CVE-2023-52661.html * https://www.suse.com/security/cve/CVE-2023-52662.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52669.html * https://www.suse.com/security/cve/CVE-2023-52671.html * https://www.suse.com/security/cve/CVE-2023-52674.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52678.html * https://www.suse.com/security/cve/CVE-2023-52679.html * https://www.suse.com/security/cve/CVE-2023-52680.html * https://www.suse.com/security/cve/CVE-2023-52683.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52692.html * https://www.suse.com/security/cve/CVE-2023-52693.html * https://www.suse.com/security/cve/CVE-2023-52694.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52698.html * https://www.suse.com/security/cve/CVE-2023-52699.html * https://www.suse.com/security/cve/CVE-2023-52702.html * https://www.suse.com/security/cve/CVE-2023-52703.html * https://www.suse.com/security/cve/CVE-2023-52705.html * https://www.suse.com/security/cve/CVE-2023-52707.html * https://www.suse.com/security/cve/CVE-2023-52708.html * https://www.suse.com/security/cve/CVE-2023-52730.html * https://www.suse.com/security/cve/CVE-2023-52731.html * https://www.suse.com/security/cve/CVE-2023-52732.html * https://www.suse.com/security/cve/CVE-2023-52733.html * https://www.suse.com/security/cve/CVE-2023-52736.html * https://www.suse.com/security/cve/CVE-2023-52738.html * https://www.suse.com/security/cve/CVE-2023-52739.html * https://www.suse.com/security/cve/CVE-2023-52740.html * https://www.suse.com/security/cve/CVE-2023-52741.html * https://www.suse.com/security/cve/CVE-2023-52742.html * https://www.suse.com/security/cve/CVE-2023-52743.html * https://www.suse.com/security/cve/CVE-2023-52744.html * https://www.suse.com/security/cve/CVE-2023-52745.html * https://www.suse.com/security/cve/CVE-2023-52746.html * https://www.suse.com/security/cve/CVE-2023-52747.html * https://www.suse.com/security/cve/CVE-2023-52753.html * https://www.suse.com/security/cve/CVE-2023-52754.html * https://www.suse.com/security/cve/CVE-2023-52756.html * https://www.suse.com/security/cve/CVE-2023-52757.html * https://www.suse.com/security/cve/CVE-2023-52759.html * https://www.suse.com/security/cve/CVE-2023-52763.html * https://www.suse.com/security/cve/CVE-2023-52764.html * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52773.html * https://www.suse.com/security/cve/CVE-2023-52774.html * https://www.suse.com/security/cve/CVE-2023-52777.html * https://www.suse.com/security/cve/CVE-2023-52781.html * https://www.suse.com/security/cve/CVE-2023-52788.html * https://www.suse.com/security/cve/CVE-2023-52789.html * https://www.suse.com/security/cve/CVE-2023-52791.html * https://www.suse.com/security/cve/CVE-2023-52795.html * https://www.suse.com/security/cve/CVE-2023-52796.html * https://www.suse.com/security/cve/CVE-2023-52798.html * https://www.suse.com/security/cve/CVE-2023-52799.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52803.html * https://www.suse.com/security/cve/CVE-2023-52804.html * https://www.suse.com/security/cve/CVE-2023-52805.html * https://www.suse.com/security/cve/CVE-2023-52806.html * https://www.suse.com/security/cve/CVE-2023-52807.html * https://www.suse.com/security/cve/CVE-2023-52808.html * https://www.suse.com/security/cve/CVE-2023-52809.html * https://www.suse.com/security/cve/CVE-2023-52810.html * https://www.suse.com/security/cve/CVE-2023-52811.html * https://www.suse.com/security/cve/CVE-2023-52814.html * https://www.suse.com/security/cve/CVE-2023-52815.html * https://www.suse.com/security/cve/CVE-2023-52816.html * https://www.suse.com/security/cve/CVE-2023-52817.html * https://www.suse.com/security/cve/CVE-2023-52818.html * https://www.suse.com/security/cve/CVE-2023-52819.html * https://www.suse.com/security/cve/CVE-2023-52821.html * https://www.suse.com/security/cve/CVE-2023-52825.html * https://www.suse.com/security/cve/CVE-2023-52826.html * https://www.suse.com/security/cve/CVE-2023-52832.html * https://www.suse.com/security/cve/CVE-2023-52833.html * https://www.suse.com/security/cve/CVE-2023-52834.html * https://www.suse.com/security/cve/CVE-2023-52838.html * https://www.suse.com/security/cve/CVE-2023-52840.html * https://www.suse.com/security/cve/CVE-2023-52841.html * https://www.suse.com/security/cve/CVE-2023-52844.html * https://www.suse.com/security/cve/CVE-2023-52847.html * https://www.suse.com/security/cve/CVE-2023-52851.html * https://www.suse.com/security/cve/CVE-2023-52853.html * https://www.suse.com/security/cve/CVE-2023-52854.html * https://www.suse.com/security/cve/CVE-2023-52855.html * https://www.suse.com/security/cve/CVE-2023-52856.html * https://www.suse.com/security/cve/CVE-2023-52858.html * https://www.suse.com/security/cve/CVE-2023-52860.html * https://www.suse.com/security/cve/CVE-2023-52861.html * https://www.suse.com/security/cve/CVE-2023-52864.html * https://www.suse.com/security/cve/CVE-2023-52865.html * https://www.suse.com/security/cve/CVE-2023-52867.html * https://www.suse.com/security/cve/CVE-2023-52868.html * https://www.suse.com/security/cve/CVE-2023-52870.html * https://www.suse.com/security/cve/CVE-2023-52871.html * https://www.suse.com/security/cve/CVE-2023-52872.html * https://www.suse.com/security/cve/CVE-2023-52873.html * https://www.suse.com/security/cve/CVE-2023-52875.html * https://www.suse.com/security/cve/CVE-2023-52876.html * https://www.suse.com/security/cve/CVE-2023-52877.html * https://www.suse.com/security/cve/CVE-2023-52878.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2024-2201.html * https://www.suse.com/security/cve/CVE-2024-26597.html * https://www.suse.com/security/cve/CVE-2024-26643.html * https://www.suse.com/security/cve/CVE-2024-26679.html * https://www.suse.com/security/cve/CVE-2024-26692.html * https://www.suse.com/security/cve/CVE-2024-26698.html * https://www.suse.com/security/cve/CVE-2024-26700.html * https://www.suse.com/security/cve/CVE-2024-26715.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26742.html * https://www.suse.com/security/cve/CVE-2024-26748.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26775.html * https://www.suse.com/security/cve/CVE-2024-26777.html * https://www.suse.com/security/cve/CVE-2024-26778.html * https://www.suse.com/security/cve/CVE-2024-26788.html * https://www.suse.com/security/cve/CVE-2024-26791.html * https://www.suse.com/security/cve/CVE-2024-26801.html * https://www.suse.com/security/cve/CVE-2024-26822.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26829.html * https://www.suse.com/security/cve/CVE-2024-26838.html * https://www.suse.com/security/cve/CVE-2024-26839.html * https://www.suse.com/security/cve/CVE-2024-26840.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26859.html * https://www.suse.com/security/cve/CVE-2024-26870.html * https://www.suse.com/security/cve/CVE-2024-26874.html * https://www.suse.com/security/cve/CVE-2024-26876.html * https://www.suse.com/security/cve/CVE-2024-26877.html * https://www.suse.com/security/cve/CVE-2024-26880.html * https://www.suse.com/security/cve/CVE-2024-26889.html * https://www.suse.com/security/cve/CVE-2024-26894.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26907.html * https://www.suse.com/security/cve/CVE-2024-26915.html * https://www.suse.com/security/cve/CVE-2024-26916.html * https://www.suse.com/security/cve/CVE-2024-26919.html * https://www.suse.com/security/cve/CVE-2024-26920.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26922.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26928.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-26931.html * https://www.suse.com/security/cve/CVE-2024-26933.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-269355.html * https://www.suse.com/security/cve/CVE-2024-26937.html * https://www.suse.com/security/cve/CVE-2024-26938.html * https://www.suse.com/security/cve/CVE-2024-26939.html * https://www.suse.com/security/cve/CVE-2024-26940.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26958.html * https://www.suse.com/security/cve/CVE-2024-26964.html * https://www.suse.com/security/cve/CVE-2024-26974.html * https://www.suse.com/security/cve/CVE-2024-26977.html * https://www.suse.com/security/cve/CVE-2024-26979.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26988.html * https://www.suse.com/security/cve/CVE-2024-26989.html * https://www.suse.com/security/cve/CVE-2024-26994.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-26997.html * https://www.suse.com/security/cve/CVE-2024-26999.html * https://www.suse.com/security/cve/CVE-2024-27000.html * https://www.suse.com/security/cve/CVE-2024-27001.html * https://www.suse.com/security/cve/CVE-2024-27004.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27028.html * https://www.suse.com/security/cve/CVE-2024-27037.html * https://www.suse.com/security/cve/CVE-2024-27042.html * https://www.suse.com/security/cve/CVE-2024-27045.html * https://www.suse.com/security/cve/CVE-2024-27047.html * https://www.suse.com/security/cve/CVE-2024-27051.html * https://www.suse.com/security/cve/CVE-2024-27052.html * https://www.suse.com/security/cve/CVE-2024-27053.html * https://www.suse.com/security/cve/CVE-2024-27054.html * https://www.suse.com/security/cve/CVE-2024-27059.html * https://www.suse.com/security/cve/CVE-2024-27072.html * https://www.suse.com/security/cve/CVE-2024-27073.html * https://www.suse.com/security/cve/CVE-2024-27074.html * https://www.suse.com/security/cve/CVE-2024-27075.html * https://www.suse.com/security/cve/CVE-2024-27076.html * https://www.suse.com/security/cve/CVE-2024-27077.html * https://www.suse.com/security/cve/CVE-2024-27078.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27393.html * https://www.suse.com/security/cve/CVE-2024-27395.html * https://www.suse.com/security/cve/CVE-2024-27396.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27399.html * https://www.suse.com/security/cve/CVE-2024-27400.html * https://www.suse.com/security/cve/CVE-2024-27401.html * https://www.suse.com/security/cve/CVE-2024-27405.html * https://www.suse.com/security/cve/CVE-2024-27410.html * https://www.suse.com/security/cve/CVE-2024-27412.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-27416.html * https://www.suse.com/security/cve/CVE-2024-27417.html * https://www.suse.com/security/cve/CVE-2024-27419.html * https://www.suse.com/security/cve/CVE-2024-27431.html * https://www.suse.com/security/cve/CVE-2024-27435.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35791.html * https://www.suse.com/security/cve/CVE-2024-35796.html * https://www.suse.com/security/cve/CVE-2024-35799.html * https://www.suse.com/security/cve/CVE-2024-35801.html * https://www.suse.com/security/cve/CVE-2024-35804.html * https://www.suse.com/security/cve/CVE-2024-35806.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35812.html * https://www.suse.com/security/cve/CVE-2024-35813.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35821.html * https://www.suse.com/security/cve/CVE-2024-35822.html * https://www.suse.com/security/cve/CVE-2024-35823.html * https://www.suse.com/security/cve/CVE-2024-35825.html * https://www.suse.com/security/cve/CVE-2024-35828.html * https://www.suse.com/security/cve/CVE-2024-35829.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35833.html * https://www.suse.com/security/cve/CVE-2024-35845.html * https://www.suse.com/security/cve/CVE-2024-35847.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35851.html * https://www.suse.com/security/cve/CVE-2024-35852.html * https://www.suse.com/security/cve/CVE-2024-35854.html * https://www.suse.com/security/cve/CVE-2024-35860.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35865.html * https://www.suse.com/security/cve/CVE-2024-35866.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35868.html * https://www.suse.com/security/cve/CVE-2024-35869.html * https://www.suse.com/security/cve/CVE-2024-35870.html * https://www.suse.com/security/cve/CVE-2024-35872.html * https://www.suse.com/security/cve/CVE-2024-35875.html * https://www.suse.com/security/cve/CVE-2024-35877.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35879.html * https://www.suse.com/security/cve/CVE-2024-35885.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35901.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35907.html * https://www.suse.com/security/cve/CVE-2024-35912.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35915.html * https://www.suse.com/security/cve/CVE-2024-35922.html * https://www.suse.com/security/cve/CVE-2024-35924.html * https://www.suse.com/security/cve/CVE-2024-35930.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35933.html * https://www.suse.com/security/cve/CVE-2024-35935.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35938.html * https://www.suse.com/security/cve/CVE-2024-35939.html * https://www.suse.com/security/cve/CVE-2024-35940.html * https://www.suse.com/security/cve/CVE-2024-35943.html * https://www.suse.com/security/cve/CVE-2024-35944.html * https://www.suse.com/security/cve/CVE-2024-35947.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-35951.html * https://www.suse.com/security/cve/CVE-2024-35952.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35959.html * https://www.suse.com/security/cve/CVE-2024-35963.html * https://www.suse.com/security/cve/CVE-2024-35964.html * https://www.suse.com/security/cve/CVE-2024-35965.html * https://www.suse.com/security/cve/CVE-2024-35966.html * https://www.suse.com/security/cve/CVE-2024-35967.html * https://www.suse.com/security/cve/CVE-2024-35969.html * https://www.suse.com/security/cve/CVE-2024-35973.html * https://www.suse.com/security/cve/CVE-2024-35976.html * https://www.suse.com/security/cve/CVE-2024-35978.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-35989.html * https://www.suse.com/security/cve/CVE-2024-35990.html * https://www.suse.com/security/cve/CVE-2024-35998.html * https://www.suse.com/security/cve/CVE-2024-35999.html * https://www.suse.com/security/cve/CVE-2024-36006.html * https://www.suse.com/security/cve/CVE-2024-36007.html * https://www.suse.com/security/cve/CVE-2024-36012.html * https://www.suse.com/security/cve/CVE-2024-36014.html * https://www.suse.com/security/cve/CVE-2024-36015.html * https://www.suse.com/security/cve/CVE-2024-36016.html * https://www.suse.com/security/cve/CVE-2024-36026.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36032.html * https://www.suse.com/security/cve/CVE-2024-36880.html * https://www.suse.com/security/cve/CVE-2024-36893.html * https://www.suse.com/security/cve/CVE-2024-36896.html * https://www.suse.com/security/cve/CVE-2024-36897.html * https://www.suse.com/security/cve/CVE-2024-36906.html * https://www.suse.com/security/cve/CVE-2024-36918.html * https://www.suse.com/security/cve/CVE-2024-36924.html * https://www.suse.com/security/cve/CVE-2024-36926.html * https://www.suse.com/security/cve/CVE-2024-36928.html * https://www.suse.com/security/cve/CVE-2024-36931.html * https://www.suse.com/security/cve/CVE-2024-36938.html * https://www.suse.com/security/cve/CVE-2024-36940.html * https://www.suse.com/security/cve/CVE-2024-36941.html * https://www.suse.com/security/cve/CVE-2024-36942.html * https://www.suse.com/security/cve/CVE-2024-36944.html * https://www.suse.com/security/cve/CVE-2024-36947.html * https://www.suse.com/security/cve/CVE-2024-36950.html * https://www.suse.com/security/cve/CVE-2024-36952.html * https://www.suse.com/security/cve/CVE-2024-36955.html * https://www.suse.com/security/cve/CVE-2024-36959.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1174585 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1187716 * https://bugzilla.suse.com/show_bug.cgi?id=1190569 * https://bugzilla.suse.com/show_bug.cgi?id=1191949 * https://bugzilla.suse.com/show_bug.cgi?id=1192107 * https://bugzilla.suse.com/show_bug.cgi?id=1193983 * https://bugzilla.suse.com/show_bug.cgi?id=1194288 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1196956 * https://bugzilla.suse.com/show_bug.cgi?id=1197915 * https://bugzilla.suse.com/show_bug.cgi?id=1200465 * https://bugzilla.suse.com/show_bug.cgi?id=1205205 * https://bugzilla.suse.com/show_bug.cgi?id=1207284 * https://bugzilla.suse.com/show_bug.cgi?id=1207361 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1208149 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1209799 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1209980 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1213863 * https://bugzilla.suse.com/show_bug.cgi?id=1214852 * https://bugzilla.suse.com/show_bug.cgi?id=1215322 * https://bugzilla.suse.com/show_bug.cgi?id=1215702 * https://bugzilla.suse.com/show_bug.cgi?id=1216358 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217339 * https://bugzilla.suse.com/show_bug.cgi?id=1217515 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1220021 * https://bugzilla.suse.com/show_bug.cgi?id=1220267 * https://bugzilla.suse.com/show_bug.cgi?id=1220363 * https://bugzilla.suse.com/show_bug.cgi?id=1220783 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221081 * https://bugzilla.suse.com/show_bug.cgi?id=1221615 * https://bugzilla.suse.com/show_bug.cgi?id=1221777 * https://bugzilla.suse.com/show_bug.cgi?id=1221816 * https://bugzilla.suse.com/show_bug.cgi?id=1221829 * https://bugzilla.suse.com/show_bug.cgi?id=1222011 * https://bugzilla.suse.com/show_bug.cgi?id=1222374 * https://bugzilla.suse.com/show_bug.cgi?id=1222385 * https://bugzilla.suse.com/show_bug.cgi?id=1222413 * https://bugzilla.suse.com/show_bug.cgi?id=1222464 * https://bugzilla.suse.com/show_bug.cgi?id=1222513 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222561 * https://bugzilla.suse.com/show_bug.cgi?id=1222608 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222627 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222765 * https://bugzilla.suse.com/show_bug.cgi?id=1222770 * https://bugzilla.suse.com/show_bug.cgi?id=1222783 * https://bugzilla.suse.com/show_bug.cgi?id=1222793 * https://bugzilla.suse.com/show_bug.cgi?id=1222838 * https://bugzilla.suse.com/show_bug.cgi?id=1222870 * https://bugzilla.suse.com/show_bug.cgi?id=1222893 * https://bugzilla.suse.com/show_bug.cgi?id=1222960 * https://bugzilla.suse.com/show_bug.cgi?id=1222961 * https://bugzilla.suse.com/show_bug.cgi?id=1222974 * https://bugzilla.suse.com/show_bug.cgi?id=1222975 * https://bugzilla.suse.com/show_bug.cgi?id=1222976 * https://bugzilla.suse.com/show_bug.cgi?id=1223011 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223027 * https://bugzilla.suse.com/show_bug.cgi?id=1223031 * https://bugzilla.suse.com/show_bug.cgi?id=1223043 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223048 * https://bugzilla.suse.com/show_bug.cgi?id=1223049 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223113 * https://bugzilla.suse.com/show_bug.cgi?id=1223119 * https://bugzilla.suse.com/show_bug.cgi?id=1223137 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223140 * https://bugzilla.suse.com/show_bug.cgi?id=1223188 * https://bugzilla.suse.com/show_bug.cgi?id=1223203 * https://bugzilla.suse.com/show_bug.cgi?id=1223207 * https://bugzilla.suse.com/show_bug.cgi?id=1223315 * https://bugzilla.suse.com/show_bug.cgi?id=1223360 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223432 * https://bugzilla.suse.com/show_bug.cgi?id=1223489 * https://bugzilla.suse.com/show_bug.cgi?id=1223505 * https://bugzilla.suse.com/show_bug.cgi?id=1223532 * https://bugzilla.suse.com/show_bug.cgi?id=1223575 * https://bugzilla.suse.com/show_bug.cgi?id=1223595 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223627 * https://bugzilla.suse.com/show_bug.cgi?id=1223628 * https://bugzilla.suse.com/show_bug.cgi?id=1223631 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223638 * https://bugzilla.suse.com/show_bug.cgi?id=1223650 * https://bugzilla.suse.com/show_bug.cgi?id=1223653 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223670 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1223677 * https://bugzilla.suse.com/show_bug.cgi?id=1223678 * https://bugzilla.suse.com/show_bug.cgi?id=1223679 * https://bugzilla.suse.com/show_bug.cgi?id=1223698 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223717 * https://bugzilla.suse.com/show_bug.cgi?id=1223718 * https://bugzilla.suse.com/show_bug.cgi?id=1223737 * https://bugzilla.suse.com/show_bug.cgi?id=1223738 * https://bugzilla.suse.com/show_bug.cgi?id=1223741 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223747 * https://bugzilla.suse.com/show_bug.cgi?id=1223748 * https://bugzilla.suse.com/show_bug.cgi?id=1223750 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223754 * https://bugzilla.suse.com/show_bug.cgi?id=1223756 * https://bugzilla.suse.com/show_bug.cgi?id=1223757 * https://bugzilla.suse.com/show_bug.cgi?id=1223762 * https://bugzilla.suse.com/show_bug.cgi?id=1223769 * https://bugzilla.suse.com/show_bug.cgi?id=1223770 * https://bugzilla.suse.com/show_bug.cgi?id=1223779 * https://bugzilla.suse.com/show_bug.cgi?id=1223780 * https://bugzilla.suse.com/show_bug.cgi?id=1223781 * https://bugzilla.suse.com/show_bug.cgi?id=1223788 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223819 * https://bugzilla.suse.com/show_bug.cgi?id=1223823 * https://bugzilla.suse.com/show_bug.cgi?id=1223826 * https://bugzilla.suse.com/show_bug.cgi?id=1223828 * https://bugzilla.suse.com/show_bug.cgi?id=1223829 * https://bugzilla.suse.com/show_bug.cgi?id=1223837 * https://bugzilla.suse.com/show_bug.cgi?id=1223842 * https://bugzilla.suse.com/show_bug.cgi?id=1223843 * https://bugzilla.suse.com/show_bug.cgi?id=1223844 * https://bugzilla.suse.com/show_bug.cgi?id=1223847 * https://bugzilla.suse.com/show_bug.cgi?id=1223858 * https://bugzilla.suse.com/show_bug.cgi?id=1223875 * https://bugzilla.suse.com/show_bug.cgi?id=1223879 * https://bugzilla.suse.com/show_bug.cgi?id=1223895 * https://bugzilla.suse.com/show_bug.cgi?id=1223959 * https://bugzilla.suse.com/show_bug.cgi?id=1223961 * https://bugzilla.suse.com/show_bug.cgi?id=1223991 * https://bugzilla.suse.com/show_bug.cgi?id=1223996 * https://bugzilla.suse.com/show_bug.cgi?id=1224020 * https://bugzilla.suse.com/show_bug.cgi?id=1224076 * https://bugzilla.suse.com/show_bug.cgi?id=1224096 * https://bugzilla.suse.com/show_bug.cgi?id=1224098 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224137 * https://bugzilla.suse.com/show_bug.cgi?id=1224166 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224177 * https://bugzilla.suse.com/show_bug.cgi?id=1224180 * https://bugzilla.suse.com/show_bug.cgi?id=1224181 * https://bugzilla.suse.com/show_bug.cgi?id=1224187 * https://bugzilla.suse.com/show_bug.cgi?id=1224331 * https://bugzilla.suse.com/show_bug.cgi?id=1224346 * https://bugzilla.suse.com/show_bug.cgi?id=1224423 * https://bugzilla.suse.com/show_bug.cgi?id=1224432 * https://bugzilla.suse.com/show_bug.cgi?id=1224437 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224442 * https://bugzilla.suse.com/show_bug.cgi?id=1224443 * https://bugzilla.suse.com/show_bug.cgi?id=1224445 * https://bugzilla.suse.com/show_bug.cgi?id=1224449 * https://bugzilla.suse.com/show_bug.cgi?id=1224479 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224487 * https://bugzilla.suse.com/show_bug.cgi?id=1224488 * https://bugzilla.suse.com/show_bug.cgi?id=1224492 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224495 * https://bugzilla.suse.com/show_bug.cgi?id=1224502 * https://bugzilla.suse.com/show_bug.cgi?id=1224508 * https://bugzilla.suse.com/show_bug.cgi?id=1224509 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224519 * https://bugzilla.suse.com/show_bug.cgi?id=1224524 * https://bugzilla.suse.com/show_bug.cgi?id=1224525 * https://bugzilla.suse.com/show_bug.cgi?id=1224530 * https://bugzilla.suse.com/show_bug.cgi?id=1224531 * https://bugzilla.suse.com/show_bug.cgi?id=1224534 * https://bugzilla.suse.com/show_bug.cgi?id=1224535 * https://bugzilla.suse.com/show_bug.cgi?id=1224537 * https://bugzilla.suse.com/show_bug.cgi?id=1224541 * https://bugzilla.suse.com/show_bug.cgi?id=1224543 * https://bugzilla.suse.com/show_bug.cgi?id=1224549 * https://bugzilla.suse.com/show_bug.cgi?id=1224550 * https://bugzilla.suse.com/show_bug.cgi?id=1224558 * https://bugzilla.suse.com/show_bug.cgi?id=1224559 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224567 * https://bugzilla.suse.com/show_bug.cgi?id=1224571 * https://bugzilla.suse.com/show_bug.cgi?id=1224575 * https://bugzilla.suse.com/show_bug.cgi?id=1224576 * https://bugzilla.suse.com/show_bug.cgi?id=1224579 * https://bugzilla.suse.com/show_bug.cgi?id=1224580 * https://bugzilla.suse.com/show_bug.cgi?id=1224581 * https://bugzilla.suse.com/show_bug.cgi?id=1224582 * https://bugzilla.suse.com/show_bug.cgi?id=1224586 * https://bugzilla.suse.com/show_bug.cgi?id=1224587 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224598 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224608 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224615 * https://bugzilla.suse.com/show_bug.cgi?id=1224617 * https://bugzilla.suse.com/show_bug.cgi?id=1224618 * https://bugzilla.suse.com/show_bug.cgi?id=1224621 * https://bugzilla.suse.com/show_bug.cgi?id=1224622 * https://bugzilla.suse.com/show_bug.cgi?id=1224624 * https://bugzilla.suse.com/show_bug.cgi?id=1224627 * https://bugzilla.suse.com/show_bug.cgi?id=1224628 * https://bugzilla.suse.com/show_bug.cgi?id=1224629 * https://bugzilla.suse.com/show_bug.cgi?id=1224632 * https://bugzilla.suse.com/show_bug.cgi?id=1224636 * https://bugzilla.suse.com/show_bug.cgi?id=1224637 * https://bugzilla.suse.com/show_bug.cgi?id=1224638 * https://bugzilla.suse.com/show_bug.cgi?id=1224640 * https://bugzilla.suse.com/show_bug.cgi?id=1224643 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224645 * https://bugzilla.suse.com/show_bug.cgi?id=1224647 * https://bugzilla.suse.com/show_bug.cgi?id=1224648 * https://bugzilla.suse.com/show_bug.cgi?id=1224649 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224651 * https://bugzilla.suse.com/show_bug.cgi?id=1224657 * https://bugzilla.suse.com/show_bug.cgi?id=1224659 * https://bugzilla.suse.com/show_bug.cgi?id=1224660 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224664 * https://bugzilla.suse.com/show_bug.cgi?id=1224665 * https://bugzilla.suse.com/show_bug.cgi?id=1224666 * https://bugzilla.suse.com/show_bug.cgi?id=1224667 * https://bugzilla.suse.com/show_bug.cgi?id=1224668 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224672 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224678 * https://bugzilla.suse.com/show_bug.cgi?id=1224679 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224681 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224686 * https://bugzilla.suse.com/show_bug.cgi?id=1224692 * https://bugzilla.suse.com/show_bug.cgi?id=1224697 * https://bugzilla.suse.com/show_bug.cgi?id=1224699 * https://bugzilla.suse.com/show_bug.cgi?id=1224701 * https://bugzilla.suse.com/show_bug.cgi?id=1224703 * https://bugzilla.suse.com/show_bug.cgi?id=1224705 * https://bugzilla.suse.com/show_bug.cgi?id=1224707 * https://bugzilla.suse.com/show_bug.cgi?id=1224717 * https://bugzilla.suse.com/show_bug.cgi?id=1224718 * https://bugzilla.suse.com/show_bug.cgi?id=1224721 * https://bugzilla.suse.com/show_bug.cgi?id=1224722 * https://bugzilla.suse.com/show_bug.cgi?id=1224723 * https://bugzilla.suse.com/show_bug.cgi?id=1224725 * https://bugzilla.suse.com/show_bug.cgi?id=1224727 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224729 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224731 * https://bugzilla.suse.com/show_bug.cgi?id=1224732 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224739 * https://bugzilla.suse.com/show_bug.cgi?id=1224740 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224759 * https://bugzilla.suse.com/show_bug.cgi?id=1224763 * https://bugzilla.suse.com/show_bug.cgi?id=1224764 * https://bugzilla.suse.com/show_bug.cgi?id=1224765 * https://bugzilla.suse.com/show_bug.cgi?id=1224766 * https://bugzilla.suse.com/show_bug.cgi?id=1224794 * https://bugzilla.suse.com/show_bug.cgi?id=1224795 * https://bugzilla.suse.com/show_bug.cgi?id=1224796 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224816 * https://bugzilla.suse.com/show_bug.cgi?id=1224895 * https://bugzilla.suse.com/show_bug.cgi?id=1224898 * https://bugzilla.suse.com/show_bug.cgi?id=1224900 * https://bugzilla.suse.com/show_bug.cgi?id=1224901 * https://bugzilla.suse.com/show_bug.cgi?id=1224902 * https://bugzilla.suse.com/show_bug.cgi?id=1224903 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224905 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224909 * https://bugzilla.suse.com/show_bug.cgi?id=1224910 * https://bugzilla.suse.com/show_bug.cgi?id=1224911 * https://bugzilla.suse.com/show_bug.cgi?id=1224912 * https://bugzilla.suse.com/show_bug.cgi?id=1224913 * https://bugzilla.suse.com/show_bug.cgi?id=1224914 * https://bugzilla.suse.com/show_bug.cgi?id=1224915 * https://bugzilla.suse.com/show_bug.cgi?id=1224920 * https://bugzilla.suse.com/show_bug.cgi?id=1224928 * https://bugzilla.suse.com/show_bug.cgi?id=1224929 * https://bugzilla.suse.com/show_bug.cgi?id=1224930 * https://bugzilla.suse.com/show_bug.cgi?id=1224931 * https://bugzilla.suse.com/show_bug.cgi?id=1224932 * https://bugzilla.suse.com/show_bug.cgi?id=1224936 * https://bugzilla.suse.com/show_bug.cgi?id=1224937 * https://bugzilla.suse.com/show_bug.cgi?id=1224941 * https://bugzilla.suse.com/show_bug.cgi?id=1224942 * https://bugzilla.suse.com/show_bug.cgi?id=1224944 * https://bugzilla.suse.com/show_bug.cgi?id=1224945 * https://bugzilla.suse.com/show_bug.cgi?id=1224947 * https://bugzilla.suse.com/show_bug.cgi?id=1224956 * https://bugzilla.suse.com/show_bug.cgi?id=1224988 * https://bugzilla.suse.com/show_bug.cgi?id=1224992 * https://bugzilla.suse.com/show_bug.cgi?id=1225000 * https://bugzilla.suse.com/show_bug.cgi?id=1225003 * https://bugzilla.suse.com/show_bug.cgi?id=1225005 * https://bugzilla.suse.com/show_bug.cgi?id=1225008 * https://bugzilla.suse.com/show_bug.cgi?id=1225009 * https://bugzilla.suse.com/show_bug.cgi?id=1225022 * https://bugzilla.suse.com/show_bug.cgi?id=1225031 * https://bugzilla.suse.com/show_bug.cgi?id=1225032 * https://bugzilla.suse.com/show_bug.cgi?id=1225036 * https://bugzilla.suse.com/show_bug.cgi?id=1225041 * https://bugzilla.suse.com/show_bug.cgi?id=1225044 * https://bugzilla.suse.com/show_bug.cgi?id=1225053 * https://bugzilla.suse.com/show_bug.cgi?id=1225076 * https://bugzilla.suse.com/show_bug.cgi?id=1225077 * https://bugzilla.suse.com/show_bug.cgi?id=1225082 * https://bugzilla.suse.com/show_bug.cgi?id=1225085 * https://bugzilla.suse.com/show_bug.cgi?id=1225086 * https://bugzilla.suse.com/show_bug.cgi?id=1225092 * https://bugzilla.suse.com/show_bug.cgi?id=1225095 * https://bugzilla.suse.com/show_bug.cgi?id=1225096 * https://bugzilla.suse.com/show_bug.cgi?id=1225097 * https://bugzilla.suse.com/show_bug.cgi?id=1225106 * https://bugzilla.suse.com/show_bug.cgi?id=1225108 * https://bugzilla.suse.com/show_bug.cgi?id=1225109 * https://bugzilla.suse.com/show_bug.cgi?id=1225114 * https://bugzilla.suse.com/show_bug.cgi?id=1225118 * https://bugzilla.suse.com/show_bug.cgi?id=1225121 * https://bugzilla.suse.com/show_bug.cgi?id=1225122 * https://bugzilla.suse.com/show_bug.cgi?id=1225123 * https://bugzilla.suse.com/show_bug.cgi?id=1225125 * https://bugzilla.suse.com/show_bug.cgi?id=1225126 * https://bugzilla.suse.com/show_bug.cgi?id=1225127 * https://bugzilla.suse.com/show_bug.cgi?id=1225129 * https://bugzilla.suse.com/show_bug.cgi?id=1225131 * https://bugzilla.suse.com/show_bug.cgi?id=1225132 * https://bugzilla.suse.com/show_bug.cgi?id=1225138 * https://bugzilla.suse.com/show_bug.cgi?id=1225139 * https://bugzilla.suse.com/show_bug.cgi?id=1225145 * https://bugzilla.suse.com/show_bug.cgi?id=1225151 * https://bugzilla.suse.com/show_bug.cgi?id=1225153 * https://bugzilla.suse.com/show_bug.cgi?id=1225156 * https://bugzilla.suse.com/show_bug.cgi?id=1225158 * https://bugzilla.suse.com/show_bug.cgi?id=1225160 * https://bugzilla.suse.com/show_bug.cgi?id=1225161 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225167 * https://bugzilla.suse.com/show_bug.cgi?id=1225180 * https://bugzilla.suse.com/show_bug.cgi?id=1225183 * https://bugzilla.suse.com/show_bug.cgi?id=1225184 * https://bugzilla.suse.com/show_bug.cgi?id=1225186 * https://bugzilla.suse.com/show_bug.cgi?id=1225187 * https://bugzilla.suse.com/show_bug.cgi?id=1225189 * https://bugzilla.suse.com/show_bug.cgi?id=1225190 * https://bugzilla.suse.com/show_bug.cgi?id=1225191 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225195 * https://bugzilla.suse.com/show_bug.cgi?id=1225198 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225203 * https://bugzilla.suse.com/show_bug.cgi?id=1225205 * https://bugzilla.suse.com/show_bug.cgi?id=1225206 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225209 * https://bugzilla.suse.com/show_bug.cgi?id=1225210 * https://bugzilla.suse.com/show_bug.cgi?id=1225214 * https://bugzilla.suse.com/show_bug.cgi?id=1225222 * https://bugzilla.suse.com/show_bug.cgi?id=1225223 * https://bugzilla.suse.com/show_bug.cgi?id=1225224 * https://bugzilla.suse.com/show_bug.cgi?id=1225225 * https://bugzilla.suse.com/show_bug.cgi?id=1225227 * https://bugzilla.suse.com/show_bug.cgi?id=1225228 * https://bugzilla.suse.com/show_bug.cgi?id=1225229 * https://bugzilla.suse.com/show_bug.cgi?id=1225230 * https://bugzilla.suse.com/show_bug.cgi?id=1225232 * https://bugzilla.suse.com/show_bug.cgi?id=1225233 * https://bugzilla.suse.com/show_bug.cgi?id=1225235 * https://bugzilla.suse.com/show_bug.cgi?id=1225236 * https://bugzilla.suse.com/show_bug.cgi?id=1225237 * https://bugzilla.suse.com/show_bug.cgi?id=1225238 * https://bugzilla.suse.com/show_bug.cgi?id=1225239 * https://bugzilla.suse.com/show_bug.cgi?id=1225240 * https://bugzilla.suse.com/show_bug.cgi?id=1225241 * https://bugzilla.suse.com/show_bug.cgi?id=1225242 * https://bugzilla.suse.com/show_bug.cgi?id=1225243 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225245 * https://bugzilla.suse.com/show_bug.cgi?id=1225246 * https://bugzilla.suse.com/show_bug.cgi?id=1225247 * https://bugzilla.suse.com/show_bug.cgi?id=1225248 * https://bugzilla.suse.com/show_bug.cgi?id=1225249 * https://bugzilla.suse.com/show_bug.cgi?id=1225250 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225252 * https://bugzilla.suse.com/show_bug.cgi?id=1225253 * https://bugzilla.suse.com/show_bug.cgi?id=1225254 * https://bugzilla.suse.com/show_bug.cgi?id=1225255 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225257 * https://bugzilla.suse.com/show_bug.cgi?id=1225258 * https://bugzilla.suse.com/show_bug.cgi?id=1225259 * https://bugzilla.suse.com/show_bug.cgi?id=1225260 * https://bugzilla.suse.com/show_bug.cgi?id=1225261 * https://bugzilla.suse.com/show_bug.cgi?id=1225262 * https://bugzilla.suse.com/show_bug.cgi?id=1225263 * https://bugzilla.suse.com/show_bug.cgi?id=1225268 * https://bugzilla.suse.com/show_bug.cgi?id=1225301 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225304 * https://bugzilla.suse.com/show_bug.cgi?id=1225306 * https://bugzilla.suse.com/show_bug.cgi?id=1225316 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225320 * https://bugzilla.suse.com/show_bug.cgi?id=1225321 * https://bugzilla.suse.com/show_bug.cgi?id=1225322 * https://bugzilla.suse.com/show_bug.cgi?id=1225323 * https://bugzilla.suse.com/show_bug.cgi?id=1225326 * https://bugzilla.suse.com/show_bug.cgi?id=1225327 * https://bugzilla.suse.com/show_bug.cgi?id=1225328 * https://bugzilla.suse.com/show_bug.cgi?id=1225329 * https://bugzilla.suse.com/show_bug.cgi?id=1225330 * https://bugzilla.suse.com/show_bug.cgi?id=1225331 * https://bugzilla.suse.com/show_bug.cgi?id=1225332 * https://bugzilla.suse.com/show_bug.cgi?id=1225333 * https://bugzilla.suse.com/show_bug.cgi?id=1225334 * https://bugzilla.suse.com/show_bug.cgi?id=1225335 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225337 * https://bugzilla.suse.com/show_bug.cgi?id=1225338 * https://bugzilla.suse.com/show_bug.cgi?id=1225339 * https://bugzilla.suse.com/show_bug.cgi?id=1225341 * https://bugzilla.suse.com/show_bug.cgi?id=1225342 * https://bugzilla.suse.com/show_bug.cgi?id=1225344 * https://bugzilla.suse.com/show_bug.cgi?id=1225346 * https://bugzilla.suse.com/show_bug.cgi?id=1225347 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225353 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225357 * https://bugzilla.suse.com/show_bug.cgi?id=1225358 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225361 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225368 * https://bugzilla.suse.com/show_bug.cgi?id=1225369 * https://bugzilla.suse.com/show_bug.cgi?id=1225370 * https://bugzilla.suse.com/show_bug.cgi?id=1225372 * https://bugzilla.suse.com/show_bug.cgi?id=1225373 * https://bugzilla.suse.com/show_bug.cgi?id=1225374 * https://bugzilla.suse.com/show_bug.cgi?id=1225375 * https://bugzilla.suse.com/show_bug.cgi?id=1225376 * https://bugzilla.suse.com/show_bug.cgi?id=1225377 * https://bugzilla.suse.com/show_bug.cgi?id=1225379 * https://bugzilla.suse.com/show_bug.cgi?id=1225380 * https://bugzilla.suse.com/show_bug.cgi?id=1225382 * https://bugzilla.suse.com/show_bug.cgi?id=1225383 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225386 * https://bugzilla.suse.com/show_bug.cgi?id=1225387 * https://bugzilla.suse.com/show_bug.cgi?id=1225388 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225392 * https://bugzilla.suse.com/show_bug.cgi?id=1225393 * https://bugzilla.suse.com/show_bug.cgi?id=1225396 * https://bugzilla.suse.com/show_bug.cgi?id=1225400 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225405 * https://bugzilla.suse.com/show_bug.cgi?id=1225408 * https://bugzilla.suse.com/show_bug.cgi?id=1225409 * https://bugzilla.suse.com/show_bug.cgi?id=1225410 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225424 * https://bugzilla.suse.com/show_bug.cgi?id=1225425 * https://bugzilla.suse.com/show_bug.cgi?id=1225427 * https://bugzilla.suse.com/show_bug.cgi?id=1225431 * https://bugzilla.suse.com/show_bug.cgi?id=1225435 * https://bugzilla.suse.com/show_bug.cgi?id=1225436 * https://bugzilla.suse.com/show_bug.cgi?id=1225437 * https://bugzilla.suse.com/show_bug.cgi?id=1225438 * https://bugzilla.suse.com/show_bug.cgi?id=1225439 * https://bugzilla.suse.com/show_bug.cgi?id=1225441 * https://bugzilla.suse.com/show_bug.cgi?id=1225442 * https://bugzilla.suse.com/show_bug.cgi?id=1225443 * https://bugzilla.suse.com/show_bug.cgi?id=1225444 * https://bugzilla.suse.com/show_bug.cgi?id=1225445 * https://bugzilla.suse.com/show_bug.cgi?id=1225446 * https://bugzilla.suse.com/show_bug.cgi?id=1225447 * https://bugzilla.suse.com/show_bug.cgi?id=1225450 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225455 * https://bugzilla.suse.com/show_bug.cgi?id=1225461 * https://bugzilla.suse.com/show_bug.cgi?id=1225463 * https://bugzilla.suse.com/show_bug.cgi?id=1225464 * https://bugzilla.suse.com/show_bug.cgi?id=1225466 * https://bugzilla.suse.com/show_bug.cgi?id=1225467 * https://bugzilla.suse.com/show_bug.cgi?id=1225468 * https://bugzilla.suse.com/show_bug.cgi?id=1225471 * https://bugzilla.suse.com/show_bug.cgi?id=1225472 * https://bugzilla.suse.com/show_bug.cgi?id=1225478 * https://bugzilla.suse.com/show_bug.cgi?id=1225479 * https://bugzilla.suse.com/show_bug.cgi?id=1225480 * https://bugzilla.suse.com/show_bug.cgi?id=1225482 * https://bugzilla.suse.com/show_bug.cgi?id=1225483 * https://bugzilla.suse.com/show_bug.cgi?id=1225486 * https://bugzilla.suse.com/show_bug.cgi?id=1225488 * https://bugzilla.suse.com/show_bug.cgi?id=1225490 * https://bugzilla.suse.com/show_bug.cgi?id=1225492 * https://bugzilla.suse.com/show_bug.cgi?id=1225495 * https://bugzilla.suse.com/show_bug.cgi?id=1225499 * https://bugzilla.suse.com/show_bug.cgi?id=1225500 * https://bugzilla.suse.com/show_bug.cgi?id=1225501 * https://bugzilla.suse.com/show_bug.cgi?id=1225502 * https://bugzilla.suse.com/show_bug.cgi?id=1225506 * https://bugzilla.suse.com/show_bug.cgi?id=1225508 * https://bugzilla.suse.com/show_bug.cgi?id=1225510 * https://bugzilla.suse.com/show_bug.cgi?id=1225513 * https://bugzilla.suse.com/show_bug.cgi?id=1225515 * https://bugzilla.suse.com/show_bug.cgi?id=1225529 * https://bugzilla.suse.com/show_bug.cgi?id=1225530 * https://bugzilla.suse.com/show_bug.cgi?id=1225532 * https://bugzilla.suse.com/show_bug.cgi?id=1225534 * https://bugzilla.suse.com/show_bug.cgi?id=1225535 * https://bugzilla.suse.com/show_bug.cgi?id=1225548 * https://bugzilla.suse.com/show_bug.cgi?id=1225549 * https://bugzilla.suse.com/show_bug.cgi?id=1225550 * https://bugzilla.suse.com/show_bug.cgi?id=1225553 * https://bugzilla.suse.com/show_bug.cgi?id=1225554 * https://bugzilla.suse.com/show_bug.cgi?id=1225555 * https://bugzilla.suse.com/show_bug.cgi?id=1225556 * https://bugzilla.suse.com/show_bug.cgi?id=1225557 * https://bugzilla.suse.com/show_bug.cgi?id=1225559 * https://bugzilla.suse.com/show_bug.cgi?id=1225560 * https://bugzilla.suse.com/show_bug.cgi?id=1225565 * https://bugzilla.suse.com/show_bug.cgi?id=1225566 * https://bugzilla.suse.com/show_bug.cgi?id=1225568 * https://bugzilla.suse.com/show_bug.cgi?id=1225569 * https://bugzilla.suse.com/show_bug.cgi?id=1225570 * https://bugzilla.suse.com/show_bug.cgi?id=1225571 * https://bugzilla.suse.com/show_bug.cgi?id=1225572 * https://bugzilla.suse.com/show_bug.cgi?id=1225577 * https://bugzilla.suse.com/show_bug.cgi?id=1225583 * https://bugzilla.suse.com/show_bug.cgi?id=1225584 * https://bugzilla.suse.com/show_bug.cgi?id=1225587 * https://bugzilla.suse.com/show_bug.cgi?id=1225588 * https://bugzilla.suse.com/show_bug.cgi?id=1225589 * https://bugzilla.suse.com/show_bug.cgi?id=1225590 * https://bugzilla.suse.com/show_bug.cgi?id=1225591 * https://bugzilla.suse.com/show_bug.cgi?id=1225592 * https://bugzilla.suse.com/show_bug.cgi?id=1225593 * https://bugzilla.suse.com/show_bug.cgi?id=1225595 * https://bugzilla.suse.com/show_bug.cgi?id=1225599 * https://bugzilla.suse.com/show_bug.cgi?id=1225616 * https://bugzilla.suse.com/show_bug.cgi?id=1225640 * https://bugzilla.suse.com/show_bug.cgi?id=1225642 * https://bugzilla.suse.com/show_bug.cgi?id=1225705 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225715 * https://bugzilla.suse.com/show_bug.cgi?id=1225720 * https://bugzilla.suse.com/show_bug.cgi?id=1225722 * https://bugzilla.suse.com/show_bug.cgi?id=1225734 * https://bugzilla.suse.com/show_bug.cgi?id=1225735 * https://bugzilla.suse.com/show_bug.cgi?id=1225747 * https://bugzilla.suse.com/show_bug.cgi?id=1225748 * https://bugzilla.suse.com/show_bug.cgi?id=1225756 * https://bugzilla.suse.com/show_bug.cgi?id=1225761 * https://bugzilla.suse.com/show_bug.cgi?id=1225766 * https://bugzilla.suse.com/show_bug.cgi?id=1225775 * https://bugzilla.suse.com/show_bug.cgi?id=1225810 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225829 * https://bugzilla.suse.com/show_bug.cgi?id=1225835 * https://bugzilla.suse.com/show_bug.cgi?id=1225842 * https://jira.suse.com/browse/PED-3259 * https://jira.suse.com/browse/PED-7167 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 12:32:13 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 12:32:13 -0000 Subject: SUSE-SU-2024:2009-1: moderate: Security update for curl Message-ID: <171819553354.12684.7929476508702131033@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2024:2009-1 Rating: moderate References: * bsc#1219273 Cross-References: * CVE-2023-27534 CVSS scores: * CVE-2023-27534 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-27534 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2023-27534: Properly resolve ~ when used in a SFTP path. (bsc#1219273) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2009=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2009=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2009=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libcurl4-debuginfo-7.66.0-150200.4.72.1 * curl-debugsource-7.66.0-150200.4.72.1 * curl-debuginfo-7.66.0-150200.4.72.1 * libcurl4-7.66.0-150200.4.72.1 * curl-7.66.0-150200.4.72.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libcurl4-debuginfo-7.66.0-150200.4.72.1 * curl-debugsource-7.66.0-150200.4.72.1 * curl-debuginfo-7.66.0-150200.4.72.1 * libcurl4-7.66.0-150200.4.72.1 * curl-7.66.0-150200.4.72.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libcurl4-debuginfo-7.66.0-150200.4.72.1 * curl-debugsource-7.66.0-150200.4.72.1 * curl-debuginfo-7.66.0-150200.4.72.1 * libcurl4-7.66.0-150200.4.72.1 * curl-7.66.0-150200.4.72.1 ## References: * https://www.suse.com/security/cve/CVE-2023-27534.html * https://bugzilla.suse.com/show_bug.cgi?id=1219273 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 12:32:15 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 12:32:15 -0000 Subject: SUSE-RU-2024:2007-1: moderate: Recommended update for yast2-country Message-ID: <171819553523.12684.15920169718310748888@smelt2.prg2.suse.org> # Recommended update for yast2-country Announcement ID: SUSE-RU-2024:2007-1 Rating: moderate References: * bsc#1224387 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for yast2-country fixes the following issue: * Rename Europe/Kiev to Europe/Kyiv as per 2022b release of tz code and data by ICANN (bsc#1224387) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2007=1 openSUSE-SLE-15.5-2024-2007=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2007=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * yast2-country-4.5.6-150500.3.3.2 * yast2-country-data-4.5.6-150500.3.3.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * yast2-country-4.5.6-150500.3.3.2 * yast2-country-data-4.5.6-150500.3.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224387 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 12:32:17 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 12:32:17 -0000 Subject: SUSE-RU-2024:2006-1: moderate: Recommended update for ethtool Message-ID: <171819553705.12684.16607366074456195262@smelt2.prg2.suse.org> # Recommended update for ethtool Announcement ID: SUSE-RU-2024:2006-1 Rating: moderate References: * bsc#1222079 * bsc#1224590 * jsc#PED-5946 * jsc#PED-8451 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains two features and has two fixes can now be installed. ## Description: This update for ethtool fixes the following issues: * ethtool was upgraded to version 6.4 (jsc#PED-5946, jsc#PED-8451): * For the full list of changes between 5.14 and 6.4 see upstream changelog (file NEWS) * Fixed SFP module diagnostic information (bsc#1222079) * Additional bug fixes (bsc#1224590): * Added missing header files for source distribution * Fixed SFF-8472 transceiver module identification * Allow nl_sset return -EOPNOTSUPP to fallback to do_sset * Fixed netlink support for coalesce tx aggr params * Fixed bug in rmgr when searching for empty slot ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2006=1 openSUSE-SLE-15.6-2024-2006=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2006=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * ethtool-6.4-150600.7.3.2 * ethtool-debugsource-6.4-150600.7.3.2 * ethtool-debuginfo-6.4-150600.7.3.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ethtool-6.4-150600.7.3.2 * ethtool-debugsource-6.4-150600.7.3.2 * ethtool-debuginfo-6.4-150600.7.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222079 * https://bugzilla.suse.com/show_bug.cgi?id=1224590 * https://jira.suse.com/browse/PED-5946 * https://jira.suse.com/browse/PED-8451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 12:32:22 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 12:32:22 -0000 Subject: SUSE-SU-2024:2005-1: important: Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed Message-ID: <171819554232.12684.18086659304149968339@smelt2.prg2.suse.org> # Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open- driver-G06-signed Announcement ID: SUSE-SU-2024:2005-1 Rating: important References: * bsc#1223356 Cross-References: * CVE-2024-0090 * CVE-2024-0091 * CVE-2024-0092 CVSS scores: * CVE-2024-0090 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-0091 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed fixes the following issues: Security Update 550.90.07: * CVE-2024-0090: Fixed out of bounds write (bsc#1223356). * CVE-2024-0092: Fixed incorrect exception handling (bsc#1223356). * CVE-2024-0091: Fixed untrusted pointer dereference (bsc#1223356). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2005=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2005=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2005=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2005=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2005=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2005=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2005=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2005=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2005=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2005=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2005=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2005=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2005=1 ## Package List: * openSUSE Leap 15.4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * openSUSE Leap 15.4 (x86_64) * nvidia-open-driver-G06-signed-azure-devel-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.90.07_k5.14.21_150400.14.75-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150400.14.75-150400.9.62.1 * openSUSE Leap 15.4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1 * openSUSE Leap 15.4 (aarch64) * nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * SUSE Manager Proxy 4.3 (x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1 * SUSE Manager Server 4.3 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 * SUSE Manager Server 4.3 (x86_64) * nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 * nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0090.html * https://www.suse.com/security/cve/CVE-2024-0091.html * https://www.suse.com/security/cve/CVE-2024-0092.html * https://bugzilla.suse.com/show_bug.cgi?id=1223356 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 20:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 20:30:02 -0000 Subject: SUSE-SU-2024:2012-1: important: Security update for MozillaFirefox Message-ID: <171822420226.24815.7195531116961536718@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2024:2012-1 Rating: important References: * bsc#1226027 Cross-References: * CVE-2024-5688 * CVE-2024-5690 * CVE-2024-5691 * CVE-2024-5692 * CVE-2024-5693 * CVE-2024-5696 * CVE-2024-5700 * CVE-2024-5702 CVSS scores: Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves eight vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: * Update to version 115.12.0 ESR (bsc#1226027) * CVE-2024-5702: Use-after-free in networking * CVE-2024-5688: Use-after-free in JavaScript object transplant * CVE-2024-5690: External protocol handlers leaked by timing attack * CVE-2024-5691: Sandboxed iframes were able to bypass sandbox restrictions to open a new window * CVE-2024-5692: Bypass of file name restrictions during saving * CVE-2024-5693: Cross-Origin Image leak via Offscreen Canvas * CVE-2024-5696: Memory Corruption in Text Fragments * CVE-2024-5700: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2012=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2012=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2012=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2012=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debugsource-115.12.0-112.215.1 * MozillaFirefox-debuginfo-115.12.0-112.215.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch) * MozillaFirefox-devel-115.12.0-112.215.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * MozillaFirefox-debugsource-115.12.0-112.215.1 * MozillaFirefox-translations-common-115.12.0-112.215.1 * MozillaFirefox-debuginfo-115.12.0-112.215.1 * MozillaFirefox-115.12.0-112.215.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * MozillaFirefox-devel-115.12.0-112.215.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debugsource-115.12.0-112.215.1 * MozillaFirefox-translations-common-115.12.0-112.215.1 * MozillaFirefox-debuginfo-115.12.0-112.215.1 * MozillaFirefox-115.12.0-112.215.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * MozillaFirefox-devel-115.12.0-112.215.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * MozillaFirefox-debugsource-115.12.0-112.215.1 * MozillaFirefox-translations-common-115.12.0-112.215.1 * MozillaFirefox-debuginfo-115.12.0-112.215.1 * MozillaFirefox-115.12.0-112.215.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * MozillaFirefox-devel-115.12.0-112.215.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5688.html * https://www.suse.com/security/cve/CVE-2024-5690.html * https://www.suse.com/security/cve/CVE-2024-5691.html * https://www.suse.com/security/cve/CVE-2024-5692.html * https://www.suse.com/security/cve/CVE-2024-5693.html * https://www.suse.com/security/cve/CVE-2024-5696.html * https://www.suse.com/security/cve/CVE-2024-5700.html * https://www.suse.com/security/cve/CVE-2024-5702.html * https://bugzilla.suse.com/show_bug.cgi?id=1226027 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 20:31:16 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 20:31:16 -0000 Subject: SUSE-SU-2024:2011-1: important: Security update for the Linux Kernel Message-ID: <171822427696.24815.11518426109808026238@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:2011-1 Rating: important References: * bsc#1065729 * bsc#1174585 * bsc#1190569 * bsc#1191949 * bsc#1192107 * bsc#1193983 * bsc#1194288 * bsc#1194869 * bsc#1196869 * bsc#1196956 * bsc#1197915 * bsc#1200313 * bsc#1201308 * bsc#1201489 * bsc#1208149 * bsc#1209657 * bsc#1209799 * bsc#1209834 * bsc#1211592 * bsc#1213863 * bsc#1216702 * bsc#1217169 * bsc#1217515 * bsc#1218447 * bsc#1218917 * bsc#1220492 * bsc#1220783 * bsc#1221044 * bsc#1221645 * bsc#1221958 * bsc#1222011 * bsc#1222619 * bsc#1222721 * bsc#1222976 * bsc#1223057 * bsc#1223084 * bsc#1223111 * bsc#1223138 * bsc#1223191 * bsc#1223384 * bsc#1223390 * bsc#1223481 * bsc#1223501 * bsc#1223512 * bsc#1223520 * bsc#1223532 * bsc#1223626 * bsc#1223715 * bsc#1223894 * bsc#1223921 * bsc#1223922 * bsc#1223923 * bsc#1223924 * bsc#1223929 * bsc#1223931 * bsc#1223932 * bsc#1223934 * bsc#1223941 * bsc#1223948 * bsc#1223952 * bsc#1223953 * bsc#1223957 * bsc#1223962 * bsc#1223963 * bsc#1223964 * bsc#1223996 * bsc#1224085 * bsc#1224099 * bsc#1224137 * bsc#1224174 * bsc#1224438 * bsc#1224482 * bsc#1224488 * bsc#1224494 * bsc#1224511 * bsc#1224592 * bsc#1224611 * bsc#1224664 * bsc#1224678 * bsc#1224682 * bsc#1224685 * bsc#1224730 * bsc#1224736 * bsc#1224763 * bsc#1224816 * bsc#1224895 * bsc#1224898 * bsc#1224900 * bsc#1224901 * bsc#1224902 * bsc#1224903 * bsc#1224904 * bsc#1224905 * bsc#1224907 * bsc#1224910 * bsc#1224911 * bsc#1224912 * bsc#1224913 * bsc#1224914 * bsc#1224915 * bsc#1224920 * bsc#1224928 * bsc#1224931 * bsc#1224932 * bsc#1224937 * bsc#1224942 * bsc#1224944 * bsc#1224945 * bsc#1224947 * bsc#1224956 * bsc#1224988 * bsc#1225000 * bsc#1225003 * bsc#1225005 * bsc#1225009 * bsc#1225022 * bsc#1225031 * bsc#1225032 * bsc#1225036 * bsc#1225044 * bsc#1225076 * bsc#1225077 * bsc#1225082 * bsc#1225086 * bsc#1225092 * bsc#1225095 * bsc#1225096 * bsc#1225106 * bsc#1225108 * bsc#1225109 * bsc#1225118 * bsc#1225121 * bsc#1225122 * bsc#1225123 * bsc#1225125 * bsc#1225126 * bsc#1225127 * bsc#1225129 * bsc#1225131 * bsc#1225132 * bsc#1225145 * bsc#1225151 * bsc#1225153 * bsc#1225156 * bsc#1225158 * bsc#1225160 * bsc#1225161 * bsc#1225164 * bsc#1225167 * bsc#1225180 * bsc#1225183 * bsc#1225184 * bsc#1225186 * bsc#1225187 * bsc#1225189 * bsc#1225190 * bsc#1225191 * bsc#1225192 * bsc#1225193 * bsc#1225195 * bsc#1225198 * bsc#1225201 * bsc#1225203 * bsc#1225205 * bsc#1225206 * bsc#1225207 * bsc#1225208 * bsc#1225209 * bsc#1225210 * bsc#1225214 * bsc#1225223 * bsc#1225224 * bsc#1225225 * bsc#1225227 * bsc#1225228 * bsc#1225229 * bsc#1225230 * bsc#1225232 * bsc#1225233 * bsc#1225235 * bsc#1225236 * bsc#1225237 * bsc#1225238 * bsc#1225239 * bsc#1225240 * bsc#1225241 * bsc#1225242 * bsc#1225243 * bsc#1225244 * bsc#1225245 * bsc#1225246 * bsc#1225247 * bsc#1225248 * bsc#1225249 * bsc#1225250 * bsc#1225251 * bsc#1225252 * bsc#1225253 * bsc#1225254 * bsc#1225255 * bsc#1225256 * bsc#1225257 * bsc#1225258 * bsc#1225259 * bsc#1225260 * bsc#1225261 * bsc#1225262 * bsc#1225263 * bsc#1225268 * bsc#1225301 * bsc#1225303 * bsc#1225304 * bsc#1225306 * bsc#1225316 * bsc#1225318 * bsc#1225320 * bsc#1225321 * bsc#1225322 * bsc#1225323 * bsc#1225326 * bsc#1225327 * bsc#1225328 * bsc#1225329 * bsc#1225330 * bsc#1225331 * bsc#1225332 * bsc#1225333 * bsc#1225334 * bsc#1225335 * bsc#1225336 * bsc#1225337 * bsc#1225338 * bsc#1225339 * bsc#1225341 * bsc#1225342 * bsc#1225344 * bsc#1225346 * bsc#1225347 * bsc#1225351 * bsc#1225353 * bsc#1225354 * bsc#1225355 * bsc#1225357 * bsc#1225358 * bsc#1225360 * bsc#1225361 * bsc#1225366 * bsc#1225367 * bsc#1225368 * bsc#1225369 * bsc#1225370 * bsc#1225372 * bsc#1225373 * bsc#1225374 * bsc#1225375 * bsc#1225376 * bsc#1225377 * bsc#1225379 * bsc#1225383 * bsc#1225384 * bsc#1225386 * bsc#1225387 * bsc#1225388 * bsc#1225390 * bsc#1225392 * bsc#1225393 * bsc#1225396 * bsc#1225400 * bsc#1225404 * bsc#1225405 * bsc#1225409 * bsc#1225410 * bsc#1225411 * bsc#1225425 * bsc#1225427 * bsc#1225431 * bsc#1225435 * bsc#1225436 * bsc#1225437 * bsc#1225438 * bsc#1225439 * bsc#1225441 * bsc#1225445 * bsc#1225446 * bsc#1225447 * bsc#1225450 * bsc#1225453 * bsc#1225455 * bsc#1225461 * bsc#1225463 * bsc#1225464 * bsc#1225466 * bsc#1225471 * bsc#1225472 * bsc#1225478 * bsc#1225479 * bsc#1225482 * bsc#1225483 * bsc#1225488 * bsc#1225490 * bsc#1225492 * bsc#1225495 * bsc#1225499 * bsc#1225500 * bsc#1225501 * bsc#1225508 * bsc#1225510 * bsc#1225529 * bsc#1225530 * bsc#1225532 * bsc#1225534 * bsc#1225549 * bsc#1225550 * bsc#1225553 * bsc#1225554 * bsc#1225557 * bsc#1225559 * bsc#1225560 * bsc#1225565 * bsc#1225566 * bsc#1225569 * bsc#1225570 * bsc#1225571 * bsc#1225572 * bsc#1225577 * bsc#1225583 * bsc#1225584 * bsc#1225588 * bsc#1225589 * bsc#1225590 * bsc#1225591 * bsc#1225592 * bsc#1225595 * bsc#1225599 * jsc#PED-8111 Cross-References: * CVE-2020-36788 * CVE-2021-47358 * CVE-2021-47359 * CVE-2021-47360 * CVE-2021-47361 * CVE-2021-47362 * CVE-2021-47363 * CVE-2021-47364 * CVE-2021-47365 * CVE-2021-47366 * CVE-2021-47367 * CVE-2021-47368 * CVE-2021-47369 * CVE-2021-47370 * CVE-2021-47371 * CVE-2021-47372 * CVE-2021-47373 * CVE-2021-47374 * CVE-2021-47375 * CVE-2021-47376 * CVE-2021-47378 * CVE-2021-47379 * CVE-2021-47380 * CVE-2021-47381 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47384 * CVE-2021-47385 * CVE-2021-47386 * CVE-2021-47387 * CVE-2021-47388 * CVE-2021-47389 * CVE-2021-47390 * CVE-2021-47391 * CVE-2021-47392 * CVE-2021-47393 * CVE-2021-47394 * CVE-2021-47395 * CVE-2021-47396 * CVE-2021-47397 * CVE-2021-47398 * CVE-2021-47399 * CVE-2021-47400 * CVE-2021-47401 * CVE-2021-47402 * CVE-2021-47403 * CVE-2021-47404 * CVE-2021-47405 * CVE-2021-47406 * CVE-2021-47407 * CVE-2021-47408 * CVE-2021-47409 * CVE-2021-47410 * CVE-2021-47412 * CVE-2021-47413 * CVE-2021-47414 * CVE-2021-47415 * CVE-2021-47416 * CVE-2021-47417 * CVE-2021-47418 * CVE-2021-47419 * CVE-2021-47420 * CVE-2021-47421 * CVE-2021-47422 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47425 * CVE-2021-47426 * CVE-2021-47427 * CVE-2021-47428 * CVE-2021-47429 * CVE-2021-47430 * CVE-2021-47431 * CVE-2021-47433 * CVE-2021-47434 * CVE-2021-47435 * CVE-2021-47436 * CVE-2021-47437 * CVE-2021-47438 * CVE-2021-47439 * CVE-2021-47440 * CVE-2021-47441 * CVE-2021-47442 * CVE-2021-47443 * CVE-2021-47444 * CVE-2021-47445 * CVE-2021-47446 * CVE-2021-47447 * CVE-2021-47448 * CVE-2021-47449 * CVE-2021-47450 * CVE-2021-47451 * CVE-2021-47452 * CVE-2021-47453 * CVE-2021-47454 * CVE-2021-47455 * CVE-2021-47456 * CVE-2021-47457 * CVE-2021-47458 * CVE-2021-47459 * CVE-2021-47460 * CVE-2021-47461 * CVE-2021-47462 * CVE-2021-47463 * CVE-2021-47464 * CVE-2021-47465 * CVE-2021-47466 * CVE-2021-47467 * CVE-2021-47468 * CVE-2021-47469 * CVE-2021-47470 * CVE-2021-47471 * CVE-2021-47472 * CVE-2021-47473 * CVE-2021-47474 * CVE-2021-47475 * CVE-2021-47476 * CVE-2021-47477 * CVE-2021-47478 * CVE-2021-47479 * CVE-2021-47480 * CVE-2021-47481 * CVE-2021-47482 * CVE-2021-47483 * CVE-2021-47484 * CVE-2021-47485 * CVE-2021-47486 * CVE-2021-47488 * CVE-2021-47489 * CVE-2021-47490 * CVE-2021-47491 * CVE-2021-47492 * CVE-2021-47493 * CVE-2021-47494 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47498 * CVE-2021-47499 * CVE-2021-47500 * CVE-2021-47501 * CVE-2021-47502 * CVE-2021-47503 * CVE-2021-47505 * CVE-2021-47506 * CVE-2021-47507 * CVE-2021-47509 * CVE-2021-47510 * CVE-2021-47511 * CVE-2021-47513 * CVE-2021-47514 * CVE-2021-47516 * CVE-2021-47518 * CVE-2021-47520 * CVE-2021-47521 * CVE-2021-47522 * CVE-2021-47523 * CVE-2021-47524 * CVE-2021-47525 * CVE-2021-47526 * CVE-2021-47527 * CVE-2021-47528 * CVE-2021-47529 * CVE-2021-47533 * CVE-2021-47534 * CVE-2021-47535 * CVE-2021-47536 * CVE-2021-47537 * CVE-2021-47540 * CVE-2021-47541 * CVE-2021-47542 * CVE-2021-47544 * CVE-2021-47549 * CVE-2021-47550 * CVE-2021-47551 * CVE-2021-47553 * CVE-2021-47554 * CVE-2021-47556 * CVE-2021-47558 * CVE-2021-47559 * CVE-2021-47560 * CVE-2021-47562 * CVE-2021-47563 * CVE-2021-47564 * CVE-2021-47565 * CVE-2022-48632 * CVE-2022-48634 * CVE-2022-48636 * CVE-2022-48652 * CVE-2022-48671 * CVE-2022-48672 * CVE-2022-48673 * CVE-2022-48675 * CVE-2022-48686 * CVE-2022-48687 * CVE-2022-48688 * CVE-2022-48692 * CVE-2022-48693 * CVE-2022-48694 * CVE-2022-48695 * CVE-2022-48697 * CVE-2022-48699 * CVE-2022-48700 * CVE-2022-48701 * CVE-2022-48702 * CVE-2022-48703 * CVE-2022-48704 * CVE-2022-48708 * CVE-2022-48709 * CVE-2022-48710 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52676 * CVE-2023-52686 * CVE-2023-52690 * CVE-2023-52702 * CVE-2023-52703 * CVE-2023-52707 * CVE-2023-52708 * CVE-2023-52730 * CVE-2023-52733 * CVE-2023-52736 * CVE-2023-52738 * CVE-2023-52739 * CVE-2023-52740 * CVE-2023-52741 * CVE-2023-52742 * CVE-2023-52743 * CVE-2023-52744 * CVE-2023-52745 * CVE-2023-52747 * CVE-2023-52753 * CVE-2023-52754 * CVE-2023-52756 * CVE-2023-52759 * CVE-2023-52763 * CVE-2023-52764 * CVE-2023-52766 * CVE-2023-52774 * CVE-2023-52781 * CVE-2023-52788 * CVE-2023-52789 * CVE-2023-52791 * CVE-2023-52798 * CVE-2023-52799 * CVE-2023-52800 * CVE-2023-52804 * CVE-2023-52805 * CVE-2023-52806 * CVE-2023-52810 * CVE-2023-52811 * CVE-2023-52814 * CVE-2023-52816 * CVE-2023-52817 * CVE-2023-52818 * CVE-2023-52819 * CVE-2023-52821 * CVE-2023-52825 * CVE-2023-52826 * CVE-2023-52832 * CVE-2023-52833 * CVE-2023-52834 * CVE-2023-52838 * CVE-2023-52840 * CVE-2023-52841 * CVE-2023-52844 * CVE-2023-52847 * CVE-2023-52853 * CVE-2023-52854 * CVE-2023-52855 * CVE-2023-52856 * CVE-2023-52858 * CVE-2023-52864 * CVE-2023-52865 * CVE-2023-52867 * CVE-2023-52868 * CVE-2023-52870 * CVE-2023-52871 * CVE-2023-52872 * CVE-2023-52873 * CVE-2023-52875 * CVE-2023-52876 * CVE-2023-52877 * CVE-2023-52878 * CVE-2023-52880 * CVE-2024-0639 * CVE-2024-26828 * CVE-2024-26840 * CVE-2024-26852 * CVE-2024-26862 * CVE-2024-26921 * CVE-2024-26925 * CVE-2024-26928 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-27413 * CVE-2024-35811 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35863 * CVE-2024-35867 * CVE-2024-35868 * CVE-2024-35895 * CVE-2024-35904 * CVE-2024-35905 * CVE-2024-35914 * CVE-2024-36926 CVSS scores: * CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47358 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47364 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47365 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47366 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2021-47367 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47368 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47371 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47372 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47373 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47379 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47389 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2021-47390 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47394 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47398 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47407 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47414 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47418 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47420 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47421 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47429 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47439 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47448 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2021-47449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47452 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47466 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47467 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47470 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47474 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47475 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47476 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47477 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47488 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47489 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47490 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47510 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47513 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47514 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47520 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47520 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47524 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47525 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47525 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47526 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47528 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47529 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47533 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2021-47537 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47544 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47550 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47553 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47556 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-48672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48675 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48686 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-48687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48694 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-48699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48700 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48701 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48709 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52702 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52707 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52739 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52745 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52756 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves 308 vulnerabilities, contains one feature and has 26 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). * CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057). * CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111). * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390). * CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532). * CVE-2024-26929: Fixed double free of fcport (bsc#1223715). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223626). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664). * CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678). * CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488). * CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE (bsc#1222011). The following non-security bugs were fixed: * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * filemap: remove use of wait bookmarks (bsc#1224085). * idpf: extend tx watchdog timeout (bsc#1224137). * ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958) * powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191). * powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191). * powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729). * powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869). * powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV (bsc#1220492 ltc#205270). * powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783). * powerpc: Refactor verification of MSR_RI (bsc#1223191). * supported.conf: support tcp_dctcp module (jsc#PED-8111) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2011=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2011=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2011=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2011=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2011=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2011=1 ## Package List: * openSUSE Leap Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.82.1 * openSUSE Leap Micro 5.4 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.82.1 * kernel-rt-debuginfo-5.14.21-150400.15.82.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.82.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.82.1 * kernel-rt-debuginfo-5.14.21-150400.15.82.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * kernel-source-rt-5.14.21-150400.15.82.1 * SUSE Linux Enterprise Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.82.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.82.1 * kernel-rt-debuginfo-5.14.21-150400.15.82.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * kernel-source-rt-5.14.21-150400.15.82.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.82.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.82.1 * kernel-rt-debuginfo-5.14.21-150400.15.82.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * kernel-source-rt-5.14.21-150400.15.82.1 * SUSE Linux Enterprise Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.82.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.82.1 * kernel-rt-debuginfo-5.14.21-150400.15.82.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * kernel-source-rt-5.14.21-150400.15.82.1 * openSUSE Leap Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.82.1 * openSUSE Leap Micro 5.3 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.82.1 * kernel-rt-debuginfo-5.14.21-150400.15.82.1 ## References: * https://www.suse.com/security/cve/CVE-2020-36788.html * https://www.suse.com/security/cve/CVE-2021-47358.html * https://www.suse.com/security/cve/CVE-2021-47359.html * https://www.suse.com/security/cve/CVE-2021-47360.html * https://www.suse.com/security/cve/CVE-2021-47361.html * https://www.suse.com/security/cve/CVE-2021-47362.html * https://www.suse.com/security/cve/CVE-2021-47363.html * https://www.suse.com/security/cve/CVE-2021-47364.html * https://www.suse.com/security/cve/CVE-2021-47365.html * https://www.suse.com/security/cve/CVE-2021-47366.html * https://www.suse.com/security/cve/CVE-2021-47367.html * https://www.suse.com/security/cve/CVE-2021-47368.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47370.html * https://www.suse.com/security/cve/CVE-2021-47371.html * https://www.suse.com/security/cve/CVE-2021-47372.html * https://www.suse.com/security/cve/CVE-2021-47373.html * https://www.suse.com/security/cve/CVE-2021-47374.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47376.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47379.html * https://www.suse.com/security/cve/CVE-2021-47380.html * https://www.suse.com/security/cve/CVE-2021-47381.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47384.html * https://www.suse.com/security/cve/CVE-2021-47385.html * https://www.suse.com/security/cve/CVE-2021-47386.html * https://www.suse.com/security/cve/CVE-2021-47387.html * https://www.suse.com/security/cve/CVE-2021-47388.html * https://www.suse.com/security/cve/CVE-2021-47389.html * https://www.suse.com/security/cve/CVE-2021-47390.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47392.html * https://www.suse.com/security/cve/CVE-2021-47393.html * https://www.suse.com/security/cve/CVE-2021-47394.html * https://www.suse.com/security/cve/CVE-2021-47395.html * https://www.suse.com/security/cve/CVE-2021-47396.html * https://www.suse.com/security/cve/CVE-2021-47397.html * https://www.suse.com/security/cve/CVE-2021-47398.html * https://www.suse.com/security/cve/CVE-2021-47399.html * https://www.suse.com/security/cve/CVE-2021-47400.html * https://www.suse.com/security/cve/CVE-2021-47401.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47403.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47405.html * https://www.suse.com/security/cve/CVE-2021-47406.html * https://www.suse.com/security/cve/CVE-2021-47407.html * https://www.suse.com/security/cve/CVE-2021-47408.html * https://www.suse.com/security/cve/CVE-2021-47409.html * https://www.suse.com/security/cve/CVE-2021-47410.html * https://www.suse.com/security/cve/CVE-2021-47412.html * https://www.suse.com/security/cve/CVE-2021-47413.html * https://www.suse.com/security/cve/CVE-2021-47414.html * https://www.suse.com/security/cve/CVE-2021-47415.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47417.html * https://www.suse.com/security/cve/CVE-2021-47418.html * https://www.suse.com/security/cve/CVE-2021-47419.html * https://www.suse.com/security/cve/CVE-2021-47420.html * https://www.suse.com/security/cve/CVE-2021-47421.html * https://www.suse.com/security/cve/CVE-2021-47422.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47425.html * https://www.suse.com/security/cve/CVE-2021-47426.html * https://www.suse.com/security/cve/CVE-2021-47427.html * https://www.suse.com/security/cve/CVE-2021-47428.html * https://www.suse.com/security/cve/CVE-2021-47429.html * https://www.suse.com/security/cve/CVE-2021-47430.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47433.html * https://www.suse.com/security/cve/CVE-2021-47434.html * https://www.suse.com/security/cve/CVE-2021-47435.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47437.html * https://www.suse.com/security/cve/CVE-2021-47438.html * https://www.suse.com/security/cve/CVE-2021-47439.html * https://www.suse.com/security/cve/CVE-2021-47440.html * https://www.suse.com/security/cve/CVE-2021-47441.html * https://www.suse.com/security/cve/CVE-2021-47442.html * https://www.suse.com/security/cve/CVE-2021-47443.html * https://www.suse.com/security/cve/CVE-2021-47444.html * https://www.suse.com/security/cve/CVE-2021-47445.html * https://www.suse.com/security/cve/CVE-2021-47446.html * https://www.suse.com/security/cve/CVE-2021-47447.html * https://www.suse.com/security/cve/CVE-2021-47448.html * https://www.suse.com/security/cve/CVE-2021-47449.html * https://www.suse.com/security/cve/CVE-2021-47450.html * https://www.suse.com/security/cve/CVE-2021-47451.html * https://www.suse.com/security/cve/CVE-2021-47452.html * https://www.suse.com/security/cve/CVE-2021-47453.html * https://www.suse.com/security/cve/CVE-2021-47454.html * https://www.suse.com/security/cve/CVE-2021-47455.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47457.html * https://www.suse.com/security/cve/CVE-2021-47458.html * https://www.suse.com/security/cve/CVE-2021-47459.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47461.html * https://www.suse.com/security/cve/CVE-2021-47462.html * https://www.suse.com/security/cve/CVE-2021-47463.html * https://www.suse.com/security/cve/CVE-2021-47464.html * https://www.suse.com/security/cve/CVE-2021-47465.html * https://www.suse.com/security/cve/CVE-2021-47466.html * https://www.suse.com/security/cve/CVE-2021-47467.html * https://www.suse.com/security/cve/CVE-2021-47468.html * https://www.suse.com/security/cve/CVE-2021-47469.html * https://www.suse.com/security/cve/CVE-2021-47470.html * https://www.suse.com/security/cve/CVE-2021-47471.html * https://www.suse.com/security/cve/CVE-2021-47472.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47474.html * https://www.suse.com/security/cve/CVE-2021-47475.html * https://www.suse.com/security/cve/CVE-2021-47476.html * https://www.suse.com/security/cve/CVE-2021-47477.html * https://www.suse.com/security/cve/CVE-2021-47478.html * https://www.suse.com/security/cve/CVE-2021-47479.html * https://www.suse.com/security/cve/CVE-2021-47480.html * https://www.suse.com/security/cve/CVE-2021-47481.html * https://www.suse.com/security/cve/CVE-2021-47482.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47484.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47486.html * https://www.suse.com/security/cve/CVE-2021-47488.html * https://www.suse.com/security/cve/CVE-2021-47489.html * https://www.suse.com/security/cve/CVE-2021-47490.html * https://www.suse.com/security/cve/CVE-2021-47491.html * https://www.suse.com/security/cve/CVE-2021-47492.html * https://www.suse.com/security/cve/CVE-2021-47493.html * https://www.suse.com/security/cve/CVE-2021-47494.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47498.html * https://www.suse.com/security/cve/CVE-2021-47499.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47501.html * https://www.suse.com/security/cve/CVE-2021-47502.html * https://www.suse.com/security/cve/CVE-2021-47503.html * https://www.suse.com/security/cve/CVE-2021-47505.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47507.html * https://www.suse.com/security/cve/CVE-2021-47509.html * https://www.suse.com/security/cve/CVE-2021-47510.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47513.html * https://www.suse.com/security/cve/CVE-2021-47514.html * https://www.suse.com/security/cve/CVE-2021-47516.html * https://www.suse.com/security/cve/CVE-2021-47518.html * https://www.suse.com/security/cve/CVE-2021-47520.html * https://www.suse.com/security/cve/CVE-2021-47521.html * https://www.suse.com/security/cve/CVE-2021-47522.html * https://www.suse.com/security/cve/CVE-2021-47523.html * https://www.suse.com/security/cve/CVE-2021-47524.html * https://www.suse.com/security/cve/CVE-2021-47525.html * https://www.suse.com/security/cve/CVE-2021-47526.html * https://www.suse.com/security/cve/CVE-2021-47527.html * https://www.suse.com/security/cve/CVE-2021-47528.html * https://www.suse.com/security/cve/CVE-2021-47529.html * https://www.suse.com/security/cve/CVE-2021-47533.html * https://www.suse.com/security/cve/CVE-2021-47534.html * https://www.suse.com/security/cve/CVE-2021-47535.html * https://www.suse.com/security/cve/CVE-2021-47536.html * https://www.suse.com/security/cve/CVE-2021-47537.html * https://www.suse.com/security/cve/CVE-2021-47540.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47542.html * https://www.suse.com/security/cve/CVE-2021-47544.html * https://www.suse.com/security/cve/CVE-2021-47549.html * https://www.suse.com/security/cve/CVE-2021-47550.html * https://www.suse.com/security/cve/CVE-2021-47551.html * https://www.suse.com/security/cve/CVE-2021-47553.html * https://www.suse.com/security/cve/CVE-2021-47554.html * https://www.suse.com/security/cve/CVE-2021-47556.html * https://www.suse.com/security/cve/CVE-2021-47558.html * https://www.suse.com/security/cve/CVE-2021-47559.html * https://www.suse.com/security/cve/CVE-2021-47560.html * https://www.suse.com/security/cve/CVE-2021-47562.html * https://www.suse.com/security/cve/CVE-2021-47563.html * https://www.suse.com/security/cve/CVE-2021-47564.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2022-48632.html * https://www.suse.com/security/cve/CVE-2022-48634.html * https://www.suse.com/security/cve/CVE-2022-48636.html * https://www.suse.com/security/cve/CVE-2022-48652.html * https://www.suse.com/security/cve/CVE-2022-48671.html * https://www.suse.com/security/cve/CVE-2022-48672.html * https://www.suse.com/security/cve/CVE-2022-48673.html * https://www.suse.com/security/cve/CVE-2022-48675.html * https://www.suse.com/security/cve/CVE-2022-48686.html * https://www.suse.com/security/cve/CVE-2022-48687.html * https://www.suse.com/security/cve/CVE-2022-48688.html * https://www.suse.com/security/cve/CVE-2022-48692.html * https://www.suse.com/security/cve/CVE-2022-48693.html * https://www.suse.com/security/cve/CVE-2022-48694.html * https://www.suse.com/security/cve/CVE-2022-48695.html * https://www.suse.com/security/cve/CVE-2022-48697.html * https://www.suse.com/security/cve/CVE-2022-48699.html * https://www.suse.com/security/cve/CVE-2022-48700.html * https://www.suse.com/security/cve/CVE-2022-48701.html * https://www.suse.com/security/cve/CVE-2022-48702.html * https://www.suse.com/security/cve/CVE-2022-48703.html * https://www.suse.com/security/cve/CVE-2022-48704.html * https://www.suse.com/security/cve/CVE-2022-48708.html * https://www.suse.com/security/cve/CVE-2022-48709.html * https://www.suse.com/security/cve/CVE-2022-48710.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52702.html * https://www.suse.com/security/cve/CVE-2023-52703.html * https://www.suse.com/security/cve/CVE-2023-52707.html * https://www.suse.com/security/cve/CVE-2023-52708.html * https://www.suse.com/security/cve/CVE-2023-52730.html * https://www.suse.com/security/cve/CVE-2023-52733.html * https://www.suse.com/security/cve/CVE-2023-52736.html * https://www.suse.com/security/cve/CVE-2023-52738.html * https://www.suse.com/security/cve/CVE-2023-52739.html * https://www.suse.com/security/cve/CVE-2023-52740.html * https://www.suse.com/security/cve/CVE-2023-52741.html * https://www.suse.com/security/cve/CVE-2023-52742.html * https://www.suse.com/security/cve/CVE-2023-52743.html * https://www.suse.com/security/cve/CVE-2023-52744.html * https://www.suse.com/security/cve/CVE-2023-52745.html * https://www.suse.com/security/cve/CVE-2023-52747.html * https://www.suse.com/security/cve/CVE-2023-52753.html * https://www.suse.com/security/cve/CVE-2023-52754.html * https://www.suse.com/security/cve/CVE-2023-52756.html * https://www.suse.com/security/cve/CVE-2023-52759.html * https://www.suse.com/security/cve/CVE-2023-52763.html * https://www.suse.com/security/cve/CVE-2023-52764.html * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52774.html * https://www.suse.com/security/cve/CVE-2023-52781.html * https://www.suse.com/security/cve/CVE-2023-52788.html * https://www.suse.com/security/cve/CVE-2023-52789.html * https://www.suse.com/security/cve/CVE-2023-52791.html * https://www.suse.com/security/cve/CVE-2023-52798.html * https://www.suse.com/security/cve/CVE-2023-52799.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52804.html * https://www.suse.com/security/cve/CVE-2023-52805.html * https://www.suse.com/security/cve/CVE-2023-52806.html * https://www.suse.com/security/cve/CVE-2023-52810.html * https://www.suse.com/security/cve/CVE-2023-52811.html * https://www.suse.com/security/cve/CVE-2023-52814.html * https://www.suse.com/security/cve/CVE-2023-52816.html * https://www.suse.com/security/cve/CVE-2023-52817.html * https://www.suse.com/security/cve/CVE-2023-52818.html * https://www.suse.com/security/cve/CVE-2023-52819.html * https://www.suse.com/security/cve/CVE-2023-52821.html * https://www.suse.com/security/cve/CVE-2023-52825.html * https://www.suse.com/security/cve/CVE-2023-52826.html * https://www.suse.com/security/cve/CVE-2023-52832.html * https://www.suse.com/security/cve/CVE-2023-52833.html * https://www.suse.com/security/cve/CVE-2023-52834.html * https://www.suse.com/security/cve/CVE-2023-52838.html * https://www.suse.com/security/cve/CVE-2023-52840.html * https://www.suse.com/security/cve/CVE-2023-52841.html * https://www.suse.com/security/cve/CVE-2023-52844.html * https://www.suse.com/security/cve/CVE-2023-52847.html * https://www.suse.com/security/cve/CVE-2023-52853.html * https://www.suse.com/security/cve/CVE-2023-52854.html * https://www.suse.com/security/cve/CVE-2023-52855.html * https://www.suse.com/security/cve/CVE-2023-52856.html * https://www.suse.com/security/cve/CVE-2023-52858.html * https://www.suse.com/security/cve/CVE-2023-52864.html * https://www.suse.com/security/cve/CVE-2023-52865.html * https://www.suse.com/security/cve/CVE-2023-52867.html * https://www.suse.com/security/cve/CVE-2023-52868.html * https://www.suse.com/security/cve/CVE-2023-52870.html * https://www.suse.com/security/cve/CVE-2023-52871.html * https://www.suse.com/security/cve/CVE-2023-52872.html * https://www.suse.com/security/cve/CVE-2023-52873.html * https://www.suse.com/security/cve/CVE-2023-52875.html * https://www.suse.com/security/cve/CVE-2023-52876.html * https://www.suse.com/security/cve/CVE-2023-52877.html * https://www.suse.com/security/cve/CVE-2023-52878.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2024-0639.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26840.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26862.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26928.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35868.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-36926.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1174585 * https://bugzilla.suse.com/show_bug.cgi?id=1190569 * https://bugzilla.suse.com/show_bug.cgi?id=1191949 * https://bugzilla.suse.com/show_bug.cgi?id=1192107 * https://bugzilla.suse.com/show_bug.cgi?id=1193983 * https://bugzilla.suse.com/show_bug.cgi?id=1194288 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1196869 * https://bugzilla.suse.com/show_bug.cgi?id=1196956 * https://bugzilla.suse.com/show_bug.cgi?id=1197915 * https://bugzilla.suse.com/show_bug.cgi?id=1200313 * https://bugzilla.suse.com/show_bug.cgi?id=1201308 * https://bugzilla.suse.com/show_bug.cgi?id=1201489 * https://bugzilla.suse.com/show_bug.cgi?id=1208149 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1209799 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1211592 * https://bugzilla.suse.com/show_bug.cgi?id=1213863 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217515 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218917 * https://bugzilla.suse.com/show_bug.cgi?id=1220492 * https://bugzilla.suse.com/show_bug.cgi?id=1220783 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221645 * https://bugzilla.suse.com/show_bug.cgi?id=1221958 * https://bugzilla.suse.com/show_bug.cgi?id=1222011 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222976 * https://bugzilla.suse.com/show_bug.cgi?id=1223057 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223111 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223191 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223481 * https://bugzilla.suse.com/show_bug.cgi?id=1223501 * https://bugzilla.suse.com/show_bug.cgi?id=1223512 * https://bugzilla.suse.com/show_bug.cgi?id=1223520 * https://bugzilla.suse.com/show_bug.cgi?id=1223532 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223894 * https://bugzilla.suse.com/show_bug.cgi?id=1223921 * https://bugzilla.suse.com/show_bug.cgi?id=1223922 * https://bugzilla.suse.com/show_bug.cgi?id=1223923 * https://bugzilla.suse.com/show_bug.cgi?id=1223924 * https://bugzilla.suse.com/show_bug.cgi?id=1223929 * https://bugzilla.suse.com/show_bug.cgi?id=1223931 * https://bugzilla.suse.com/show_bug.cgi?id=1223932 * https://bugzilla.suse.com/show_bug.cgi?id=1223934 * https://bugzilla.suse.com/show_bug.cgi?id=1223941 * https://bugzilla.suse.com/show_bug.cgi?id=1223948 * https://bugzilla.suse.com/show_bug.cgi?id=1223952 * https://bugzilla.suse.com/show_bug.cgi?id=1223953 * https://bugzilla.suse.com/show_bug.cgi?id=1223957 * https://bugzilla.suse.com/show_bug.cgi?id=1223962 * https://bugzilla.suse.com/show_bug.cgi?id=1223963 * https://bugzilla.suse.com/show_bug.cgi?id=1223964 * https://bugzilla.suse.com/show_bug.cgi?id=1223996 * https://bugzilla.suse.com/show_bug.cgi?id=1224085 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224137 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224488 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224664 * https://bugzilla.suse.com/show_bug.cgi?id=1224678 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224763 * https://bugzilla.suse.com/show_bug.cgi?id=1224816 * https://bugzilla.suse.com/show_bug.cgi?id=1224895 * https://bugzilla.suse.com/show_bug.cgi?id=1224898 * https://bugzilla.suse.com/show_bug.cgi?id=1224900 * https://bugzilla.suse.com/show_bug.cgi?id=1224901 * https://bugzilla.suse.com/show_bug.cgi?id=1224902 * https://bugzilla.suse.com/show_bug.cgi?id=1224903 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224905 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224910 * https://bugzilla.suse.com/show_bug.cgi?id=1224911 * https://bugzilla.suse.com/show_bug.cgi?id=1224912 * https://bugzilla.suse.com/show_bug.cgi?id=1224913 * https://bugzilla.suse.com/show_bug.cgi?id=1224914 * https://bugzilla.suse.com/show_bug.cgi?id=1224915 * https://bugzilla.suse.com/show_bug.cgi?id=1224920 * https://bugzilla.suse.com/show_bug.cgi?id=1224928 * https://bugzilla.suse.com/show_bug.cgi?id=1224931 * https://bugzilla.suse.com/show_bug.cgi?id=1224932 * https://bugzilla.suse.com/show_bug.cgi?id=1224937 * https://bugzilla.suse.com/show_bug.cgi?id=1224942 * https://bugzilla.suse.com/show_bug.cgi?id=1224944 * https://bugzilla.suse.com/show_bug.cgi?id=1224945 * https://bugzilla.suse.com/show_bug.cgi?id=1224947 * https://bugzilla.suse.com/show_bug.cgi?id=1224956 * https://bugzilla.suse.com/show_bug.cgi?id=1224988 * https://bugzilla.suse.com/show_bug.cgi?id=1225000 * https://bugzilla.suse.com/show_bug.cgi?id=1225003 * https://bugzilla.suse.com/show_bug.cgi?id=1225005 * https://bugzilla.suse.com/show_bug.cgi?id=1225009 * https://bugzilla.suse.com/show_bug.cgi?id=1225022 * https://bugzilla.suse.com/show_bug.cgi?id=1225031 * https://bugzilla.suse.com/show_bug.cgi?id=1225032 * https://bugzilla.suse.com/show_bug.cgi?id=1225036 * https://bugzilla.suse.com/show_bug.cgi?id=1225044 * https://bugzilla.suse.com/show_bug.cgi?id=1225076 * https://bugzilla.suse.com/show_bug.cgi?id=1225077 * https://bugzilla.suse.com/show_bug.cgi?id=1225082 * https://bugzilla.suse.com/show_bug.cgi?id=1225086 * https://bugzilla.suse.com/show_bug.cgi?id=1225092 * https://bugzilla.suse.com/show_bug.cgi?id=1225095 * https://bugzilla.suse.com/show_bug.cgi?id=1225096 * https://bugzilla.suse.com/show_bug.cgi?id=1225106 * https://bugzilla.suse.com/show_bug.cgi?id=1225108 * https://bugzilla.suse.com/show_bug.cgi?id=1225109 * https://bugzilla.suse.com/show_bug.cgi?id=1225118 * https://bugzilla.suse.com/show_bug.cgi?id=1225121 * https://bugzilla.suse.com/show_bug.cgi?id=1225122 * https://bugzilla.suse.com/show_bug.cgi?id=1225123 * https://bugzilla.suse.com/show_bug.cgi?id=1225125 * https://bugzilla.suse.com/show_bug.cgi?id=1225126 * https://bugzilla.suse.com/show_bug.cgi?id=1225127 * https://bugzilla.suse.com/show_bug.cgi?id=1225129 * https://bugzilla.suse.com/show_bug.cgi?id=1225131 * https://bugzilla.suse.com/show_bug.cgi?id=1225132 * https://bugzilla.suse.com/show_bug.cgi?id=1225145 * https://bugzilla.suse.com/show_bug.cgi?id=1225151 * https://bugzilla.suse.com/show_bug.cgi?id=1225153 * https://bugzilla.suse.com/show_bug.cgi?id=1225156 * https://bugzilla.suse.com/show_bug.cgi?id=1225158 * https://bugzilla.suse.com/show_bug.cgi?id=1225160 * https://bugzilla.suse.com/show_bug.cgi?id=1225161 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225167 * https://bugzilla.suse.com/show_bug.cgi?id=1225180 * https://bugzilla.suse.com/show_bug.cgi?id=1225183 * https://bugzilla.suse.com/show_bug.cgi?id=1225184 * https://bugzilla.suse.com/show_bug.cgi?id=1225186 * https://bugzilla.suse.com/show_bug.cgi?id=1225187 * https://bugzilla.suse.com/show_bug.cgi?id=1225189 * https://bugzilla.suse.com/show_bug.cgi?id=1225190 * https://bugzilla.suse.com/show_bug.cgi?id=1225191 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225195 * https://bugzilla.suse.com/show_bug.cgi?id=1225198 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225203 * https://bugzilla.suse.com/show_bug.cgi?id=1225205 * https://bugzilla.suse.com/show_bug.cgi?id=1225206 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225209 * https://bugzilla.suse.com/show_bug.cgi?id=1225210 * https://bugzilla.suse.com/show_bug.cgi?id=1225214 * https://bugzilla.suse.com/show_bug.cgi?id=1225223 * https://bugzilla.suse.com/show_bug.cgi?id=1225224 * https://bugzilla.suse.com/show_bug.cgi?id=1225225 * https://bugzilla.suse.com/show_bug.cgi?id=1225227 * https://bugzilla.suse.com/show_bug.cgi?id=1225228 * https://bugzilla.suse.com/show_bug.cgi?id=1225229 * https://bugzilla.suse.com/show_bug.cgi?id=1225230 * https://bugzilla.suse.com/show_bug.cgi?id=1225232 * https://bugzilla.suse.com/show_bug.cgi?id=1225233 * https://bugzilla.suse.com/show_bug.cgi?id=1225235 * https://bugzilla.suse.com/show_bug.cgi?id=1225236 * https://bugzilla.suse.com/show_bug.cgi?id=1225237 * https://bugzilla.suse.com/show_bug.cgi?id=1225238 * https://bugzilla.suse.com/show_bug.cgi?id=1225239 * https://bugzilla.suse.com/show_bug.cgi?id=1225240 * https://bugzilla.suse.com/show_bug.cgi?id=1225241 * https://bugzilla.suse.com/show_bug.cgi?id=1225242 * https://bugzilla.suse.com/show_bug.cgi?id=1225243 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225245 * https://bugzilla.suse.com/show_bug.cgi?id=1225246 * https://bugzilla.suse.com/show_bug.cgi?id=1225247 * https://bugzilla.suse.com/show_bug.cgi?id=1225248 * https://bugzilla.suse.com/show_bug.cgi?id=1225249 * https://bugzilla.suse.com/show_bug.cgi?id=1225250 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225252 * https://bugzilla.suse.com/show_bug.cgi?id=1225253 * https://bugzilla.suse.com/show_bug.cgi?id=1225254 * https://bugzilla.suse.com/show_bug.cgi?id=1225255 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225257 * https://bugzilla.suse.com/show_bug.cgi?id=1225258 * https://bugzilla.suse.com/show_bug.cgi?id=1225259 * https://bugzilla.suse.com/show_bug.cgi?id=1225260 * https://bugzilla.suse.com/show_bug.cgi?id=1225261 * https://bugzilla.suse.com/show_bug.cgi?id=1225262 * https://bugzilla.suse.com/show_bug.cgi?id=1225263 * https://bugzilla.suse.com/show_bug.cgi?id=1225268 * https://bugzilla.suse.com/show_bug.cgi?id=1225301 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225304 * https://bugzilla.suse.com/show_bug.cgi?id=1225306 * https://bugzilla.suse.com/show_bug.cgi?id=1225316 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225320 * https://bugzilla.suse.com/show_bug.cgi?id=1225321 * https://bugzilla.suse.com/show_bug.cgi?id=1225322 * https://bugzilla.suse.com/show_bug.cgi?id=1225323 * https://bugzilla.suse.com/show_bug.cgi?id=1225326 * https://bugzilla.suse.com/show_bug.cgi?id=1225327 * https://bugzilla.suse.com/show_bug.cgi?id=1225328 * https://bugzilla.suse.com/show_bug.cgi?id=1225329 * https://bugzilla.suse.com/show_bug.cgi?id=1225330 * https://bugzilla.suse.com/show_bug.cgi?id=1225331 * https://bugzilla.suse.com/show_bug.cgi?id=1225332 * https://bugzilla.suse.com/show_bug.cgi?id=1225333 * https://bugzilla.suse.com/show_bug.cgi?id=1225334 * https://bugzilla.suse.com/show_bug.cgi?id=1225335 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225337 * https://bugzilla.suse.com/show_bug.cgi?id=1225338 * https://bugzilla.suse.com/show_bug.cgi?id=1225339 * https://bugzilla.suse.com/show_bug.cgi?id=1225341 * https://bugzilla.suse.com/show_bug.cgi?id=1225342 * https://bugzilla.suse.com/show_bug.cgi?id=1225344 * https://bugzilla.suse.com/show_bug.cgi?id=1225346 * https://bugzilla.suse.com/show_bug.cgi?id=1225347 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225353 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225357 * https://bugzilla.suse.com/show_bug.cgi?id=1225358 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225361 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225368 * https://bugzilla.suse.com/show_bug.cgi?id=1225369 * https://bugzilla.suse.com/show_bug.cgi?id=1225370 * https://bugzilla.suse.com/show_bug.cgi?id=1225372 * https://bugzilla.suse.com/show_bug.cgi?id=1225373 * https://bugzilla.suse.com/show_bug.cgi?id=1225374 * https://bugzilla.suse.com/show_bug.cgi?id=1225375 * https://bugzilla.suse.com/show_bug.cgi?id=1225376 * https://bugzilla.suse.com/show_bug.cgi?id=1225377 * https://bugzilla.suse.com/show_bug.cgi?id=1225379 * https://bugzilla.suse.com/show_bug.cgi?id=1225383 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225386 * https://bugzilla.suse.com/show_bug.cgi?id=1225387 * https://bugzilla.suse.com/show_bug.cgi?id=1225388 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225392 * https://bugzilla.suse.com/show_bug.cgi?id=1225393 * https://bugzilla.suse.com/show_bug.cgi?id=1225396 * https://bugzilla.suse.com/show_bug.cgi?id=1225400 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225405 * https://bugzilla.suse.com/show_bug.cgi?id=1225409 * https://bugzilla.suse.com/show_bug.cgi?id=1225410 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225425 * https://bugzilla.suse.com/show_bug.cgi?id=1225427 * https://bugzilla.suse.com/show_bug.cgi?id=1225431 * https://bugzilla.suse.com/show_bug.cgi?id=1225435 * https://bugzilla.suse.com/show_bug.cgi?id=1225436 * https://bugzilla.suse.com/show_bug.cgi?id=1225437 * https://bugzilla.suse.com/show_bug.cgi?id=1225438 * https://bugzilla.suse.com/show_bug.cgi?id=1225439 * https://bugzilla.suse.com/show_bug.cgi?id=1225441 * https://bugzilla.suse.com/show_bug.cgi?id=1225445 * https://bugzilla.suse.com/show_bug.cgi?id=1225446 * https://bugzilla.suse.com/show_bug.cgi?id=1225447 * https://bugzilla.suse.com/show_bug.cgi?id=1225450 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225455 * https://bugzilla.suse.com/show_bug.cgi?id=1225461 * https://bugzilla.suse.com/show_bug.cgi?id=1225463 * https://bugzilla.suse.com/show_bug.cgi?id=1225464 * https://bugzilla.suse.com/show_bug.cgi?id=1225466 * https://bugzilla.suse.com/show_bug.cgi?id=1225471 * https://bugzilla.suse.com/show_bug.cgi?id=1225472 * https://bugzilla.suse.com/show_bug.cgi?id=1225478 * https://bugzilla.suse.com/show_bug.cgi?id=1225479 * https://bugzilla.suse.com/show_bug.cgi?id=1225482 * https://bugzilla.suse.com/show_bug.cgi?id=1225483 * https://bugzilla.suse.com/show_bug.cgi?id=1225488 * https://bugzilla.suse.com/show_bug.cgi?id=1225490 * https://bugzilla.suse.com/show_bug.cgi?id=1225492 * https://bugzilla.suse.com/show_bug.cgi?id=1225495 * https://bugzilla.suse.com/show_bug.cgi?id=1225499 * https://bugzilla.suse.com/show_bug.cgi?id=1225500 * https://bugzilla.suse.com/show_bug.cgi?id=1225501 * https://bugzilla.suse.com/show_bug.cgi?id=1225508 * https://bugzilla.suse.com/show_bug.cgi?id=1225510 * https://bugzilla.suse.com/show_bug.cgi?id=1225529 * https://bugzilla.suse.com/show_bug.cgi?id=1225530 * https://bugzilla.suse.com/show_bug.cgi?id=1225532 * https://bugzilla.suse.com/show_bug.cgi?id=1225534 * https://bugzilla.suse.com/show_bug.cgi?id=1225549 * https://bugzilla.suse.com/show_bug.cgi?id=1225550 * https://bugzilla.suse.com/show_bug.cgi?id=1225553 * https://bugzilla.suse.com/show_bug.cgi?id=1225554 * https://bugzilla.suse.com/show_bug.cgi?id=1225557 * https://bugzilla.suse.com/show_bug.cgi?id=1225559 * https://bugzilla.suse.com/show_bug.cgi?id=1225560 * https://bugzilla.suse.com/show_bug.cgi?id=1225565 * https://bugzilla.suse.com/show_bug.cgi?id=1225566 * https://bugzilla.suse.com/show_bug.cgi?id=1225569 * https://bugzilla.suse.com/show_bug.cgi?id=1225570 * https://bugzilla.suse.com/show_bug.cgi?id=1225571 * https://bugzilla.suse.com/show_bug.cgi?id=1225572 * https://bugzilla.suse.com/show_bug.cgi?id=1225577 * https://bugzilla.suse.com/show_bug.cgi?id=1225583 * https://bugzilla.suse.com/show_bug.cgi?id=1225584 * https://bugzilla.suse.com/show_bug.cgi?id=1225588 * https://bugzilla.suse.com/show_bug.cgi?id=1225589 * https://bugzilla.suse.com/show_bug.cgi?id=1225590 * https://bugzilla.suse.com/show_bug.cgi?id=1225591 * https://bugzilla.suse.com/show_bug.cgi?id=1225592 * https://bugzilla.suse.com/show_bug.cgi?id=1225595 * https://bugzilla.suse.com/show_bug.cgi?id=1225599 * https://jira.suse.com/browse/PED-8111 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 12 20:32:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 12 Jun 2024 20:32:07 -0000 Subject: SUSE-SU-2024:2010-1: important: Security update for the Linux Kernel Message-ID: <171822432781.24815.18220360460675635466@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:2010-1 Rating: important References: * bsc#1065729 * bsc#1151927 * bsc#1152472 * bsc#1154353 * bsc#1156395 * bsc#1174585 * bsc#1176447 * bsc#1176774 * bsc#1176869 * bsc#1178134 * bsc#1181147 * bsc#1184631 * bsc#1185589 * bsc#1185902 * bsc#1186885 * bsc#1188616 * bsc#1188772 * bsc#1189883 * bsc#1190795 * bsc#1191452 * bsc#1192107 * bsc#1194288 * bsc#1194591 * bsc#1196956 * bsc#1197760 * bsc#1198029 * bsc#1199304 * bsc#1200619 * bsc#1203389 * bsc#1206646 * bsc#1209657 * bsc#1210335 * bsc#1210629 * bsc#1213476 * bsc#1215420 * bsc#1216702 * bsc#1217169 * bsc#1220137 * bsc#1220144 * bsc#1220754 * bsc#1220877 * bsc#1220960 * bsc#1221044 * bsc#1221113 * bsc#1221829 * bsc#1222251 * bsc#1222619 * bsc#1222838 * bsc#1222867 * bsc#1223084 * bsc#1223138 * bsc#1223384 * bsc#1223390 * bsc#1223512 * bsc#1223626 * bsc#1223715 * bsc#1223932 * bsc#1223934 * bsc#1224099 * bsc#1224174 * bsc#1224438 * bsc#1224482 * bsc#1224511 * bsc#1224592 * bsc#1224816 * bsc#1224826 * bsc#1224830 * bsc#1224831 * bsc#1224832 * bsc#1224834 * bsc#1224841 * bsc#1224842 * bsc#1224843 * bsc#1224844 * bsc#1224846 * bsc#1224849 * bsc#1224852 * bsc#1224853 * bsc#1224854 * bsc#1224859 * bsc#1224882 * bsc#1224886 * bsc#1224888 * bsc#1224889 * bsc#1224891 * bsc#1224892 * bsc#1224893 * bsc#1224899 * bsc#1224904 * bsc#1224907 * bsc#1224909 * bsc#1224916 * bsc#1224917 * bsc#1224922 * bsc#1224923 * bsc#1224924 * bsc#1224926 * bsc#1224928 * bsc#1224953 * bsc#1224954 * bsc#1224955 * bsc#1224957 * bsc#1224961 * bsc#1224963 * bsc#1224965 * bsc#1224966 * bsc#1224968 * bsc#1224981 * bsc#1224982 * bsc#1224983 * bsc#1224984 * bsc#1224987 * bsc#1224990 * bsc#1224993 * bsc#1224996 * bsc#1224997 * bsc#1225026 * bsc#1225030 * bsc#1225058 * bsc#1225060 * bsc#1225083 * bsc#1225084 * bsc#1225091 * bsc#1225112 * bsc#1225113 * bsc#1225128 * bsc#1225140 * bsc#1225143 * bsc#1225148 * bsc#1225155 * bsc#1225164 * bsc#1225177 * bsc#1225178 * bsc#1225181 * bsc#1225192 * bsc#1225193 * bsc#1225198 * bsc#1225201 * bsc#1225206 * bsc#1225207 * bsc#1225208 * bsc#1225214 * bsc#1225223 * bsc#1225224 * bsc#1225230 * bsc#1225232 * bsc#1225233 * bsc#1225237 * bsc#1225238 * bsc#1225243 * bsc#1225244 * bsc#1225247 * bsc#1225251 * bsc#1225252 * bsc#1225256 * bsc#1225261 * bsc#1225262 * bsc#1225263 * bsc#1225301 * bsc#1225303 * bsc#1225316 * bsc#1225318 * bsc#1225320 * bsc#1225321 * bsc#1225322 * bsc#1225326 * bsc#1225327 * bsc#1225328 * bsc#1225330 * bsc#1225333 * bsc#1225336 * bsc#1225341 * bsc#1225346 * bsc#1225351 * bsc#1225354 * bsc#1225355 * bsc#1225357 * bsc#1225358 * bsc#1225360 * bsc#1225361 * bsc#1225366 * bsc#1225367 * bsc#1225369 * bsc#1225370 * bsc#1225372 * bsc#1225374 * bsc#1225384 * bsc#1225386 * bsc#1225387 * bsc#1225390 * bsc#1225393 * bsc#1225400 * bsc#1225404 * bsc#1225405 * bsc#1225409 * bsc#1225411 * bsc#1225424 * bsc#1225427 * bsc#1225435 * bsc#1225437 * bsc#1225438 * bsc#1225439 * bsc#1225446 * bsc#1225447 * bsc#1225448 * bsc#1225450 * bsc#1225453 * bsc#1225455 * bsc#1225468 * bsc#1225499 * bsc#1225500 * bsc#1225508 * bsc#1225534 Cross-References: * CVE-2020-36788 * CVE-2021-3743 * CVE-2021-39698 * CVE-2021-43056 * CVE-2021-47104 * CVE-2021-47192 * CVE-2021-47200 * CVE-2021-47220 * CVE-2021-47227 * CVE-2021-47228 * CVE-2021-47229 * CVE-2021-47230 * CVE-2021-47231 * CVE-2021-47235 * CVE-2021-47236 * CVE-2021-47237 * CVE-2021-47239 * CVE-2021-47240 * CVE-2021-47241 * CVE-2021-47246 * CVE-2021-47252 * CVE-2021-47253 * CVE-2021-47254 * CVE-2021-47255 * CVE-2021-47258 * CVE-2021-47259 * CVE-2021-47260 * CVE-2021-47261 * CVE-2021-47263 * CVE-2021-47265 * CVE-2021-47267 * CVE-2021-47269 * CVE-2021-47270 * CVE-2021-47274 * CVE-2021-47275 * CVE-2021-47276 * CVE-2021-47280 * CVE-2021-47281 * CVE-2021-47284 * CVE-2021-47285 * CVE-2021-47288 * CVE-2021-47289 * CVE-2021-47296 * CVE-2021-47301 * CVE-2021-47302 * CVE-2021-47305 * CVE-2021-47307 * CVE-2021-47308 * CVE-2021-47314 * CVE-2021-47315 * CVE-2021-47320 * CVE-2021-47321 * CVE-2021-47323 * CVE-2021-47324 * CVE-2021-47329 * CVE-2021-47330 * CVE-2021-47332 * CVE-2021-47333 * CVE-2021-47334 * CVE-2021-47337 * CVE-2021-47338 * CVE-2021-47340 * CVE-2021-47341 * CVE-2021-47343 * CVE-2021-47344 * CVE-2021-47347 * CVE-2021-47348 * CVE-2021-47350 * CVE-2021-47353 * CVE-2021-47354 * CVE-2021-47356 * CVE-2021-47369 * CVE-2021-47375 * CVE-2021-47378 * CVE-2021-47381 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47387 * CVE-2021-47388 * CVE-2021-47391 * CVE-2021-47392 * CVE-2021-47393 * CVE-2021-47395 * CVE-2021-47396 * CVE-2021-47399 * CVE-2021-47402 * CVE-2021-47404 * CVE-2021-47405 * CVE-2021-47409 * CVE-2021-47413 * CVE-2021-47416 * CVE-2021-47422 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47425 * CVE-2021-47426 * CVE-2021-47428 * CVE-2021-47431 * CVE-2021-47434 * CVE-2021-47435 * CVE-2021-47436 * CVE-2021-47441 * CVE-2021-47442 * CVE-2021-47443 * CVE-2021-47444 * CVE-2021-47445 * CVE-2021-47451 * CVE-2021-47456 * CVE-2021-47458 * CVE-2021-47460 * CVE-2021-47464 * CVE-2021-47465 * CVE-2021-47468 * CVE-2021-47473 * CVE-2021-47478 * CVE-2021-47480 * CVE-2021-47482 * CVE-2021-47483 * CVE-2021-47485 * CVE-2021-47493 * CVE-2021-47494 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47498 * CVE-2021-47499 * CVE-2021-47500 * CVE-2021-47501 * CVE-2021-47502 * CVE-2021-47503 * CVE-2021-47505 * CVE-2021-47506 * CVE-2021-47507 * CVE-2021-47509 * CVE-2021-47511 * CVE-2021-47512 * CVE-2021-47516 * CVE-2021-47518 * CVE-2021-47521 * CVE-2021-47522 * CVE-2021-47523 * CVE-2021-47527 * CVE-2021-47535 * CVE-2021-47536 * CVE-2021-47538 * CVE-2021-47540 * CVE-2021-47541 * CVE-2021-47542 * CVE-2021-47549 * CVE-2021-47557 * CVE-2021-47562 * CVE-2021-47563 * CVE-2021-47565 * CVE-2022-1195 * CVE-2022-20132 * CVE-2022-48636 * CVE-2022-48673 * CVE-2022-48704 * CVE-2022-48710 * CVE-2023-0160 * CVE-2023-1829 * CVE-2023-2176 * CVE-2023-4244 * CVE-2023-47233 * CVE-2023-52433 * CVE-2023-52581 * CVE-2023-52591 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52686 * CVE-2023-52840 * CVE-2023-52871 * CVE-2023-52880 * CVE-2023-6531 * CVE-2024-26581 * CVE-2024-26643 * CVE-2024-26828 * CVE-2024-26921 * CVE-2024-26925 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-27413 * CVE-2024-35811 * CVE-2024-35895 * CVE-2024-35914 CVSS scores: * CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-3743 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47228 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47237 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47253 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47259 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47267 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47296 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47329 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47333 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47337 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47338 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47340 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47341 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47343 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47348 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2021-47538 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-20132 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2022-20132 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4244 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4244 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52433 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26581 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves 186 vulnerabilities and has 27 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201). * CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354) * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934). * CVE-2023-52871: Handle a second device without data corruption (bsc#1225534) * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). * CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355). * CVE-2021-47500: Fixed trigger reference couting (bsc#1225360). * CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438). * CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208). * CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411). * CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928). * CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954) * CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2024-26929: Fixed double free of fcport (bsc#1223715). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223626). * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169). * CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). * CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729). The following non-security bugs were fixed: * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * btrfs: do not start relocation until in progress drops are done (bsc#1222251). * btrfs: do not start relocation until in progress drops are done (bsc#1222251). * cifs: add missing spinlock around tcon refcount (bsc#1213476). * cifs: avoid dup prefix path in dfs_get_automount_devname() (bsc#1213476). * cifs: avoid race conditions with parallel reconnects (bsc#1213476). * cifs: avoid re-lookups in dfs_cache_find() (bsc#1213476). * cifs: avoid use of global locks for high contention data (bsc#1213476). * cifs: check only tcon status on tcon related functions (bsc#1213476). * cifs: do all necessary checks for credits within or before locking (bsc#1213476). * cifs: do not block in dfs_cache_noreq_update_tgthint() (bsc#1213476). * cifs: do not refresh cached referrals from unactive mounts (bsc#1213476). * cifs: do not take exclusive lock for updating target hints (bsc#1213476). * cifs: fix confusing debug message (bsc#1213476). * cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1213476). * cifs: fix potential deadlock in cache_refresh_path() (bsc#1213476). * cifs: fix refresh of cached referrals (bsc#1213476). * cifs: fix return of uninitialized rc in dfs_cache_update_tgthint() (bsc#1213476). * cifs: fix source pathname comparison of dfs supers (bsc#1213476). * cifs: fix status checks in cifs_tree_connect (bsc#1213476). * cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1213476). * cifs: get rid of dns resolve worker (bsc#1213476). * cifs: get rid of mount options string parsing (bsc#1213476). * cifs: handle cache lookup errors different than -ENOENT (bsc#1213476). * cifs: ignore ipc reconnect failures during dfs failover (bsc#1213476). * cifs: match even the scope id for ipv6 addresses (bsc#1213476). * cifs: optimize reconnect of nested links (bsc#1213476). * cifs: prevent data race in smb2_reconnect() (bsc#1213476). * cifs: refresh root referrals (bsc#1213476). * cifs: remove duplicate code in __refresh_tcon() (bsc#1213476). * cifs: remove unused function (bsc#1213476). * cifs: remove unused smb3_fs_context::mount_options (bsc#1213476). * cifs: return DFS root session id in DebugData (bsc#1213476). * cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1213476). * cifs: set correct ipc status after initial tree connect (bsc#1213476). * cifs: set correct status of tcon ipc when reconnecting (bsc#1213476). * cifs: set correct tcon status after initial tree connect (bsc#1213476). * cifs: set DFS root session in cifs_get_smb_ses() (bsc#1213476). * cifs: set resolved ip in sockaddr (bsc#1213476). * cifs: share dfs connections and supers (bsc#1213476). * cifs: split out ses and tcon retrieval from mount_get_conns() (bsc#1213476). * cifs: use fs_context for automounts (bsc#1213476). * cifs: use origin fullpath for automounts (bsc#1213476). * cifs: use tcon allocation functions even for dummy tcon (bsc#1213476). * netfilter: nf_tables: defer gc run if previous batch is still pending (git- fixes). * netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path (git-fixes). * netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes). * netfilter: nf_tables: fix memleak when more than 255 elements expired (git- fixes). * netfilter: nf_tables: GC transaction race with abort path (git-fixes). * netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes). * netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes). * netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (git-fixes). * netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git- fixes). * netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (git-fixes). * netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes). * netfilter: nf_tables: use correct lock to protect gc_list (git-fixes). * netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git- fixes). * netfilter: nft_set_rbtree: Add missing expired checks (git-fixes). * netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named sets (git-fixes). * netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match (git-fixes). * netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes). * netfilter: nft_set_rbtree: Do not account for expired elements on insertion (git-fixes). * netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on insertion (git-fixes). * netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes). * netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes). * netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap detection (git-fixes). * netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start() (git-fixes). * netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (git-fixes). * netfilter: nft_set_rbtree: skip elements in transaction from garbage collection (git-fixes). * netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes). * netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction (git-fixes). * netfilter: nft_set_rbtree: Switch to node list walk for overlap detection (git-fixes). * netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes). * NFC: nxp: add NXP1002 (bsc#1185589). * PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243). * smb: client: fix dfs link mount against w2k8 (git-fixes). * smb: client: fix null auth (bsc#1213476). * smb: client: set correct id, uid and cruid for multiuser automounts (git- fixes). * x86/xen: Drop USERGS_SYSRET64 paravirt call (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2010=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2010=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2010=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (nosrc x86_64) * kernel-rt-5.3.18-150300.172.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * kernel-rt-debugsource-5.3.18-150300.172.1 * kernel-rt-debuginfo-5.3.18-150300.172.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * kernel-source-rt-5.3.18-150300.172.1 * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.172.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * kernel-rt-debugsource-5.3.18-150300.172.1 * kernel-rt-debuginfo-5.3.18-150300.172.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * kernel-source-rt-5.3.18-150300.172.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.172.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * kernel-rt-debugsource-5.3.18-150300.172.1 * kernel-rt-debuginfo-5.3.18-150300.172.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * kernel-source-rt-5.3.18-150300.172.1 ## References: * https://www.suse.com/security/cve/CVE-2020-36788.html * https://www.suse.com/security/cve/CVE-2021-3743.html * https://www.suse.com/security/cve/CVE-2021-39698.html * https://www.suse.com/security/cve/CVE-2021-43056.html * https://www.suse.com/security/cve/CVE-2021-47104.html * https://www.suse.com/security/cve/CVE-2021-47192.html * https://www.suse.com/security/cve/CVE-2021-47200.html * https://www.suse.com/security/cve/CVE-2021-47220.html * https://www.suse.com/security/cve/CVE-2021-47227.html * https://www.suse.com/security/cve/CVE-2021-47228.html * https://www.suse.com/security/cve/CVE-2021-47229.html * https://www.suse.com/security/cve/CVE-2021-47230.html * https://www.suse.com/security/cve/CVE-2021-47231.html * https://www.suse.com/security/cve/CVE-2021-47235.html * https://www.suse.com/security/cve/CVE-2021-47236.html * https://www.suse.com/security/cve/CVE-2021-47237.html * https://www.suse.com/security/cve/CVE-2021-47239.html * https://www.suse.com/security/cve/CVE-2021-47240.html * https://www.suse.com/security/cve/CVE-2021-47241.html * https://www.suse.com/security/cve/CVE-2021-47246.html * https://www.suse.com/security/cve/CVE-2021-47252.html * https://www.suse.com/security/cve/CVE-2021-47253.html * https://www.suse.com/security/cve/CVE-2021-47254.html * https://www.suse.com/security/cve/CVE-2021-47255.html * https://www.suse.com/security/cve/CVE-2021-47258.html * https://www.suse.com/security/cve/CVE-2021-47259.html * https://www.suse.com/security/cve/CVE-2021-47260.html * https://www.suse.com/security/cve/CVE-2021-47261.html * https://www.suse.com/security/cve/CVE-2021-47263.html * https://www.suse.com/security/cve/CVE-2021-47265.html * https://www.suse.com/security/cve/CVE-2021-47267.html * https://www.suse.com/security/cve/CVE-2021-47269.html * https://www.suse.com/security/cve/CVE-2021-47270.html * https://www.suse.com/security/cve/CVE-2021-47274.html * https://www.suse.com/security/cve/CVE-2021-47275.html * https://www.suse.com/security/cve/CVE-2021-47276.html * https://www.suse.com/security/cve/CVE-2021-47280.html * https://www.suse.com/security/cve/CVE-2021-47281.html * https://www.suse.com/security/cve/CVE-2021-47284.html * https://www.suse.com/security/cve/CVE-2021-47285.html * https://www.suse.com/security/cve/CVE-2021-47288.html * https://www.suse.com/security/cve/CVE-2021-47289.html * https://www.suse.com/security/cve/CVE-2021-47296.html * https://www.suse.com/security/cve/CVE-2021-47301.html * https://www.suse.com/security/cve/CVE-2021-47302.html * https://www.suse.com/security/cve/CVE-2021-47305.html * https://www.suse.com/security/cve/CVE-2021-47307.html * https://www.suse.com/security/cve/CVE-2021-47308.html * https://www.suse.com/security/cve/CVE-2021-47314.html * https://www.suse.com/security/cve/CVE-2021-47315.html * https://www.suse.com/security/cve/CVE-2021-47320.html * https://www.suse.com/security/cve/CVE-2021-47321.html * https://www.suse.com/security/cve/CVE-2021-47323.html * https://www.suse.com/security/cve/CVE-2021-47324.html * https://www.suse.com/security/cve/CVE-2021-47329.html * https://www.suse.com/security/cve/CVE-2021-47330.html * https://www.suse.com/security/cve/CVE-2021-47332.html * https://www.suse.com/security/cve/CVE-2021-47333.html * https://www.suse.com/security/cve/CVE-2021-47334.html * https://www.suse.com/security/cve/CVE-2021-47337.html * https://www.suse.com/security/cve/CVE-2021-47338.html * https://www.suse.com/security/cve/CVE-2021-47340.html * https://www.suse.com/security/cve/CVE-2021-47341.html * https://www.suse.com/security/cve/CVE-2021-47343.html * https://www.suse.com/security/cve/CVE-2021-47344.html * https://www.suse.com/security/cve/CVE-2021-47347.html * https://www.suse.com/security/cve/CVE-2021-47348.html * https://www.suse.com/security/cve/CVE-2021-47350.html * https://www.suse.com/security/cve/CVE-2021-47353.html * https://www.suse.com/security/cve/CVE-2021-47354.html * https://www.suse.com/security/cve/CVE-2021-47356.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47381.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47387.html * https://www.suse.com/security/cve/CVE-2021-47388.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47392.html * https://www.suse.com/security/cve/CVE-2021-47393.html * https://www.suse.com/security/cve/CVE-2021-47395.html * https://www.suse.com/security/cve/CVE-2021-47396.html * https://www.suse.com/security/cve/CVE-2021-47399.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47405.html * https://www.suse.com/security/cve/CVE-2021-47409.html * https://www.suse.com/security/cve/CVE-2021-47413.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47422.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47425.html * https://www.suse.com/security/cve/CVE-2021-47426.html * https://www.suse.com/security/cve/CVE-2021-47428.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47434.html * https://www.suse.com/security/cve/CVE-2021-47435.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47441.html * https://www.suse.com/security/cve/CVE-2021-47442.html * https://www.suse.com/security/cve/CVE-2021-47443.html * https://www.suse.com/security/cve/CVE-2021-47444.html * https://www.suse.com/security/cve/CVE-2021-47445.html * https://www.suse.com/security/cve/CVE-2021-47451.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47458.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47464.html * https://www.suse.com/security/cve/CVE-2021-47465.html * https://www.suse.com/security/cve/CVE-2021-47468.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47478.html * https://www.suse.com/security/cve/CVE-2021-47480.html * https://www.suse.com/security/cve/CVE-2021-47482.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47493.html * https://www.suse.com/security/cve/CVE-2021-47494.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47498.html * https://www.suse.com/security/cve/CVE-2021-47499.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47501.html * https://www.suse.com/security/cve/CVE-2021-47502.html * https://www.suse.com/security/cve/CVE-2021-47503.html * https://www.suse.com/security/cve/CVE-2021-47505.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47507.html * https://www.suse.com/security/cve/CVE-2021-47509.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47512.html * https://www.suse.com/security/cve/CVE-2021-47516.html * https://www.suse.com/security/cve/CVE-2021-47518.html * https://www.suse.com/security/cve/CVE-2021-47521.html * https://www.suse.com/security/cve/CVE-2021-47522.html * https://www.suse.com/security/cve/CVE-2021-47523.html * https://www.suse.com/security/cve/CVE-2021-47527.html * https://www.suse.com/security/cve/CVE-2021-47535.html * https://www.suse.com/security/cve/CVE-2021-47536.html * https://www.suse.com/security/cve/CVE-2021-47538.html * https://www.suse.com/security/cve/CVE-2021-47540.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47542.html * https://www.suse.com/security/cve/CVE-2021-47549.html * https://www.suse.com/security/cve/CVE-2021-47557.html * https://www.suse.com/security/cve/CVE-2021-47562.html * https://www.suse.com/security/cve/CVE-2021-47563.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2022-1195.html * https://www.suse.com/security/cve/CVE-2022-20132.html * https://www.suse.com/security/cve/CVE-2022-48636.html * https://www.suse.com/security/cve/CVE-2022-48673.html * https://www.suse.com/security/cve/CVE-2022-48704.html * https://www.suse.com/security/cve/CVE-2022-48710.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-2176.html * https://www.suse.com/security/cve/CVE-2023-4244.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52433.html * https://www.suse.com/security/cve/CVE-2023-52581.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52840.html * https://www.suse.com/security/cve/CVE-2023-52871.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2024-26581.html * https://www.suse.com/security/cve/CVE-2024-26643.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1151927 * https://bugzilla.suse.com/show_bug.cgi?id=1152472 * https://bugzilla.suse.com/show_bug.cgi?id=1154353 * https://bugzilla.suse.com/show_bug.cgi?id=1156395 * https://bugzilla.suse.com/show_bug.cgi?id=1174585 * https://bugzilla.suse.com/show_bug.cgi?id=1176447 * https://bugzilla.suse.com/show_bug.cgi?id=1176774 * https://bugzilla.suse.com/show_bug.cgi?id=1176869 * https://bugzilla.suse.com/show_bug.cgi?id=1178134 * https://bugzilla.suse.com/show_bug.cgi?id=1181147 * https://bugzilla.suse.com/show_bug.cgi?id=1184631 * https://bugzilla.suse.com/show_bug.cgi?id=1185589 * https://bugzilla.suse.com/show_bug.cgi?id=1185902 * https://bugzilla.suse.com/show_bug.cgi?id=1186885 * https://bugzilla.suse.com/show_bug.cgi?id=1188616 * https://bugzilla.suse.com/show_bug.cgi?id=1188772 * https://bugzilla.suse.com/show_bug.cgi?id=1189883 * https://bugzilla.suse.com/show_bug.cgi?id=1190795 * https://bugzilla.suse.com/show_bug.cgi?id=1191452 * https://bugzilla.suse.com/show_bug.cgi?id=1192107 * https://bugzilla.suse.com/show_bug.cgi?id=1194288 * https://bugzilla.suse.com/show_bug.cgi?id=1194591 * https://bugzilla.suse.com/show_bug.cgi?id=1196956 * https://bugzilla.suse.com/show_bug.cgi?id=1197760 * https://bugzilla.suse.com/show_bug.cgi?id=1198029 * https://bugzilla.suse.com/show_bug.cgi?id=1199304 * https://bugzilla.suse.com/show_bug.cgi?id=1200619 * https://bugzilla.suse.com/show_bug.cgi?id=1203389 * https://bugzilla.suse.com/show_bug.cgi?id=1206646 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1210629 * https://bugzilla.suse.com/show_bug.cgi?id=1213476 * https://bugzilla.suse.com/show_bug.cgi?id=1215420 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1220137 * https://bugzilla.suse.com/show_bug.cgi?id=1220144 * https://bugzilla.suse.com/show_bug.cgi?id=1220754 * https://bugzilla.suse.com/show_bug.cgi?id=1220877 * https://bugzilla.suse.com/show_bug.cgi?id=1220960 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221113 * https://bugzilla.suse.com/show_bug.cgi?id=1221829 * https://bugzilla.suse.com/show_bug.cgi?id=1222251 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222838 * https://bugzilla.suse.com/show_bug.cgi?id=1222867 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223512 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223932 * https://bugzilla.suse.com/show_bug.cgi?id=1223934 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224816 * https://bugzilla.suse.com/show_bug.cgi?id=1224826 * https://bugzilla.suse.com/show_bug.cgi?id=1224830 * https://bugzilla.suse.com/show_bug.cgi?id=1224831 * https://bugzilla.suse.com/show_bug.cgi?id=1224832 * https://bugzilla.suse.com/show_bug.cgi?id=1224834 * https://bugzilla.suse.com/show_bug.cgi?id=1224841 * https://bugzilla.suse.com/show_bug.cgi?id=1224842 * https://bugzilla.suse.com/show_bug.cgi?id=1224843 * https://bugzilla.suse.com/show_bug.cgi?id=1224844 * https://bugzilla.suse.com/show_bug.cgi?id=1224846 * https://bugzilla.suse.com/show_bug.cgi?id=1224849 * https://bugzilla.suse.com/show_bug.cgi?id=1224852 * https://bugzilla.suse.com/show_bug.cgi?id=1224853 * https://bugzilla.suse.com/show_bug.cgi?id=1224854 * https://bugzilla.suse.com/show_bug.cgi?id=1224859 * https://bugzilla.suse.com/show_bug.cgi?id=1224882 * https://bugzilla.suse.com/show_bug.cgi?id=1224886 * https://bugzilla.suse.com/show_bug.cgi?id=1224888 * https://bugzilla.suse.com/show_bug.cgi?id=1224889 * https://bugzilla.suse.com/show_bug.cgi?id=1224891 * https://bugzilla.suse.com/show_bug.cgi?id=1224892 * https://bugzilla.suse.com/show_bug.cgi?id=1224893 * https://bugzilla.suse.com/show_bug.cgi?id=1224899 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224909 * https://bugzilla.suse.com/show_bug.cgi?id=1224916 * https://bugzilla.suse.com/show_bug.cgi?id=1224917 * https://bugzilla.suse.com/show_bug.cgi?id=1224922 * https://bugzilla.suse.com/show_bug.cgi?id=1224923 * https://bugzilla.suse.com/show_bug.cgi?id=1224924 * https://bugzilla.suse.com/show_bug.cgi?id=1224926 * https://bugzilla.suse.com/show_bug.cgi?id=1224928 * https://bugzilla.suse.com/show_bug.cgi?id=1224953 * https://bugzilla.suse.com/show_bug.cgi?id=1224954 * https://bugzilla.suse.com/show_bug.cgi?id=1224955 * https://bugzilla.suse.com/show_bug.cgi?id=1224957 * https://bugzilla.suse.com/show_bug.cgi?id=1224961 * https://bugzilla.suse.com/show_bug.cgi?id=1224963 * https://bugzilla.suse.com/show_bug.cgi?id=1224965 * https://bugzilla.suse.com/show_bug.cgi?id=1224966 * https://bugzilla.suse.com/show_bug.cgi?id=1224968 * https://bugzilla.suse.com/show_bug.cgi?id=1224981 * https://bugzilla.suse.com/show_bug.cgi?id=1224982 * https://bugzilla.suse.com/show_bug.cgi?id=1224983 * https://bugzilla.suse.com/show_bug.cgi?id=1224984 * https://bugzilla.suse.com/show_bug.cgi?id=1224987 * https://bugzilla.suse.com/show_bug.cgi?id=1224990 * https://bugzilla.suse.com/show_bug.cgi?id=1224993 * https://bugzilla.suse.com/show_bug.cgi?id=1224996 * https://bugzilla.suse.com/show_bug.cgi?id=1224997 * https://bugzilla.suse.com/show_bug.cgi?id=1225026 * https://bugzilla.suse.com/show_bug.cgi?id=1225030 * https://bugzilla.suse.com/show_bug.cgi?id=1225058 * https://bugzilla.suse.com/show_bug.cgi?id=1225060 * https://bugzilla.suse.com/show_bug.cgi?id=1225083 * https://bugzilla.suse.com/show_bug.cgi?id=1225084 * https://bugzilla.suse.com/show_bug.cgi?id=1225091 * https://bugzilla.suse.com/show_bug.cgi?id=1225112 * https://bugzilla.suse.com/show_bug.cgi?id=1225113 * https://bugzilla.suse.com/show_bug.cgi?id=1225128 * https://bugzilla.suse.com/show_bug.cgi?id=1225140 * https://bugzilla.suse.com/show_bug.cgi?id=1225143 * https://bugzilla.suse.com/show_bug.cgi?id=1225148 * https://bugzilla.suse.com/show_bug.cgi?id=1225155 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225177 * https://bugzilla.suse.com/show_bug.cgi?id=1225178 * https://bugzilla.suse.com/show_bug.cgi?id=1225181 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225198 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225206 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225214 * https://bugzilla.suse.com/show_bug.cgi?id=1225223 * https://bugzilla.suse.com/show_bug.cgi?id=1225224 * https://bugzilla.suse.com/show_bug.cgi?id=1225230 * https://bugzilla.suse.com/show_bug.cgi?id=1225232 * https://bugzilla.suse.com/show_bug.cgi?id=1225233 * https://bugzilla.suse.com/show_bug.cgi?id=1225237 * https://bugzilla.suse.com/show_bug.cgi?id=1225238 * https://bugzilla.suse.com/show_bug.cgi?id=1225243 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225247 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225252 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225261 * https://bugzilla.suse.com/show_bug.cgi?id=1225262 * https://bugzilla.suse.com/show_bug.cgi?id=1225263 * https://bugzilla.suse.com/show_bug.cgi?id=1225301 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225316 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225320 * https://bugzilla.suse.com/show_bug.cgi?id=1225321 * https://bugzilla.suse.com/show_bug.cgi?id=1225322 * https://bugzilla.suse.com/show_bug.cgi?id=1225326 * https://bugzilla.suse.com/show_bug.cgi?id=1225327 * https://bugzilla.suse.com/show_bug.cgi?id=1225328 * https://bugzilla.suse.com/show_bug.cgi?id=1225330 * https://bugzilla.suse.com/show_bug.cgi?id=1225333 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225341 * https://bugzilla.suse.com/show_bug.cgi?id=1225346 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225357 * https://bugzilla.suse.com/show_bug.cgi?id=1225358 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225361 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225369 * https://bugzilla.suse.com/show_bug.cgi?id=1225370 * https://bugzilla.suse.com/show_bug.cgi?id=1225372 * https://bugzilla.suse.com/show_bug.cgi?id=1225374 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225386 * https://bugzilla.suse.com/show_bug.cgi?id=1225387 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225393 * https://bugzilla.suse.com/show_bug.cgi?id=1225400 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225405 * https://bugzilla.suse.com/show_bug.cgi?id=1225409 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225424 * https://bugzilla.suse.com/show_bug.cgi?id=1225427 * https://bugzilla.suse.com/show_bug.cgi?id=1225435 * https://bugzilla.suse.com/show_bug.cgi?id=1225437 * https://bugzilla.suse.com/show_bug.cgi?id=1225438 * https://bugzilla.suse.com/show_bug.cgi?id=1225439 * https://bugzilla.suse.com/show_bug.cgi?id=1225446 * https://bugzilla.suse.com/show_bug.cgi?id=1225447 * https://bugzilla.suse.com/show_bug.cgi?id=1225448 * https://bugzilla.suse.com/show_bug.cgi?id=1225450 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225455 * https://bugzilla.suse.com/show_bug.cgi?id=1225468 * https://bugzilla.suse.com/show_bug.cgi?id=1225499 * https://bugzilla.suse.com/show_bug.cgi?id=1225500 * https://bugzilla.suse.com/show_bug.cgi?id=1225508 * https://bugzilla.suse.com/show_bug.cgi?id=1225534 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 12:30:03 -0000 Subject: SUSE-SU-2024:2020-1: important: Security update for openssl-3 Message-ID: <171828180397.14487.6029838765877354833@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2024:2020-1 Rating: important References: * bsc#1225551 Cross-References: * CVE-2024-4741 CVSS scores: * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2020=1 openSUSE-SLE-15.5-2024-2020=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2020=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libopenssl3-3.0.8-150500.5.36.1 * libopenssl-3-devel-3.0.8-150500.5.36.1 * openssl-3-debuginfo-3.0.8-150500.5.36.1 * openssl-3-debugsource-3.0.8-150500.5.36.1 * libopenssl3-debuginfo-3.0.8-150500.5.36.1 * openssl-3-3.0.8-150500.5.36.1 * openSUSE Leap 15.5 (x86_64) * libopenssl-3-devel-32bit-3.0.8-150500.5.36.1 * libopenssl3-32bit-3.0.8-150500.5.36.1 * libopenssl3-32bit-debuginfo-3.0.8-150500.5.36.1 * openSUSE Leap 15.5 (noarch) * openssl-3-doc-3.0.8-150500.5.36.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libopenssl3-64bit-debuginfo-3.0.8-150500.5.36.1 * libopenssl-3-devel-64bit-3.0.8-150500.5.36.1 * libopenssl3-64bit-3.0.8-150500.5.36.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libopenssl3-3.0.8-150500.5.36.1 * libopenssl-3-devel-3.0.8-150500.5.36.1 * openssl-3-debuginfo-3.0.8-150500.5.36.1 * openssl-3-debugsource-3.0.8-150500.5.36.1 * libopenssl3-debuginfo-3.0.8-150500.5.36.1 * openssl-3-3.0.8-150500.5.36.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4741.html * https://bugzilla.suse.com/show_bug.cgi?id=1225551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 12:36:27 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 12:36:27 -0000 Subject: SUSE-SU-2024:2019-1: important: Security update for the Linux Kernel Message-ID: <171828218722.19143.12664498155054802771@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:2019-1 Rating: important References: * bsc#1065729 * bsc#1141539 * bsc#1174585 * bsc#1181674 * bsc#1187716 * bsc#1190569 * bsc#1191949 * bsc#1192107 * bsc#1193983 * bsc#1194288 * bsc#1194869 * bsc#1196956 * bsc#1197915 * bsc#1200465 * bsc#1205205 * bsc#1207284 * bsc#1207361 * bsc#1207948 * bsc#1208149 * bsc#1209657 * bsc#1209799 * bsc#1209834 * bsc#1209980 * bsc#1210335 * bsc#1213863 * bsc#1214852 * bsc#1215322 * bsc#1215702 * bsc#1216358 * bsc#1216702 * bsc#1217169 * bsc#1217515 * bsc#1218447 * bsc#1220021 * bsc#1220363 * bsc#1220783 * bsc#1221044 * bsc#1221081 * bsc#1221615 * bsc#1221777 * bsc#1221816 * bsc#1221829 * bsc#1222011 * bsc#1222374 * bsc#1222413 * bsc#1222464 * bsc#1222513 * bsc#1222561 * bsc#1222608 * bsc#1222619 * bsc#1222627 * bsc#1222721 * bsc#1222765 * bsc#1222770 * bsc#1222783 * bsc#1222893 * bsc#1222960 * bsc#1222961 * bsc#1222974 * bsc#1222975 * bsc#1223011 * bsc#1223023 * bsc#1223027 * bsc#1223031 * bsc#1223043 * bsc#1223046 * bsc#1223048 * bsc#1223049 * bsc#1223084 * bsc#1223113 * bsc#1223137 * bsc#1223138 * bsc#1223188 * bsc#1223203 * bsc#1223315 * bsc#1223384 * bsc#1223390 * bsc#1223489 * bsc#1223532 * bsc#1223575 * bsc#1223595 * bsc#1223626 * bsc#1223627 * bsc#1223631 * bsc#1223633 * bsc#1223638 * bsc#1223650 * bsc#1223653 * bsc#1223666 * bsc#1223671 * bsc#1223675 * bsc#1223677 * bsc#1223678 * bsc#1223698 * bsc#1223712 * bsc#1223715 * bsc#1223717 * bsc#1223718 * bsc#1223737 * bsc#1223741 * bsc#1223744 * bsc#1223747 * bsc#1223748 * bsc#1223750 * bsc#1223752 * bsc#1223754 * bsc#1223756 * bsc#1223757 * bsc#1223762 * bsc#1223769 * bsc#1223770 * bsc#1223779 * bsc#1223780 * bsc#1223781 * bsc#1223788 * bsc#1223802 * bsc#1223819 * bsc#1223826 * bsc#1223828 * bsc#1223829 * bsc#1223837 * bsc#1223842 * bsc#1223843 * bsc#1223844 * bsc#1223847 * bsc#1223858 * bsc#1223875 * bsc#1223879 * bsc#1223895 * bsc#1223959 * bsc#1223961 * bsc#1223991 * bsc#1224020 * bsc#1224076 * bsc#1224096 * bsc#1224098 * bsc#1224099 * bsc#1224137 * bsc#1224166 * bsc#1224174 * bsc#1224177 * bsc#1224180 * bsc#1224181 * bsc#1224187 * bsc#1224331 * bsc#1224346 * bsc#1224423 * bsc#1224432 * bsc#1224437 * bsc#1224438 * bsc#1224442 * bsc#1224443 * bsc#1224445 * bsc#1224449 * bsc#1224479 * bsc#1224482 * bsc#1224487 * bsc#1224488 * bsc#1224492 * bsc#1224494 * bsc#1224495 * bsc#1224502 * bsc#1224508 * bsc#1224509 * bsc#1224511 * bsc#1224519 * bsc#1224524 * bsc#1224525 * bsc#1224530 * bsc#1224531 * bsc#1224534 * bsc#1224535 * bsc#1224537 * bsc#1224541 * bsc#1224543 * bsc#1224549 * bsc#1224550 * bsc#1224558 * bsc#1224559 * bsc#1224566 * bsc#1224567 * bsc#1224571 * bsc#1224575 * bsc#1224576 * bsc#1224579 * bsc#1224580 * bsc#1224581 * bsc#1224582 * bsc#1224586 * bsc#1224587 * bsc#1224592 * bsc#1224598 * bsc#1224601 * bsc#1224607 * bsc#1224608 * bsc#1224611 * bsc#1224615 * bsc#1224617 * bsc#1224618 * bsc#1224621 * bsc#1224622 * bsc#1224624 * bsc#1224627 * bsc#1224628 * bsc#1224629 * bsc#1224632 * bsc#1224636 * bsc#1224637 * bsc#1224638 * bsc#1224640 * bsc#1224643 * bsc#1224644 * bsc#1224645 * bsc#1224647 * bsc#1224648 * bsc#1224649 * bsc#1224650 * bsc#1224651 * bsc#1224657 * bsc#1224659 * bsc#1224660 * bsc#1224663 * bsc#1224664 * bsc#1224665 * bsc#1224666 * bsc#1224667 * bsc#1224668 * bsc#1224671 * bsc#1224672 * bsc#1224676 * bsc#1224678 * bsc#1224679 * bsc#1224680 * bsc#1224681 * bsc#1224682 * bsc#1224685 * bsc#1224686 * bsc#1224692 * bsc#1224697 * bsc#1224699 * bsc#1224701 * bsc#1224703 * bsc#1224705 * bsc#1224707 * bsc#1224717 * bsc#1224718 * bsc#1224721 * bsc#1224722 * bsc#1224723 * bsc#1224725 * bsc#1224727 * bsc#1224728 * bsc#1224729 * bsc#1224730 * bsc#1224731 * bsc#1224732 * bsc#1224733 * bsc#1224736 * bsc#1224738 * bsc#1224739 * bsc#1224740 * bsc#1224747 * bsc#1224749 * bsc#1224759 * bsc#1224763 * bsc#1224764 * bsc#1224765 * bsc#1224766 * bsc#1224794 * bsc#1224795 * bsc#1224796 * bsc#1224803 * bsc#1224816 * bsc#1224895 * bsc#1224898 * bsc#1224900 * bsc#1224901 * bsc#1224902 * bsc#1224903 * bsc#1224904 * bsc#1224905 * bsc#1224907 * bsc#1224909 * bsc#1224910 * bsc#1224911 * bsc#1224912 * bsc#1224913 * bsc#1224914 * bsc#1224915 * bsc#1224920 * bsc#1224928 * bsc#1224929 * bsc#1224930 * bsc#1224931 * bsc#1224932 * bsc#1224936 * bsc#1224937 * bsc#1224941 * bsc#1224942 * bsc#1224944 * bsc#1224945 * bsc#1224947 * bsc#1224956 * bsc#1224988 * bsc#1224992 * bsc#1225000 * bsc#1225003 * bsc#1225005 * bsc#1225008 * bsc#1225009 * bsc#1225022 * bsc#1225031 * bsc#1225032 * bsc#1225036 * bsc#1225041 * bsc#1225044 * bsc#1225053 * bsc#1225076 * bsc#1225077 * bsc#1225082 * bsc#1225085 * bsc#1225086 * bsc#1225092 * bsc#1225095 * bsc#1225096 * bsc#1225097 * bsc#1225106 * bsc#1225108 * bsc#1225109 * bsc#1225114 * bsc#1225118 * bsc#1225121 * bsc#1225122 * bsc#1225123 * bsc#1225125 * bsc#1225126 * bsc#1225127 * bsc#1225129 * bsc#1225131 * bsc#1225132 * bsc#1225138 * bsc#1225139 * bsc#1225145 * bsc#1225151 * bsc#1225153 * bsc#1225156 * bsc#1225158 * bsc#1225160 * bsc#1225161 * bsc#1225164 * bsc#1225167 * bsc#1225180 * bsc#1225183 * bsc#1225184 * bsc#1225186 * bsc#1225187 * bsc#1225189 * bsc#1225190 * bsc#1225191 * bsc#1225192 * bsc#1225193 * bsc#1225195 * bsc#1225198 * bsc#1225201 * bsc#1225203 * bsc#1225205 * bsc#1225206 * bsc#1225207 * bsc#1225208 * bsc#1225209 * bsc#1225210 * bsc#1225214 * bsc#1225222 * bsc#1225223 * bsc#1225224 * bsc#1225225 * bsc#1225227 * bsc#1225228 * bsc#1225229 * bsc#1225230 * bsc#1225232 * bsc#1225233 * bsc#1225235 * bsc#1225236 * bsc#1225237 * bsc#1225238 * bsc#1225239 * bsc#1225240 * bsc#1225241 * bsc#1225242 * bsc#1225243 * bsc#1225244 * bsc#1225245 * bsc#1225246 * bsc#1225247 * bsc#1225248 * bsc#1225249 * bsc#1225250 * bsc#1225251 * bsc#1225252 * bsc#1225253 * bsc#1225254 * bsc#1225255 * bsc#1225256 * bsc#1225257 * bsc#1225258 * bsc#1225259 * bsc#1225260 * bsc#1225261 * bsc#1225262 * bsc#1225263 * bsc#1225268 * bsc#1225301 * bsc#1225303 * bsc#1225304 * bsc#1225306 * bsc#1225316 * bsc#1225318 * bsc#1225320 * bsc#1225321 * bsc#1225322 * bsc#1225323 * bsc#1225326 * bsc#1225327 * bsc#1225328 * bsc#1225329 * bsc#1225330 * bsc#1225331 * bsc#1225332 * bsc#1225333 * bsc#1225334 * bsc#1225335 * bsc#1225336 * bsc#1225337 * bsc#1225338 * bsc#1225339 * bsc#1225341 * bsc#1225342 * bsc#1225344 * bsc#1225346 * bsc#1225347 * bsc#1225351 * bsc#1225353 * bsc#1225354 * bsc#1225355 * bsc#1225357 * bsc#1225358 * bsc#1225360 * bsc#1225361 * bsc#1225366 * bsc#1225367 * bsc#1225368 * bsc#1225369 * bsc#1225370 * bsc#1225372 * bsc#1225373 * bsc#1225374 * bsc#1225375 * bsc#1225376 * bsc#1225377 * bsc#1225379 * bsc#1225380 * bsc#1225382 * bsc#1225383 * bsc#1225384 * bsc#1225386 * bsc#1225387 * bsc#1225388 * bsc#1225390 * bsc#1225392 * bsc#1225393 * bsc#1225396 * bsc#1225400 * bsc#1225404 * bsc#1225405 * bsc#1225408 * bsc#1225409 * bsc#1225410 * bsc#1225411 * bsc#1225424 * bsc#1225425 * bsc#1225427 * bsc#1225431 * bsc#1225435 * bsc#1225436 * bsc#1225437 * bsc#1225438 * bsc#1225439 * bsc#1225441 * bsc#1225442 * bsc#1225443 * bsc#1225444 * bsc#1225445 * bsc#1225446 * bsc#1225447 * bsc#1225450 * bsc#1225453 * bsc#1225455 * bsc#1225461 * bsc#1225463 * bsc#1225464 * bsc#1225466 * bsc#1225467 * bsc#1225468 * bsc#1225471 * bsc#1225472 * bsc#1225478 * bsc#1225479 * bsc#1225480 * bsc#1225482 * bsc#1225483 * bsc#1225486 * bsc#1225488 * bsc#1225490 * bsc#1225492 * bsc#1225495 * bsc#1225499 * bsc#1225500 * bsc#1225501 * bsc#1225502 * bsc#1225506 * bsc#1225508 * bsc#1225510 * bsc#1225513 * bsc#1225515 * bsc#1225529 * bsc#1225530 * bsc#1225532 * bsc#1225534 * bsc#1225535 * bsc#1225548 * bsc#1225549 * bsc#1225550 * bsc#1225553 * bsc#1225554 * bsc#1225555 * bsc#1225556 * bsc#1225557 * bsc#1225559 * bsc#1225560 * bsc#1225565 * bsc#1225566 * bsc#1225568 * bsc#1225569 * bsc#1225570 * bsc#1225571 * bsc#1225572 * bsc#1225577 * bsc#1225583 * bsc#1225584 * bsc#1225587 * bsc#1225588 * bsc#1225589 * bsc#1225590 * bsc#1225591 * bsc#1225592 * bsc#1225593 * bsc#1225595 * bsc#1225599 * bsc#1225616 * bsc#1225640 * bsc#1225642 * bsc#1225705 * bsc#1225708 * bsc#1225715 * bsc#1225720 * bsc#1225722 * bsc#1225734 * bsc#1225735 * bsc#1225747 * bsc#1225748 * bsc#1225756 * bsc#1225761 * bsc#1225766 * bsc#1225775 * bsc#1225810 * bsc#1225820 * bsc#1225829 * bsc#1225835 * bsc#1225842 * jsc#PED-3259 * jsc#PED-7167 Cross-References: * CVE-2020-36788 * CVE-2021-39698 * CVE-2021-4148 * CVE-2021-47358 * CVE-2021-47359 * CVE-2021-47360 * CVE-2021-47361 * CVE-2021-47362 * CVE-2021-47363 * CVE-2021-47364 * CVE-2021-47365 * CVE-2021-47366 * CVE-2021-47367 * CVE-2021-47368 * CVE-2021-47369 * CVE-2021-47370 * CVE-2021-47371 * CVE-2021-47372 * CVE-2021-47373 * CVE-2021-47374 * CVE-2021-47375 * CVE-2021-47376 * CVE-2021-47378 * CVE-2021-47379 * CVE-2021-47380 * CVE-2021-47381 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47384 * CVE-2021-47385 * CVE-2021-47386 * CVE-2021-47387 * CVE-2021-47388 * CVE-2021-47389 * CVE-2021-47390 * CVE-2021-47391 * CVE-2021-47392 * CVE-2021-47393 * CVE-2021-47394 * CVE-2021-47395 * CVE-2021-47396 * CVE-2021-47397 * CVE-2021-47398 * CVE-2021-47399 * CVE-2021-47400 * CVE-2021-47401 * CVE-2021-47402 * CVE-2021-47403 * CVE-2021-47404 * CVE-2021-47405 * CVE-2021-47406 * CVE-2021-47407 * CVE-2021-47408 * CVE-2021-47409 * CVE-2021-47410 * CVE-2021-47412 * CVE-2021-47413 * CVE-2021-47414 * CVE-2021-47415 * CVE-2021-47416 * CVE-2021-47417 * CVE-2021-47418 * CVE-2021-47419 * CVE-2021-47420 * CVE-2021-47421 * CVE-2021-47422 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47425 * CVE-2021-47426 * CVE-2021-47427 * CVE-2021-47428 * CVE-2021-47429 * CVE-2021-47430 * CVE-2021-47431 * CVE-2021-47433 * CVE-2021-47434 * CVE-2021-47435 * CVE-2021-47436 * CVE-2021-47437 * CVE-2021-47438 * CVE-2021-47439 * CVE-2021-47440 * CVE-2021-47441 * CVE-2021-47442 * CVE-2021-47443 * CVE-2021-47444 * CVE-2021-47445 * CVE-2021-47446 * CVE-2021-47447 * CVE-2021-47448 * CVE-2021-47449 * CVE-2021-47450 * CVE-2021-47451 * CVE-2021-47452 * CVE-2021-47453 * CVE-2021-47454 * CVE-2021-47455 * CVE-2021-47456 * CVE-2021-47457 * CVE-2021-47458 * CVE-2021-47459 * CVE-2021-47460 * CVE-2021-47461 * CVE-2021-47462 * CVE-2021-47463 * CVE-2021-47464 * CVE-2021-47465 * CVE-2021-47466 * CVE-2021-47467 * CVE-2021-47468 * CVE-2021-47469 * CVE-2021-47470 * CVE-2021-47471 * CVE-2021-47472 * CVE-2021-47473 * CVE-2021-47474 * CVE-2021-47475 * CVE-2021-47476 * CVE-2021-47477 * CVE-2021-47478 * CVE-2021-47479 * CVE-2021-47480 * CVE-2021-47481 * CVE-2021-47482 * CVE-2021-47483 * CVE-2021-47484 * CVE-2021-47485 * CVE-2021-47486 * CVE-2021-47488 * CVE-2021-47489 * CVE-2021-47490 * CVE-2021-47491 * CVE-2021-47492 * CVE-2021-47493 * CVE-2021-47494 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47498 * CVE-2021-47499 * CVE-2021-47500 * CVE-2021-47501 * CVE-2021-47502 * CVE-2021-47503 * CVE-2021-47504 * CVE-2021-47505 * CVE-2021-47506 * CVE-2021-47507 * CVE-2021-47508 * CVE-2021-47509 * CVE-2021-47510 * CVE-2021-47511 * CVE-2021-47512 * CVE-2021-47513 * CVE-2021-47514 * CVE-2021-47516 * CVE-2021-47518 * CVE-2021-47520 * CVE-2021-47521 * CVE-2021-47522 * CVE-2021-47523 * CVE-2021-47524 * CVE-2021-47525 * CVE-2021-47526 * CVE-2021-47527 * CVE-2021-47528 * CVE-2021-47529 * CVE-2021-47530 * CVE-2021-47531 * CVE-2021-47532 * CVE-2021-47533 * CVE-2021-47534 * CVE-2021-47535 * CVE-2021-47536 * CVE-2021-47537 * CVE-2021-47540 * CVE-2021-47541 * CVE-2021-47542 * CVE-2021-47544 * CVE-2021-47548 * CVE-2021-47549 * CVE-2021-47550 * CVE-2021-47551 * CVE-2021-47552 * CVE-2021-47553 * CVE-2021-47554 * CVE-2021-47555 * CVE-2021-47556 * CVE-2021-47557 * CVE-2021-47558 * CVE-2021-47559 * CVE-2021-47560 * CVE-2021-47562 * CVE-2021-47563 * CVE-2021-47564 * CVE-2021-47565 * CVE-2021-47569 * CVE-2022-48633 * CVE-2022-48669 * CVE-2022-48689 * CVE-2022-48691 * CVE-2022-48705 * CVE-2022-48708 * CVE-2022-48709 * CVE-2022-48710 * CVE-2023-0160 * CVE-2023-1829 * CVE-2023-42755 * CVE-2023-47233 * CVE-2023-52586 * CVE-2023-52591 * CVE-2023-52618 * CVE-2023-52642 * CVE-2023-52643 * CVE-2023-52644 * CVE-2023-52650 * CVE-2023-52653 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52656 * CVE-2023-52657 * CVE-2023-52659 * CVE-2023-52660 * CVE-2023-52661 * CVE-2023-52662 * CVE-2023-52664 * CVE-2023-52669 * CVE-2023-52671 * CVE-2023-52674 * CVE-2023-52676 * CVE-2023-52678 * CVE-2023-52679 * CVE-2023-52680 * CVE-2023-52683 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52690 * CVE-2023-52691 * CVE-2023-52692 * CVE-2023-52693 * CVE-2023-52694 * CVE-2023-52696 * CVE-2023-52698 * CVE-2023-52699 * CVE-2023-52702 * CVE-2023-52703 * CVE-2023-52705 * CVE-2023-52707 * CVE-2023-52708 * CVE-2023-52730 * CVE-2023-52731 * CVE-2023-52732 * CVE-2023-52733 * CVE-2023-52736 * CVE-2023-52738 * CVE-2023-52739 * CVE-2023-52740 * CVE-2023-52741 * CVE-2023-52742 * CVE-2023-52743 * CVE-2023-52744 * CVE-2023-52745 * CVE-2023-52746 * CVE-2023-52747 * CVE-2023-52753 * CVE-2023-52754 * CVE-2023-52756 * CVE-2023-52757 * CVE-2023-52759 * CVE-2023-52763 * CVE-2023-52764 * CVE-2023-52766 * CVE-2023-52773 * CVE-2023-52774 * CVE-2023-52777 * CVE-2023-52781 * CVE-2023-52788 * CVE-2023-52789 * CVE-2023-52791 * CVE-2023-52795 * CVE-2023-52796 * CVE-2023-52798 * CVE-2023-52799 * CVE-2023-52800 * CVE-2023-52803 * CVE-2023-52804 * CVE-2023-52805 * CVE-2023-52806 * CVE-2023-52807 * CVE-2023-52808 * CVE-2023-52809 * CVE-2023-52810 * CVE-2023-52811 * CVE-2023-52814 * CVE-2023-52815 * CVE-2023-52816 * CVE-2023-52817 * CVE-2023-52818 * CVE-2023-52819 * CVE-2023-52821 * CVE-2023-52825 * CVE-2023-52826 * CVE-2023-52832 * CVE-2023-52833 * CVE-2023-52834 * CVE-2023-52838 * CVE-2023-52840 * CVE-2023-52841 * CVE-2023-52844 * CVE-2023-52847 * CVE-2023-52851 * CVE-2023-52853 * CVE-2023-52854 * CVE-2023-52855 * CVE-2023-52856 * CVE-2023-52858 * CVE-2023-52860 * CVE-2023-52861 * CVE-2023-52864 * CVE-2023-52865 * CVE-2023-52867 * CVE-2023-52868 * CVE-2023-52870 * CVE-2023-52871 * CVE-2023-52872 * CVE-2023-52873 * CVE-2023-52875 * CVE-2023-52876 * CVE-2023-52877 * CVE-2023-52878 * CVE-2023-52880 * CVE-2023-6531 * CVE-2024-26597 * CVE-2024-26643 * CVE-2024-26692 * CVE-2024-26698 * CVE-2024-26715 * CVE-2024-26742 * CVE-2024-26748 * CVE-2024-26758 * CVE-2024-26764 * CVE-2024-26775 * CVE-2024-26777 * CVE-2024-26778 * CVE-2024-26788 * CVE-2024-26801 * CVE-2024-26822 * CVE-2024-26828 * CVE-2024-26829 * CVE-2024-26838 * CVE-2024-26839 * CVE-2024-26846 * CVE-2024-26859 * CVE-2024-26870 * CVE-2024-26874 * CVE-2024-26880 * CVE-2024-26889 * CVE-2024-26894 * CVE-2024-26900 * CVE-2024-26907 * CVE-2024-26916 * CVE-2024-26919 * CVE-2024-26920 * CVE-2024-26921 * CVE-2024-26922 * CVE-2024-26925 * CVE-2024-26928 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-26931 * CVE-2024-26934 * CVE-2024-269355 * CVE-2024-26937 * CVE-2024-26938 * CVE-2024-26940 * CVE-2024-26943 * CVE-2024-26957 * CVE-2024-26958 * CVE-2024-26964 * CVE-2024-26974 * CVE-2024-26977 * CVE-2024-26984 * CVE-2024-26988 * CVE-2024-26989 * CVE-2024-26994 * CVE-2024-26996 * CVE-2024-26997 * CVE-2024-26999 * CVE-2024-27000 * CVE-2024-27001 * CVE-2024-27004 * CVE-2024-27008 * CVE-2024-27028 * CVE-2024-27037 * CVE-2024-27045 * CVE-2024-27047 * CVE-2024-27051 * CVE-2024-27052 * CVE-2024-27053 * CVE-2024-27054 * CVE-2024-27072 * CVE-2024-27073 * CVE-2024-27074 * CVE-2024-27075 * CVE-2024-27076 * CVE-2024-27077 * CVE-2024-27078 * CVE-2024-27388 * CVE-2024-27393 * CVE-2024-27395 * CVE-2024-27396 * CVE-2024-27398 * CVE-2024-27399 * CVE-2024-27400 * CVE-2024-27401 * CVE-2024-27405 * CVE-2024-27410 * CVE-2024-27412 * CVE-2024-27413 * CVE-2024-27416 * CVE-2024-27417 * CVE-2024-27419 * CVE-2024-27431 * CVE-2024-27435 * CVE-2024-27436 * CVE-2024-35789 * CVE-2024-35791 * CVE-2024-35796 * CVE-2024-35799 * CVE-2024-35801 * CVE-2024-35804 * CVE-2024-35806 * CVE-2024-35809 * CVE-2024-35811 * CVE-2024-35812 * CVE-2024-35813 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35821 * CVE-2024-35822 * CVE-2024-35823 * CVE-2024-35825 * CVE-2024-35828 * CVE-2024-35829 * CVE-2024-35830 * CVE-2024-35833 * CVE-2024-35845 * CVE-2024-35847 * CVE-2024-35849 * CVE-2024-35851 * CVE-2024-35852 * CVE-2024-35854 * CVE-2024-35860 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35865 * CVE-2024-35866 * CVE-2024-35867 * CVE-2024-35868 * CVE-2024-35869 * CVE-2024-35870 * CVE-2024-35872 * CVE-2024-35875 * CVE-2024-35877 * CVE-2024-35878 * CVE-2024-35879 * CVE-2024-35885 * CVE-2024-35887 * CVE-2024-35895 * CVE-2024-35901 * CVE-2024-35904 * CVE-2024-35905 * CVE-2024-35907 * CVE-2024-35912 * CVE-2024-35914 * CVE-2024-35915 * CVE-2024-35922 * CVE-2024-35924 * CVE-2024-35930 * CVE-2024-35932 * CVE-2024-35933 * CVE-2024-35935 * CVE-2024-35936 * CVE-2024-35938 * CVE-2024-35939 * CVE-2024-35940 * CVE-2024-35943 * CVE-2024-35944 * CVE-2024-35947 * CVE-2024-35950 * CVE-2024-35951 * CVE-2024-35952 * CVE-2024-35955 * CVE-2024-35959 * CVE-2024-35963 * CVE-2024-35964 * CVE-2024-35965 * CVE-2024-35966 * CVE-2024-35967 * CVE-2024-35969 * CVE-2024-35973 * CVE-2024-35976 * CVE-2024-35978 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-35989 * CVE-2024-35990 * CVE-2024-35998 * CVE-2024-35999 * CVE-2024-36006 * CVE-2024-36007 * CVE-2024-36012 * CVE-2024-36014 * CVE-2024-36015 * CVE-2024-36016 * CVE-2024-36026 * CVE-2024-36029 * CVE-2024-36032 * CVE-2024-36880 * CVE-2024-36893 * CVE-2024-36896 * CVE-2024-36897 * CVE-2024-36906 * CVE-2024-36918 * CVE-2024-36924 * CVE-2024-36926 * CVE-2024-36928 * CVE-2024-36931 * CVE-2024-36938 * CVE-2024-36940 * CVE-2024-36941 * CVE-2024-36942 * CVE-2024-36944 * CVE-2024-36947 * CVE-2024-36950 * CVE-2024-36952 * CVE-2024-36955 * CVE-2024-36959 CVSS scores: * CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-4148 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-4148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47358 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47364 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47365 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47366 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2021-47367 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47368 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47371 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47372 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47373 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47379 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47389 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2021-47390 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47394 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47398 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47407 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47414 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47418 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47420 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47421 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47429 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47439 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47448 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2021-47449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47452 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47466 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47467 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47470 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47474 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47475 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47476 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47477 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47488 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47489 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47490 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47504 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47508 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47510 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47513 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47514 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47520 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47520 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47524 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47525 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47525 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47526 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47528 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47529 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47530 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47531 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47533 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2021-47537 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47544 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2021-47548 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47550 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47553 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47556 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47569 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48689 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48709 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42755 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-42755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52586 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52618 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52642 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52656 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52702 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52707 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52731 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52739 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52745 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52746 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52756 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52773 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52795 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52807 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52815 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52861 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26597 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26597 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26715 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26880 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26907 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-26907 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27051 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27052 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27053 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35869 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35998 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35999 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36016 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36938 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 541 vulnerabilities, contains two features and has 39 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-35924: Limit read size on v1.2 (bsc#1224657). * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575). * CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488). * CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085). * CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549). * CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548). * CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506) * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). * CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011). * CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763). * CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664). * CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678). * CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667). * CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532). * CVE-2024-35869: Guarantee refcounted children from parent session (bsc#1224679). * CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672). * CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464). * CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390). * CVE-2023-42755: Check user supplied offsets (bsc#1215702). * CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581). * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (CVE-2023-52698 bsc#1224621) * CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747). * CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs (bsc#1225097). * CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718). * CVE-2024-35860: struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531). * CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729). * CVE-2024-35799: Prevent crash when disable stream (bsc#1224740). * CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701). * CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736). * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525). * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580). * CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr() (bsc#1225114) * CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530). * CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502). * CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541). * CVE-2024-36007: Fixed warning during rehash (bsc#1224543). * CVE-2024-35885: Stop interface during shutdown (bsc#1224519). * CVE-2024-35907: Call request_irq() after NAPI initialized (bsc#1224492). * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930). * CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535). * CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665). * CVE-2024-35804: Mark target gfn of emulated atomic instruction as dirty (bsc#1224638). * CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725). * CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494). * CVE-2023-52660: Fiedx IRQ handling due to shared interrupts (bsc#1224443). * CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524). * CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649). * CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671). * CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936). * CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666). * CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636). * CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb (bsc#1224586). * CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr() (bsc#1224721) * CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187). * CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727). * CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608). * CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628). * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648). * CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes bsc#1222608). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081). * CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098). * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096). * CVE-2024-26715: Fixed NULL pointer dereference in dwc3_gadget_suspend (bsc#1222561). * CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847). * CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181). * CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046). * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627). * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653). * CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829). * CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615). * CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959) * CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961) * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). The following non-security bugs were fixed: * 9p: explicitly deny setlease attempts (git-fixes). * ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes). * ACPI: disable -Wstringop-truncation (git-fixes). * ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes). * ACPI: LPSS: Advertise number of chip selects via property (git-fixes). * admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes). * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * ALSA: core: Fix NULL module pointer assignment at card init (git-fixes). * ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes). * ALSA: line6: Zero-initialize message buffers (stable-fixes). * ARM: 9381/1: kasan: clear stale stack poison (git-fixes). * ASoC: Intel: avs: Fix ASRC module initialization (git-fixes). * ASoC: Intel: avs: Fix potential integer overflow (git-fixes). * ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes). * ASoC: Intel: Disable route checks for Skylake boards (git-fixes). * ASoC: kirkwood: Fix potential NULL dereference (git-fixes). * ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes). * ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes). * ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes). * ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes). * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes). * ata: pata_legacy: make legacy_exit() work again (git-fixes). * ata: sata_gemini: Check clk_enable() result (stable-fixes). * autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166). * Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes). * Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes). * Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358). * Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes). * Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes). * Bluetooth: qca: add missing firmware sanity checks (git-fixes). * Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes). * Bluetooth: qca: fix firmware check error path (git-fixes). * Bluetooth: qca: fix info leak when fetching fw build id (git-fixes). * Bluetooth: qca: fix NVM configuration parsing (git-fixes). * bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git- fixes) * bpf: decouple prune and jump points (bsc#1225756). * bpf: fix precision backtracking instruction iteration (bsc#1225756). * bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes). * bpf: handle ldimm64 properly in check_cfg() (bsc#1225756). * bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756). * bpf: remove unnecessary prune and jump points (bsc#1225756). * btrfs: add error messages to all unrecognized mount options (git-fixes) * btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes) * btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes) * btrfs: extend locking to all space_info members accesses (git-fixes) * btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes) * btrfs: fix fallocate to use file_modified to update permissions consistently (git-fixes) * btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes) * btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes) * btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes) * btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes) * btrfs: fix silent failure when deleting root reference (git-fixes) * btrfs: fix use-after-free after failure to create a snapshot (git-fixes) * btrfs: free exchange changeset on failures (git-fixes) * btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git- fixes) * btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes) * btrfs: prevent copying too big compressed lzo segment (git-fixes) * btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes) * btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes) * btrfs: repair super block num_devices automatically (git-fixes) * btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes) * btrfs: send: ensure send_fd is writable (git-fixes) * btrfs: send: handle path ref underflow in header iterate_inode_ref() (git- fixes) * btrfs: send: in case of IO error log it (git-fixes) * btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes) * btrfs: tree-checker: check item_size for dev_item (git-fixes) * btrfs: tree-checker: check item_size for inode_item (git-fixes) * cifs: account for primary channel in the interface list (bsc#1224020). * cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020). * cifs: distribute channels across interfaces based on speed (bsc#1224020). * cifs: do not pass cifs_sb when trying to add channels (bsc#1224020). * cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020). * cifs: fix charset issue in reconnection (bsc#1224020). * cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020). * cifs: handle cases where a channel is closed (bsc#1224020). * cifs: handle cases where multiple sessions share connection (bsc#1224020). * cifs: reconnect work should have reference on server struct (bsc#1224020). * clk: Do not hold prepare_lock when calling kref_put() (stable-fixes). * clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes). * counter: stm32-lptimer-cnt: Provide defines for clock polarities (git- fixes). * counter: stm32-timer-cnt: Provide defines for slave mode selection (git- fixes). * cppc_cpufreq: Fix possible null pointer dereference (git-fixes). * cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes). * cpumask: Add for_each_cpu_from() (bsc#1225053). * crypto: bcm - Fix pointer arithmetic (git-fixes). * crypto: ccp - drop platform ifdef checks (git-fixes). * crypto: ecdsa - Fix module auto-load on add-key (git-fixes). * crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes). * dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575). * dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes). * dmaengine: axi-dmac: fix possible race in remove() (git-fixes). * dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes). * docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes). * drivers/nvme: Add quirks for device 126f:2262 (git-fixes). * drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git- fixes). * drm: vc4: Fix possible null pointer dereference (git-fixes). * drm/amd: Flush GFXOFF requests in prepare stage (git-fixes). * drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes). * drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes). * drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes). * drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes). * drm/amdgpu: Refine IB schedule error logging (stable-fixes). * drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git- fixes). * drm/arm/malidp: fix a possible null pointer dereference (git-fixes). * drm/bridge: anx7625: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: icn6211: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: tc358775: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes). * drm/connector: Add \n to message about demoting connector force-probes (git- fixes). * drm/i915/bios: Fix parsing backlight BDB data (git-fixes). * drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes). * drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes). * drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes). * drm/meson: dw-hdmi: power up phy on device init (git-fixes). * drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes). * drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes). * drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes). * drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes). * drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes). * drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes). * drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes). * drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes). * dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes) * dyndbg: fix old BUG_ON in >control parser (stable-fixes). * efi: libstub: only free priv.runtime_map when allocated (git-fixes). * extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes). * fail_function: fix wrong use of fei_attr_remove(). * fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes). * fbdev: shmobile: fix snprintf truncation (git-fixes). * fbdev: sisfb: hide unused variables (git-fixes). * firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes). * firmware: dmi-id: add a release callback function (git-fixes). * firmware: raspberrypi: Use correct device for DMA mappings (git-fixes). * fs/9p: drop inodes immediately on non-.L too (git-fixes). * fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes). * fs/9p: translate O_TRUNC into OTRUNC (git-fixes). * gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes). * gpio: wcove: Use -ENOTSUPP consistently (stable-fixes). * gpu: host1x: Do not setup DMA for virtual devices (stable-fixes). * HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes). * hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git- fixes). * hwmon: (corsair-cpro) Use a separate buffer for sending commands (git- fixes). * hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes). * hwmon: (lm70) fix links in doc and comments (git-fixes). * hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes). * i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes). * i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes). * IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes) * idpf: extend tx watchdog timeout (bsc#1224137). * iio: core: Leave private pointer NULL when no private data supplied (git- fixes). * iio: pressure: dps310: support negative temperature values (git-fixes). * Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes). * Input: ims-pcu - fix printf string overflow (git-fixes). * Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes). * io_uring/unix: drop usage of io_uring socket (git-fixes). * iomap: Fix inline extent handling in iomap_readpage (git-fixes) * iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes) * iomap: Support partial direct I/O on user copy failures (git-fixes) * iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331) * jffs2: prevent xattr node from overflowing the eraseblock (git-fixes). * kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756). * kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959) * KEYS: trusted: Do not use WARN when encode fails (git-fixes). * KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes). * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794). * KVM: x86: Delete duplicate documentation for KVM_X86_SET_MSR_FILTER (git- fixes). * leds: pwm: Disable PWM when going to suspend (git-fixes). * libsubcmd: Fix parse-options memory leak (git-fixes). * locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes). * media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes). * media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes). * media: mc: mark the media devnode as registered from the, start (git-fixes). * media: ngene: Add dvb_ca_en50221_init return value check (git-fixes). * media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes). * mei: me: add lunar lake point M DID (stable-fixes). * mfd: intel-lpss: Revert "Add missing check for platform_get_resource" (git- fixes). * mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git- fixes). * mfd: tqmx86: Specify IO port register range more precisely (git-fixes). * mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes). * mlxbf_gige: Fix intermittent no ip issue (git-fixes). * mlxbf_gige: stop PHY during open() error paths (git-fixes). * mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes). * mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes). * mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes). * mtd: rawnand: hynix: fixed typo (git-fixes). * net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959) * net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959) * net: nfc: remove inappropriate attrs check (stable-fixes). * net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes). * net: usb: ax88179_178a: fix link status when link is set to down/up (git- fixes). * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes). * net: usb: sr9700: stop lying about skb->truesize (git-fixes). * net:usb:qmi_wwan: support Rolling modules (stable-fixes). * netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961) * nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git- fixes). * nfc: nci: Fix uninit-value in nci_rx_work (git-fixes). * nilfs2: fix out-of-range warning (git-fixes). * nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes). * nilfs2: fix use-after-free of timer for log writer thread (git-fixes). * nilfs2: make superblock data array index computation sparse friendly (git- fixes). * nvme-multipath: fix io accounting on failover (git-fixes). * nvme: ensure disabling pairs with unquiesce (bsc#1224534). * nvme: fix miss command type check (git-fixes). * nvme: fix multipath batched completion accounting (git-fixes). * nvmet: fix ns enable/disable possible hang (git-fixes). * PCI: dwc: Detect iATU settings after getting "addr_space" resource (git- fixes). * PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes). * PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes). * PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes). * PCI: tegra194: Fix probe path for Endpoint mode (git-fixes). * PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes). * pinctrl: armada-37xx: remove an unused variable (git-fixes). * pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes). * pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes). * pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes). * pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git- fixes). * pinctrl/meson: fix typo in PDM's pin name (git-fixes). * platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git- fixes). * platform/x86/intel-uncore-freq: Do not present root domain on error (git- fixes). * power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes). * powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740). * powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740). * powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740). * powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729). * powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes). * powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783). * powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869). * powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869). * ppdev: Add an error check in register_device (git-fixes). * printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616). * qibfs: fix dentry leak (git-fixes) * RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git- fixes) * RDMA/hns: Fix deadlock on SRQ async events. (git-fixes) * RDMA/hns: Fix GMV table pagesize (git-fixes) * RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes) * RDMA/hns: Fix UAF for cq async event (git-fixes) * RDMA/hns: Modify the print level of CQE error (git-fixes) * RDMA/hns: Use complete parentheses in macros (git-fixes) * RDMA/IPoIB: Fix format truncation compilation errors (git-fixes) * RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes) * RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes) * RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes) * RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes) * RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes) * RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes) * RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes) * RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes) * regulator: bd71828: Do not overwrite runtime voltages (git-fixes). * regulator: core: fix debugfs creation regression (git-fixes). * regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes). * remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes). * ring-buffer: Fix a race between readers and resize checks (git-fixes). * s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795). * s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796). * s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346). * s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139). * s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138). * sched/topology: Optimize topology_span_sane() (bsc#1225053). * scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes). * scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes). * scsi: core: Consult supported VPD page list prior to fetching page (git- fixes). * scsi: core: Fix unremoved procfs host directory regression (git-fixes). * scsi: csiostor: Avoid function pointer casts (git-fixes). * scsi: libfc: Do not schedule abort twice (git-fixes). * scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes). * scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842). * scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842). * scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842). * scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842). * scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842). * scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842). * scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842). * scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842). * scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git- fixes). * scsi: mylex: Fix sysfs buffer lengths (git-fixes). * scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes). * scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git- fixes). * selftests/pidfd: Fix config for pidfd_setns_test (git-fixes). * serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes). * serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable- fixes). * serial: max3100: Fix bitwise types (git-fixes). * serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git- fixes). * serial: max3100: Update uart_driver_registered on driver removal (git- fixes). * serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git- fixes). * serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes). * serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes). * smb: client: ensure to try all targets when finding nested links (bsc#1224020). * smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020). * smb: client: get rid of dfs code dep in namespace.c (bsc#1224020). * smb: client: get rid of dfs naming in automount code (bsc#1224020). * smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020). * smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020). * smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020). * smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020). * smb3: show beginning time for per share stats (bsc#1224020). * soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes). * soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes). * speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes). * spmi: Add a check for remove callback when removing a SPMI driver (git- fixes). * spmi: hisi-spmi-controller: Do not override device identifier (git-fixes). * swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331). * swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331) * swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331) * swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331) * sysv: do not call sb_bread() with pointers_lock held (git-fixes). * thermal/drivers/tsens: Fix null pointer dereference (git-fixes). * tools/latency-collector: Fix -Wformat-security compile warns (git-fixes). * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535) * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes). * tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes). * tracing: hide unused ftrace_event_id_fops (git-fixes). * tty: n_gsm: fix missing receive state reset after mode switch (git-fixes). * tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes). * usb: aqc111: stop lying about skb->truesize (git-fixes). * usb: gadget: u_audio: Clear uac pointer when freed (git-fixes). * usb: typec: tipd: fix event checking for tps6598x (git-fixes). * usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes). * VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes). * VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes). * vmci: prevent speculation leaks by sanitizing event in event_deliver() (git- fixes). * watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git- fixes). * watchdog: ixp4xx: Make sure restart always works (git-fixes). * watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes). * wifi: ar5523: enable proper endpoint verification (git-fixes). * wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes). * wifi: ath10k: poll service ready message before failing (git-fixes). * wifi: ath10k: populate board data for WCN3990 (git-fixes). * wifi: ath11k: do not force enable power save on non-running vdevs (git- fixes). * wifi: carl9170: add a proper sanity check for endpoints (git-fixes). * wifi: carl9170: re-fix fortified-memset warning (git-fixes). * wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes). * wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes). * wifi: mwl8k: initialize cmd->addr[] properly (git-fixes). * x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes). * x86/boot: Ignore NMIs during very early boot (git-fixes). * x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git- fixes). * x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git- fixes). * x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes). * x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes). * x86/lib: Fix overflow when counting digits (git-fixes). * x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes). * x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes). * x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes). * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git- fixes). * x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes). * x86/tdx: Preserve shared bit on mprotect() (git-fixes). * xfs: add missing cmap->br_state = XFS_EXT_NORM update (git-fixes). * xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git- fixes). * xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes). * xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes). * xfs: fix inode reservation space for removing transaction (git-fixes). * xfs: shrink failure needs to hold AGI buffer (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2019=1 openSUSE-SLE-15.5-2024-2019=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2019=1 ## Package List: * openSUSE Leap 15.5 (aarch64 x86_64) * gfs2-kmp-azure-debuginfo-5.14.21-150500.33.57.1 * reiserfs-kmp-azure-5.14.21-150500.33.57.1 * kernel-azure-optional-5.14.21-150500.33.57.1 * kernel-azure-extra-5.14.21-150500.33.57.1 * kernel-syms-azure-5.14.21-150500.33.57.1 * ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.57.1 * kselftests-kmp-azure-5.14.21-150500.33.57.1 * kselftests-kmp-azure-debuginfo-5.14.21-150500.33.57.1 * cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.57.1 * dlm-kmp-azure-debuginfo-5.14.21-150500.33.57.1 * gfs2-kmp-azure-5.14.21-150500.33.57.1 * kernel-azure-devel-debuginfo-5.14.21-150500.33.57.1 * kernel-azure-livepatch-devel-5.14.21-150500.33.57.1 * kernel-azure-devel-5.14.21-150500.33.57.1 * cluster-md-kmp-azure-5.14.21-150500.33.57.1 * dlm-kmp-azure-5.14.21-150500.33.57.1 * kernel-azure-extra-debuginfo-5.14.21-150500.33.57.1 * ocfs2-kmp-azure-5.14.21-150500.33.57.1 * reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.57.1 * kernel-azure-optional-debuginfo-5.14.21-150500.33.57.1 * kernel-azure-debuginfo-5.14.21-150500.33.57.1 * kernel-azure-debugsource-5.14.21-150500.33.57.1 * openSUSE Leap 15.5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.57.1 * openSUSE Leap 15.5 (x86_64) * kernel-azure-vdso-debuginfo-5.14.21-150500.33.57.1 * kernel-azure-vdso-5.14.21-150500.33.57.1 * openSUSE Leap 15.5 (noarch) * kernel-devel-azure-5.14.21-150500.33.57.1 * kernel-source-azure-5.14.21-150500.33.57.1 * Public Cloud Module 15-SP5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.57.1 * Public Cloud Module 15-SP5 (aarch64 x86_64) * kernel-azure-devel-debuginfo-5.14.21-150500.33.57.1 * kernel-azure-devel-5.14.21-150500.33.57.1 * kernel-syms-azure-5.14.21-150500.33.57.1 * kernel-azure-debuginfo-5.14.21-150500.33.57.1 * kernel-azure-debugsource-5.14.21-150500.33.57.1 * Public Cloud Module 15-SP5 (noarch) * kernel-devel-azure-5.14.21-150500.33.57.1 * kernel-source-azure-5.14.21-150500.33.57.1 ## References: * https://www.suse.com/security/cve/CVE-2020-36788.html * https://www.suse.com/security/cve/CVE-2021-39698.html * https://www.suse.com/security/cve/CVE-2021-4148.html * https://www.suse.com/security/cve/CVE-2021-47358.html * https://www.suse.com/security/cve/CVE-2021-47359.html * https://www.suse.com/security/cve/CVE-2021-47360.html * https://www.suse.com/security/cve/CVE-2021-47361.html * https://www.suse.com/security/cve/CVE-2021-47362.html * https://www.suse.com/security/cve/CVE-2021-47363.html * https://www.suse.com/security/cve/CVE-2021-47364.html * https://www.suse.com/security/cve/CVE-2021-47365.html * https://www.suse.com/security/cve/CVE-2021-47366.html * https://www.suse.com/security/cve/CVE-2021-47367.html * https://www.suse.com/security/cve/CVE-2021-47368.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47370.html * https://www.suse.com/security/cve/CVE-2021-47371.html * https://www.suse.com/security/cve/CVE-2021-47372.html * https://www.suse.com/security/cve/CVE-2021-47373.html * https://www.suse.com/security/cve/CVE-2021-47374.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47376.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47379.html * https://www.suse.com/security/cve/CVE-2021-47380.html * https://www.suse.com/security/cve/CVE-2021-47381.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47384.html * https://www.suse.com/security/cve/CVE-2021-47385.html * https://www.suse.com/security/cve/CVE-2021-47386.html * https://www.suse.com/security/cve/CVE-2021-47387.html * https://www.suse.com/security/cve/CVE-2021-47388.html * https://www.suse.com/security/cve/CVE-2021-47389.html * https://www.suse.com/security/cve/CVE-2021-47390.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47392.html * https://www.suse.com/security/cve/CVE-2021-47393.html * https://www.suse.com/security/cve/CVE-2021-47394.html * https://www.suse.com/security/cve/CVE-2021-47395.html * https://www.suse.com/security/cve/CVE-2021-47396.html * https://www.suse.com/security/cve/CVE-2021-47397.html * https://www.suse.com/security/cve/CVE-2021-47398.html * https://www.suse.com/security/cve/CVE-2021-47399.html * https://www.suse.com/security/cve/CVE-2021-47400.html * https://www.suse.com/security/cve/CVE-2021-47401.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47403.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47405.html * https://www.suse.com/security/cve/CVE-2021-47406.html * https://www.suse.com/security/cve/CVE-2021-47407.html * https://www.suse.com/security/cve/CVE-2021-47408.html * https://www.suse.com/security/cve/CVE-2021-47409.html * https://www.suse.com/security/cve/CVE-2021-47410.html * https://www.suse.com/security/cve/CVE-2021-47412.html * https://www.suse.com/security/cve/CVE-2021-47413.html * https://www.suse.com/security/cve/CVE-2021-47414.html * https://www.suse.com/security/cve/CVE-2021-47415.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47417.html * https://www.suse.com/security/cve/CVE-2021-47418.html * https://www.suse.com/security/cve/CVE-2021-47419.html * https://www.suse.com/security/cve/CVE-2021-47420.html * https://www.suse.com/security/cve/CVE-2021-47421.html * https://www.suse.com/security/cve/CVE-2021-47422.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47425.html * https://www.suse.com/security/cve/CVE-2021-47426.html * https://www.suse.com/security/cve/CVE-2021-47427.html * https://www.suse.com/security/cve/CVE-2021-47428.html * https://www.suse.com/security/cve/CVE-2021-47429.html * https://www.suse.com/security/cve/CVE-2021-47430.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47433.html * https://www.suse.com/security/cve/CVE-2021-47434.html * https://www.suse.com/security/cve/CVE-2021-47435.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47437.html * https://www.suse.com/security/cve/CVE-2021-47438.html * https://www.suse.com/security/cve/CVE-2021-47439.html * https://www.suse.com/security/cve/CVE-2021-47440.html * https://www.suse.com/security/cve/CVE-2021-47441.html * https://www.suse.com/security/cve/CVE-2021-47442.html * https://www.suse.com/security/cve/CVE-2021-47443.html * https://www.suse.com/security/cve/CVE-2021-47444.html * https://www.suse.com/security/cve/CVE-2021-47445.html * https://www.suse.com/security/cve/CVE-2021-47446.html * https://www.suse.com/security/cve/CVE-2021-47447.html * https://www.suse.com/security/cve/CVE-2021-47448.html * https://www.suse.com/security/cve/CVE-2021-47449.html * https://www.suse.com/security/cve/CVE-2021-47450.html * https://www.suse.com/security/cve/CVE-2021-47451.html * https://www.suse.com/security/cve/CVE-2021-47452.html * https://www.suse.com/security/cve/CVE-2021-47453.html * https://www.suse.com/security/cve/CVE-2021-47454.html * https://www.suse.com/security/cve/CVE-2021-47455.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47457.html * https://www.suse.com/security/cve/CVE-2021-47458.html * https://www.suse.com/security/cve/CVE-2021-47459.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47461.html * https://www.suse.com/security/cve/CVE-2021-47462.html * https://www.suse.com/security/cve/CVE-2021-47463.html * https://www.suse.com/security/cve/CVE-2021-47464.html * https://www.suse.com/security/cve/CVE-2021-47465.html * https://www.suse.com/security/cve/CVE-2021-47466.html * https://www.suse.com/security/cve/CVE-2021-47467.html * https://www.suse.com/security/cve/CVE-2021-47468.html * https://www.suse.com/security/cve/CVE-2021-47469.html * https://www.suse.com/security/cve/CVE-2021-47470.html * https://www.suse.com/security/cve/CVE-2021-47471.html * https://www.suse.com/security/cve/CVE-2021-47472.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47474.html * https://www.suse.com/security/cve/CVE-2021-47475.html * https://www.suse.com/security/cve/CVE-2021-47476.html * https://www.suse.com/security/cve/CVE-2021-47477.html * https://www.suse.com/security/cve/CVE-2021-47478.html * https://www.suse.com/security/cve/CVE-2021-47479.html * https://www.suse.com/security/cve/CVE-2021-47480.html * https://www.suse.com/security/cve/CVE-2021-47481.html * https://www.suse.com/security/cve/CVE-2021-47482.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47484.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47486.html * https://www.suse.com/security/cve/CVE-2021-47488.html * https://www.suse.com/security/cve/CVE-2021-47489.html * https://www.suse.com/security/cve/CVE-2021-47490.html * https://www.suse.com/security/cve/CVE-2021-47491.html * https://www.suse.com/security/cve/CVE-2021-47492.html * https://www.suse.com/security/cve/CVE-2021-47493.html * https://www.suse.com/security/cve/CVE-2021-47494.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47498.html * https://www.suse.com/security/cve/CVE-2021-47499.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47501.html * https://www.suse.com/security/cve/CVE-2021-47502.html * https://www.suse.com/security/cve/CVE-2021-47503.html * https://www.suse.com/security/cve/CVE-2021-47504.html * https://www.suse.com/security/cve/CVE-2021-47505.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47507.html * https://www.suse.com/security/cve/CVE-2021-47508.html * https://www.suse.com/security/cve/CVE-2021-47509.html * https://www.suse.com/security/cve/CVE-2021-47510.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47512.html * https://www.suse.com/security/cve/CVE-2021-47513.html * https://www.suse.com/security/cve/CVE-2021-47514.html * https://www.suse.com/security/cve/CVE-2021-47516.html * https://www.suse.com/security/cve/CVE-2021-47518.html * https://www.suse.com/security/cve/CVE-2021-47520.html * https://www.suse.com/security/cve/CVE-2021-47521.html * https://www.suse.com/security/cve/CVE-2021-47522.html * https://www.suse.com/security/cve/CVE-2021-47523.html * https://www.suse.com/security/cve/CVE-2021-47524.html * https://www.suse.com/security/cve/CVE-2021-47525.html * https://www.suse.com/security/cve/CVE-2021-47526.html * https://www.suse.com/security/cve/CVE-2021-47527.html * https://www.suse.com/security/cve/CVE-2021-47528.html * https://www.suse.com/security/cve/CVE-2021-47529.html * https://www.suse.com/security/cve/CVE-2021-47530.html * https://www.suse.com/security/cve/CVE-2021-47531.html * https://www.suse.com/security/cve/CVE-2021-47532.html * https://www.suse.com/security/cve/CVE-2021-47533.html * https://www.suse.com/security/cve/CVE-2021-47534.html * https://www.suse.com/security/cve/CVE-2021-47535.html * https://www.suse.com/security/cve/CVE-2021-47536.html * https://www.suse.com/security/cve/CVE-2021-47537.html * https://www.suse.com/security/cve/CVE-2021-47540.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47542.html * https://www.suse.com/security/cve/CVE-2021-47544.html * https://www.suse.com/security/cve/CVE-2021-47548.html * https://www.suse.com/security/cve/CVE-2021-47549.html * https://www.suse.com/security/cve/CVE-2021-47550.html * https://www.suse.com/security/cve/CVE-2021-47551.html * https://www.suse.com/security/cve/CVE-2021-47552.html * https://www.suse.com/security/cve/CVE-2021-47553.html * https://www.suse.com/security/cve/CVE-2021-47554.html * https://www.suse.com/security/cve/CVE-2021-47555.html * https://www.suse.com/security/cve/CVE-2021-47556.html * https://www.suse.com/security/cve/CVE-2021-47557.html * https://www.suse.com/security/cve/CVE-2021-47558.html * https://www.suse.com/security/cve/CVE-2021-47559.html * https://www.suse.com/security/cve/CVE-2021-47560.html * https://www.suse.com/security/cve/CVE-2021-47562.html * https://www.suse.com/security/cve/CVE-2021-47563.html * https://www.suse.com/security/cve/CVE-2021-47564.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2021-47569.html * https://www.suse.com/security/cve/CVE-2022-48633.html * https://www.suse.com/security/cve/CVE-2022-48669.html * https://www.suse.com/security/cve/CVE-2022-48689.html * https://www.suse.com/security/cve/CVE-2022-48691.html * https://www.suse.com/security/cve/CVE-2022-48705.html * https://www.suse.com/security/cve/CVE-2022-48708.html * https://www.suse.com/security/cve/CVE-2022-48709.html * https://www.suse.com/security/cve/CVE-2022-48710.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-42755.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52586.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52618.html * https://www.suse.com/security/cve/CVE-2023-52642.html * https://www.suse.com/security/cve/CVE-2023-52643.html * https://www.suse.com/security/cve/CVE-2023-52644.html * https://www.suse.com/security/cve/CVE-2023-52650.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52656.html * https://www.suse.com/security/cve/CVE-2023-52657.html * https://www.suse.com/security/cve/CVE-2023-52659.html * https://www.suse.com/security/cve/CVE-2023-52660.html * https://www.suse.com/security/cve/CVE-2023-52661.html * https://www.suse.com/security/cve/CVE-2023-52662.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52669.html * https://www.suse.com/security/cve/CVE-2023-52671.html * https://www.suse.com/security/cve/CVE-2023-52674.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52678.html * https://www.suse.com/security/cve/CVE-2023-52679.html * https://www.suse.com/security/cve/CVE-2023-52680.html * https://www.suse.com/security/cve/CVE-2023-52683.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52692.html * https://www.suse.com/security/cve/CVE-2023-52693.html * https://www.suse.com/security/cve/CVE-2023-52694.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52698.html * https://www.suse.com/security/cve/CVE-2023-52699.html * https://www.suse.com/security/cve/CVE-2023-52702.html * https://www.suse.com/security/cve/CVE-2023-52703.html * https://www.suse.com/security/cve/CVE-2023-52705.html * https://www.suse.com/security/cve/CVE-2023-52707.html * https://www.suse.com/security/cve/CVE-2023-52708.html * https://www.suse.com/security/cve/CVE-2023-52730.html * https://www.suse.com/security/cve/CVE-2023-52731.html * https://www.suse.com/security/cve/CVE-2023-52732.html * https://www.suse.com/security/cve/CVE-2023-52733.html * https://www.suse.com/security/cve/CVE-2023-52736.html * https://www.suse.com/security/cve/CVE-2023-52738.html * https://www.suse.com/security/cve/CVE-2023-52739.html * https://www.suse.com/security/cve/CVE-2023-52740.html * https://www.suse.com/security/cve/CVE-2023-52741.html * https://www.suse.com/security/cve/CVE-2023-52742.html * https://www.suse.com/security/cve/CVE-2023-52743.html * https://www.suse.com/security/cve/CVE-2023-52744.html * https://www.suse.com/security/cve/CVE-2023-52745.html * https://www.suse.com/security/cve/CVE-2023-52746.html * https://www.suse.com/security/cve/CVE-2023-52747.html * https://www.suse.com/security/cve/CVE-2023-52753.html * https://www.suse.com/security/cve/CVE-2023-52754.html * https://www.suse.com/security/cve/CVE-2023-52756.html * https://www.suse.com/security/cve/CVE-2023-52757.html * https://www.suse.com/security/cve/CVE-2023-52759.html * https://www.suse.com/security/cve/CVE-2023-52763.html * https://www.suse.com/security/cve/CVE-2023-52764.html * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52773.html * https://www.suse.com/security/cve/CVE-2023-52774.html * https://www.suse.com/security/cve/CVE-2023-52777.html * https://www.suse.com/security/cve/CVE-2023-52781.html * https://www.suse.com/security/cve/CVE-2023-52788.html * https://www.suse.com/security/cve/CVE-2023-52789.html * https://www.suse.com/security/cve/CVE-2023-52791.html * https://www.suse.com/security/cve/CVE-2023-52795.html * https://www.suse.com/security/cve/CVE-2023-52796.html * https://www.suse.com/security/cve/CVE-2023-52798.html * https://www.suse.com/security/cve/CVE-2023-52799.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52803.html * https://www.suse.com/security/cve/CVE-2023-52804.html * https://www.suse.com/security/cve/CVE-2023-52805.html * https://www.suse.com/security/cve/CVE-2023-52806.html * https://www.suse.com/security/cve/CVE-2023-52807.html * https://www.suse.com/security/cve/CVE-2023-52808.html * https://www.suse.com/security/cve/CVE-2023-52809.html * https://www.suse.com/security/cve/CVE-2023-52810.html * https://www.suse.com/security/cve/CVE-2023-52811.html * https://www.suse.com/security/cve/CVE-2023-52814.html * https://www.suse.com/security/cve/CVE-2023-52815.html * https://www.suse.com/security/cve/CVE-2023-52816.html * https://www.suse.com/security/cve/CVE-2023-52817.html * https://www.suse.com/security/cve/CVE-2023-52818.html * https://www.suse.com/security/cve/CVE-2023-52819.html * https://www.suse.com/security/cve/CVE-2023-52821.html * https://www.suse.com/security/cve/CVE-2023-52825.html * https://www.suse.com/security/cve/CVE-2023-52826.html * https://www.suse.com/security/cve/CVE-2023-52832.html * https://www.suse.com/security/cve/CVE-2023-52833.html * https://www.suse.com/security/cve/CVE-2023-52834.html * https://www.suse.com/security/cve/CVE-2023-52838.html * https://www.suse.com/security/cve/CVE-2023-52840.html * https://www.suse.com/security/cve/CVE-2023-52841.html * https://www.suse.com/security/cve/CVE-2023-52844.html * https://www.suse.com/security/cve/CVE-2023-52847.html * https://www.suse.com/security/cve/CVE-2023-52851.html * https://www.suse.com/security/cve/CVE-2023-52853.html * https://www.suse.com/security/cve/CVE-2023-52854.html * https://www.suse.com/security/cve/CVE-2023-52855.html * https://www.suse.com/security/cve/CVE-2023-52856.html * https://www.suse.com/security/cve/CVE-2023-52858.html * https://www.suse.com/security/cve/CVE-2023-52860.html * https://www.suse.com/security/cve/CVE-2023-52861.html * https://www.suse.com/security/cve/CVE-2023-52864.html * https://www.suse.com/security/cve/CVE-2023-52865.html * https://www.suse.com/security/cve/CVE-2023-52867.html * https://www.suse.com/security/cve/CVE-2023-52868.html * https://www.suse.com/security/cve/CVE-2023-52870.html * https://www.suse.com/security/cve/CVE-2023-52871.html * https://www.suse.com/security/cve/CVE-2023-52872.html * https://www.suse.com/security/cve/CVE-2023-52873.html * https://www.suse.com/security/cve/CVE-2023-52875.html * https://www.suse.com/security/cve/CVE-2023-52876.html * https://www.suse.com/security/cve/CVE-2023-52877.html * https://www.suse.com/security/cve/CVE-2023-52878.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2024-26597.html * https://www.suse.com/security/cve/CVE-2024-26643.html * https://www.suse.com/security/cve/CVE-2024-26692.html * https://www.suse.com/security/cve/CVE-2024-26698.html * https://www.suse.com/security/cve/CVE-2024-26715.html * https://www.suse.com/security/cve/CVE-2024-26742.html * https://www.suse.com/security/cve/CVE-2024-26748.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26775.html * https://www.suse.com/security/cve/CVE-2024-26777.html * https://www.suse.com/security/cve/CVE-2024-26778.html * https://www.suse.com/security/cve/CVE-2024-26788.html * https://www.suse.com/security/cve/CVE-2024-26801.html * https://www.suse.com/security/cve/CVE-2024-26822.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26829.html * https://www.suse.com/security/cve/CVE-2024-26838.html * https://www.suse.com/security/cve/CVE-2024-26839.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26859.html * https://www.suse.com/security/cve/CVE-2024-26870.html * https://www.suse.com/security/cve/CVE-2024-26874.html * https://www.suse.com/security/cve/CVE-2024-26880.html * https://www.suse.com/security/cve/CVE-2024-26889.html * https://www.suse.com/security/cve/CVE-2024-26894.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26907.html * https://www.suse.com/security/cve/CVE-2024-26916.html * https://www.suse.com/security/cve/CVE-2024-26919.html * https://www.suse.com/security/cve/CVE-2024-26920.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26922.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26928.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-26931.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-269355.html * https://www.suse.com/security/cve/CVE-2024-26937.html * https://www.suse.com/security/cve/CVE-2024-26938.html * https://www.suse.com/security/cve/CVE-2024-26940.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26958.html * https://www.suse.com/security/cve/CVE-2024-26964.html * https://www.suse.com/security/cve/CVE-2024-26974.html * https://www.suse.com/security/cve/CVE-2024-26977.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26988.html * https://www.suse.com/security/cve/CVE-2024-26989.html * https://www.suse.com/security/cve/CVE-2024-26994.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-26997.html * https://www.suse.com/security/cve/CVE-2024-26999.html * https://www.suse.com/security/cve/CVE-2024-27000.html * https://www.suse.com/security/cve/CVE-2024-27001.html * https://www.suse.com/security/cve/CVE-2024-27004.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27028.html * https://www.suse.com/security/cve/CVE-2024-27037.html * https://www.suse.com/security/cve/CVE-2024-27045.html * https://www.suse.com/security/cve/CVE-2024-27047.html * https://www.suse.com/security/cve/CVE-2024-27051.html * https://www.suse.com/security/cve/CVE-2024-27052.html * https://www.suse.com/security/cve/CVE-2024-27053.html * https://www.suse.com/security/cve/CVE-2024-27054.html * https://www.suse.com/security/cve/CVE-2024-27072.html * https://www.suse.com/security/cve/CVE-2024-27073.html * https://www.suse.com/security/cve/CVE-2024-27074.html * https://www.suse.com/security/cve/CVE-2024-27075.html * https://www.suse.com/security/cve/CVE-2024-27076.html * https://www.suse.com/security/cve/CVE-2024-27077.html * https://www.suse.com/security/cve/CVE-2024-27078.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27393.html * https://www.suse.com/security/cve/CVE-2024-27395.html * https://www.suse.com/security/cve/CVE-2024-27396.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27399.html * https://www.suse.com/security/cve/CVE-2024-27400.html * https://www.suse.com/security/cve/CVE-2024-27401.html * https://www.suse.com/security/cve/CVE-2024-27405.html * https://www.suse.com/security/cve/CVE-2024-27410.html * https://www.suse.com/security/cve/CVE-2024-27412.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-27416.html * https://www.suse.com/security/cve/CVE-2024-27417.html * https://www.suse.com/security/cve/CVE-2024-27419.html * https://www.suse.com/security/cve/CVE-2024-27431.html * https://www.suse.com/security/cve/CVE-2024-27435.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35791.html * https://www.suse.com/security/cve/CVE-2024-35796.html * https://www.suse.com/security/cve/CVE-2024-35799.html * https://www.suse.com/security/cve/CVE-2024-35801.html * https://www.suse.com/security/cve/CVE-2024-35804.html * https://www.suse.com/security/cve/CVE-2024-35806.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35812.html * https://www.suse.com/security/cve/CVE-2024-35813.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35821.html * https://www.suse.com/security/cve/CVE-2024-35822.html * https://www.suse.com/security/cve/CVE-2024-35823.html * https://www.suse.com/security/cve/CVE-2024-35825.html * https://www.suse.com/security/cve/CVE-2024-35828.html * https://www.suse.com/security/cve/CVE-2024-35829.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35833.html * https://www.suse.com/security/cve/CVE-2024-35845.html * https://www.suse.com/security/cve/CVE-2024-35847.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35851.html * https://www.suse.com/security/cve/CVE-2024-35852.html * https://www.suse.com/security/cve/CVE-2024-35854.html * https://www.suse.com/security/cve/CVE-2024-35860.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35865.html * https://www.suse.com/security/cve/CVE-2024-35866.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35868.html * https://www.suse.com/security/cve/CVE-2024-35869.html * https://www.suse.com/security/cve/CVE-2024-35870.html * https://www.suse.com/security/cve/CVE-2024-35872.html * https://www.suse.com/security/cve/CVE-2024-35875.html * https://www.suse.com/security/cve/CVE-2024-35877.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35879.html * https://www.suse.com/security/cve/CVE-2024-35885.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35901.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35907.html * https://www.suse.com/security/cve/CVE-2024-35912.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35915.html * https://www.suse.com/security/cve/CVE-2024-35922.html * https://www.suse.com/security/cve/CVE-2024-35924.html * https://www.suse.com/security/cve/CVE-2024-35930.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35933.html * https://www.suse.com/security/cve/CVE-2024-35935.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35938.html * https://www.suse.com/security/cve/CVE-2024-35939.html * https://www.suse.com/security/cve/CVE-2024-35940.html * https://www.suse.com/security/cve/CVE-2024-35943.html * https://www.suse.com/security/cve/CVE-2024-35944.html * https://www.suse.com/security/cve/CVE-2024-35947.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-35951.html * https://www.suse.com/security/cve/CVE-2024-35952.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35959.html * https://www.suse.com/security/cve/CVE-2024-35963.html * https://www.suse.com/security/cve/CVE-2024-35964.html * https://www.suse.com/security/cve/CVE-2024-35965.html * https://www.suse.com/security/cve/CVE-2024-35966.html * https://www.suse.com/security/cve/CVE-2024-35967.html * https://www.suse.com/security/cve/CVE-2024-35969.html * https://www.suse.com/security/cve/CVE-2024-35973.html * https://www.suse.com/security/cve/CVE-2024-35976.html * https://www.suse.com/security/cve/CVE-2024-35978.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-35989.html * https://www.suse.com/security/cve/CVE-2024-35990.html * https://www.suse.com/security/cve/CVE-2024-35998.html * https://www.suse.com/security/cve/CVE-2024-35999.html * https://www.suse.com/security/cve/CVE-2024-36006.html * https://www.suse.com/security/cve/CVE-2024-36007.html * https://www.suse.com/security/cve/CVE-2024-36012.html * https://www.suse.com/security/cve/CVE-2024-36014.html * https://www.suse.com/security/cve/CVE-2024-36015.html * https://www.suse.com/security/cve/CVE-2024-36016.html * https://www.suse.com/security/cve/CVE-2024-36026.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36032.html * https://www.suse.com/security/cve/CVE-2024-36880.html * https://www.suse.com/security/cve/CVE-2024-36893.html * https://www.suse.com/security/cve/CVE-2024-36896.html * https://www.suse.com/security/cve/CVE-2024-36897.html * https://www.suse.com/security/cve/CVE-2024-36906.html * https://www.suse.com/security/cve/CVE-2024-36918.html * https://www.suse.com/security/cve/CVE-2024-36924.html * https://www.suse.com/security/cve/CVE-2024-36926.html * https://www.suse.com/security/cve/CVE-2024-36928.html * https://www.suse.com/security/cve/CVE-2024-36931.html * https://www.suse.com/security/cve/CVE-2024-36938.html * https://www.suse.com/security/cve/CVE-2024-36940.html * https://www.suse.com/security/cve/CVE-2024-36941.html * https://www.suse.com/security/cve/CVE-2024-36942.html * https://www.suse.com/security/cve/CVE-2024-36944.html * https://www.suse.com/security/cve/CVE-2024-36947.html * https://www.suse.com/security/cve/CVE-2024-36950.html * https://www.suse.com/security/cve/CVE-2024-36952.html * https://www.suse.com/security/cve/CVE-2024-36955.html * https://www.suse.com/security/cve/CVE-2024-36959.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1174585 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1187716 * https://bugzilla.suse.com/show_bug.cgi?id=1190569 * https://bugzilla.suse.com/show_bug.cgi?id=1191949 * https://bugzilla.suse.com/show_bug.cgi?id=1192107 * https://bugzilla.suse.com/show_bug.cgi?id=1193983 * https://bugzilla.suse.com/show_bug.cgi?id=1194288 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1196956 * https://bugzilla.suse.com/show_bug.cgi?id=1197915 * https://bugzilla.suse.com/show_bug.cgi?id=1200465 * https://bugzilla.suse.com/show_bug.cgi?id=1205205 * https://bugzilla.suse.com/show_bug.cgi?id=1207284 * https://bugzilla.suse.com/show_bug.cgi?id=1207361 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1208149 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1209799 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1209980 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1213863 * https://bugzilla.suse.com/show_bug.cgi?id=1214852 * https://bugzilla.suse.com/show_bug.cgi?id=1215322 * https://bugzilla.suse.com/show_bug.cgi?id=1215702 * https://bugzilla.suse.com/show_bug.cgi?id=1216358 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217515 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1220021 * https://bugzilla.suse.com/show_bug.cgi?id=1220363 * https://bugzilla.suse.com/show_bug.cgi?id=1220783 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221081 * https://bugzilla.suse.com/show_bug.cgi?id=1221615 * https://bugzilla.suse.com/show_bug.cgi?id=1221777 * https://bugzilla.suse.com/show_bug.cgi?id=1221816 * https://bugzilla.suse.com/show_bug.cgi?id=1221829 * https://bugzilla.suse.com/show_bug.cgi?id=1222011 * https://bugzilla.suse.com/show_bug.cgi?id=1222374 * https://bugzilla.suse.com/show_bug.cgi?id=1222413 * https://bugzilla.suse.com/show_bug.cgi?id=1222464 * https://bugzilla.suse.com/show_bug.cgi?id=1222513 * https://bugzilla.suse.com/show_bug.cgi?id=1222561 * https://bugzilla.suse.com/show_bug.cgi?id=1222608 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222627 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222765 * https://bugzilla.suse.com/show_bug.cgi?id=1222770 * https://bugzilla.suse.com/show_bug.cgi?id=1222783 * https://bugzilla.suse.com/show_bug.cgi?id=1222893 * https://bugzilla.suse.com/show_bug.cgi?id=1222960 * https://bugzilla.suse.com/show_bug.cgi?id=1222961 * https://bugzilla.suse.com/show_bug.cgi?id=1222974 * https://bugzilla.suse.com/show_bug.cgi?id=1222975 * https://bugzilla.suse.com/show_bug.cgi?id=1223011 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223027 * https://bugzilla.suse.com/show_bug.cgi?id=1223031 * https://bugzilla.suse.com/show_bug.cgi?id=1223043 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223048 * https://bugzilla.suse.com/show_bug.cgi?id=1223049 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223113 * https://bugzilla.suse.com/show_bug.cgi?id=1223137 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223188 * https://bugzilla.suse.com/show_bug.cgi?id=1223203 * https://bugzilla.suse.com/show_bug.cgi?id=1223315 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223489 * https://bugzilla.suse.com/show_bug.cgi?id=1223532 * https://bugzilla.suse.com/show_bug.cgi?id=1223575 * https://bugzilla.suse.com/show_bug.cgi?id=1223595 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223627 * https://bugzilla.suse.com/show_bug.cgi?id=1223631 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223638 * https://bugzilla.suse.com/show_bug.cgi?id=1223650 * https://bugzilla.suse.com/show_bug.cgi?id=1223653 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1223677 * https://bugzilla.suse.com/show_bug.cgi?id=1223678 * https://bugzilla.suse.com/show_bug.cgi?id=1223698 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223717 * https://bugzilla.suse.com/show_bug.cgi?id=1223718 * https://bugzilla.suse.com/show_bug.cgi?id=1223737 * https://bugzilla.suse.com/show_bug.cgi?id=1223741 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223747 * https://bugzilla.suse.com/show_bug.cgi?id=1223748 * https://bugzilla.suse.com/show_bug.cgi?id=1223750 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223754 * https://bugzilla.suse.com/show_bug.cgi?id=1223756 * https://bugzilla.suse.com/show_bug.cgi?id=1223757 * https://bugzilla.suse.com/show_bug.cgi?id=1223762 * https://bugzilla.suse.com/show_bug.cgi?id=1223769 * https://bugzilla.suse.com/show_bug.cgi?id=1223770 * https://bugzilla.suse.com/show_bug.cgi?id=1223779 * https://bugzilla.suse.com/show_bug.cgi?id=1223780 * https://bugzilla.suse.com/show_bug.cgi?id=1223781 * https://bugzilla.suse.com/show_bug.cgi?id=1223788 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223819 * https://bugzilla.suse.com/show_bug.cgi?id=1223826 * https://bugzilla.suse.com/show_bug.cgi?id=1223828 * https://bugzilla.suse.com/show_bug.cgi?id=1223829 * https://bugzilla.suse.com/show_bug.cgi?id=1223837 * https://bugzilla.suse.com/show_bug.cgi?id=1223842 * https://bugzilla.suse.com/show_bug.cgi?id=1223843 * https://bugzilla.suse.com/show_bug.cgi?id=1223844 * https://bugzilla.suse.com/show_bug.cgi?id=1223847 * https://bugzilla.suse.com/show_bug.cgi?id=1223858 * https://bugzilla.suse.com/show_bug.cgi?id=1223875 * https://bugzilla.suse.com/show_bug.cgi?id=1223879 * https://bugzilla.suse.com/show_bug.cgi?id=1223895 * https://bugzilla.suse.com/show_bug.cgi?id=1223959 * https://bugzilla.suse.com/show_bug.cgi?id=1223961 * https://bugzilla.suse.com/show_bug.cgi?id=1223991 * https://bugzilla.suse.com/show_bug.cgi?id=1224020 * https://bugzilla.suse.com/show_bug.cgi?id=1224076 * https://bugzilla.suse.com/show_bug.cgi?id=1224096 * https://bugzilla.suse.com/show_bug.cgi?id=1224098 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224137 * https://bugzilla.suse.com/show_bug.cgi?id=1224166 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224177 * https://bugzilla.suse.com/show_bug.cgi?id=1224180 * https://bugzilla.suse.com/show_bug.cgi?id=1224181 * https://bugzilla.suse.com/show_bug.cgi?id=1224187 * https://bugzilla.suse.com/show_bug.cgi?id=1224331 * https://bugzilla.suse.com/show_bug.cgi?id=1224346 * https://bugzilla.suse.com/show_bug.cgi?id=1224423 * https://bugzilla.suse.com/show_bug.cgi?id=1224432 * https://bugzilla.suse.com/show_bug.cgi?id=1224437 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224442 * https://bugzilla.suse.com/show_bug.cgi?id=1224443 * https://bugzilla.suse.com/show_bug.cgi?id=1224445 * https://bugzilla.suse.com/show_bug.cgi?id=1224449 * https://bugzilla.suse.com/show_bug.cgi?id=1224479 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224487 * https://bugzilla.suse.com/show_bug.cgi?id=1224488 * https://bugzilla.suse.com/show_bug.cgi?id=1224492 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224495 * https://bugzilla.suse.com/show_bug.cgi?id=1224502 * https://bugzilla.suse.com/show_bug.cgi?id=1224508 * https://bugzilla.suse.com/show_bug.cgi?id=1224509 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224519 * https://bugzilla.suse.com/show_bug.cgi?id=1224524 * https://bugzilla.suse.com/show_bug.cgi?id=1224525 * https://bugzilla.suse.com/show_bug.cgi?id=1224530 * https://bugzilla.suse.com/show_bug.cgi?id=1224531 * https://bugzilla.suse.com/show_bug.cgi?id=1224534 * https://bugzilla.suse.com/show_bug.cgi?id=1224535 * https://bugzilla.suse.com/show_bug.cgi?id=1224537 * https://bugzilla.suse.com/show_bug.cgi?id=1224541 * https://bugzilla.suse.com/show_bug.cgi?id=1224543 * https://bugzilla.suse.com/show_bug.cgi?id=1224549 * https://bugzilla.suse.com/show_bug.cgi?id=1224550 * https://bugzilla.suse.com/show_bug.cgi?id=1224558 * https://bugzilla.suse.com/show_bug.cgi?id=1224559 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224567 * https://bugzilla.suse.com/show_bug.cgi?id=1224571 * https://bugzilla.suse.com/show_bug.cgi?id=1224575 * https://bugzilla.suse.com/show_bug.cgi?id=1224576 * https://bugzilla.suse.com/show_bug.cgi?id=1224579 * https://bugzilla.suse.com/show_bug.cgi?id=1224580 * https://bugzilla.suse.com/show_bug.cgi?id=1224581 * https://bugzilla.suse.com/show_bug.cgi?id=1224582 * https://bugzilla.suse.com/show_bug.cgi?id=1224586 * https://bugzilla.suse.com/show_bug.cgi?id=1224587 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224598 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224608 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224615 * https://bugzilla.suse.com/show_bug.cgi?id=1224617 * https://bugzilla.suse.com/show_bug.cgi?id=1224618 * https://bugzilla.suse.com/show_bug.cgi?id=1224621 * https://bugzilla.suse.com/show_bug.cgi?id=1224622 * https://bugzilla.suse.com/show_bug.cgi?id=1224624 * https://bugzilla.suse.com/show_bug.cgi?id=1224627 * https://bugzilla.suse.com/show_bug.cgi?id=1224628 * https://bugzilla.suse.com/show_bug.cgi?id=1224629 * https://bugzilla.suse.com/show_bug.cgi?id=1224632 * https://bugzilla.suse.com/show_bug.cgi?id=1224636 * https://bugzilla.suse.com/show_bug.cgi?id=1224637 * https://bugzilla.suse.com/show_bug.cgi?id=1224638 * https://bugzilla.suse.com/show_bug.cgi?id=1224640 * https://bugzilla.suse.com/show_bug.cgi?id=1224643 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224645 * https://bugzilla.suse.com/show_bug.cgi?id=1224647 * https://bugzilla.suse.com/show_bug.cgi?id=1224648 * https://bugzilla.suse.com/show_bug.cgi?id=1224649 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224651 * https://bugzilla.suse.com/show_bug.cgi?id=1224657 * https://bugzilla.suse.com/show_bug.cgi?id=1224659 * https://bugzilla.suse.com/show_bug.cgi?id=1224660 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224664 * https://bugzilla.suse.com/show_bug.cgi?id=1224665 * https://bugzilla.suse.com/show_bug.cgi?id=1224666 * https://bugzilla.suse.com/show_bug.cgi?id=1224667 * https://bugzilla.suse.com/show_bug.cgi?id=1224668 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224672 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224678 * https://bugzilla.suse.com/show_bug.cgi?id=1224679 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224681 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224686 * https://bugzilla.suse.com/show_bug.cgi?id=1224692 * https://bugzilla.suse.com/show_bug.cgi?id=1224697 * https://bugzilla.suse.com/show_bug.cgi?id=1224699 * https://bugzilla.suse.com/show_bug.cgi?id=1224701 * https://bugzilla.suse.com/show_bug.cgi?id=1224703 * https://bugzilla.suse.com/show_bug.cgi?id=1224705 * https://bugzilla.suse.com/show_bug.cgi?id=1224707 * https://bugzilla.suse.com/show_bug.cgi?id=1224717 * https://bugzilla.suse.com/show_bug.cgi?id=1224718 * https://bugzilla.suse.com/show_bug.cgi?id=1224721 * https://bugzilla.suse.com/show_bug.cgi?id=1224722 * https://bugzilla.suse.com/show_bug.cgi?id=1224723 * https://bugzilla.suse.com/show_bug.cgi?id=1224725 * https://bugzilla.suse.com/show_bug.cgi?id=1224727 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224729 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224731 * https://bugzilla.suse.com/show_bug.cgi?id=1224732 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224739 * https://bugzilla.suse.com/show_bug.cgi?id=1224740 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224759 * https://bugzilla.suse.com/show_bug.cgi?id=1224763 * https://bugzilla.suse.com/show_bug.cgi?id=1224764 * https://bugzilla.suse.com/show_bug.cgi?id=1224765 * https://bugzilla.suse.com/show_bug.cgi?id=1224766 * https://bugzilla.suse.com/show_bug.cgi?id=1224794 * https://bugzilla.suse.com/show_bug.cgi?id=1224795 * https://bugzilla.suse.com/show_bug.cgi?id=1224796 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224816 * https://bugzilla.suse.com/show_bug.cgi?id=1224895 * https://bugzilla.suse.com/show_bug.cgi?id=1224898 * https://bugzilla.suse.com/show_bug.cgi?id=1224900 * https://bugzilla.suse.com/show_bug.cgi?id=1224901 * https://bugzilla.suse.com/show_bug.cgi?id=1224902 * https://bugzilla.suse.com/show_bug.cgi?id=1224903 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224905 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224909 * https://bugzilla.suse.com/show_bug.cgi?id=1224910 * https://bugzilla.suse.com/show_bug.cgi?id=1224911 * https://bugzilla.suse.com/show_bug.cgi?id=1224912 * https://bugzilla.suse.com/show_bug.cgi?id=1224913 * https://bugzilla.suse.com/show_bug.cgi?id=1224914 * https://bugzilla.suse.com/show_bug.cgi?id=1224915 * https://bugzilla.suse.com/show_bug.cgi?id=1224920 * https://bugzilla.suse.com/show_bug.cgi?id=1224928 * https://bugzilla.suse.com/show_bug.cgi?id=1224929 * https://bugzilla.suse.com/show_bug.cgi?id=1224930 * https://bugzilla.suse.com/show_bug.cgi?id=1224931 * https://bugzilla.suse.com/show_bug.cgi?id=1224932 * https://bugzilla.suse.com/show_bug.cgi?id=1224936 * https://bugzilla.suse.com/show_bug.cgi?id=1224937 * https://bugzilla.suse.com/show_bug.cgi?id=1224941 * https://bugzilla.suse.com/show_bug.cgi?id=1224942 * https://bugzilla.suse.com/show_bug.cgi?id=1224944 * https://bugzilla.suse.com/show_bug.cgi?id=1224945 * https://bugzilla.suse.com/show_bug.cgi?id=1224947 * https://bugzilla.suse.com/show_bug.cgi?id=1224956 * https://bugzilla.suse.com/show_bug.cgi?id=1224988 * https://bugzilla.suse.com/show_bug.cgi?id=1224992 * https://bugzilla.suse.com/show_bug.cgi?id=1225000 * https://bugzilla.suse.com/show_bug.cgi?id=1225003 * https://bugzilla.suse.com/show_bug.cgi?id=1225005 * https://bugzilla.suse.com/show_bug.cgi?id=1225008 * https://bugzilla.suse.com/show_bug.cgi?id=1225009 * https://bugzilla.suse.com/show_bug.cgi?id=1225022 * https://bugzilla.suse.com/show_bug.cgi?id=1225031 * https://bugzilla.suse.com/show_bug.cgi?id=1225032 * https://bugzilla.suse.com/show_bug.cgi?id=1225036 * https://bugzilla.suse.com/show_bug.cgi?id=1225041 * https://bugzilla.suse.com/show_bug.cgi?id=1225044 * https://bugzilla.suse.com/show_bug.cgi?id=1225053 * https://bugzilla.suse.com/show_bug.cgi?id=1225076 * https://bugzilla.suse.com/show_bug.cgi?id=1225077 * https://bugzilla.suse.com/show_bug.cgi?id=1225082 * https://bugzilla.suse.com/show_bug.cgi?id=1225085 * https://bugzilla.suse.com/show_bug.cgi?id=1225086 * https://bugzilla.suse.com/show_bug.cgi?id=1225092 * https://bugzilla.suse.com/show_bug.cgi?id=1225095 * https://bugzilla.suse.com/show_bug.cgi?id=1225096 * https://bugzilla.suse.com/show_bug.cgi?id=1225097 * https://bugzilla.suse.com/show_bug.cgi?id=1225106 * https://bugzilla.suse.com/show_bug.cgi?id=1225108 * https://bugzilla.suse.com/show_bug.cgi?id=1225109 * https://bugzilla.suse.com/show_bug.cgi?id=1225114 * https://bugzilla.suse.com/show_bug.cgi?id=1225118 * https://bugzilla.suse.com/show_bug.cgi?id=1225121 * https://bugzilla.suse.com/show_bug.cgi?id=1225122 * https://bugzilla.suse.com/show_bug.cgi?id=1225123 * https://bugzilla.suse.com/show_bug.cgi?id=1225125 * https://bugzilla.suse.com/show_bug.cgi?id=1225126 * https://bugzilla.suse.com/show_bug.cgi?id=1225127 * https://bugzilla.suse.com/show_bug.cgi?id=1225129 * https://bugzilla.suse.com/show_bug.cgi?id=1225131 * https://bugzilla.suse.com/show_bug.cgi?id=1225132 * https://bugzilla.suse.com/show_bug.cgi?id=1225138 * https://bugzilla.suse.com/show_bug.cgi?id=1225139 * https://bugzilla.suse.com/show_bug.cgi?id=1225145 * https://bugzilla.suse.com/show_bug.cgi?id=1225151 * https://bugzilla.suse.com/show_bug.cgi?id=1225153 * https://bugzilla.suse.com/show_bug.cgi?id=1225156 * https://bugzilla.suse.com/show_bug.cgi?id=1225158 * https://bugzilla.suse.com/show_bug.cgi?id=1225160 * https://bugzilla.suse.com/show_bug.cgi?id=1225161 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225167 * https://bugzilla.suse.com/show_bug.cgi?id=1225180 * https://bugzilla.suse.com/show_bug.cgi?id=1225183 * https://bugzilla.suse.com/show_bug.cgi?id=1225184 * https://bugzilla.suse.com/show_bug.cgi?id=1225186 * https://bugzilla.suse.com/show_bug.cgi?id=1225187 * https://bugzilla.suse.com/show_bug.cgi?id=1225189 * https://bugzilla.suse.com/show_bug.cgi?id=1225190 * https://bugzilla.suse.com/show_bug.cgi?id=1225191 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225195 * https://bugzilla.suse.com/show_bug.cgi?id=1225198 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225203 * https://bugzilla.suse.com/show_bug.cgi?id=1225205 * https://bugzilla.suse.com/show_bug.cgi?id=1225206 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225209 * https://bugzilla.suse.com/show_bug.cgi?id=1225210 * https://bugzilla.suse.com/show_bug.cgi?id=1225214 * https://bugzilla.suse.com/show_bug.cgi?id=1225222 * https://bugzilla.suse.com/show_bug.cgi?id=1225223 * https://bugzilla.suse.com/show_bug.cgi?id=1225224 * https://bugzilla.suse.com/show_bug.cgi?id=1225225 * https://bugzilla.suse.com/show_bug.cgi?id=1225227 * https://bugzilla.suse.com/show_bug.cgi?id=1225228 * https://bugzilla.suse.com/show_bug.cgi?id=1225229 * https://bugzilla.suse.com/show_bug.cgi?id=1225230 * https://bugzilla.suse.com/show_bug.cgi?id=1225232 * https://bugzilla.suse.com/show_bug.cgi?id=1225233 * https://bugzilla.suse.com/show_bug.cgi?id=1225235 * https://bugzilla.suse.com/show_bug.cgi?id=1225236 * https://bugzilla.suse.com/show_bug.cgi?id=1225237 * https://bugzilla.suse.com/show_bug.cgi?id=1225238 * https://bugzilla.suse.com/show_bug.cgi?id=1225239 * https://bugzilla.suse.com/show_bug.cgi?id=1225240 * https://bugzilla.suse.com/show_bug.cgi?id=1225241 * https://bugzilla.suse.com/show_bug.cgi?id=1225242 * https://bugzilla.suse.com/show_bug.cgi?id=1225243 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225245 * https://bugzilla.suse.com/show_bug.cgi?id=1225246 * https://bugzilla.suse.com/show_bug.cgi?id=1225247 * https://bugzilla.suse.com/show_bug.cgi?id=1225248 * https://bugzilla.suse.com/show_bug.cgi?id=1225249 * https://bugzilla.suse.com/show_bug.cgi?id=1225250 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225252 * https://bugzilla.suse.com/show_bug.cgi?id=1225253 * https://bugzilla.suse.com/show_bug.cgi?id=1225254 * https://bugzilla.suse.com/show_bug.cgi?id=1225255 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225257 * https://bugzilla.suse.com/show_bug.cgi?id=1225258 * https://bugzilla.suse.com/show_bug.cgi?id=1225259 * https://bugzilla.suse.com/show_bug.cgi?id=1225260 * https://bugzilla.suse.com/show_bug.cgi?id=1225261 * https://bugzilla.suse.com/show_bug.cgi?id=1225262 * https://bugzilla.suse.com/show_bug.cgi?id=1225263 * https://bugzilla.suse.com/show_bug.cgi?id=1225268 * https://bugzilla.suse.com/show_bug.cgi?id=1225301 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225304 * https://bugzilla.suse.com/show_bug.cgi?id=1225306 * https://bugzilla.suse.com/show_bug.cgi?id=1225316 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225320 * https://bugzilla.suse.com/show_bug.cgi?id=1225321 * https://bugzilla.suse.com/show_bug.cgi?id=1225322 * https://bugzilla.suse.com/show_bug.cgi?id=1225323 * https://bugzilla.suse.com/show_bug.cgi?id=1225326 * https://bugzilla.suse.com/show_bug.cgi?id=1225327 * https://bugzilla.suse.com/show_bug.cgi?id=1225328 * https://bugzilla.suse.com/show_bug.cgi?id=1225329 * https://bugzilla.suse.com/show_bug.cgi?id=1225330 * https://bugzilla.suse.com/show_bug.cgi?id=1225331 * https://bugzilla.suse.com/show_bug.cgi?id=1225332 * https://bugzilla.suse.com/show_bug.cgi?id=1225333 * https://bugzilla.suse.com/show_bug.cgi?id=1225334 * https://bugzilla.suse.com/show_bug.cgi?id=1225335 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225337 * https://bugzilla.suse.com/show_bug.cgi?id=1225338 * https://bugzilla.suse.com/show_bug.cgi?id=1225339 * https://bugzilla.suse.com/show_bug.cgi?id=1225341 * https://bugzilla.suse.com/show_bug.cgi?id=1225342 * https://bugzilla.suse.com/show_bug.cgi?id=1225344 * https://bugzilla.suse.com/show_bug.cgi?id=1225346 * https://bugzilla.suse.com/show_bug.cgi?id=1225347 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225353 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225357 * https://bugzilla.suse.com/show_bug.cgi?id=1225358 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225361 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225368 * https://bugzilla.suse.com/show_bug.cgi?id=1225369 * https://bugzilla.suse.com/show_bug.cgi?id=1225370 * https://bugzilla.suse.com/show_bug.cgi?id=1225372 * https://bugzilla.suse.com/show_bug.cgi?id=1225373 * https://bugzilla.suse.com/show_bug.cgi?id=1225374 * https://bugzilla.suse.com/show_bug.cgi?id=1225375 * https://bugzilla.suse.com/show_bug.cgi?id=1225376 * https://bugzilla.suse.com/show_bug.cgi?id=1225377 * https://bugzilla.suse.com/show_bug.cgi?id=1225379 * https://bugzilla.suse.com/show_bug.cgi?id=1225380 * https://bugzilla.suse.com/show_bug.cgi?id=1225382 * https://bugzilla.suse.com/show_bug.cgi?id=1225383 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225386 * https://bugzilla.suse.com/show_bug.cgi?id=1225387 * https://bugzilla.suse.com/show_bug.cgi?id=1225388 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225392 * https://bugzilla.suse.com/show_bug.cgi?id=1225393 * https://bugzilla.suse.com/show_bug.cgi?id=1225396 * https://bugzilla.suse.com/show_bug.cgi?id=1225400 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225405 * https://bugzilla.suse.com/show_bug.cgi?id=1225408 * https://bugzilla.suse.com/show_bug.cgi?id=1225409 * https://bugzilla.suse.com/show_bug.cgi?id=1225410 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225424 * https://bugzilla.suse.com/show_bug.cgi?id=1225425 * https://bugzilla.suse.com/show_bug.cgi?id=1225427 * https://bugzilla.suse.com/show_bug.cgi?id=1225431 * https://bugzilla.suse.com/show_bug.cgi?id=1225435 * https://bugzilla.suse.com/show_bug.cgi?id=1225436 * https://bugzilla.suse.com/show_bug.cgi?id=1225437 * https://bugzilla.suse.com/show_bug.cgi?id=1225438 * https://bugzilla.suse.com/show_bug.cgi?id=1225439 * https://bugzilla.suse.com/show_bug.cgi?id=1225441 * https://bugzilla.suse.com/show_bug.cgi?id=1225442 * https://bugzilla.suse.com/show_bug.cgi?id=1225443 * https://bugzilla.suse.com/show_bug.cgi?id=1225444 * https://bugzilla.suse.com/show_bug.cgi?id=1225445 * https://bugzilla.suse.com/show_bug.cgi?id=1225446 * https://bugzilla.suse.com/show_bug.cgi?id=1225447 * https://bugzilla.suse.com/show_bug.cgi?id=1225450 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225455 * https://bugzilla.suse.com/show_bug.cgi?id=1225461 * https://bugzilla.suse.com/show_bug.cgi?id=1225463 * https://bugzilla.suse.com/show_bug.cgi?id=1225464 * https://bugzilla.suse.com/show_bug.cgi?id=1225466 * https://bugzilla.suse.com/show_bug.cgi?id=1225467 * https://bugzilla.suse.com/show_bug.cgi?id=1225468 * https://bugzilla.suse.com/show_bug.cgi?id=1225471 * https://bugzilla.suse.com/show_bug.cgi?id=1225472 * https://bugzilla.suse.com/show_bug.cgi?id=1225478 * https://bugzilla.suse.com/show_bug.cgi?id=1225479 * https://bugzilla.suse.com/show_bug.cgi?id=1225480 * https://bugzilla.suse.com/show_bug.cgi?id=1225482 * https://bugzilla.suse.com/show_bug.cgi?id=1225483 * https://bugzilla.suse.com/show_bug.cgi?id=1225486 * https://bugzilla.suse.com/show_bug.cgi?id=1225488 * https://bugzilla.suse.com/show_bug.cgi?id=1225490 * https://bugzilla.suse.com/show_bug.cgi?id=1225492 * https://bugzilla.suse.com/show_bug.cgi?id=1225495 * https://bugzilla.suse.com/show_bug.cgi?id=1225499 * https://bugzilla.suse.com/show_bug.cgi?id=1225500 * https://bugzilla.suse.com/show_bug.cgi?id=1225501 * https://bugzilla.suse.com/show_bug.cgi?id=1225502 * https://bugzilla.suse.com/show_bug.cgi?id=1225506 * https://bugzilla.suse.com/show_bug.cgi?id=1225508 * https://bugzilla.suse.com/show_bug.cgi?id=1225510 * https://bugzilla.suse.com/show_bug.cgi?id=1225513 * https://bugzilla.suse.com/show_bug.cgi?id=1225515 * https://bugzilla.suse.com/show_bug.cgi?id=1225529 * https://bugzilla.suse.com/show_bug.cgi?id=1225530 * https://bugzilla.suse.com/show_bug.cgi?id=1225532 * https://bugzilla.suse.com/show_bug.cgi?id=1225534 * https://bugzilla.suse.com/show_bug.cgi?id=1225535 * https://bugzilla.suse.com/show_bug.cgi?id=1225548 * https://bugzilla.suse.com/show_bug.cgi?id=1225549 * https://bugzilla.suse.com/show_bug.cgi?id=1225550 * https://bugzilla.suse.com/show_bug.cgi?id=1225553 * https://bugzilla.suse.com/show_bug.cgi?id=1225554 * https://bugzilla.suse.com/show_bug.cgi?id=1225555 * https://bugzilla.suse.com/show_bug.cgi?id=1225556 * https://bugzilla.suse.com/show_bug.cgi?id=1225557 * https://bugzilla.suse.com/show_bug.cgi?id=1225559 * https://bugzilla.suse.com/show_bug.cgi?id=1225560 * https://bugzilla.suse.com/show_bug.cgi?id=1225565 * https://bugzilla.suse.com/show_bug.cgi?id=1225566 * https://bugzilla.suse.com/show_bug.cgi?id=1225568 * https://bugzilla.suse.com/show_bug.cgi?id=1225569 * https://bugzilla.suse.com/show_bug.cgi?id=1225570 * https://bugzilla.suse.com/show_bug.cgi?id=1225571 * https://bugzilla.suse.com/show_bug.cgi?id=1225572 * https://bugzilla.suse.com/show_bug.cgi?id=1225577 * https://bugzilla.suse.com/show_bug.cgi?id=1225583 * https://bugzilla.suse.com/show_bug.cgi?id=1225584 * https://bugzilla.suse.com/show_bug.cgi?id=1225587 * https://bugzilla.suse.com/show_bug.cgi?id=1225588 * https://bugzilla.suse.com/show_bug.cgi?id=1225589 * https://bugzilla.suse.com/show_bug.cgi?id=1225590 * https://bugzilla.suse.com/show_bug.cgi?id=1225591 * https://bugzilla.suse.com/show_bug.cgi?id=1225592 * https://bugzilla.suse.com/show_bug.cgi?id=1225593 * https://bugzilla.suse.com/show_bug.cgi?id=1225595 * https://bugzilla.suse.com/show_bug.cgi?id=1225599 * https://bugzilla.suse.com/show_bug.cgi?id=1225616 * https://bugzilla.suse.com/show_bug.cgi?id=1225640 * https://bugzilla.suse.com/show_bug.cgi?id=1225642 * https://bugzilla.suse.com/show_bug.cgi?id=1225705 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225715 * https://bugzilla.suse.com/show_bug.cgi?id=1225720 * https://bugzilla.suse.com/show_bug.cgi?id=1225722 * https://bugzilla.suse.com/show_bug.cgi?id=1225734 * https://bugzilla.suse.com/show_bug.cgi?id=1225735 * https://bugzilla.suse.com/show_bug.cgi?id=1225747 * https://bugzilla.suse.com/show_bug.cgi?id=1225748 * https://bugzilla.suse.com/show_bug.cgi?id=1225756 * https://bugzilla.suse.com/show_bug.cgi?id=1225761 * https://bugzilla.suse.com/show_bug.cgi?id=1225766 * https://bugzilla.suse.com/show_bug.cgi?id=1225775 * https://bugzilla.suse.com/show_bug.cgi?id=1225810 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225829 * https://bugzilla.suse.com/show_bug.cgi?id=1225835 * https://bugzilla.suse.com/show_bug.cgi?id=1225842 * https://jira.suse.com/browse/PED-3259 * https://jira.suse.com/browse/PED-7167 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 12:36:35 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 12:36:35 -0000 Subject: SUSE-SU-2024:1673-2: critical: Security update for python-Pillow Message-ID: <171828219501.19143.12602403775105221838@smelt2.prg2.suse.org> # Security update for python-Pillow Announcement ID: SUSE-SU-2024:1673-2 Rating: critical References: * bsc#1180833 * bsc#1183101 * bsc#1183102 * bsc#1183103 * bsc#1183105 * bsc#1183107 * bsc#1183108 * bsc#1183110 * bsc#1188574 * bsc#1190229 * bsc#1194551 * bsc#1194552 Cross-References: * CVE-2020-35654 * CVE-2021-23437 * CVE-2021-25289 * CVE-2021-25290 * CVE-2021-25292 * CVE-2021-25293 * CVE-2021-27921 * CVE-2021-27922 * CVE-2021-27923 * CVE-2021-34552 * CVE-2022-22815 * CVE-2022-22816 CVSS scores: * CVE-2020-35654 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2020-35654 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2021-23437 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-23437 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-25289 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-25289 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2021-25290 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-25290 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-25292 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-25292 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2021-25293 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-25293 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-27921 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-27921 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-27922 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-27922 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-27923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-27923 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-34552 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-34552 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-22815 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2022-22815 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2022-22816 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2022-22816 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Affected Products: * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves 12 vulnerabilities can now be installed. ## Description: This update for python-Pillow fixes the following issues: * Fixed ImagePath.Path array handling (bsc#1194552, CVE-2022-22815, bsc#1194551, CVE-2022-22816) * Use snprintf instead of sprintf (bsc#1188574, CVE-2021-34552) * Fix Memory DOS in Icns, Ico and Blp Image Plugins. (bsc#1183110, CVE-2021-27921, bsc#1183108, CVE-2021-27922, bsc#1183107, CVE-2021-27923) * Fix OOB read in SgiRleDecode.c (bsc#1183102, CVE-2021-25293) * Use more specific regex chars to prevent ReDoS (bsc#1183101, CVE-2021-25292) * Fix negative size read in TiffDecode.c (bsc#1183105, CVE-2021-25290) * Raise ValueError if color specifier is too long (bsc#1190229, CVE-2021-23437) * Incorrect error code checking in TiffDecode.c (bsc#1183103, CVE-2021-25289) * OOB Write in TiffDecode.c (bsc#1180833, CVE-2020-35654) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1673=1 ## Package List: * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * python-Pillow-debuginfo-7.2.0-150300.3.15.1 * python3-Pillow-debuginfo-7.2.0-150300.3.15.1 * python3-Pillow-7.2.0-150300.3.15.1 * python-Pillow-debugsource-7.2.0-150300.3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2020-35654.html * https://www.suse.com/security/cve/CVE-2021-23437.html * https://www.suse.com/security/cve/CVE-2021-25289.html * https://www.suse.com/security/cve/CVE-2021-25290.html * https://www.suse.com/security/cve/CVE-2021-25292.html * https://www.suse.com/security/cve/CVE-2021-25293.html * https://www.suse.com/security/cve/CVE-2021-27921.html * https://www.suse.com/security/cve/CVE-2021-27922.html * https://www.suse.com/security/cve/CVE-2021-27923.html * https://www.suse.com/security/cve/CVE-2021-34552.html * https://www.suse.com/security/cve/CVE-2022-22815.html * https://www.suse.com/security/cve/CVE-2022-22816.html * https://bugzilla.suse.com/show_bug.cgi?id=1180833 * https://bugzilla.suse.com/show_bug.cgi?id=1183101 * https://bugzilla.suse.com/show_bug.cgi?id=1183102 * https://bugzilla.suse.com/show_bug.cgi?id=1183103 * https://bugzilla.suse.com/show_bug.cgi?id=1183105 * https://bugzilla.suse.com/show_bug.cgi?id=1183107 * https://bugzilla.suse.com/show_bug.cgi?id=1183108 * https://bugzilla.suse.com/show_bug.cgi?id=1183110 * https://bugzilla.suse.com/show_bug.cgi?id=1188574 * https://bugzilla.suse.com/show_bug.cgi?id=1190229 * https://bugzilla.suse.com/show_bug.cgi?id=1194551 * https://bugzilla.suse.com/show_bug.cgi?id=1194552 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 12:36:37 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 12:36:37 -0000 Subject: SUSE-RU-2024:1794-2: low: Recommended update for python-threadpoolctl Message-ID: <171828219701.19143.13941384034808865105@smelt2.prg2.suse.org> # Recommended update for python-threadpoolctl Announcement ID: SUSE-RU-2024:1794-2 Rating: low References: * bsc#1223995 Affected Products: * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for python-threadpoolctl fixes the following issues: * Add python-threadpoolctl to Package Hub Subpackages in SLE-15-SP5 (bsc#1223995, jsc#MSC-796) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1794=1 ## Package List: * SUSE Package Hub 15 15-SP6 (noarch) * python3-threadpoolctl-2.1.0-150300.3.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223995 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 12:36:37 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 12:36:37 -0000 Subject: SUSE-RU-2024:2018-1: moderate: Recommended update for transactional-update Message-ID: <171828219797.19143.1462362950627935194@smelt2.prg2.suse.org> # Recommended update for transactional-update Announcement ID: SUSE-RU-2024:2018-1 Rating: moderate References: Affected Products: * SUSE Linux Enterprise Micro 5.5 An update that can now be installed. ## Description: This update for transactional-update fixes the following issue: * tukit: Properly handle overlay syncing failures: If the system would not be rebooted and several snapshots accumulated in the meantime, it was possible that the previous base snapshot "required for /etc syncing" was deleted already. In that case changes in /etc might have been reset (gh#openSUSE/transactional-update#116) (gh#kube-hetzner/terraform-hcloud- kube-hetzner#1287) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2018=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (noarch) * transactional-update-zypp-config-4.1.8-150500.3.9.2 * dracut-transactional-update-4.1.8-150500.3.9.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * transactional-update-debuginfo-4.1.8-150500.3.9.2 * transactional-update-debugsource-4.1.8-150500.3.9.2 * tukit-debuginfo-4.1.8-150500.3.9.2 * tukitd-4.1.8-150500.3.9.2 * libtukit4-debuginfo-4.1.8-150500.3.9.2 * tukit-4.1.8-150500.3.9.2 * libtukit4-4.1.8-150500.3.9.2 * transactional-update-4.1.8-150500.3.9.2 * tukitd-debuginfo-4.1.8-150500.3.9.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 16:30:05 -0000 Subject: SUSE-SU-2024:2029-1: moderate: Security update for python-scikit-learn Message-ID: <171829620568.16689.12393836793319065503@smelt2.prg2.suse.org> # Security update for python-scikit-learn Announcement ID: SUSE-SU-2024:2029-1 Rating: moderate References: * bsc#1226185 Cross-References: * CVE-2024-5206 CVSS scores: * CVE-2024-5206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for python-scikit-learn fixes the following issues: -CVE-2024-5206: Fixed a possible sensitive data leak in TfidfVectorizer. (bsc#1226185) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2029=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2029=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2029=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2029=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2029=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * python3-scikit-learn-debuginfo-0.23.2-150300.3.3.1 * python3-scikit-learn-0.23.2-150300.3.3.1 * python-scikit-learn-debugsource-0.23.2-150300.3.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python3-scikit-learn-debuginfo-0.23.2-150300.3.3.1 * python3-scikit-learn-0.23.2-150300.3.3.1 * python-scikit-learn-debugsource-0.23.2-150300.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python3-scikit-learn-debuginfo-0.23.2-150300.3.3.1 * python3-scikit-learn-0.23.2-150300.3.3.1 * python-scikit-learn-debugsource-0.23.2-150300.3.3.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-scikit-learn-debuginfo-0.23.2-150300.3.3.1 * python3-scikit-learn-0.23.2-150300.3.3.1 * python-scikit-learn-debugsource-0.23.2-150300.3.3.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * python3-scikit-learn-debuginfo-0.23.2-150300.3.3.1 * python3-scikit-learn-0.23.2-150300.3.3.1 * python-scikit-learn-debugsource-0.23.2-150300.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5206.html * https://bugzilla.suse.com/show_bug.cgi?id=1226185 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 16:30:07 -0000 Subject: SUSE-SU-2024:2028-1: moderate: Security update for tiff Message-ID: <171829620774.16689.12700885741237298096@smelt2.prg2.suse.org> # Security update for tiff Announcement ID: SUSE-SU-2024:2028-1 Rating: moderate References: * bsc#1212233 Cross-References: * CVE-2023-3164 CVSS scores: * CVE-2023-3164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-3164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for tiff fixes the following issues: * CVE-2023-3164: Fixed a heap buffer overflow in tiffcrop. (bsc#1212233) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2028=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2028=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2028=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2028=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2028=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2028=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2028=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2028=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2028=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2028=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2028=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2028=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2028=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tiff-debuginfo-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * libtiff5-4.0.9-150000.45.44.1 * libtiff5-debuginfo-4.0.9-150000.45.44.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tiff-debuginfo-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * libtiff5-4.0.9-150000.45.44.1 * libtiff5-debuginfo-4.0.9-150000.45.44.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tiff-debuginfo-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * libtiff5-4.0.9-150000.45.44.1 * libtiff5-debuginfo-4.0.9-150000.45.44.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libtiff5-debuginfo-4.0.9-150000.45.44.1 * tiff-debuginfo-4.0.9-150000.45.44.1 * libtiff5-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * libtiff-devel-4.0.9-150000.45.44.1 * Basesystem Module 15-SP5 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.44.1 * libtiff5-32bit-4.0.9-150000.45.44.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * tiff-debuginfo-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * libtiff5-4.0.9-150000.45.44.1 * libtiff5-debuginfo-4.0.9-150000.45.44.1 * Basesystem Module 15-SP6 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.44.1 * libtiff5-32bit-4.0.9-150000.45.44.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * tiff-4.0.9-150000.45.44.1 * tiff-debuginfo-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tiff-debuginfo-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * libtiff5-4.0.9-150000.45.44.1 * libtiff5-debuginfo-4.0.9-150000.45.44.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tiff-debuginfo-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * libtiff5-4.0.9-150000.45.44.1 * libtiff5-debuginfo-4.0.9-150000.45.44.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tiff-debuginfo-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * libtiff5-4.0.9-150000.45.44.1 * libtiff5-debuginfo-4.0.9-150000.45.44.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tiff-debuginfo-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * libtiff5-4.0.9-150000.45.44.1 * libtiff5-debuginfo-4.0.9-150000.45.44.1 * openSUSE Leap 15.5 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.44.1 * libtiff5-32bit-4.0.9-150000.45.44.1 * libtiff-devel-32bit-4.0.9-150000.45.44.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libtiff5-debuginfo-4.0.9-150000.45.44.1 * tiff-4.0.9-150000.45.44.1 * tiff-debuginfo-4.0.9-150000.45.44.1 * libtiff5-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * libtiff-devel-4.0.9-150000.45.44.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tiff-debuginfo-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * libtiff5-4.0.9-150000.45.44.1 * libtiff5-debuginfo-4.0.9-150000.45.44.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tiff-debuginfo-4.0.9-150000.45.44.1 * tiff-debugsource-4.0.9-150000.45.44.1 * libtiff5-4.0.9-150000.45.44.1 * libtiff5-debuginfo-4.0.9-150000.45.44.1 ## References: * https://www.suse.com/security/cve/CVE-2023-3164.html * https://bugzilla.suse.com/show_bug.cgi?id=1212233 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 16:30:09 -0000 Subject: SUSE-SU-2024:2027-1: important: Security update for php8 Message-ID: <171829620974.16689.17546579460157584973@smelt2.prg2.suse.org> # Security update for php8 Announcement ID: SUSE-SU-2024:2027-1 Rating: important References: * bsc#1226073 Cross-References: * CVE-2024-5458 CVSS scores: * CVE-2024-5458 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-5458 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * Web and Scripting Module 12 An update that solves one vulnerability can now be installed. ## Description: This update for php8 fixes the following issues: * CVE-2024-5458: Fixed an issue that allows to bypass filters in filter_var FILTER_VALIDATE_URL. (bsc#1226073) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Web and Scripting Module 12 zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2024-2027=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2027=1 ## Package List: * Web and Scripting Module 12 (aarch64 ppc64le s390x x86_64) * php74-soap-debuginfo-7.4.33-1.68.2 * php74-fastcgi-debuginfo-7.4.33-1.68.2 * php74-xmlwriter-debuginfo-7.4.33-1.68.2 * php74-shmop-7.4.33-1.68.2 * php74-sysvshm-debuginfo-7.4.33-1.68.2 * php74-mbstring-debuginfo-7.4.33-1.68.2 * php74-xmlreader-7.4.33-1.68.2 * php74-sockets-7.4.33-1.68.2 * php74-json-7.4.33-1.68.2 * php74-zip-7.4.33-1.68.2 * php74-ftp-7.4.33-1.68.2 * php74-dom-debuginfo-7.4.33-1.68.2 * php74-tokenizer-7.4.33-1.68.2 * php74-xsl-7.4.33-1.68.2 * php74-opcache-debuginfo-7.4.33-1.68.2 * php74-snmp-7.4.33-1.68.2 * php74-xmlrpc-7.4.33-1.68.2 * php74-sysvsem-debuginfo-7.4.33-1.68.2 * php74-sysvshm-7.4.33-1.68.2 * php74-ctype-debuginfo-7.4.33-1.68.2 * php74-shmop-debuginfo-7.4.33-1.68.2 * php74-xsl-debuginfo-7.4.33-1.68.2 * php74-tokenizer-debuginfo-7.4.33-1.68.2 * php74-xmlrpc-debuginfo-7.4.33-1.68.2 * php74-bz2-debuginfo-7.4.33-1.68.2 * php74-soap-7.4.33-1.68.2 * php74-debuginfo-7.4.33-1.68.2 * php74-sysvmsg-debuginfo-7.4.33-1.68.2 * php74-fastcgi-7.4.33-1.68.2 * php74-calendar-7.4.33-1.68.2 * php74-bcmath-debuginfo-7.4.33-1.68.2 * php74-iconv-debuginfo-7.4.33-1.68.2 * php74-ldap-7.4.33-1.68.2 * php74-mysql-debuginfo-7.4.33-1.68.2 * php74-pcntl-debuginfo-7.4.33-1.68.2 * php74-gmp-7.4.33-1.68.2 * php74-gd-debuginfo-7.4.33-1.68.2 * php74-sockets-debuginfo-7.4.33-1.68.2 * php74-readline-7.4.33-1.68.2 * php74-pdo-debuginfo-7.4.33-1.68.2 * php74-tidy-7.4.33-1.68.2 * php74-iconv-7.4.33-1.68.2 * php74-sodium-debuginfo-7.4.33-1.68.2 * php74-bz2-7.4.33-1.68.2 * php74-dom-7.4.33-1.68.2 * php74-dba-debuginfo-7.4.33-1.68.2 * php74-odbc-debuginfo-7.4.33-1.68.2 * php74-posix-debuginfo-7.4.33-1.68.2 * php74-curl-debuginfo-7.4.33-1.68.2 * php74-pgsql-debuginfo-7.4.33-1.68.2 * php74-zlib-7.4.33-1.68.2 * php74-snmp-debuginfo-7.4.33-1.68.2 * php74-tidy-debuginfo-7.4.33-1.68.2 * php74-enchant-debuginfo-7.4.33-1.68.2 * php74-pgsql-7.4.33-1.68.2 * apache2-mod_php74-7.4.33-1.68.2 * php74-json-debuginfo-7.4.33-1.68.2 * php74-fileinfo-debuginfo-7.4.33-1.68.2 * php74-pdo-7.4.33-1.68.2 * php74-exif-debuginfo-7.4.33-1.68.2 * php74-sysvsem-7.4.33-1.68.2 * php74-curl-7.4.33-1.68.2 * php74-enchant-7.4.33-1.68.2 * php74-debugsource-7.4.33-1.68.2 * php74-sodium-7.4.33-1.68.2 * php74-sqlite-debuginfo-7.4.33-1.68.2 * php74-openssl-7.4.33-1.68.2 * php74-xmlreader-debuginfo-7.4.33-1.68.2 * php74-xmlwriter-7.4.33-1.68.2 * php74-dba-7.4.33-1.68.2 * php74-odbc-7.4.33-1.68.2 * php74-opcache-7.4.33-1.68.2 * php74-ctype-7.4.33-1.68.2 * php74-ldap-debuginfo-7.4.33-1.68.2 * php74-gettext-7.4.33-1.68.2 * php74-fileinfo-7.4.33-1.68.2 * php74-gettext-debuginfo-7.4.33-1.68.2 * php74-gd-7.4.33-1.68.2 * apache2-mod_php74-debuginfo-7.4.33-1.68.2 * php74-phar-debuginfo-7.4.33-1.68.2 * php74-pcntl-7.4.33-1.68.2 * php74-exif-7.4.33-1.68.2 * php74-sysvmsg-7.4.33-1.68.2 * php74-calendar-debuginfo-7.4.33-1.68.2 * php74-mbstring-7.4.33-1.68.2 * php74-zip-debuginfo-7.4.33-1.68.2 * php74-mysql-7.4.33-1.68.2 * php74-intl-debuginfo-7.4.33-1.68.2 * php74-gmp-debuginfo-7.4.33-1.68.2 * php74-phar-7.4.33-1.68.2 * php74-intl-7.4.33-1.68.2 * php74-bcmath-7.4.33-1.68.2 * php74-fpm-7.4.33-1.68.2 * php74-posix-7.4.33-1.68.2 * php74-fpm-debuginfo-7.4.33-1.68.2 * php74-sqlite-7.4.33-1.68.2 * php74-ftp-debuginfo-7.4.33-1.68.2 * php74-readline-debuginfo-7.4.33-1.68.2 * php74-openssl-debuginfo-7.4.33-1.68.2 * php74-zlib-debuginfo-7.4.33-1.68.2 * php74-7.4.33-1.68.2 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * php74-devel-7.4.33-1.68.2 * php74-debugsource-7.4.33-1.68.2 * php74-debuginfo-7.4.33-1.68.2 ## References: * https://www.suse.com/security/cve/CVE-2024-5458.html * https://bugzilla.suse.com/show_bug.cgi?id=1226073 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 16:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 16:30:12 -0000 Subject: SUSE-SU-2024:1571-2: important: Security update for python-pymongo Message-ID: <171829621225.16689.2870058888198170976@smelt2.prg2.suse.org> # Security update for python-pymongo Announcement ID: SUSE-SU-2024:1571-2 Rating: important References: * bsc#1222492 Cross-References: * CVE-2024-21506 CVSS scores: * CVE-2024-21506 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for python-pymongo fixes the following issues: * CVE-2024-21506: Fixed out-of-bounds read in the BSON module (bsc#1222492) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1571=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1571=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python3-pymongo-3.11.0-150300.3.3.1 * python-pymongo-debugsource-3.11.0-150300.3.3.1 * python-pymongo-debuginfo-3.11.0-150300.3.3.1 * python3-pymongo-debuginfo-3.11.0-150300.3.3.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * python3-pymongo-3.11.0-150300.3.3.1 * python-pymongo-debugsource-3.11.0-150300.3.3.1 * python-pymongo-debuginfo-3.11.0-150300.3.3.1 * python3-pymongo-debuginfo-3.11.0-150300.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21506.html * https://bugzilla.suse.com/show_bug.cgi?id=1222492 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 16:30:14 -0000 Subject: SUSE-RU-2024:2024-1: moderate: Recommended update for jitterentropy Message-ID: <171829621418.16689.12669140129620083104@smelt2.prg2.suse.org> # Recommended update for jitterentropy Announcement ID: SUSE-RU-2024:2024-1 Rating: moderate References: * bsc#1209627 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for jitterentropy fixes the following issues: * Fixed a stack corruption on s390x: [bsc#1209627] * Output size of the STCKE command on s390x is 16 bytes, compared to 8 bytes of the STCK command. Fix a stack corruption in the s390x version of jent_get_nstime(). Add some more detailed information on the STCKE command. Updated to 3.4.1 * add FIPS 140 hints to man page * simplify the test tool to search for optimal configurations * fix: jent_loop_shuffle: re-add setting the time that was lost with 3.4.0 * enhancement: add ARM64 assembler code to read high-res timer ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2024=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2024=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2024=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2024=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2024=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2024=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2024=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2024=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2024=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2024=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2024=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * jitterentropy-devel-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * jitterentropy-devel-static-3.4.1-150000.1.12.1 * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * openSUSE Leap 15.5 (x86_64) * libjitterentropy3-32bit-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-devel-32bit-3.4.1-150000.1.12.1 * libjitterentropy3-32bit-3.4.1-150000.1.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * jitterentropy-devel-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * jitterentropy-devel-static-3.4.1-150000.1.12.1 * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * openSUSE Leap 15.6 (x86_64) * libjitterentropy3-32bit-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-devel-32bit-3.4.1-150000.1.12.1 * libjitterentropy3-32bit-3.4.1-150000.1.12.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x) * jitterentropy-devel-static-3.4.1-150000.1.12.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x) * jitterentropy-devel-static-3.4.1-150000.1.12.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * jitterentropy-devel-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * jitterentropy-devel-static-3.4.1-150000.1.12.1 * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * Basesystem Module 15-SP5 (x86_64) * libjitterentropy3-32bit-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-devel-32bit-3.4.1-150000.1.12.1 * libjitterentropy3-32bit-3.4.1-150000.1.12.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * jitterentropy-devel-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * jitterentropy-devel-static-3.4.1-150000.1.12.1 * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * Basesystem Module 15-SP6 (x86_64) * libjitterentropy3-32bit-debuginfo-3.4.1-150000.1.12.1 * jitterentropy-devel-32bit-3.4.1-150000.1.12.1 * libjitterentropy3-32bit-3.4.1-150000.1.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1209627 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 16:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 16:30:16 -0000 Subject: SUSE-RU-2024:2023-1: moderate: Recommended update for socat Message-ID: <171829621620.16689.3637896572068821650@smelt2.prg2.suse.org> # Recommended update for socat Announcement ID: SUSE-RU-2024:2023-1 Rating: moderate References: * bsc#1160293 * jsc#PED-8413 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature and has one fix can now be installed. ## Description: This update for socat fixes the following issues: socat is updated to 1.8.0.0: Primary feature is enabling TLS 1.3 support. (jsc#PED-8413) * Support for network namespaces (option netns) * TCP client now automatically tries all addresses (IPv4 and IPv6) provided by nameserver until success * Implementation of POSIX message queue (mq) control and access on Linux (addresses POSIXMQ-READ and following) * New wrapper script socat-chain.sh allows to stack two addresses, e.g.HTTP proxy connect over SSL * New script socat-mux.sh allows n-to-1 / 1-to-n communications * New script socat-broker.sh allows group communications * Experimental socks5 client feature * Address ACCEPT-FD for systemd "inetd" mode * UDP-Lite and DCCP address types * Addresses SOCKETPAIR and SHELL * New option bind-tmpname allows forked off children to bind UNIX domain client sockets to random unique pathes * New option retrieve-vlan (with INTERFACE addresses) now makes kernel keep VLAN tags in incoming packets * Simple statistics output with Socat option --statistics and with SIGUSR1 * A couple of new options, many fixes and corrections, see file CHANGES Update to 1.7.4.4: * FIX: In error.c msg2() there was a stack overflow on long messages: The terminating \0 Byte was written behind the last position. * FIX: UDP-RECVFROM with fork sometimes terminated when multiple packets arrived. * FIX: a couple of weaknesses and errors when accessing invalid or incompatible file system entries with UNIX domain, file, and generic addresses. * FIX: bad parser error message on "socat /tmp/x\"x/x -" Update to 1.7.4.3: * fixes the TCP_INFO issue that broke building on non-Linux platforms. * building on AIX works again. * A few more corrections and improvements have been added Update to version 1.7.4.2: * Fixes a lot of bugs, e.g., for options -r and -R. * Further bugfixes, see the CHANGES file Update to 1.7.4.1: Security: * Buffer size option (-b) is internally doubled for CR-CRLF conversion, but not checked for integer overflow. This could lead to heap based buffer overflow, assuming the attacker could provide this parameter. * Many further bugfixes and new features, see the CHANGES file ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2023=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2023=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2023=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2023=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2023=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2023=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2023=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2023=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2023=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2023=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2023=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2023=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2023=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2023=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2023=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-extra-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * socat-debuginfo-1.8.0.0-150400.14.3.1 * socat-debugsource-1.8.0.0-150400.14.3.1 * socat-1.8.0.0-150400.14.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1160293 * https://jira.suse.com/browse/PED-8413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 16:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 16:30:18 -0000 Subject: SUSE-RU-2024:2022-1: moderate: Recommended update for chrony Message-ID: <171829621831.16689.599722667770533549@smelt2.prg2.suse.org> # Recommended update for chrony Announcement ID: SUSE-RU-2024:2022-1 Rating: moderate References: * bsc#1213551 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for chrony fixes the following issues: * Use shorter NTS-KE retry interval when network is down (bsc#1213551) * Use make quickcheck instead of make check to avoid more than 1h build times and failures due to timeouts. This was the default before 3.2 but it changed to make tests more reliable ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2022=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2022=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2022=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2022=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2022=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2022=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2022=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2022=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2022=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2022=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2022=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2022=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2022=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2022=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2022=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2022=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2022=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2022=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2022=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2022=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * openSUSE Leap 15.4 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-openSUSE-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * openSUSE Leap Micro 5.3 (noarch) * chrony-pool-suse-4.1-150400.21.5.7 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * openSUSE Leap Micro 5.4 (noarch) * chrony-pool-suse-4.1-150400.21.5.7 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * openSUSE Leap 15.5 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-openSUSE-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * openSUSE Leap 15.6 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-openSUSE-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Linux Enterprise Micro 5.3 (noarch) * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Linux Enterprise Micro 5.4 (noarch) * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Linux Enterprise Micro 5.5 (noarch) * chrony-pool-suse-4.1-150400.21.5.7 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * Basesystem Module 15-SP5 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * Basesystem Module 15-SP6 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Manager Proxy 4.3 (x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Manager Proxy 4.3 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Manager Retail Branch Server 4.3 (x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Manager Retail Branch Server 4.3 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * chrony-debugsource-4.1-150400.21.5.7 * chrony-4.1-150400.21.5.7 * chrony-debuginfo-4.1-150400.21.5.7 * SUSE Manager Server 4.3 (noarch) * chrony-pool-empty-4.1-150400.21.5.7 * chrony-pool-suse-4.1-150400.21.5.7 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 16:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 16:30:20 -0000 Subject: SUSE-RU-2024:2021-1: moderate: Recommended update for iputils Message-ID: <171829622022.16689.5554679079106721913@smelt2.prg2.suse.org> # Recommended update for iputils Announcement ID: SUSE-RU-2024:2021-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for iputils fixes the following issue: * After upstream merged the fix, update git commit hashes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2021=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2021=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2021=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2021=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2021=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2021=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2021=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-2021=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2021=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * iputils-debugsource-20211215-150400.3.11.1 * iputils-20211215-150400.3.11.1 * rarpd-debuginfo-20211215-150400.3.11.1 * iputils-debuginfo-20211215-150400.3.11.1 * rarpd-20211215-150400.3.11.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * iputils-debuginfo-20211215-150400.3.11.1 * iputils-debugsource-20211215-150400.3.11.1 * iputils-20211215-150400.3.11.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.11.1 * iputils-debugsource-20211215-150400.3.11.1 * iputils-20211215-150400.3.11.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.11.1 * iputils-debugsource-20211215-150400.3.11.1 * iputils-20211215-150400.3.11.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.11.1 * iputils-debugsource-20211215-150400.3.11.1 * iputils-20211215-150400.3.11.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.11.1 * iputils-debugsource-20211215-150400.3.11.1 * iputils-20211215-150400.3.11.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.11.1 * iputils-debugsource-20211215-150400.3.11.1 * iputils-20211215-150400.3.11.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rarpd-20211215-150400.3.11.1 * iputils-debuginfo-20211215-150400.3.11.1 * rarpd-debuginfo-20211215-150400.3.11.1 * iputils-debugsource-20211215-150400.3.11.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * rarpd-20211215-150400.3.11.1 * iputils-debuginfo-20211215-150400.3.11.1 * rarpd-debuginfo-20211215-150400.3.11.1 * iputils-debugsource-20211215-150400.3.11.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 13 20:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 13 Jun 2024 20:30:01 -0000 Subject: SUSE-RU-2024:1841-2: moderate: Recommended update for elemental-operator, elemental-operator-crds-helm, elemental-operator-helm, elemental-operator1.5, elemental-operator1.5-crds-helm, elemental-operator1.5-helm, operator-image, op Message-ID: <171831060127.21561.4049582260908393756@smelt2.prg2.suse.org> # Recommended update for elemental-operator, elemental-operator-crds-helm, elemental-operator-helm, elemental-operator1.5, elemental-operator1.5-crds-helm, elemental-operator1.5-helm, operator-image, op Announcement ID: SUSE-RU-2024:1841-2 Rating: moderate References: Affected Products: * SUSE Linux Enterprise Micro for Rancher 5.5 An update that can now be installed. ## Description: This update for elemental-operator, elemental-operator-crds-helm, elemental- operator-helm, elemental-operator1.5, elemental-operator1.5-crds-helm, elemental-operator1.5-helm, operator-image, operator-image1.5, seedimage-builder contains the following fixes: Changes in elemental-operator: \- Update to version 1.4.4: * Added the ability to create a node reset marker for unmanaged hosts Changes in elemental-operator-crds-helm, elemental-operator-helm, operator- image, seedimage-builder: \- Update to version 1.4.4 Changes in elemental-operator1.5: \- Update to version 1.5.3: * register: don't send new Disks and Controllers data \- Update to version 1.5.2: * Added the ability to create a node reset marker for unmanaged hosts * seedimage: use ClusterIP Services Changes in elemental-operator1.5-crds-helm, elemental-operator1.5-helm, operator-image1.5: \- Update to version 1.5.3 \- Update to version 1.5.2 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.5 zypper in -t patch SUSE-Elemental-5.5-2024-1841=2 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.5 (x86_64) * elemental-httpfy-1.4.4-150500.3.6.1 * elemental-seedimage-hooks1.5-1.5.3-150500.1.8.1 * elemental-operator1.5-1.5.3-150500.1.8.1 * elemental-register1.5-1.5.3-150500.1.8.1 * elemental-support1.5-1.5.3-150500.1.8.1 * elemental-register-1.4.4-150500.3.6.1 * elemental-support-1.4.4-150500.3.6.1 * elemental-operator-1.4.4-150500.3.6.1 * elemental-httpfy1.5-1.5.3-150500.1.8.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 14 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 14 Jun 2024 08:30:03 -0000 Subject: SUSE-SU-2024:2030-1: important: Security update for libaom Message-ID: <171835380354.5356.4049501679186601289@smelt2.prg2.suse.org> # Security update for libaom Announcement ID: SUSE-SU-2024:2030-1 Rating: important References: * bsc#1226020 Cross-References: * CVE-2024-5171 CVSS scores: * CVE-2024-5171 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for libaom fixes the following issues: * CVE-2024-5171: Fixed heap buffer overflow in img_alloc_helper() caused by integer overflow (bsc#1226020). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2030=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2030=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2030=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2030=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2030=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2030=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2030=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libaom0-1.0.0-150200.3.18.1 * libaom-debugsource-1.0.0-150200.3.18.1 * libaom0-debuginfo-1.0.0-150200.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libaom0-1.0.0-150200.3.18.1 * libaom-debugsource-1.0.0-150200.3.18.1 * libaom0-debuginfo-1.0.0-150200.3.18.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libaom0-1.0.0-150200.3.18.1 * libaom-debugsource-1.0.0-150200.3.18.1 * libaom0-debuginfo-1.0.0-150200.3.18.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libaom0-1.0.0-150200.3.18.1 * libaom-debugsource-1.0.0-150200.3.18.1 * libaom0-debuginfo-1.0.0-150200.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libaom0-1.0.0-150200.3.18.1 * libaom-debugsource-1.0.0-150200.3.18.1 * libaom0-debuginfo-1.0.0-150200.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libaom0-1.0.0-150200.3.18.1 * libaom-debugsource-1.0.0-150200.3.18.1 * libaom0-debuginfo-1.0.0-150200.3.18.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libaom0-1.0.0-150200.3.18.1 * libaom-debugsource-1.0.0-150200.3.18.1 * libaom0-debuginfo-1.0.0-150200.3.18.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5171.html * https://bugzilla.suse.com/show_bug.cgi?id=1226020 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 14 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 14 Jun 2024 12:30:02 -0000 Subject: SUSE-RU-2024:1566-2: moderate: Recommended update for catatonit Message-ID: <171836820232.10273.3736046803150395667@smelt2.prg2.suse.org> # Recommended update for catatonit Announcement ID: SUSE-RU-2024:1566-2 Rating: moderate References: Affected Products: * Containers Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for catatonit fixes the following issues: * Update to catatonit v0.2.0 * Change license to GPL-2.0-or-later ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1566=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-1566=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * catatonit-debuginfo-0.2.0-150500.3.3.1 * catatonit-0.2.0-150500.3.3.1 * catatonit-debugsource-0.2.0-150500.3.3.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * catatonit-debuginfo-0.2.0-150500.3.3.1 * catatonit-0.2.0-150500.3.3.1 * catatonit-debugsource-0.2.0-150500.3.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 14 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 14 Jun 2024 12:30:03 -0000 Subject: SUSE-SU-2024:2031-1: important: Security update for podman Message-ID: <171836820393.10273.2283858350492101842@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2024:2031-1 Rating: important References: * bsc#1224122 * bsc#1226136 Cross-References: * CVE-2024-24786 * CVE-2024-3727 CVSS scores: * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * Containers Module 15-SP5 * Containers Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * Update to version 4.9.5 * CVE-2024-3727: Fixed a flaw that allowed attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks. (bsc#1224122) * CVE-2024-24786: Fixed an infinite loop in protojson. (bsc#1226136) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2031=1 openSUSE-SLE-15.5-2024-2031=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2031=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2031=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-2031=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-2031=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * podmansh-4.9.5-150500.3.12.1 * podman-4.9.5-150500.3.12.1 * podman-debuginfo-4.9.5-150500.3.12.1 * podman-remote-debuginfo-4.9.5-150500.3.12.1 * podman-remote-4.9.5-150500.3.12.1 * openSUSE Leap 15.5 (noarch) * podman-docker-4.9.5-150500.3.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * podmansh-4.9.5-150500.3.12.1 * podman-4.9.5-150500.3.12.1 * podman-debuginfo-4.9.5-150500.3.12.1 * podman-remote-debuginfo-4.9.5-150500.3.12.1 * podman-remote-4.9.5-150500.3.12.1 * openSUSE Leap 15.6 (noarch) * podman-docker-4.9.5-150500.3.12.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * podmansh-4.9.5-150500.3.12.1 * podman-4.9.5-150500.3.12.1 * podman-debuginfo-4.9.5-150500.3.12.1 * podman-remote-debuginfo-4.9.5-150500.3.12.1 * podman-remote-4.9.5-150500.3.12.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * podman-docker-4.9.5-150500.3.12.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * podmansh-4.9.5-150500.3.12.1 * podman-4.9.5-150500.3.12.1 * podman-debuginfo-4.9.5-150500.3.12.1 * podman-remote-debuginfo-4.9.5-150500.3.12.1 * podman-remote-4.9.5-150500.3.12.1 * Containers Module 15-SP5 (noarch) * podman-docker-4.9.5-150500.3.12.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * podmansh-4.9.5-150500.3.12.1 * podman-4.9.5-150500.3.12.1 * podman-debuginfo-4.9.5-150500.3.12.1 * podman-remote-debuginfo-4.9.5-150500.3.12.1 * podman-remote-4.9.5-150500.3.12.1 * Containers Module 15-SP6 (noarch) * podman-docker-4.9.5-150500.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2024-24786.html * https://www.suse.com/security/cve/CVE-2024-3727.html * https://bugzilla.suse.com/show_bug.cgi?id=1224122 * https://bugzilla.suse.com/show_bug.cgi?id=1226136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 14 16:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 14 Jun 2024 16:30:01 -0000 Subject: SUSE-SU-2024:2032-1: moderate: Security update for mariadb Message-ID: <171838260177.13142.7306129892544656315@smelt2.prg2.suse.org> # Security update for mariadb Announcement ID: SUSE-SU-2024:2032-1 Rating: moderate References: * bsc#1225983 Cross-References: * CVE-2024-21096 CVSS scores: * CVE-2024-21096 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * Galera for Ericsson 15 SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for mariadb fixes the following issues: * CVE-2024-21096: Fixed mysqldump unspecified vulnerability (bsc#1225983). * Update to 10.11.8. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2032=1 openSUSE-SLE-15.6-2024-2032=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2032=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2032=1 * Galera for Ericsson 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-ERICSSON-2024-2032=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * mariadb-rpm-macros-10.11.8-150600.4.3.1 * mariadb-tools-10.11.8-150600.4.3.1 * mariadb-tools-debuginfo-10.11.8-150600.4.3.1 * mariadb-bench-debuginfo-10.11.8-150600.4.3.1 * mariadb-test-10.11.8-150600.4.3.1 * mariadb-10.11.8-150600.4.3.1 * mariadb-debuginfo-10.11.8-150600.4.3.1 * mariadb-test-debuginfo-10.11.8-150600.4.3.1 * libmariadbd-devel-10.11.8-150600.4.3.1 * mariadb-client-debuginfo-10.11.8-150600.4.3.1 * mariadb-galera-10.11.8-150600.4.3.1 * mariadb-client-10.11.8-150600.4.3.1 * mariadb-bench-10.11.8-150600.4.3.1 * mariadb-debugsource-10.11.8-150600.4.3.1 * libmariadbd19-10.11.8-150600.4.3.1 * libmariadbd19-debuginfo-10.11.8-150600.4.3.1 * openSUSE Leap 15.6 (noarch) * mariadb-errormessages-10.11.8-150600.4.3.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * mariadb-debuginfo-10.11.8-150600.4.3.1 * mariadb-debugsource-10.11.8-150600.4.3.1 * mariadb-galera-10.11.8-150600.4.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * mariadb-tools-10.11.8-150600.4.3.1 * mariadb-tools-debuginfo-10.11.8-150600.4.3.1 * mariadb-10.11.8-150600.4.3.1 * mariadb-debuginfo-10.11.8-150600.4.3.1 * libmariadbd-devel-10.11.8-150600.4.3.1 * mariadb-client-debuginfo-10.11.8-150600.4.3.1 * mariadb-client-10.11.8-150600.4.3.1 * mariadb-debugsource-10.11.8-150600.4.3.1 * libmariadbd19-10.11.8-150600.4.3.1 * libmariadbd19-debuginfo-10.11.8-150600.4.3.1 * Server Applications Module 15-SP6 (noarch) * mariadb-errormessages-10.11.8-150600.4.3.1 * Galera for Ericsson 15 SP6 (x86_64) * mariadb-debuginfo-10.11.8-150600.4.3.1 * mariadb-debugsource-10.11.8-150600.4.3.1 * mariadb-galera-10.11.8-150600.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21096.html * https://bugzilla.suse.com/show_bug.cgi?id=1225983 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 08:30:02 -0000 Subject: SUSE-RU-2024:2044-1: moderate: Recommended update for netavark Message-ID: <171861300239.20155.14048704765156535111@smelt2.prg2.suse.org> # Recommended update for netavark Announcement ID: SUSE-RU-2024:2044-1 Rating: moderate References: * jsc#MSC-800 Affected Products: * Containers Module 15-SP5 * Containers Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains one feature can now be installed. ## Description: This update for netavark and aardvark-dns fixes the following issues: * Update to version 1.11.0 * Remove redundant source: cargo_config ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2044=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-2044=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-2044=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2044=1 openSUSE-SLE-15.5-2024-2044=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2044=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * netavark-1.11.0-150500.3.6.1 * aardvark-dns-1.11.0-150500.3.6.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * netavark-1.11.0-150500.3.6.1 * aardvark-dns-1.11.0-150500.3.6.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * netavark-1.11.0-150500.3.6.1 * aardvark-dns-1.11.0-150500.3.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * netavark-1.11.0-150500.3.6.1 * aardvark-dns-1.11.0-150500.3.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * netavark-1.11.0-150500.3.6.1 * aardvark-dns-1.11.0-150500.3.6.1 ## References: * https://jira.suse.com/browse/MSC-800 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 08:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 08:30:05 -0000 Subject: SUSE-SU-2024:2043-1: important: Security update for webkit2gtk3 Message-ID: <171861300525.20155.15520775472242187514@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:2043-1 Rating: important References: * bsc#1222905 * bsc#1225071 Cross-References: * CVE-2024-23226 * CVE-2024-27834 CVSS scores: * CVE-2024-23226 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-27834 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * Update to version 2.44.2 * CVE-2024-27834: Fixed a vulnerability where an attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. (bsc#1225071) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2043=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2043=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2043=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2043=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2043=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2043=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2043=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150200.112.1 * webkit2gtk3-debugsource-2.44.2-150200.112.1 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150200.112.1 * typelib-1_0-WebKit2-4_0-2.44.2-150200.112.1 * libjavascriptcoregtk-4_0-18-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-2.44.2-150200.112.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-2.44.2-150200.112.1 * webkit2gtk3-devel-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150200.112.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * libwebkit2gtk3-lang-2.44.2-150200.112.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150200.112.1 * webkit2gtk3-debugsource-2.44.2-150200.112.1 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150200.112.1 * typelib-1_0-WebKit2-4_0-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-2.44.2-150200.112.1 * libjavascriptcoregtk-4_0-18-2.44.2-150200.112.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-2.44.2-150200.112.1 * webkit2gtk3-devel-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150200.112.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * libwebkit2gtk3-lang-2.44.2-150200.112.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150200.112.1 * webkit2gtk3-debugsource-2.44.2-150200.112.1 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150200.112.1 * typelib-1_0-WebKit2-4_0-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-2.44.2-150200.112.1 * libjavascriptcoregtk-4_0-18-2.44.2-150200.112.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-2.44.2-150200.112.1 * webkit2gtk3-devel-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150200.112.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * libwebkit2gtk3-lang-2.44.2-150200.112.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150200.112.1 * webkit2gtk3-debugsource-2.44.2-150200.112.1 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150200.112.1 * typelib-1_0-WebKit2-4_0-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-2.44.2-150200.112.1 * libjavascriptcoregtk-4_0-18-2.44.2-150200.112.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-2.44.2-150200.112.1 * webkit2gtk3-devel-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150200.112.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * libwebkit2gtk3-lang-2.44.2-150200.112.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150200.112.1 * webkit2gtk3-debugsource-2.44.2-150200.112.1 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150200.112.1 * typelib-1_0-WebKit2-4_0-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-2.44.2-150200.112.1 * libjavascriptcoregtk-4_0-18-2.44.2-150200.112.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-2.44.2-150200.112.1 * webkit2gtk3-devel-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150200.112.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * libwebkit2gtk3-lang-2.44.2-150200.112.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150200.112.1 * webkit2gtk3-debugsource-2.44.2-150200.112.1 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150200.112.1 * typelib-1_0-WebKit2-4_0-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-2.44.2-150200.112.1 * libjavascriptcoregtk-4_0-18-2.44.2-150200.112.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-2.44.2-150200.112.1 * webkit2gtk3-devel-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150200.112.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * libwebkit2gtk3-lang-2.44.2-150200.112.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150200.112.1 * webkit2gtk3-debugsource-2.44.2-150200.112.1 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150200.112.1 * typelib-1_0-WebKit2-4_0-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-2.44.2-150200.112.1 * libjavascriptcoregtk-4_0-18-2.44.2-150200.112.1 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150200.112.1 * webkit2gtk-4_0-injected-bundles-2.44.2-150200.112.1 * webkit2gtk3-devel-2.44.2-150200.112.1 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150200.112.1 * SUSE Enterprise Storage 7.1 (noarch) * libwebkit2gtk3-lang-2.44.2-150200.112.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23226.html * https://www.suse.com/security/cve/CVE-2024-27834.html * https://bugzilla.suse.com/show_bug.cgi?id=1222905 * https://bugzilla.suse.com/show_bug.cgi?id=1225071 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 08:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 08:30:07 -0000 Subject: SUSE-SU-2024:2042-1: important: Security update for booth Message-ID: <171861300710.20155.4388101067532280766@smelt2.prg2.suse.org> # Security update for booth Announcement ID: SUSE-SU-2024:2042-1 Rating: important References: * bsc#1226032 Cross-References: * CVE-2024-3049 CVSS scores: * CVE-2024-3049 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-3049 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for booth fixes the following issues: * CVE-2024-3049: Fixed a vulnerability where a specially crafted hash can lead to invalid HMAC being accepted by Booth server. (bsc#1226032) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2042=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-2042=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * booth-1.0+20210519.bfb2f92-150400.3.6.1 * booth-debuginfo-1.0+20210519.bfb2f92-150400.3.6.1 * booth-debugsource-1.0+20210519.bfb2f92-150400.3.6.1 * booth-test-1.0+20210519.bfb2f92-150400.3.6.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * booth-1.0+20210519.bfb2f92-150400.3.6.1 * booth-debuginfo-1.0+20210519.bfb2f92-150400.3.6.1 * booth-debugsource-1.0+20210519.bfb2f92-150400.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-3049.html * https://bugzilla.suse.com/show_bug.cgi?id=1226032 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 08:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 08:30:09 -0000 Subject: SUSE-SU-2024:2041-1: important: Security update for booth Message-ID: <171861300960.20155.17881618495695016324@smelt2.prg2.suse.org> # Security update for booth Announcement ID: SUSE-SU-2024:2041-1 Rating: important References: * bsc#1226032 Cross-References: * CVE-2024-3049 CVSS scores: * CVE-2024-3049 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-3049 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Proxy 4.1 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Server 4.1 An update that solves one vulnerability can now be installed. ## Description: This update for booth fixes the following issues: * CVE-2024-3049: Fixed a vulnerability where a specially crafted hash can lead to invalid HMAC being accepted by Booth server. (bsc#1226032) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-2041=1 ## Package List: * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * booth-debugsource-1.0-150100.11.6.1 * booth-debuginfo-1.0-150100.11.6.1 * booth-1.0-150100.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-3049.html * https://bugzilla.suse.com/show_bug.cgi?id=1226032 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 08:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 08:30:12 -0000 Subject: SUSE-SU-2024:2040-1: important: Security update for booth Message-ID: <171861301257.20155.15551049816784632160@smelt2.prg2.suse.org> # Security update for booth Announcement ID: SUSE-SU-2024:2040-1 Rating: important References: * bsc#1226032 Cross-References: * CVE-2024-3049 CVSS scores: * CVE-2024-3049 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-3049 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for booth fixes the following issues: * CVE-2024-3049: Fixed a vulnerability where a specially crafted hash can lead to invalid HMAC being accepted by Booth server. (bsc#1226032) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2040=1 openSUSE-SLE-15.6-2024-2040=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-2040=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * booth-debugsource-1.1+git0.09b0074-150600.3.3.1 * booth-debuginfo-1.1+git0.09b0074-150600.3.3.1 * booth-1.1+git0.09b0074-150600.3.3.1 * booth-test-1.1+git0.09b0074-150600.3.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * booth-debugsource-1.1+git0.09b0074-150600.3.3.1 * booth-debuginfo-1.1+git0.09b0074-150600.3.3.1 * booth-1.1+git0.09b0074-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-3049.html * https://bugzilla.suse.com/show_bug.cgi?id=1226032 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 08:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 08:30:16 -0000 Subject: SUSE-SU-2024:2039-1: important: Security update for php8 Message-ID: <171861301629.20155.11905046712269643774@smelt2.prg2.suse.org> # Security update for php8 Announcement ID: SUSE-SU-2024:2039-1 Rating: important References: * bsc#1226073 Cross-References: * CVE-2024-5458 CVSS scores: * CVE-2024-5458 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-5458 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for php8 fixes the following issues: * CVE-2024-5458: Fixed an issue that allows to bypass filters in filter_var FILTER_VALIDATE_URL. (bsc#1226073) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2039=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2039=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-2039=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2039=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2039=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2039=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2039=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2039=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * php8-sysvmsg-8.0.30-150400.4.43.1 * php8-xmlwriter-8.0.30-150400.4.43.1 * php8-openssl-8.0.30-150400.4.43.1 * php8-gd-8.0.30-150400.4.43.1 * php8-xsl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debuginfo-8.0.30-150400.4.43.1 * php8-zlib-8.0.30-150400.4.43.1 * php8-ldap-8.0.30-150400.4.43.1 * php8-debugsource-8.0.30-150400.4.43.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-8.0.30-150400.4.43.1 * php8-gettext-debuginfo-8.0.30-150400.4.43.1 * php8-tidy-8.0.30-150400.4.43.1 * php8-dom-8.0.30-150400.4.43.1 * php8-xmlreader-8.0.30-150400.4.43.1 * php8-curl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-8.0.30-150400.4.43.1 * php8-openssl-debuginfo-8.0.30-150400.4.43.1 * php8-sockets-8.0.30-150400.4.43.1 * php8-curl-8.0.30-150400.4.43.1 * php8-posix-8.0.30-150400.4.43.1 * php8-debuginfo-8.0.30-150400.4.43.1 * php8-fileinfo-8.0.30-150400.4.43.1 * php8-cli-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-8.0.30-150400.4.43.1 * php8-opcache-8.0.30-150400.4.43.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.43.1 * php8-dba-debuginfo-8.0.30-150400.4.43.1 * php8-tokenizer-8.0.30-150400.4.43.1 * php8-pcntl-debuginfo-8.0.30-150400.4.43.1 * php8-8.0.30-150400.4.43.1 * php8-calendar-8.0.30-150400.4.43.1 * php8-sysvshm-8.0.30-150400.4.43.1 * php8-pcntl-8.0.30-150400.4.43.1 * php8-zlib-debuginfo-8.0.30-150400.4.43.1 * php8-zip-8.0.30-150400.4.43.1 * php8-ftp-debuginfo-8.0.30-150400.4.43.1 * php8-iconv-debuginfo-8.0.30-150400.4.43.1 * php8-soap-8.0.30-150400.4.43.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.43.1 * php8-exif-8.0.30-150400.4.43.1 * php8-embed-8.0.30-150400.4.43.1 * php8-sodium-8.0.30-150400.4.43.1 * php8-intl-debuginfo-8.0.30-150400.4.43.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1 * php8-pgsql-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-debuginfo-8.0.30-150400.4.43.1 * php8-soap-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-8.0.30-150400.4.43.1 * php8-readline-debuginfo-8.0.30-150400.4.43.1 * php8-devel-8.0.30-150400.4.43.1 * php8-ldap-debuginfo-8.0.30-150400.4.43.1 * php8-zip-debuginfo-8.0.30-150400.4.43.1 * php8-gd-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-8.0.30-150400.4.43.1 * php8-dba-8.0.30-150400.4.43.1 * php8-enchant-8.0.30-150400.4.43.1 * php8-fpm-debuginfo-8.0.30-150400.4.43.1 * php8-sqlite-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.43.1 * php8-bz2-debuginfo-8.0.30-150400.4.43.1 * php8-test-8.0.30-150400.4.43.1 * php8-iconv-8.0.30-150400.4.43.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1 * php8-shmop-debuginfo-8.0.30-150400.4.43.1 * php8-enchant-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-debuginfo-8.0.30-150400.4.43.1 * php8-snmp-8.0.30-150400.4.43.1 * php8-tidy-debuginfo-8.0.30-150400.4.43.1 * php8-odbc-debuginfo-8.0.30-150400.4.43.1 * php8-phar-8.0.30-150400.4.43.1 * php8-snmp-debuginfo-8.0.30-150400.4.43.1 * php8-bcmath-8.0.30-150400.4.43.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-8.0.30-150400.4.43.1 * php8-sqlite-8.0.30-150400.4.43.1 * php8-fpm-8.0.30-150400.4.43.1 * php8-readline-8.0.30-150400.4.43.1 * php8-cli-8.0.30-150400.4.43.1 * php8-dom-debuginfo-8.0.30-150400.4.43.1 * php8-sysvsem-8.0.30-150400.4.43.1 * php8-posix-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-8.0.30-150400.4.43.1 * php8-exif-debuginfo-8.0.30-150400.4.43.1 * php8-calendar-debuginfo-8.0.30-150400.4.43.1 * php8-fpm-debugsource-8.0.30-150400.4.43.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debugsource-8.0.30-150400.4.43.1 * php8-shmop-8.0.30-150400.4.43.1 * php8-sockets-debuginfo-8.0.30-150400.4.43.1 * php8-xsl-8.0.30-150400.4.43.1 * php8-bcmath-debuginfo-8.0.30-150400.4.43.1 * php8-intl-8.0.30-150400.4.43.1 * php8-odbc-8.0.30-150400.4.43.1 * php8-bz2-8.0.30-150400.4.43.1 * php8-opcache-debuginfo-8.0.30-150400.4.43.1 * php8-gettext-8.0.30-150400.4.43.1 * php8-pgsql-8.0.30-150400.4.43.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.43.1 * php8-sodium-debuginfo-8.0.30-150400.4.43.1 * php8-phar-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debugsource-8.0.30-150400.4.43.1 * php8-ftp-8.0.30-150400.4.43.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * php8-sysvmsg-8.0.30-150400.4.43.1 * php8-xmlwriter-8.0.30-150400.4.43.1 * php8-openssl-8.0.30-150400.4.43.1 * php8-gd-8.0.30-150400.4.43.1 * php8-xsl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debuginfo-8.0.30-150400.4.43.1 * php8-zlib-8.0.30-150400.4.43.1 * php8-ldap-8.0.30-150400.4.43.1 * php8-debugsource-8.0.30-150400.4.43.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-8.0.30-150400.4.43.1 * php8-gettext-debuginfo-8.0.30-150400.4.43.1 * php8-tidy-8.0.30-150400.4.43.1 * php8-dom-8.0.30-150400.4.43.1 * php8-xmlreader-8.0.30-150400.4.43.1 * php8-curl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-8.0.30-150400.4.43.1 * php8-openssl-debuginfo-8.0.30-150400.4.43.1 * php8-sockets-8.0.30-150400.4.43.1 * php8-curl-8.0.30-150400.4.43.1 * php8-posix-8.0.30-150400.4.43.1 * php8-debuginfo-8.0.30-150400.4.43.1 * php8-fileinfo-8.0.30-150400.4.43.1 * php8-cli-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-8.0.30-150400.4.43.1 * php8-opcache-8.0.30-150400.4.43.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.43.1 * php8-dba-debuginfo-8.0.30-150400.4.43.1 * php8-pcntl-debuginfo-8.0.30-150400.4.43.1 * php8-8.0.30-150400.4.43.1 * php8-calendar-8.0.30-150400.4.43.1 * php8-tokenizer-8.0.30-150400.4.43.1 * php8-sysvshm-8.0.30-150400.4.43.1 * php8-pcntl-8.0.30-150400.4.43.1 * php8-zlib-debuginfo-8.0.30-150400.4.43.1 * php8-zip-8.0.30-150400.4.43.1 * php8-ftp-debuginfo-8.0.30-150400.4.43.1 * php8-iconv-debuginfo-8.0.30-150400.4.43.1 * php8-soap-8.0.30-150400.4.43.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-8.0.30-150400.4.43.1 * php8-exif-8.0.30-150400.4.43.1 * php8-sodium-8.0.30-150400.4.43.1 * php8-intl-debuginfo-8.0.30-150400.4.43.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1 * php8-pgsql-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-debuginfo-8.0.30-150400.4.43.1 * php8-soap-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-8.0.30-150400.4.43.1 * php8-readline-debuginfo-8.0.30-150400.4.43.1 * php8-devel-8.0.30-150400.4.43.1 * php8-ldap-debuginfo-8.0.30-150400.4.43.1 * php8-zip-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-8.0.30-150400.4.43.1 * php8-gd-debuginfo-8.0.30-150400.4.43.1 * php8-dba-8.0.30-150400.4.43.1 * php8-enchant-8.0.30-150400.4.43.1 * php8-fpm-debuginfo-8.0.30-150400.4.43.1 * php8-sqlite-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.43.1 * php8-bz2-debuginfo-8.0.30-150400.4.43.1 * php8-test-8.0.30-150400.4.43.1 * php8-iconv-8.0.30-150400.4.43.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1 * php8-shmop-debuginfo-8.0.30-150400.4.43.1 * php8-enchant-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-debuginfo-8.0.30-150400.4.43.1 * php8-snmp-8.0.30-150400.4.43.1 * php8-tidy-debuginfo-8.0.30-150400.4.43.1 * php8-odbc-debuginfo-8.0.30-150400.4.43.1 * php8-phar-8.0.30-150400.4.43.1 * php8-snmp-debuginfo-8.0.30-150400.4.43.1 * php8-bcmath-8.0.30-150400.4.43.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-8.0.30-150400.4.43.1 * php8-sqlite-8.0.30-150400.4.43.1 * php8-fpm-8.0.30-150400.4.43.1 * php8-readline-8.0.30-150400.4.43.1 * php8-cli-8.0.30-150400.4.43.1 * php8-dom-debuginfo-8.0.30-150400.4.43.1 * php8-sysvsem-8.0.30-150400.4.43.1 * php8-posix-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-8.0.30-150400.4.43.1 * php8-exif-debuginfo-8.0.30-150400.4.43.1 * php8-calendar-debuginfo-8.0.30-150400.4.43.1 * php8-fpm-debugsource-8.0.30-150400.4.43.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debugsource-8.0.30-150400.4.43.1 * php8-shmop-8.0.30-150400.4.43.1 * php8-sockets-debuginfo-8.0.30-150400.4.43.1 * php8-xsl-8.0.30-150400.4.43.1 * php8-bcmath-debuginfo-8.0.30-150400.4.43.1 * php8-intl-8.0.30-150400.4.43.1 * php8-odbc-8.0.30-150400.4.43.1 * php8-bz2-8.0.30-150400.4.43.1 * php8-opcache-debuginfo-8.0.30-150400.4.43.1 * php8-gettext-8.0.30-150400.4.43.1 * php8-pgsql-8.0.30-150400.4.43.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.43.1 * php8-sodium-debuginfo-8.0.30-150400.4.43.1 * php8-phar-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debugsource-8.0.30-150400.4.43.1 * php8-ftp-8.0.30-150400.4.43.1 * Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64) * php8-sysvmsg-8.0.30-150400.4.43.1 * php8-xmlwriter-8.0.30-150400.4.43.1 * php8-openssl-8.0.30-150400.4.43.1 * php8-gd-8.0.30-150400.4.43.1 * php8-xsl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debuginfo-8.0.30-150400.4.43.1 * php8-zlib-8.0.30-150400.4.43.1 * php8-ldap-8.0.30-150400.4.43.1 * php8-debugsource-8.0.30-150400.4.43.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-8.0.30-150400.4.43.1 * php8-gettext-debuginfo-8.0.30-150400.4.43.1 * php8-tidy-8.0.30-150400.4.43.1 * php8-dom-8.0.30-150400.4.43.1 * php8-xmlreader-8.0.30-150400.4.43.1 * php8-curl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-8.0.30-150400.4.43.1 * php8-openssl-debuginfo-8.0.30-150400.4.43.1 * php8-sockets-8.0.30-150400.4.43.1 * php8-curl-8.0.30-150400.4.43.1 * php8-posix-8.0.30-150400.4.43.1 * php8-debuginfo-8.0.30-150400.4.43.1 * php8-fileinfo-8.0.30-150400.4.43.1 * php8-cli-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-8.0.30-150400.4.43.1 * php8-opcache-8.0.30-150400.4.43.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.43.1 * php8-dba-debuginfo-8.0.30-150400.4.43.1 * php8-pcntl-debuginfo-8.0.30-150400.4.43.1 * php8-8.0.30-150400.4.43.1 * php8-calendar-8.0.30-150400.4.43.1 * php8-tokenizer-8.0.30-150400.4.43.1 * php8-sysvshm-8.0.30-150400.4.43.1 * php8-pcntl-8.0.30-150400.4.43.1 * php8-zlib-debuginfo-8.0.30-150400.4.43.1 * php8-zip-8.0.30-150400.4.43.1 * php8-ftp-debuginfo-8.0.30-150400.4.43.1 * php8-iconv-debuginfo-8.0.30-150400.4.43.1 * php8-soap-8.0.30-150400.4.43.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-8.0.30-150400.4.43.1 * php8-exif-8.0.30-150400.4.43.1 * php8-sodium-8.0.30-150400.4.43.1 * php8-intl-debuginfo-8.0.30-150400.4.43.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1 * php8-pgsql-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-debuginfo-8.0.30-150400.4.43.1 * php8-soap-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-8.0.30-150400.4.43.1 * php8-readline-debuginfo-8.0.30-150400.4.43.1 * php8-devel-8.0.30-150400.4.43.1 * php8-ldap-debuginfo-8.0.30-150400.4.43.1 * php8-zip-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-8.0.30-150400.4.43.1 * php8-gd-debuginfo-8.0.30-150400.4.43.1 * php8-dba-8.0.30-150400.4.43.1 * php8-enchant-8.0.30-150400.4.43.1 * php8-fpm-debuginfo-8.0.30-150400.4.43.1 * php8-sqlite-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.43.1 * php8-bz2-debuginfo-8.0.30-150400.4.43.1 * php8-test-8.0.30-150400.4.43.1 * php8-iconv-8.0.30-150400.4.43.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1 * php8-shmop-debuginfo-8.0.30-150400.4.43.1 * php8-enchant-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-debuginfo-8.0.30-150400.4.43.1 * php8-snmp-8.0.30-150400.4.43.1 * php8-tidy-debuginfo-8.0.30-150400.4.43.1 * php8-odbc-debuginfo-8.0.30-150400.4.43.1 * php8-phar-8.0.30-150400.4.43.1 * php8-snmp-debuginfo-8.0.30-150400.4.43.1 * php8-bcmath-8.0.30-150400.4.43.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-8.0.30-150400.4.43.1 * php8-sqlite-8.0.30-150400.4.43.1 * php8-fpm-8.0.30-150400.4.43.1 * php8-readline-8.0.30-150400.4.43.1 * php8-cli-8.0.30-150400.4.43.1 * php8-dom-debuginfo-8.0.30-150400.4.43.1 * php8-sysvsem-8.0.30-150400.4.43.1 * php8-posix-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-8.0.30-150400.4.43.1 * php8-exif-debuginfo-8.0.30-150400.4.43.1 * php8-calendar-debuginfo-8.0.30-150400.4.43.1 * php8-fpm-debugsource-8.0.30-150400.4.43.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debugsource-8.0.30-150400.4.43.1 * php8-shmop-8.0.30-150400.4.43.1 * php8-sockets-debuginfo-8.0.30-150400.4.43.1 * php8-xsl-8.0.30-150400.4.43.1 * php8-bcmath-debuginfo-8.0.30-150400.4.43.1 * php8-intl-8.0.30-150400.4.43.1 * php8-odbc-8.0.30-150400.4.43.1 * php8-bz2-8.0.30-150400.4.43.1 * php8-opcache-debuginfo-8.0.30-150400.4.43.1 * php8-gettext-8.0.30-150400.4.43.1 * php8-pgsql-8.0.30-150400.4.43.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.43.1 * php8-sodium-debuginfo-8.0.30-150400.4.43.1 * php8-phar-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debugsource-8.0.30-150400.4.43.1 * php8-ftp-8.0.30-150400.4.43.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * php8-sysvmsg-8.0.30-150400.4.43.1 * php8-xmlwriter-8.0.30-150400.4.43.1 * php8-openssl-8.0.30-150400.4.43.1 * php8-gd-8.0.30-150400.4.43.1 * php8-xsl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debuginfo-8.0.30-150400.4.43.1 * php8-zlib-8.0.30-150400.4.43.1 * php8-ldap-8.0.30-150400.4.43.1 * php8-debugsource-8.0.30-150400.4.43.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-8.0.30-150400.4.43.1 * php8-gettext-debuginfo-8.0.30-150400.4.43.1 * php8-tidy-8.0.30-150400.4.43.1 * php8-dom-8.0.30-150400.4.43.1 * php8-xmlreader-8.0.30-150400.4.43.1 * php8-curl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-8.0.30-150400.4.43.1 * php8-openssl-debuginfo-8.0.30-150400.4.43.1 * php8-sockets-8.0.30-150400.4.43.1 * php8-curl-8.0.30-150400.4.43.1 * php8-posix-8.0.30-150400.4.43.1 * php8-debuginfo-8.0.30-150400.4.43.1 * php8-fileinfo-8.0.30-150400.4.43.1 * php8-cli-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-8.0.30-150400.4.43.1 * php8-opcache-8.0.30-150400.4.43.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.43.1 * php8-dba-debuginfo-8.0.30-150400.4.43.1 * php8-pcntl-debuginfo-8.0.30-150400.4.43.1 * php8-8.0.30-150400.4.43.1 * php8-calendar-8.0.30-150400.4.43.1 * php8-tokenizer-8.0.30-150400.4.43.1 * php8-sysvshm-8.0.30-150400.4.43.1 * php8-pcntl-8.0.30-150400.4.43.1 * php8-zlib-debuginfo-8.0.30-150400.4.43.1 * php8-zip-8.0.30-150400.4.43.1 * php8-ftp-debuginfo-8.0.30-150400.4.43.1 * php8-iconv-debuginfo-8.0.30-150400.4.43.1 * php8-soap-8.0.30-150400.4.43.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-8.0.30-150400.4.43.1 * php8-exif-8.0.30-150400.4.43.1 * php8-sodium-8.0.30-150400.4.43.1 * php8-intl-debuginfo-8.0.30-150400.4.43.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1 * php8-pgsql-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-debuginfo-8.0.30-150400.4.43.1 * php8-soap-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-8.0.30-150400.4.43.1 * php8-readline-debuginfo-8.0.30-150400.4.43.1 * php8-devel-8.0.30-150400.4.43.1 * php8-ldap-debuginfo-8.0.30-150400.4.43.1 * php8-zip-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-8.0.30-150400.4.43.1 * php8-gd-debuginfo-8.0.30-150400.4.43.1 * php8-dba-8.0.30-150400.4.43.1 * php8-enchant-8.0.30-150400.4.43.1 * php8-fpm-debuginfo-8.0.30-150400.4.43.1 * php8-sqlite-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.43.1 * php8-bz2-debuginfo-8.0.30-150400.4.43.1 * php8-test-8.0.30-150400.4.43.1 * php8-iconv-8.0.30-150400.4.43.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1 * php8-shmop-debuginfo-8.0.30-150400.4.43.1 * php8-enchant-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-debuginfo-8.0.30-150400.4.43.1 * php8-snmp-8.0.30-150400.4.43.1 * php8-tidy-debuginfo-8.0.30-150400.4.43.1 * php8-odbc-debuginfo-8.0.30-150400.4.43.1 * php8-phar-8.0.30-150400.4.43.1 * php8-snmp-debuginfo-8.0.30-150400.4.43.1 * php8-bcmath-8.0.30-150400.4.43.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-8.0.30-150400.4.43.1 * php8-sqlite-8.0.30-150400.4.43.1 * php8-fpm-8.0.30-150400.4.43.1 * php8-readline-8.0.30-150400.4.43.1 * php8-cli-8.0.30-150400.4.43.1 * php8-dom-debuginfo-8.0.30-150400.4.43.1 * php8-sysvsem-8.0.30-150400.4.43.1 * php8-posix-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-8.0.30-150400.4.43.1 * php8-exif-debuginfo-8.0.30-150400.4.43.1 * php8-calendar-debuginfo-8.0.30-150400.4.43.1 * php8-fpm-debugsource-8.0.30-150400.4.43.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debugsource-8.0.30-150400.4.43.1 * php8-shmop-8.0.30-150400.4.43.1 * php8-sockets-debuginfo-8.0.30-150400.4.43.1 * php8-xsl-8.0.30-150400.4.43.1 * php8-bcmath-debuginfo-8.0.30-150400.4.43.1 * php8-intl-8.0.30-150400.4.43.1 * php8-odbc-8.0.30-150400.4.43.1 * php8-bz2-8.0.30-150400.4.43.1 * php8-opcache-debuginfo-8.0.30-150400.4.43.1 * php8-gettext-8.0.30-150400.4.43.1 * php8-pgsql-8.0.30-150400.4.43.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.43.1 * php8-sodium-debuginfo-8.0.30-150400.4.43.1 * php8-phar-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debugsource-8.0.30-150400.4.43.1 * php8-ftp-8.0.30-150400.4.43.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * php8-sysvmsg-8.0.30-150400.4.43.1 * php8-xmlwriter-8.0.30-150400.4.43.1 * php8-openssl-8.0.30-150400.4.43.1 * php8-gd-8.0.30-150400.4.43.1 * php8-xsl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debuginfo-8.0.30-150400.4.43.1 * php8-zlib-8.0.30-150400.4.43.1 * php8-ldap-8.0.30-150400.4.43.1 * php8-debugsource-8.0.30-150400.4.43.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-8.0.30-150400.4.43.1 * php8-gettext-debuginfo-8.0.30-150400.4.43.1 * php8-tidy-8.0.30-150400.4.43.1 * php8-dom-8.0.30-150400.4.43.1 * php8-xmlreader-8.0.30-150400.4.43.1 * php8-curl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-8.0.30-150400.4.43.1 * php8-openssl-debuginfo-8.0.30-150400.4.43.1 * php8-sockets-8.0.30-150400.4.43.1 * php8-curl-8.0.30-150400.4.43.1 * php8-posix-8.0.30-150400.4.43.1 * php8-debuginfo-8.0.30-150400.4.43.1 * php8-fileinfo-8.0.30-150400.4.43.1 * php8-cli-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-8.0.30-150400.4.43.1 * php8-opcache-8.0.30-150400.4.43.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.43.1 * php8-dba-debuginfo-8.0.30-150400.4.43.1 * php8-pcntl-debuginfo-8.0.30-150400.4.43.1 * php8-8.0.30-150400.4.43.1 * php8-calendar-8.0.30-150400.4.43.1 * php8-tokenizer-8.0.30-150400.4.43.1 * php8-sysvshm-8.0.30-150400.4.43.1 * php8-pcntl-8.0.30-150400.4.43.1 * php8-zlib-debuginfo-8.0.30-150400.4.43.1 * php8-zip-8.0.30-150400.4.43.1 * php8-ftp-debuginfo-8.0.30-150400.4.43.1 * php8-iconv-debuginfo-8.0.30-150400.4.43.1 * php8-soap-8.0.30-150400.4.43.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-8.0.30-150400.4.43.1 * php8-exif-8.0.30-150400.4.43.1 * php8-sodium-8.0.30-150400.4.43.1 * php8-intl-debuginfo-8.0.30-150400.4.43.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1 * php8-pgsql-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-debuginfo-8.0.30-150400.4.43.1 * php8-soap-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-8.0.30-150400.4.43.1 * php8-readline-debuginfo-8.0.30-150400.4.43.1 * php8-devel-8.0.30-150400.4.43.1 * php8-ldap-debuginfo-8.0.30-150400.4.43.1 * php8-zip-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-8.0.30-150400.4.43.1 * php8-gd-debuginfo-8.0.30-150400.4.43.1 * php8-dba-8.0.30-150400.4.43.1 * php8-enchant-8.0.30-150400.4.43.1 * php8-fpm-debuginfo-8.0.30-150400.4.43.1 * php8-sqlite-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.43.1 * php8-bz2-debuginfo-8.0.30-150400.4.43.1 * php8-test-8.0.30-150400.4.43.1 * php8-iconv-8.0.30-150400.4.43.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1 * php8-shmop-debuginfo-8.0.30-150400.4.43.1 * php8-enchant-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-debuginfo-8.0.30-150400.4.43.1 * php8-snmp-8.0.30-150400.4.43.1 * php8-tidy-debuginfo-8.0.30-150400.4.43.1 * php8-odbc-debuginfo-8.0.30-150400.4.43.1 * php8-phar-8.0.30-150400.4.43.1 * php8-snmp-debuginfo-8.0.30-150400.4.43.1 * php8-bcmath-8.0.30-150400.4.43.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-8.0.30-150400.4.43.1 * php8-sqlite-8.0.30-150400.4.43.1 * php8-fpm-8.0.30-150400.4.43.1 * php8-readline-8.0.30-150400.4.43.1 * php8-cli-8.0.30-150400.4.43.1 * php8-dom-debuginfo-8.0.30-150400.4.43.1 * php8-sysvsem-8.0.30-150400.4.43.1 * php8-posix-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-8.0.30-150400.4.43.1 * php8-exif-debuginfo-8.0.30-150400.4.43.1 * php8-calendar-debuginfo-8.0.30-150400.4.43.1 * php8-fpm-debugsource-8.0.30-150400.4.43.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debugsource-8.0.30-150400.4.43.1 * php8-shmop-8.0.30-150400.4.43.1 * php8-sockets-debuginfo-8.0.30-150400.4.43.1 * php8-xsl-8.0.30-150400.4.43.1 * php8-bcmath-debuginfo-8.0.30-150400.4.43.1 * php8-intl-8.0.30-150400.4.43.1 * php8-odbc-8.0.30-150400.4.43.1 * php8-bz2-8.0.30-150400.4.43.1 * php8-opcache-debuginfo-8.0.30-150400.4.43.1 * php8-gettext-8.0.30-150400.4.43.1 * php8-pgsql-8.0.30-150400.4.43.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.43.1 * php8-sodium-debuginfo-8.0.30-150400.4.43.1 * php8-phar-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debugsource-8.0.30-150400.4.43.1 * php8-ftp-8.0.30-150400.4.43.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * php8-sysvmsg-8.0.30-150400.4.43.1 * php8-xmlwriter-8.0.30-150400.4.43.1 * php8-openssl-8.0.30-150400.4.43.1 * php8-gd-8.0.30-150400.4.43.1 * php8-xsl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debuginfo-8.0.30-150400.4.43.1 * php8-zlib-8.0.30-150400.4.43.1 * php8-ldap-8.0.30-150400.4.43.1 * php8-debugsource-8.0.30-150400.4.43.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-8.0.30-150400.4.43.1 * php8-gettext-debuginfo-8.0.30-150400.4.43.1 * php8-tidy-8.0.30-150400.4.43.1 * php8-dom-8.0.30-150400.4.43.1 * php8-xmlreader-8.0.30-150400.4.43.1 * php8-curl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-8.0.30-150400.4.43.1 * php8-openssl-debuginfo-8.0.30-150400.4.43.1 * php8-sockets-8.0.30-150400.4.43.1 * php8-curl-8.0.30-150400.4.43.1 * php8-posix-8.0.30-150400.4.43.1 * php8-debuginfo-8.0.30-150400.4.43.1 * php8-fileinfo-8.0.30-150400.4.43.1 * php8-cli-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-8.0.30-150400.4.43.1 * php8-opcache-8.0.30-150400.4.43.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.43.1 * php8-dba-debuginfo-8.0.30-150400.4.43.1 * php8-pcntl-debuginfo-8.0.30-150400.4.43.1 * php8-8.0.30-150400.4.43.1 * php8-calendar-8.0.30-150400.4.43.1 * php8-tokenizer-8.0.30-150400.4.43.1 * php8-sysvshm-8.0.30-150400.4.43.1 * php8-pcntl-8.0.30-150400.4.43.1 * php8-zlib-debuginfo-8.0.30-150400.4.43.1 * php8-zip-8.0.30-150400.4.43.1 * php8-ftp-debuginfo-8.0.30-150400.4.43.1 * php8-iconv-debuginfo-8.0.30-150400.4.43.1 * php8-soap-8.0.30-150400.4.43.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-8.0.30-150400.4.43.1 * php8-exif-8.0.30-150400.4.43.1 * php8-sodium-8.0.30-150400.4.43.1 * php8-intl-debuginfo-8.0.30-150400.4.43.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1 * php8-pgsql-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-debuginfo-8.0.30-150400.4.43.1 * php8-soap-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-8.0.30-150400.4.43.1 * php8-readline-debuginfo-8.0.30-150400.4.43.1 * php8-devel-8.0.30-150400.4.43.1 * php8-ldap-debuginfo-8.0.30-150400.4.43.1 * php8-zip-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-8.0.30-150400.4.43.1 * php8-gd-debuginfo-8.0.30-150400.4.43.1 * php8-dba-8.0.30-150400.4.43.1 * php8-enchant-8.0.30-150400.4.43.1 * php8-fpm-debuginfo-8.0.30-150400.4.43.1 * php8-sqlite-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.43.1 * php8-bz2-debuginfo-8.0.30-150400.4.43.1 * php8-test-8.0.30-150400.4.43.1 * php8-iconv-8.0.30-150400.4.43.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1 * php8-shmop-debuginfo-8.0.30-150400.4.43.1 * php8-enchant-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-debuginfo-8.0.30-150400.4.43.1 * php8-snmp-8.0.30-150400.4.43.1 * php8-tidy-debuginfo-8.0.30-150400.4.43.1 * php8-odbc-debuginfo-8.0.30-150400.4.43.1 * php8-phar-8.0.30-150400.4.43.1 * php8-snmp-debuginfo-8.0.30-150400.4.43.1 * php8-bcmath-8.0.30-150400.4.43.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-8.0.30-150400.4.43.1 * php8-sqlite-8.0.30-150400.4.43.1 * php8-fpm-8.0.30-150400.4.43.1 * php8-readline-8.0.30-150400.4.43.1 * php8-cli-8.0.30-150400.4.43.1 * php8-dom-debuginfo-8.0.30-150400.4.43.1 * php8-sysvsem-8.0.30-150400.4.43.1 * php8-posix-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-8.0.30-150400.4.43.1 * php8-exif-debuginfo-8.0.30-150400.4.43.1 * php8-calendar-debuginfo-8.0.30-150400.4.43.1 * php8-fpm-debugsource-8.0.30-150400.4.43.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debugsource-8.0.30-150400.4.43.1 * php8-shmop-8.0.30-150400.4.43.1 * php8-sockets-debuginfo-8.0.30-150400.4.43.1 * php8-xsl-8.0.30-150400.4.43.1 * php8-bcmath-debuginfo-8.0.30-150400.4.43.1 * php8-intl-8.0.30-150400.4.43.1 * php8-odbc-8.0.30-150400.4.43.1 * php8-bz2-8.0.30-150400.4.43.1 * php8-opcache-debuginfo-8.0.30-150400.4.43.1 * php8-gettext-8.0.30-150400.4.43.1 * php8-pgsql-8.0.30-150400.4.43.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.43.1 * php8-sodium-debuginfo-8.0.30-150400.4.43.1 * php8-phar-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debugsource-8.0.30-150400.4.43.1 * php8-ftp-8.0.30-150400.4.43.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * php8-sysvmsg-8.0.30-150400.4.43.1 * php8-xmlwriter-8.0.30-150400.4.43.1 * php8-openssl-8.0.30-150400.4.43.1 * php8-gd-8.0.30-150400.4.43.1 * php8-xsl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debuginfo-8.0.30-150400.4.43.1 * php8-zlib-8.0.30-150400.4.43.1 * php8-ldap-8.0.30-150400.4.43.1 * php8-debugsource-8.0.30-150400.4.43.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-8.0.30-150400.4.43.1 * php8-gettext-debuginfo-8.0.30-150400.4.43.1 * php8-tidy-8.0.30-150400.4.43.1 * php8-dom-8.0.30-150400.4.43.1 * php8-xmlreader-8.0.30-150400.4.43.1 * php8-curl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-8.0.30-150400.4.43.1 * php8-openssl-debuginfo-8.0.30-150400.4.43.1 * php8-sockets-8.0.30-150400.4.43.1 * php8-curl-8.0.30-150400.4.43.1 * php8-posix-8.0.30-150400.4.43.1 * php8-debuginfo-8.0.30-150400.4.43.1 * php8-fileinfo-8.0.30-150400.4.43.1 * php8-cli-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-8.0.30-150400.4.43.1 * php8-opcache-8.0.30-150400.4.43.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.43.1 * php8-dba-debuginfo-8.0.30-150400.4.43.1 * php8-pcntl-debuginfo-8.0.30-150400.4.43.1 * php8-8.0.30-150400.4.43.1 * php8-calendar-8.0.30-150400.4.43.1 * php8-tokenizer-8.0.30-150400.4.43.1 * php8-sysvshm-8.0.30-150400.4.43.1 * php8-pcntl-8.0.30-150400.4.43.1 * php8-zlib-debuginfo-8.0.30-150400.4.43.1 * php8-zip-8.0.30-150400.4.43.1 * php8-ftp-debuginfo-8.0.30-150400.4.43.1 * php8-iconv-debuginfo-8.0.30-150400.4.43.1 * php8-soap-8.0.30-150400.4.43.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-8.0.30-150400.4.43.1 * php8-exif-8.0.30-150400.4.43.1 * php8-sodium-8.0.30-150400.4.43.1 * php8-intl-debuginfo-8.0.30-150400.4.43.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1 * php8-pgsql-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-debuginfo-8.0.30-150400.4.43.1 * php8-soap-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-8.0.30-150400.4.43.1 * php8-readline-debuginfo-8.0.30-150400.4.43.1 * php8-devel-8.0.30-150400.4.43.1 * php8-ldap-debuginfo-8.0.30-150400.4.43.1 * php8-zip-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-8.0.30-150400.4.43.1 * php8-gd-debuginfo-8.0.30-150400.4.43.1 * php8-dba-8.0.30-150400.4.43.1 * php8-enchant-8.0.30-150400.4.43.1 * php8-fpm-debuginfo-8.0.30-150400.4.43.1 * php8-sqlite-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.43.1 * php8-bz2-debuginfo-8.0.30-150400.4.43.1 * php8-test-8.0.30-150400.4.43.1 * php8-iconv-8.0.30-150400.4.43.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1 * php8-shmop-debuginfo-8.0.30-150400.4.43.1 * php8-enchant-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-debuginfo-8.0.30-150400.4.43.1 * php8-snmp-8.0.30-150400.4.43.1 * php8-tidy-debuginfo-8.0.30-150400.4.43.1 * php8-odbc-debuginfo-8.0.30-150400.4.43.1 * php8-phar-8.0.30-150400.4.43.1 * php8-snmp-debuginfo-8.0.30-150400.4.43.1 * php8-bcmath-8.0.30-150400.4.43.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-8.0.30-150400.4.43.1 * php8-sqlite-8.0.30-150400.4.43.1 * php8-fpm-8.0.30-150400.4.43.1 * php8-readline-8.0.30-150400.4.43.1 * php8-cli-8.0.30-150400.4.43.1 * php8-dom-debuginfo-8.0.30-150400.4.43.1 * php8-sysvsem-8.0.30-150400.4.43.1 * php8-posix-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-8.0.30-150400.4.43.1 * php8-exif-debuginfo-8.0.30-150400.4.43.1 * php8-calendar-debuginfo-8.0.30-150400.4.43.1 * php8-fpm-debugsource-8.0.30-150400.4.43.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debugsource-8.0.30-150400.4.43.1 * php8-shmop-8.0.30-150400.4.43.1 * php8-sockets-debuginfo-8.0.30-150400.4.43.1 * php8-xsl-8.0.30-150400.4.43.1 * php8-bcmath-debuginfo-8.0.30-150400.4.43.1 * php8-intl-8.0.30-150400.4.43.1 * php8-odbc-8.0.30-150400.4.43.1 * php8-bz2-8.0.30-150400.4.43.1 * php8-opcache-debuginfo-8.0.30-150400.4.43.1 * php8-gettext-8.0.30-150400.4.43.1 * php8-pgsql-8.0.30-150400.4.43.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.43.1 * php8-sodium-debuginfo-8.0.30-150400.4.43.1 * php8-phar-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debugsource-8.0.30-150400.4.43.1 * php8-ftp-8.0.30-150400.4.43.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * php8-sysvmsg-8.0.30-150400.4.43.1 * php8-xmlwriter-8.0.30-150400.4.43.1 * php8-openssl-8.0.30-150400.4.43.1 * php8-gd-8.0.30-150400.4.43.1 * php8-xsl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debuginfo-8.0.30-150400.4.43.1 * php8-zlib-8.0.30-150400.4.43.1 * php8-ldap-8.0.30-150400.4.43.1 * php8-debugsource-8.0.30-150400.4.43.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-8.0.30-150400.4.43.1 * php8-gettext-debuginfo-8.0.30-150400.4.43.1 * php8-tidy-8.0.30-150400.4.43.1 * php8-dom-8.0.30-150400.4.43.1 * php8-xmlreader-8.0.30-150400.4.43.1 * php8-curl-debuginfo-8.0.30-150400.4.43.1 * php8-pdo-8.0.30-150400.4.43.1 * php8-openssl-debuginfo-8.0.30-150400.4.43.1 * php8-sockets-8.0.30-150400.4.43.1 * php8-curl-8.0.30-150400.4.43.1 * php8-posix-8.0.30-150400.4.43.1 * php8-debuginfo-8.0.30-150400.4.43.1 * php8-fileinfo-8.0.30-150400.4.43.1 * php8-cli-debuginfo-8.0.30-150400.4.43.1 * php8-ctype-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-8.0.30-150400.4.43.1 * php8-opcache-8.0.30-150400.4.43.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.43.1 * php8-dba-debuginfo-8.0.30-150400.4.43.1 * php8-pcntl-debuginfo-8.0.30-150400.4.43.1 * php8-8.0.30-150400.4.43.1 * php8-calendar-8.0.30-150400.4.43.1 * php8-tokenizer-8.0.30-150400.4.43.1 * php8-sysvshm-8.0.30-150400.4.43.1 * php8-pcntl-8.0.30-150400.4.43.1 * php8-zlib-debuginfo-8.0.30-150400.4.43.1 * php8-zip-8.0.30-150400.4.43.1 * php8-ftp-debuginfo-8.0.30-150400.4.43.1 * php8-iconv-debuginfo-8.0.30-150400.4.43.1 * php8-soap-8.0.30-150400.4.43.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.43.1 * php8-embed-8.0.30-150400.4.43.1 * php8-exif-8.0.30-150400.4.43.1 * php8-sodium-8.0.30-150400.4.43.1 * php8-intl-debuginfo-8.0.30-150400.4.43.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1 * php8-pgsql-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-debuginfo-8.0.30-150400.4.43.1 * php8-soap-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-debuginfo-8.0.30-150400.4.43.1 * php8-mysql-8.0.30-150400.4.43.1 * php8-readline-debuginfo-8.0.30-150400.4.43.1 * php8-devel-8.0.30-150400.4.43.1 * php8-ldap-debuginfo-8.0.30-150400.4.43.1 * php8-zip-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-8.0.30-150400.4.43.1 * php8-gd-debuginfo-8.0.30-150400.4.43.1 * php8-dba-8.0.30-150400.4.43.1 * php8-enchant-8.0.30-150400.4.43.1 * php8-fpm-debuginfo-8.0.30-150400.4.43.1 * php8-sqlite-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.43.1 * php8-bz2-debuginfo-8.0.30-150400.4.43.1 * php8-test-8.0.30-150400.4.43.1 * php8-iconv-8.0.30-150400.4.43.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1 * php8-shmop-debuginfo-8.0.30-150400.4.43.1 * php8-enchant-debuginfo-8.0.30-150400.4.43.1 * php8-mbstring-debuginfo-8.0.30-150400.4.43.1 * php8-snmp-8.0.30-150400.4.43.1 * php8-tidy-debuginfo-8.0.30-150400.4.43.1 * php8-odbc-debuginfo-8.0.30-150400.4.43.1 * php8-phar-8.0.30-150400.4.43.1 * php8-snmp-debuginfo-8.0.30-150400.4.43.1 * php8-bcmath-8.0.30-150400.4.43.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.43.1 * php8-gmp-8.0.30-150400.4.43.1 * php8-sqlite-8.0.30-150400.4.43.1 * php8-fpm-8.0.30-150400.4.43.1 * php8-readline-8.0.30-150400.4.43.1 * php8-cli-8.0.30-150400.4.43.1 * php8-dom-debuginfo-8.0.30-150400.4.43.1 * php8-sysvsem-8.0.30-150400.4.43.1 * php8-posix-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-8.0.30-150400.4.43.1 * php8-exif-debuginfo-8.0.30-150400.4.43.1 * php8-calendar-debuginfo-8.0.30-150400.4.43.1 * php8-fpm-debugsource-8.0.30-150400.4.43.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.43.1 * php8-fastcgi-debugsource-8.0.30-150400.4.43.1 * php8-shmop-8.0.30-150400.4.43.1 * php8-sockets-debuginfo-8.0.30-150400.4.43.1 * php8-xsl-8.0.30-150400.4.43.1 * php8-bcmath-debuginfo-8.0.30-150400.4.43.1 * php8-intl-8.0.30-150400.4.43.1 * php8-odbc-8.0.30-150400.4.43.1 * php8-bz2-8.0.30-150400.4.43.1 * php8-opcache-debuginfo-8.0.30-150400.4.43.1 * php8-gettext-8.0.30-150400.4.43.1 * php8-pgsql-8.0.30-150400.4.43.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.43.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.43.1 * php8-sodium-debuginfo-8.0.30-150400.4.43.1 * php8-phar-debuginfo-8.0.30-150400.4.43.1 * php8-embed-debugsource-8.0.30-150400.4.43.1 * php8-ftp-8.0.30-150400.4.43.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5458.html * https://bugzilla.suse.com/show_bug.cgi?id=1226073 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 08:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 08:30:20 -0000 Subject: SUSE-SU-2024:2038-1: important: Security update for php8 Message-ID: <171861302094.20155.2394533728695632809@smelt2.prg2.suse.org> # Security update for php8 Announcement ID: SUSE-SU-2024:2038-1 Rating: important References: * bsc#1226073 Cross-References: * CVE-2024-5458 CVSS scores: * CVE-2024-5458 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-5458 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * Legacy Module 15-SP5 * Legacy Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for php8 fixes the following issues: * CVE-2024-5458: Fixed an issue that allows to bypass filters in filter_var FILTER_VALIDATE_URL. (bsc#1226073) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-2038=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-2038=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2038=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2038=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2038=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2038=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2038=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2038=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2038=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2038=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2038=1 ## Package List: * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * php7-intl-debuginfo-7.4.33-150400.4.37.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.37.1 * php7-pdo-7.4.33-150400.4.37.1 * php7-zlib-7.4.33-150400.4.37.1 * php7-json-7.4.33-150400.4.37.1 * php7-tokenizer-7.4.33-150400.4.37.1 * php7-mbstring-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-debuginfo-7.4.33-150400.4.37.1 * php7-gmp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-7.4.33-150400.4.37.1 * php7-sodium-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.37.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.37.1 * php7-curl-7.4.33-150400.4.37.1 * php7-mysql-debuginfo-7.4.33-150400.4.37.1 * php7-7.4.33-150400.4.37.1 * php7-gettext-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-7.4.33-150400.4.37.1 * php7-zip-debuginfo-7.4.33-150400.4.37.1 * php7-debugsource-7.4.33-150400.4.37.1 * php7-fpm-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-7.4.33-150400.4.37.1 * php7-iconv-7.4.33-150400.4.37.1 * php7-openssl-7.4.33-150400.4.37.1 * php7-sqlite-7.4.33-150400.4.37.1 * php7-gd-7.4.33-150400.4.37.1 * php7-exif-debuginfo-7.4.33-150400.4.37.1 * php7-json-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-7.4.33-150400.4.37.1 * php7-readline-debuginfo-7.4.33-150400.4.37.1 * php7-cli-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-7.4.33-150400.4.37.1 * php7-sockets-7.4.33-150400.4.37.1 * php7-shmop-debuginfo-7.4.33-150400.4.37.1 * php7-zip-7.4.33-150400.4.37.1 * php7-dba-7.4.33-150400.4.37.1 * php7-pcntl-debuginfo-7.4.33-150400.4.37.1 * php7-tidy-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-7.4.33-150400.4.37.1 * apache2-mod_php7-7.4.33-150400.4.37.1 * php7-shmop-7.4.33-150400.4.37.1 * php7-sockets-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-debuginfo-7.4.33-150400.4.37.1 * php7-cli-7.4.33-150400.4.37.1 * php7-soap-7.4.33-150400.4.37.1 * php7-sodium-7.4.33-150400.4.37.1 * php7-fpm-debugsource-7.4.33-150400.4.37.1 * php7-ldap-debuginfo-7.4.33-150400.4.37.1 * php7-mysql-7.4.33-150400.4.37.1 * php7-xmlreader-7.4.33-150400.4.37.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-7.4.33-150400.4.37.1 * php7-sysvmsg-7.4.33-150400.4.37.1 * php7-fileinfo-7.4.33-150400.4.37.1 * php7-pcntl-7.4.33-150400.4.37.1 * php7-bz2-7.4.33-150400.4.37.1 * php7-gd-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-7.4.33-150400.4.37.1 * php7-fastcgi-debugsource-7.4.33-150400.4.37.1 * php7-ldap-7.4.33-150400.4.37.1 * php7-pdo-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-7.4.33-150400.4.37.1 * php7-mbstring-7.4.33-150400.4.37.1 * php7-pgsql-debuginfo-7.4.33-150400.4.37.1 * php7-bz2-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-7.4.33-150400.4.37.1 * php7-phar-7.4.33-150400.4.37.1 * php7-posix-debuginfo-7.4.33-150400.4.37.1 * php7-phar-debuginfo-7.4.33-150400.4.37.1 * php7-curl-debuginfo-7.4.33-150400.4.37.1 * php7-gettext-7.4.33-150400.4.37.1 * php7-ftp-7.4.33-150400.4.37.1 * php7-devel-7.4.33-150400.4.37.1 * php7-sqlite-debuginfo-7.4.33-150400.4.37.1 * php7-dba-debuginfo-7.4.33-150400.4.37.1 * php7-ftp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-debuginfo-7.4.33-150400.4.37.1 * php7-fpm-7.4.33-150400.4.37.1 * php7-pgsql-7.4.33-150400.4.37.1 * php7-gmp-7.4.33-150400.4.37.1 * php7-opcache-7.4.33-150400.4.37.1 * php7-posix-7.4.33-150400.4.37.1 * php7-intl-7.4.33-150400.4.37.1 * php7-sysvsem-7.4.33-150400.4.37.1 * php7-tidy-7.4.33-150400.4.37.1 * php7-readline-7.4.33-150400.4.37.1 * php7-soap-debuginfo-7.4.33-150400.4.37.1 * php7-openssl-debuginfo-7.4.33-150400.4.37.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.37.1 * php7-exif-7.4.33-150400.4.37.1 * php7-iconv-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-7.4.33-150400.4.37.1 * php7-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-7.4.33-150400.4.37.1 * php7-zlib-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-debuginfo-7.4.33-150400.4.37.1 * php7-opcache-debuginfo-7.4.33-150400.4.37.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * php7-intl-debuginfo-7.4.33-150400.4.37.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.37.1 * php7-pdo-7.4.33-150400.4.37.1 * php7-zlib-7.4.33-150400.4.37.1 * php7-json-7.4.33-150400.4.37.1 * php7-tokenizer-7.4.33-150400.4.37.1 * php7-mbstring-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-debuginfo-7.4.33-150400.4.37.1 * php7-gmp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-7.4.33-150400.4.37.1 * php7-sodium-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.37.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.37.1 * php7-curl-7.4.33-150400.4.37.1 * php7-mysql-debuginfo-7.4.33-150400.4.37.1 * php7-7.4.33-150400.4.37.1 * php7-gettext-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-7.4.33-150400.4.37.1 * php7-zip-debuginfo-7.4.33-150400.4.37.1 * php7-debugsource-7.4.33-150400.4.37.1 * php7-fpm-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-7.4.33-150400.4.37.1 * php7-iconv-7.4.33-150400.4.37.1 * php7-openssl-7.4.33-150400.4.37.1 * php7-sqlite-7.4.33-150400.4.37.1 * php7-gd-7.4.33-150400.4.37.1 * php7-exif-debuginfo-7.4.33-150400.4.37.1 * php7-json-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-7.4.33-150400.4.37.1 * php7-readline-debuginfo-7.4.33-150400.4.37.1 * php7-cli-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-7.4.33-150400.4.37.1 * php7-sockets-7.4.33-150400.4.37.1 * php7-shmop-debuginfo-7.4.33-150400.4.37.1 * php7-zip-7.4.33-150400.4.37.1 * php7-dba-7.4.33-150400.4.37.1 * php7-pcntl-debuginfo-7.4.33-150400.4.37.1 * php7-tidy-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-7.4.33-150400.4.37.1 * apache2-mod_php7-7.4.33-150400.4.37.1 * php7-shmop-7.4.33-150400.4.37.1 * php7-sockets-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-debuginfo-7.4.33-150400.4.37.1 * php7-cli-7.4.33-150400.4.37.1 * php7-soap-7.4.33-150400.4.37.1 * php7-sodium-7.4.33-150400.4.37.1 * php7-fpm-debugsource-7.4.33-150400.4.37.1 * php7-ldap-debuginfo-7.4.33-150400.4.37.1 * php7-mysql-7.4.33-150400.4.37.1 * php7-xmlreader-7.4.33-150400.4.37.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-7.4.33-150400.4.37.1 * php7-sysvmsg-7.4.33-150400.4.37.1 * php7-fileinfo-7.4.33-150400.4.37.1 * php7-pcntl-7.4.33-150400.4.37.1 * php7-bz2-7.4.33-150400.4.37.1 * php7-gd-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-7.4.33-150400.4.37.1 * php7-fastcgi-debugsource-7.4.33-150400.4.37.1 * php7-ldap-7.4.33-150400.4.37.1 * php7-pdo-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-7.4.33-150400.4.37.1 * php7-mbstring-7.4.33-150400.4.37.1 * php7-pgsql-debuginfo-7.4.33-150400.4.37.1 * php7-bz2-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-7.4.33-150400.4.37.1 * php7-phar-7.4.33-150400.4.37.1 * php7-posix-debuginfo-7.4.33-150400.4.37.1 * php7-phar-debuginfo-7.4.33-150400.4.37.1 * php7-curl-debuginfo-7.4.33-150400.4.37.1 * php7-gettext-7.4.33-150400.4.37.1 * php7-ftp-7.4.33-150400.4.37.1 * php7-devel-7.4.33-150400.4.37.1 * php7-sqlite-debuginfo-7.4.33-150400.4.37.1 * php7-dba-debuginfo-7.4.33-150400.4.37.1 * php7-ftp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-debuginfo-7.4.33-150400.4.37.1 * php7-fpm-7.4.33-150400.4.37.1 * php7-pgsql-7.4.33-150400.4.37.1 * php7-gmp-7.4.33-150400.4.37.1 * php7-opcache-7.4.33-150400.4.37.1 * php7-posix-7.4.33-150400.4.37.1 * php7-intl-7.4.33-150400.4.37.1 * php7-sysvsem-7.4.33-150400.4.37.1 * php7-tidy-7.4.33-150400.4.37.1 * php7-readline-7.4.33-150400.4.37.1 * php7-soap-debuginfo-7.4.33-150400.4.37.1 * php7-openssl-debuginfo-7.4.33-150400.4.37.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.37.1 * php7-exif-7.4.33-150400.4.37.1 * php7-iconv-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-7.4.33-150400.4.37.1 * php7-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-7.4.33-150400.4.37.1 * php7-zlib-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-debuginfo-7.4.33-150400.4.37.1 * php7-opcache-debuginfo-7.4.33-150400.4.37.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * php7-embed-debugsource-7.4.33-150400.4.37.1 * php7-embed-7.4.33-150400.4.37.1 * php7-embed-debuginfo-7.4.33-150400.4.37.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * php7-embed-debugsource-7.4.33-150400.4.37.1 * php7-embed-7.4.33-150400.4.37.1 * php7-embed-debuginfo-7.4.33-150400.4.37.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * php7-intl-debuginfo-7.4.33-150400.4.37.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.37.1 * php7-pdo-7.4.33-150400.4.37.1 * php7-zlib-7.4.33-150400.4.37.1 * php7-json-7.4.33-150400.4.37.1 * php7-tokenizer-7.4.33-150400.4.37.1 * php7-mbstring-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-debuginfo-7.4.33-150400.4.37.1 * php7-gmp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-7.4.33-150400.4.37.1 * php7-sodium-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.37.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.37.1 * php7-curl-7.4.33-150400.4.37.1 * php7-mysql-debuginfo-7.4.33-150400.4.37.1 * php7-7.4.33-150400.4.37.1 * php7-gettext-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-7.4.33-150400.4.37.1 * php7-zip-debuginfo-7.4.33-150400.4.37.1 * php7-debugsource-7.4.33-150400.4.37.1 * php7-fpm-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-7.4.33-150400.4.37.1 * php7-iconv-7.4.33-150400.4.37.1 * php7-openssl-7.4.33-150400.4.37.1 * php7-sqlite-7.4.33-150400.4.37.1 * php7-gd-7.4.33-150400.4.37.1 * php7-exif-debuginfo-7.4.33-150400.4.37.1 * php7-json-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-7.4.33-150400.4.37.1 * php7-readline-debuginfo-7.4.33-150400.4.37.1 * php7-cli-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-7.4.33-150400.4.37.1 * php7-sockets-7.4.33-150400.4.37.1 * php7-shmop-debuginfo-7.4.33-150400.4.37.1 * php7-zip-7.4.33-150400.4.37.1 * php7-dba-7.4.33-150400.4.37.1 * php7-pcntl-debuginfo-7.4.33-150400.4.37.1 * php7-tidy-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-7.4.33-150400.4.37.1 * apache2-mod_php7-7.4.33-150400.4.37.1 * php7-shmop-7.4.33-150400.4.37.1 * php7-sockets-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-debuginfo-7.4.33-150400.4.37.1 * php7-cli-7.4.33-150400.4.37.1 * php7-soap-7.4.33-150400.4.37.1 * php7-sodium-7.4.33-150400.4.37.1 * php7-fpm-debugsource-7.4.33-150400.4.37.1 * php7-ldap-debuginfo-7.4.33-150400.4.37.1 * php7-mysql-7.4.33-150400.4.37.1 * php7-xmlreader-7.4.33-150400.4.37.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-7.4.33-150400.4.37.1 * php7-sysvmsg-7.4.33-150400.4.37.1 * php7-fileinfo-7.4.33-150400.4.37.1 * php7-pcntl-7.4.33-150400.4.37.1 * php7-bz2-7.4.33-150400.4.37.1 * php7-gd-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-7.4.33-150400.4.37.1 * php7-fastcgi-debugsource-7.4.33-150400.4.37.1 * php7-ldap-7.4.33-150400.4.37.1 * php7-pdo-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-7.4.33-150400.4.37.1 * php7-mbstring-7.4.33-150400.4.37.1 * php7-pgsql-debuginfo-7.4.33-150400.4.37.1 * php7-bz2-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-7.4.33-150400.4.37.1 * php7-phar-7.4.33-150400.4.37.1 * php7-posix-debuginfo-7.4.33-150400.4.37.1 * php7-phar-debuginfo-7.4.33-150400.4.37.1 * php7-curl-debuginfo-7.4.33-150400.4.37.1 * php7-gettext-7.4.33-150400.4.37.1 * php7-ftp-7.4.33-150400.4.37.1 * php7-devel-7.4.33-150400.4.37.1 * php7-sqlite-debuginfo-7.4.33-150400.4.37.1 * php7-dba-debuginfo-7.4.33-150400.4.37.1 * php7-ftp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-debuginfo-7.4.33-150400.4.37.1 * php7-fpm-7.4.33-150400.4.37.1 * php7-pgsql-7.4.33-150400.4.37.1 * php7-gmp-7.4.33-150400.4.37.1 * php7-opcache-7.4.33-150400.4.37.1 * php7-posix-7.4.33-150400.4.37.1 * php7-intl-7.4.33-150400.4.37.1 * php7-sysvsem-7.4.33-150400.4.37.1 * php7-tidy-7.4.33-150400.4.37.1 * php7-readline-7.4.33-150400.4.37.1 * php7-soap-debuginfo-7.4.33-150400.4.37.1 * php7-openssl-debuginfo-7.4.33-150400.4.37.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.37.1 * php7-exif-7.4.33-150400.4.37.1 * php7-iconv-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-7.4.33-150400.4.37.1 * php7-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-7.4.33-150400.4.37.1 * php7-zlib-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-debuginfo-7.4.33-150400.4.37.1 * php7-opcache-debuginfo-7.4.33-150400.4.37.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * php7-intl-debuginfo-7.4.33-150400.4.37.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.37.1 * php7-pdo-7.4.33-150400.4.37.1 * php7-zlib-7.4.33-150400.4.37.1 * php7-json-7.4.33-150400.4.37.1 * php7-tokenizer-7.4.33-150400.4.37.1 * php7-mbstring-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-debuginfo-7.4.33-150400.4.37.1 * php7-gmp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-7.4.33-150400.4.37.1 * php7-sodium-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.37.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.37.1 * php7-curl-7.4.33-150400.4.37.1 * php7-mysql-debuginfo-7.4.33-150400.4.37.1 * php7-7.4.33-150400.4.37.1 * php7-gettext-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-7.4.33-150400.4.37.1 * php7-zip-debuginfo-7.4.33-150400.4.37.1 * php7-debugsource-7.4.33-150400.4.37.1 * php7-fpm-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-7.4.33-150400.4.37.1 * php7-iconv-7.4.33-150400.4.37.1 * php7-openssl-7.4.33-150400.4.37.1 * php7-sqlite-7.4.33-150400.4.37.1 * php7-gd-7.4.33-150400.4.37.1 * php7-exif-debuginfo-7.4.33-150400.4.37.1 * php7-json-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-7.4.33-150400.4.37.1 * php7-readline-debuginfo-7.4.33-150400.4.37.1 * php7-cli-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-7.4.33-150400.4.37.1 * php7-sockets-7.4.33-150400.4.37.1 * php7-shmop-debuginfo-7.4.33-150400.4.37.1 * php7-zip-7.4.33-150400.4.37.1 * php7-dba-7.4.33-150400.4.37.1 * php7-pcntl-debuginfo-7.4.33-150400.4.37.1 * php7-tidy-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-7.4.33-150400.4.37.1 * apache2-mod_php7-7.4.33-150400.4.37.1 * php7-shmop-7.4.33-150400.4.37.1 * php7-sockets-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-debuginfo-7.4.33-150400.4.37.1 * php7-cli-7.4.33-150400.4.37.1 * php7-soap-7.4.33-150400.4.37.1 * php7-sodium-7.4.33-150400.4.37.1 * php7-fpm-debugsource-7.4.33-150400.4.37.1 * php7-ldap-debuginfo-7.4.33-150400.4.37.1 * php7-mysql-7.4.33-150400.4.37.1 * php7-xmlreader-7.4.33-150400.4.37.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-7.4.33-150400.4.37.1 * php7-sysvmsg-7.4.33-150400.4.37.1 * php7-fileinfo-7.4.33-150400.4.37.1 * php7-pcntl-7.4.33-150400.4.37.1 * php7-bz2-7.4.33-150400.4.37.1 * php7-gd-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-7.4.33-150400.4.37.1 * php7-fastcgi-debugsource-7.4.33-150400.4.37.1 * php7-ldap-7.4.33-150400.4.37.1 * php7-pdo-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-7.4.33-150400.4.37.1 * php7-mbstring-7.4.33-150400.4.37.1 * php7-pgsql-debuginfo-7.4.33-150400.4.37.1 * php7-bz2-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-7.4.33-150400.4.37.1 * php7-phar-7.4.33-150400.4.37.1 * php7-posix-debuginfo-7.4.33-150400.4.37.1 * php7-phar-debuginfo-7.4.33-150400.4.37.1 * php7-curl-debuginfo-7.4.33-150400.4.37.1 * php7-gettext-7.4.33-150400.4.37.1 * php7-ftp-7.4.33-150400.4.37.1 * php7-devel-7.4.33-150400.4.37.1 * php7-sqlite-debuginfo-7.4.33-150400.4.37.1 * php7-dba-debuginfo-7.4.33-150400.4.37.1 * php7-ftp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-debuginfo-7.4.33-150400.4.37.1 * php7-fpm-7.4.33-150400.4.37.1 * php7-pgsql-7.4.33-150400.4.37.1 * php7-gmp-7.4.33-150400.4.37.1 * php7-opcache-7.4.33-150400.4.37.1 * php7-posix-7.4.33-150400.4.37.1 * php7-intl-7.4.33-150400.4.37.1 * php7-sysvsem-7.4.33-150400.4.37.1 * php7-tidy-7.4.33-150400.4.37.1 * php7-readline-7.4.33-150400.4.37.1 * php7-soap-debuginfo-7.4.33-150400.4.37.1 * php7-openssl-debuginfo-7.4.33-150400.4.37.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.37.1 * php7-exif-7.4.33-150400.4.37.1 * php7-iconv-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-7.4.33-150400.4.37.1 * php7-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-7.4.33-150400.4.37.1 * php7-zlib-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-debuginfo-7.4.33-150400.4.37.1 * php7-opcache-debuginfo-7.4.33-150400.4.37.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * php7-intl-debuginfo-7.4.33-150400.4.37.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.37.1 * php7-pdo-7.4.33-150400.4.37.1 * php7-zlib-7.4.33-150400.4.37.1 * php7-json-7.4.33-150400.4.37.1 * php7-tokenizer-7.4.33-150400.4.37.1 * php7-mbstring-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-debuginfo-7.4.33-150400.4.37.1 * php7-gmp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-7.4.33-150400.4.37.1 * php7-sodium-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.37.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.37.1 * php7-curl-7.4.33-150400.4.37.1 * php7-mysql-debuginfo-7.4.33-150400.4.37.1 * php7-7.4.33-150400.4.37.1 * php7-gettext-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-7.4.33-150400.4.37.1 * php7-zip-debuginfo-7.4.33-150400.4.37.1 * php7-debugsource-7.4.33-150400.4.37.1 * php7-fpm-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-7.4.33-150400.4.37.1 * php7-iconv-7.4.33-150400.4.37.1 * php7-openssl-7.4.33-150400.4.37.1 * php7-sqlite-7.4.33-150400.4.37.1 * php7-gd-7.4.33-150400.4.37.1 * php7-exif-debuginfo-7.4.33-150400.4.37.1 * php7-json-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-7.4.33-150400.4.37.1 * php7-readline-debuginfo-7.4.33-150400.4.37.1 * php7-cli-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-7.4.33-150400.4.37.1 * php7-sockets-7.4.33-150400.4.37.1 * php7-shmop-debuginfo-7.4.33-150400.4.37.1 * php7-zip-7.4.33-150400.4.37.1 * php7-dba-7.4.33-150400.4.37.1 * php7-pcntl-debuginfo-7.4.33-150400.4.37.1 * php7-tidy-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-7.4.33-150400.4.37.1 * apache2-mod_php7-7.4.33-150400.4.37.1 * php7-shmop-7.4.33-150400.4.37.1 * php7-sockets-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-debuginfo-7.4.33-150400.4.37.1 * php7-cli-7.4.33-150400.4.37.1 * php7-soap-7.4.33-150400.4.37.1 * php7-sodium-7.4.33-150400.4.37.1 * php7-fpm-debugsource-7.4.33-150400.4.37.1 * php7-ldap-debuginfo-7.4.33-150400.4.37.1 * php7-mysql-7.4.33-150400.4.37.1 * php7-xmlreader-7.4.33-150400.4.37.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-7.4.33-150400.4.37.1 * php7-sysvmsg-7.4.33-150400.4.37.1 * php7-fileinfo-7.4.33-150400.4.37.1 * php7-pcntl-7.4.33-150400.4.37.1 * php7-bz2-7.4.33-150400.4.37.1 * php7-gd-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-7.4.33-150400.4.37.1 * php7-fastcgi-debugsource-7.4.33-150400.4.37.1 * php7-ldap-7.4.33-150400.4.37.1 * php7-pdo-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-7.4.33-150400.4.37.1 * php7-mbstring-7.4.33-150400.4.37.1 * php7-pgsql-debuginfo-7.4.33-150400.4.37.1 * php7-bz2-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-7.4.33-150400.4.37.1 * php7-phar-7.4.33-150400.4.37.1 * php7-posix-debuginfo-7.4.33-150400.4.37.1 * php7-phar-debuginfo-7.4.33-150400.4.37.1 * php7-curl-debuginfo-7.4.33-150400.4.37.1 * php7-gettext-7.4.33-150400.4.37.1 * php7-ftp-7.4.33-150400.4.37.1 * php7-devel-7.4.33-150400.4.37.1 * php7-sqlite-debuginfo-7.4.33-150400.4.37.1 * php7-dba-debuginfo-7.4.33-150400.4.37.1 * php7-ftp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-debuginfo-7.4.33-150400.4.37.1 * php7-fpm-7.4.33-150400.4.37.1 * php7-pgsql-7.4.33-150400.4.37.1 * php7-gmp-7.4.33-150400.4.37.1 * php7-opcache-7.4.33-150400.4.37.1 * php7-posix-7.4.33-150400.4.37.1 * php7-intl-7.4.33-150400.4.37.1 * php7-sysvsem-7.4.33-150400.4.37.1 * php7-tidy-7.4.33-150400.4.37.1 * php7-readline-7.4.33-150400.4.37.1 * php7-soap-debuginfo-7.4.33-150400.4.37.1 * php7-openssl-debuginfo-7.4.33-150400.4.37.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.37.1 * php7-exif-7.4.33-150400.4.37.1 * php7-iconv-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-7.4.33-150400.4.37.1 * php7-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-7.4.33-150400.4.37.1 * php7-zlib-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-debuginfo-7.4.33-150400.4.37.1 * php7-opcache-debuginfo-7.4.33-150400.4.37.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * php7-intl-debuginfo-7.4.33-150400.4.37.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.37.1 * php7-pdo-7.4.33-150400.4.37.1 * php7-zlib-7.4.33-150400.4.37.1 * php7-json-7.4.33-150400.4.37.1 * php7-tokenizer-7.4.33-150400.4.37.1 * php7-mbstring-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-debuginfo-7.4.33-150400.4.37.1 * php7-gmp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-7.4.33-150400.4.37.1 * php7-sodium-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.37.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.37.1 * php7-curl-7.4.33-150400.4.37.1 * php7-mysql-debuginfo-7.4.33-150400.4.37.1 * php7-7.4.33-150400.4.37.1 * php7-gettext-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-7.4.33-150400.4.37.1 * php7-zip-debuginfo-7.4.33-150400.4.37.1 * php7-debugsource-7.4.33-150400.4.37.1 * php7-fpm-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-7.4.33-150400.4.37.1 * php7-iconv-7.4.33-150400.4.37.1 * php7-openssl-7.4.33-150400.4.37.1 * php7-sqlite-7.4.33-150400.4.37.1 * php7-gd-7.4.33-150400.4.37.1 * php7-exif-debuginfo-7.4.33-150400.4.37.1 * php7-json-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-7.4.33-150400.4.37.1 * php7-readline-debuginfo-7.4.33-150400.4.37.1 * php7-cli-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-7.4.33-150400.4.37.1 * php7-sockets-7.4.33-150400.4.37.1 * php7-shmop-debuginfo-7.4.33-150400.4.37.1 * php7-zip-7.4.33-150400.4.37.1 * php7-dba-7.4.33-150400.4.37.1 * php7-pcntl-debuginfo-7.4.33-150400.4.37.1 * php7-tidy-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-7.4.33-150400.4.37.1 * apache2-mod_php7-7.4.33-150400.4.37.1 * php7-shmop-7.4.33-150400.4.37.1 * php7-sockets-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-debuginfo-7.4.33-150400.4.37.1 * php7-cli-7.4.33-150400.4.37.1 * php7-soap-7.4.33-150400.4.37.1 * php7-sodium-7.4.33-150400.4.37.1 * php7-fpm-debugsource-7.4.33-150400.4.37.1 * php7-ldap-debuginfo-7.4.33-150400.4.37.1 * php7-mysql-7.4.33-150400.4.37.1 * php7-xmlreader-7.4.33-150400.4.37.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-7.4.33-150400.4.37.1 * php7-sysvmsg-7.4.33-150400.4.37.1 * php7-fileinfo-7.4.33-150400.4.37.1 * php7-pcntl-7.4.33-150400.4.37.1 * php7-bz2-7.4.33-150400.4.37.1 * php7-gd-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-7.4.33-150400.4.37.1 * php7-fastcgi-debugsource-7.4.33-150400.4.37.1 * php7-ldap-7.4.33-150400.4.37.1 * php7-pdo-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-7.4.33-150400.4.37.1 * php7-mbstring-7.4.33-150400.4.37.1 * php7-pgsql-debuginfo-7.4.33-150400.4.37.1 * php7-bz2-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-7.4.33-150400.4.37.1 * php7-phar-7.4.33-150400.4.37.1 * php7-posix-debuginfo-7.4.33-150400.4.37.1 * php7-phar-debuginfo-7.4.33-150400.4.37.1 * php7-curl-debuginfo-7.4.33-150400.4.37.1 * php7-gettext-7.4.33-150400.4.37.1 * php7-ftp-7.4.33-150400.4.37.1 * php7-devel-7.4.33-150400.4.37.1 * php7-sqlite-debuginfo-7.4.33-150400.4.37.1 * php7-dba-debuginfo-7.4.33-150400.4.37.1 * php7-ftp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-debuginfo-7.4.33-150400.4.37.1 * php7-fpm-7.4.33-150400.4.37.1 * php7-pgsql-7.4.33-150400.4.37.1 * php7-gmp-7.4.33-150400.4.37.1 * php7-opcache-7.4.33-150400.4.37.1 * php7-posix-7.4.33-150400.4.37.1 * php7-intl-7.4.33-150400.4.37.1 * php7-sysvsem-7.4.33-150400.4.37.1 * php7-tidy-7.4.33-150400.4.37.1 * php7-readline-7.4.33-150400.4.37.1 * php7-soap-debuginfo-7.4.33-150400.4.37.1 * php7-openssl-debuginfo-7.4.33-150400.4.37.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.37.1 * php7-exif-7.4.33-150400.4.37.1 * php7-iconv-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-7.4.33-150400.4.37.1 * php7-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-7.4.33-150400.4.37.1 * php7-zlib-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-debuginfo-7.4.33-150400.4.37.1 * php7-opcache-debuginfo-7.4.33-150400.4.37.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * php7-intl-debuginfo-7.4.33-150400.4.37.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.37.1 * php7-embed-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.37.1 * php7-pdo-7.4.33-150400.4.37.1 * php7-zlib-7.4.33-150400.4.37.1 * php7-json-7.4.33-150400.4.37.1 * php7-tokenizer-7.4.33-150400.4.37.1 * php7-mbstring-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-debuginfo-7.4.33-150400.4.37.1 * php7-gmp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-7.4.33-150400.4.37.1 * php7-sodium-debuginfo-7.4.33-150400.4.37.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.37.1 * php7-curl-7.4.33-150400.4.37.1 * php7-mysql-debuginfo-7.4.33-150400.4.37.1 * php7-7.4.33-150400.4.37.1 * php7-gettext-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-7.4.33-150400.4.37.1 * php7-zip-debuginfo-7.4.33-150400.4.37.1 * php7-debugsource-7.4.33-150400.4.37.1 * php7-fpm-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-7.4.33-150400.4.37.1 * php7-iconv-7.4.33-150400.4.37.1 * php7-openssl-7.4.33-150400.4.37.1 * php7-sqlite-7.4.33-150400.4.37.1 * php7-gd-7.4.33-150400.4.37.1 * php7-exif-debuginfo-7.4.33-150400.4.37.1 * php7-json-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-7.4.33-150400.4.37.1 * php7-readline-debuginfo-7.4.33-150400.4.37.1 * php7-cli-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-7.4.33-150400.4.37.1 * php7-sockets-7.4.33-150400.4.37.1 * php7-test-7.4.33-150400.4.37.1 * php7-shmop-debuginfo-7.4.33-150400.4.37.1 * php7-zip-7.4.33-150400.4.37.1 * php7-dba-7.4.33-150400.4.37.1 * php7-pcntl-debuginfo-7.4.33-150400.4.37.1 * php7-tidy-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-7.4.33-150400.4.37.1 * apache2-mod_php7-7.4.33-150400.4.37.1 * php7-shmop-7.4.33-150400.4.37.1 * php7-sockets-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-debuginfo-7.4.33-150400.4.37.1 * php7-cli-7.4.33-150400.4.37.1 * php7-soap-7.4.33-150400.4.37.1 * php7-sodium-7.4.33-150400.4.37.1 * php7-fpm-debugsource-7.4.33-150400.4.37.1 * php7-ldap-debuginfo-7.4.33-150400.4.37.1 * php7-mysql-7.4.33-150400.4.37.1 * php7-xmlreader-7.4.33-150400.4.37.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-7.4.33-150400.4.37.1 * php7-sysvmsg-7.4.33-150400.4.37.1 * php7-fileinfo-7.4.33-150400.4.37.1 * php7-pcntl-7.4.33-150400.4.37.1 * php7-bz2-7.4.33-150400.4.37.1 * php7-gd-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-7.4.33-150400.4.37.1 * php7-ldap-7.4.33-150400.4.37.1 * php7-fastcgi-debugsource-7.4.33-150400.4.37.1 * php7-pdo-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-7.4.33-150400.4.37.1 * php7-mbstring-7.4.33-150400.4.37.1 * php7-pgsql-debuginfo-7.4.33-150400.4.37.1 * php7-bz2-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-7.4.33-150400.4.37.1 * php7-phar-7.4.33-150400.4.37.1 * php7-posix-debuginfo-7.4.33-150400.4.37.1 * php7-phar-debuginfo-7.4.33-150400.4.37.1 * php7-embed-debugsource-7.4.33-150400.4.37.1 * php7-curl-debuginfo-7.4.33-150400.4.37.1 * php7-gettext-7.4.33-150400.4.37.1 * php7-ftp-7.4.33-150400.4.37.1 * php7-devel-7.4.33-150400.4.37.1 * php7-sqlite-debuginfo-7.4.33-150400.4.37.1 * php7-dba-debuginfo-7.4.33-150400.4.37.1 * php7-ftp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-debuginfo-7.4.33-150400.4.37.1 * php7-fpm-7.4.33-150400.4.37.1 * php7-pgsql-7.4.33-150400.4.37.1 * php7-gmp-7.4.33-150400.4.37.1 * php7-opcache-7.4.33-150400.4.37.1 * php7-posix-7.4.33-150400.4.37.1 * php7-intl-7.4.33-150400.4.37.1 * php7-sysvsem-7.4.33-150400.4.37.1 * php7-embed-7.4.33-150400.4.37.1 * php7-tidy-7.4.33-150400.4.37.1 * php7-readline-7.4.33-150400.4.37.1 * php7-soap-debuginfo-7.4.33-150400.4.37.1 * php7-openssl-debuginfo-7.4.33-150400.4.37.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.37.1 * php7-exif-7.4.33-150400.4.37.1 * php7-iconv-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-7.4.33-150400.4.37.1 * php7-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-7.4.33-150400.4.37.1 * php7-zlib-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-debuginfo-7.4.33-150400.4.37.1 * php7-opcache-debuginfo-7.4.33-150400.4.37.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * php7-intl-debuginfo-7.4.33-150400.4.37.1 * php7-embed-debuginfo-7.4.33-150400.4.37.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.37.1 * php7-pdo-7.4.33-150400.4.37.1 * php7-zlib-7.4.33-150400.4.37.1 * php7-json-7.4.33-150400.4.37.1 * php7-tokenizer-7.4.33-150400.4.37.1 * php7-mbstring-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-debuginfo-7.4.33-150400.4.37.1 * php7-gmp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-7.4.33-150400.4.37.1 * php7-sodium-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.37.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.37.1 * php7-curl-7.4.33-150400.4.37.1 * php7-mysql-debuginfo-7.4.33-150400.4.37.1 * php7-7.4.33-150400.4.37.1 * php7-gettext-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-7.4.33-150400.4.37.1 * php7-zip-debuginfo-7.4.33-150400.4.37.1 * php7-debugsource-7.4.33-150400.4.37.1 * php7-fpm-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-7.4.33-150400.4.37.1 * php7-iconv-7.4.33-150400.4.37.1 * php7-openssl-7.4.33-150400.4.37.1 * php7-sqlite-7.4.33-150400.4.37.1 * php7-gd-7.4.33-150400.4.37.1 * php7-exif-debuginfo-7.4.33-150400.4.37.1 * php7-json-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-7.4.33-150400.4.37.1 * php7-readline-debuginfo-7.4.33-150400.4.37.1 * php7-cli-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-7.4.33-150400.4.37.1 * php7-sockets-7.4.33-150400.4.37.1 * php7-test-7.4.33-150400.4.37.1 * php7-shmop-debuginfo-7.4.33-150400.4.37.1 * php7-zip-7.4.33-150400.4.37.1 * php7-dba-7.4.33-150400.4.37.1 * php7-pcntl-debuginfo-7.4.33-150400.4.37.1 * php7-tidy-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-7.4.33-150400.4.37.1 * apache2-mod_php7-7.4.33-150400.4.37.1 * php7-shmop-7.4.33-150400.4.37.1 * php7-sockets-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-debuginfo-7.4.33-150400.4.37.1 * php7-cli-7.4.33-150400.4.37.1 * php7-soap-7.4.33-150400.4.37.1 * php7-sodium-7.4.33-150400.4.37.1 * php7-fpm-debugsource-7.4.33-150400.4.37.1 * php7-ldap-debuginfo-7.4.33-150400.4.37.1 * php7-mysql-7.4.33-150400.4.37.1 * php7-xmlreader-7.4.33-150400.4.37.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-7.4.33-150400.4.37.1 * php7-sysvmsg-7.4.33-150400.4.37.1 * php7-fileinfo-7.4.33-150400.4.37.1 * php7-pcntl-7.4.33-150400.4.37.1 * php7-bz2-7.4.33-150400.4.37.1 * php7-gd-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-7.4.33-150400.4.37.1 * php7-fastcgi-debugsource-7.4.33-150400.4.37.1 * php7-ldap-7.4.33-150400.4.37.1 * php7-pdo-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-7.4.33-150400.4.37.1 * php7-mbstring-7.4.33-150400.4.37.1 * php7-pgsql-debuginfo-7.4.33-150400.4.37.1 * php7-bz2-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-7.4.33-150400.4.37.1 * php7-phar-7.4.33-150400.4.37.1 * php7-posix-debuginfo-7.4.33-150400.4.37.1 * php7-phar-debuginfo-7.4.33-150400.4.37.1 * php7-embed-debugsource-7.4.33-150400.4.37.1 * php7-curl-debuginfo-7.4.33-150400.4.37.1 * php7-gettext-7.4.33-150400.4.37.1 * php7-ftp-7.4.33-150400.4.37.1 * php7-devel-7.4.33-150400.4.37.1 * php7-sqlite-debuginfo-7.4.33-150400.4.37.1 * php7-dba-debuginfo-7.4.33-150400.4.37.1 * php7-ftp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-debuginfo-7.4.33-150400.4.37.1 * php7-fpm-7.4.33-150400.4.37.1 * php7-pgsql-7.4.33-150400.4.37.1 * php7-gmp-7.4.33-150400.4.37.1 * php7-opcache-7.4.33-150400.4.37.1 * php7-posix-7.4.33-150400.4.37.1 * php7-intl-7.4.33-150400.4.37.1 * php7-sysvsem-7.4.33-150400.4.37.1 * php7-embed-7.4.33-150400.4.37.1 * php7-tidy-7.4.33-150400.4.37.1 * php7-readline-7.4.33-150400.4.37.1 * php7-soap-debuginfo-7.4.33-150400.4.37.1 * php7-openssl-debuginfo-7.4.33-150400.4.37.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.37.1 * php7-exif-7.4.33-150400.4.37.1 * php7-iconv-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-7.4.33-150400.4.37.1 * php7-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-7.4.33-150400.4.37.1 * php7-zlib-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-debuginfo-7.4.33-150400.4.37.1 * php7-opcache-debuginfo-7.4.33-150400.4.37.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * php7-intl-debuginfo-7.4.33-150400.4.37.1 * php7-embed-debuginfo-7.4.33-150400.4.37.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.37.1 * php7-pdo-7.4.33-150400.4.37.1 * php7-zlib-7.4.33-150400.4.37.1 * php7-json-7.4.33-150400.4.37.1 * php7-tokenizer-7.4.33-150400.4.37.1 * php7-mbstring-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-debuginfo-7.4.33-150400.4.37.1 * php7-gmp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-7.4.33-150400.4.37.1 * php7-sodium-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.37.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.37.1 * php7-curl-7.4.33-150400.4.37.1 * php7-mysql-debuginfo-7.4.33-150400.4.37.1 * php7-7.4.33-150400.4.37.1 * php7-gettext-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-7.4.33-150400.4.37.1 * php7-zip-debuginfo-7.4.33-150400.4.37.1 * php7-debugsource-7.4.33-150400.4.37.1 * php7-fpm-debuginfo-7.4.33-150400.4.37.1 * php7-xsl-7.4.33-150400.4.37.1 * php7-iconv-7.4.33-150400.4.37.1 * php7-openssl-7.4.33-150400.4.37.1 * php7-sqlite-7.4.33-150400.4.37.1 * php7-gd-7.4.33-150400.4.37.1 * php7-exif-debuginfo-7.4.33-150400.4.37.1 * php7-json-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-7.4.33-150400.4.37.1 * php7-readline-debuginfo-7.4.33-150400.4.37.1 * php7-cli-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-7.4.33-150400.4.37.1 * php7-sockets-7.4.33-150400.4.37.1 * php7-test-7.4.33-150400.4.37.1 * php7-shmop-debuginfo-7.4.33-150400.4.37.1 * php7-zip-7.4.33-150400.4.37.1 * php7-dba-7.4.33-150400.4.37.1 * php7-pcntl-debuginfo-7.4.33-150400.4.37.1 * php7-tidy-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-7.4.33-150400.4.37.1 * apache2-mod_php7-7.4.33-150400.4.37.1 * php7-shmop-7.4.33-150400.4.37.1 * php7-sockets-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-debuginfo-7.4.33-150400.4.37.1 * php7-cli-7.4.33-150400.4.37.1 * php7-soap-7.4.33-150400.4.37.1 * php7-sodium-7.4.33-150400.4.37.1 * php7-fpm-debugsource-7.4.33-150400.4.37.1 * php7-ldap-debuginfo-7.4.33-150400.4.37.1 * php7-mysql-7.4.33-150400.4.37.1 * php7-xmlreader-7.4.33-150400.4.37.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-7.4.33-150400.4.37.1 * php7-sysvmsg-7.4.33-150400.4.37.1 * php7-fileinfo-7.4.33-150400.4.37.1 * php7-pcntl-7.4.33-150400.4.37.1 * php7-bz2-7.4.33-150400.4.37.1 * php7-gd-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-7.4.33-150400.4.37.1 * php7-fastcgi-debugsource-7.4.33-150400.4.37.1 * php7-ldap-7.4.33-150400.4.37.1 * php7-pdo-debuginfo-7.4.33-150400.4.37.1 * php7-bcmath-7.4.33-150400.4.37.1 * php7-mbstring-7.4.33-150400.4.37.1 * php7-pgsql-debuginfo-7.4.33-150400.4.37.1 * php7-bz2-debuginfo-7.4.33-150400.4.37.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1 * php7-snmp-debuginfo-7.4.33-150400.4.37.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1 * php7-enchant-7.4.33-150400.4.37.1 * php7-phar-7.4.33-150400.4.37.1 * php7-posix-debuginfo-7.4.33-150400.4.37.1 * php7-phar-debuginfo-7.4.33-150400.4.37.1 * php7-embed-debugsource-7.4.33-150400.4.37.1 * php7-curl-debuginfo-7.4.33-150400.4.37.1 * php7-gettext-7.4.33-150400.4.37.1 * php7-ftp-7.4.33-150400.4.37.1 * php7-devel-7.4.33-150400.4.37.1 * php7-sqlite-debuginfo-7.4.33-150400.4.37.1 * php7-dba-debuginfo-7.4.33-150400.4.37.1 * php7-ftp-debuginfo-7.4.33-150400.4.37.1 * php7-calendar-debuginfo-7.4.33-150400.4.37.1 * php7-fpm-7.4.33-150400.4.37.1 * php7-pgsql-7.4.33-150400.4.37.1 * php7-gmp-7.4.33-150400.4.37.1 * php7-opcache-7.4.33-150400.4.37.1 * php7-posix-7.4.33-150400.4.37.1 * php7-intl-7.4.33-150400.4.37.1 * php7-sysvsem-7.4.33-150400.4.37.1 * php7-embed-7.4.33-150400.4.37.1 * php7-tidy-7.4.33-150400.4.37.1 * php7-readline-7.4.33-150400.4.37.1 * php7-soap-debuginfo-7.4.33-150400.4.37.1 * php7-openssl-debuginfo-7.4.33-150400.4.37.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.37.1 * php7-exif-7.4.33-150400.4.37.1 * php7-iconv-debuginfo-7.4.33-150400.4.37.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.37.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1 * php7-dom-debuginfo-7.4.33-150400.4.37.1 * php7-fastcgi-7.4.33-150400.4.37.1 * php7-debuginfo-7.4.33-150400.4.37.1 * php7-odbc-7.4.33-150400.4.37.1 * php7-zlib-debuginfo-7.4.33-150400.4.37.1 * php7-ctype-debuginfo-7.4.33-150400.4.37.1 * php7-opcache-debuginfo-7.4.33-150400.4.37.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5458.html * https://bugzilla.suse.com/show_bug.cgi?id=1226073 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 08:30:24 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 08:30:24 -0000 Subject: SUSE-SU-2024:2037-1: important: Security update for php7 Message-ID: <171861302419.20155.1142592557741602463@smelt2.prg2.suse.org> # Security update for php7 Announcement ID: SUSE-SU-2024:2037-1 Rating: important References: * bsc#1222857 * bsc#1222858 * bsc#1226073 Cross-References: * CVE-2024-2756 * CVE-2024-3096 * CVE-2024-5458 CVSS scores: * CVE-2024-2756 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-3096 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-5458 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-5458 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for php7 fixes the following issues: * CVE-2024-2756: Fixed bypass of security fix applied for CVE-2022-31629 that lead PHP to consider not secure cookies as secure (bsc#1222857) * CVE-2024-3096: Fixed bypass on null byte leading passwords checked via password_verify (bsc#1222858) * CVE-2024-5458: Fixed an issue that allows to bypass filters in filter_var FILTER_VALIDATE_URL. (bsc#1226073) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2037=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2037=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2037=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2037=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2037=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2037=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2037=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * php7-json-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-7.4.33-150200.3.65.1 * php7-fileinfo-7.4.33-150200.3.65.1 * php7-sockets-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-debuginfo-7.4.33-150200.3.65.1 * php7-sockets-7.4.33-150200.3.65.1 * php7-dom-debuginfo-7.4.33-150200.3.65.1 * php7-debuginfo-7.4.33-150200.3.65.1 * php7-gmp-7.4.33-150200.3.65.1 * php7-dba-7.4.33-150200.3.65.1 * php7-gmp-debuginfo-7.4.33-150200.3.65.1 * php7-intl-debuginfo-7.4.33-150200.3.65.1 * php7-snmp-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-7.4.33-150200.3.65.1 * php7-snmp-7.4.33-150200.3.65.1 * php7-bcmath-7.4.33-150200.3.65.1 * php7-devel-7.4.33-150200.3.65.1 * php7-gettext-debuginfo-7.4.33-150200.3.65.1 * php7-soap-7.4.33-150200.3.65.1 * php7-sysvshm-7.4.33-150200.3.65.1 * php7-debugsource-7.4.33-150200.3.65.1 * php7-ctype-7.4.33-150200.3.65.1 * php7-sysvsem-7.4.33-150200.3.65.1 * php7-iconv-7.4.33-150200.3.65.1 * php7-fastcgi-7.4.33-150200.3.65.1 * php7-ftp-debuginfo-7.4.33-150200.3.65.1 * php7-sysvshm-debuginfo-7.4.33-150200.3.65.1 * php7-json-7.4.33-150200.3.65.1 * php7-shmop-debuginfo-7.4.33-150200.3.65.1 * php7-xsl-debuginfo-7.4.33-150200.3.65.1 * php7-openssl-7.4.33-150200.3.65.1 * php7-bz2-debuginfo-7.4.33-150200.3.65.1 * php7-intl-7.4.33-150200.3.65.1 * php7-fileinfo-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-debuginfo-7.4.33-150200.3.65.1 * php7-zip-debuginfo-7.4.33-150200.3.65.1 * php7-posix-7.4.33-150200.3.65.1 * php7-enchant-7.4.33-150200.3.65.1 * php7-sysvmsg-debuginfo-7.4.33-150200.3.65.1 * php7-bz2-7.4.33-150200.3.65.1 * php7-ldap-debuginfo-7.4.33-150200.3.65.1 * php7-sysvmsg-7.4.33-150200.3.65.1 * php7-pgsql-7.4.33-150200.3.65.1 * php7-phar-7.4.33-150200.3.65.1 * php7-mbstring-debuginfo-7.4.33-150200.3.65.1 * php7-exif-debuginfo-7.4.33-150200.3.65.1 * php7-odbc-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-7.4.33-150200.3.65.1 * php7-sodium-7.4.33-150200.3.65.1 * php7-phar-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-debuginfo-7.4.33-150200.3.65.1 * php7-pgsql-debuginfo-7.4.33-150200.3.65.1 * php7-gd-7.4.33-150200.3.65.1 * php7-odbc-7.4.33-150200.3.65.1 * php7-ctype-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-debuginfo-7.4.33-150200.3.65.1 * php7-pcntl-7.4.33-150200.3.65.1 * php7-ldap-7.4.33-150200.3.65.1 * php7-pcntl-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-7.4.33-150200.3.65.1 * php7-gd-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-7.4.33-150200.3.65.1 * php7-exif-7.4.33-150200.3.65.1 * php7-mbstring-7.4.33-150200.3.65.1 * php7-openssl-debuginfo-7.4.33-150200.3.65.1 * php7-gettext-7.4.33-150200.3.65.1 * php7-pdo-7.4.33-150200.3.65.1 * php7-tokenizer-debuginfo-7.4.33-150200.3.65.1 * php7-enchant-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-7.4.33-150200.3.65.1 * php7-readline-debuginfo-7.4.33-150200.3.65.1 * php7-shmop-7.4.33-150200.3.65.1 * php7-dom-7.4.33-150200.3.65.1 * php7-sysvsem-debuginfo-7.4.33-150200.3.65.1 * php7-curl-7.4.33-150200.3.65.1 * php7-fpm-7.4.33-150200.3.65.1 * php7-mysql-7.4.33-150200.3.65.1 * php7-iconv-debuginfo-7.4.33-150200.3.65.1 * php7-7.4.33-150200.3.65.1 * php7-soap-debuginfo-7.4.33-150200.3.65.1 * php7-fpm-debuginfo-7.4.33-150200.3.65.1 * php7-fastcgi-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-debuginfo-7.4.33-150200.3.65.1 * php7-dba-debuginfo-7.4.33-150200.3.65.1 * php7-tokenizer-7.4.33-150200.3.65.1 * php7-pdo-debuginfo-7.4.33-150200.3.65.1 * php7-opcache-7.4.33-150200.3.65.1 * php7-posix-debuginfo-7.4.33-150200.3.65.1 * php7-ftp-7.4.33-150200.3.65.1 * php7-bcmath-debuginfo-7.4.33-150200.3.65.1 * php7-zip-7.4.33-150200.3.65.1 * php7-zlib-7.4.33-150200.3.65.1 * php7-xsl-7.4.33-150200.3.65.1 * php7-zlib-debuginfo-7.4.33-150200.3.65.1 * php7-curl-debuginfo-7.4.33-150200.3.65.1 * php7-sodium-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-7.4.33-150200.3.65.1 * php7-mysql-debuginfo-7.4.33-150200.3.65.1 * php7-readline-7.4.33-150200.3.65.1 * php7-opcache-debuginfo-7.4.33-150200.3.65.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * php7-json-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-7.4.33-150200.3.65.1 * php7-fileinfo-7.4.33-150200.3.65.1 * php7-sockets-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-debuginfo-7.4.33-150200.3.65.1 * php7-sockets-7.4.33-150200.3.65.1 * php7-dom-debuginfo-7.4.33-150200.3.65.1 * php7-debuginfo-7.4.33-150200.3.65.1 * php7-gmp-7.4.33-150200.3.65.1 * php7-dba-7.4.33-150200.3.65.1 * php7-gmp-debuginfo-7.4.33-150200.3.65.1 * php7-intl-debuginfo-7.4.33-150200.3.65.1 * php7-snmp-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-7.4.33-150200.3.65.1 * php7-snmp-7.4.33-150200.3.65.1 * php7-bcmath-7.4.33-150200.3.65.1 * php7-devel-7.4.33-150200.3.65.1 * php7-gettext-debuginfo-7.4.33-150200.3.65.1 * php7-soap-7.4.33-150200.3.65.1 * php7-sysvshm-7.4.33-150200.3.65.1 * php7-debugsource-7.4.33-150200.3.65.1 * php7-ctype-7.4.33-150200.3.65.1 * php7-sysvsem-7.4.33-150200.3.65.1 * php7-iconv-7.4.33-150200.3.65.1 * php7-fastcgi-7.4.33-150200.3.65.1 * php7-ftp-debuginfo-7.4.33-150200.3.65.1 * php7-sysvshm-debuginfo-7.4.33-150200.3.65.1 * php7-json-7.4.33-150200.3.65.1 * php7-shmop-debuginfo-7.4.33-150200.3.65.1 * php7-xsl-debuginfo-7.4.33-150200.3.65.1 * php7-openssl-7.4.33-150200.3.65.1 * php7-bz2-debuginfo-7.4.33-150200.3.65.1 * php7-intl-7.4.33-150200.3.65.1 * php7-fileinfo-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-debuginfo-7.4.33-150200.3.65.1 * php7-zip-debuginfo-7.4.33-150200.3.65.1 * php7-posix-7.4.33-150200.3.65.1 * php7-enchant-7.4.33-150200.3.65.1 * php7-sysvmsg-debuginfo-7.4.33-150200.3.65.1 * php7-bz2-7.4.33-150200.3.65.1 * php7-ldap-debuginfo-7.4.33-150200.3.65.1 * php7-sysvmsg-7.4.33-150200.3.65.1 * php7-pgsql-7.4.33-150200.3.65.1 * php7-phar-7.4.33-150200.3.65.1 * php7-mbstring-debuginfo-7.4.33-150200.3.65.1 * php7-exif-debuginfo-7.4.33-150200.3.65.1 * php7-odbc-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-7.4.33-150200.3.65.1 * php7-sodium-7.4.33-150200.3.65.1 * php7-phar-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-debuginfo-7.4.33-150200.3.65.1 * php7-pgsql-debuginfo-7.4.33-150200.3.65.1 * php7-gd-7.4.33-150200.3.65.1 * php7-odbc-7.4.33-150200.3.65.1 * php7-ctype-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-debuginfo-7.4.33-150200.3.65.1 * php7-pcntl-7.4.33-150200.3.65.1 * php7-ldap-7.4.33-150200.3.65.1 * php7-pcntl-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-7.4.33-150200.3.65.1 * php7-gd-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-7.4.33-150200.3.65.1 * php7-exif-7.4.33-150200.3.65.1 * php7-mbstring-7.4.33-150200.3.65.1 * php7-openssl-debuginfo-7.4.33-150200.3.65.1 * php7-gettext-7.4.33-150200.3.65.1 * php7-pdo-7.4.33-150200.3.65.1 * php7-tokenizer-debuginfo-7.4.33-150200.3.65.1 * php7-enchant-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-7.4.33-150200.3.65.1 * php7-readline-debuginfo-7.4.33-150200.3.65.1 * php7-shmop-7.4.33-150200.3.65.1 * php7-dom-7.4.33-150200.3.65.1 * php7-sysvsem-debuginfo-7.4.33-150200.3.65.1 * php7-curl-7.4.33-150200.3.65.1 * php7-fpm-7.4.33-150200.3.65.1 * php7-mysql-7.4.33-150200.3.65.1 * php7-iconv-debuginfo-7.4.33-150200.3.65.1 * php7-7.4.33-150200.3.65.1 * php7-soap-debuginfo-7.4.33-150200.3.65.1 * php7-fpm-debuginfo-7.4.33-150200.3.65.1 * php7-fastcgi-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-debuginfo-7.4.33-150200.3.65.1 * php7-dba-debuginfo-7.4.33-150200.3.65.1 * php7-tokenizer-7.4.33-150200.3.65.1 * php7-pdo-debuginfo-7.4.33-150200.3.65.1 * php7-opcache-7.4.33-150200.3.65.1 * php7-posix-debuginfo-7.4.33-150200.3.65.1 * php7-ftp-7.4.33-150200.3.65.1 * php7-bcmath-debuginfo-7.4.33-150200.3.65.1 * php7-zip-7.4.33-150200.3.65.1 * php7-zlib-7.4.33-150200.3.65.1 * php7-xsl-7.4.33-150200.3.65.1 * php7-zlib-debuginfo-7.4.33-150200.3.65.1 * php7-curl-debuginfo-7.4.33-150200.3.65.1 * php7-sodium-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-7.4.33-150200.3.65.1 * php7-mysql-debuginfo-7.4.33-150200.3.65.1 * php7-readline-7.4.33-150200.3.65.1 * php7-opcache-debuginfo-7.4.33-150200.3.65.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * php7-json-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-7.4.33-150200.3.65.1 * php7-fileinfo-7.4.33-150200.3.65.1 * php7-sockets-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-debuginfo-7.4.33-150200.3.65.1 * php7-sockets-7.4.33-150200.3.65.1 * php7-dom-debuginfo-7.4.33-150200.3.65.1 * php7-debuginfo-7.4.33-150200.3.65.1 * php7-gmp-7.4.33-150200.3.65.1 * php7-dba-7.4.33-150200.3.65.1 * php7-gmp-debuginfo-7.4.33-150200.3.65.1 * php7-intl-debuginfo-7.4.33-150200.3.65.1 * php7-snmp-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-7.4.33-150200.3.65.1 * php7-snmp-7.4.33-150200.3.65.1 * php7-bcmath-7.4.33-150200.3.65.1 * php7-devel-7.4.33-150200.3.65.1 * php7-gettext-debuginfo-7.4.33-150200.3.65.1 * php7-soap-7.4.33-150200.3.65.1 * php7-sysvshm-7.4.33-150200.3.65.1 * php7-debugsource-7.4.33-150200.3.65.1 * php7-ctype-7.4.33-150200.3.65.1 * php7-sysvsem-7.4.33-150200.3.65.1 * php7-iconv-7.4.33-150200.3.65.1 * php7-fastcgi-7.4.33-150200.3.65.1 * php7-ftp-debuginfo-7.4.33-150200.3.65.1 * php7-sysvshm-debuginfo-7.4.33-150200.3.65.1 * php7-json-7.4.33-150200.3.65.1 * php7-shmop-debuginfo-7.4.33-150200.3.65.1 * php7-xsl-debuginfo-7.4.33-150200.3.65.1 * php7-openssl-7.4.33-150200.3.65.1 * php7-bz2-debuginfo-7.4.33-150200.3.65.1 * php7-intl-7.4.33-150200.3.65.1 * php7-fileinfo-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-debuginfo-7.4.33-150200.3.65.1 * php7-zip-debuginfo-7.4.33-150200.3.65.1 * php7-posix-7.4.33-150200.3.65.1 * php7-enchant-7.4.33-150200.3.65.1 * php7-sysvmsg-debuginfo-7.4.33-150200.3.65.1 * php7-bz2-7.4.33-150200.3.65.1 * php7-ldap-debuginfo-7.4.33-150200.3.65.1 * php7-sysvmsg-7.4.33-150200.3.65.1 * php7-pgsql-7.4.33-150200.3.65.1 * php7-phar-7.4.33-150200.3.65.1 * php7-mbstring-debuginfo-7.4.33-150200.3.65.1 * php7-exif-debuginfo-7.4.33-150200.3.65.1 * php7-odbc-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-7.4.33-150200.3.65.1 * php7-sodium-7.4.33-150200.3.65.1 * php7-phar-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-debuginfo-7.4.33-150200.3.65.1 * php7-pgsql-debuginfo-7.4.33-150200.3.65.1 * php7-gd-7.4.33-150200.3.65.1 * php7-odbc-7.4.33-150200.3.65.1 * php7-ctype-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-debuginfo-7.4.33-150200.3.65.1 * php7-pcntl-7.4.33-150200.3.65.1 * php7-ldap-7.4.33-150200.3.65.1 * php7-pcntl-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-7.4.33-150200.3.65.1 * php7-gd-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-7.4.33-150200.3.65.1 * php7-exif-7.4.33-150200.3.65.1 * php7-mbstring-7.4.33-150200.3.65.1 * php7-openssl-debuginfo-7.4.33-150200.3.65.1 * php7-gettext-7.4.33-150200.3.65.1 * php7-pdo-7.4.33-150200.3.65.1 * php7-tokenizer-debuginfo-7.4.33-150200.3.65.1 * php7-enchant-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-7.4.33-150200.3.65.1 * php7-readline-debuginfo-7.4.33-150200.3.65.1 * php7-shmop-7.4.33-150200.3.65.1 * php7-dom-7.4.33-150200.3.65.1 * php7-sysvsem-debuginfo-7.4.33-150200.3.65.1 * php7-curl-7.4.33-150200.3.65.1 * php7-fpm-7.4.33-150200.3.65.1 * php7-mysql-7.4.33-150200.3.65.1 * php7-iconv-debuginfo-7.4.33-150200.3.65.1 * php7-7.4.33-150200.3.65.1 * php7-soap-debuginfo-7.4.33-150200.3.65.1 * php7-fpm-debuginfo-7.4.33-150200.3.65.1 * php7-fastcgi-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-debuginfo-7.4.33-150200.3.65.1 * php7-dba-debuginfo-7.4.33-150200.3.65.1 * php7-tokenizer-7.4.33-150200.3.65.1 * php7-pdo-debuginfo-7.4.33-150200.3.65.1 * php7-opcache-7.4.33-150200.3.65.1 * php7-posix-debuginfo-7.4.33-150200.3.65.1 * php7-ftp-7.4.33-150200.3.65.1 * php7-bcmath-debuginfo-7.4.33-150200.3.65.1 * php7-zip-7.4.33-150200.3.65.1 * php7-zlib-7.4.33-150200.3.65.1 * php7-xsl-7.4.33-150200.3.65.1 * php7-zlib-debuginfo-7.4.33-150200.3.65.1 * php7-curl-debuginfo-7.4.33-150200.3.65.1 * php7-sodium-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-7.4.33-150200.3.65.1 * php7-mysql-debuginfo-7.4.33-150200.3.65.1 * php7-readline-7.4.33-150200.3.65.1 * php7-opcache-debuginfo-7.4.33-150200.3.65.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * php7-json-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-7.4.33-150200.3.65.1 * php7-fileinfo-7.4.33-150200.3.65.1 * php7-sockets-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-debuginfo-7.4.33-150200.3.65.1 * php7-sockets-7.4.33-150200.3.65.1 * php7-dom-debuginfo-7.4.33-150200.3.65.1 * php7-debuginfo-7.4.33-150200.3.65.1 * php7-gmp-7.4.33-150200.3.65.1 * php7-dba-7.4.33-150200.3.65.1 * php7-gmp-debuginfo-7.4.33-150200.3.65.1 * php7-intl-debuginfo-7.4.33-150200.3.65.1 * php7-snmp-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-7.4.33-150200.3.65.1 * php7-snmp-7.4.33-150200.3.65.1 * php7-bcmath-7.4.33-150200.3.65.1 * php7-devel-7.4.33-150200.3.65.1 * php7-gettext-debuginfo-7.4.33-150200.3.65.1 * php7-soap-7.4.33-150200.3.65.1 * php7-sysvshm-7.4.33-150200.3.65.1 * php7-debugsource-7.4.33-150200.3.65.1 * php7-ctype-7.4.33-150200.3.65.1 * php7-sysvsem-7.4.33-150200.3.65.1 * php7-iconv-7.4.33-150200.3.65.1 * php7-fastcgi-7.4.33-150200.3.65.1 * php7-ftp-debuginfo-7.4.33-150200.3.65.1 * php7-sysvshm-debuginfo-7.4.33-150200.3.65.1 * php7-json-7.4.33-150200.3.65.1 * php7-shmop-debuginfo-7.4.33-150200.3.65.1 * php7-xsl-debuginfo-7.4.33-150200.3.65.1 * php7-openssl-7.4.33-150200.3.65.1 * php7-bz2-debuginfo-7.4.33-150200.3.65.1 * php7-intl-7.4.33-150200.3.65.1 * php7-fileinfo-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-debuginfo-7.4.33-150200.3.65.1 * php7-zip-debuginfo-7.4.33-150200.3.65.1 * php7-posix-7.4.33-150200.3.65.1 * php7-enchant-7.4.33-150200.3.65.1 * php7-sysvmsg-debuginfo-7.4.33-150200.3.65.1 * php7-bz2-7.4.33-150200.3.65.1 * php7-ldap-debuginfo-7.4.33-150200.3.65.1 * php7-sysvmsg-7.4.33-150200.3.65.1 * php7-pgsql-7.4.33-150200.3.65.1 * php7-phar-7.4.33-150200.3.65.1 * php7-mbstring-debuginfo-7.4.33-150200.3.65.1 * php7-exif-debuginfo-7.4.33-150200.3.65.1 * php7-odbc-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-7.4.33-150200.3.65.1 * php7-sodium-7.4.33-150200.3.65.1 * php7-phar-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-debuginfo-7.4.33-150200.3.65.1 * php7-pgsql-debuginfo-7.4.33-150200.3.65.1 * php7-gd-7.4.33-150200.3.65.1 * php7-odbc-7.4.33-150200.3.65.1 * php7-ctype-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-debuginfo-7.4.33-150200.3.65.1 * php7-pcntl-7.4.33-150200.3.65.1 * php7-ldap-7.4.33-150200.3.65.1 * php7-pcntl-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-7.4.33-150200.3.65.1 * php7-gd-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-7.4.33-150200.3.65.1 * php7-exif-7.4.33-150200.3.65.1 * php7-mbstring-7.4.33-150200.3.65.1 * php7-openssl-debuginfo-7.4.33-150200.3.65.1 * php7-gettext-7.4.33-150200.3.65.1 * php7-pdo-7.4.33-150200.3.65.1 * php7-tokenizer-debuginfo-7.4.33-150200.3.65.1 * php7-enchant-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-7.4.33-150200.3.65.1 * php7-readline-debuginfo-7.4.33-150200.3.65.1 * php7-shmop-7.4.33-150200.3.65.1 * php7-dom-7.4.33-150200.3.65.1 * php7-sysvsem-debuginfo-7.4.33-150200.3.65.1 * php7-curl-7.4.33-150200.3.65.1 * php7-fpm-7.4.33-150200.3.65.1 * php7-mysql-7.4.33-150200.3.65.1 * php7-iconv-debuginfo-7.4.33-150200.3.65.1 * php7-7.4.33-150200.3.65.1 * php7-soap-debuginfo-7.4.33-150200.3.65.1 * php7-fpm-debuginfo-7.4.33-150200.3.65.1 * php7-fastcgi-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-debuginfo-7.4.33-150200.3.65.1 * php7-dba-debuginfo-7.4.33-150200.3.65.1 * php7-tokenizer-7.4.33-150200.3.65.1 * php7-pdo-debuginfo-7.4.33-150200.3.65.1 * php7-opcache-7.4.33-150200.3.65.1 * php7-posix-debuginfo-7.4.33-150200.3.65.1 * php7-ftp-7.4.33-150200.3.65.1 * php7-bcmath-debuginfo-7.4.33-150200.3.65.1 * php7-zip-7.4.33-150200.3.65.1 * php7-zlib-7.4.33-150200.3.65.1 * php7-xsl-7.4.33-150200.3.65.1 * php7-zlib-debuginfo-7.4.33-150200.3.65.1 * php7-curl-debuginfo-7.4.33-150200.3.65.1 * php7-sodium-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-7.4.33-150200.3.65.1 * php7-mysql-debuginfo-7.4.33-150200.3.65.1 * php7-readline-7.4.33-150200.3.65.1 * php7-opcache-debuginfo-7.4.33-150200.3.65.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * php7-json-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-7.4.33-150200.3.65.1 * php7-fileinfo-7.4.33-150200.3.65.1 * php7-sockets-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-debuginfo-7.4.33-150200.3.65.1 * php7-sockets-7.4.33-150200.3.65.1 * php7-dom-debuginfo-7.4.33-150200.3.65.1 * php7-debuginfo-7.4.33-150200.3.65.1 * php7-gmp-7.4.33-150200.3.65.1 * php7-dba-7.4.33-150200.3.65.1 * php7-gmp-debuginfo-7.4.33-150200.3.65.1 * php7-intl-debuginfo-7.4.33-150200.3.65.1 * php7-snmp-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-7.4.33-150200.3.65.1 * php7-snmp-7.4.33-150200.3.65.1 * php7-bcmath-7.4.33-150200.3.65.1 * php7-devel-7.4.33-150200.3.65.1 * php7-gettext-debuginfo-7.4.33-150200.3.65.1 * php7-soap-7.4.33-150200.3.65.1 * php7-sysvshm-7.4.33-150200.3.65.1 * php7-debugsource-7.4.33-150200.3.65.1 * php7-ctype-7.4.33-150200.3.65.1 * php7-sysvsem-7.4.33-150200.3.65.1 * php7-iconv-7.4.33-150200.3.65.1 * php7-fastcgi-7.4.33-150200.3.65.1 * php7-ftp-debuginfo-7.4.33-150200.3.65.1 * php7-sysvshm-debuginfo-7.4.33-150200.3.65.1 * php7-json-7.4.33-150200.3.65.1 * php7-shmop-debuginfo-7.4.33-150200.3.65.1 * php7-xsl-debuginfo-7.4.33-150200.3.65.1 * php7-openssl-7.4.33-150200.3.65.1 * php7-bz2-debuginfo-7.4.33-150200.3.65.1 * php7-intl-7.4.33-150200.3.65.1 * php7-fileinfo-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-debuginfo-7.4.33-150200.3.65.1 * php7-zip-debuginfo-7.4.33-150200.3.65.1 * php7-posix-7.4.33-150200.3.65.1 * php7-enchant-7.4.33-150200.3.65.1 * php7-sysvmsg-debuginfo-7.4.33-150200.3.65.1 * php7-bz2-7.4.33-150200.3.65.1 * php7-ldap-debuginfo-7.4.33-150200.3.65.1 * php7-sysvmsg-7.4.33-150200.3.65.1 * php7-pgsql-7.4.33-150200.3.65.1 * php7-phar-7.4.33-150200.3.65.1 * php7-mbstring-debuginfo-7.4.33-150200.3.65.1 * php7-exif-debuginfo-7.4.33-150200.3.65.1 * php7-odbc-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-7.4.33-150200.3.65.1 * php7-sodium-7.4.33-150200.3.65.1 * php7-phar-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-debuginfo-7.4.33-150200.3.65.1 * php7-pgsql-debuginfo-7.4.33-150200.3.65.1 * php7-gd-7.4.33-150200.3.65.1 * php7-odbc-7.4.33-150200.3.65.1 * php7-ctype-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-debuginfo-7.4.33-150200.3.65.1 * php7-pcntl-7.4.33-150200.3.65.1 * php7-ldap-7.4.33-150200.3.65.1 * php7-pcntl-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-7.4.33-150200.3.65.1 * php7-gd-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-7.4.33-150200.3.65.1 * php7-exif-7.4.33-150200.3.65.1 * php7-mbstring-7.4.33-150200.3.65.1 * php7-openssl-debuginfo-7.4.33-150200.3.65.1 * php7-gettext-7.4.33-150200.3.65.1 * php7-pdo-7.4.33-150200.3.65.1 * php7-tokenizer-debuginfo-7.4.33-150200.3.65.1 * php7-enchant-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-7.4.33-150200.3.65.1 * php7-readline-debuginfo-7.4.33-150200.3.65.1 * php7-shmop-7.4.33-150200.3.65.1 * php7-dom-7.4.33-150200.3.65.1 * php7-sysvsem-debuginfo-7.4.33-150200.3.65.1 * php7-curl-7.4.33-150200.3.65.1 * php7-fpm-7.4.33-150200.3.65.1 * php7-mysql-7.4.33-150200.3.65.1 * php7-iconv-debuginfo-7.4.33-150200.3.65.1 * php7-7.4.33-150200.3.65.1 * php7-soap-debuginfo-7.4.33-150200.3.65.1 * php7-fpm-debuginfo-7.4.33-150200.3.65.1 * php7-fastcgi-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-debuginfo-7.4.33-150200.3.65.1 * php7-dba-debuginfo-7.4.33-150200.3.65.1 * php7-tokenizer-7.4.33-150200.3.65.1 * php7-pdo-debuginfo-7.4.33-150200.3.65.1 * php7-opcache-7.4.33-150200.3.65.1 * php7-posix-debuginfo-7.4.33-150200.3.65.1 * php7-ftp-7.4.33-150200.3.65.1 * php7-bcmath-debuginfo-7.4.33-150200.3.65.1 * php7-zip-7.4.33-150200.3.65.1 * php7-zlib-7.4.33-150200.3.65.1 * php7-xsl-7.4.33-150200.3.65.1 * php7-zlib-debuginfo-7.4.33-150200.3.65.1 * php7-curl-debuginfo-7.4.33-150200.3.65.1 * php7-sodium-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-7.4.33-150200.3.65.1 * php7-mysql-debuginfo-7.4.33-150200.3.65.1 * php7-readline-7.4.33-150200.3.65.1 * php7-opcache-debuginfo-7.4.33-150200.3.65.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * php7-json-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-7.4.33-150200.3.65.1 * php7-fileinfo-7.4.33-150200.3.65.1 * php7-sockets-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-debuginfo-7.4.33-150200.3.65.1 * php7-sockets-7.4.33-150200.3.65.1 * php7-dom-debuginfo-7.4.33-150200.3.65.1 * php7-debuginfo-7.4.33-150200.3.65.1 * php7-gmp-7.4.33-150200.3.65.1 * php7-dba-7.4.33-150200.3.65.1 * php7-gmp-debuginfo-7.4.33-150200.3.65.1 * php7-intl-debuginfo-7.4.33-150200.3.65.1 * php7-snmp-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-7.4.33-150200.3.65.1 * php7-snmp-7.4.33-150200.3.65.1 * php7-bcmath-7.4.33-150200.3.65.1 * php7-devel-7.4.33-150200.3.65.1 * php7-gettext-debuginfo-7.4.33-150200.3.65.1 * php7-soap-7.4.33-150200.3.65.1 * php7-sysvshm-7.4.33-150200.3.65.1 * php7-debugsource-7.4.33-150200.3.65.1 * php7-ctype-7.4.33-150200.3.65.1 * php7-sysvsem-7.4.33-150200.3.65.1 * php7-iconv-7.4.33-150200.3.65.1 * php7-fastcgi-7.4.33-150200.3.65.1 * php7-ftp-debuginfo-7.4.33-150200.3.65.1 * php7-sysvshm-debuginfo-7.4.33-150200.3.65.1 * php7-json-7.4.33-150200.3.65.1 * php7-shmop-debuginfo-7.4.33-150200.3.65.1 * php7-xsl-debuginfo-7.4.33-150200.3.65.1 * php7-openssl-7.4.33-150200.3.65.1 * php7-bz2-debuginfo-7.4.33-150200.3.65.1 * php7-intl-7.4.33-150200.3.65.1 * php7-fileinfo-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-debuginfo-7.4.33-150200.3.65.1 * php7-zip-debuginfo-7.4.33-150200.3.65.1 * php7-posix-7.4.33-150200.3.65.1 * php7-enchant-7.4.33-150200.3.65.1 * php7-sysvmsg-debuginfo-7.4.33-150200.3.65.1 * php7-bz2-7.4.33-150200.3.65.1 * php7-ldap-debuginfo-7.4.33-150200.3.65.1 * php7-sysvmsg-7.4.33-150200.3.65.1 * php7-pgsql-7.4.33-150200.3.65.1 * php7-phar-7.4.33-150200.3.65.1 * php7-mbstring-debuginfo-7.4.33-150200.3.65.1 * php7-exif-debuginfo-7.4.33-150200.3.65.1 * php7-odbc-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-7.4.33-150200.3.65.1 * php7-sodium-7.4.33-150200.3.65.1 * php7-phar-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-debuginfo-7.4.33-150200.3.65.1 * php7-pgsql-debuginfo-7.4.33-150200.3.65.1 * php7-gd-7.4.33-150200.3.65.1 * php7-odbc-7.4.33-150200.3.65.1 * php7-ctype-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-debuginfo-7.4.33-150200.3.65.1 * php7-pcntl-7.4.33-150200.3.65.1 * php7-ldap-7.4.33-150200.3.65.1 * php7-pcntl-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-7.4.33-150200.3.65.1 * php7-gd-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-7.4.33-150200.3.65.1 * php7-exif-7.4.33-150200.3.65.1 * php7-mbstring-7.4.33-150200.3.65.1 * php7-openssl-debuginfo-7.4.33-150200.3.65.1 * php7-gettext-7.4.33-150200.3.65.1 * php7-pdo-7.4.33-150200.3.65.1 * php7-tokenizer-debuginfo-7.4.33-150200.3.65.1 * php7-enchant-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-7.4.33-150200.3.65.1 * php7-readline-debuginfo-7.4.33-150200.3.65.1 * php7-shmop-7.4.33-150200.3.65.1 * php7-dom-7.4.33-150200.3.65.1 * php7-sysvsem-debuginfo-7.4.33-150200.3.65.1 * php7-curl-7.4.33-150200.3.65.1 * php7-fpm-7.4.33-150200.3.65.1 * php7-mysql-7.4.33-150200.3.65.1 * php7-iconv-debuginfo-7.4.33-150200.3.65.1 * php7-7.4.33-150200.3.65.1 * php7-soap-debuginfo-7.4.33-150200.3.65.1 * php7-fpm-debuginfo-7.4.33-150200.3.65.1 * php7-fastcgi-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-debuginfo-7.4.33-150200.3.65.1 * php7-dba-debuginfo-7.4.33-150200.3.65.1 * php7-tokenizer-7.4.33-150200.3.65.1 * php7-pdo-debuginfo-7.4.33-150200.3.65.1 * php7-opcache-7.4.33-150200.3.65.1 * php7-posix-debuginfo-7.4.33-150200.3.65.1 * php7-ftp-7.4.33-150200.3.65.1 * php7-bcmath-debuginfo-7.4.33-150200.3.65.1 * php7-zip-7.4.33-150200.3.65.1 * php7-zlib-7.4.33-150200.3.65.1 * php7-xsl-7.4.33-150200.3.65.1 * php7-zlib-debuginfo-7.4.33-150200.3.65.1 * php7-curl-debuginfo-7.4.33-150200.3.65.1 * php7-sodium-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-7.4.33-150200.3.65.1 * php7-mysql-debuginfo-7.4.33-150200.3.65.1 * php7-readline-7.4.33-150200.3.65.1 * php7-opcache-debuginfo-7.4.33-150200.3.65.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * php7-json-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-7.4.33-150200.3.65.1 * php7-fileinfo-7.4.33-150200.3.65.1 * php7-sockets-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-debuginfo-7.4.33-150200.3.65.1 * php7-sockets-7.4.33-150200.3.65.1 * php7-dom-debuginfo-7.4.33-150200.3.65.1 * php7-debuginfo-7.4.33-150200.3.65.1 * php7-gmp-7.4.33-150200.3.65.1 * php7-dba-7.4.33-150200.3.65.1 * php7-gmp-debuginfo-7.4.33-150200.3.65.1 * php7-intl-debuginfo-7.4.33-150200.3.65.1 * php7-snmp-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-7.4.33-150200.3.65.1 * php7-snmp-7.4.33-150200.3.65.1 * php7-bcmath-7.4.33-150200.3.65.1 * php7-devel-7.4.33-150200.3.65.1 * php7-gettext-debuginfo-7.4.33-150200.3.65.1 * php7-soap-7.4.33-150200.3.65.1 * php7-sysvshm-7.4.33-150200.3.65.1 * php7-debugsource-7.4.33-150200.3.65.1 * php7-ctype-7.4.33-150200.3.65.1 * php7-sysvsem-7.4.33-150200.3.65.1 * php7-iconv-7.4.33-150200.3.65.1 * php7-fastcgi-7.4.33-150200.3.65.1 * php7-ftp-debuginfo-7.4.33-150200.3.65.1 * php7-sysvshm-debuginfo-7.4.33-150200.3.65.1 * php7-json-7.4.33-150200.3.65.1 * php7-shmop-debuginfo-7.4.33-150200.3.65.1 * php7-xsl-debuginfo-7.4.33-150200.3.65.1 * php7-openssl-7.4.33-150200.3.65.1 * php7-bz2-debuginfo-7.4.33-150200.3.65.1 * php7-intl-7.4.33-150200.3.65.1 * php7-fileinfo-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-debuginfo-7.4.33-150200.3.65.1 * php7-zip-debuginfo-7.4.33-150200.3.65.1 * php7-posix-7.4.33-150200.3.65.1 * php7-enchant-7.4.33-150200.3.65.1 * php7-sysvmsg-debuginfo-7.4.33-150200.3.65.1 * php7-bz2-7.4.33-150200.3.65.1 * php7-ldap-debuginfo-7.4.33-150200.3.65.1 * php7-sysvmsg-7.4.33-150200.3.65.1 * php7-pgsql-7.4.33-150200.3.65.1 * php7-phar-7.4.33-150200.3.65.1 * php7-mbstring-debuginfo-7.4.33-150200.3.65.1 * php7-exif-debuginfo-7.4.33-150200.3.65.1 * php7-odbc-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-7.4.33-150200.3.65.1 * php7-sodium-7.4.33-150200.3.65.1 * php7-phar-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-debuginfo-7.4.33-150200.3.65.1 * php7-pgsql-debuginfo-7.4.33-150200.3.65.1 * php7-gd-7.4.33-150200.3.65.1 * php7-odbc-7.4.33-150200.3.65.1 * php7-ctype-debuginfo-7.4.33-150200.3.65.1 * apache2-mod_php7-debuginfo-7.4.33-150200.3.65.1 * php7-sqlite-debuginfo-7.4.33-150200.3.65.1 * php7-pcntl-7.4.33-150200.3.65.1 * php7-ldap-7.4.33-150200.3.65.1 * php7-pcntl-debuginfo-7.4.33-150200.3.65.1 * php7-xmlwriter-7.4.33-150200.3.65.1 * php7-gd-debuginfo-7.4.33-150200.3.65.1 * php7-calendar-7.4.33-150200.3.65.1 * php7-exif-7.4.33-150200.3.65.1 * php7-mbstring-7.4.33-150200.3.65.1 * php7-openssl-debuginfo-7.4.33-150200.3.65.1 * php7-gettext-7.4.33-150200.3.65.1 * php7-pdo-7.4.33-150200.3.65.1 * php7-tokenizer-debuginfo-7.4.33-150200.3.65.1 * php7-enchant-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-7.4.33-150200.3.65.1 * php7-readline-debuginfo-7.4.33-150200.3.65.1 * php7-shmop-7.4.33-150200.3.65.1 * php7-dom-7.4.33-150200.3.65.1 * php7-sysvsem-debuginfo-7.4.33-150200.3.65.1 * php7-curl-7.4.33-150200.3.65.1 * php7-fpm-7.4.33-150200.3.65.1 * php7-mysql-7.4.33-150200.3.65.1 * php7-iconv-debuginfo-7.4.33-150200.3.65.1 * php7-7.4.33-150200.3.65.1 * php7-soap-debuginfo-7.4.33-150200.3.65.1 * php7-fpm-debuginfo-7.4.33-150200.3.65.1 * php7-fastcgi-debuginfo-7.4.33-150200.3.65.1 * php7-tidy-debuginfo-7.4.33-150200.3.65.1 * php7-xmlrpc-debuginfo-7.4.33-150200.3.65.1 * php7-dba-debuginfo-7.4.33-150200.3.65.1 * php7-tokenizer-7.4.33-150200.3.65.1 * php7-pdo-debuginfo-7.4.33-150200.3.65.1 * php7-opcache-7.4.33-150200.3.65.1 * php7-posix-debuginfo-7.4.33-150200.3.65.1 * php7-ftp-7.4.33-150200.3.65.1 * php7-bcmath-debuginfo-7.4.33-150200.3.65.1 * php7-zip-7.4.33-150200.3.65.1 * php7-zlib-7.4.33-150200.3.65.1 * php7-xsl-7.4.33-150200.3.65.1 * php7-zlib-debuginfo-7.4.33-150200.3.65.1 * php7-curl-debuginfo-7.4.33-150200.3.65.1 * php7-sodium-debuginfo-7.4.33-150200.3.65.1 * php7-xmlreader-7.4.33-150200.3.65.1 * php7-mysql-debuginfo-7.4.33-150200.3.65.1 * php7-readline-7.4.33-150200.3.65.1 * php7-opcache-debuginfo-7.4.33-150200.3.65.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2756.html * https://www.suse.com/security/cve/CVE-2024-3096.html * https://www.suse.com/security/cve/CVE-2024-5458.html * https://bugzilla.suse.com/show_bug.cgi?id=1222857 * https://bugzilla.suse.com/show_bug.cgi?id=1222858 * https://bugzilla.suse.com/show_bug.cgi?id=1226073 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 08:30:26 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 08:30:26 -0000 Subject: SUSE-SU-2024:2036-1: important: Security update for openssl-1_1 Message-ID: <171861302639.20155.2799690238580099351@smelt2.prg2.suse.org> # Security update for openssl-1_1 Announcement ID: SUSE-SU-2024:2036-1 Rating: important References: * bsc#1225551 Cross-References: * CVE-2024-4741 CVSS scores: * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-1_1 fixes the following issues: * CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2036=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2036=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2036=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2036=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * openssl-1_1-debuginfo-1.1.1d-2.107.1 * openssl-1_1-debugsource-1.1.1d-2.107.1 * libopenssl-1_1-devel-1.1.1d-2.107.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (s390x x86_64) * libopenssl-1_1-devel-32bit-1.1.1d-2.107.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * openssl-1_1-1.1.1d-2.107.1 * libopenssl1_1-1.1.1d-2.107.1 * libopenssl1_1-debuginfo-1.1.1d-2.107.1 * openssl-1_1-debuginfo-1.1.1d-2.107.1 * openssl-1_1-debugsource-1.1.1d-2.107.1 * libopenssl1_1-hmac-1.1.1d-2.107.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libopenssl1_1-32bit-1.1.1d-2.107.1 * libopenssl1_1-debuginfo-32bit-1.1.1d-2.107.1 * libopenssl1_1-hmac-32bit-1.1.1d-2.107.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * openssl-1_1-1.1.1d-2.107.1 * libopenssl1_1-1.1.1d-2.107.1 * libopenssl1_1-debuginfo-1.1.1d-2.107.1 * openssl-1_1-debuginfo-1.1.1d-2.107.1 * openssl-1_1-debugsource-1.1.1d-2.107.1 * libopenssl1_1-hmac-1.1.1d-2.107.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libopenssl1_1-32bit-1.1.1d-2.107.1 * libopenssl1_1-debuginfo-32bit-1.1.1d-2.107.1 * libopenssl1_1-hmac-32bit-1.1.1d-2.107.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * openssl-1_1-1.1.1d-2.107.1 * libopenssl1_1-1.1.1d-2.107.1 * libopenssl1_1-debuginfo-1.1.1d-2.107.1 * openssl-1_1-debuginfo-1.1.1d-2.107.1 * openssl-1_1-debugsource-1.1.1d-2.107.1 * libopenssl1_1-hmac-1.1.1d-2.107.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libopenssl1_1-32bit-1.1.1d-2.107.1 * libopenssl1_1-debuginfo-32bit-1.1.1d-2.107.1 * libopenssl1_1-hmac-32bit-1.1.1d-2.107.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4741.html * https://bugzilla.suse.com/show_bug.cgi?id=1225551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 08:30:30 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 08:30:30 -0000 Subject: SUSE-SU-2024:2035-1: important: Security update for openssl-1_1 Message-ID: <171861303010.20155.9838857937829034666@smelt2.prg2.suse.org> # Security update for openssl-1_1 Announcement ID: SUSE-SU-2024:2035-1 Rating: important References: * bsc#1225551 Cross-References: * CVE-2024-4741 CVSS scores: * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-1_1 fixes the following issues: * CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2035=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2035=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2035=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2035=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2035=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2035=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2035=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2035=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2035=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2035=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libopenssl-1_1-devel-1.1.1d-150200.11.91.1 * openssl-1_1-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-1.1.1d-150200.11.91.1 * openssl-1_1-debugsource-1.1.1d-150200.11.91.1 * libopenssl1_1-debuginfo-1.1.1d-150200.11.91.1 * openssl-1_1-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libopenssl1_1-32bit-1.1.1d-150200.11.91.1 * libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-32bit-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libopenssl-1_1-devel-1.1.1d-150200.11.91.1 * openssl-1_1-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-1.1.1d-150200.11.91.1 * openssl-1_1-debugsource-1.1.1d-150200.11.91.1 * libopenssl1_1-debuginfo-1.1.1d-150200.11.91.1 * openssl-1_1-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * openssl-1_1-doc-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libopenssl1_1-32bit-1.1.1d-150200.11.91.1 * libopenssl-1_1-devel-32bit-1.1.1d-150200.11.91.1 * libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-32bit-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libopenssl-1_1-devel-1.1.1d-150200.11.91.1 * openssl-1_1-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-1.1.1d-150200.11.91.1 * openssl-1_1-debugsource-1.1.1d-150200.11.91.1 * libopenssl1_1-debuginfo-1.1.1d-150200.11.91.1 * openssl-1_1-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libopenssl1_1-32bit-1.1.1d-150200.11.91.1 * libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-32bit-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libopenssl-1_1-devel-1.1.1d-150200.11.91.1 * openssl-1_1-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-1.1.1d-150200.11.91.1 * openssl-1_1-debugsource-1.1.1d-150200.11.91.1 * libopenssl1_1-debuginfo-1.1.1d-150200.11.91.1 * openssl-1_1-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * openssl-1_1-doc-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libopenssl1_1-32bit-1.1.1d-150200.11.91.1 * libopenssl-1_1-devel-32bit-1.1.1d-150200.11.91.1 * libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-32bit-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libopenssl-1_1-devel-1.1.1d-150200.11.91.1 * openssl-1_1-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-1.1.1d-150200.11.91.1 * openssl-1_1-debugsource-1.1.1d-150200.11.91.1 * libopenssl1_1-debuginfo-1.1.1d-150200.11.91.1 * openssl-1_1-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libopenssl1_1-32bit-1.1.1d-150200.11.91.1 * libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-32bit-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libopenssl-1_1-devel-1.1.1d-150200.11.91.1 * openssl-1_1-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-1.1.1d-150200.11.91.1 * openssl-1_1-debugsource-1.1.1d-150200.11.91.1 * libopenssl1_1-debuginfo-1.1.1d-150200.11.91.1 * openssl-1_1-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * openssl-1_1-doc-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libopenssl1_1-32bit-1.1.1d-150200.11.91.1 * libopenssl-1_1-devel-32bit-1.1.1d-150200.11.91.1 * libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-32bit-1.1.1d-150200.11.91.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libopenssl-1_1-devel-1.1.1d-150200.11.91.1 * openssl-1_1-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-1.1.1d-150200.11.91.1 * openssl-1_1-debugsource-1.1.1d-150200.11.91.1 * libopenssl1_1-debuginfo-1.1.1d-150200.11.91.1 * openssl-1_1-1.1.1d-150200.11.91.1 * SUSE Enterprise Storage 7.1 (noarch) * openssl-1_1-doc-1.1.1d-150200.11.91.1 * SUSE Enterprise Storage 7.1 (x86_64) * libopenssl1_1-32bit-1.1.1d-150200.11.91.1 * libopenssl-1_1-devel-32bit-1.1.1d-150200.11.91.1 * libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-32bit-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libopenssl-1_1-devel-1.1.1d-150200.11.91.1 * openssl-1_1-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-1.1.1d-150200.11.91.1 * openssl-1_1-debugsource-1.1.1d-150200.11.91.1 * libopenssl1_1-debuginfo-1.1.1d-150200.11.91.1 * openssl-1_1-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libopenssl-1_1-devel-1.1.1d-150200.11.91.1 * openssl-1_1-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-1.1.1d-150200.11.91.1 * openssl-1_1-debugsource-1.1.1d-150200.11.91.1 * libopenssl1_1-debuginfo-1.1.1d-150200.11.91.1 * openssl-1_1-1.1.1d-150200.11.91.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libopenssl-1_1-devel-1.1.1d-150200.11.91.1 * openssl-1_1-debuginfo-1.1.1d-150200.11.91.1 * libopenssl1_1-1.1.1d-150200.11.91.1 * libopenssl1_1-hmac-1.1.1d-150200.11.91.1 * openssl-1_1-debugsource-1.1.1d-150200.11.91.1 * libopenssl1_1-debuginfo-1.1.1d-150200.11.91.1 * openssl-1_1-1.1.1d-150200.11.91.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4741.html * https://bugzilla.suse.com/show_bug.cgi?id=1225551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 08:30:32 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 08:30:32 -0000 Subject: SUSE-RU-2024:2034-1: moderate: Recommended update for dpdk Message-ID: <171861303260.20155.9308009745986739781@smelt2.prg2.suse.org> # Recommended update for dpdk Announcement ID: SUSE-RU-2024:2034-1 Rating: moderate References: * bsc#1219990 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for dpdk fixes the following issue: * Fix dpdk_nic_bind 'python': No such file or directory (bsc#1219990) * Add requires for 'which' as dpdk-tools has its dependency ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2034=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2034=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2034=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2034=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2034=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2034=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2034=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2034=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * libdpdk-20_0-debuginfo-19.11.10-150400.4.15.13 * dpdk-19.11.10-150400.4.15.13 * dpdk-devel-19.11.10-150400.4.15.13 * libdpdk-20_0-19.11.10-150400.4.15.13 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-examples-debuginfo-19.11.10-150400.4.15.13 * dpdk-examples-19.11.10-150400.4.15.13 * dpdk-debuginfo-19.11.10-150400.4.15.13 * dpdk-tools-19.11.10-150400.4.15.13 * dpdk-debugsource-19.11.10-150400.4.15.13 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-tools-debuginfo-19.11.10-150400.4.15.13 * dpdk-devel-debuginfo-19.11.10-150400.4.15.13 * openSUSE Leap 15.4 (noarch) * dpdk-thunderx-doc-19.11.10-150400.4.15.13 * dpdk-doc-19.11.10-150400.4.15.13 * openSUSE Leap 15.4 (aarch64) * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-thunderx-devel-19.11.10-150400.4.15.13 * dpdk-thunderx-tools-19.11.10-150400.4.15.13 * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.15.13 * dpdk-thunderx-19.11.10-150400.4.15.13 * dpdk-thunderx-debugsource-19.11.10-150400.4.15.13 * dpdk-thunderx-examples-debuginfo-19.11.10-150400.4.15.13 * dpdk-thunderx-tools-debuginfo-19.11.10-150400.4.15.13 * dpdk-thunderx-debuginfo-19.11.10-150400.4.15.13 * dpdk-thunderx-examples-19.11.10-150400.4.15.13 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libdpdk-20_0-debuginfo-19.11.10-150400.4.15.13 * dpdk-19.11.10-150400.4.15.13 * dpdk-devel-19.11.10-150400.4.15.13 * libdpdk-20_0-19.11.10-150400.4.15.13 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-debuginfo-19.11.10-150400.4.15.13 * dpdk-tools-19.11.10-150400.4.15.13 * dpdk-debugsource-19.11.10-150400.4.15.13 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-tools-debuginfo-19.11.10-150400.4.15.13 * dpdk-devel-debuginfo-19.11.10-150400.4.15.13 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-thunderx-devel-19.11.10-150400.4.15.13 * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.15.13 * dpdk-thunderx-19.11.10-150400.4.15.13 * dpdk-thunderx-debugsource-19.11.10-150400.4.15.13 * dpdk-thunderx-debuginfo-19.11.10-150400.4.15.13 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libdpdk-20_0-debuginfo-19.11.10-150400.4.15.13 * dpdk-19.11.10-150400.4.15.13 * dpdk-devel-19.11.10-150400.4.15.13 * libdpdk-20_0-19.11.10-150400.4.15.13 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-debuginfo-19.11.10-150400.4.15.13 * dpdk-tools-19.11.10-150400.4.15.13 * dpdk-debugsource-19.11.10-150400.4.15.13 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-tools-debuginfo-19.11.10-150400.4.15.13 * dpdk-devel-debuginfo-19.11.10-150400.4.15.13 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-thunderx-devel-19.11.10-150400.4.15.13 * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.15.13 * dpdk-thunderx-19.11.10-150400.4.15.13 * dpdk-thunderx-debugsource-19.11.10-150400.4.15.13 * dpdk-thunderx-debuginfo-19.11.10-150400.4.15.13 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * libdpdk-20_0-debuginfo-19.11.10-150400.4.15.13 * dpdk-19.11.10-150400.4.15.13 * dpdk-devel-19.11.10-150400.4.15.13 * libdpdk-20_0-19.11.10-150400.4.15.13 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-debuginfo-19.11.10-150400.4.15.13 * dpdk-tools-19.11.10-150400.4.15.13 * dpdk-debugsource-19.11.10-150400.4.15.13 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-tools-debuginfo-19.11.10-150400.4.15.13 * dpdk-devel-debuginfo-19.11.10-150400.4.15.13 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-thunderx-devel-19.11.10-150400.4.15.13 * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.15.13 * dpdk-thunderx-19.11.10-150400.4.15.13 * dpdk-thunderx-debugsource-19.11.10-150400.4.15.13 * dpdk-thunderx-debuginfo-19.11.10-150400.4.15.13 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libdpdk-20_0-debuginfo-19.11.10-150400.4.15.13 * dpdk-19.11.10-150400.4.15.13 * dpdk-devel-19.11.10-150400.4.15.13 * libdpdk-20_0-19.11.10-150400.4.15.13 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-debuginfo-19.11.10-150400.4.15.13 * dpdk-tools-19.11.10-150400.4.15.13 * dpdk-debugsource-19.11.10-150400.4.15.13 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-tools-debuginfo-19.11.10-150400.4.15.13 * dpdk-devel-debuginfo-19.11.10-150400.4.15.13 * SUSE Manager Proxy 4.3 (x86_64) * libdpdk-20_0-debuginfo-19.11.10-150400.4.15.13 * dpdk-19.11.10-150400.4.15.13 * dpdk-devel-19.11.10-150400.4.15.13 * libdpdk-20_0-19.11.10-150400.4.15.13 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-debuginfo-19.11.10-150400.4.15.13 * dpdk-tools-19.11.10-150400.4.15.13 * dpdk-debugsource-19.11.10-150400.4.15.13 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-tools-debuginfo-19.11.10-150400.4.15.13 * dpdk-devel-debuginfo-19.11.10-150400.4.15.13 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libdpdk-20_0-debuginfo-19.11.10-150400.4.15.13 * dpdk-19.11.10-150400.4.15.13 * dpdk-devel-19.11.10-150400.4.15.13 * libdpdk-20_0-19.11.10-150400.4.15.13 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-debuginfo-19.11.10-150400.4.15.13 * dpdk-tools-19.11.10-150400.4.15.13 * dpdk-debugsource-19.11.10-150400.4.15.13 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-tools-debuginfo-19.11.10-150400.4.15.13 * dpdk-devel-debuginfo-19.11.10-150400.4.15.13 * SUSE Manager Server 4.3 (ppc64le x86_64) * libdpdk-20_0-debuginfo-19.11.10-150400.4.15.13 * dpdk-19.11.10-150400.4.15.13 * dpdk-devel-19.11.10-150400.4.15.13 * libdpdk-20_0-19.11.10-150400.4.15.13 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-debuginfo-19.11.10-150400.4.15.13 * dpdk-tools-19.11.10-150400.4.15.13 * dpdk-debugsource-19.11.10-150400.4.15.13 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.119-150400.4.15.13 * dpdk-tools-debuginfo-19.11.10-150400.4.15.13 * dpdk-devel-debuginfo-19.11.10-150400.4.15.13 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219990 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 08:30:35 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 08:30:35 -0000 Subject: SUSE-SU-2024:2033-1: important: Security update for bind Message-ID: <171861303597.20155.9047456830659244429@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2024:2033-1 Rating: important References: * bsc#1219823 * bsc#1219826 * bsc#1219851 * bsc#1219852 * bsc#1219854 Cross-References: * CVE-2023-4408 * CVE-2023-50387 * CVE-2023-50868 * CVE-2023-5517 * CVE-2023-6516 CVSS scores: * CVE-2023-4408 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-5517 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6516 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Client Tools for SLE Micro 5 An update that solves five vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2023-4408: Fixed denial of service during DNS message parsing with different names (bsc#1219851) * CVE-2023-50387: Fixed denial of service during DNS messages validation with DNSSEC signatures (bsc#1219823) * CVE-2023-50868: Fixed denial of service during NSEC3 closest encloser proof preparation (bsc#1219826) * CVE-2023-5517: Fixed denial of service caused by specific queries with nxdomain-redirect enabled (bsc#1219852) * CVE-2023-6516: Fixed denial of service caused by specific queries that continuously triggered cache database maintenance (bsc#1219854) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2033=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2033=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2033=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-2033=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libbind9-1600-9.16.6-150000.12.74.2 * libirs1601-9.16.6-150000.12.74.2 * libdns1605-debuginfo-9.16.6-150000.12.74.2 * bind-utils-9.16.6-150000.12.74.2 * libisc1606-9.16.6-150000.12.74.2 * libisccfg1600-9.16.6-150000.12.74.2 * bind-9.16.6-150000.12.74.2 * libisccfg1600-debuginfo-9.16.6-150000.12.74.2 * bind-debuginfo-9.16.6-150000.12.74.2 * libuv-devel-1.18.0-150000.3.2.1 * libisccc1600-9.16.6-150000.12.74.2 * libns1604-debuginfo-9.16.6-150000.12.74.2 * libirs1601-debuginfo-9.16.6-150000.12.74.2 * libuv-debugsource-1.18.0-150000.3.2.1 * libuv1-debuginfo-1.18.0-150000.3.2.1 * libdns1605-9.16.6-150000.12.74.2 * bind-debugsource-9.16.6-150000.12.74.2 * libuv1-1.18.0-150000.3.2.1 * bind-chrootenv-9.16.6-150000.12.74.2 * bind-devel-9.16.6-150000.12.74.2 * bind-utils-debuginfo-9.16.6-150000.12.74.2 * libbind9-1600-debuginfo-9.16.6-150000.12.74.2 * libns1604-9.16.6-150000.12.74.2 * libirs-devel-9.16.6-150000.12.74.2 * libisccc1600-debuginfo-9.16.6-150000.12.74.2 * libisc1606-debuginfo-9.16.6-150000.12.74.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * python3-bind-9.16.6-150000.12.74.2 * bind-doc-9.16.6-150000.12.74.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libbind9-1600-9.16.6-150000.12.74.2 * libirs1601-9.16.6-150000.12.74.2 * libdns1605-debuginfo-9.16.6-150000.12.74.2 * bind-utils-9.16.6-150000.12.74.2 * libisc1606-9.16.6-150000.12.74.2 * libisccfg1600-9.16.6-150000.12.74.2 * bind-9.16.6-150000.12.74.2 * libisccfg1600-debuginfo-9.16.6-150000.12.74.2 * bind-debuginfo-9.16.6-150000.12.74.2 * libuv-devel-1.18.0-150000.3.2.1 * libisccc1600-9.16.6-150000.12.74.2 * libns1604-debuginfo-9.16.6-150000.12.74.2 * libirs1601-debuginfo-9.16.6-150000.12.74.2 * libuv-debugsource-1.18.0-150000.3.2.1 * libuv1-debuginfo-1.18.0-150000.3.2.1 * libdns1605-9.16.6-150000.12.74.2 * bind-debugsource-9.16.6-150000.12.74.2 * libuv1-1.18.0-150000.3.2.1 * bind-chrootenv-9.16.6-150000.12.74.2 * bind-devel-9.16.6-150000.12.74.2 * bind-utils-debuginfo-9.16.6-150000.12.74.2 * libbind9-1600-debuginfo-9.16.6-150000.12.74.2 * libns1604-9.16.6-150000.12.74.2 * libirs-devel-9.16.6-150000.12.74.2 * libisccc1600-debuginfo-9.16.6-150000.12.74.2 * libisc1606-debuginfo-9.16.6-150000.12.74.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * python3-bind-9.16.6-150000.12.74.2 * bind-doc-9.16.6-150000.12.74.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libbind9-1600-9.16.6-150000.12.74.2 * libirs1601-9.16.6-150000.12.74.2 * libdns1605-debuginfo-9.16.6-150000.12.74.2 * bind-utils-9.16.6-150000.12.74.2 * libisc1606-9.16.6-150000.12.74.2 * libisccfg1600-9.16.6-150000.12.74.2 * bind-9.16.6-150000.12.74.2 * libisccfg1600-debuginfo-9.16.6-150000.12.74.2 * bind-debuginfo-9.16.6-150000.12.74.2 * libuv-devel-1.18.0-150000.3.2.1 * libisccc1600-9.16.6-150000.12.74.2 * libns1604-debuginfo-9.16.6-150000.12.74.2 * libirs1601-debuginfo-9.16.6-150000.12.74.2 * libuv-debugsource-1.18.0-150000.3.2.1 * libuv1-debuginfo-1.18.0-150000.3.2.1 * libdns1605-9.16.6-150000.12.74.2 * bind-debugsource-9.16.6-150000.12.74.2 * libuv1-1.18.0-150000.3.2.1 * bind-chrootenv-9.16.6-150000.12.74.2 * bind-devel-9.16.6-150000.12.74.2 * bind-utils-debuginfo-9.16.6-150000.12.74.2 * libbind9-1600-debuginfo-9.16.6-150000.12.74.2 * libns1604-9.16.6-150000.12.74.2 * libirs-devel-9.16.6-150000.12.74.2 * libisccc1600-debuginfo-9.16.6-150000.12.74.2 * libisc1606-debuginfo-9.16.6-150000.12.74.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * python3-bind-9.16.6-150000.12.74.2 * bind-doc-9.16.6-150000.12.74.2 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * libbind9-1600-9.16.6-150000.12.74.2 * libirs1601-9.16.6-150000.12.74.2 * libuv1-debuginfo-1.18.0-150000.3.2.1 * libdns1605-9.16.6-150000.12.74.2 * libns1604-9.16.6-150000.12.74.2 * libuv1-1.18.0-150000.3.2.1 * libisccc1600-9.16.6-150000.12.74.2 * bind-utils-9.16.6-150000.12.74.2 * libns1604-debuginfo-9.16.6-150000.12.74.2 * libisc1606-9.16.6-150000.12.74.2 * libisccfg1600-9.16.6-150000.12.74.2 * SUSE Manager Client Tools for SLE Micro 5 (aarch64_ilp32) * libisccc1600-64bit-9.16.6-150000.12.74.2 * libirs1601-64bit-9.16.6-150000.12.74.2 * libisc1606-64bit-9.16.6-150000.12.74.2 * libisccfg1600-64bit-9.16.6-150000.12.74.2 * libdns1605-64bit-9.16.6-150000.12.74.2 * libbind9-1600-64bit-9.16.6-150000.12.74.2 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * python3-bind-9.16.6-150000.12.74.2 ## References: * https://www.suse.com/security/cve/CVE-2023-4408.html * https://www.suse.com/security/cve/CVE-2023-50387.html * https://www.suse.com/security/cve/CVE-2023-50868.html * https://www.suse.com/security/cve/CVE-2023-5517.html * https://www.suse.com/security/cve/CVE-2023-6516.html * https://bugzilla.suse.com/show_bug.cgi?id=1219823 * https://bugzilla.suse.com/show_bug.cgi?id=1219826 * https://bugzilla.suse.com/show_bug.cgi?id=1219851 * https://bugzilla.suse.com/show_bug.cgi?id=1219852 * https://bugzilla.suse.com/show_bug.cgi?id=1219854 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 17 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 17 Jun 2024 16:30:05 -0000 Subject: SUSE-RU-2024:2046-1: moderate: Recommended update for php8 Message-ID: <171864180511.14446.10505748194683963414@smelt2.prg2.suse.org> # Recommended update for php8 Announcement ID: SUSE-RU-2024:2046-1 Rating: moderate References: * bsc#1211301 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * Web and Scripting Module 15-SP6 An update that has one fix can now be installed. ## Description: This update for php8 fixes the following issues: * version update and bug fix release * Use the system default cipher list instead of hardcoded values by using crypto-policies (bsc#1211301) * modified patches ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2046=1 openSUSE-SLE-15.6-2024-2046=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2024-2046=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * php8-exif-8.2.20-150600.3.3.1 * php8-mysql-debuginfo-8.2.20-150600.3.3.1 * php8-ctype-8.2.20-150600.3.3.1 * php8-gettext-8.2.20-150600.3.3.1 * apache2-mod_php8-debugsource-8.2.20-150600.3.3.1 * php8-exif-debuginfo-8.2.20-150600.3.3.1 * php8-embed-debuginfo-8.2.20-150600.3.3.1 * php8-pcntl-debuginfo-8.2.20-150600.3.3.1 * php8-calendar-debuginfo-8.2.20-150600.3.3.1 * php8-fpm-8.2.20-150600.3.3.1 * php8-ffi-8.2.20-150600.3.3.1 * php8-shmop-debuginfo-8.2.20-150600.3.3.1 * php8-soap-debuginfo-8.2.20-150600.3.3.1 * php8-snmp-debuginfo-8.2.20-150600.3.3.1 * php8-tokenizer-debuginfo-8.2.20-150600.3.3.1 * apache2-mod_php8-8.2.20-150600.3.3.1 * php8-cli-debuginfo-8.2.20-150600.3.3.1 * php8-fastcgi-8.2.20-150600.3.3.1 * php8-ffi-debuginfo-8.2.20-150600.3.3.1 * php8-ctype-debuginfo-8.2.20-150600.3.3.1 * php8-openssl-debuginfo-8.2.20-150600.3.3.1 * php8-readline-debuginfo-8.2.20-150600.3.3.1 * php8-bz2-8.2.20-150600.3.3.1 * php8-odbc-8.2.20-150600.3.3.1 * php8-sysvsem-8.2.20-150600.3.3.1 * php8-calendar-8.2.20-150600.3.3.1 * php8-sysvmsg-debuginfo-8.2.20-150600.3.3.1 * php8-sodium-8.2.20-150600.3.3.1 * php8-xsl-8.2.20-150600.3.3.1 * php8-dom-8.2.20-150600.3.3.1 * php8-pdo-8.2.20-150600.3.3.1 * php8-sysvmsg-8.2.20-150600.3.3.1 * php8-tokenizer-8.2.20-150600.3.3.1 * php8-enchant-8.2.20-150600.3.3.1 * php8-pcntl-8.2.20-150600.3.3.1 * php8-opcache-8.2.20-150600.3.3.1 * php8-cli-8.2.20-150600.3.3.1 * php8-iconv-debuginfo-8.2.20-150600.3.3.1 * php8-fastcgi-debuginfo-8.2.20-150600.3.3.1 * php8-dba-debuginfo-8.2.20-150600.3.3.1 * php8-tidy-8.2.20-150600.3.3.1 * php8-readline-8.2.20-150600.3.3.1 * php8-curl-debuginfo-8.2.20-150600.3.3.1 * php8-fpm-debugsource-8.2.20-150600.3.3.1 * php8-embed-debugsource-8.2.20-150600.3.3.1 * php8-zlib-debuginfo-8.2.20-150600.3.3.1 * php8-zlib-8.2.20-150600.3.3.1 * php8-devel-8.2.20-150600.3.3.1 * php8-odbc-debuginfo-8.2.20-150600.3.3.1 * php8-enchant-debuginfo-8.2.20-150600.3.3.1 * php8-sysvshm-debuginfo-8.2.20-150600.3.3.1 * php8-gettext-debuginfo-8.2.20-150600.3.3.1 * php8-bcmath-debuginfo-8.2.20-150600.3.3.1 * php8-fileinfo-debuginfo-8.2.20-150600.3.3.1 * php8-gmp-8.2.20-150600.3.3.1 * php8-shmop-8.2.20-150600.3.3.1 * php8-gd-debuginfo-8.2.20-150600.3.3.1 * php8-bcmath-8.2.20-150600.3.3.1 * php8-fastcgi-debugsource-8.2.20-150600.3.3.1 * php8-pdo-debuginfo-8.2.20-150600.3.3.1 * php8-debugsource-8.2.20-150600.3.3.1 * php8-ftp-debuginfo-8.2.20-150600.3.3.1 * php8-fileinfo-8.2.20-150600.3.3.1 * php8-ftp-8.2.20-150600.3.3.1 * php8-phar-8.2.20-150600.3.3.1 * php8-posix-8.2.20-150600.3.3.1 * php8-openssl-8.2.20-150600.3.3.1 * php8-posix-debuginfo-8.2.20-150600.3.3.1 * php8-pgsql-debuginfo-8.2.20-150600.3.3.1 * php8-zip-8.2.20-150600.3.3.1 * php8-debuginfo-8.2.20-150600.3.3.1 * php8-phar-debuginfo-8.2.20-150600.3.3.1 * php8-curl-8.2.20-150600.3.3.1 * php8-xmlreader-debuginfo-8.2.20-150600.3.3.1 * php8-snmp-8.2.20-150600.3.3.1 * php8-opcache-debuginfo-8.2.20-150600.3.3.1 * php8-dom-debuginfo-8.2.20-150600.3.3.1 * php8-sysvsem-debuginfo-8.2.20-150600.3.3.1 * php8-zip-debuginfo-8.2.20-150600.3.3.1 * php8-soap-8.2.20-150600.3.3.1 * php8-test-8.2.20-150600.3.3.1 * php8-embed-8.2.20-150600.3.3.1 * php8-sockets-debuginfo-8.2.20-150600.3.3.1 * php8-gmp-debuginfo-8.2.20-150600.3.3.1 * php8-sodium-debuginfo-8.2.20-150600.3.3.1 * php8-sqlite-8.2.20-150600.3.3.1 * php8-intl-8.2.20-150600.3.3.1 * php8-pgsql-8.2.20-150600.3.3.1 * php8-bz2-debuginfo-8.2.20-150600.3.3.1 * php8-ldap-8.2.20-150600.3.3.1 * php8-xmlwriter-debuginfo-8.2.20-150600.3.3.1 * php8-gd-8.2.20-150600.3.3.1 * php8-sockets-8.2.20-150600.3.3.1 * apache2-mod_php8-debuginfo-8.2.20-150600.3.3.1 * php8-sqlite-debuginfo-8.2.20-150600.3.3.1 * php8-dba-8.2.20-150600.3.3.1 * php8-tidy-debuginfo-8.2.20-150600.3.3.1 * php8-xmlwriter-8.2.20-150600.3.3.1 * php8-xmlreader-8.2.20-150600.3.3.1 * php8-iconv-8.2.20-150600.3.3.1 * php8-mbstring-8.2.20-150600.3.3.1 * php8-mbstring-debuginfo-8.2.20-150600.3.3.1 * php8-mysql-8.2.20-150600.3.3.1 * php8-intl-debuginfo-8.2.20-150600.3.3.1 * php8-sysvshm-8.2.20-150600.3.3.1 * php8-ldap-debuginfo-8.2.20-150600.3.3.1 * php8-xsl-debuginfo-8.2.20-150600.3.3.1 * php8-8.2.20-150600.3.3.1 * php8-fpm-debuginfo-8.2.20-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * php8-fpm-apache-8.2.20-150600.3.3.1 * Web and Scripting Module 15-SP6 (aarch64 ppc64le s390x x86_64) * php8-exif-8.2.20-150600.3.3.1 * php8-mysql-debuginfo-8.2.20-150600.3.3.1 * php8-ctype-8.2.20-150600.3.3.1 * php8-gettext-8.2.20-150600.3.3.1 * apache2-mod_php8-debugsource-8.2.20-150600.3.3.1 * php8-exif-debuginfo-8.2.20-150600.3.3.1 * php8-embed-debuginfo-8.2.20-150600.3.3.1 * php8-pcntl-debuginfo-8.2.20-150600.3.3.1 * php8-calendar-debuginfo-8.2.20-150600.3.3.1 * php8-fpm-8.2.20-150600.3.3.1 * php8-shmop-debuginfo-8.2.20-150600.3.3.1 * php8-soap-debuginfo-8.2.20-150600.3.3.1 * php8-snmp-debuginfo-8.2.20-150600.3.3.1 * php8-tokenizer-debuginfo-8.2.20-150600.3.3.1 * apache2-mod_php8-8.2.20-150600.3.3.1 * php8-cli-debuginfo-8.2.20-150600.3.3.1 * php8-fastcgi-8.2.20-150600.3.3.1 * php8-ctype-debuginfo-8.2.20-150600.3.3.1 * php8-openssl-debuginfo-8.2.20-150600.3.3.1 * php8-readline-debuginfo-8.2.20-150600.3.3.1 * php8-bz2-8.2.20-150600.3.3.1 * php8-odbc-8.2.20-150600.3.3.1 * php8-sysvsem-8.2.20-150600.3.3.1 * php8-calendar-8.2.20-150600.3.3.1 * php8-sysvmsg-debuginfo-8.2.20-150600.3.3.1 * php8-sodium-8.2.20-150600.3.3.1 * php8-xsl-8.2.20-150600.3.3.1 * php8-dom-8.2.20-150600.3.3.1 * php8-pdo-8.2.20-150600.3.3.1 * php8-sysvmsg-8.2.20-150600.3.3.1 * php8-tokenizer-8.2.20-150600.3.3.1 * php8-enchant-8.2.20-150600.3.3.1 * php8-pcntl-8.2.20-150600.3.3.1 * php8-opcache-8.2.20-150600.3.3.1 * php8-cli-8.2.20-150600.3.3.1 * php8-fastcgi-debuginfo-8.2.20-150600.3.3.1 * php8-iconv-debuginfo-8.2.20-150600.3.3.1 * php8-dba-debuginfo-8.2.20-150600.3.3.1 * php8-tidy-8.2.20-150600.3.3.1 * php8-readline-8.2.20-150600.3.3.1 * php8-curl-debuginfo-8.2.20-150600.3.3.1 * php8-fpm-debugsource-8.2.20-150600.3.3.1 * php8-embed-debugsource-8.2.20-150600.3.3.1 * php8-zlib-debuginfo-8.2.20-150600.3.3.1 * php8-zlib-8.2.20-150600.3.3.1 * php8-devel-8.2.20-150600.3.3.1 * php8-odbc-debuginfo-8.2.20-150600.3.3.1 * php8-enchant-debuginfo-8.2.20-150600.3.3.1 * php8-sysvshm-debuginfo-8.2.20-150600.3.3.1 * php8-gettext-debuginfo-8.2.20-150600.3.3.1 * php8-bcmath-debuginfo-8.2.20-150600.3.3.1 * php8-fileinfo-debuginfo-8.2.20-150600.3.3.1 * php8-gmp-8.2.20-150600.3.3.1 * php8-shmop-8.2.20-150600.3.3.1 * php8-gd-debuginfo-8.2.20-150600.3.3.1 * php8-bcmath-8.2.20-150600.3.3.1 * php8-fastcgi-debugsource-8.2.20-150600.3.3.1 * php8-pdo-debuginfo-8.2.20-150600.3.3.1 * php8-debugsource-8.2.20-150600.3.3.1 * php8-ftp-debuginfo-8.2.20-150600.3.3.1 * php8-fileinfo-8.2.20-150600.3.3.1 * php8-ftp-8.2.20-150600.3.3.1 * php8-phar-8.2.20-150600.3.3.1 * php8-posix-8.2.20-150600.3.3.1 * php8-openssl-8.2.20-150600.3.3.1 * php8-posix-debuginfo-8.2.20-150600.3.3.1 * php8-pgsql-debuginfo-8.2.20-150600.3.3.1 * php8-zip-8.2.20-150600.3.3.1 * php8-debuginfo-8.2.20-150600.3.3.1 * php8-phar-debuginfo-8.2.20-150600.3.3.1 * php8-curl-8.2.20-150600.3.3.1 * php8-xmlreader-debuginfo-8.2.20-150600.3.3.1 * php8-snmp-8.2.20-150600.3.3.1 * php8-opcache-debuginfo-8.2.20-150600.3.3.1 * php8-dom-debuginfo-8.2.20-150600.3.3.1 * php8-sysvsem-debuginfo-8.2.20-150600.3.3.1 * php8-test-8.2.20-150600.3.3.1 * php8-soap-8.2.20-150600.3.3.1 * php8-zip-debuginfo-8.2.20-150600.3.3.1 * php8-embed-8.2.20-150600.3.3.1 * php8-sockets-debuginfo-8.2.20-150600.3.3.1 * php8-gmp-debuginfo-8.2.20-150600.3.3.1 * php8-sodium-debuginfo-8.2.20-150600.3.3.1 * php8-sqlite-8.2.20-150600.3.3.1 * php8-intl-8.2.20-150600.3.3.1 * php8-pgsql-8.2.20-150600.3.3.1 * php8-bz2-debuginfo-8.2.20-150600.3.3.1 * php8-ldap-8.2.20-150600.3.3.1 * php8-xmlwriter-debuginfo-8.2.20-150600.3.3.1 * php8-gd-8.2.20-150600.3.3.1 * php8-sockets-8.2.20-150600.3.3.1 * apache2-mod_php8-debuginfo-8.2.20-150600.3.3.1 * php8-sqlite-debuginfo-8.2.20-150600.3.3.1 * php8-dba-8.2.20-150600.3.3.1 * php8-tidy-debuginfo-8.2.20-150600.3.3.1 * php8-xmlwriter-8.2.20-150600.3.3.1 * php8-xmlreader-8.2.20-150600.3.3.1 * php8-iconv-8.2.20-150600.3.3.1 * php8-mbstring-8.2.20-150600.3.3.1 * php8-mbstring-debuginfo-8.2.20-150600.3.3.1 * php8-mysql-8.2.20-150600.3.3.1 * php8-intl-debuginfo-8.2.20-150600.3.3.1 * php8-sysvshm-8.2.20-150600.3.3.1 * php8-ldap-debuginfo-8.2.20-150600.3.3.1 * php8-xsl-debuginfo-8.2.20-150600.3.3.1 * php8-8.2.20-150600.3.3.1 * php8-fpm-debuginfo-8.2.20-150600.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1211301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 08:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 08:30:06 -0000 Subject: SUSE-SU-2024:2051-1: important: Security update for openssl-1_1 Message-ID: <171869940609.2273.9585458849034582699@smelt2.prg2.suse.org> # Security update for openssl-1_1 Announcement ID: SUSE-SU-2024:2051-1 Rating: important References: * bsc#1225551 Cross-References: * CVE-2024-4741 CVSS scores: * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-1_1 fixes the following issues: * CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2051=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2051=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2051=1 openSUSE-SLE-15.5-2024-2051=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libopenssl-1_1-devel-1.1.1l-150500.17.31.1 * libopenssl1_1-debuginfo-1.1.1l-150500.17.31.1 * openssl-1_1-debugsource-1.1.1l-150500.17.31.1 * libopenssl1_1-1.1.1l-150500.17.31.1 * libopenssl1_1-hmac-1.1.1l-150500.17.31.1 * openssl-1_1-1.1.1l-150500.17.31.1 * openssl-1_1-debuginfo-1.1.1l-150500.17.31.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libopenssl-1_1-devel-1.1.1l-150500.17.31.1 * libopenssl1_1-debuginfo-1.1.1l-150500.17.31.1 * openssl-1_1-debugsource-1.1.1l-150500.17.31.1 * libopenssl1_1-1.1.1l-150500.17.31.1 * libopenssl1_1-hmac-1.1.1l-150500.17.31.1 * openssl-1_1-1.1.1l-150500.17.31.1 * openssl-1_1-debuginfo-1.1.1l-150500.17.31.1 * Basesystem Module 15-SP5 (x86_64) * libopenssl1_1-hmac-32bit-1.1.1l-150500.17.31.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.31.1 * libopenssl1_1-32bit-1.1.1l-150500.17.31.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libopenssl-1_1-devel-1.1.1l-150500.17.31.1 * libopenssl1_1-debuginfo-1.1.1l-150500.17.31.1 * openssl-1_1-debugsource-1.1.1l-150500.17.31.1 * libopenssl1_1-1.1.1l-150500.17.31.1 * libopenssl1_1-hmac-1.1.1l-150500.17.31.1 * openssl-1_1-1.1.1l-150500.17.31.1 * openssl-1_1-debuginfo-1.1.1l-150500.17.31.1 * openSUSE Leap 15.5 (x86_64) * libopenssl1_1-hmac-32bit-1.1.1l-150500.17.31.1 * libopenssl-1_1-devel-32bit-1.1.1l-150500.17.31.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.31.1 * libopenssl1_1-32bit-1.1.1l-150500.17.31.1 * openSUSE Leap 15.5 (noarch) * openssl-1_1-doc-1.1.1l-150500.17.31.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libopenssl1_1-hmac-64bit-1.1.1l-150500.17.31.1 * libopenssl1_1-64bit-debuginfo-1.1.1l-150500.17.31.1 * libopenssl-1_1-devel-64bit-1.1.1l-150500.17.31.1 * libopenssl1_1-64bit-1.1.1l-150500.17.31.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4741.html * https://bugzilla.suse.com/show_bug.cgi?id=1225551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 08:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 08:30:07 -0000 Subject: SUSE-SU-2024:2050-1: important: Security update for podman Message-ID: <171869940796.2273.640416192171100700@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2024:2050-1 Rating: important References: * bsc#1224122 * bsc#1226136 Cross-References: * CVE-2024-24786 * CVE-2024-3727 CVSS scores: * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * Update to version 4.9.5 * CVE-2024-3727: Fixed a flaw that allowed attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks. (bsc#1224122) * CVE-2024-24786: Fixed an infinite loop in protojson. (bsc#1226136) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2050=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2050=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2050=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2050=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2050=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2050=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2050=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2050=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * podman-4.9.5-150300.9.31.1 * podmansh-4.9.5-150300.9.31.1 * podman-debuginfo-4.9.5-150300.9.31.1 * podman-remote-debuginfo-4.9.5-150300.9.31.1 * podman-remote-4.9.5-150300.9.31.1 * openSUSE Leap 15.3 (noarch) * podman-docker-4.9.5-150300.9.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * podman-4.9.5-150300.9.31.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * podman-4.9.5-150300.9.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * podman-4.9.5-150300.9.31.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * podman-4.9.5-150300.9.31.1 * podman-debuginfo-4.9.5-150300.9.31.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * podman-4.9.5-150300.9.31.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * podman-4.9.5-150300.9.31.1 * podman-debuginfo-4.9.5-150300.9.31.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * podman-4.9.5-150300.9.31.1 * podman-debuginfo-4.9.5-150300.9.31.1 ## References: * https://www.suse.com/security/cve/CVE-2024-24786.html * https://www.suse.com/security/cve/CVE-2024-3727.html * https://bugzilla.suse.com/show_bug.cgi?id=1224122 * https://bugzilla.suse.com/show_bug.cgi?id=1226136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 08:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 08:30:09 -0000 Subject: SUSE-FU-2024:2049-1: moderate: Feature update for Trento Message-ID: <171869940966.2273.18267910060474089561@smelt2.prg2.suse.org> # Feature update for Trento Announcement ID: SUSE-FU-2024:2049-1 Rating: moderate References: * jsc#PED-7951 * jsc#PED-7952 Affected Products: * SAP Applications Module 15-SP3 * SAP Applications Module 15-SP4 * SAP Applications Module 15-SP5 * SAP Applications Module 15-SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains two features can now be installed. ## Description: This update for Trento fixes the following issues: trento-server-helm was updated to from version 2.2.0 to 2.3.1: * For the full list of changes please consult: * https://github.com/trento-project/helm-charts/compare/2.2.0...2.3.1 trento-wanda was implemented at version 1.3.0: * New RPM package implementation (jsc#PED-7951, jsc#PED-7952) trento-wanda-image was updated from version 1.2.0 to 1.3.0: * For the full list of changes please consult: * https://github.com/trento-project/wanda/compare/1.2.0...1.3.0 trento-web was implemented at version 2.3.1: * New RPM package implementation (jsc#PED-7951, jsc#PED-7952) trento-web-image was updated from version 2.2.0 to 2.3.1: * For the full list of changes please consult: * https://github.com/trento-project/web/compare/2.2.0...2.3.1 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SAP Applications Module 15-SP3 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP3-2024-2049=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-2049=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-2049=1 * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2049=1 ## Package List: * SAP Applications Module 15-SP3 (aarch64 ppc64le s390x x86_64) * trento-wanda-1.3.0-150300.1.5.5 * trento-wanda-debuginfo-1.3.0-150300.1.5.5 * trento-web-2.3.1-150300.1.5.1 * SAP Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * trento-wanda-1.3.0-150300.1.5.5 * trento-wanda-debuginfo-1.3.0-150300.1.5.5 * trento-web-2.3.1-150300.1.5.1 * SAP Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * trento-wanda-1.3.0-150300.1.5.5 * trento-wanda-debuginfo-1.3.0-150300.1.5.5 * trento-web-2.3.1-150300.1.5.1 * SAP Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * trento-wanda-1.3.0-150300.1.5.5 * trento-wanda-debuginfo-1.3.0-150300.1.5.5 * trento-web-2.3.1-150300.1.5.1 ## References: * https://jira.suse.com/browse/PED-7951 * https://jira.suse.com/browse/PED-7952 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 08:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 08:30:10 -0000 Subject: SUSE-RU-2024:2048-1: moderate: Recommended update for trento-agent Message-ID: <171869941061.2273.11449284604135915588@smelt2.prg2.suse.org> # Recommended update for trento-agent Announcement ID: SUSE-RU-2024:2048-1 Rating: moderate References: Affected Products: * SAP Applications Module 15-SP2 * SAP Applications Module 15-SP3 * SAP Applications Module 15-SP4 * SAP Applications Module 15-SP5 * SAP Applications Module 15-SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for trento-agent, trento-server-installer, trento-supportconfig- plugin fixes the following issues: trento-agent was updated to version 2.3.0: * Changes in version 2.3.0: * Full Changelog available here https://github.com/trento- project/agent/compare/2.2.0...2.3.0 * Added: * Added new ascsers_cluster gatherer * Added cache usage to sapcontrol gatherer * Improve crash on failed agent initialization * Facts cache * Update saptune discovery interval * Send sbd data in diskless scenario * Discover FQDN inside the host discovery loop * Print fact gathering error in facts gather cmd call * Http client refactor * Bugs fixed: * Fixed verify_password gatherer for scenarios where there is not hash * Other Changes: * Updated LICENSE * Bump github.com/iancoleman/strcase from 0.2.0 to 0.3.0 * Bump actions/cache from 3.3.3 to 4.0.0 * Bump golang.org/x/mod from 0.9.0 to 0.14.0 * Bump github.com/vektra/mockery/v2 from 2.32.3 to 2.40.1 * Bump actions/cache from 3.3.2 to 3.3.3 * Bump actions/upload-artifact from 3 to 4 * Bump actions/download-artifact from 3 to 4 * Bump actions/setup-go from 3 to 5 trento-server-installer and trento-supportconfig-plugin were updated to version 2.3.1: * Changes in version 2.3.1: * Full Changelog available here https://github.com/trento-project/helm- charts/compare/2.3.0...2.3.1) * Renamed `TRENTO_DOMAIN` to `TRENTO_WEB_ORIGIN` * Added TRENTO_DOMAIN env var * Added cert manager support * Added env var support for the supportconfig plugin/wrapper * Changes in version 2.3.0: * Full Changelog available here https://github.com/trento-project/helm- charts/compare/2.2.0...2.3.0) * Added: * Added v3 checks path to the ingress configuration * Postgres database creation with INIT containers * Added option to disable charts * Bugs fixed: * Added wanda v2 apis in ingress * Other changes: * Removed grafana * Updated LICENSE ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SAP Applications Module 15-SP2 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP2-2024-2048=1 * SAP Applications Module 15-SP3 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP3-2024-2048=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-2048=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-2048=1 * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2048=1 ## Package List: * SAP Applications Module 15-SP2 (aarch64 ppc64le s390x x86_64) * trento-agent-2.3.0-150100.3.12.4 * SAP Applications Module 15-SP2 (noarch) * trento-server-installer-2.3.1-150100.3.14.1 * SAP Applications Module 15-SP3 (aarch64 ppc64le s390x x86_64) * trento-agent-2.3.0-150100.3.12.4 * SAP Applications Module 15-SP3 (noarch) * trento-server-installer-2.3.1-150100.3.14.1 * trento-supportconfig-plugin-2.3.1-150100.3.13.1 * SAP Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * trento-agent-2.3.0-150100.3.12.4 * SAP Applications Module 15-SP4 (noarch) * trento-server-installer-2.3.1-150100.3.14.1 * trento-supportconfig-plugin-2.3.1-150100.3.13.1 * SAP Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * trento-agent-2.3.0-150100.3.12.4 * SAP Applications Module 15-SP5 (noarch) * trento-server-installer-2.3.1-150100.3.14.1 * trento-supportconfig-plugin-2.3.1-150100.3.13.1 * SAP Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * trento-agent-2.3.0-150100.3.12.4 * SAP Applications Module 15-SP6 (noarch) * trento-server-installer-2.3.1-150100.3.14.1 * trento-supportconfig-plugin-2.3.1-150100.3.13.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:04 -0000 Subject: SUSE-SU-2024:2068-1: moderate: Security update for python-requests Message-ID: <171871380449.7364.7932259286240451589@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2024:2068-1 Rating: moderate References: * bsc#1224788 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-requests fixes the following issues: * CVE-2024-35195: Fixed cert verification regardless of changes to the value of `verify` (bsc#1224788). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2068=1 SUSE-SLE- SERVER-12-SP5-2024-2068=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2068=1 * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2024-2068=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2068=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2068=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * python-requests-2.24.0-8.17.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (noarch) * python-requests-2.24.0-8.17.1 * Public Cloud Module 12 (noarch) * python3-requests-2.24.0-8.17.1 * python-requests-2.24.0-8.17.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * python-requests-2.24.0-8.17.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * python-requests-2.24.0-8.17.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1224788 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:07 -0000 Subject: SUSE-SU-2024:2067-1: important: Security update for xdg-desktop-portal Message-ID: <171871380701.7364.7461305859129732978@smelt2.prg2.suse.org> # Security update for xdg-desktop-portal Announcement ID: SUSE-SU-2024:2067-1 Rating: important References: * bsc#1223110 Cross-References: * CVE-2024-32462 CVSS scores: * CVE-2024-32462 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N Affected Products: * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for xdg-desktop-portal fixes the following issues: * CVE-2024-32462: Fix arbitrary code execution outside bwrap sandbox by checking that the first commandline item doesn't start with whitespaces or a hyphen. (bsc#1223110) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2067=1 openSUSE-SLE-15.6-2024-2067=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2067=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * xdg-desktop-portal-1.18.2-150600.4.3.1 * xdg-desktop-portal-devel-1.18.2-150600.4.3.1 * xdg-desktop-portal-debugsource-1.18.2-150600.4.3.1 * xdg-desktop-portal-debuginfo-1.18.2-150600.4.3.1 * openSUSE Leap 15.6 (noarch) * xdg-desktop-portal-lang-1.18.2-150600.4.3.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * xdg-desktop-portal-1.18.2-150600.4.3.1 * xdg-desktop-portal-devel-1.18.2-150600.4.3.1 * xdg-desktop-portal-debugsource-1.18.2-150600.4.3.1 * xdg-desktop-portal-debuginfo-1.18.2-150600.4.3.1 * Desktop Applications Module 15-SP6 (noarch) * xdg-desktop-portal-lang-1.18.2-150600.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-32462.html * https://bugzilla.suse.com/show_bug.cgi?id=1223110 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:10 -0000 Subject: SUSE-SU-2024:2066-1: important: Security update for openssl-3 Message-ID: <171871381088.7364.1586712489616907049@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2024:2066-1 Rating: important References: * bsc#1223428 * bsc#1224388 * bsc#1225291 * bsc#1225551 Cross-References: * CVE-2024-4603 * CVE-2024-4741 CVSS scores: * CVE-2024-4603 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities and has two security fixes can now be installed. ## Description: This update for openssl-3 fixes the following issues: Security issues fixed: * CVE-2024-4603: Check DSA parameters for excessive sizes before validating (bsc#1224388) * CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551) Other issues fixed: * Enable livepatching support (bsc#1223428) * Fix HDKF key derivation (bsc#1225291, gh#openssl/openssl#23448, + gh#openssl/openssl#23456) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2066=1 openSUSE-SLE-15.6-2024-2066=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2066=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * openssl-3-debugsource-3.1.4-150600.5.7.1 * openssl-3-debuginfo-3.1.4-150600.5.7.1 * openssl-3-3.1.4-150600.5.7.1 * libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.7.1 * libopenssl3-3.1.4-150600.5.7.1 * libopenssl-3-fips-provider-3.1.4-150600.5.7.1 * libopenssl-3-devel-3.1.4-150600.5.7.1 * libopenssl3-debuginfo-3.1.4-150600.5.7.1 * openSUSE Leap 15.6 (x86_64) * libopenssl-3-devel-32bit-3.1.4-150600.5.7.1 * libopenssl-3-fips-provider-32bit-3.1.4-150600.5.7.1 * libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.7.1 * libopenssl3-32bit-debuginfo-3.1.4-150600.5.7.1 * libopenssl3-32bit-3.1.4-150600.5.7.1 * openSUSE Leap 15.6 (noarch) * openssl-3-doc-3.1.4-150600.5.7.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libopenssl3-64bit-debuginfo-3.1.4-150600.5.7.1 * libopenssl-3-fips-provider-64bit-debuginfo-3.1.4-150600.5.7.1 * libopenssl-3-devel-64bit-3.1.4-150600.5.7.1 * libopenssl3-64bit-3.1.4-150600.5.7.1 * libopenssl-3-fips-provider-64bit-3.1.4-150600.5.7.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * openssl-3-debugsource-3.1.4-150600.5.7.1 * openssl-3-debuginfo-3.1.4-150600.5.7.1 * openssl-3-3.1.4-150600.5.7.1 * libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.7.1 * libopenssl3-3.1.4-150600.5.7.1 * libopenssl-3-fips-provider-3.1.4-150600.5.7.1 * libopenssl-3-devel-3.1.4-150600.5.7.1 * libopenssl3-debuginfo-3.1.4-150600.5.7.1 * Basesystem Module 15-SP6 (x86_64) * libopenssl3-32bit-debuginfo-3.1.4-150600.5.7.1 * libopenssl-3-fips-provider-32bit-3.1.4-150600.5.7.1 * libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.7.1 * libopenssl3-32bit-3.1.4-150600.5.7.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4603.html * https://www.suse.com/security/cve/CVE-2024-4741.html * https://bugzilla.suse.com/show_bug.cgi?id=1223428 * https://bugzilla.suse.com/show_bug.cgi?id=1224388 * https://bugzilla.suse.com/show_bug.cgi?id=1225291 * https://bugzilla.suse.com/show_bug.cgi?id=1225551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:13 -0000 Subject: SUSE-SU-2024:2065-1: important: Security update for webkit2gtk3 Message-ID: <171871381319.7364.9875229309776119122@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:2065-1 Rating: important References: * bsc#1222905 * bsc#1225071 Cross-References: * CVE-2024-23226 * CVE-2024-27834 CVSS scores: * CVE-2024-23226 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-27834 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * Update to version 2.44.2 * CVE-2024-27834: Fixed a vulnerability where an attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. (bsc#1225071) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2065=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2065=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2065=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2065=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2065=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2065=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2065=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2065=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2065=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2065=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2065=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2065=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2065=1 ## Package List: * openSUSE Leap 15.4 (noarch) * WebKitGTK-4.0-lang-2.44.2-150400.4.83.2 * WebKitGTK-4.1-lang-2.44.2-150400.4.83.2 * WebKitGTK-6.0-lang-2.44.2-150400.4.83.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * webkit-jsc-4.1-debuginfo-2.44.2-150400.4.83.2 * webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2 * webkit2gtk3-minibrowser-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2 * webkit2gtk3-debugsource-2.44.2-150400.4.83.2 * typelib-1_0-WebKitWebProcessExtension-6_0-2.44.2-150400.4.83.2 * webkit-jsc-6.0-2.44.2-150400.4.83.2 * webkit2gtk4-debugsource-2.44.2-150400.4.83.2 * webkit2gtk4-minibrowser-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2 * typelib-1_0-WebKit-6_0-2.44.2-150400.4.83.2 * webkit-jsc-4-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk4-devel-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-minibrowser-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk4-minibrowser-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-6_0-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * webkit-jsc-4.1-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-minibrowser-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-minibrowser-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2 * webkitgtk-6_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit-jsc-4-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit-jsc-6.0-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-devel-2.44.2-150400.4.83.2 * openSUSE Leap 15.4 (x86_64) * libjavascriptcoregtk-4_0-18-32bit-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-32bit-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-32bit-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-32bit-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-32bit-2.44.2-150400.4.83.2 * openSUSE Leap 15.4 (aarch64_ilp32) * libwebkit2gtk-4_0-37-64bit-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-64bit-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-64bit-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-64bit-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-64bit-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-64bit-2.44.2-150400.4.83.2 * openSUSE Leap 15.5 (noarch) * WebKitGTK-4.0-lang-2.44.2-150400.4.83.2 * WebKitGTK-4.1-lang-2.44.2-150400.4.83.2 * WebKitGTK-6.0-lang-2.44.2-150400.4.83.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * webkit-jsc-4.1-debuginfo-2.44.2-150400.4.83.2 * webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2 * webkit2gtk3-minibrowser-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-WebKitWebProcessExtension-6_0-2.44.2-150400.4.83.2 * webkit-jsc-6.0-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk3-debugsource-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2 * webkit2gtk4-debugsource-2.44.2-150400.4.83.2 * webkit2gtk4-minibrowser-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2 * typelib-1_0-WebKit-6_0-2.44.2-150400.4.83.2 * webkit-jsc-4-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk4-devel-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-minibrowser-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk4-minibrowser-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-6_0-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * webkit-jsc-4.1-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-minibrowser-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-minibrowser-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2 * webkitgtk-6_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit-jsc-4-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit-jsc-6.0-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-devel-2.44.2-150400.4.83.2 * openSUSE Leap 15.5 (x86_64) * libjavascriptcoregtk-4_0-18-32bit-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-32bit-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-32bit-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-32bit-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-32bit-2.44.2-150400.4.83.2 * Basesystem Module 15-SP5 (noarch) * WebKitGTK-4.0-lang-2.44.2-150400.4.83.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2 * Desktop Applications Module 15-SP5 (noarch) * WebKitGTK-4.1-lang-2.44.2-150400.4.83.2 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-debugsource-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2 * webkit2gtk3-devel-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2 * Development Tools Module 15-SP5 (noarch) * WebKitGTK-6.0-lang-2.44.2-150400.4.83.2 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk4-debugsource-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.44.2-150400.4.83.2 * WebKitGTK-4.1-lang-2.44.2-150400.4.83.2 * WebKitGTK-6.0-lang-2.44.2-150400.4.83.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2 * webkit2gtk3-debugsource-2.44.2-150400.4.83.2 * webkit2gtk4-debugsource-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-devel-2.44.2-150400.4.83.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.44.2-150400.4.83.2 * WebKitGTK-4.1-lang-2.44.2-150400.4.83.2 * WebKitGTK-6.0-lang-2.44.2-150400.4.83.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2 * webkit2gtk3-debugsource-2.44.2-150400.4.83.2 * webkit2gtk4-debugsource-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-devel-2.44.2-150400.4.83.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * WebKitGTK-4.0-lang-2.44.2-150400.4.83.2 * WebKitGTK-4.1-lang-2.44.2-150400.4.83.2 * WebKitGTK-6.0-lang-2.44.2-150400.4.83.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2 * webkit2gtk3-debugsource-2.44.2-150400.4.83.2 * webkit2gtk4-debugsource-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-devel-2.44.2-150400.4.83.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * WebKitGTK-4.0-lang-2.44.2-150400.4.83.2 * WebKitGTK-4.1-lang-2.44.2-150400.4.83.2 * WebKitGTK-6.0-lang-2.44.2-150400.4.83.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2 * webkit2gtk3-debugsource-2.44.2-150400.4.83.2 * webkit2gtk4-debugsource-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-devel-2.44.2-150400.4.83.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.44.2-150400.4.83.2 * WebKitGTK-4.1-lang-2.44.2-150400.4.83.2 * WebKitGTK-6.0-lang-2.44.2-150400.4.83.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2 * libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2 * webkit2gtk3-debugsource-2.44.2-150400.4.83.2 * webkit2gtk4-debugsource-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2 * libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-devel-2.44.2-150400.4.83.2 * SUSE Manager Proxy 4.3 (noarch) * WebKitGTK-4.0-lang-2.44.2-150400.4.83.2 * SUSE Manager Proxy 4.3 (x86_64) * libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.44.2-150400.4.83.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2 * SUSE Manager Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.44.2-150400.4.83.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2 * typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2 * typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2 * webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2 * libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2 ## References: * https://www.suse.com/security/cve/CVE-2024-23226.html * https://www.suse.com/security/cve/CVE-2024-27834.html * https://bugzilla.suse.com/show_bug.cgi?id=1222905 * https://bugzilla.suse.com/show_bug.cgi?id=1225071 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:16 -0000 Subject: SUSE-SU-2024:2064-1: important: Security update for python-Authlib Message-ID: <171871381653.7364.3793000984856419831@smelt2.prg2.suse.org> # Security update for python-Authlib Announcement ID: SUSE-SU-2024:2064-1 Rating: important References: * bsc#1226138 Cross-References: * CVE-2024-37568 CVSS scores: * CVE-2024-37568 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-37568 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.6 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for python-Authlib fixes the following issues: * Update to version 1.3.1 * CVE-2024-37568: Fixed algorithm confusion with asymmetric public keys. (bsc#1226138) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2064=1 openSUSE-SLE-15.6-2024-2064=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-2064=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-Authlib-1.3.1-150600.3.3.1 * Python 3 Module 15-SP6 (noarch) * python311-Authlib-1.3.1-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-37568.html * https://bugzilla.suse.com/show_bug.cgi?id=1226138 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:25 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:25 -0000 Subject: SUSE-SU-2024:2060-1: important: Security update for less Message-ID: <171871382567.7364.3580440670071073497@smelt2.prg2.suse.org> # Security update for less Announcement ID: SUSE-SU-2024:2060-1 Rating: important References: * bsc#1222849 Cross-References: * CVE-2024-32487 CVSS scores: * CVE-2024-32487 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for less fixes the following issues: * CVE-2024-32487: Fixed OS command injection via a newline character in the file name. (bsc#1222849) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2060=1 openSUSE-SLE-15.6-2024-2060=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2060=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * less-643-150600.3.3.1 * less-debugsource-643-150600.3.3.1 * less-debuginfo-643-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * less-643-150600.3.3.1 * less-debugsource-643-150600.3.3.1 * less-debuginfo-643-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-32487.html * https://bugzilla.suse.com/show_bug.cgi?id=1222849 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:19 -0000 Subject: SUSE-SU-2024:2063-1: important: Security update for booth Message-ID: <171871381938.7364.17703968505119013066@smelt2.prg2.suse.org> # Security update for booth Announcement ID: SUSE-SU-2024:2063-1 Rating: important References: * bsc#1226032 Cross-References: * CVE-2024-3049 CVSS scores: * CVE-2024-3049 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-3049 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for booth fixes the following issues: * CVE-2024-3049: Fixed a vulnerability where a specially crafted hash can lead to invalid HMAC being accepted by Booth server. (bsc#1226032) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2063=1 openSUSE-SLE-15.5-2024-2063=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-2063=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * booth-debuginfo-1.0+20220815.f40c2d5-150500.3.3.1 * booth-debugsource-1.0+20220815.f40c2d5-150500.3.3.1 * booth-1.0+20220815.f40c2d5-150500.3.3.1 * booth-test-1.0+20220815.f40c2d5-150500.3.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * booth-debuginfo-1.0+20220815.f40c2d5-150500.3.3.1 * booth-debugsource-1.0+20220815.f40c2d5-150500.3.3.1 * booth-1.0+20220815.f40c2d5-150500.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-3049.html * https://bugzilla.suse.com/show_bug.cgi?id=1226032 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:20 -0000 Subject: SUSE-SU-2024:2062-1: important: Security update for booth Message-ID: <171871382090.7364.14342001584684357555@smelt2.prg2.suse.org> # Security update for booth Announcement ID: SUSE-SU-2024:2062-1 Rating: important References: * bsc#1226032 Cross-References: * CVE-2024-3049 CVSS scores: * CVE-2024-3049 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-3049 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves one vulnerability can now be installed. ## Description: This update for booth fixes the following issues: * CVE-2024-3049: Fixed a vulnerability where a specially crafted hash can lead to invalid HMAC being accepted by Booth server. (bsc#1226032) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2062=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-2062=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * booth-debugsource-1.0-150300.18.6.1 * booth-debuginfo-1.0-150300.18.6.1 * booth-1.0-150300.18.6.1 * booth-test-1.0-150300.18.6.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * booth-debugsource-1.0-150300.18.6.1 * booth-debuginfo-1.0-150300.18.6.1 * booth-1.0-150300.18.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-3049.html * https://bugzilla.suse.com/show_bug.cgi?id=1226032 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:22 -0000 Subject: SUSE-SU-2024:2061-1: important: Security update for MozillaFirefox Message-ID: <171871382286.7364.4698529748200984921@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2024:2061-1 Rating: important References: * bsc#1226027 Cross-References: * CVE-2024-5688 * CVE-2024-5690 * CVE-2024-5691 * CVE-2024-5692 * CVE-2024-5693 * CVE-2024-5696 * CVE-2024-5700 * CVE-2024-5702 CVSS scores: Affected Products: * Desktop Applications Module 15-SP5 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves eight vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: * Update to version 115.12.0 ESR (bsc#1226027) * CVE-2024-5702: Use-after-free in networking * CVE-2024-5688: Use-after-free in JavaScript object transplant * CVE-2024-5690: External protocol handlers leaked by timing attack * CVE-2024-5691: Sandboxed iframes were able to bypass sandbox restrictions to open a new window * CVE-2024-5692: Bypass of file name restrictions during saving * CVE-2024-5693: Cross-Origin Image leak via Offscreen Canvas * CVE-2024-5696: Memory Corruption in Text Fragments * CVE-2024-5700: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2061=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2061=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2061=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2061=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2061=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2061=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2061=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2061=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2061=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2061=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2061=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2061=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2061=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2061=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2061=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2061=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-branding-upstream-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * openSUSE Leap 15.5 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-branding-upstream-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * openSUSE Leap 15.6 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * Desktop Applications Module 15-SP5 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * Desktop Applications Module 15-SP6 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * MozillaFirefox-debuginfo-115.12.0-150200.152.140.2 * MozillaFirefox-translations-other-115.12.0-150200.152.140.2 * MozillaFirefox-115.12.0-150200.152.140.2 * MozillaFirefox-translations-common-115.12.0-150200.152.140.2 * MozillaFirefox-debugsource-115.12.0-150200.152.140.2 * SUSE Enterprise Storage 7.1 (noarch) * MozillaFirefox-devel-115.12.0-150200.152.140.2 ## References: * https://www.suse.com/security/cve/CVE-2024-5688.html * https://www.suse.com/security/cve/CVE-2024-5690.html * https://www.suse.com/security/cve/CVE-2024-5691.html * https://www.suse.com/security/cve/CVE-2024-5692.html * https://www.suse.com/security/cve/CVE-2024-5693.html * https://www.suse.com/security/cve/CVE-2024-5696.html * https://www.suse.com/security/cve/CVE-2024-5700.html * https://www.suse.com/security/cve/CVE-2024-5702.html * https://bugzilla.suse.com/show_bug.cgi?id=1226027 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:27 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:27 -0000 Subject: SUSE-SU-2024:2059-1: important: Security update for openssl-1_1 Message-ID: <171871382735.7364.5688327509138414685@smelt2.prg2.suse.org> # Security update for openssl-1_1 Announcement ID: SUSE-SU-2024:2059-1 Rating: important References: * bsc#1225551 Cross-References: * CVE-2024-4741 CVSS scores: * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * Legacy Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-1_1 fixes the following issues: * CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2059=1 openSUSE-SLE-15.6-2024-2059=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2059=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2059=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-2059=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libopenssl1_1-1.1.1w-150600.5.3.1 * libopenssl-1_1-devel-1.1.1w-150600.5.3.1 * openssl-1_1-debuginfo-1.1.1w-150600.5.3.1 * openssl-1_1-1.1.1w-150600.5.3.1 * openssl-1_1-debugsource-1.1.1w-150600.5.3.1 * libopenssl1_1-debuginfo-1.1.1w-150600.5.3.1 * openSUSE Leap 15.6 (x86_64) * libopenssl1_1-32bit-1.1.1w-150600.5.3.1 * libopenssl1_1-32bit-debuginfo-1.1.1w-150600.5.3.1 * libopenssl-1_1-devel-32bit-1.1.1w-150600.5.3.1 * openSUSE Leap 15.6 (noarch) * openssl-1_1-doc-1.1.1w-150600.5.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libopenssl1_1-64bit-1.1.1w-150600.5.3.1 * libopenssl1_1-64bit-debuginfo-1.1.1w-150600.5.3.1 * libopenssl-1_1-devel-64bit-1.1.1w-150600.5.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libopenssl1_1-1.1.1w-150600.5.3.1 * openssl-1_1-debugsource-1.1.1w-150600.5.3.1 * openssl-1_1-debuginfo-1.1.1w-150600.5.3.1 * libopenssl1_1-debuginfo-1.1.1w-150600.5.3.1 * Basesystem Module 15-SP6 (x86_64) * libopenssl1_1-32bit-1.1.1w-150600.5.3.1 * libopenssl1_1-32bit-debuginfo-1.1.1w-150600.5.3.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * openssl-1_1-debugsource-1.1.1w-150600.5.3.1 * openssl-1_1-debuginfo-1.1.1w-150600.5.3.1 * libopenssl-1_1-devel-1.1.1w-150600.5.3.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * openssl-1_1-debugsource-1.1.1w-150600.5.3.1 * openssl-1_1-1.1.1w-150600.5.3.1 * openssl-1_1-debuginfo-1.1.1w-150600.5.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4741.html * https://bugzilla.suse.com/show_bug.cgi?id=1225551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:29 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:29 -0000 Subject: SUSE-SU-2024:2056-1: important: Security update for libaom Message-ID: <171871382911.7364.2900101707998992821@smelt2.prg2.suse.org> # Security update for libaom Announcement ID: SUSE-SU-2024:2056-1 Rating: important References: * bsc#1226020 Cross-References: * CVE-2024-5171 CVSS scores: * CVE-2024-5171 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for libaom fixes the following issues: * CVE-2024-5171: Fixed heap buffer overflow in img_alloc_helper() caused by integer overflow (bsc#1226020). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2056=1 openSUSE-SLE-15.6-2024-2056=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2056=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libaom3-debuginfo-3.7.1-150600.3.3.1 * libaom3-3.7.1-150600.3.3.1 * aom-tools-debuginfo-3.7.1-150600.3.3.1 * libaom-debugsource-3.7.1-150600.3.3.1 * libaom-devel-3.7.1-150600.3.3.1 * aom-tools-3.7.1-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libaom3-32bit-debuginfo-3.7.1-150600.3.3.1 * libaom3-32bit-3.7.1-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * libaom-devel-doc-3.7.1-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libaom3-64bit-3.7.1-150600.3.3.1 * libaom3-64bit-debuginfo-3.7.1-150600.3.3.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libaom3-debuginfo-3.7.1-150600.3.3.1 * libaom-debugsource-3.7.1-150600.3.3.1 * libaom3-3.7.1-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5171.html * https://bugzilla.suse.com/show_bug.cgi?id=1226020 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:33 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:33 -0000 Subject: SUSE-SU-2024:1590-2: moderate: Security update for ghostscript Message-ID: <171871383317.7364.18176295144118184038@smelt2.prg2.suse.org> # Security update for ghostscript Announcement ID: SUSE-SU-2024:1590-2 Rating: moderate References: * bsc#1223852 Cross-References: * CVE-2023-52722 CVSS scores: * CVE-2023-52722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for ghostscript fixes the following issues: * CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1590=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1590=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * ghostscript-debuginfo-9.52-150000.188.1 * ghostscript-x11-debuginfo-9.52-150000.188.1 * ghostscript-devel-9.52-150000.188.1 * ghostscript-9.52-150000.188.1 * ghostscript-debugsource-9.52-150000.188.1 * ghostscript-x11-9.52-150000.188.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ghostscript-debuginfo-9.52-150000.188.1 * ghostscript-x11-debuginfo-9.52-150000.188.1 * ghostscript-devel-9.52-150000.188.1 * ghostscript-9.52-150000.188.1 * ghostscript-debugsource-9.52-150000.188.1 * ghostscript-x11-9.52-150000.188.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52722.html * https://bugzilla.suse.com/show_bug.cgi?id=1223852 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:31 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:31 -0000 Subject: SUSE-SU-2024:1591-2: important: Security update for python-Werkzeug Message-ID: <171871383171.7364.6453553636625969415@smelt2.prg2.suse.org> # Security update for python-Werkzeug Announcement ID: SUSE-SU-2024:1591-2 Rating: important References: * bsc#1223979 Cross-References: * CVE-2024-34069 CVSS scores: * CVE-2024-34069 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for python-Werkzeug fixes the following issues: * CVE-2024-34069: Fixed a remote code execution through debugger when interacting with attacker controlled domain (bsc#1223979). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-1591=1 ## Package List: * Python 3 Module 15-SP6 (noarch) * python311-Werkzeug-2.3.6-150400.6.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-34069.html * https://bugzilla.suse.com/show_bug.cgi?id=1223979 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:37 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:37 -0000 Subject: SUSE-SU-2024:1539-2: moderate: Security update for bouncycastle Message-ID: <171871383712.7364.13031304587471537949@smelt2.prg2.suse.org> # Security update for bouncycastle Announcement ID: SUSE-SU-2024:1539-2 Rating: moderate References: * bsc#1223252 Cross-References: * CVE-2024-30171 CVSS scores: * CVE-2024-30171 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for bouncycastle fixes the following issues: Update to version 1.78.1, including fixes for: * CVE-2024-30171: Fixed timing side-channel attacks against RSA decryption (both PKCS#1v1.5 and OAEP). (bsc#1223252) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1539=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1539=1 ## Package List: * Development Tools Module 15-SP6 (noarch) * bouncycastle-pg-1.78.1-150200.3.29.1 * bouncycastle-util-1.78.1-150200.3.29.1 * bouncycastle-pkix-1.78.1-150200.3.29.1 * bouncycastle-1.78.1-150200.3.29.1 * openSUSE Leap 15.6 (noarch) * bouncycastle-javadoc-1.78.1-150200.3.29.1 * bouncycastle-jmail-1.78.1-150200.3.29.1 * bouncycastle-tls-1.78.1-150200.3.29.1 * bouncycastle-pg-1.78.1-150200.3.29.1 * bouncycastle-1.78.1-150200.3.29.1 * bouncycastle-mail-1.78.1-150200.3.29.1 * bouncycastle-util-1.78.1-150200.3.29.1 * bouncycastle-pkix-1.78.1-150200.3.29.1 ## References: * https://www.suse.com/security/cve/CVE-2024-30171.html * https://bugzilla.suse.com/show_bug.cgi?id=1223252 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 12:30:34 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 12:30:34 -0000 Subject: SUSE-OU-2024:1542-2: low: Optional update for python-cheroot Message-ID: <171871383484.7364.6747418772109795518@smelt2.prg2.suse.org> # Optional update for python-cheroot Announcement ID: SUSE-OU-2024:1542-2 Rating: low References: * bsc#1223694 Affected Products: * Basesystem Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for python-cheroot and python-tempora fixes the following issues: * Use update-alternatives for cheroot and tempora binaries (bsc#1223694) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1542=1 ## Package List: * Basesystem Module 15-SP6 (noarch) * python3-tempora-1.8-150200.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223694 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 16:30:03 -0000 Subject: SUSE-RU-2024:2075-1: moderate: Recommended update for sudo Message-ID: <171872820338.25600.7264855725888697964@smelt2.prg2.suse.org> # Recommended update for sudo Announcement ID: SUSE-RU-2024:2075-1 Rating: moderate References: * bsc#1222104 * bsc#1226008 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has two fixes can now be installed. ## Description: This update for sudo fixes the following issues: * Revert the "Match using canonicalized directories where possible." feature just for SLE-15 This causes a breaking change in behavior for some customers (bsc#1222104, bsc#1226008) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2075=1 openSUSE-SLE-15.6-2024-2075=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2075=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * sudo-policy-wheel-auth-self-1.9.15p5-150600.3.3.2 * sudo-devel-1.9.15p5-150600.3.3.2 * sudo-test-1.9.15p5-150600.3.3.2 * sudo-1.9.15p5-150600.3.3.2 * sudo-plugin-python-debuginfo-1.9.15p5-150600.3.3.2 * system-group-sudo-1.9.15p5-150600.3.3.2 * sudo-debuginfo-1.9.15p5-150600.3.3.2 * sudo-plugin-python-1.9.15p5-150600.3.3.2 * sudo-policy-sudo-auth-self-1.9.15p5-150600.3.3.2 * sudo-debugsource-1.9.15p5-150600.3.3.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * sudo-policy-wheel-auth-self-1.9.15p5-150600.3.3.2 * sudo-devel-1.9.15p5-150600.3.3.2 * sudo-1.9.15p5-150600.3.3.2 * sudo-plugin-python-debuginfo-1.9.15p5-150600.3.3.2 * system-group-sudo-1.9.15p5-150600.3.3.2 * sudo-debuginfo-1.9.15p5-150600.3.3.2 * sudo-plugin-python-1.9.15p5-150600.3.3.2 * sudo-policy-sudo-auth-self-1.9.15p5-150600.3.3.2 * sudo-debugsource-1.9.15p5-150600.3.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222104 * https://bugzilla.suse.com/show_bug.cgi?id=1226008 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 16:30:05 -0000 Subject: SUSE-SU-2024:2074-1: moderate: Security update for ntfs-3g_ntfsprogs Message-ID: <171872820566.25600.2422942029183347573@smelt2.prg2.suse.org> # Security update for ntfs-3g_ntfsprogs Announcement ID: SUSE-SU-2024:2074-1 Rating: moderate References: * bsc#1226007 Cross-References: * CVE-2023-52890 CVSS scores: * CVE-2023-52890 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for ntfs-3g_ntfsprogs fixes the following issues: * CVE-2023-52890: Fixed use-after-free in 'ntfs_uppercase_mbs' in unistr.c (bsc#1226007). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2074=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-2074=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * ntfs-3g_ntfsprogs-debugsource-2022.5.17-5.20.1 * libntfs-3g84-2022.5.17-5.20.1 * libntfs-3g-devel-2022.5.17-5.20.1 * libntfs-3g84-debuginfo-2022.5.17-5.20.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * ntfs-3g-debuginfo-2022.5.17-5.20.1 * libntfs-3g84-debuginfo-2022.5.17-5.20.1 * ntfs-3g_ntfsprogs-debugsource-2022.5.17-5.20.1 * ntfsprogs-2022.5.17-5.20.1 * libntfs-3g84-2022.5.17-5.20.1 * ntfsprogs-debuginfo-2022.5.17-5.20.1 * ntfs-3g-2022.5.17-5.20.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52890.html * https://bugzilla.suse.com/show_bug.cgi?id=1226007 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 16:30:07 -0000 Subject: SUSE-SU-2024:2073-1: important: Security update for MozillaThunderbird Message-ID: <171872820714.25600.13431583379782612498@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2024:2073-1 Rating: important References: * bsc#1226027 Cross-References: * CVE-2024-5688 * CVE-2024-5690 * CVE-2024-5691 * CVE-2024-5692 * CVE-2024-5693 * CVE-2024-5696 * CVE-2024-5700 * CVE-2024-5702 CVSS scores: Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves eight vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: * Update to version 115.12.0 ESR (bsc#1226027) * CVE-2024-5702: Use-after-free in networking * CVE-2024-5688: Use-after-free in JavaScript object transplant * CVE-2024-5690: External protocol handlers leaked by timing attack * CVE-2024-5691: Sandboxed iframes were able to bypass sandbox restrictions to open a new window * CVE-2024-5692: Bypass of file name restrictions during saving * CVE-2024-5693: Cross-Origin Image leak via Offscreen Canvas * CVE-2024-5696: Memory Corruption in Text Fragments * CVE-2024-5700: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2073=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2073=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2073=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2073=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-2073=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-2073=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-translations-other-115.12.0-150200.8.163.1 * MozillaThunderbird-debuginfo-115.12.0-150200.8.163.1 * MozillaThunderbird-translations-common-115.12.0-150200.8.163.1 * MozillaThunderbird-debugsource-115.12.0-150200.8.163.1 * MozillaThunderbird-115.12.0-150200.8.163.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-translations-other-115.12.0-150200.8.163.1 * MozillaThunderbird-debuginfo-115.12.0-150200.8.163.1 * MozillaThunderbird-translations-common-115.12.0-150200.8.163.1 * MozillaThunderbird-debugsource-115.12.0-150200.8.163.1 * MozillaThunderbird-115.12.0-150200.8.163.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * MozillaThunderbird-translations-other-115.12.0-150200.8.163.1 * MozillaThunderbird-debuginfo-115.12.0-150200.8.163.1 * MozillaThunderbird-translations-common-115.12.0-150200.8.163.1 * MozillaThunderbird-debugsource-115.12.0-150200.8.163.1 * MozillaThunderbird-115.12.0-150200.8.163.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-translations-other-115.12.0-150200.8.163.1 * MozillaThunderbird-debuginfo-115.12.0-150200.8.163.1 * MozillaThunderbird-translations-common-115.12.0-150200.8.163.1 * MozillaThunderbird-debugsource-115.12.0-150200.8.163.1 * MozillaThunderbird-115.12.0-150200.8.163.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * MozillaThunderbird-translations-other-115.12.0-150200.8.163.1 * MozillaThunderbird-debuginfo-115.12.0-150200.8.163.1 * MozillaThunderbird-translations-common-115.12.0-150200.8.163.1 * MozillaThunderbird-debugsource-115.12.0-150200.8.163.1 * MozillaThunderbird-115.12.0-150200.8.163.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-translations-other-115.12.0-150200.8.163.1 * MozillaThunderbird-debuginfo-115.12.0-150200.8.163.1 * MozillaThunderbird-translations-common-115.12.0-150200.8.163.1 * MozillaThunderbird-debugsource-115.12.0-150200.8.163.1 * MozillaThunderbird-115.12.0-150200.8.163.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5688.html * https://www.suse.com/security/cve/CVE-2024-5690.html * https://www.suse.com/security/cve/CVE-2024-5691.html * https://www.suse.com/security/cve/CVE-2024-5692.html * https://www.suse.com/security/cve/CVE-2024-5693.html * https://www.suse.com/security/cve/CVE-2024-5696.html * https://www.suse.com/security/cve/CVE-2024-5700.html * https://www.suse.com/security/cve/CVE-2024-5702.html * https://bugzilla.suse.com/show_bug.cgi?id=1226027 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 16:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 16:30:08 -0000 Subject: SUSE-RU-2024:2072-1: moderate: Recommended update for mutter Message-ID: <171872820898.25600.3820771345781343843@smelt2.prg2.suse.org> # Recommended update for mutter Announcement ID: SUSE-RU-2024:2072-1 Rating: moderate References: * bsc#1223393 Affected Products: * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for mutter fixes the following issue: * With Qt 6.7 some apps cannot shown on launch, this fixes the initial suspended state to make those windows visible (bsc#1223393) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2072=1 openSUSE-SLE-15.6-2024-2072=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2072=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * mutter-devel-45.3-150600.5.6.2 * mutter-45.3-150600.5.6.2 * mutter-debuginfo-45.3-150600.5.6.2 * mutter-debugsource-45.3-150600.5.6.2 * openSUSE Leap 15.6 (noarch) * mutter-lang-45.3-150600.5.6.2 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * mutter-devel-45.3-150600.5.6.2 * mutter-45.3-150600.5.6.2 * mutter-debuginfo-45.3-150600.5.6.2 * mutter-debugsource-45.3-150600.5.6.2 * Desktop Applications Module 15-SP6 (noarch) * mutter-lang-45.3-150600.5.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223393 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 16:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 16:30:11 -0000 Subject: SUSE-RU-2024:2071-1: moderate: Recommended update for mksusecd Message-ID: <171872821113.25600.4113959377046968687@smelt2.prg2.suse.org> # Recommended update for mksusecd Announcement ID: SUSE-RU-2024:2071-1 Rating: moderate References: * bsc#1213185 * bsc#1213606 * bsc#1214789 * bsc#1218706 * bsc#1221603 * bsc#1226047 Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has six fixes can now be installed. ## Description: This update for mksusecd fixes the following issues: * Fix --no-joliet option and add warning about too long Joliet file names * Add more mkisofs log output in verbosity level 3 * Ensure mksusecd error code is preserved * Add info about Joliet file name limit to man page * Fix integrating software modules containing debuginfo packages (bsc#1226047) * Increase initrd xz compression level * Enforce de-duplication in mkisofs * Deal with systems where /tmp is a symlink (bsc#1221603) * Support usrmerged kmod package (bsc#1221603) * Handle compressed firmware files (bsc#1214789) * Allow also xz and zstd compression in repodata (bsc#1218706) * Allow --instsys option for Live media * Calculate EFI boot image size correctly * If initrd/kernel are in two different location on the medium, update in both locations * isohybrid: remove outdated 1024 cylinders warning * Default to GPT if source ISO uses it * Add --signature-file option and rewrite signature embedding * Fix --instsys option handling (bsc#1213606) * Add --rescue option to allow modifying the rescue system * Add --volume1 option to allow setting separate labels for both ISO file systems (bsc#1213185) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2071=1 SUSE-2024-2071=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2071=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * mksusecd-debuginfo-2.18-150600.3.3.1 * mksusecd-debugsource-2.18-150600.3.3.1 * mksusecd-2.18-150600.3.3.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * mksusecd-debuginfo-2.18-150600.3.3.1 * mksusecd-debugsource-2.18-150600.3.3.1 * mksusecd-2.18-150600.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213185 * https://bugzilla.suse.com/show_bug.cgi?id=1213606 * https://bugzilla.suse.com/show_bug.cgi?id=1214789 * https://bugzilla.suse.com/show_bug.cgi?id=1218706 * https://bugzilla.suse.com/show_bug.cgi?id=1221603 * https://bugzilla.suse.com/show_bug.cgi?id=1226047 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 16:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 16:30:12 -0000 Subject: SUSE-RU-2024:2070-1: moderate: Recommended update for mksusecd Message-ID: <171872821283.25600.9764213728713148332@smelt2.prg2.suse.org> # Recommended update for mksusecd Announcement ID: SUSE-RU-2024:2070-1 Rating: moderate References: * bsc#1213185 * bsc#1213606 * bsc#1214789 * bsc#1218706 * bsc#1221603 * bsc#1226047 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has six fixes can now be installed. ## Description: This update for mksusecd fixes the following issues: * Fix --no-joliet option and add warning about too long Joliet file names * Add more mkisofs log output in verbosity level 3 * Ensure mksusecd error code is preserved * Add info about Joliet file name limit to man page * Fix integrating software modules containing debuginfo packages (bsc#1226047) * Increase initrd xz compression level * Enforce de-duplication in mkisofs * Deal with systems where /tmp is a symlink (bsc#1221603) * Support usrmerged kmod package (bsc#1221603) * Handle compressed firmware files (bsc#1214789) * Allow also xz and zstd compression in repodata (bsc#1218706) * Allow --instsys option for Live media * Calculate EFI boot image size correctly * If initrd/kernel are in two different location on the medium, update in both locations * isohybrid: remove outdated 1024 cylinders warning * Default to GPT if source ISO uses it * Add --signature-file option and rewrite signature embedding * Fix --instsys option handling (bsc#1213606) * Add --rescue option to allow modifying the rescue system * Add --volume1 option to allow setting separate labels for both ISO file systems (bsc#1213185) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2070=1 openSUSE-SLE-15.5-2024-2070=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2070=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * mksusecd-2.18-150500.3.3.1 * mksusecd-debuginfo-2.18-150500.3.3.1 * mksusecd-debugsource-2.18-150500.3.3.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * mksusecd-2.18-150500.3.3.1 * mksusecd-debuginfo-2.18-150500.3.3.1 * mksusecd-debugsource-2.18-150500.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213185 * https://bugzilla.suse.com/show_bug.cgi?id=1213606 * https://bugzilla.suse.com/show_bug.cgi?id=1214789 * https://bugzilla.suse.com/show_bug.cgi?id=1218706 * https://bugzilla.suse.com/show_bug.cgi?id=1221603 * https://bugzilla.suse.com/show_bug.cgi?id=1226047 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 18 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 18 Jun 2024 16:30:14 -0000 Subject: SUSE-RU-2024:2069-1: moderate: Recommended update for mksusecd Message-ID: <171872821490.25600.7864769137988664823@smelt2.prg2.suse.org> # Recommended update for mksusecd Announcement ID: SUSE-RU-2024:2069-1 Rating: moderate References: * bsc#1213185 * bsc#1213606 * bsc#1214789 * bsc#1218706 * bsc#1221603 * bsc#1226047 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that has six fixes can now be installed. ## Description: This update for mksusecd fixes the following issues: * Fix --no-joliet option and add warning about too long Joliet file names * Add more mkisofs log output in verbosity level 3 * Ensure mksusecd error code is preserved * Add info about Joliet file name limit to man page * Fix integrating software modules containing debuginfo packages (bsc#1226047) * Increase initrd xz compression level * Enforce de-duplication in mkisofs * Deal with systems where /tmp is a symlink (bsc#1221603) * Support usrmerged kmod package (bsc#1221603) * Handle compressed firmware files (bsc#1214789) * Allow also xz and zstd compression in repodata (bsc#1218706) * Allow --instsys option for Live media * Calculate EFI boot image size correctly * If initrd/kernel are in two different location on the medium, update in both locations * isohybrid: remove outdated 1024 cylinders warning * Default to GPT if source ISO uses it * Add --signature-file option and rewrite signature embedding * Fix --instsys option handling (bsc#1213606) * Add --rescue option to allow modifying the rescue system * Add --volume1 option to allow setting separate labels for both ISO file systems (bsc#1213185) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2069=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2069=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2069=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2069=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2069=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2069=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * mksusecd-debuginfo-2.18-150400.3.18.2 * mksusecd-debugsource-2.18-150400.3.18.2 * mksusecd-2.18-150400.3.18.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * mksusecd-debuginfo-2.18-150400.3.18.2 * mksusecd-debugsource-2.18-150400.3.18.2 * mksusecd-2.18-150400.3.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * mksusecd-debuginfo-2.18-150400.3.18.2 * mksusecd-debugsource-2.18-150400.3.18.2 * mksusecd-2.18-150400.3.18.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * mksusecd-debuginfo-2.18-150400.3.18.2 * mksusecd-debugsource-2.18-150400.3.18.2 * mksusecd-2.18-150400.3.18.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * mksusecd-debuginfo-2.18-150400.3.18.2 * mksusecd-debugsource-2.18-150400.3.18.2 * mksusecd-2.18-150400.3.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * mksusecd-debuginfo-2.18-150400.3.18.2 * mksusecd-debugsource-2.18-150400.3.18.2 * mksusecd-2.18-150400.3.18.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213185 * https://bugzilla.suse.com/show_bug.cgi?id=1213606 * https://bugzilla.suse.com/show_bug.cgi?id=1214789 * https://bugzilla.suse.com/show_bug.cgi?id=1218706 * https://bugzilla.suse.com/show_bug.cgi?id=1221603 * https://bugzilla.suse.com/show_bug.cgi?id=1226047 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 08:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 08:30:04 -0000 Subject: SUSE-RU-2024:33666-1: important: Recommended update for libsolv, libzypp, zypper Message-ID: <171878580406.31539.11828690533114615655@smelt2.prg2.suse.org> # Recommended update for libsolv, libzypp, zypper Announcement ID: SUSE-RU-2024:33666-1 Rating: important References: * bsc#1222086 * bsc#1223430 * bsc#1223766 * jsc#PED-8153 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that contains one feature and has three fixes can now be installed. ## Description: This update for libsolv, libzypp, zypper fixes the following issues: * Improve updating of installed multiversion packages * Fix decision introspection going into an endless loop in some cases * Split libsolv-tools into libsolv-tools-base [jsc#PED-8153] * Improve checks against corrupt rpm * Fixed check for outdated repo metadata as non-root user (bsc#1222086) * Add ZYPP_API for exported functions and switch to visibility=hidden (jsc#PED-8153) * Dynamically resolve libproxy (jsc#PED-8153) * Fix download from gpgkey URL (bsc#1223430) * Delay zypp lock until command options are parsed (bsc#1223766) * Unify message format ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch 33666=1 * SUSE Linux Enterprise Server 15 SP2 zypper in -t patch SUSE-SLE-INSTALLER-15-SP2-2024-33666=1 * SUSE Linux Enterprise Server 15 SP3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP3-2024-33666=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-33666=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-33666=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-33666=1 SUSE-SLE- Product-SLES_SAP-15-SP2-2024-33666=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-33666=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-Storage-7.1-2024-33666=1 SUSE-SLE-Product- SLES-15-SP3-LTSS-2024-33666=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-33666=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-33666=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-33666=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-33666=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-33666=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * perl-yui-4.1.5-150300.3.12.4 * libyui-qt-debugsource-4.1.5-150300.3.12.4 * libyui-bindings-debuginfo-4.1.5-150300.3.12.4 * libyui-ncurses-debugsource-4.1.5-150300.3.12.4 * libyui-ncurses-pkg-debugsource-4.1.5-150300.3.12.5 * libyui-qt-pkg15-4.1.5-150300.3.12.5 * libyui-rest-api-debugsource-4.1.5-150300.3.12.4 * ruby-yui-4.1.5-150300.3.12.4 * libyui-ncurses-pkg15-debuginfo-4.1.5-150300.3.12.5 * libyui-ncurses-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libyui-ncurses-tools-4.1.5-150300.3.12.4 * libyui-ncurses15-debuginfo-4.1.5-150300.3.12.4 * libyui-qt15-4.1.5-150300.3.12.4 * libyui15-4.1.5-150300.3.12.4 * libyui-ncurses-pkg15-4.1.5-150300.3.12.5 * libyui-rest-api-devel-4.1.5-150300.3.12.4 * libyui15-debuginfo-4.1.5-150300.3.12.4 * libyui-ncurses-rest-api-debugsource-4.1.5-150300.3.12.4 * yast2-pkg-bindings-debugsource-4.3.13-150300.3.10.11 * yast2-pkg-bindings-4.3.13-150300.3.10.11 * libyui-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libyui-qt15-debuginfo-4.1.5-150300.3.12.4 * python3-yui-debuginfo-4.1.5-150300.3.12.4 * libyui-ncurses-pkg-devel-4.1.5-150300.3.12.5 * libyui-ncurses-devel-4.1.5-150300.3.12.4 * libyui-qt-graph15-4.1.5-150300.3.12.4 * libyui-qt-graph-devel-4.1.5-150300.3.12.4 * libyui-qt-graph-debugsource-4.1.5-150300.3.12.4 * libyui-bindings-debugsource-4.1.5-150300.3.12.4 * perl-yui-debuginfo-4.1.5-150300.3.12.4 * libyui-qt-rest-api-devel-4.1.5-150300.3.12.4 * python3-yui-4.1.5-150300.3.12.4 * libyui-rest-api15-4.1.5-150300.3.12.4 * libyui-ncurses15-4.1.5-150300.3.12.4 * libyui-ncurses-rest-api15-4.1.5-150300.3.12.4 * libyui-qt-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libyui-ncurses-rest-api-devel-4.1.5-150300.3.12.4 * libyui-qt-rest-api-debugsource-4.1.5-150300.3.12.4 * libyui-qt-rest-api15-4.1.5-150300.3.12.4 * libyui-qt-pkg15-debuginfo-4.1.5-150300.3.12.5 * libyui-qt-pkg-debugsource-4.1.5-150300.3.12.5 * ruby-yui-debuginfo-4.1.5-150300.3.12.4 * libyui-qt-graph15-debuginfo-4.1.5-150300.3.12.4 * libyui-devel-4.1.5-150300.3.12.4 * libyui-qt-devel-4.1.5-150300.3.12.4 * yast2-pkg-bindings-debuginfo-4.3.13-150300.3.10.11 * libyui-qt-pkg-devel-4.1.5-150300.3.12.5 * libyui-debugsource-4.1.5-150300.3.12.4 * SUSE Linux Enterprise Server 15 SP2 (aarch64 ppc64le s390x x86_64) * yast2-pkg-bindings-4.2.17-150200.3.26.6 * libzypp-17.34.1-150200.106.2 * libsolv-tools-0.7.29-150200.34.1 * libyui-qt-pkg11-2.47.5-150200.3.6.6 * libyui-ncurses-pkg11-2.50.8-150200.3.7.5 * libsolv-tools-base-0.7.29-150200.34.1 * SUSE Linux Enterprise Server 15 SP3 (aarch64 ppc64le s390x x86_64) * libyui-ncurses-pkg15-4.1.5-150300.3.12.5 * libyui-qt-pkg15-4.1.5-150300.3.12.5 * libzypp-17.34.1-150200.106.2 * libsolv-tools-0.7.29-150200.34.1 * yast2-pkg-bindings-4.3.13-150300.3.10.11 * libsolv-tools-base-0.7.29-150200.34.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * yast2-pkg-bindings-debugsource-4.2.17-150200.3.26.6 * yast2-pkg-bindings-debuginfo-4.2.17-150200.3.26.6 * libzypp-17.34.1-150200.106.2 * libsolv-debugsource-0.7.29-150200.34.1 * zypper-1.14.73-150200.81.6 * libsolv-devel-debuginfo-0.7.29-150200.34.1 * libyui-ncurses-pkg-devel-2.50.8-150200.3.7.5 * libsolv-devel-0.7.29-150200.34.1 * PackageKit-devel-1.1.13-150200.4.33.6 * perl-solv-0.7.29-150200.34.1 * python3-solv-debuginfo-0.7.29-150200.34.1 * libsolv-tools-base-0.7.29-150200.34.1 * libyui-ncurses-pkg11-debuginfo-2.50.8-150200.3.7.5 * libyui-qt-pkg-debugsource-2.47.5-150200.3.6.6 * libyui-rest-api-debugsource-0.3.0-150200.3.4.5 * PackageKit-debuginfo-1.1.13-150200.4.33.6 * libyui11-3.9.3-150200.3.4.5 * libyui-qt-pkg11-debuginfo-2.47.5-150200.3.6.6 * typelib-1_0-PackageKitGlib-1_0-1.1.13-150200.4.33.6 * libyui-ncurses-pkg11-2.50.8-150200.3.7.5 * libyui-rest-api-devel-0.3.0-150200.3.4.5 * libyui-rest-api11-debuginfo-0.3.0-150200.3.4.5 * libyui-rest-api11-0.3.0-150200.3.4.5 * libpackagekit-glib2-18-1.1.13-150200.4.33.6 * libsolv-tools-debuginfo-0.7.29-150200.34.1 * libzypp-debugsource-17.34.1-150200.106.2 * ruby-solv-debuginfo-0.7.29-150200.34.1 * PackageKit-debugsource-1.1.13-150200.4.33.6 * zypper-debuginfo-1.14.73-150200.81.6 * libsolv-debuginfo-0.7.29-150200.34.1 * ruby-solv-0.7.29-150200.34.1 * zypper-debugsource-1.14.73-150200.81.6 * libpackagekit-glib2-18-debuginfo-1.1.13-150200.4.33.6 * libpackagekit-glib2-devel-1.1.13-150200.4.33.6 * yast2-pkg-bindings-4.2.17-150200.3.26.6 * PackageKit-backend-zypp-debuginfo-1.1.13-150200.4.33.6 * PackageKit-1.1.13-150200.4.33.6 * libyui11-debuginfo-3.9.3-150200.3.4.5 * libsolv-tools-0.7.29-150200.34.1 * libyui-qt-pkg-devel-2.47.5-150200.3.6.6 * perl-solv-debuginfo-0.7.29-150200.34.1 * libyui-qt-pkg11-2.47.5-150200.3.6.6 * PackageKit-devel-debuginfo-1.1.13-150200.4.33.6 * libsolv-tools-base-debuginfo-0.7.29-150200.34.1 * libzypp-devel-17.34.1-150200.106.2 * python3-solv-0.7.29-150200.34.1 * libzypp-debuginfo-17.34.1-150200.106.2 * libyui-debugsource-3.9.3-150200.3.4.5 * PackageKit-backend-zypp-1.1.13-150200.4.33.6 * libyui-devel-3.9.3-150200.3.4.5 * libyui-ncurses-pkg-debugsource-2.50.8-150200.3.7.5 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * zypper-log-1.14.73-150200.81.6 * PackageKit-branding-SLE-12.0-150200.9.4.5 * PackageKit-lang-1.1.13-150200.4.33.6 * zypper-needs-restarting-1.14.73-150200.81.6 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libyui-qt-debugsource-4.1.5-150300.3.12.4 * libyui-ncurses-debugsource-4.1.5-150300.3.12.4 * libyui-ncurses-pkg-debugsource-4.1.5-150300.3.12.5 * libyui-qt-pkg15-4.1.5-150300.3.12.5 * libyui-rest-api-debugsource-4.1.5-150300.3.12.4 * libzypp-17.34.1-150200.106.2 * libsolv-debugsource-0.7.29-150200.34.1 * libyui-ncurses-pkg15-debuginfo-4.1.5-150300.3.12.5 * zypper-1.14.73-150200.81.6 * libyui-ncurses-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libsolv-devel-debuginfo-0.7.29-150200.34.1 * libyui-ncurses-tools-4.1.5-150300.3.12.4 * libsolv-devel-0.7.29-150200.34.1 * libyui-ncurses15-debuginfo-4.1.5-150300.3.12.4 * PackageKit-devel-1.1.13-150200.4.33.6 * perl-solv-0.7.29-150200.34.1 * python3-solv-debuginfo-0.7.29-150200.34.1 * libsolv-tools-base-0.7.29-150200.34.1 * libyui-qt15-4.1.5-150300.3.12.4 * libyui15-4.1.5-150300.3.12.4 * libyui-ncurses-pkg15-4.1.5-150300.3.12.5 * libyui-rest-api-devel-4.1.5-150300.3.12.4 * libyui15-debuginfo-4.1.5-150300.3.12.4 * PackageKit-debuginfo-1.1.13-150200.4.33.6 * libyui-ncurses-rest-api-debugsource-4.1.5-150300.3.12.4 * yast2-pkg-bindings-debugsource-4.3.13-150300.3.10.11 * yast2-pkg-bindings-4.3.13-150300.3.10.11 * typelib-1_0-PackageKitGlib-1_0-1.1.13-150200.4.33.6 * libyui-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libyui-qt15-debuginfo-4.1.5-150300.3.12.4 * libyui-ncurses-pkg-devel-4.1.5-150300.3.12.5 * libpackagekit-glib2-18-1.1.13-150200.4.33.6 * libyui-ncurses-devel-4.1.5-150300.3.12.4 * libyui-qt-graph15-4.1.5-150300.3.12.4 * libsolv-tools-debuginfo-0.7.29-150200.34.1 * libyui-qt-graph-devel-4.1.5-150300.3.12.4 * libzypp-debugsource-17.34.1-150200.106.2 * libyui-qt-graph-debugsource-4.1.5-150300.3.12.4 * libyui-qt-rest-api-devel-4.1.5-150300.3.12.4 * ruby-solv-debuginfo-0.7.29-150200.34.1 * PackageKit-debugsource-1.1.13-150200.4.33.6 * libyui-rest-api15-4.1.5-150300.3.12.4 * libyui-ncurses-rest-api15-4.1.5-150300.3.12.4 * libyui-ncurses15-4.1.5-150300.3.12.4 * libyui-qt-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libsolv-debuginfo-0.7.29-150200.34.1 * yast2-pkg-bindings-debuginfo-4.3.13-150300.3.10.11 * libyui-ncurses-rest-api-devel-4.1.5-150300.3.12.4 * zypper-debuginfo-1.14.73-150200.81.6 * ruby-solv-0.7.29-150200.34.1 * zypper-debugsource-1.14.73-150200.81.6 * libyui-qt-rest-api-debugsource-4.1.5-150300.3.12.4 * libpackagekit-glib2-18-debuginfo-1.1.13-150200.4.33.6 * libpackagekit-glib2-devel-1.1.13-150200.4.33.6 * libyui-qt-pkg15-debuginfo-4.1.5-150300.3.12.5 * libyui-qt-rest-api15-4.1.5-150300.3.12.4 * PackageKit-backend-zypp-debuginfo-1.1.13-150200.4.33.6 * PackageKit-1.1.13-150200.4.33.6 * libsolv-tools-0.7.29-150200.34.1 * perl-solv-debuginfo-0.7.29-150200.34.1 * libyui-qt-pkg-debugsource-4.1.5-150300.3.12.5 * PackageKit-devel-debuginfo-1.1.13-150200.4.33.6 * libsolv-tools-base-debuginfo-0.7.29-150200.34.1 * libzypp-devel-17.34.1-150200.106.2 * python3-solv-0.7.29-150200.34.1 * libyui-qt-graph15-debuginfo-4.1.5-150300.3.12.4 * libyui-devel-4.1.5-150300.3.12.4 * libyui-qt-devel-4.1.5-150300.3.12.4 * libzypp-debuginfo-17.34.1-150200.106.2 * libyui-qt-pkg-devel-4.1.5-150300.3.12.5 * PackageKit-backend-zypp-1.1.13-150200.4.33.6 * libyui-debugsource-4.1.5-150300.3.12.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * zypper-log-1.14.73-150200.81.6 * PackageKit-branding-SLE-12.0-150200.9.4.5 * PackageKit-lang-1.1.13-150200.4.33.6 * zypper-needs-restarting-1.14.73-150200.81.6 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * yast2-pkg-bindings-debugsource-4.2.17-150200.3.26.6 * yast2-pkg-bindings-debuginfo-4.2.17-150200.3.26.6 * libzypp-17.34.1-150200.106.2 * libsolv-debugsource-0.7.29-150200.34.1 * zypper-1.14.73-150200.81.6 * libsolv-devel-debuginfo-0.7.29-150200.34.1 * libyui-ncurses-pkg-devel-2.50.8-150200.3.7.5 * libsolv-devel-0.7.29-150200.34.1 * PackageKit-devel-1.1.13-150200.4.33.6 * perl-solv-0.7.29-150200.34.1 * python3-solv-debuginfo-0.7.29-150200.34.1 * libsolv-tools-base-0.7.29-150200.34.1 * libyui-ncurses-pkg11-debuginfo-2.50.8-150200.3.7.5 * libyui-qt-pkg-debugsource-2.47.5-150200.3.6.6 * libyui-rest-api-debugsource-0.3.0-150200.3.4.5 * PackageKit-debuginfo-1.1.13-150200.4.33.6 * libyui11-3.9.3-150200.3.4.5 * libyui-qt-pkg11-debuginfo-2.47.5-150200.3.6.6 * typelib-1_0-PackageKitGlib-1_0-1.1.13-150200.4.33.6 * libyui-ncurses-pkg11-2.50.8-150200.3.7.5 * libyui-rest-api-devel-0.3.0-150200.3.4.5 * libyui-rest-api11-debuginfo-0.3.0-150200.3.4.5 * libyui-rest-api11-0.3.0-150200.3.4.5 * libpackagekit-glib2-18-1.1.13-150200.4.33.6 * libsolv-tools-debuginfo-0.7.29-150200.34.1 * libzypp-debugsource-17.34.1-150200.106.2 * ruby-solv-debuginfo-0.7.29-150200.34.1 * PackageKit-debugsource-1.1.13-150200.4.33.6 * zypper-debuginfo-1.14.73-150200.81.6 * libsolv-debuginfo-0.7.29-150200.34.1 * ruby-solv-0.7.29-150200.34.1 * zypper-debugsource-1.14.73-150200.81.6 * libpackagekit-glib2-18-debuginfo-1.1.13-150200.4.33.6 * libpackagekit-glib2-devel-1.1.13-150200.4.33.6 * yast2-pkg-bindings-4.2.17-150200.3.26.6 * PackageKit-backend-zypp-debuginfo-1.1.13-150200.4.33.6 * PackageKit-1.1.13-150200.4.33.6 * libyui11-debuginfo-3.9.3-150200.3.4.5 * libsolv-tools-0.7.29-150200.34.1 * libyui-qt-pkg-devel-2.47.5-150200.3.6.6 * perl-solv-debuginfo-0.7.29-150200.34.1 * libyui-qt-pkg11-2.47.5-150200.3.6.6 * PackageKit-devel-debuginfo-1.1.13-150200.4.33.6 * libsolv-tools-base-debuginfo-0.7.29-150200.34.1 * libzypp-devel-17.34.1-150200.106.2 * python3-solv-0.7.29-150200.34.1 * libzypp-debuginfo-17.34.1-150200.106.2 * libyui-debugsource-3.9.3-150200.3.4.5 * PackageKit-backend-zypp-1.1.13-150200.4.33.6 * libyui-devel-3.9.3-150200.3.4.5 * libyui-ncurses-pkg-debugsource-2.50.8-150200.3.7.5 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * zypper-log-1.14.73-150200.81.6 * PackageKit-branding-SLE-12.0-150200.9.4.5 * PackageKit-lang-1.1.13-150200.4.33.6 * zypper-needs-restarting-1.14.73-150200.81.6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * yast2-pkg-bindings-debugsource-4.2.17-150200.3.26.6 * yast2-pkg-bindings-debuginfo-4.2.17-150200.3.26.6 * libzypp-17.34.1-150200.106.2 * libsolv-debugsource-0.7.29-150200.34.1 * zypper-1.14.73-150200.81.6 * libsolv-devel-debuginfo-0.7.29-150200.34.1 * libyui-ncurses-pkg-devel-2.50.8-150200.3.7.5 * libsolv-devel-0.7.29-150200.34.1 * PackageKit-devel-1.1.13-150200.4.33.6 * perl-solv-0.7.29-150200.34.1 * python3-solv-debuginfo-0.7.29-150200.34.1 * libsolv-tools-base-0.7.29-150200.34.1 * libyui-ncurses-pkg11-debuginfo-2.50.8-150200.3.7.5 * libyui-qt-pkg-debugsource-2.47.5-150200.3.6.6 * libyui-rest-api-debugsource-0.3.0-150200.3.4.5 * PackageKit-debuginfo-1.1.13-150200.4.33.6 * libyui11-3.9.3-150200.3.4.5 * libyui-qt-pkg11-debuginfo-2.47.5-150200.3.6.6 * typelib-1_0-PackageKitGlib-1_0-1.1.13-150200.4.33.6 * libyui-ncurses-pkg11-2.50.8-150200.3.7.5 * libyui-rest-api-devel-0.3.0-150200.3.4.5 * libyui-rest-api11-debuginfo-0.3.0-150200.3.4.5 * libyui-rest-api11-0.3.0-150200.3.4.5 * libpackagekit-glib2-18-1.1.13-150200.4.33.6 * libsolv-tools-debuginfo-0.7.29-150200.34.1 * libzypp-debugsource-17.34.1-150200.106.2 * ruby-solv-debuginfo-0.7.29-150200.34.1 * PackageKit-debugsource-1.1.13-150200.4.33.6 * zypper-debuginfo-1.14.73-150200.81.6 * libsolv-debuginfo-0.7.29-150200.34.1 * ruby-solv-0.7.29-150200.34.1 * zypper-debugsource-1.14.73-150200.81.6 * libpackagekit-glib2-18-debuginfo-1.1.13-150200.4.33.6 * libpackagekit-glib2-devel-1.1.13-150200.4.33.6 * yast2-pkg-bindings-4.2.17-150200.3.26.6 * PackageKit-backend-zypp-debuginfo-1.1.13-150200.4.33.6 * PackageKit-1.1.13-150200.4.33.6 * libyui11-debuginfo-3.9.3-150200.3.4.5 * libsolv-tools-0.7.29-150200.34.1 * libyui-qt-pkg-devel-2.47.5-150200.3.6.6 * perl-solv-debuginfo-0.7.29-150200.34.1 * libyui-qt-pkg11-2.47.5-150200.3.6.6 * PackageKit-devel-debuginfo-1.1.13-150200.4.33.6 * libsolv-tools-base-debuginfo-0.7.29-150200.34.1 * libzypp-devel-17.34.1-150200.106.2 * python3-solv-0.7.29-150200.34.1 * libzypp-debuginfo-17.34.1-150200.106.2 * libyui-debugsource-3.9.3-150200.3.4.5 * PackageKit-backend-zypp-1.1.13-150200.4.33.6 * libyui-devel-3.9.3-150200.3.4.5 * libyui-ncurses-pkg-debugsource-2.50.8-150200.3.7.5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * zypper-log-1.14.73-150200.81.6 * PackageKit-branding-SLE-12.0-150200.9.4.5 * PackageKit-lang-1.1.13-150200.4.33.6 * zypper-needs-restarting-1.14.73-150200.81.6 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libyui-qt-debugsource-4.1.5-150300.3.12.4 * libyui-ncurses-debugsource-4.1.5-150300.3.12.4 * libyui-ncurses-pkg-debugsource-4.1.5-150300.3.12.5 * libyui-qt-pkg15-4.1.5-150300.3.12.5 * libyui-rest-api-debugsource-4.1.5-150300.3.12.4 * libzypp-17.34.1-150200.106.2 * libsolv-debugsource-0.7.29-150200.34.1 * libyui-ncurses-pkg15-debuginfo-4.1.5-150300.3.12.5 * zypper-1.14.73-150200.81.6 * libyui-ncurses-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libsolv-devel-debuginfo-0.7.29-150200.34.1 * libyui-ncurses-tools-4.1.5-150300.3.12.4 * libsolv-devel-0.7.29-150200.34.1 * libyui-ncurses15-debuginfo-4.1.5-150300.3.12.4 * PackageKit-devel-1.1.13-150200.4.33.6 * perl-solv-0.7.29-150200.34.1 * python3-solv-debuginfo-0.7.29-150200.34.1 * libsolv-tools-base-0.7.29-150200.34.1 * libyui-qt15-4.1.5-150300.3.12.4 * libyui15-4.1.5-150300.3.12.4 * libyui-ncurses-pkg15-4.1.5-150300.3.12.5 * libyui-rest-api-devel-4.1.5-150300.3.12.4 * libyui15-debuginfo-4.1.5-150300.3.12.4 * PackageKit-debuginfo-1.1.13-150200.4.33.6 * libyui-ncurses-rest-api-debugsource-4.1.5-150300.3.12.4 * yast2-pkg-bindings-debugsource-4.3.13-150300.3.10.11 * yast2-pkg-bindings-4.3.13-150300.3.10.11 * typelib-1_0-PackageKitGlib-1_0-1.1.13-150200.4.33.6 * libyui-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libyui-qt15-debuginfo-4.1.5-150300.3.12.4 * libyui-ncurses-pkg-devel-4.1.5-150300.3.12.5 * libpackagekit-glib2-18-1.1.13-150200.4.33.6 * libyui-ncurses-devel-4.1.5-150300.3.12.4 * libyui-qt-graph15-4.1.5-150300.3.12.4 * libsolv-tools-debuginfo-0.7.29-150200.34.1 * libyui-qt-graph-devel-4.1.5-150300.3.12.4 * libzypp-debugsource-17.34.1-150200.106.2 * libyui-qt-graph-debugsource-4.1.5-150300.3.12.4 * libyui-qt-rest-api-devel-4.1.5-150300.3.12.4 * ruby-solv-debuginfo-0.7.29-150200.34.1 * PackageKit-debugsource-1.1.13-150200.4.33.6 * libyui-rest-api15-4.1.5-150300.3.12.4 * libyui-ncurses-rest-api15-4.1.5-150300.3.12.4 * libyui-ncurses15-4.1.5-150300.3.12.4 * libyui-qt-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libsolv-debuginfo-0.7.29-150200.34.1 * yast2-pkg-bindings-debuginfo-4.3.13-150300.3.10.11 * libyui-ncurses-rest-api-devel-4.1.5-150300.3.12.4 * zypper-debuginfo-1.14.73-150200.81.6 * ruby-solv-0.7.29-150200.34.1 * zypper-debugsource-1.14.73-150200.81.6 * libyui-qt-rest-api-debugsource-4.1.5-150300.3.12.4 * libpackagekit-glib2-18-debuginfo-1.1.13-150200.4.33.6 * libpackagekit-glib2-devel-1.1.13-150200.4.33.6 * libyui-qt-pkg15-debuginfo-4.1.5-150300.3.12.5 * libyui-qt-rest-api15-4.1.5-150300.3.12.4 * PackageKit-backend-zypp-debuginfo-1.1.13-150200.4.33.6 * PackageKit-1.1.13-150200.4.33.6 * libsolv-tools-0.7.29-150200.34.1 * perl-solv-debuginfo-0.7.29-150200.34.1 * libyui-qt-pkg-debugsource-4.1.5-150300.3.12.5 * PackageKit-devel-debuginfo-1.1.13-150200.4.33.6 * libsolv-tools-base-debuginfo-0.7.29-150200.34.1 * libzypp-devel-17.34.1-150200.106.2 * python3-solv-0.7.29-150200.34.1 * libyui-qt-graph15-debuginfo-4.1.5-150300.3.12.4 * libyui-devel-4.1.5-150300.3.12.4 * libyui-qt-devel-4.1.5-150300.3.12.4 * libzypp-debuginfo-17.34.1-150200.106.2 * libyui-qt-pkg-devel-4.1.5-150300.3.12.5 * PackageKit-backend-zypp-1.1.13-150200.4.33.6 * libyui-debugsource-4.1.5-150300.3.12.4 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * zypper-log-1.14.73-150200.81.6 * PackageKit-branding-SLE-12.0-150200.9.4.5 * PackageKit-lang-1.1.13-150200.4.33.6 * zypper-needs-restarting-1.14.73-150200.81.6 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libyui-qt-debugsource-4.1.5-150300.3.12.4 * libyui-ncurses-debugsource-4.1.5-150300.3.12.4 * libyui-ncurses-pkg-debugsource-4.1.5-150300.3.12.5 * libyui-qt-pkg15-4.1.5-150300.3.12.5 * libyui-rest-api-debugsource-4.1.5-150300.3.12.4 * libzypp-17.34.1-150200.106.2 * libsolv-debugsource-0.7.29-150200.34.1 * libyui-ncurses-pkg15-debuginfo-4.1.5-150300.3.12.5 * zypper-1.14.73-150200.81.6 * libyui-ncurses-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libsolv-devel-debuginfo-0.7.29-150200.34.1 * libyui-ncurses-tools-4.1.5-150300.3.12.4 * libsolv-devel-0.7.29-150200.34.1 * libyui-ncurses15-debuginfo-4.1.5-150300.3.12.4 * PackageKit-devel-1.1.13-150200.4.33.6 * perl-solv-0.7.29-150200.34.1 * python3-solv-debuginfo-0.7.29-150200.34.1 * libsolv-tools-base-0.7.29-150200.34.1 * libyui-qt15-4.1.5-150300.3.12.4 * libyui15-4.1.5-150300.3.12.4 * libyui-ncurses-pkg15-4.1.5-150300.3.12.5 * libyui-rest-api-devel-4.1.5-150300.3.12.4 * libyui15-debuginfo-4.1.5-150300.3.12.4 * PackageKit-debuginfo-1.1.13-150200.4.33.6 * libyui-ncurses-rest-api-debugsource-4.1.5-150300.3.12.4 * yast2-pkg-bindings-debugsource-4.3.13-150300.3.10.11 * yast2-pkg-bindings-4.3.13-150300.3.10.11 * typelib-1_0-PackageKitGlib-1_0-1.1.13-150200.4.33.6 * libyui-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libyui-qt15-debuginfo-4.1.5-150300.3.12.4 * libyui-ncurses-pkg-devel-4.1.5-150300.3.12.5 * libpackagekit-glib2-18-1.1.13-150200.4.33.6 * libyui-ncurses-devel-4.1.5-150300.3.12.4 * libyui-qt-graph15-4.1.5-150300.3.12.4 * libsolv-tools-debuginfo-0.7.29-150200.34.1 * libyui-qt-graph-devel-4.1.5-150300.3.12.4 * libzypp-debugsource-17.34.1-150200.106.2 * libyui-qt-graph-debugsource-4.1.5-150300.3.12.4 * libyui-qt-rest-api-devel-4.1.5-150300.3.12.4 * ruby-solv-debuginfo-0.7.29-150200.34.1 * PackageKit-debugsource-1.1.13-150200.4.33.6 * libyui-rest-api15-4.1.5-150300.3.12.4 * libyui-ncurses-rest-api15-4.1.5-150300.3.12.4 * libyui-ncurses15-4.1.5-150300.3.12.4 * libyui-qt-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libsolv-debuginfo-0.7.29-150200.34.1 * yast2-pkg-bindings-debuginfo-4.3.13-150300.3.10.11 * libyui-ncurses-rest-api-devel-4.1.5-150300.3.12.4 * zypper-debuginfo-1.14.73-150200.81.6 * ruby-solv-0.7.29-150200.34.1 * zypper-debugsource-1.14.73-150200.81.6 * libyui-qt-rest-api-debugsource-4.1.5-150300.3.12.4 * libpackagekit-glib2-18-debuginfo-1.1.13-150200.4.33.6 * libpackagekit-glib2-devel-1.1.13-150200.4.33.6 * libyui-qt-pkg15-debuginfo-4.1.5-150300.3.12.5 * libyui-qt-rest-api15-4.1.5-150300.3.12.4 * PackageKit-backend-zypp-debuginfo-1.1.13-150200.4.33.6 * PackageKit-1.1.13-150200.4.33.6 * libsolv-tools-0.7.29-150200.34.1 * perl-solv-debuginfo-0.7.29-150200.34.1 * libyui-qt-pkg-debugsource-4.1.5-150300.3.12.5 * PackageKit-devel-debuginfo-1.1.13-150200.4.33.6 * libsolv-tools-base-debuginfo-0.7.29-150200.34.1 * libzypp-devel-17.34.1-150200.106.2 * python3-solv-0.7.29-150200.34.1 * libyui-qt-graph15-debuginfo-4.1.5-150300.3.12.4 * libyui-devel-4.1.5-150300.3.12.4 * libyui-qt-devel-4.1.5-150300.3.12.4 * libzypp-debuginfo-17.34.1-150200.106.2 * libyui-qt-pkg-devel-4.1.5-150300.3.12.5 * PackageKit-backend-zypp-1.1.13-150200.4.33.6 * libyui-debugsource-4.1.5-150300.3.12.4 * SUSE Enterprise Storage 7.1 (noarch) * zypper-log-1.14.73-150200.81.6 * PackageKit-branding-SLE-12.0-150200.9.4.5 * PackageKit-lang-1.1.13-150200.4.33.6 * zypper-needs-restarting-1.14.73-150200.81.6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libyui-qt-debugsource-4.1.5-150300.3.12.4 * libyui-ncurses-debugsource-4.1.5-150300.3.12.4 * libyui-ncurses-pkg-debugsource-4.1.5-150300.3.12.5 * libyui-qt-pkg15-4.1.5-150300.3.12.5 * libyui-rest-api-debugsource-4.1.5-150300.3.12.4 * libzypp-17.34.1-150200.106.2 * libsolv-debugsource-0.7.29-150200.34.1 * libyui-ncurses-pkg15-debuginfo-4.1.5-150300.3.12.5 * zypper-1.14.73-150200.81.6 * libyui-ncurses-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libsolv-devel-debuginfo-0.7.29-150200.34.1 * libyui-ncurses-tools-4.1.5-150300.3.12.4 * libsolv-devel-0.7.29-150200.34.1 * libyui-ncurses15-debuginfo-4.1.5-150300.3.12.4 * PackageKit-devel-1.1.13-150200.4.33.6 * perl-solv-0.7.29-150200.34.1 * python3-solv-debuginfo-0.7.29-150200.34.1 * libsolv-tools-base-0.7.29-150200.34.1 * libyui-qt15-4.1.5-150300.3.12.4 * libyui15-4.1.5-150300.3.12.4 * libyui-ncurses-pkg15-4.1.5-150300.3.12.5 * libyui-rest-api-devel-4.1.5-150300.3.12.4 * libyui15-debuginfo-4.1.5-150300.3.12.4 * PackageKit-debuginfo-1.1.13-150200.4.33.6 * libyui-ncurses-rest-api-debugsource-4.1.5-150300.3.12.4 * yast2-pkg-bindings-debugsource-4.3.13-150300.3.10.11 * yast2-pkg-bindings-4.3.13-150300.3.10.11 * typelib-1_0-PackageKitGlib-1_0-1.1.13-150200.4.33.6 * libyui-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libyui-qt15-debuginfo-4.1.5-150300.3.12.4 * libyui-ncurses-pkg-devel-4.1.5-150300.3.12.5 * libpackagekit-glib2-18-1.1.13-150200.4.33.6 * libyui-ncurses-devel-4.1.5-150300.3.12.4 * libyui-qt-graph15-4.1.5-150300.3.12.4 * libsolv-tools-debuginfo-0.7.29-150200.34.1 * libyui-qt-graph-devel-4.1.5-150300.3.12.4 * libzypp-debugsource-17.34.1-150200.106.2 * libyui-qt-graph-debugsource-4.1.5-150300.3.12.4 * libyui-qt-rest-api-devel-4.1.5-150300.3.12.4 * ruby-solv-debuginfo-0.7.29-150200.34.1 * PackageKit-debugsource-1.1.13-150200.4.33.6 * libyui-rest-api15-4.1.5-150300.3.12.4 * libyui-ncurses-rest-api15-4.1.5-150300.3.12.4 * libyui-ncurses15-4.1.5-150300.3.12.4 * libyui-qt-rest-api15-debuginfo-4.1.5-150300.3.12.4 * libsolv-debuginfo-0.7.29-150200.34.1 * yast2-pkg-bindings-debuginfo-4.3.13-150300.3.10.11 * libyui-ncurses-rest-api-devel-4.1.5-150300.3.12.4 * zypper-debuginfo-1.14.73-150200.81.6 * ruby-solv-0.7.29-150200.34.1 * zypper-debugsource-1.14.73-150200.81.6 * libyui-qt-rest-api-debugsource-4.1.5-150300.3.12.4 * libpackagekit-glib2-18-debuginfo-1.1.13-150200.4.33.6 * libpackagekit-glib2-devel-1.1.13-150200.4.33.6 * libyui-qt-pkg15-debuginfo-4.1.5-150300.3.12.5 * libyui-qt-rest-api15-4.1.5-150300.3.12.4 * PackageKit-backend-zypp-debuginfo-1.1.13-150200.4.33.6 * PackageKit-1.1.13-150200.4.33.6 * libsolv-tools-0.7.29-150200.34.1 * perl-solv-debuginfo-0.7.29-150200.34.1 * libyui-qt-pkg-debugsource-4.1.5-150300.3.12.5 * PackageKit-devel-debuginfo-1.1.13-150200.4.33.6 * libsolv-tools-base-debuginfo-0.7.29-150200.34.1 * libzypp-devel-17.34.1-150200.106.2 * python3-solv-0.7.29-150200.34.1 * libyui-qt-graph15-debuginfo-4.1.5-150300.3.12.4 * libyui-devel-4.1.5-150300.3.12.4 * libyui-qt-devel-4.1.5-150300.3.12.4 * libzypp-debuginfo-17.34.1-150200.106.2 * libyui-qt-pkg-devel-4.1.5-150300.3.12.5 * PackageKit-backend-zypp-1.1.13-150200.4.33.6 * libyui-debugsource-4.1.5-150300.3.12.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * zypper-log-1.14.73-150200.81.6 * PackageKit-branding-SLE-12.0-150200.9.4.5 * PackageKit-lang-1.1.13-150200.4.33.6 * zypper-needs-restarting-1.14.73-150200.81.6 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libsolv-tools-debuginfo-0.7.29-150200.34.1 * libzypp-debugsource-17.34.1-150200.106.2 * libzypp-17.34.1-150200.106.2 * libsolv-debugsource-0.7.29-150200.34.1 * libsolv-tools-0.7.29-150200.34.1 * zypper-debuginfo-1.14.73-150200.81.6 * zypper-1.14.73-150200.81.6 * libsolv-tools-base-debuginfo-0.7.29-150200.34.1 * libsolv-debuginfo-0.7.29-150200.34.1 * libzypp-debuginfo-17.34.1-150200.106.2 * zypper-debugsource-1.14.73-150200.81.6 * libsolv-tools-base-0.7.29-150200.34.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * zypper-needs-restarting-1.14.73-150200.81.6 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libsolv-tools-debuginfo-0.7.29-150200.34.1 * libzypp-debugsource-17.34.1-150200.106.2 * libzypp-17.34.1-150200.106.2 * libsolv-debugsource-0.7.29-150200.34.1 * libsolv-tools-0.7.29-150200.34.1 * zypper-debuginfo-1.14.73-150200.81.6 * zypper-1.14.73-150200.81.6 * libsolv-tools-base-debuginfo-0.7.29-150200.34.1 * libsolv-debuginfo-0.7.29-150200.34.1 * libzypp-debuginfo-17.34.1-150200.106.2 * zypper-debugsource-1.14.73-150200.81.6 * libsolv-tools-base-0.7.29-150200.34.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * zypper-needs-restarting-1.14.73-150200.81.6 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libsolv-tools-debuginfo-0.7.29-150200.34.1 * libzypp-debugsource-17.34.1-150200.106.2 * libzypp-17.34.1-150200.106.2 * libsolv-debugsource-0.7.29-150200.34.1 * libsolv-tools-0.7.29-150200.34.1 * zypper-debuginfo-1.14.73-150200.81.6 * zypper-1.14.73-150200.81.6 * libsolv-tools-base-debuginfo-0.7.29-150200.34.1 * libsolv-debuginfo-0.7.29-150200.34.1 * libzypp-debuginfo-17.34.1-150200.106.2 * zypper-debugsource-1.14.73-150200.81.6 * libsolv-tools-base-0.7.29-150200.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * zypper-needs-restarting-1.14.73-150200.81.6 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222086 * https://bugzilla.suse.com/show_bug.cgi?id=1223430 * https://bugzilla.suse.com/show_bug.cgi?id=1223766 * https://jira.suse.com/browse/PED-8153 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 08:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 08:30:07 -0000 Subject: SUSE-RU-2024:33664-1: important: Recommended update for libsolv, libzypp, zypper, PackageKit-branding-SLE, PackageKit, libyui, yast2-pkg-bindings Message-ID: <171878580789.31539.12315887143333408943@smelt2.prg2.suse.org> # Recommended update for libsolv, libzypp, zypper, PackageKit-branding-SLE, PackageKit, libyui, yast2-pkg-bindings Announcement ID: SUSE-RU-2024:33664-1 Rating: important References: * bsc#1222086 * bsc#1223430 * bsc#1223766 * bsc#1224242 * jsc#PED-8153 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP5 * Desktop Applications Module 15-SP6 * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that contains one feature and has four fixes can now be installed. ## Description: This update for libsolv, libzypp, zypper, PackageKit-branding-SLE, PackageKit, libyui, yast2-pkg-bindings fixes the following issues: * Fix the dependency for Packagekit-backend-zypp in SUMa 4.3 (bsc#1224242) * Improve updating of installed multiversion packages * Fix decision introspection going into an endless loop in some cases * Split libsolv-tools into libsolv-tools-base [jsc#PED-8153] * Improve checks against corrupt rpm * Fixed check for outdated repo metadata as non-root user (bsc#1222086) * Add ZYPP_API for exported functions and switch to visibility=hidden (jsc#PED-8153) * Dynamically resolve libproxy (jsc#PED-8153) * Fix download from gpgkey URL (bsc#1223430) * Delay zypp lock until command options are parsed (bsc#1223766) * Unify message format ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch 33664=1 * openSUSE Leap 15.5 zypper in -t patch 33664=1 openSUSE-SLE-15.5-2024-33664=1 * openSUSE Leap 15.6 zypper in -t patch 33664=1 openSUSE-SLE-15.6-2024-33664=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-33664=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-33664=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-33664=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-33664=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-33664=1 SUSE- SLE-INSTALLER-15-SP4-2024-33664=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-33664=1 SUSE-SLE- INSTALLER-15-SP4-2024-33664=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-33664=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-33664=1 SUSE-SLE-INSTALLER-15-SP4-2024-33664=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-33664=1 SUSE- SLE-INSTALLER-15-SP4-2024-33664=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-33664=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-33664=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-33664=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-33664=1 * SUSE Linux Enterprise High Performance Computing 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-33664=1 * SUSE Linux Enterprise Server 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-33664=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-33664=1 * SUSE Linux Enterprise Desktop 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-33664=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-33664=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-33664=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-33664=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-33664=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-33664=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-33664=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-33664=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-33664=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-33664=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-33664=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-33664=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-33664=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-33664=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-33664=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-33664=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-33664=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-33664=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-33664=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-33664=1 ## Package List: * openSUSE Leap 15.4 (noarch) * zypper-log-1.14.73-150400.3.50.10 * zypper-needs-restarting-1.14.73-150400.3.50.10 * zypper-aptitude-1.14.73-150400.3.50.10 * PackageKit-branding-SLE-12.0-150400.15.4.9 * PackageKit-branding-upstream-1.2.4-150400.3.17.10 * PackageKit-lang-1.2.4-150400.3.17.10 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libyui-qt-graph-devel-4.3.7-150400.3.9.9 * libyui-ncurses-pkg-debugsource-4.3.7-150400.3.9.10 * libzypp-devel-doc-17.34.1-150400.3.71.7 * PackageKit-backend-dnf-debuginfo-1.2.4-150400.3.17.10 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.17.10 * PackageKit-backend-zypp-1.2.4-150400.3.17.10 * libyui-bindings-debugsource-4.3.7-150400.3.9.9 * libyui-qt-graph16-4.3.7-150400.3.9.9 * perl-yui-4.3.7-150400.3.9.9 * libyui-ncurses-pkg16-4.3.7-150400.3.9.10 * libzypp-devel-17.34.1-150400.3.71.7 * PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.17.10 * PackageKit-gtk3-module-1.2.4-150400.3.17.10 * libyui-qt-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-qt16-4.3.7-150400.3.9.9 * libyui-bindings-debuginfo-4.3.7-150400.3.9.9 * libzypp-debuginfo-17.34.1-150400.3.71.7 * python311-solv-0.7.29-150400.3.22.4 * python3-yui-4.3.7-150400.3.9.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-debugsource-4.3.7-150400.3.9.9 * ruby-yui-4.3.7-150400.3.9.9 * libyui-qt-pkg-devel-4.3.7-150400.3.9.10 * zypper-debugsource-1.14.73-150400.3.50.10 * perl-solv-0.7.29-150400.3.22.4 * libyui-qt-graph16-debuginfo-4.3.7-150400.3.9.9 * libyui-ncurses-tools-4.3.7-150400.3.9.9 * libyui-ncurses16-4.3.7-150400.3.9.9 * libyui-ncurses-devel-4.3.7-150400.3.9.9 * libsolv-demo-0.7.29-150400.3.22.4 * libyui-debugsource-4.3.7-150400.3.9.9 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.17.10 * python3-yui-debuginfo-4.3.7-150400.3.9.9 * libsolv-tools-0.7.29-150400.3.22.4 * libpackagekit-glib2-devel-1.2.4-150400.3.17.10 * libyui-qt-graph-debugsource-4.3.7-150400.3.9.9 * PackageKit-backend-dnf-1.2.4-150400.3.17.10 * libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.9.9 * perl-yui-debuginfo-4.3.7-150400.3.9.9 * PackageKit-devel-debuginfo-1.2.4-150400.3.17.10 * libyui-rest-api16-debuginfo-4.3.7-150400.3.9.9 * python3-solv-0.7.29-150400.3.22.4 * PackageKit-1.2.4-150400.3.17.10 * perl-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-rest-api16-4.3.7-150400.3.9.9 * libsolv-demo-debuginfo-0.7.29-150400.3.22.4 * PackageKit-devel-1.2.4-150400.3.17.10 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui-qt-rest-api-debugsource-4.3.7-150400.3.9.9 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-devel-4.3.7-150400.3.9.10 * libyui-rest-api-devel-4.3.7-150400.3.9.9 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.17.10 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * python311-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses16-debuginfo-4.3.7-150400.3.9.9 * zypper-1.14.73-150400.3.50.10 * libyui-ncurses-rest-api-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg16-4.3.7-150400.3.9.10 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libzypp-debugsource-17.34.1-150400.3.71.7 * libyui-ncurses-rest-api16-4.3.7-150400.3.9.9 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-rest-api16-4.3.7-150400.3.9.9 * yast2-pkg-bindings-debuginfo-4.4.7-150400.3.13.10 * libyui-qt16-debuginfo-4.3.7-150400.3.9.9 * libzypp-17.34.1-150400.3.71.7 * PackageKit-debuginfo-1.2.4-150400.3.17.10 * ruby-yui-debuginfo-4.3.7-150400.3.9.9 * libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.9.9 * PackageKit-debugsource-1.2.4-150400.3.17.10 * libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.9.9 * libyui-qt-debugsource-4.3.7-150400.3.9.9 * libyui-qt-devel-4.3.7-150400.3.9.9 * zypper-debuginfo-1.14.73-150400.3.50.10 * PackageKit-gstreamer-plugin-1.2.4-150400.3.17.10 * yast2-pkg-bindings-4.4.7-150400.3.13.10 * libsolv-devel-0.7.29-150400.3.22.4 * libpackagekit-glib2-18-1.2.4-150400.3.17.10 * libyui-qt-pkg16-debuginfo-4.3.7-150400.3.9.10 * libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.9.10 * libyui16-debuginfo-4.3.7-150400.3.9.9 * libyui16-4.3.7-150400.3.9.9 * ruby-solv-0.7.29-150400.3.22.4 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.17.10 * libyui-rest-api-debugsource-4.3.7-150400.3.9.9 * yast2-pkg-bindings-debugsource-4.4.7-150400.3.13.10 * libyui-qt-rest-api-devel-4.3.7-150400.3.9.9 * libyui-devel-4.3.7-150400.3.9.9 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * openSUSE Leap 15.4 (x86_64) * libpackagekit-glib2-18-32bit-1.2.4-150400.3.17.10 * libpackagekit-glib2-devel-32bit-1.2.4-150400.3.17.10 * libpackagekit-glib2-18-32bit-debuginfo-1.2.4-150400.3.17.10 * openSUSE Leap 15.4 (aarch64_ilp32) * libpackagekit-glib2-18-64bit-debuginfo-1.2.4-150400.3.17.10 * libpackagekit-glib2-18-64bit-1.2.4-150400.3.17.10 * libpackagekit-glib2-devel-64bit-1.2.4-150400.3.17.10 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libyui-ncurses-rest-api-devel-4.5.3-150500.3.7.8 * libyui-debugsource-4.5.3-150500.3.7.8 * libyui16-debuginfo-4.5.3-150500.3.7.8 * perl-yui-4.5.3-150500.3.7.8 * ruby-yui-4.5.3-150500.3.7.8 * libyui-ncurses-tools-4.5.3-150500.3.7.8 * libyui16-4.5.3-150500.3.7.8 * libyui-ncurses-pkg-devel-4.5.3-150500.3.7.9 * libyui-devel-4.5.3-150500.3.7.8 * python3-yui-4.5.3-150500.3.7.8 * libyui-ncurses-debugsource-4.5.3-150500.3.7.8 * libyui-ncurses16-4.5.3-150500.3.7.8 * libyui-qt-devel-4.5.3-150500.3.7.8 * libyui-ncurses-rest-api16-4.5.3-150500.3.7.8 * libyui-qt-rest-api16-4.5.3-150500.3.7.8 * libyui-qt-pkg16-debuginfo-4.5.3-150500.3.7.9 * libyui-rest-api16-4.5.3-150500.3.7.8 * perl-yui-debuginfo-4.5.3-150500.3.7.8 * libyui-ncurses-devel-4.5.3-150500.3.7.8 * libyui-qt16-debuginfo-4.5.3-150500.3.7.8 * libyui-rest-api-devel-4.5.3-150500.3.7.8 * yast2-pkg-bindings-debugsource-4.5.3-150500.3.7.17 * libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.7.8 * ruby-yui-debuginfo-4.5.3-150500.3.7.8 * libyui-ncurses-pkg16-4.5.3-150500.3.7.9 * libyui-ncurses16-debuginfo-4.5.3-150500.3.7.8 * libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.7.8 * libyui-rest-api16-debuginfo-4.5.3-150500.3.7.8 * yast2-pkg-bindings-debuginfo-4.5.3-150500.3.7.17 * libyui-bindings-debuginfo-4.5.3-150500.3.7.8 * libyui-ncurses-pkg-debugsource-4.5.3-150500.3.7.9 * libyui-qt-pkg-devel-4.5.3-150500.3.7.9 * libyui-qt-graph-devel-4.5.3-150500.3.7.8 * libyui-qt-pkg16-4.5.3-150500.3.7.9 * yast2-pkg-bindings-4.5.3-150500.3.7.17 * libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.7.9 * libyui-qt-graph-debugsource-4.5.3-150500.3.7.8 * libyui-qt-graph16-debuginfo-4.5.3-150500.3.7.8 * libyui-rest-api-debugsource-4.5.3-150500.3.7.8 * libyui-bindings-debugsource-4.5.3-150500.3.7.8 * libyui-qt16-4.5.3-150500.3.7.8 * libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.7.8 * libyui-qt-rest-api-debugsource-4.5.3-150500.3.7.8 * libyui-qt-pkg-debugsource-4.5.3-150500.3.7.9 * libyui-qt-rest-api-devel-4.5.3-150500.3.7.8 * libyui-qt-debugsource-4.5.3-150500.3.7.8 * python3-yui-debuginfo-4.5.3-150500.3.7.8 * libyui-qt-graph16-4.5.3-150500.3.7.8 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libsolv-tools-base-0.7.29-150400.3.22.4 * PackageKit-debuginfo-1.2.4-150400.3.17.10 * libzypp-devel-doc-17.34.1-150400.3.71.7 * PackageKit-debugsource-1.2.4-150400.3.17.10 * PackageKit-backend-dnf-debuginfo-1.2.4-150400.3.17.10 * zypper-debuginfo-1.14.73-150400.3.50.10 * PackageKit-gstreamer-plugin-1.2.4-150400.3.17.10 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.17.10 * zypper-debugsource-1.14.73-150400.3.50.10 * PackageKit-backend-zypp-1.2.4-150400.3.17.10 * libsolv-devel-0.7.29-150400.3.22.4 * python3-solv-0.7.29-150400.3.22.4 * PackageKit-1.2.4-150400.3.17.10 * perl-solv-0.7.29-150400.3.22.4 * libpackagekit-glib2-18-1.2.4-150400.3.17.10 * perl-solv-debuginfo-0.7.29-150400.3.22.4 * libsolv-demo-debuginfo-0.7.29-150400.3.22.4 * libzypp-devel-17.34.1-150400.3.71.7 * libsolv-demo-0.7.29-150400.3.22.4 * PackageKit-devel-1.2.4-150400.3.17.10 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.17.10 * PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.17.10 * libsolv-debugsource-0.7.29-150400.3.22.4 * PackageKit-gtk3-module-1.2.4-150400.3.17.10 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.17.10 * libpackagekit-glib2-devel-1.2.4-150400.3.17.10 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * zypper-1.14.73-150400.3.50.10 * ruby-solv-0.7.29-150400.3.22.4 * libzypp-debugsource-17.34.1-150400.3.71.7 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.17.10 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * PackageKit-backend-dnf-1.2.4-150400.3.17.10 * libsolv-debuginfo-0.7.29-150400.3.22.4 * PackageKit-devel-debuginfo-1.2.4-150400.3.17.10 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * openSUSE Leap 15.5 (noarch) * zypper-log-1.14.73-150400.3.50.10 * zypper-needs-restarting-1.14.73-150400.3.50.10 * zypper-aptitude-1.14.73-150400.3.50.10 * PackageKit-branding-SLE-12.0-150400.15.4.9 * PackageKit-branding-upstream-1.2.4-150400.3.17.10 * PackageKit-lang-1.2.4-150400.3.17.10 * openSUSE Leap 15.5 (x86_64) * libpackagekit-glib2-18-32bit-1.2.4-150400.3.17.10 * libpackagekit-glib2-devel-32bit-1.2.4-150400.3.17.10 * libpackagekit-glib2-18-32bit-debuginfo-1.2.4-150400.3.17.10 * openSUSE Leap 15.6 (noarch) * PackageKit-branding-SLE-12.0-150600.22.2.4 * zypper-log-1.14.71-150600.10.2.7 * zypper-needs-restarting-1.14.71-150600.10.2.7 * zypper-aptitude-1.14.71-150600.10.2.7 * PackageKit-lang-1.2.8-150600.4.2.7 * PackageKit-branding-upstream-1.2.8-150600.4.2.7 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.2.7 * PackageKit-1.2.8-150600.4.2.7 * libzypp-debugsource-17.34.1-150600.3.4.6 * zypper-1.14.71-150600.10.2.7 * zypper-debuginfo-1.14.71-150600.10.2.7 * libzypp-devel-17.34.1-150600.3.4.6 * zypper-debugsource-1.14.71-150600.10.2.7 * PackageKit-backend-dnf-debuginfo-1.2.8-150600.4.2.7 * libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.2.7 * PackageKit-backend-dnf-1.2.8-150600.4.2.7 * yast2-pkg-bindings-4.6.5-150600.3.2.8 * libpackagekit-glib2-devel-1.2.8-150600.4.2.7 * yast2-pkg-bindings-debuginfo-4.6.5-150600.3.2.8 * libzypp-devel-doc-17.34.1-150600.3.4.6 * PackageKit-debuginfo-1.2.8-150600.4.2.7 * libpackagekit-glib2-18-1.2.8-150600.4.2.7 * PackageKit-devel-1.2.8-150600.4.2.7 * libzypp-debuginfo-17.34.1-150600.3.4.6 * PackageKit-gtk3-module-1.2.8-150600.4.2.7 * PackageKit-gtk3-module-debuginfo-1.2.8-150600.4.2.7 * yast2-pkg-bindings-debugsource-4.6.5-150600.3.2.8 * PackageKit-gstreamer-plugin-1.2.8-150600.4.2.7 * PackageKit-devel-debuginfo-1.2.8-150600.4.2.7 * PackageKit-gstreamer-plugin-debuginfo-1.2.8-150600.4.2.7 * PackageKit-backend-zypp-1.2.8-150600.4.2.7 * libzypp-17.34.1-150600.3.4.6 * PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.2.7 * PackageKit-debugsource-1.2.8-150600.4.2.7 * openSUSE Leap 15.6 (x86_64) * libpackagekit-glib2-devel-32bit-1.2.8-150600.4.2.7 * libpackagekit-glib2-18-32bit-1.2.8-150600.4.2.7 * libpackagekit-glib2-18-32bit-debuginfo-1.2.8-150600.4.2.7 * openSUSE Leap 15.6 (aarch64_ilp32) * libpackagekit-glib2-18-64bit-debuginfo-1.2.8-150600.4.2.7 * libpackagekit-glib2-devel-64bit-1.2.8-150600.4.2.7 * libpackagekit-glib2-18-64bit-1.2.8-150600.4.2.7 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libyui-ncurses-rest-api-devel-4.5.3-150500.3.7.8 * libyui-debugsource-4.5.3-150500.3.7.8 * python311-solv-0.7.29-150400.3.22.4 * libyui16-debuginfo-4.5.3-150500.3.7.8 * perl-yui-4.5.3-150500.3.7.8 * ruby-yui-4.5.3-150500.3.7.8 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-devel-4.5.3-150500.3.7.9 * libyui-ncurses-tools-4.5.3-150500.3.7.8 * libyui16-4.5.3-150500.3.7.8 * libyui-devel-4.5.3-150500.3.7.8 * python3-yui-debuginfo-4.5.3-150500.3.7.8 * python3-yui-4.5.3-150500.3.7.8 * libyui-ncurses-debugsource-4.5.3-150500.3.7.8 * libyui-ncurses16-4.5.3-150500.3.7.8 * libyui-qt-devel-4.5.3-150500.3.7.8 * libyui-ncurses-rest-api16-4.5.3-150500.3.7.8 * libyui-qt-rest-api16-4.5.3-150500.3.7.8 * libyui-rest-api16-4.5.3-150500.3.7.8 * perl-yui-debuginfo-4.5.3-150500.3.7.8 * libyui-ncurses-devel-4.5.3-150500.3.7.8 * libyui-qt16-debuginfo-4.5.3-150500.3.7.8 * libyui-rest-api-devel-4.5.3-150500.3.7.8 * libsolv-devel-0.7.29-150400.3.22.4 * libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.7.8 * libyui-ncurses-pkg16-4.5.3-150500.3.7.9 * perl-solv-0.7.29-150400.3.22.4 * python3-solv-0.7.29-150400.3.22.4 * ruby-yui-debuginfo-4.5.3-150500.3.7.8 * libyui-ncurses16-debuginfo-4.5.3-150500.3.7.8 * libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.7.8 * libyui-rest-api16-debuginfo-4.5.3-150500.3.7.8 * libyui-bindings-debuginfo-4.5.3-150500.3.7.8 * perl-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-debugsource-4.5.3-150500.3.7.9 * libsolv-demo-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-pkg-devel-4.5.3-150500.3.7.9 * libsolv-demo-0.7.29-150400.3.22.4 * libyui-qt-graph-devel-4.5.3-150500.3.7.8 * libyui-qt-pkg16-4.5.3-150500.3.7.9 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.7.9 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-graph-debugsource-4.5.3-150500.3.7.8 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-graph16-debuginfo-4.5.3-150500.3.7.8 * python311-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-rest-api-debugsource-4.5.3-150500.3.7.8 * libyui-bindings-debugsource-4.5.3-150500.3.7.8 * libyui-qt16-4.5.3-150500.3.7.8 * libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.7.8 * ruby-solv-0.7.29-150400.3.22.4 * libyui-qt-rest-api-debugsource-4.5.3-150500.3.7.8 * libyui-qt-pkg-debugsource-4.5.3-150500.3.7.9 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-rest-api-devel-4.5.3-150500.3.7.8 * libyui-qt-debugsource-4.5.3-150500.3.7.8 * libyui-qt-pkg16-debuginfo-4.5.3-150500.3.7.9 * libyui-qt-graph16-4.5.3-150500.3.7.8 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * zypper-debuginfo-1.14.73-150400.3.50.10 * zypper-1.14.73-150400.3.50.10 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-debugsource-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libsolv-debugsource-0.7.29-150400.3.22.4 * zypper-debugsource-1.14.73-150400.3.50.10 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64) * libsolv-tools-base-0.7.29-150400.3.22.4 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * openSUSE Leap Micro 5.3 (noarch) * zypper-needs-restarting-1.14.73-150400.3.50.10 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * zypper-debuginfo-1.14.73-150400.3.50.10 * zypper-1.14.73-150400.3.50.10 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-debugsource-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libsolv-debugsource-0.7.29-150400.3.22.4 * zypper-debugsource-1.14.73-150400.3.50.10 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64) * libsolv-tools-base-0.7.29-150400.3.22.4 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * openSUSE Leap Micro 5.4 (noarch) * zypper-needs-restarting-1.14.73-150400.3.50.10 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libyui-qt-pkg16-4.3.7-150400.3.9.10 * libzypp-17.34.1-150400.3.71.7 * yast2-pkg-bindings-4.4.7-150400.3.13.10 * libyui-ncurses-rest-api16-4.3.7-150400.3.9.9 * libyui-qt-graph16-4.3.7-150400.3.9.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * libsolv-tools-0.7.29-150400.3.22.4 * libyui-qt16-4.3.7-150400.3.9.9 * libyui-qt-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses16-4.3.7-150400.3.9.9 * libyui16-4.3.7-150400.3.9.9 * libyui-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses-pkg16-4.3.7-150400.3.9.10 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64) * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libyui-qt-pkg16-4.3.7-150400.3.9.10 * libzypp-17.34.1-150400.3.71.7 * yast2-pkg-bindings-4.4.7-150400.3.13.10 * libyui-ncurses-rest-api16-4.3.7-150400.3.9.9 * libyui-qt-graph16-4.3.7-150400.3.9.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * libsolv-tools-0.7.29-150400.3.22.4 * libyui-qt16-4.3.7-150400.3.9.9 * libyui-qt-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses16-4.3.7-150400.3.9.9 * libyui16-4.3.7-150400.3.9.9 * libyui-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses-pkg16-4.3.7-150400.3.9.10 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le) * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libyui-qt16-debuginfo-4.3.7-150400.3.9.9 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libyui-qt-graph-devel-4.3.7-150400.3.9.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-qt-debugsource-4.3.7-150400.3.9.9 * libyui-qt-devel-4.3.7-150400.3.9.9 * zypper-debuginfo-1.14.73-150400.3.50.10 * yast2-pkg-bindings-4.4.7-150400.3.13.10 * zypper-debugsource-1.14.73-150400.3.50.10 * libyui-qt-graph16-4.3.7-150400.3.9.9 * PackageKit-backend-zypp-1.2.4-150400.3.17.10 * libsolv-devel-0.7.29-150400.3.22.4 * python3-solv-0.7.29-150400.3.22.4 * PackageKit-1.2.4-150400.3.17.10 * libyui-qt-graph16-debuginfo-4.3.7-150400.3.9.9 * libyui-ncurses-tools-4.3.7-150400.3.9.9 * libyui-ncurses16-4.3.7-150400.3.9.9 * libpackagekit-glib2-18-1.2.4-150400.3.17.10 * libyui-ncurses-devel-4.3.7-150400.3.9.9 * libyui-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses-pkg16-4.3.7-150400.3.9.10 * libzypp-devel-17.34.1-150400.3.71.7 * libyui-debugsource-4.3.7-150400.3.9.9 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.9.10 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui16-debuginfo-4.3.7-150400.3.9.9 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-devel-4.3.7-150400.3.9.10 * libyui16-4.3.7-150400.3.9.9 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * libyui-qt16-4.3.7-150400.3.9.9 * libyui-qt-graph-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses16-debuginfo-4.3.7-150400.3.9.9 * zypper-1.14.73-150400.3.50.10 * ruby-solv-0.7.29-150400.3.22.4 * libzypp-debugsource-17.34.1-150400.3.71.7 * libyui-qt-pkg16-4.3.7-150400.3.9.10 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-rest-api16-4.3.7-150400.3.9.9 * libsolv-debuginfo-0.7.29-150400.3.22.4 * yast2-pkg-bindings-debugsource-4.4.7-150400.3.13.10 * libyui-qt-rest-api16-4.3.7-150400.3.9.9 * yast2-pkg-bindings-debuginfo-4.4.7-150400.3.13.10 * libyui-devel-4.3.7-150400.3.9.9 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * SUSE Manager Server 4.3 (noarch) * PackageKit-branding-SLE-12.0-150400.15.4.9 * zypper-log-1.14.73-150400.3.50.10 * zypper-needs-restarting-1.14.73-150400.3.50.10 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libyui-qt16-debuginfo-4.3.7-150400.3.9.9 * libyui-rest-api16-debuginfo-4.3.7-150400.3.9.9 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libyui-qt-graph-devel-4.3.7-150400.3.9.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * PackageKit-debuginfo-1.2.4-150400.3.17.10 * libyui-ncurses-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.9.9 * PackageKit-debugsource-1.2.4-150400.3.17.10 * libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.9.9 * libyui-qt-debugsource-4.3.7-150400.3.9.9 * libyui-qt-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg-devel-4.3.7-150400.3.9.10 * zypper-debuginfo-1.14.73-150400.3.50.10 * yast2-pkg-bindings-4.4.7-150400.3.13.10 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.17.10 * zypper-debugsource-1.14.73-150400.3.50.10 * libyui-qt-graph16-4.3.7-150400.3.9.9 * PackageKit-backend-zypp-1.2.4-150400.3.17.10 * libsolv-devel-0.7.29-150400.3.22.4 * python3-solv-0.7.29-150400.3.22.4 * PackageKit-1.2.4-150400.3.17.10 * libyui-qt-graph16-debuginfo-4.3.7-150400.3.9.9 * perl-solv-0.7.29-150400.3.22.4 * libyui-ncurses-tools-4.3.7-150400.3.9.9 * libyui-ncurses16-4.3.7-150400.3.9.9 * libpackagekit-glib2-18-1.2.4-150400.3.17.10 * libyui-ncurses-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg16-debuginfo-4.3.7-150400.3.9.10 * libyui-rest-api16-4.3.7-150400.3.9.9 * perl-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.3.7-150400.3.9.10 * libzypp-devel-17.34.1-150400.3.71.7 * libyui-debugsource-4.3.7-150400.3.9.9 * PackageKit-devel-1.2.4-150400.3.17.10 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.9.10 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui-qt-rest-api-debugsource-4.3.7-150400.3.9.9 * libyui16-debuginfo-4.3.7-150400.3.9.9 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-devel-4.3.7-150400.3.9.10 * libyui-qt-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-rest-api-devel-4.3.7-150400.3.9.9 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.17.10 * libyui16-4.3.7-150400.3.9.9 * libpackagekit-glib2-devel-1.2.4-150400.3.17.10 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * libyui-qt16-4.3.7-150400.3.9.9 * libyui-qt-graph-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses16-debuginfo-4.3.7-150400.3.9.9 * zypper-1.14.73-150400.3.50.10 * ruby-solv-0.7.29-150400.3.22.4 * libyui-ncurses-rest-api-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg16-4.3.7-150400.3.9.10 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.17.10 * libyui-rest-api-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.9.9 * libzypp-debugsource-17.34.1-150400.3.71.7 * libsolv-debuginfo-0.7.29-150400.3.22.4 * PackageKit-devel-debuginfo-1.2.4-150400.3.17.10 * yast2-pkg-bindings-debugsource-4.4.7-150400.3.13.10 * libyui-qt-rest-api16-4.3.7-150400.3.9.9 * yast2-pkg-bindings-debuginfo-4.4.7-150400.3.13.10 * libyui-qt-rest-api-devel-4.3.7-150400.3.9.9 * libyui-devel-4.3.7-150400.3.9.9 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * PackageKit-branding-SLE-12.0-150400.15.4.9 * zypper-log-1.14.73-150400.3.50.10 * zypper-needs-restarting-1.14.73-150400.3.50.10 * PackageKit-lang-1.2.4-150400.3.17.10 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libyui-qt-pkg16-4.3.7-150400.3.9.10 * libzypp-17.34.1-150400.3.71.7 * yast2-pkg-bindings-4.4.7-150400.3.13.10 * libyui-ncurses-rest-api16-4.3.7-150400.3.9.9 * libyui-qt-graph16-4.3.7-150400.3.9.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * libsolv-tools-0.7.29-150400.3.22.4 * libyui-qt16-4.3.7-150400.3.9.9 * libyui-qt-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses16-4.3.7-150400.3.9.9 * libyui16-4.3.7-150400.3.9.9 * libyui-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses-pkg16-4.3.7-150400.3.9.10 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libyui-qt16-debuginfo-4.3.7-150400.3.9.9 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libyui-qt-graph-devel-4.3.7-150400.3.9.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-qt-debugsource-4.3.7-150400.3.9.9 * libyui-qt-devel-4.3.7-150400.3.9.9 * zypper-debuginfo-1.14.73-150400.3.50.10 * yast2-pkg-bindings-4.4.7-150400.3.13.10 * zypper-debugsource-1.14.73-150400.3.50.10 * libyui-qt-graph16-4.3.7-150400.3.9.9 * libsolv-devel-0.7.29-150400.3.22.4 * python3-solv-0.7.29-150400.3.22.4 * libyui-qt-graph16-debuginfo-4.3.7-150400.3.9.9 * libyui-ncurses-tools-4.3.7-150400.3.9.9 * libyui-ncurses16-4.3.7-150400.3.9.9 * libyui-ncurses-devel-4.3.7-150400.3.9.9 * libyui-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses-pkg16-4.3.7-150400.3.9.10 * libzypp-devel-17.34.1-150400.3.71.7 * libyui-debugsource-4.3.7-150400.3.9.9 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.9.10 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui16-debuginfo-4.3.7-150400.3.9.9 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-devel-4.3.7-150400.3.9.10 * libyui16-4.3.7-150400.3.9.9 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * libyui-qt16-4.3.7-150400.3.9.9 * libyui-qt-graph-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses16-debuginfo-4.3.7-150400.3.9.9 * zypper-1.14.73-150400.3.50.10 * ruby-solv-0.7.29-150400.3.22.4 * libzypp-debugsource-17.34.1-150400.3.71.7 * libyui-qt-pkg16-4.3.7-150400.3.9.10 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-rest-api16-4.3.7-150400.3.9.9 * libsolv-debuginfo-0.7.29-150400.3.22.4 * yast2-pkg-bindings-debugsource-4.4.7-150400.3.13.10 * libyui-qt-rest-api16-4.3.7-150400.3.9.9 * yast2-pkg-bindings-debuginfo-4.4.7-150400.3.13.10 * libyui-devel-4.3.7-150400.3.9.9 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * SUSE Manager Retail Branch Server 4.3 (noarch) * zypper-log-1.14.73-150400.3.50.10 * zypper-needs-restarting-1.14.73-150400.3.50.10 * SUSE Manager Proxy 4.3 (x86_64) * libyui-qt16-debuginfo-4.3.7-150400.3.9.9 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libyui-qt-graph-devel-4.3.7-150400.3.9.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-qt-debugsource-4.3.7-150400.3.9.9 * libyui-qt-devel-4.3.7-150400.3.9.9 * zypper-debuginfo-1.14.73-150400.3.50.10 * yast2-pkg-bindings-4.4.7-150400.3.13.10 * zypper-debugsource-1.14.73-150400.3.50.10 * libyui-qt-graph16-4.3.7-150400.3.9.9 * PackageKit-backend-zypp-1.2.4-150400.3.17.10 * libsolv-devel-0.7.29-150400.3.22.4 * python3-solv-0.7.29-150400.3.22.4 * PackageKit-1.2.4-150400.3.17.10 * libyui-qt-graph16-debuginfo-4.3.7-150400.3.9.9 * libyui-ncurses-tools-4.3.7-150400.3.9.9 * libyui-ncurses16-4.3.7-150400.3.9.9 * libpackagekit-glib2-18-1.2.4-150400.3.17.10 * libyui-ncurses-devel-4.3.7-150400.3.9.9 * libyui-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses-pkg16-4.3.7-150400.3.9.10 * libzypp-devel-17.34.1-150400.3.71.7 * libyui-debugsource-4.3.7-150400.3.9.9 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.9.10 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui16-debuginfo-4.3.7-150400.3.9.9 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-devel-4.3.7-150400.3.9.10 * libyui16-4.3.7-150400.3.9.9 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * libyui-qt16-4.3.7-150400.3.9.9 * libyui-qt-graph-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses16-debuginfo-4.3.7-150400.3.9.9 * zypper-1.14.73-150400.3.50.10 * ruby-solv-0.7.29-150400.3.22.4 * libzypp-debugsource-17.34.1-150400.3.71.7 * libyui-qt-pkg16-4.3.7-150400.3.9.10 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-rest-api16-4.3.7-150400.3.9.9 * libsolv-debuginfo-0.7.29-150400.3.22.4 * yast2-pkg-bindings-debugsource-4.4.7-150400.3.13.10 * libyui-qt-rest-api16-4.3.7-150400.3.9.9 * yast2-pkg-bindings-debuginfo-4.4.7-150400.3.13.10 * libyui-devel-4.3.7-150400.3.9.9 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * SUSE Manager Proxy 4.3 (noarch) * PackageKit-branding-SLE-12.0-150400.15.4.9 * zypper-log-1.14.73-150400.3.50.10 * zypper-needs-restarting-1.14.73-150400.3.50.10 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libyui-qt-pkg16-4.5.3-150500.3.7.9 * yast2-pkg-bindings-4.5.3-150500.3.7.17 * libzypp-17.34.1-150400.3.71.7 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.5.3-150500.3.7.9 * libsolv-tools-0.7.29-150400.3.22.4 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libyui-qt-pkg16-4.5.3-150500.3.7.9 * yast2-pkg-bindings-4.5.3-150500.3.7.17 * libzypp-17.34.1-150400.3.71.7 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.5.3-150500.3.7.9 * libsolv-tools-0.7.29-150400.3.22.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libyui-qt-pkg16-4.5.3-150500.3.7.9 * yast2-pkg-bindings-4.5.3-150500.3.7.17 * libzypp-17.34.1-150400.3.71.7 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.5.3-150500.3.7.9 * libsolv-tools-0.7.29-150400.3.22.4 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libyui-qt-pkg16-4.5.3-150500.3.7.9 * yast2-pkg-bindings-4.5.3-150500.3.7.17 * libzypp-17.34.1-150400.3.71.7 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.5.3-150500.3.7.9 * libsolv-tools-0.7.29-150400.3.22.4 * SUSE Linux Enterprise High Performance Computing 15 SP6 (aarch64 x86_64) * libyui-qt-pkg16-4.5.3-150500.3.7.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.5.3-150500.3.7.9 * libzypp-17.34.1-150600.3.4.6 * libsolv-tools-0.7.29-150400.3.22.4 * yast2-pkg-bindings-4.6.5-150600.3.2.8 * SUSE Linux Enterprise Server 15 SP6 (aarch64 ppc64le s390x x86_64) * libyui-qt-pkg16-4.5.3-150500.3.7.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.5.3-150500.3.7.9 * libzypp-17.34.1-150600.3.4.6 * libsolv-tools-0.7.29-150400.3.22.4 * yast2-pkg-bindings-4.6.5-150600.3.2.8 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libyui-qt-pkg16-4.5.3-150500.3.7.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.5.3-150500.3.7.9 * libzypp-17.34.1-150600.3.4.6 * libsolv-tools-0.7.29-150400.3.22.4 * yast2-pkg-bindings-4.6.5-150600.3.2.8 * SUSE Linux Enterprise Desktop 15 SP6 (x86_64) * libyui-qt-pkg16-4.5.3-150500.3.7.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.5.3-150500.3.7.9 * libzypp-17.34.1-150600.3.4.6 * libsolv-tools-0.7.29-150400.3.22.4 * yast2-pkg-bindings-4.6.5-150600.3.2.8 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * zypper-debuginfo-1.14.73-150400.3.50.10 * zypper-1.14.73-150400.3.50.10 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-debugsource-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libsolv-debugsource-0.7.29-150400.3.22.4 * zypper-debugsource-1.14.73-150400.3.50.10 * libsolv-tools-base-0.7.29-150400.3.22.4 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * zypper-needs-restarting-1.14.73-150400.3.50.10 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * zypper-debuginfo-1.14.73-150400.3.50.10 * zypper-1.14.73-150400.3.50.10 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-debugsource-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libsolv-debugsource-0.7.29-150400.3.22.4 * zypper-debugsource-1.14.73-150400.3.50.10 * libsolv-tools-base-0.7.29-150400.3.22.4 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * SUSE Linux Enterprise Micro 5.3 (noarch) * zypper-needs-restarting-1.14.73-150400.3.50.10 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * zypper-debuginfo-1.14.73-150400.3.50.10 * zypper-1.14.73-150400.3.50.10 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-debugsource-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libsolv-debugsource-0.7.29-150400.3.22.4 * zypper-debugsource-1.14.73-150400.3.50.10 * libsolv-tools-base-0.7.29-150400.3.22.4 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * zypper-needs-restarting-1.14.73-150400.3.50.10 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * zypper-debuginfo-1.14.73-150400.3.50.10 * zypper-1.14.73-150400.3.50.10 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-debugsource-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libsolv-debugsource-0.7.29-150400.3.22.4 * zypper-debugsource-1.14.73-150400.3.50.10 * libsolv-tools-base-0.7.29-150400.3.22.4 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * SUSE Linux Enterprise Micro 5.4 (noarch) * zypper-needs-restarting-1.14.73-150400.3.50.10 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * zypper-debuginfo-1.14.73-150400.3.50.10 * zypper-1.14.73-150400.3.50.10 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-debugsource-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libsolv-debugsource-0.7.29-150400.3.22.4 * zypper-debugsource-1.14.73-150400.3.50.10 * libsolv-tools-base-0.7.29-150400.3.22.4 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * SUSE Linux Enterprise Micro 5.5 (noarch) * zypper-needs-restarting-1.14.73-150400.3.50.10 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libyui-debugsource-4.5.3-150500.3.7.8 * libyui16-debuginfo-4.5.3-150500.3.7.8 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-devel-4.5.3-150500.3.7.9 * libyui-ncurses-tools-4.5.3-150500.3.7.8 * libyui16-4.5.3-150500.3.7.8 * libyui-devel-4.5.3-150500.3.7.8 * libyui-ncurses-debugsource-4.5.3-150500.3.7.8 * libyui-ncurses16-4.5.3-150500.3.7.8 * libyui-qt-devel-4.5.3-150500.3.7.8 * zypper-debuginfo-1.14.73-150400.3.50.10 * libyui-ncurses-devel-4.5.3-150500.3.7.8 * zypper-debugsource-1.14.73-150400.3.50.10 * libyui-qt16-debuginfo-4.5.3-150500.3.7.8 * yast2-pkg-bindings-debugsource-4.5.3-150500.3.7.17 * libsolv-devel-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.5.3-150500.3.7.9 * python3-solv-0.7.29-150400.3.22.4 * libyui-ncurses16-debuginfo-4.5.3-150500.3.7.8 * yast2-pkg-bindings-debuginfo-4.5.3-150500.3.7.17 * libyui-ncurses-pkg-debugsource-4.5.3-150500.3.7.9 * libzypp-devel-17.34.1-150400.3.71.7 * libyui-qt-graph-devel-4.5.3-150500.3.7.8 * yast2-pkg-bindings-4.5.3-150500.3.7.17 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.7.9 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-graph-debugsource-4.5.3-150500.3.7.8 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-graph16-debuginfo-4.5.3-150500.3.7.8 * libyui-qt16-4.5.3-150500.3.7.8 * zypper-1.14.73-150400.3.50.10 * ruby-solv-0.7.29-150400.3.22.4 * libzypp-debugsource-17.34.1-150400.3.71.7 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-debugsource-4.5.3-150500.3.7.8 * libyui-qt-graph16-4.5.3-150500.3.7.8 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * Basesystem Module 15-SP5 (noarch) * zypper-log-1.14.73-150400.3.50.10 * zypper-needs-restarting-1.14.73-150400.3.50.10 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libyui-debugsource-4.5.3-150500.3.7.8 * libyui16-debuginfo-4.5.3-150500.3.7.8 * libzypp-debugsource-17.34.1-150600.3.4.6 * zypper-1.14.71-150600.10.2.7 * libsolv-tools-base-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-devel-4.5.3-150500.3.7.9 * libyui-ncurses-tools-4.5.3-150500.3.7.8 * libyui16-4.5.3-150500.3.7.8 * zypper-debuginfo-1.14.71-150600.10.2.7 * libyui-devel-4.5.3-150500.3.7.8 * libzypp-devel-17.34.1-150600.3.4.6 * libyui-ncurses-debugsource-4.5.3-150500.3.7.8 * libyui-ncurses16-4.5.3-150500.3.7.8 * libyui-qt-devel-4.5.3-150500.3.7.8 * zypper-debugsource-1.14.71-150600.10.2.7 * libyui-ncurses-devel-4.5.3-150500.3.7.8 * libyui-qt16-debuginfo-4.5.3-150500.3.7.8 * libsolv-devel-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.5.3-150500.3.7.9 * python3-solv-0.7.29-150400.3.22.4 * libyui-ncurses16-debuginfo-4.5.3-150500.3.7.8 * yast2-pkg-bindings-4.6.5-150600.3.2.8 * libyui-ncurses-pkg-debugsource-4.5.3-150500.3.7.9 * yast2-pkg-bindings-debuginfo-4.6.5-150600.3.2.8 * libyui-qt-graph-devel-4.5.3-150500.3.7.8 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.7.9 * libzypp-debuginfo-17.34.1-150600.3.4.6 * yast2-pkg-bindings-debugsource-4.6.5-150600.3.2.8 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-graph-debugsource-4.5.3-150500.3.7.8 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-graph16-debuginfo-4.5.3-150500.3.7.8 * libyui-qt16-4.5.3-150500.3.7.8 * ruby-solv-0.7.29-150400.3.22.4 * libzypp-17.34.1-150600.3.4.6 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-debugsource-4.5.3-150500.3.7.8 * libyui-qt-graph16-4.5.3-150500.3.7.8 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * Basesystem Module 15-SP6 (noarch) * zypper-needs-restarting-1.14.71-150600.10.2.7 * zypper-log-1.14.71-150600.10.2.7 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libyui-qt-pkg16-4.5.3-150500.3.7.9 * libyui-qt-pkg16-debuginfo-4.5.3-150500.3.7.9 * PackageKit-devel-1.2.4-150400.3.17.10 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.17.10 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.17.10 * PackageKit-backend-zypp-1.2.4-150400.3.17.10 * libyui-qt-pkg-debugsource-4.5.3-150500.3.7.9 * PackageKit-debuginfo-1.2.4-150400.3.17.10 * PackageKit-1.2.4-150400.3.17.10 * PackageKit-devel-debuginfo-1.2.4-150400.3.17.10 * PackageKit-debugsource-1.2.4-150400.3.17.10 * libpackagekit-glib2-18-1.2.4-150400.3.17.10 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.17.10 * libpackagekit-glib2-devel-1.2.4-150400.3.17.10 * libyui-qt-pkg-devel-4.5.3-150500.3.7.9 * Desktop Applications Module 15-SP5 (noarch) * PackageKit-branding-SLE-12.0-150400.15.4.9 * PackageKit-lang-1.2.4-150400.3.17.10 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * PackageKit-debuginfo-1.2.8-150600.4.2.7 * libyui-qt-pkg16-4.5.3-150500.3.7.9 * PackageKit-devel-debuginfo-1.2.8-150600.4.2.7 * libpackagekit-glib2-18-1.2.8-150600.4.2.7 * libyui-qt-pkg16-debuginfo-4.5.3-150500.3.7.9 * PackageKit-1.2.8-150600.4.2.7 * typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.2.7 * PackageKit-backend-zypp-1.2.8-150600.4.2.7 * PackageKit-devel-1.2.8-150600.4.2.7 * libyui-qt-pkg-debugsource-4.5.3-150500.3.7.9 * libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.2.7 * PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.2.7 * libyui-qt-pkg-devel-4.5.3-150500.3.7.9 * libpackagekit-glib2-devel-1.2.8-150600.4.2.7 * PackageKit-debugsource-1.2.8-150600.4.2.7 * Desktop Applications Module 15-SP6 (noarch) * PackageKit-lang-1.2.8-150600.4.2.7 * PackageKit-branding-SLE-12.0-150600.22.2.4 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.7.8 * libyui-rest-api16-4.5.3-150500.3.7.8 * libyui-ncurses-rest-api-devel-4.5.3-150500.3.7.8 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui-qt-rest-api-debugsource-4.5.3-150500.3.7.8 * libyui-rest-api-devel-4.5.3-150500.3.7.8 * libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.7.8 * perl-solv-0.7.29-150400.3.22.4 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-rest-api-devel-4.5.3-150500.3.7.8 * libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.7.8 * libyui-rest-api16-debuginfo-4.5.3-150500.3.7.8 * perl-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-rest-api-debugsource-4.5.3-150500.3.7.8 * libyui-ncurses-rest-api16-4.5.3-150500.3.7.8 * libyui-qt-rest-api16-4.5.3-150500.3.7.8 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.7.8 * libyui-rest-api16-4.5.3-150500.3.7.8 * libyui-ncurses-rest-api-devel-4.5.3-150500.3.7.8 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui-qt-rest-api-debugsource-4.5.3-150500.3.7.8 * libyui-rest-api-devel-4.5.3-150500.3.7.8 * libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.7.8 * perl-solv-0.7.29-150400.3.22.4 * libsolv-debuginfo-0.7.29-150400.3.22.4 * libyui-qt-rest-api-devel-4.5.3-150500.3.7.8 * libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.7.8 * libyui-rest-api16-debuginfo-4.5.3-150500.3.7.8 * perl-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-rest-api-debugsource-4.5.3-150500.3.7.8 * libyui-ncurses-rest-api16-4.5.3-150500.3.7.8 * libyui-qt-rest-api16-4.5.3-150500.3.7.8 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * perl-yui-debuginfo-4.5.3-150500.3.7.8 * perl-yui-4.5.3-150500.3.7.8 * ruby-yui-4.5.3-150500.3.7.8 * ruby-yui-debuginfo-4.5.3-150500.3.7.8 * python3-yui-debuginfo-4.5.3-150500.3.7.8 * python3-yui-4.5.3-150500.3.7.8 * libyui-bindings-debuginfo-4.5.3-150500.3.7.8 * libyui-bindings-debugsource-4.5.3-150500.3.7.8 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * perl-yui-debuginfo-4.5.3-150500.3.7.8 * perl-yui-4.5.3-150500.3.7.8 * ruby-yui-4.5.3-150500.3.7.8 * ruby-yui-debuginfo-4.5.3-150500.3.7.8 * python3-yui-debuginfo-4.5.3-150500.3.7.8 * python3-yui-4.5.3-150500.3.7.8 * libyui-bindings-debuginfo-4.5.3-150500.3.7.8 * libyui-bindings-debugsource-4.5.3-150500.3.7.8 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libyui-qt16-debuginfo-4.3.7-150400.3.9.9 * libyui-rest-api16-debuginfo-4.3.7-150400.3.9.9 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libyui-qt-graph-devel-4.3.7-150400.3.9.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * PackageKit-debuginfo-1.2.4-150400.3.17.10 * libyui-ncurses-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.9.9 * PackageKit-debugsource-1.2.4-150400.3.17.10 * libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.9.9 * libyui-qt-debugsource-4.3.7-150400.3.9.9 * libyui-qt-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg-devel-4.3.7-150400.3.9.10 * zypper-debuginfo-1.14.73-150400.3.50.10 * yast2-pkg-bindings-4.4.7-150400.3.13.10 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.17.10 * zypper-debugsource-1.14.73-150400.3.50.10 * PackageKit-backend-zypp-1.2.4-150400.3.17.10 * libyui-qt-graph16-4.3.7-150400.3.9.9 * libsolv-devel-0.7.29-150400.3.22.4 * python3-solv-0.7.29-150400.3.22.4 * PackageKit-1.2.4-150400.3.17.10 * libyui-qt-graph16-debuginfo-4.3.7-150400.3.9.9 * perl-solv-0.7.29-150400.3.22.4 * libyui-ncurses-tools-4.3.7-150400.3.9.9 * libpackagekit-glib2-18-1.2.4-150400.3.17.10 * libyui-ncurses16-4.3.7-150400.3.9.9 * libyui-ncurses-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg16-debuginfo-4.3.7-150400.3.9.10 * libyui-rest-api16-4.3.7-150400.3.9.9 * perl-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.3.7-150400.3.9.10 * libzypp-devel-17.34.1-150400.3.71.7 * libyui-debugsource-4.3.7-150400.3.9.9 * PackageKit-devel-1.2.4-150400.3.17.10 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.9.10 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui-qt-rest-api-debugsource-4.3.7-150400.3.9.9 * libyui16-debuginfo-4.3.7-150400.3.9.9 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-devel-4.3.7-150400.3.9.10 * libyui-qt-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-rest-api-devel-4.3.7-150400.3.9.9 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.17.10 * libyui16-4.3.7-150400.3.9.9 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * libpackagekit-glib2-devel-1.2.4-150400.3.17.10 * libyui-qt16-4.3.7-150400.3.9.9 * libyui-qt-graph-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses16-debuginfo-4.3.7-150400.3.9.9 * zypper-1.14.73-150400.3.50.10 * ruby-solv-0.7.29-150400.3.22.4 * libyui-ncurses-rest-api-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg16-4.3.7-150400.3.9.10 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.17.10 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libyui-rest-api-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.9.9 * libzypp-debugsource-17.34.1-150400.3.71.7 * libsolv-debuginfo-0.7.29-150400.3.22.4 * PackageKit-devel-debuginfo-1.2.4-150400.3.17.10 * yast2-pkg-bindings-debugsource-4.4.7-150400.3.13.10 * libyui-qt-rest-api16-4.3.7-150400.3.9.9 * yast2-pkg-bindings-debuginfo-4.4.7-150400.3.13.10 * libyui-qt-rest-api-devel-4.3.7-150400.3.9.9 * libyui-devel-4.3.7-150400.3.9.9 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * PackageKit-branding-SLE-12.0-150400.15.4.9 * zypper-log-1.14.73-150400.3.50.10 * zypper-needs-restarting-1.14.73-150400.3.50.10 * PackageKit-lang-1.2.4-150400.3.17.10 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libyui-qt16-debuginfo-4.3.7-150400.3.9.9 * libyui-rest-api16-debuginfo-4.3.7-150400.3.9.9 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libyui-qt-graph-devel-4.3.7-150400.3.9.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * PackageKit-debuginfo-1.2.4-150400.3.17.10 * libyui-ncurses-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.9.9 * PackageKit-debugsource-1.2.4-150400.3.17.10 * libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.9.9 * libyui-qt-debugsource-4.3.7-150400.3.9.9 * libyui-qt-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg-devel-4.3.7-150400.3.9.10 * zypper-debuginfo-1.14.73-150400.3.50.10 * yast2-pkg-bindings-4.4.7-150400.3.13.10 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.17.10 * zypper-debugsource-1.14.73-150400.3.50.10 * PackageKit-backend-zypp-1.2.4-150400.3.17.10 * libyui-qt-graph16-4.3.7-150400.3.9.9 * libsolv-devel-0.7.29-150400.3.22.4 * python3-solv-0.7.29-150400.3.22.4 * PackageKit-1.2.4-150400.3.17.10 * libyui-qt-graph16-debuginfo-4.3.7-150400.3.9.9 * perl-solv-0.7.29-150400.3.22.4 * libyui-ncurses-tools-4.3.7-150400.3.9.9 * libpackagekit-glib2-18-1.2.4-150400.3.17.10 * libyui-ncurses16-4.3.7-150400.3.9.9 * libyui-ncurses-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg16-debuginfo-4.3.7-150400.3.9.10 * libyui-rest-api16-4.3.7-150400.3.9.9 * perl-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.3.7-150400.3.9.10 * libzypp-devel-17.34.1-150400.3.71.7 * libyui-debugsource-4.3.7-150400.3.9.9 * PackageKit-devel-1.2.4-150400.3.17.10 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.9.10 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui-qt-rest-api-debugsource-4.3.7-150400.3.9.9 * libyui16-debuginfo-4.3.7-150400.3.9.9 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-devel-4.3.7-150400.3.9.10 * libyui-qt-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-rest-api-devel-4.3.7-150400.3.9.9 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.17.10 * libyui16-4.3.7-150400.3.9.9 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * libpackagekit-glib2-devel-1.2.4-150400.3.17.10 * libyui-qt16-4.3.7-150400.3.9.9 * libyui-qt-graph-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses16-debuginfo-4.3.7-150400.3.9.9 * zypper-1.14.73-150400.3.50.10 * ruby-solv-0.7.29-150400.3.22.4 * libyui-ncurses-rest-api-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg16-4.3.7-150400.3.9.10 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.17.10 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libyui-rest-api-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.9.9 * libzypp-debugsource-17.34.1-150400.3.71.7 * libsolv-debuginfo-0.7.29-150400.3.22.4 * PackageKit-devel-debuginfo-1.2.4-150400.3.17.10 * yast2-pkg-bindings-debugsource-4.4.7-150400.3.13.10 * libyui-qt-rest-api16-4.3.7-150400.3.9.9 * yast2-pkg-bindings-debuginfo-4.4.7-150400.3.13.10 * libyui-qt-rest-api-devel-4.3.7-150400.3.9.9 * libyui-devel-4.3.7-150400.3.9.9 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * PackageKit-branding-SLE-12.0-150400.15.4.9 * zypper-log-1.14.73-150400.3.50.10 * zypper-needs-restarting-1.14.73-150400.3.50.10 * PackageKit-lang-1.2.4-150400.3.17.10 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libyui-qt16-debuginfo-4.3.7-150400.3.9.9 * libyui-rest-api16-debuginfo-4.3.7-150400.3.9.9 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libyui-qt-graph-devel-4.3.7-150400.3.9.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * PackageKit-debuginfo-1.2.4-150400.3.17.10 * libyui-ncurses-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.9.9 * PackageKit-debugsource-1.2.4-150400.3.17.10 * libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.9.9 * libyui-qt-debugsource-4.3.7-150400.3.9.9 * libyui-qt-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg-devel-4.3.7-150400.3.9.10 * zypper-debuginfo-1.14.73-150400.3.50.10 * PackageKit-gstreamer-plugin-1.2.4-150400.3.17.10 * yast2-pkg-bindings-4.4.7-150400.3.13.10 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.17.10 * zypper-debugsource-1.14.73-150400.3.50.10 * PackageKit-backend-zypp-1.2.4-150400.3.17.10 * libyui-qt-graph16-4.3.7-150400.3.9.9 * libsolv-devel-0.7.29-150400.3.22.4 * python3-solv-0.7.29-150400.3.22.4 * PackageKit-1.2.4-150400.3.17.10 * libyui-qt-graph16-debuginfo-4.3.7-150400.3.9.9 * perl-solv-0.7.29-150400.3.22.4 * libyui-ncurses-tools-4.3.7-150400.3.9.9 * libpackagekit-glib2-18-1.2.4-150400.3.17.10 * libyui-ncurses16-4.3.7-150400.3.9.9 * libyui-ncurses-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg16-debuginfo-4.3.7-150400.3.9.10 * libyui-rest-api16-4.3.7-150400.3.9.9 * perl-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.3.7-150400.3.9.10 * libzypp-devel-17.34.1-150400.3.71.7 * libyui-debugsource-4.3.7-150400.3.9.9 * PackageKit-devel-1.2.4-150400.3.17.10 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.17.10 * PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.17.10 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.9.10 * libyui-qt-rest-api-debugsource-4.3.7-150400.3.9.9 * libyui16-debuginfo-4.3.7-150400.3.9.9 * PackageKit-gtk3-module-1.2.4-150400.3.17.10 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-devel-4.3.7-150400.3.9.10 * libyui-qt-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-rest-api-devel-4.3.7-150400.3.9.9 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.17.10 * libyui16-4.3.7-150400.3.9.9 * libpackagekit-glib2-devel-1.2.4-150400.3.17.10 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * libyui-qt16-4.3.7-150400.3.9.9 * libyui-qt-graph-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses16-debuginfo-4.3.7-150400.3.9.9 * zypper-1.14.73-150400.3.50.10 * ruby-solv-0.7.29-150400.3.22.4 * libyui-ncurses-rest-api-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg16-4.3.7-150400.3.9.10 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.17.10 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libyui-rest-api-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.9.9 * libzypp-debugsource-17.34.1-150400.3.71.7 * libsolv-debuginfo-0.7.29-150400.3.22.4 * PackageKit-devel-debuginfo-1.2.4-150400.3.17.10 * yast2-pkg-bindings-debugsource-4.4.7-150400.3.13.10 * libyui-qt-rest-api16-4.3.7-150400.3.9.9 * yast2-pkg-bindings-debuginfo-4.4.7-150400.3.13.10 * libyui-qt-rest-api-devel-4.3.7-150400.3.9.9 * libyui-devel-4.3.7-150400.3.9.9 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * PackageKit-branding-SLE-12.0-150400.15.4.9 * zypper-log-1.14.73-150400.3.50.10 * zypper-needs-restarting-1.14.73-150400.3.50.10 * PackageKit-lang-1.2.4-150400.3.17.10 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libyui-qt16-debuginfo-4.3.7-150400.3.9.9 * libyui-rest-api16-debuginfo-4.3.7-150400.3.9.9 * libzypp-debuginfo-17.34.1-150400.3.71.7 * libzypp-17.34.1-150400.3.71.7 * libyui-qt-graph-devel-4.3.7-150400.3.9.9 * libsolv-tools-base-0.7.29-150400.3.22.4 * PackageKit-debuginfo-1.2.4-150400.3.17.10 * libyui-ncurses-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.9.9 * PackageKit-debugsource-1.2.4-150400.3.17.10 * libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.9.9 * libyui-qt-debugsource-4.3.7-150400.3.9.9 * libyui-qt-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg-devel-4.3.7-150400.3.9.10 * zypper-debuginfo-1.14.73-150400.3.50.10 * yast2-pkg-bindings-4.4.7-150400.3.13.10 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.17.10 * zypper-debugsource-1.14.73-150400.3.50.10 * PackageKit-backend-zypp-1.2.4-150400.3.17.10 * libyui-qt-graph16-4.3.7-150400.3.9.9 * libsolv-devel-0.7.29-150400.3.22.4 * python3-solv-0.7.29-150400.3.22.4 * PackageKit-1.2.4-150400.3.17.10 * libyui-qt-graph16-debuginfo-4.3.7-150400.3.9.9 * perl-solv-0.7.29-150400.3.22.4 * libyui-ncurses-tools-4.3.7-150400.3.9.9 * libpackagekit-glib2-18-1.2.4-150400.3.17.10 * libyui-ncurses16-4.3.7-150400.3.9.9 * libyui-ncurses-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg16-debuginfo-4.3.7-150400.3.9.10 * libyui-rest-api16-4.3.7-150400.3.9.9 * perl-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-4.3.7-150400.3.9.10 * libzypp-devel-17.34.1-150400.3.71.7 * libyui-debugsource-4.3.7-150400.3.9.9 * PackageKit-devel-1.2.4-150400.3.17.10 * python3-solv-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.9.10 * libsolv-debugsource-0.7.29-150400.3.22.4 * libyui-qt-rest-api-debugsource-4.3.7-150400.3.9.9 * libyui16-debuginfo-4.3.7-150400.3.9.9 * libsolv-tools-0.7.29-150400.3.22.4 * libsolv-devel-debuginfo-0.7.29-150400.3.22.4 * libyui-ncurses-pkg-devel-4.3.7-150400.3.9.10 * libyui-qt-pkg-debugsource-4.3.7-150400.3.9.10 * libyui-rest-api-devel-4.3.7-150400.3.9.9 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.17.10 * libyui16-4.3.7-150400.3.9.9 * libsolv-tools-debuginfo-0.7.29-150400.3.22.4 * libpackagekit-glib2-devel-1.2.4-150400.3.17.10 * libyui-qt16-4.3.7-150400.3.9.9 * libyui-qt-graph-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses16-debuginfo-4.3.7-150400.3.9.9 * zypper-1.14.73-150400.3.50.10 * ruby-solv-0.7.29-150400.3.22.4 * libyui-ncurses-rest-api-devel-4.3.7-150400.3.9.9 * libyui-qt-pkg16-4.3.7-150400.3.9.10 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.17.10 * libsolv-tools-base-debuginfo-0.7.29-150400.3.22.4 * libyui-rest-api-debugsource-4.3.7-150400.3.9.9 * libyui-ncurses-rest-api16-4.3.7-150400.3.9.9 * libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.9.9 * libzypp-debugsource-17.34.1-150400.3.71.7 * libsolv-debuginfo-0.7.29-150400.3.22.4 * PackageKit-devel-debuginfo-1.2.4-150400.3.17.10 * yast2-pkg-bindings-debugsource-4.4.7-150400.3.13.10 * libyui-qt-rest-api16-4.3.7-150400.3.9.9 * yast2-pkg-bindings-debuginfo-4.4.7-150400.3.13.10 * libyui-qt-rest-api-devel-4.3.7-150400.3.9.9 * libyui-devel-4.3.7-150400.3.9.9 * ruby-solv-debuginfo-0.7.29-150400.3.22.4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * PackageKit-branding-SLE-12.0-150400.15.4.9 * zypper-log-1.14.73-150400.3.50.10 * zypper-needs-restarting-1.14.73-150400.3.50.10 * PackageKit-lang-1.2.4-150400.3.17.10 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * PackageKit-gstreamer-plugin-1.2.4-150400.3.17.10 * PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.17.10 * PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.17.10 * PackageKit-gtk3-module-1.2.4-150400.3.17.10 * PackageKit-debuginfo-1.2.4-150400.3.17.10 * PackageKit-debugsource-1.2.4-150400.3.17.10 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * PackageKit-debuginfo-1.2.8-150600.4.2.7 * PackageKit-gstreamer-plugin-debuginfo-1.2.8-150600.4.2.7 * PackageKit-gtk3-module-1.2.8-150600.4.2.7 * PackageKit-gtk3-module-debuginfo-1.2.8-150600.4.2.7 * PackageKit-gstreamer-plugin-1.2.8-150600.4.2.7 * PackageKit-debugsource-1.2.8-150600.4.2.7 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222086 * https://bugzilla.suse.com/show_bug.cgi?id=1223430 * https://bugzilla.suse.com/show_bug.cgi?id=1223766 * https://bugzilla.suse.com/show_bug.cgi?id=1224242 * https://jira.suse.com/browse/PED-8153 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 08:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 08:30:11 -0000 Subject: SUSE-RU-2024:2084-1: moderate: Recommended update for perf Message-ID: <171878581142.31539.2778896502610866844@smelt2.prg2.suse.org> # Recommended update for perf Announcement ID: SUSE-RU-2024:2084-1 Rating: moderate References: Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for perf fixes the following issues: * perf ui browser: Avoid SEGV on title (git fixes) * perf pmu: Count sys and cpuid JSON events separately (git fixes) * perf stat: Don't display metric header for non-leader uncore events (git- fixes) * perf daemon: Fix file leak in daemon_session__control (git-fixes) * perf symbols: Fix ownership of string in dso__load_vmlinux() (git-fixes) * perf thread: Fixes to thread__new() related to initializing comm (git-fixes) * perf report: Avoid SEGV in report__setup_sample_type() (git-fixes) * perf ui browser: Don't save pointer to stack memory (git-fixes) * perf bench internals inject-build-id: Fix trap divide when collecting just one DSO (git-fixes) * perf intel-pt: Fix unassigned instruction op (discovered by MemorySanitizer) (git-fixes) * perf test shell arm_coresight: Increase buffer size for Coresight basic tests (git-fixes) * perf docs: Document bpf event modifier (git-fixes) * perf bench uprobe: Remove lib64 from libc.so.6 binary path (git-fixes) * perf record: Fix debug message placement for test consumption (git-fixes) * perf tests: Apply attributes to all events in object code reading test (git- fixes) * perf tests: Make "test data symbol" more robust on Neoverse N1 (git-fixes) * perf annotate: Fix annotation_calc_lines() to pass correct address to get_srcline() (git-fixes) * perf stat: Do not fail on metrics on s390 z/VM systems (git-fixes) * perf sched timehist: Fix -g/--call-graph option failure (git-fixes) * perf annotate: Get rid of duplicate --group option item (git-fixes) * perf probe: Add missing libgen.h header needed for using basename() (git- fixes) * perf record: Delete session after stopping sideband thread (git-fixes) * perf auxtrace: Fix multiple use of --itrace option (git-fixes) * perf script: Show also errors for --insn-trace option (git-fixes) * perf lock contention: Add a missing NULL check (git-fixes) * perf vendor events amd: Fix Zen 4 cache latency events (git-fixes) * libperf evlist: Avoid out-of-bounds access (git-fixes) * perf pmu: Fix a potential memory leak in perf_pmu__lookup() (git-fixes) * perf print-events: make is_event_supported() more robust (git-fixes) * perf list: fix short description for some cache events (git-fixes) * perf metric: Don't remove scale from counts (git-fixes) * perf stat: Avoid metric-only segv (git-fixes) * perf expr: Fix "has_event" function for metric style events (git-fixes) * perf srcline: Add missed addr2line closes (git-fixes) * perf thread_map: Free strlist on normal path in thread_map__new_by_tid_str() (git-fixes) * perf bpf: Clean up the generated/copied vmlinux.h (git-fixes) * perf jevents: Drop or simplify small integer values (git-fixes) * perf evsel: Fix duplicate initialization of data->id in evsel__parse_sample() (git-fixes) * perf pmu: Treat the msr pmu as software (git-fixes). * perf record: Check conflict between '\--timestamp-filename' option and pipe mode before recording (git-fixes) * perf record: Fix possible incorrect free in record__switch_output() (git- fixes) * perf vendor events amd: Add Zen 4 memory controller events (git-fixes) * perf top: Uniform the event name for the hybrid machine (git-fixes) * perf top: Use evsel's cpus to replace user_requested_cpus (git-fixes) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2084=1 SUSE-2024-2084=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2084=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * perf-bash-completion-6.4.0.git22305.596cd3fdbd-150600.3.3.2 * perf-6.4.0.git22305.596cd3fdbd-150600.3.3.2 * perf-devel-6.4.0.git22305.596cd3fdbd-150600.3.3.2 * perf-debuginfo-6.4.0.git22305.596cd3fdbd-150600.3.3.2 * perf-debugsource-6.4.0.git22305.596cd3fdbd-150600.3.3.2 * perf-gtk-6.4.0.git22305.596cd3fdbd-150600.3.3.2 * perf-gtk-debuginfo-6.4.0.git22305.596cd3fdbd-150600.3.3.2 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * perf-debuginfo-6.4.0.git22305.596cd3fdbd-150600.3.3.2 * perf-debugsource-6.4.0.git22305.596cd3fdbd-150600.3.3.2 * perf-6.4.0.git22305.596cd3fdbd-150600.3.3.2 * perf-devel-6.4.0.git22305.596cd3fdbd-150600.3.3.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 08:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 08:30:14 -0000 Subject: SUSE-SU-2024:2083-1: important: Security update for libarchive Message-ID: <171878581426.31539.14333245329227601933@smelt2.prg2.suse.org> # Security update for libarchive Announcement ID: SUSE-SU-2024:2083-1 Rating: important References: * bsc#1225971 * bsc#1225972 Cross-References: * CVE-2024-20696 * CVE-2024-20697 CVSS scores: * CVE-2024-20696 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20697 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for libarchive fixes the following issues: * CVE-2024-20697: Fixed Out of bounds Remote Code Execution Vulnerability (bsc#1225972). * CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2083=1 openSUSE-SLE-15.6-2024-2083=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2083=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2083=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * bsdtar-debuginfo-3.7.2-150600.3.3.1 * libarchive13-debuginfo-3.7.2-150600.3.3.1 * libarchive-devel-3.7.2-150600.3.3.1 * libarchive-debugsource-3.7.2-150600.3.3.1 * libarchive13-3.7.2-150600.3.3.1 * bsdtar-3.7.2-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libarchive13-32bit-3.7.2-150600.3.3.1 * libarchive13-32bit-debuginfo-3.7.2-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libarchive13-64bit-3.7.2-150600.3.3.1 * libarchive13-64bit-debuginfo-3.7.2-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libarchive-devel-3.7.2-150600.3.3.1 * libarchive13-debuginfo-3.7.2-150600.3.3.1 * libarchive-debugsource-3.7.2-150600.3.3.1 * libarchive13-3.7.2-150600.3.3.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * bsdtar-debuginfo-3.7.2-150600.3.3.1 * libarchive-debugsource-3.7.2-150600.3.3.1 * bsdtar-3.7.2-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-20696.html * https://www.suse.com/security/cve/CVE-2024-20697.html * https://bugzilla.suse.com/show_bug.cgi?id=1225971 * https://bugzilla.suse.com/show_bug.cgi?id=1225972 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 08:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 08:30:16 -0000 Subject: SUSE-SU-2024:2082-1: important: Security update for libarchive Message-ID: <171878581631.31539.17624297012439690319@smelt2.prg2.suse.org> # Security update for libarchive Announcement ID: SUSE-SU-2024:2082-1 Rating: important References: * bsc#1225971 Cross-References: * CVE-2024-20696 CVSS scores: * CVE-2024-20696 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for libarchive fixes the following issues: * CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2082=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2082=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2082=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2082=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2082=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2082=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2082=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * bsdtar-debuginfo-3.4.2-150200.4.18.1 * bsdtar-3.4.2-150200.4.18.1 * libarchive-devel-3.4.2-150200.4.18.1 * libarchive-debugsource-3.4.2-150200.4.18.1 * libarchive13-3.4.2-150200.4.18.1 * libarchive13-debuginfo-3.4.2-150200.4.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * bsdtar-debuginfo-3.4.2-150200.4.18.1 * bsdtar-3.4.2-150200.4.18.1 * libarchive-devel-3.4.2-150200.4.18.1 * libarchive-debugsource-3.4.2-150200.4.18.1 * libarchive13-3.4.2-150200.4.18.1 * libarchive13-debuginfo-3.4.2-150200.4.18.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * bsdtar-debuginfo-3.4.2-150200.4.18.1 * bsdtar-3.4.2-150200.4.18.1 * libarchive-devel-3.4.2-150200.4.18.1 * libarchive-debugsource-3.4.2-150200.4.18.1 * libarchive13-3.4.2-150200.4.18.1 * libarchive13-debuginfo-3.4.2-150200.4.18.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * bsdtar-debuginfo-3.4.2-150200.4.18.1 * bsdtar-3.4.2-150200.4.18.1 * libarchive-devel-3.4.2-150200.4.18.1 * libarchive-debugsource-3.4.2-150200.4.18.1 * libarchive13-3.4.2-150200.4.18.1 * libarchive13-debuginfo-3.4.2-150200.4.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * bsdtar-debuginfo-3.4.2-150200.4.18.1 * bsdtar-3.4.2-150200.4.18.1 * libarchive-devel-3.4.2-150200.4.18.1 * libarchive-debugsource-3.4.2-150200.4.18.1 * libarchive13-3.4.2-150200.4.18.1 * libarchive13-debuginfo-3.4.2-150200.4.18.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * bsdtar-debuginfo-3.4.2-150200.4.18.1 * bsdtar-3.4.2-150200.4.18.1 * libarchive-devel-3.4.2-150200.4.18.1 * libarchive-debugsource-3.4.2-150200.4.18.1 * libarchive13-3.4.2-150200.4.18.1 * libarchive13-debuginfo-3.4.2-150200.4.18.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * bsdtar-debuginfo-3.4.2-150200.4.18.1 * bsdtar-3.4.2-150200.4.18.1 * libarchive-devel-3.4.2-150200.4.18.1 * libarchive-debugsource-3.4.2-150200.4.18.1 * libarchive13-3.4.2-150200.4.18.1 * libarchive13-debuginfo-3.4.2-150200.4.18.1 ## References: * https://www.suse.com/security/cve/CVE-2024-20696.html * https://bugzilla.suse.com/show_bug.cgi?id=1225971 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 08:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 08:30:18 -0000 Subject: SUSE-SU-2024:2081-1: important: Security update for libarchive Message-ID: <171878581867.31539.10498042872036273860@smelt2.prg2.suse.org> # Security update for libarchive Announcement ID: SUSE-SU-2024:2081-1 Rating: important References: * bsc#1225971 Cross-References: * CVE-2024-20696 CVSS scores: * CVE-2024-20696 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libarchive fixes the following issues: * CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2081=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2081=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2081=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2081=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libarchive-debugsource-3.3.3-32.11.1 * libarchive-devel-3.3.3-32.11.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libarchive-debugsource-3.3.3-32.11.1 * libarchive13-debuginfo-3.3.3-32.11.1 * libarchive13-3.3.3-32.11.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libarchive-debugsource-3.3.3-32.11.1 * libarchive13-debuginfo-3.3.3-32.11.1 * libarchive13-3.3.3-32.11.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libarchive-debugsource-3.3.3-32.11.1 * libarchive13-debuginfo-3.3.3-32.11.1 * libarchive13-3.3.3-32.11.1 ## References: * https://www.suse.com/security/cve/CVE-2024-20696.html * https://bugzilla.suse.com/show_bug.cgi?id=1225971 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 08:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 08:30:20 -0000 Subject: SUSE-SU-2024:2080-1: moderate: Security update for libzypp, zypper Message-ID: <171878582089.31539.4590612030791826944@smelt2.prg2.suse.org> # Security update for libzypp, zypper Announcement ID: SUSE-SU-2024:2080-1 Rating: moderate References: * bsc#1050625 * bsc#1177583 * bsc#1223971 Cross-References: * CVE-2017-9271 CVSS scores: * CVE-2017-9271 ( SUSE ): 4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2017-9271 ( NVD ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for libzypp, zypper fixes the following issues: * CVE-2017-9271: Fixed proxy credentials written to log files (bsc#1050625). The following non-security bugs were fixed: * clean: Do not report an error if no repos are defined at all (bsc#1223971) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2080=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2080=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2080=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2080=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libzypp-debuginfo-16.22.13-65.3 * libzypp-debugsource-16.22.13-65.3 * libzypp-devel-doc-16.22.13-65.3 * libzypp-devel-16.22.13-65.3 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * zypper-debugsource-1.13.66-21.61.3 * libzypp-devel-16.22.13-65.3 * libzypp-debugsource-16.22.13-65.3 * zypper-1.13.66-21.61.3 * zypper-debuginfo-1.13.66-21.61.3 * libzypp-16.22.13-65.3 * libzypp-debuginfo-16.22.13-65.3 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * zypper-log-1.13.66-21.61.3 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * zypper-debugsource-1.13.66-21.61.3 * libzypp-devel-16.22.13-65.3 * libzypp-debugsource-16.22.13-65.3 * zypper-1.13.66-21.61.3 * zypper-debuginfo-1.13.66-21.61.3 * libzypp-16.22.13-65.3 * libzypp-debuginfo-16.22.13-65.3 * SUSE Linux Enterprise Server 12 SP5 (noarch) * zypper-log-1.13.66-21.61.3 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * zypper-debugsource-1.13.66-21.61.3 * libzypp-devel-16.22.13-65.3 * libzypp-debugsource-16.22.13-65.3 * zypper-1.13.66-21.61.3 * zypper-debuginfo-1.13.66-21.61.3 * libzypp-16.22.13-65.3 * libzypp-debuginfo-16.22.13-65.3 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * zypper-log-1.13.66-21.61.3 ## References: * https://www.suse.com/security/cve/CVE-2017-9271.html * https://bugzilla.suse.com/show_bug.cgi?id=1050625 * https://bugzilla.suse.com/show_bug.cgi?id=1177583 * https://bugzilla.suse.com/show_bug.cgi?id=1223971 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 08:30:23 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 08:30:23 -0000 Subject: SUSE-RU-2024:2079-1: moderate: Recommended update for Java Message-ID: <171878582369.31539.15434278711643084862@smelt2.prg2.suse.org> # Recommended update for Java Announcement ID: SUSE-RU-2024:2079-1 Rating: moderate References: Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for Gradle and Maven fixes the following issues: gradle-bootstrap: * Regenerate to account for the new plexus-xml dependency gradle: * Fixed build with the `plexus-xml` split from plexus-utils maven-artifact-transfer: * Added dependency on `plexus-xml` where relevant * Removed unnecessary dependency on xmvn tools and parent pom maven-assembly-plugin, maven-doxia, maven-doxia-sitetools, maven-install-plugin, maven-javadoc-plugin, maven-plugin-testing, maven-resolver, maven: * Added dependency on `plexus-xml` where relevant ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2079=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2079=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2079=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2079=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2079=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2079=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2079=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2079=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2079=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2079=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2079=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2079=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2079=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2079=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2079=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2079=1 ## Package List: * openSUSE Leap 15.5 (noarch) * maven-plugin-testing-javadoc-3.3.0-150200.3.7.1 * maven-javadoc-plugin-bootstrap-3.6.0-150200.4.13.1 * maven-assembly-plugin-3.6.0-150200.3.13.2 * maven-javadoc-plugin-3.6.0-150200.4.13.2 * groovy-bootstrap-2.4.21-150200.3.12.5 * maven-resolver-1.9.18-150200.3.20.1 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-test-tools-3.3.0-150200.3.7.1 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-install-plugin-javadoc-3.1.1-150200.3.11.1 * maven-doxia-module-confluence-1.12.0-150200.4.10.5 * maven-plugin-testing-tools-3.3.0-150200.3.7.1 * maven-doxia-module-twiki-1.12.0-150200.4.10.5 * maven-doxia-module-latex-1.12.0-150200.4.10.5 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-doxia-sitetools-javadoc-1.11.1-150200.3.10.2 * maven-install-plugin-3.1.1-150200.3.11.1 * maven-plugin-testing-harness-3.3.0-150200.3.7.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-doxia-test-docs-1.12.0-150200.4.10.5 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-javadoc-3.9.6-150200.4.24.2 * maven-resolver-transport-classpath-1.9.18-150200.3.20.1 * maven-artifact-transfer-javadoc-0.13.1-150200.3.7.1 * maven-javadoc-plugin-javadoc-3.6.0-150200.4.13.2 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-doxia-javadoc-1.12.0-150200.4.10.5 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-assembly-plugin-javadoc-3.6.0-150200.3.13.2 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * gpars-bootstrap-1.2.1-150200.3.12.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-docbook-simple-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-plugin-testing-3.3.0-150200.3.7.1 * maven-resolver-test-util-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * maven-resolver-javadoc-1.9.18-150200.3.20.1 * maven-doxia-module-rtf-1.12.0-150200.4.10.5 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * gradle-bootstrap-4.4.1-150200.3.12.5 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * maven-lib-3.9.6-150200.4.24.2 * openSUSE Leap 15.6 (noarch) * maven-plugin-testing-javadoc-3.3.0-150200.3.7.1 * maven-javadoc-plugin-bootstrap-3.6.0-150200.4.13.1 * maven-assembly-plugin-3.6.0-150200.3.13.2 * maven-javadoc-plugin-3.6.0-150200.4.13.2 * groovy-bootstrap-2.4.21-150200.3.12.5 * maven-resolver-1.9.18-150200.3.20.1 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-test-tools-3.3.0-150200.3.7.1 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-install-plugin-javadoc-3.1.1-150200.3.11.1 * maven-doxia-module-confluence-1.12.0-150200.4.10.5 * maven-plugin-testing-tools-3.3.0-150200.3.7.1 * maven-doxia-module-twiki-1.12.0-150200.4.10.5 * maven-doxia-module-latex-1.12.0-150200.4.10.5 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-doxia-sitetools-javadoc-1.11.1-150200.3.10.2 * maven-install-plugin-3.1.1-150200.3.11.1 * maven-plugin-testing-harness-3.3.0-150200.3.7.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-doxia-test-docs-1.12.0-150200.4.10.5 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-javadoc-3.9.6-150200.4.24.2 * maven-resolver-transport-classpath-1.9.18-150200.3.20.1 * maven-artifact-transfer-javadoc-0.13.1-150200.3.7.1 * maven-javadoc-plugin-javadoc-3.6.0-150200.4.13.2 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-doxia-javadoc-1.12.0-150200.4.10.5 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-assembly-plugin-javadoc-3.6.0-150200.3.13.2 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * gpars-bootstrap-1.2.1-150200.3.12.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-docbook-simple-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-plugin-testing-3.3.0-150200.3.7.1 * maven-resolver-test-util-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * maven-resolver-javadoc-1.9.18-150200.3.20.1 * maven-doxia-module-rtf-1.12.0-150200.4.10.5 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * gradle-bootstrap-4.4.1-150200.3.12.5 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * maven-lib-3.9.6-150200.4.24.2 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * Development Tools Module 15-SP5 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * Development Tools Module 15-SP6 (noarch) * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * maven-lib-3.9.6-150200.4.24.2 * gradle-4.4.1-150200.3.18.1 * maven-3.9.6-150200.4.24.2 * SUSE Enterprise Storage 7.1 (noarch) * maven-javadoc-plugin-3.6.0-150200.4.13.2 * maven-doxia-core-1.12.0-150200.4.10.5 * maven-doxia-module-apt-1.12.0-150200.4.10.5 * maven-resolver-api-1.9.18-150200.3.20.1 * maven-resolver-impl-1.9.18-150200.3.20.1 * maven-doxia-module-fml-1.12.0-150200.4.10.5 * maven-resolver-named-locks-1.9.18-150200.3.20.1 * maven-resolver-util-1.9.18-150200.3.20.1 * maven-resolver-spi-1.9.18-150200.3.20.1 * maven-doxia-sink-api-1.12.0-150200.4.10.5 * maven-doxia-sitetools-1.11.1-150200.3.10.2 * maven-resolver-transport-file-1.9.18-150200.3.20.1 * maven-doxia-logging-api-1.12.0-150200.4.10.5 * maven-resolver-transport-wagon-1.9.18-150200.3.20.1 * maven-resolver-connector-basic-1.9.18-150200.3.20.1 * maven-artifact-transfer-0.13.1-150200.3.7.1 * maven-doxia-module-fo-1.12.0-150200.4.10.5 * maven-doxia-module-xdoc-1.12.0-150200.4.10.5 * maven-resolver-transport-http-1.9.18-150200.3.20.1 * maven-doxia-module-xhtml-1.12.0-150200.4.10.5 * maven-doxia-module-xhtml5-1.12.0-150200.4.10.5 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 08:30:28 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 08:30:28 -0000 Subject: SUSE-FU-2024:2078-1: important: Feature update for rabbitmq-server313, erlang26, elixir115 Message-ID: <171878582817.31539.8576735121036059582@smelt2.prg2.suse.org> # Feature update for rabbitmq-server313, erlang26, elixir115 Announcement ID: SUSE-FU-2024:2078-1 Rating: important References: * bsc#1181400 * bsc#1185075 * bsc#1186203 * bsc#1187818 * bsc#1187819 * bsc#1199431 * bsc#1205267 * bsc#1216582 * bsc#1219532 * bsc#1222591 * jsc#PED-8414 Cross-References: * CVE-2021-22116 * CVE-2021-32718 * CVE-2021-32719 * CVE-2022-31008 * CVE-2023-46118 CVSS scores: * CVE-2021-22116 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-22116 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-32718 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N * CVE-2021-32718 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N * CVE-2021-32719 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N * CVE-2021-32719 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N * CVE-2022-31008 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-31008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-46118 ( SUSE ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46118 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves five vulnerabilities, contains one feature and has five fixes can now be installed. ## Description: This update for rabbitmq-server313, erlang26, elixir115 fixes the following issues: rabbitmq-server was implemented with a parallel versioned RPM package at version 3.13.1 (jsc#PED-8414): * Security issues fixed: * CVE-2021-22116: Fixed improper input validation that may lead to Denial of Sercice (DoS) attacks (bsc#1186203) * CVE-2021-32718, CVE-2021-32719: Fixed potential for JavaScript code execution in the management UI (bsc#1187818, bsc#1187819) * CVE-2022-31008: Fixed encryption key used to encrypt the URI was seeded with a predictable secret (bsc#1205267) * CVE-2023-46118: Fixed HTTP API vulnerability for denial of service (DoS) attacks with very large messages (bsc#1216582) * Other bugs fixed: * Fixed RabbitMQ maintenance status issue (bsc#1199431) * Provide user/group for RPM 4.19 (bsc#1219532) * Fixed `rabbitmqctl` command for `add_user` (bsc#1222591) * Added hardening to systemd service(s) (bsc#1181400) * Use /run instead of deprecated /var/run in tmpfiles.conf (bsc#1185075) * For the full list of upstream changes of this update between version 3.8.11 and 3.13.1 please consult: * https://www.rabbitmq.com/release-information erlang26: * Provide RPM package as it's a dependency of rabbitmq-server313 (jsc#PED-8414) elixir115: * Provide RPM package as needed in some cases by rabbitmq-server313 (jsc#PED-8414) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2078=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2078=1 openSUSE-SLE-15.6-2024-2078=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2078=1 ## Package List: * openSUSE Leap 15.3 (noarch) * elixir115-doc-1.15.7-150300.7.5.1 * elixir115-1.15.7-150300.7.5.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * erlang26-debugger-26.2.1-150300.7.5.1 * erlang26-dialyzer-debuginfo-26.2.1-150300.7.5.1 * erlang26-diameter-26.2.1-150300.7.5.1 * erlang26-epmd-26.2.1-150300.7.5.1 * erlang26-jinterface-src-26.2.1-150300.7.5.1 * erlang26-reltool-src-26.2.1-150300.7.5.1 * erlang26-et-src-26.2.1-150300.7.5.1 * erlang26-debuginfo-26.2.1-150300.7.5.1 * erlang26-reltool-26.2.1-150300.7.5.1 * erlang26-et-26.2.1-150300.7.5.1 * erlang26-jinterface-26.2.1-150300.7.5.1 * erlang26-epmd-debuginfo-26.2.1-150300.7.5.1 * erlang26-observer-26.2.1-150300.7.5.1 * erlang26-diameter-src-26.2.1-150300.7.5.1 * erlang26-src-26.2.1-150300.7.5.1 * erlang26-debugger-src-26.2.1-150300.7.5.1 * erlang26-debugsource-26.2.1-150300.7.5.1 * erlang26-observer-src-26.2.1-150300.7.5.1 * erlang26-wx-src-26.2.1-150300.7.5.1 * erlang26-dialyzer-src-26.2.1-150300.7.5.1 * erlang26-doc-26.2.1-150300.7.5.1 * erlang26-wx-26.2.1-150300.7.5.1 * erlang26-26.2.1-150300.7.5.1 * erlang26-dialyzer-26.2.1-150300.7.5.1 * erlang26-wx-debuginfo-26.2.1-150300.7.5.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * rabbitmq-server313-plugins-3.13.1-150600.13.5.3 * erlang-rabbitmq-client313-3.13.1-150600.13.5.3 * rabbitmq-server313-3.13.1-150600.13.5.3 * openSUSE Leap 15.6 (noarch) * elixir115-doc-1.15.7-150300.7.5.1 * rabbitmq-server313-bash-completion-3.13.1-150600.13.5.3 * rabbitmq-server313-zsh-completion-3.13.1-150600.13.5.3 * elixir115-1.15.7-150300.7.5.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * erlang26-debugger-26.2.1-150300.7.5.1 * erlang26-dialyzer-debuginfo-26.2.1-150300.7.5.1 * erlang26-diameter-26.2.1-150300.7.5.1 * erlang26-epmd-26.2.1-150300.7.5.1 * erlang26-jinterface-src-26.2.1-150300.7.5.1 * erlang26-reltool-src-26.2.1-150300.7.5.1 * erlang26-et-src-26.2.1-150300.7.5.1 * erlang26-debuginfo-26.2.1-150300.7.5.1 * erlang26-reltool-26.2.1-150300.7.5.1 * erlang26-et-26.2.1-150300.7.5.1 * erlang26-jinterface-26.2.1-150300.7.5.1 * erlang26-epmd-debuginfo-26.2.1-150300.7.5.1 * erlang26-observer-26.2.1-150300.7.5.1 * erlang26-diameter-src-26.2.1-150300.7.5.1 * erlang26-src-26.2.1-150300.7.5.1 * erlang26-debugger-src-26.2.1-150300.7.5.1 * erlang26-debugsource-26.2.1-150300.7.5.1 * erlang26-observer-src-26.2.1-150300.7.5.1 * erlang26-wx-src-26.2.1-150300.7.5.1 * erlang26-dialyzer-src-26.2.1-150300.7.5.1 * erlang26-doc-26.2.1-150300.7.5.1 * erlang26-wx-26.2.1-150300.7.5.1 * erlang26-26.2.1-150300.7.5.1 * erlang26-dialyzer-26.2.1-150300.7.5.1 * erlang26-wx-debuginfo-26.2.1-150300.7.5.1 * Server Applications Module 15-SP6 (noarch) * elixir115-1.15.7-150300.7.5.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * rabbitmq-server313-plugins-3.13.1-150600.13.5.3 * rabbitmq-server313-3.13.1-150600.13.5.3 * erlang26-debugsource-26.2.1-150300.7.5.1 * erlang-rabbitmq-client313-3.13.1-150600.13.5.3 * erlang26-debuginfo-26.2.1-150300.7.5.1 * erlang26-epmd-26.2.1-150300.7.5.1 * erlang26-epmd-debuginfo-26.2.1-150300.7.5.1 * erlang26-26.2.1-150300.7.5.1 ## References: * https://www.suse.com/security/cve/CVE-2021-22116.html * https://www.suse.com/security/cve/CVE-2021-32718.html * https://www.suse.com/security/cve/CVE-2021-32719.html * https://www.suse.com/security/cve/CVE-2022-31008.html * https://www.suse.com/security/cve/CVE-2023-46118.html * https://bugzilla.suse.com/show_bug.cgi?id=1181400 * https://bugzilla.suse.com/show_bug.cgi?id=1185075 * https://bugzilla.suse.com/show_bug.cgi?id=1186203 * https://bugzilla.suse.com/show_bug.cgi?id=1187818 * https://bugzilla.suse.com/show_bug.cgi?id=1187819 * https://bugzilla.suse.com/show_bug.cgi?id=1199431 * https://bugzilla.suse.com/show_bug.cgi?id=1205267 * https://bugzilla.suse.com/show_bug.cgi?id=1216582 * https://bugzilla.suse.com/show_bug.cgi?id=1219532 * https://bugzilla.suse.com/show_bug.cgi?id=1222591 * https://jira.suse.com/browse/PED-8414 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 08:30:30 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 08:30:30 -0000 Subject: SUSE-SU-2024:2077-1: important: Security update for gdk-pixbuf Message-ID: <171878583091.31539.10073333799845974154@smelt2.prg2.suse.org> # Security update for gdk-pixbuf Announcement ID: SUSE-SU-2024:2077-1 Rating: important References: * bsc#1195391 * bsc#1219276 * bsc#1223903 Cross-References: * CVE-2022-48622 CVSS scores: * CVE-2022-48622 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2022-48622 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for gdk-pixbuf fixes the following issues: gdk-pixbuf was updated to version 2.42.12: * Security issues fixed: * CVE-2022-48622: Fixed heap memory corruption on gdk-pixbuf (bsc#1219276) * Changes in version 2.42.12: * ani: Reject files with multiple INA or IART chunks, * ani: validate chunk size, * Updated translations. * Enable other image loaders such as xpm and xbm (bsc#1223903) * Changes in version 2.42.11: * Disable fringe loaders by default. * Introspection fixes. * Updated translations. * Changes in version 2.42.10: * Search for rst2man.py. * Update the memory size limit for JPEG images. * Updated translations. * Fixed loading of larger images * Avoid Bash specific syntax in baselibs postscript (bsc#1195391) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2077=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2077=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2077=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2077=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2077=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2077=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2077=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2077=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2077=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2077=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2077=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2077=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2077=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2077=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2077=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2077=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2077=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2077=1 ## Package List: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * gdk-pixbuf-devel-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * gdk-pixbuf-lang-2.42.12-150400.5.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * gdk-pixbuf-devel-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gdk-pixbuf-lang-2.42.12-150400.5.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1 * SUSE Manager Proxy 4.3 (x86_64) * gdk-pixbuf-devel-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * SUSE Manager Proxy 4.3 (noarch) * gdk-pixbuf-lang-2.42.12-150400.5.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * gdk-pixbuf-devel-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * gdk-pixbuf-lang-2.42.12-150400.5.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * gdk-pixbuf-devel-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * SUSE Manager Server 4.3 (noarch) * gdk-pixbuf-lang-2.42.12-150400.5.9.1 * SUSE Manager Server 4.3 (x86_64) * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gdk-pixbuf-devel-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * openSUSE Leap 15.4 (x86_64) * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-32bit-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-32bit-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1 * openSUSE Leap 15.4 (noarch) * gdk-pixbuf-lang-2.42.12-150400.5.9.1 * openSUSE Leap 15.4 (aarch64_ilp32) * gdk-pixbuf-query-loaders-64bit-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-64bit-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-64bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-64bit-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-64bit-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-64bit-debuginfo-2.42.12-150400.5.9.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * gdk-pixbuf-devel-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * openSUSE Leap 15.5 (x86_64) * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-32bit-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-32bit-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1 * openSUSE Leap 15.5 (noarch) * gdk-pixbuf-lang-2.42.12-150400.5.9.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gdk-pixbuf-devel-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * Basesystem Module 15-SP5 (noarch) * gdk-pixbuf-lang-2.42.12-150400.5.9.1 * Basesystem Module 15-SP5 (x86_64) * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * gdk-pixbuf-devel-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gdk-pixbuf-lang-2.42.12-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * gdk-pixbuf-devel-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gdk-pixbuf-lang-2.42.12-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * gdk-pixbuf-devel-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-debugsource-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * gdk-pixbuf-lang-2.42.12-150400.5.9.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48622.html * https://bugzilla.suse.com/show_bug.cgi?id=1195391 * https://bugzilla.suse.com/show_bug.cgi?id=1219276 * https://bugzilla.suse.com/show_bug.cgi?id=1223903 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 08:30:35 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 08:30:35 -0000 Subject: SUSE-SU-2024:2076-1: important: Security update for gdk-pixbuf Message-ID: <171878583546.31539.15012077783446032197@smelt2.prg2.suse.org> # Security update for gdk-pixbuf Announcement ID: SUSE-SU-2024:2076-1 Rating: important References: * bsc#1195391 * bsc#1219276 * bsc#1223903 Cross-References: * CVE-2022-48622 CVSS scores: * CVE-2022-48622 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2022-48622 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for gdk-pixbuf fixes the following issues: gdk-pixbuf was updated to version 2.42.12: * Security issues fixed: * CVE-2022-48622: Fixed vulnerability where a crafted .ani file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack to a denial of service or code execution attack (bsc#1219276) * Changes in version 2.42.12: * ani: Reject files with multiple INA or IART chunks, * ani: validate chunk size, * Updated translations. * Enable other image loaders such as xpm and xbm (bsc#1223903) * Changes in version 2.42.11: * Disable fringe loaders by default. * Introspection fixes. * Updated translations. * Changes in version 2.42.10: * Search for rst2man.py. * Update the memory size limit for JPEG images. * Updated translations. * Fixed loading of larger images * Avoid Bash specific syntax in baselibs postscript (bsc#1195391) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2076=1 openSUSE-SLE-15.6-2024-2076=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2076=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * gdk-pixbuf-devel-2.42.12-150600.3.3.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150600.3.3.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150600.3.3.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150600.3.3.1 * libgdk_pixbuf-2_0-0-2.42.12-150600.3.3.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150600.3.3.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150600.3.3.1 * gdk-pixbuf-thumbnailer-2.42.12-150600.3.3.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150600.3.3.1 * gdk-pixbuf-query-loaders-2.42.12-150600.3.3.1 * gdk-pixbuf-debugsource-2.42.12-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * gdk-pixbuf-devel-32bit-debuginfo-2.42.12-150600.3.3.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150600.3.3.1 * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150600.3.3.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150600.3.3.1 * gdk-pixbuf-devel-32bit-2.42.12-150600.3.3.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * gdk-pixbuf-lang-2.42.12-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * gdk-pixbuf-devel-64bit-2.42.12-150600.3.3.1 * libgdk_pixbuf-2_0-0-64bit-2.42.12-150600.3.3.1 * gdk-pixbuf-query-loaders-64bit-2.42.12-150600.3.3.1 * gdk-pixbuf-query-loaders-64bit-debuginfo-2.42.12-150600.3.3.1 * libgdk_pixbuf-2_0-0-64bit-debuginfo-2.42.12-150600.3.3.1 * gdk-pixbuf-devel-64bit-debuginfo-2.42.12-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * gdk-pixbuf-devel-2.42.12-150600.3.3.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-150600.3.3.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-150600.3.3.1 * gdk-pixbuf-devel-debuginfo-2.42.12-150600.3.3.1 * libgdk_pixbuf-2_0-0-2.42.12-150600.3.3.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150600.3.3.1 * gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150600.3.3.1 * gdk-pixbuf-thumbnailer-2.42.12-150600.3.3.1 * typelib-1_0-GdkPixdata-2_0-2.42.12-150600.3.3.1 * gdk-pixbuf-query-loaders-2.42.12-150600.3.3.1 * gdk-pixbuf-debugsource-2.42.12-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * gdk-pixbuf-lang-2.42.12-150600.3.3.1 * Basesystem Module 15-SP6 (x86_64) * libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150600.3.3.1 * gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150600.3.3.1 * libgdk_pixbuf-2_0-0-32bit-2.42.12-150600.3.3.1 * gdk-pixbuf-query-loaders-32bit-2.42.12-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48622.html * https://bugzilla.suse.com/show_bug.cgi?id=1195391 * https://bugzilla.suse.com/show_bug.cgi?id=1219276 * https://bugzilla.suse.com/show_bug.cgi?id=1223903 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 08:30:37 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 08:30:37 -0000 Subject: SUSE-SU-2024:1624-2: important: Security update for python-Werkzeug Message-ID: <171878583745.31539.13989293750874569686@smelt2.prg2.suse.org> # Security update for python-Werkzeug Announcement ID: SUSE-SU-2024:1624-2 Rating: important References: * bsc#1223979 Cross-References: * CVE-2024-34069 CVSS scores: * CVE-2024-34069 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for python-Werkzeug fixes the following issues: * CVE-2024-34069: Fixed a remote code execution through debugger when interacting with attacker controlled domain (bsc#1223979). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1624=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1624=1 ## Package List: * Basesystem Module 15-SP6 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Package Hub 15 15-SP6 (noarch) * python2-Werkzeug-1.0.1-150300.3.8.1 ## References: * https://www.suse.com/security/cve/CVE-2024-34069.html * https://bugzilla.suse.com/show_bug.cgi?id=1223979 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 12:30:04 -0000 Subject: SUSE-SU-2024:2090-1: important: Security update for podman Message-ID: <171880020406.9259.193063312752187792@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2024:2090-1 Rating: important References: * bsc#1224122 * bsc#1226136 Cross-References: * CVE-2024-24786 * CVE-2024-3727 CVSS scores: * CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * Update to version 4.9.5 * CVE-2024-3727: Fixed a flaw that allowed attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks. (bsc#1224122) * CVE-2024-24786: Fixed an infinite loop in protojson. (bsc#1226136) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2090=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2090=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2090=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2090=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2090=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2090=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2090=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2090=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2090=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2090=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2090=1 ## Package List: * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.27.1 * podman-debuginfo-4.9.5-150400.4.27.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.27.1 * podman-debuginfo-4.9.5-150400.4.27.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.27.1 * podman-debuginfo-4.9.5-150400.4.27.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.27.1 * podman-debuginfo-4.9.5-150400.4.27.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.27.1 * podman-debuginfo-4.9.5-150400.4.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * podman-remote-4.9.5-150400.4.27.1 * podman-4.9.5-150400.4.27.1 * podman-remote-debuginfo-4.9.5-150400.4.27.1 * podman-debuginfo-4.9.5-150400.4.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * podman-docker-4.9.5-150400.4.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * podman-remote-4.9.5-150400.4.27.1 * podman-4.9.5-150400.4.27.1 * podman-remote-debuginfo-4.9.5-150400.4.27.1 * podman-debuginfo-4.9.5-150400.4.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * podman-docker-4.9.5-150400.4.27.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * podman-remote-4.9.5-150400.4.27.1 * podman-4.9.5-150400.4.27.1 * podman-remote-debuginfo-4.9.5-150400.4.27.1 * podman-debuginfo-4.9.5-150400.4.27.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * podman-docker-4.9.5-150400.4.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * podman-remote-4.9.5-150400.4.27.1 * podman-4.9.5-150400.4.27.1 * podman-remote-debuginfo-4.9.5-150400.4.27.1 * podman-debuginfo-4.9.5-150400.4.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * podman-docker-4.9.5-150400.4.27.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * podman-4.9.5-150400.4.27.1 * podman-debuginfo-4.9.5-150400.4.27.1 * podman-remote-4.9.5-150400.4.27.1 * podman-remote-debuginfo-4.9.5-150400.4.27.1 * podmansh-4.9.5-150400.4.27.1 * openSUSE Leap 15.4 (noarch) * podman-docker-4.9.5-150400.4.27.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * podman-4.9.5-150400.4.27.1 * podman-debuginfo-4.9.5-150400.4.27.1 ## References: * https://www.suse.com/security/cve/CVE-2024-24786.html * https://www.suse.com/security/cve/CVE-2024-3727.html * https://bugzilla.suse.com/show_bug.cgi?id=1224122 * https://bugzilla.suse.com/show_bug.cgi?id=1226136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 12:30:06 -0000 Subject: SUSE-SU-2024:2089-1: important: Security update for openssl-1_1 Message-ID: <171880020633.9259.3874429601851990216@smelt2.prg2.suse.org> # Security update for openssl-1_1 Announcement ID: SUSE-SU-2024:2089-1 Rating: important References: * bsc#1225551 Cross-References: * CVE-2024-4741 CVSS scores: * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-1_1 fixes the following issues: * CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2089=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2089=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2089=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2089=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2089=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2089=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2089=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2089=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2089=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2089=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2089=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2089=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2089=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2089=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2089=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * openSUSE Leap 15.4 (x86_64) * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1 * libopenssl1_1-32bit-1.1.1l-150400.7.69.1 * openSUSE Leap 15.4 (noarch) * openssl-1_1-doc-1.1.1l-150400.7.69.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libopenssl-1_1-devel-64bit-1.1.1l-150400.7.69.1 * libopenssl1_1-64bit-1.1.1l-150400.7.69.1 * libopenssl1_1-64bit-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-64bit-1.1.1l-150400.7.69.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1 * libopenssl1_1-32bit-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1 * libopenssl1_1-32bit-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1 * libopenssl1_1-32bit-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1 * libopenssl1_1-32bit-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1 * libopenssl1_1-32bit-1.1.1l-150400.7.69.1 * SUSE Manager Proxy 4.3 (x86_64) * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1 * libopenssl1_1-32bit-1.1.1l-150400.7.69.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1 * libopenssl1_1-32bit-1.1.1l-150400.7.69.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-1.1.1l-150400.7.69.1 * openssl-1_1-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-1.1.1l-150400.7.69.1 * openssl-1_1-debugsource-1.1.1l-150400.7.69.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.69.1 * SUSE Manager Server 4.3 (x86_64) * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1 * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1 * libopenssl1_1-32bit-1.1.1l-150400.7.69.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4741.html * https://bugzilla.suse.com/show_bug.cgi?id=1225551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 12:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 12:30:09 -0000 Subject: SUSE-SU-2024:2088-1: important: Security update for openssl-3 Message-ID: <171880020933.9259.7154946012169829556@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2024:2088-1 Rating: important References: * bsc#1225551 Cross-References: * CVE-2024-4741 CVSS scores: * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2088=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2088=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2088=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2088=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2088=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2088=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2088=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2088=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2088=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2088=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2088=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2088=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2088=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2088=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2088=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl-3-devel-3.0.8-150400.4.57.1 * openssl-3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-3.0.8-150400.4.57.1 * openSUSE Leap 15.4 (x86_64) * libopenssl3-32bit-debuginfo-3.0.8-150400.4.57.1 * libopenssl-3-devel-32bit-3.0.8-150400.4.57.1 * libopenssl3-32bit-3.0.8-150400.4.57.1 * openSUSE Leap 15.4 (noarch) * openssl-3-doc-3.0.8-150400.4.57.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libopenssl3-64bit-3.0.8-150400.4.57.1 * libopenssl-3-devel-64bit-3.0.8-150400.4.57.1 * libopenssl3-64bit-debuginfo-3.0.8-150400.4.57.1 * openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64) * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64) * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl-3-devel-3.0.8-150400.4.57.1 * openssl-3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-3.0.8-150400.4.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl-3-devel-3.0.8-150400.4.57.1 * openssl-3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-3.0.8-150400.4.57.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl-3-devel-3.0.8-150400.4.57.1 * openssl-3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-3.0.8-150400.4.57.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl-3-devel-3.0.8-150400.4.57.1 * openssl-3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-3.0.8-150400.4.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl-3-devel-3.0.8-150400.4.57.1 * openssl-3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-3.0.8-150400.4.57.1 * SUSE Manager Proxy 4.3 (x86_64) * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl-3-devel-3.0.8-150400.4.57.1 * openssl-3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-3.0.8-150400.4.57.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl-3-devel-3.0.8-150400.4.57.1 * openssl-3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-3.0.8-150400.4.57.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * openssl-3-debugsource-3.0.8-150400.4.57.1 * libopenssl-3-devel-3.0.8-150400.4.57.1 * openssl-3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-debuginfo-3.0.8-150400.4.57.1 * libopenssl3-3.0.8-150400.4.57.1 * openssl-3-3.0.8-150400.4.57.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4741.html * https://bugzilla.suse.com/show_bug.cgi?id=1225551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 12:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 12:30:14 -0000 Subject: SUSE-RU-2024:2087-1: moderate: Recommended update for gcc13 Message-ID: <171880021402.9259.17283054872079371366@smelt2.prg2.suse.org> # Recommended update for gcc13 Announcement ID: SUSE-RU-2024:2087-1 Rating: moderate References: * bsc#1188441 * bsc#1210959 * bsc#1214934 * bsc#1217450 * bsc#1217667 * bsc#1218492 * bsc#1219031 * bsc#1219520 * bsc#1220724 * bsc#1221239 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * Toolchain Module 12 An update that has 10 fixes can now be installed. ## Description: This update for gcc13 fixes the following issues: * Update to GCC 13.3 release * Removed Fiji support from the GCN offload compiler as that is requiring Code Object version 3 which is no longer supported by llvm18. * Avoid combine spending too much compile-time and memory doing nothing on s390x. [bsc#1188441] * Make requirement to lld version specific to avoid requiring the meta- package. * Fixed unwinding for JIT code. [bsc#1221239] * Revert libgccjit dependency change. [bsc#1220724] * Fix libgccjit-devel dependency, a newer shared library is OK. * Fix libgccjit dependency, the corresponding compiler isn't required. * Remove crypt and crypt_r interceptors in sanitizer. The crypt API change in SLE15 SP3 breaks them. [bsc#1219520] * Add support for -fmin-function-alignment. [bsc#1214934] * Use %{_target_cpu} to determine host and build. * Includes fix for building TVM. [bsc#1218492] * Add cross-X-newlib-devel requires to newlib cross compilers. [bsc#1219031] * Package m2rte.so plugin in the gcc13-m2 sub-package rather than in gcc13-devel. [bsc#1210959] * Require libstdc++6-devel-gcc13 from gcc13-m2 as m2 programs are linked against libstdc++6. * Includes fix for building mariadb on i686. [bsc#1217667] * Avoid update-alternatives dependency for accelerator crosses. * Package tool links to llvm in cross-amdgcn-gcc13 rather than in cross- amdgcn-newlib13-devel since that also has the dependence. * Depend on llvmVER instead of llvm with VER equal to %product_libs_llvm_ver where available and adjust tool discovery accordingly. This should also properly trigger re-builds when the patchlevel version of llvmVER changes, possibly changing the binary names we link to. [bsc#1217450] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Toolchain Module 12 zypper in -t patch SUSE-SLE-Module-Toolchain-12-2024-2087=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2087=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2087=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2087=1 ## Package List: * Toolchain Module 12 (aarch64 ppc64le s390x x86_64) * gcc13-c++-13.3.0+git8781-1.13.1 * gcc13-locale-13.3.0+git8781-1.13.1 * libstdc++6-devel-gcc13-13.3.0+git8781-1.13.1 * gcc13-13.3.0+git8781-1.13.1 * gcc13-fortran-13.3.0+git8781-1.13.1 * gcc13-debuginfo-13.3.0+git8781-1.13.1 * cpp13-debuginfo-13.3.0+git8781-1.13.1 * gcc13-debugsource-13.3.0+git8781-1.13.1 * gcc13-PIE-13.3.0+git8781-1.13.1 * gcc13-fortran-debuginfo-13.3.0+git8781-1.13.1 * cpp13-13.3.0+git8781-1.13.1 * gcc13-c++-debuginfo-13.3.0+git8781-1.13.1 * Toolchain Module 12 (noarch) * gcc13-info-13.3.0+git8781-1.13.1 * Toolchain Module 12 (s390x x86_64) * gcc13-c++-32bit-13.3.0+git8781-1.13.1 * gcc13-32bit-13.3.0+git8781-1.13.1 * gcc13-fortran-32bit-13.3.0+git8781-1.13.1 * libstdc++6-devel-gcc13-32bit-13.3.0+git8781-1.13.1 * Toolchain Module 12 (x86_64) * cross-nvptx-gcc13-debuginfo-13.3.0+git8781-1.13.1 * cross-nvptx-gcc13-debugsource-13.3.0+git8781-1.13.1 * cross-nvptx-gcc13-13.3.0+git8781-1.13.1 * cross-nvptx-newlib13-devel-13.3.0+git8781-1.13.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libobjc4-debuginfo-13.3.0+git8781-1.13.1 * libhwasan0-13.3.0+git8781-1.13.1 * libstdc++6-locale-13.3.0+git8781-1.13.1 * libgfortran5-debuginfo-13.3.0+git8781-1.13.1 * libtsan2-13.3.0+git8781-1.13.1 * libgcc_s1-13.3.0+git8781-1.13.1 * liblsan0-13.3.0+git8781-1.13.1 * libatomic1-13.3.0+git8781-1.13.1 * libtsan2-debuginfo-13.3.0+git8781-1.13.1 * libasan8-13.3.0+git8781-1.13.1 * libitm1-13.3.0+git8781-1.13.1 * libasan8-debuginfo-13.3.0+git8781-1.13.1 * libgcc_s1-debuginfo-13.3.0+git8781-1.13.1 * libgomp1-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-debuginfo-13.3.0+git8781-1.13.1 * libhwasan0-debuginfo-13.3.0+git8781-1.13.1 * libobjc4-13.3.0+git8781-1.13.1 * libatomic1-debuginfo-13.3.0+git8781-1.13.1 * libubsan1-13.3.0+git8781-1.13.1 * libubsan1-debuginfo-13.3.0+git8781-1.13.1 * libgfortran5-13.3.0+git8781-1.13.1 * liblsan0-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-13.3.0+git8781-1.13.1 * libgomp1-13.3.0+git8781-1.13.1 * libitm1-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-pp-13.3.0+git8781-1.13.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libgcc_s1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libasan8-32bit-13.3.0+git8781-1.13.1 * libgomp1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libquadmath0-32bit-13.3.0+git8781-1.13.1 * libquadmath0-debuginfo-13.3.0+git8781-1.13.1 * libitm1-32bit-13.3.0+git8781-1.13.1 * libitm1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libquadmath0-13.3.0+git8781-1.13.1 * libquadmath0-32bit-debuginfo-13.3.0+git8781-1.13.1 * libatomic1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-pp-32bit-13.3.0+git8781-1.13.1 * libgfortran5-32bit-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-32bit-debuginfo-13.3.0+git8781-1.13.1 * libobjc4-32bit-debuginfo-13.3.0+git8781-1.13.1 * libasan8-32bit-debuginfo-13.3.0+git8781-1.13.1 * libatomic1-32bit-13.3.0+git8781-1.13.1 * libgfortran5-32bit-13.3.0+git8781-1.13.1 * libgcc_s1-32bit-13.3.0+git8781-1.13.1 * libobjc4-32bit-13.3.0+git8781-1.13.1 * libubsan1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libgomp1-32bit-13.3.0+git8781-1.13.1 * libubsan1-32bit-13.3.0+git8781-1.13.1 * libstdc++6-32bit-13.3.0+git8781-1.13.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libobjc4-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-locale-13.3.0+git8781-1.13.1 * libgfortran5-debuginfo-13.3.0+git8781-1.13.1 * libtsan2-13.3.0+git8781-1.13.1 * libgcc_s1-13.3.0+git8781-1.13.1 * liblsan0-13.3.0+git8781-1.13.1 * libatomic1-13.3.0+git8781-1.13.1 * libtsan2-debuginfo-13.3.0+git8781-1.13.1 * libasan8-13.3.0+git8781-1.13.1 * libitm1-13.3.0+git8781-1.13.1 * libasan8-debuginfo-13.3.0+git8781-1.13.1 * libgcc_s1-debuginfo-13.3.0+git8781-1.13.1 * libgomp1-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-debuginfo-13.3.0+git8781-1.13.1 * libobjc4-13.3.0+git8781-1.13.1 * libatomic1-debuginfo-13.3.0+git8781-1.13.1 * libubsan1-13.3.0+git8781-1.13.1 * libubsan1-debuginfo-13.3.0+git8781-1.13.1 * libgfortran5-13.3.0+git8781-1.13.1 * liblsan0-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-13.3.0+git8781-1.13.1 * libgomp1-13.3.0+git8781-1.13.1 * libitm1-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-pp-13.3.0+git8781-1.13.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 x86_64) * libhwasan0-13.3.0+git8781-1.13.1 * libhwasan0-debuginfo-13.3.0+git8781-1.13.1 * SUSE Linux Enterprise Server 12 SP5 (ppc64le x86_64) * libquadmath0-13.3.0+git8781-1.13.1 * libquadmath0-debuginfo-13.3.0+git8781-1.13.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libstdc++6-32bit-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-32bit-13.3.0+git8781-1.13.1 * libubsan1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libobjc4-32bit-debuginfo-13.3.0+git8781-1.13.1 * libgcc_s1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libitm1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-pp-32bit-13.3.0+git8781-1.13.1 * libasan8-32bit-debuginfo-13.3.0+git8781-1.13.1 * libgomp1-32bit-13.3.0+git8781-1.13.1 * libasan8-32bit-13.3.0+git8781-1.13.1 * libatomic1-32bit-13.3.0+git8781-1.13.1 * libgfortran5-32bit-13.3.0+git8781-1.13.1 * libgomp1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libubsan1-32bit-13.3.0+git8781-1.13.1 * libatomic1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libgcc_s1-32bit-13.3.0+git8781-1.13.1 * libitm1-32bit-13.3.0+git8781-1.13.1 * libgfortran5-32bit-debuginfo-13.3.0+git8781-1.13.1 * libobjc4-32bit-13.3.0+git8781-1.13.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * libquadmath0-32bit-debuginfo-13.3.0+git8781-1.13.1 * libquadmath0-32bit-13.3.0+git8781-1.13.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libobjc4-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-locale-13.3.0+git8781-1.13.1 * libgfortran5-debuginfo-13.3.0+git8781-1.13.1 * libtsan2-13.3.0+git8781-1.13.1 * libquadmath0-debuginfo-13.3.0+git8781-1.13.1 * libgcc_s1-13.3.0+git8781-1.13.1 * liblsan0-13.3.0+git8781-1.13.1 * libatomic1-13.3.0+git8781-1.13.1 * libquadmath0-13.3.0+git8781-1.13.1 * libtsan2-debuginfo-13.3.0+git8781-1.13.1 * libasan8-13.3.0+git8781-1.13.1 * libitm1-13.3.0+git8781-1.13.1 * libasan8-debuginfo-13.3.0+git8781-1.13.1 * libgcc_s1-debuginfo-13.3.0+git8781-1.13.1 * libgomp1-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-debuginfo-13.3.0+git8781-1.13.1 * libobjc4-13.3.0+git8781-1.13.1 * libatomic1-debuginfo-13.3.0+git8781-1.13.1 * libubsan1-13.3.0+git8781-1.13.1 * libubsan1-debuginfo-13.3.0+git8781-1.13.1 * libgfortran5-13.3.0+git8781-1.13.1 * liblsan0-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-13.3.0+git8781-1.13.1 * libgomp1-13.3.0+git8781-1.13.1 * libitm1-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-pp-13.3.0+git8781-1.13.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libgcc_s1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libhwasan0-13.3.0+git8781-1.13.1 * libasan8-32bit-13.3.0+git8781-1.13.1 * libgomp1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libquadmath0-32bit-13.3.0+git8781-1.13.1 * libitm1-32bit-13.3.0+git8781-1.13.1 * libitm1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libquadmath0-32bit-debuginfo-13.3.0+git8781-1.13.1 * libatomic1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-pp-32bit-13.3.0+git8781-1.13.1 * libgfortran5-32bit-debuginfo-13.3.0+git8781-1.13.1 * libstdc++6-32bit-debuginfo-13.3.0+git8781-1.13.1 * libobjc4-32bit-debuginfo-13.3.0+git8781-1.13.1 * libasan8-32bit-debuginfo-13.3.0+git8781-1.13.1 * libatomic1-32bit-13.3.0+git8781-1.13.1 * libgfortran5-32bit-13.3.0+git8781-1.13.1 * libhwasan0-debuginfo-13.3.0+git8781-1.13.1 * libgcc_s1-32bit-13.3.0+git8781-1.13.1 * libobjc4-32bit-13.3.0+git8781-1.13.1 * libubsan1-32bit-debuginfo-13.3.0+git8781-1.13.1 * libgomp1-32bit-13.3.0+git8781-1.13.1 * libubsan1-32bit-13.3.0+git8781-1.13.1 * libstdc++6-32bit-13.3.0+git8781-1.13.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1188441 * https://bugzilla.suse.com/show_bug.cgi?id=1210959 * https://bugzilla.suse.com/show_bug.cgi?id=1214934 * https://bugzilla.suse.com/show_bug.cgi?id=1217450 * https://bugzilla.suse.com/show_bug.cgi?id=1217667 * https://bugzilla.suse.com/show_bug.cgi?id=1218492 * https://bugzilla.suse.com/show_bug.cgi?id=1219031 * https://bugzilla.suse.com/show_bug.cgi?id=1219520 * https://bugzilla.suse.com/show_bug.cgi?id=1220724 * https://bugzilla.suse.com/show_bug.cgi?id=1221239 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 12:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 12:30:15 -0000 Subject: SUSE-RU-2024:2086-1: moderate: Recommended update for gcc13 Message-ID: <171880021595.9259.15640605417789422253@smelt2.prg2.suse.org> # Recommended update for gcc13 Announcement ID: SUSE-RU-2024:2086-1 Rating: moderate References: * bsc#1188441 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for gcc13 fixes the following issues: Update to GCC 13.3 release * Removed Fiji support from the GCN offload compiler as that is requiring Code Object version 3 which is no longer supported by llvm18. * Avoid combine spending too much compile-time and memory doing nothing on s390x. [bsc#1188441] * Make requirement to lld version specific to avoid requiring the meta- package. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2086=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2086=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2086=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2086=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2086=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2086=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2086=1 * SUSE Linux Enterprise Server 15 SP2 zypper in -t patch SUSE-SLE-INSTALLER-15-SP2-2024-2086=1 * SUSE Linux Enterprise Server 15 SP3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP3-2024-2086=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-2086=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-2086=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-2086=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-2086=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-2086=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-2086=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-2086=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-2086=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-2086=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-2086=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-2086=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2086=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2086=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2086=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2086=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2086=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2086=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2086=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2086=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2086=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2086=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2086=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64) * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64) * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libobjc4-debuginfo-13.3.0+git8781-150000.1.12.1 * libobjc4-13.3.0+git8781-150000.1.12.1 * libgfortran5-13.3.0+git8781-150000.1.12.1 * libgo22-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * gcc13-locale-13.3.0+git8781-150000.1.12.1 * libm2min18-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-c++-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2log18-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libgo22-debuginfo-13.3.0+git8781-150000.1.12.1 * libada13-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2pim18-debuginfo-13.3.0+git8781-150000.1.12.1 * libgomp1-13.3.0+git8781-150000.1.12.1 * libitm1-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2iso18-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-objc-debuginfo-13.3.0+git8781-150000.1.12.1 * libtsan2-13.3.0+git8781-150000.1.12.1 * libstdc++6-locale-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * libgfortran5-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-go-13.3.0+git8781-150000.1.12.1 * liblsan0-debuginfo-13.3.0+git8781-150000.1.12.1 * libasan8-13.3.0+git8781-150000.1.12.1 * libm2cor18-13.3.0+git8781-150000.1.12.1 * liblsan0-13.3.0+git8781-150000.1.12.1 * libm2iso18-13.3.0+git8781-150000.1.12.1 * gcc13-m2-13.3.0+git8781-150000.1.12.1 * cpp13-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-fortran-debuginfo-13.3.0+git8781-150000.1.12.1 * cpp13-13.3.0+git8781-150000.1.12.1 * libstdc++6-pp-13.3.0+git8781-150000.1.12.1 * gcc13-objc-13.3.0+git8781-150000.1.12.1 * libatomic1-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-ada-13.3.0+git8781-150000.1.12.1 * libm2log18-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-13.3.0+git8781-150000.1.12.1 * libtsan2-debuginfo-13.3.0+git8781-150000.1.12.1 * libubsan1-13.3.0+git8781-150000.1.12.1 * libm2cor18-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2pim18-13.3.0+git8781-150000.1.12.1 * libasan8-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-go-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2min18-13.3.0+git8781-150000.1.12.1 * libada13-13.3.0+git8781-150000.1.12.1 * libstdc++6-devel-gcc13-13.3.0+git8781-150000.1.12.1 * libubsan1-debuginfo-13.3.0+git8781-150000.1.12.1 * libitm1-13.3.0+git8781-150000.1.12.1 * gcc13-c++-13.3.0+git8781-150000.1.12.1 * gcc13-13.3.0+git8781-150000.1.12.1 * gcc13-fortran-13.3.0+git8781-150000.1.12.1 * gcc13-obj-c++-13.3.0+git8781-150000.1.12.1 * libgomp1-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-obj-c++-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-13.3.0+git8781-150000.1.12.1 * gcc13-m2-debuginfo-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-PIE-13.3.0+git8781-150000.1.12.1 * gcc13-ada-debuginfo-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.5 (x86_64) * cross-nvptx-gcc13-13.3.0+git8781-150000.1.12.1 * cross-nvptx-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * cross-nvptx-newlib13-devel-13.3.0+git8781-150000.1.12.1 * libquadmath0-32bit-13.3.0+git8781-150000.1.12.1 * cross-nvptx-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libquadmath0-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.5 (s390x x86_64) * libstdc++6-devel-gcc13-32bit-13.3.0+git8781-150000.1.12.1 * libm2iso18-32bit-13.3.0+git8781-150000.1.12.1 * libstdc++6-32bit-13.3.0+git8781-150000.1.12.1 * libgomp1-32bit-13.3.0+git8781-150000.1.12.1 * libgphobos4-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2cor18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libubsan1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-go-32bit-13.3.0+git8781-150000.1.12.1 * libgcc_s1-32bit-13.3.0+git8781-150000.1.12.1 * libgo22-32bit-13.3.0+git8781-150000.1.12.1 * libm2log18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-fortran-32bit-13.3.0+git8781-150000.1.12.1 * libgo22-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgomp1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-32bit-13.3.0+git8781-150000.1.12.1 * libm2min18-32bit-13.3.0+git8781-150000.1.12.1 * libobjc4-32bit-13.3.0+git8781-150000.1.12.1 * libm2iso18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2pim18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-32bit-13.3.0+git8781-150000.1.12.1 * gcc13-d-32bit-13.3.0+git8781-150000.1.12.1 * libitm1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgfortran5-32bit-13.3.0+git8781-150000.1.12.1 * libobjc4-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2log18-32bit-13.3.0+git8781-150000.1.12.1 * libgfortran5-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-objc-32bit-13.3.0+git8781-150000.1.12.1 * gcc13-m2-32bit-13.3.0+git8781-150000.1.12.1 * libstdc++6-pp-32bit-13.3.0+git8781-150000.1.12.1 * libitm1-32bit-13.3.0+git8781-150000.1.12.1 * libgdruntime4-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-obj-c++-32bit-13.3.0+git8781-150000.1.12.1 * libgcc_s1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgphobos4-32bit-13.3.0+git8781-150000.1.12.1 * libada13-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgdruntime4-32bit-13.3.0+git8781-150000.1.12.1 * libada13-32bit-13.3.0+git8781-150000.1.12.1 * libasan8-32bit-13.3.0+git8781-150000.1.12.1 * libasan8-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-ada-32bit-13.3.0+git8781-150000.1.12.1 * gcc13-c++-32bit-13.3.0+git8781-150000.1.12.1 * libm2pim18-32bit-13.3.0+git8781-150000.1.12.1 * libubsan1-32bit-13.3.0+git8781-150000.1.12.1 * libm2cor18-32bit-13.3.0+git8781-150000.1.12.1 * libm2min18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.5 (aarch64 s390x x86_64) * libgphobos4-13.3.0+git8781-150000.1.12.1 * gcc13-d-13.3.0+git8781-150000.1.12.1 * gcc13-d-debuginfo-13.3.0+git8781-150000.1.12.1 * libgdruntime4-debuginfo-13.3.0+git8781-150000.1.12.1 * libgphobos4-debuginfo-13.3.0+git8781-150000.1.12.1 * libgdruntime4-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.5 (noarch) * gcc13-info-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.5 (aarch64 x86_64) * libhwasan0-debuginfo-13.3.0+git8781-150000.1.12.1 * libhwasan0-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.5 (ppc64le x86_64) * libquadmath0-13.3.0+git8781-150000.1.12.1 * libquadmath0-debuginfo-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cross-pru-gcc13-bootstrap-13.3.0+git8781-150000.1.12.1 * cross-arm-none-gcc13-bootstrap-debugsource-13.3.0+git8781-150000.1.12.1 * cross-mips-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libobjc4-13.3.0+git8781-150000.1.12.1 * cross-avr-gcc13-bootstrap-debuginfo-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * gcc13-locale-13.3.0+git8781-150000.1.12.1 * libm2min18-debuginfo-13.3.0+git8781-150000.1.12.1 * libada13-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2pim18-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2iso18-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-objc-debuginfo-13.3.0+git8781-150000.1.12.1 * libtsan2-13.3.0+git8781-150000.1.12.1 * cross-rx-gcc13-bootstrap-13.3.0+git8781-150000.1.12.1 * libgfortran5-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-rx-gcc13-bootstrap-debugsource-13.3.0+git8781-150000.1.12.1 * libasan8-13.3.0+git8781-150000.1.12.1 * libm2iso18-13.3.0+git8781-150000.1.12.1 * cross-sparc64-gcc13-13.3.0+git8781-150000.1.12.1 * cross-hppa-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * libstdc++6-pp-13.3.0+git8781-150000.1.12.1 * cross-ppc64-gcc13-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libtsan2-debuginfo-13.3.0+git8781-150000.1.12.1 * libubsan1-13.3.0+git8781-150000.1.12.1 * cross-hppa-gcc13-bootstrap-debugsource-13.3.0+git8781-150000.1.12.1 * cross-hppa-gcc13-icecream-backend-13.3.0+git8781-150000.1.12.1 * libm2pim18-13.3.0+git8781-150000.1.12.1 * libada13-13.3.0+git8781-150000.1.12.1 * libstdc++6-devel-gcc13-13.3.0+git8781-150000.1.12.1 * libubsan1-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-13.3.0+git8781-150000.1.12.1 * gcc13-PIE-13.3.0+git8781-150000.1.12.1 * cross-mips-gcc13-icecream-backend-13.3.0+git8781-150000.1.12.1 * cross-pru-gcc13-bootstrap-debugsource-13.3.0+git8781-150000.1.12.1 * cross-sparc-gcc13-13.3.0+git8781-150000.1.12.1 * libobjc4-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-mips-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * cross-mips-gcc13-13.3.0+git8781-150000.1.12.1 * libgfortran5-13.3.0+git8781-150000.1.12.1 * cross-riscv64-elf-gcc13-bootstrap-debugsource-13.3.0+git8781-150000.1.12.1 * cross-arm-gcc13-icecream-backend-13.3.0+git8781-150000.1.12.1 * cross-epiphany-gcc13-bootstrap-debugsource-13.3.0+git8781-150000.1.12.1 * cross-arm-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * libm2log18-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-sparc-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * liblsan0-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2cor18-13.3.0+git8781-150000.1.12.1 * gcc13-fortran-debuginfo-13.3.0+git8781-150000.1.12.1 * cpp13-13.3.0+git8781-150000.1.12.1 * gcc13-ada-13.3.0+git8781-150000.1.12.1 * libm2log18-13.3.0+git8781-150000.1.12.1 * libatomic1-13.3.0+git8781-150000.1.12.1 * libasan8-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-13.3.0+git8781-150000.1.12.1 * cross-bpf-gcc13-13.3.0+git8781-150000.1.12.1 * gcc13-obj-c++-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-m2-debuginfo-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-riscv64-elf-gcc13-bootstrap-13.3.0+git8781-150000.1.12.1 * gcc13-ada-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-arm-gcc13-13.3.0+git8781-150000.1.12.1 * cross-m68k-gcc13-13.3.0+git8781-150000.1.12.1 * cross-ppc64-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * cross-riscv64-gcc13-bootstrap-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-hppa-gcc13-bootstrap-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-arm-none-gcc13-bootstrap-13.3.0+git8781-150000.1.12.1 * libgo22-debuginfo-13.3.0+git8781-150000.1.12.1 * libgomp1-13.3.0+git8781-150000.1.12.1 * cross-bpf-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * cross-avr-gcc13-bootstrap-debugsource-13.3.0+git8781-150000.1.12.1 * cross-m68k-gcc13-icecream-backend-13.3.0+git8781-150000.1.12.1 * cross-sparcv9-gcc13-icecream-backend-13.3.0+git8781-150000.1.12.1 * liblsan0-13.3.0+git8781-150000.1.12.1 * cross-bpf-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * cpp13-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-sparc64-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-rx-gcc13-bootstrap-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-objc-13.3.0+git8781-150000.1.12.1 * libitm1-13.3.0+git8781-150000.1.12.1 * cross-riscv64-gcc13-bootstrap-debugsource-13.3.0+git8781-150000.1.12.1 * cross-ppc64-gcc13-icecream-backend-13.3.0+git8781-150000.1.12.1 * cross-m68k-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * cross-sparc64-gcc13-icecream-backend-13.3.0+git8781-150000.1.12.1 * libgo22-13.3.0+git8781-150000.1.12.1 * cross-hppa-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-c++-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libitm1-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-locale-13.3.0+git8781-150000.1.12.1 * cross-epiphany-gcc13-bootstrap-13.3.0+git8781-150000.1.12.1 * cross-arm-none-gcc13-bootstrap-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-go-13.3.0+git8781-150000.1.12.1 * gcc13-m2-13.3.0+git8781-150000.1.12.1 * cross-riscv64-gcc13-bootstrap-13.3.0+git8781-150000.1.12.1 * gcc13-testresults-13.3.0+git8781-150000.1.12.1 * cross-riscv64-elf-gcc13-bootstrap-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-ppc64-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-pru-gcc13-bootstrap-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2cor18-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-go-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-hppa-gcc13-13.3.0+git8781-150000.1.12.1 * libm2min18-13.3.0+git8781-150000.1.12.1 * cross-arm-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-sparc-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-hppa-gcc13-bootstrap-13.3.0+git8781-150000.1.12.1 * gcc13-c++-13.3.0+git8781-150000.1.12.1 * cross-sparc64-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * gcc13-fortran-13.3.0+git8781-150000.1.12.1 * gcc13-obj-c++-13.3.0+git8781-150000.1.12.1 * libgomp1-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-epiphany-gcc13-bootstrap-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-avr-gcc13-bootstrap-13.3.0+git8781-150000.1.12.1 * cross-m68k-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * cross-aarch64-gcc13-bootstrap-debugsource-13.3.0+git8781-150000.1.12.1 * cross-aarch64-gcc13-bootstrap-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-aarch64-gcc13-bootstrap-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.6 (x86_64) * cross-nvptx-gcc13-13.3.0+git8781-150000.1.12.1 * cross-nvptx-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * cross-nvptx-newlib13-devel-13.3.0+git8781-150000.1.12.1 * libquadmath0-32bit-13.3.0+git8781-150000.1.12.1 * cross-nvptx-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libquadmath0-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.6 (aarch64 s390x x86_64) * libgphobos4-13.3.0+git8781-150000.1.12.1 * gcc13-d-13.3.0+git8781-150000.1.12.1 * gcc13-d-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-ppc64le-gcc13-bootstrap-debuginfo-13.3.0+git8781-150000.1.12.1 * libgdruntime4-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-ppc64le-gcc13-bootstrap-debugsource-13.3.0+git8781-150000.1.12.1 * libgphobos4-debuginfo-13.3.0+git8781-150000.1.12.1 * libgdruntime4-13.3.0+git8781-150000.1.12.1 * cross-ppc64le-gcc13-bootstrap-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * cross-s390x-gcc13-bootstrap-debugsource-13.3.0+git8781-150000.1.12.1 * cross-s390x-gcc13-bootstrap-13.3.0+git8781-150000.1.12.1 * cross-s390x-gcc13-bootstrap-debuginfo-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.6 (s390x x86_64) * libstdc++6-devel-gcc13-32bit-13.3.0+git8781-150000.1.12.1 * libm2iso18-32bit-13.3.0+git8781-150000.1.12.1 * libstdc++6-32bit-13.3.0+git8781-150000.1.12.1 * libgomp1-32bit-13.3.0+git8781-150000.1.12.1 * libgphobos4-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2cor18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libubsan1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-go-32bit-13.3.0+git8781-150000.1.12.1 * libgcc_s1-32bit-13.3.0+git8781-150000.1.12.1 * libgo22-32bit-13.3.0+git8781-150000.1.12.1 * libm2log18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-fortran-32bit-13.3.0+git8781-150000.1.12.1 * libgo22-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgomp1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-32bit-13.3.0+git8781-150000.1.12.1 * libm2min18-32bit-13.3.0+git8781-150000.1.12.1 * libobjc4-32bit-13.3.0+git8781-150000.1.12.1 * libm2iso18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2pim18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-32bit-13.3.0+git8781-150000.1.12.1 * gcc13-d-32bit-13.3.0+git8781-150000.1.12.1 * libitm1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgfortran5-32bit-13.3.0+git8781-150000.1.12.1 * libobjc4-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2log18-32bit-13.3.0+git8781-150000.1.12.1 * libgfortran5-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-objc-32bit-13.3.0+git8781-150000.1.12.1 * gcc13-m2-32bit-13.3.0+git8781-150000.1.12.1 * libstdc++6-pp-32bit-13.3.0+git8781-150000.1.12.1 * libitm1-32bit-13.3.0+git8781-150000.1.12.1 * libgdruntime4-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-obj-c++-32bit-13.3.0+git8781-150000.1.12.1 * libgcc_s1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgphobos4-32bit-13.3.0+git8781-150000.1.12.1 * libada13-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgdruntime4-32bit-13.3.0+git8781-150000.1.12.1 * libada13-32bit-13.3.0+git8781-150000.1.12.1 * libasan8-32bit-13.3.0+git8781-150000.1.12.1 * libasan8-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-ada-32bit-13.3.0+git8781-150000.1.12.1 * gcc13-c++-32bit-13.3.0+git8781-150000.1.12.1 * libm2pim18-32bit-13.3.0+git8781-150000.1.12.1 * libubsan1-32bit-13.3.0+git8781-150000.1.12.1 * libm2cor18-32bit-13.3.0+git8781-150000.1.12.1 * libm2min18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.6 (noarch) * gcc13-info-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.6 (aarch64 x86_64) * libhwasan0-debuginfo-13.3.0+git8781-150000.1.12.1 * libhwasan0-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.6 (ppc64le x86_64) * libquadmath0-13.3.0+git8781-150000.1.12.1 * libquadmath0-debuginfo-13.3.0+git8781-150000.1.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x) * cross-x86_64-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * cross-x86_64-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * cross-x86_64-gcc13-icecream-backend-13.3.0+git8781-150000.1.12.1 * cross-x86_64-gcc13-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Server 15 SP2 (aarch64 ppc64le s390x x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Server 15 SP3 (aarch64 ppc64le s390x x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Manager Proxy 4.3 (x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libstdc++6-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-13.3.0+git8781-150000.1.12.1 * libatomic1-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-13.3.0+git8781-150000.1.12.1 * libatomic1-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-13.3.0+git8781-150000.1.12.1 * libatomic1-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-13.3.0+git8781-150000.1.12.1 * libatomic1-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-13.3.0+git8781-150000.1.12.1 * libatomic1-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libobjc4-debuginfo-13.3.0+git8781-150000.1.12.1 * libobjc4-13.3.0+git8781-150000.1.12.1 * libgfortran5-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libgomp1-13.3.0+git8781-150000.1.12.1 * libitm1-debuginfo-13.3.0+git8781-150000.1.12.1 * libtsan2-13.3.0+git8781-150000.1.12.1 * libstdc++6-locale-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * libgfortran5-debuginfo-13.3.0+git8781-150000.1.12.1 * liblsan0-debuginfo-13.3.0+git8781-150000.1.12.1 * libasan8-13.3.0+git8781-150000.1.12.1 * liblsan0-13.3.0+git8781-150000.1.12.1 * libstdc++6-pp-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-debuginfo-13.3.0+git8781-150000.1.12.1 * libtsan2-debuginfo-13.3.0+git8781-150000.1.12.1 * libubsan1-13.3.0+git8781-150000.1.12.1 * libatomic1-13.3.0+git8781-150000.1.12.1 * libasan8-debuginfo-13.3.0+git8781-150000.1.12.1 * libubsan1-debuginfo-13.3.0+git8781-150000.1.12.1 * libitm1-13.3.0+git8781-150000.1.12.1 * libgomp1-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * Basesystem Module 15-SP5 (aarch64 x86_64) * libhwasan0-debuginfo-13.3.0+git8781-150000.1.12.1 * libhwasan0-13.3.0+git8781-150000.1.12.1 * Basesystem Module 15-SP5 (ppc64le x86_64) * libquadmath0-13.3.0+git8781-150000.1.12.1 * libquadmath0-debuginfo-13.3.0+git8781-150000.1.12.1 * Basesystem Module 15-SP5 (x86_64) * libstdc++6-32bit-13.3.0+git8781-150000.1.12.1 * libgomp1-32bit-13.3.0+git8781-150000.1.12.1 * libubsan1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgcc_s1-32bit-13.3.0+git8781-150000.1.12.1 * libquadmath0-32bit-13.3.0+git8781-150000.1.12.1 * libstdc++6-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgomp1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libobjc4-32bit-13.3.0+git8781-150000.1.12.1 * libquadmath0-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-32bit-13.3.0+git8781-150000.1.12.1 * libitm1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgfortran5-32bit-13.3.0+git8781-150000.1.12.1 * libobjc4-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgfortran5-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-pp-32bit-13.3.0+git8781-150000.1.12.1 * libitm1-32bit-13.3.0+git8781-150000.1.12.1 * libgcc_s1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libasan8-32bit-13.3.0+git8781-150000.1.12.1 * libasan8-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libubsan1-32bit-13.3.0+git8781-150000.1.12.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libobjc4-debuginfo-13.3.0+git8781-150000.1.12.1 * libobjc4-13.3.0+git8781-150000.1.12.1 * libgfortran5-13.3.0+git8781-150000.1.12.1 * libgcc_s1-13.3.0+git8781-150000.1.12.1 * libm2min18-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2log18-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2pim18-debuginfo-13.3.0+git8781-150000.1.12.1 * libgomp1-13.3.0+git8781-150000.1.12.1 * libitm1-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2iso18-debuginfo-13.3.0+git8781-150000.1.12.1 * libtsan2-13.3.0+git8781-150000.1.12.1 * libstdc++6-locale-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * libgfortran5-debuginfo-13.3.0+git8781-150000.1.12.1 * liblsan0-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2cor18-13.3.0+git8781-150000.1.12.1 * libasan8-13.3.0+git8781-150000.1.12.1 * libm2iso18-13.3.0+git8781-150000.1.12.1 * liblsan0-13.3.0+git8781-150000.1.12.1 * libstdc++6-pp-13.3.0+git8781-150000.1.12.1 * libstdc++6-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-debuginfo-13.3.0+git8781-150000.1.12.1 * libtsan2-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2log18-13.3.0+git8781-150000.1.12.1 * libubsan1-13.3.0+git8781-150000.1.12.1 * libatomic1-13.3.0+git8781-150000.1.12.1 * libm2cor18-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2pim18-13.3.0+git8781-150000.1.12.1 * libasan8-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2min18-13.3.0+git8781-150000.1.12.1 * libubsan1-debuginfo-13.3.0+git8781-150000.1.12.1 * libitm1-13.3.0+git8781-150000.1.12.1 * libgomp1-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-13.3.0+git8781-150000.1.12.1 * libgcc_s1-debuginfo-13.3.0+git8781-150000.1.12.1 * Basesystem Module 15-SP6 (aarch64 x86_64) * libhwasan0-debuginfo-13.3.0+git8781-150000.1.12.1 * libhwasan0-13.3.0+git8781-150000.1.12.1 * Basesystem Module 15-SP6 (ppc64le x86_64) * libquadmath0-13.3.0+git8781-150000.1.12.1 * libquadmath0-debuginfo-13.3.0+git8781-150000.1.12.1 * Basesystem Module 15-SP6 (x86_64) * libm2iso18-32bit-13.3.0+git8781-150000.1.12.1 * libstdc++6-32bit-13.3.0+git8781-150000.1.12.1 * libgomp1-32bit-13.3.0+git8781-150000.1.12.1 * libm2cor18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libubsan1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgcc_s1-32bit-13.3.0+git8781-150000.1.12.1 * libm2log18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libquadmath0-32bit-13.3.0+git8781-150000.1.12.1 * libstdc++6-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgomp1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2min18-32bit-13.3.0+git8781-150000.1.12.1 * libobjc4-32bit-13.3.0+git8781-150000.1.12.1 * libm2iso18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2pim18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libatomic1-32bit-13.3.0+git8781-150000.1.12.1 * libquadmath0-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libitm1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgfortran5-32bit-13.3.0+git8781-150000.1.12.1 * libobjc4-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2log18-32bit-13.3.0+git8781-150000.1.12.1 * libgfortran5-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libstdc++6-pp-32bit-13.3.0+git8781-150000.1.12.1 * libitm1-32bit-13.3.0+git8781-150000.1.12.1 * libgcc_s1-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libasan8-32bit-13.3.0+git8781-150000.1.12.1 * libasan8-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2pim18-32bit-13.3.0+git8781-150000.1.12.1 * libubsan1-32bit-13.3.0+git8781-150000.1.12.1 * libm2cor18-32bit-13.3.0+git8781-150000.1.12.1 * libm2min18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * cpp13-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-fortran-debuginfo-13.3.0+git8781-150000.1.12.1 * cpp13-13.3.0+git8781-150000.1.12.1 * gcc13-c++-13.3.0+git8781-150000.1.12.1 * gcc13-13.3.0+git8781-150000.1.12.1 * gcc13-fortran-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * gcc13-PIE-13.3.0+git8781-150000.1.12.1 * gcc13-locale-13.3.0+git8781-150000.1.12.1 * libstdc++6-devel-gcc13-13.3.0+git8781-150000.1.12.1 * gcc13-c++-debuginfo-13.3.0+git8781-150000.1.12.1 * Development Tools Module 15-SP5 (noarch) * gcc13-info-13.3.0+git8781-150000.1.12.1 * Development Tools Module 15-SP5 (x86_64) * libstdc++6-devel-gcc13-32bit-13.3.0+git8781-150000.1.12.1 * cross-nvptx-gcc13-13.3.0+git8781-150000.1.12.1 * cross-nvptx-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * cross-nvptx-newlib13-devel-13.3.0+git8781-150000.1.12.1 * gcc13-32bit-13.3.0+git8781-150000.1.12.1 * gcc13-c++-32bit-13.3.0+git8781-150000.1.12.1 * cross-nvptx-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-fortran-32bit-13.3.0+git8781-150000.1.12.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * cpp13-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-fortran-debuginfo-13.3.0+git8781-150000.1.12.1 * cpp13-13.3.0+git8781-150000.1.12.1 * gcc13-c++-13.3.0+git8781-150000.1.12.1 * gcc13-13.3.0+git8781-150000.1.12.1 * gcc13-fortran-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * gcc13-PIE-13.3.0+git8781-150000.1.12.1 * gcc13-locale-13.3.0+git8781-150000.1.12.1 * libstdc++6-devel-gcc13-13.3.0+git8781-150000.1.12.1 * gcc13-c++-debuginfo-13.3.0+git8781-150000.1.12.1 * Development Tools Module 15-SP6 (noarch) * gcc13-info-13.3.0+git8781-150000.1.12.1 * Development Tools Module 15-SP6 (x86_64) * libstdc++6-devel-gcc13-32bit-13.3.0+git8781-150000.1.12.1 * cross-nvptx-gcc13-13.3.0+git8781-150000.1.12.1 * cross-nvptx-gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * cross-nvptx-newlib13-devel-13.3.0+git8781-150000.1.12.1 * gcc13-32bit-13.3.0+git8781-150000.1.12.1 * gcc13-c++-32bit-13.3.0+git8781-150000.1.12.1 * cross-nvptx-gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-fortran-32bit-13.3.0+git8781-150000.1.12.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libgo22-13.3.0+git8781-150000.1.12.1 * libm2min18-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2log18-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * libgo22-debuginfo-13.3.0+git8781-150000.1.12.1 * libada13-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2pim18-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2iso18-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-objc-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * gcc13-go-13.3.0+git8781-150000.1.12.1 * libm2cor18-13.3.0+git8781-150000.1.12.1 * libm2iso18-13.3.0+git8781-150000.1.12.1 * gcc13-m2-13.3.0+git8781-150000.1.12.1 * gcc13-objc-13.3.0+git8781-150000.1.12.1 * gcc13-ada-13.3.0+git8781-150000.1.12.1 * libm2log18-13.3.0+git8781-150000.1.12.1 * libm2cor18-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2pim18-13.3.0+git8781-150000.1.12.1 * gcc13-go-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2min18-13.3.0+git8781-150000.1.12.1 * libada13-13.3.0+git8781-150000.1.12.1 * gcc13-obj-c++-13.3.0+git8781-150000.1.12.1 * gcc13-obj-c++-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-m2-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-ada-debuginfo-13.3.0+git8781-150000.1.12.1 * SUSE Package Hub 15 15-SP5 (aarch64 s390x x86_64) * libgphobos4-13.3.0+git8781-150000.1.12.1 * gcc13-d-13.3.0+git8781-150000.1.12.1 * gcc13-d-debuginfo-13.3.0+git8781-150000.1.12.1 * libgdruntime4-debuginfo-13.3.0+git8781-150000.1.12.1 * libgphobos4-debuginfo-13.3.0+git8781-150000.1.12.1 * libgdruntime4-13.3.0+git8781-150000.1.12.1 * SUSE Package Hub 15 15-SP5 (x86_64) * libm2iso18-32bit-13.3.0+git8781-150000.1.12.1 * libm2cor18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgphobos4-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-go-32bit-13.3.0+git8781-150000.1.12.1 * libm2log18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgo22-32bit-13.3.0+git8781-150000.1.12.1 * libgo22-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2min18-32bit-13.3.0+git8781-150000.1.12.1 * libm2iso18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libm2pim18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-d-32bit-13.3.0+git8781-150000.1.12.1 * libm2log18-32bit-13.3.0+git8781-150000.1.12.1 * gcc13-objc-32bit-13.3.0+git8781-150000.1.12.1 * gcc13-m2-32bit-13.3.0+git8781-150000.1.12.1 * libgdruntime4-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-obj-c++-32bit-13.3.0+git8781-150000.1.12.1 * libgphobos4-32bit-13.3.0+git8781-150000.1.12.1 * libada13-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * libgdruntime4-32bit-13.3.0+git8781-150000.1.12.1 * libada13-32bit-13.3.0+git8781-150000.1.12.1 * gcc13-ada-32bit-13.3.0+git8781-150000.1.12.1 * libm2pim18-32bit-13.3.0+git8781-150000.1.12.1 * libm2cor18-32bit-13.3.0+git8781-150000.1.12.1 * libm2min18-32bit-debuginfo-13.3.0+git8781-150000.1.12.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * gcc13-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-objc-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-obj-c++-13.3.0+git8781-150000.1.12.1 * gcc13-objc-13.3.0+git8781-150000.1.12.1 * gcc13-ada-13.3.0+git8781-150000.1.12.1 * gcc13-obj-c++-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-m2-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-debugsource-13.3.0+git8781-150000.1.12.1 * gcc13-go-13.3.0+git8781-150000.1.12.1 * gcc13-go-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-ada-debuginfo-13.3.0+git8781-150000.1.12.1 * gcc13-m2-13.3.0+git8781-150000.1.12.1 * SUSE Package Hub 15 15-SP6 (aarch64 s390x x86_64) * gcc13-d-13.3.0+git8781-150000.1.12.1 * gcc13-d-debuginfo-13.3.0+git8781-150000.1.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1188441 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 12:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 12:30:17 -0000 Subject: SUSE-RU-2024:2085-1: moderate: recommended update for python-requests Message-ID: <171880021791.9259.8435769310854882695@smelt2.prg2.suse.org> # recommended update for python-requests Announcement ID: SUSE-RU-2024:2085-1 Rating: moderate References: * bsc#1225912 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for python-requests fixes the following issue: * Allow the usage of "verify" parameter as a directory. (bsc#1225912) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2085=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2085=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2085=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2085=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2085=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2085=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2085=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2085=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2085=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2085=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2085=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2085=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2085=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2085=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2085=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2085=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2085=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2085=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2085=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2085=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2085=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2085=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2085=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2085=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2085=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2085=1 ## Package List: * openSUSE Leap 15.3 (noarch) * python3-requests-2.25.1-150300.3.12.2 * python2-requests-2.25.1-150300.3.12.2 * openSUSE Leap Micro 5.3 (noarch) * python3-requests-2.25.1-150300.3.12.2 * openSUSE Leap Micro 5.4 (noarch) * python3-requests-2.25.1-150300.3.12.2 * openSUSE Leap 15.5 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Micro 5.3 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Micro 5.4 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Micro 5.5 (noarch) * python3-requests-2.25.1-150300.3.12.2 * Basesystem Module 15-SP5 (noarch) * python3-requests-2.25.1-150300.3.12.2 * Basesystem Module 15-SP6 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Manager Proxy 4.3 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Manager Server 4.3 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Enterprise Storage 7.1 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Micro 5.1 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Micro 5.2 (noarch) * python3-requests-2.25.1-150300.3.12.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * python3-requests-2.25.1-150300.3.12.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1225912 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 12:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 12:30:19 -0000 Subject: SUSE-RU-2024:1665-2: moderate: Recommended update for coreutils Message-ID: <171880021986.9259.16799530815615382425@smelt2.prg2.suse.org> # Recommended update for coreutils Announcement ID: SUSE-RU-2024:1665-2 Rating: moderate References: * bsc#1221632 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for coreutils fixes the following issues: * ls: avoid triggering automounts (bsc#1221632) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1665=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1665=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-testsuite-8.32-150400.9.6.2 * coreutils-single-debugsource-8.32-150400.9.6.1 * coreutils-single-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * coreutils-single-debuginfo-8.32-150400.9.6.1 * openSUSE Leap 15.6 (noarch) * coreutils-doc-8.32-150400.9.6.1 * coreutils-lang-8.32-150400.9.6.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * Basesystem Module 15-SP6 (noarch) * coreutils-doc-8.32-150400.9.6.1 * coreutils-lang-8.32-150400.9.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221632 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 12:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 12:30:22 -0000 Subject: SUSE-RU-2024:1876-2: moderate: Recommended update for aaa_base Message-ID: <171880022205.9259.10812881443009005313@smelt2.prg2.suse.org> # Recommended update for aaa_base Announcement ID: SUSE-RU-2024:1876-2 Rating: moderate References: * bsc#1221361 Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for aaa_base fixes the following issues: * Fix the typo to set JAVA_BINDIR in the csh variant of the alljava profile script (bsc#1221361) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1876=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1876=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1876=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-wsl-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221361 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 16:30:05 -0000 Subject: SUSE-SU-2024:2101-1: important: Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) Message-ID: <171881460570.12930.8084988597912971798@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2101-1 Rating: important References: * bsc#1221302 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2022-48651 * CVE-2024-26610 * CVE-2024-26852 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_47 fixes several issues. The following security issues were fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2101=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2101=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_13-debugsource-3-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_47-rt-3-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_47-rt-debuginfo-3-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_13-debugsource-3-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_47-rt-3-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_47-rt-debuginfo-3-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 16:30:09 -0000 Subject: SUSE-SU-2024:2100-1: important: Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) Message-ID: <171881460931.12930.2567257761132593234@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2100-1 Rating: important References: * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2022-48651 * CVE-2023-52502 * CVE-2023-6546 * CVE-2024-26610 * CVE-2024-26852 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_38 fixes several issues. The following security issues were fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2100=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2100=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_38-rt-debuginfo-3-150500.11.6.1 * kernel-livepatch-SLE15-SP5-RT_Update_11-debugsource-3-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_38-rt-3-150500.11.6.1 * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_38-rt-debuginfo-3-150500.11.6.1 * kernel-livepatch-SLE15-SP5-RT_Update_11-debugsource-3-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_38-rt-3-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 16:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 16:30:13 -0000 Subject: SUSE-SU-2024:2099-1: important: Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) Message-ID: <171881461369.12930.17956846029765926334@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2099-1 Rating: important References: * bsc#1218259 * bsc#1223059 Cross-References: * CVE-2023-6931 * CVE-2024-26852 CVSS scores: * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_27 fixes several issues. The following security issues were fixed: * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218259). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2099=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2099=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-8-150500.2.1 * kernel-livepatch-5_14_21-150500_13_27-rt-8-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-8-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-8-150500.2.1 * kernel-livepatch-5_14_21-150500_13_27-rt-8-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-8-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1218259 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 16:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 16:30:16 -0000 Subject: SUSE-SU-2024:2096-1: important: Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5) Message-ID: <171881461643.12930.9133753589022678903@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2096-1 Rating: important References: * bsc#1223059 Cross-References: * CVE-2024-26852 CVSS scores: * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_30 fixes one issue. The following security issue was fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2098=1 SUSE-2024-2103=1 SUSE-2024-2096=1 SUSE-2024-2097=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2097=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-2098=1 SUSE-SLE-Module-Live- Patching-15-SP5-2024-2103=1 SUSE-SLE-Module-Live-Patching-15-SP5-2024-2096=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-9-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-debuginfo-9-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_5-debugsource-10-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-9-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_6-debugsource-9-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-9-150500.2.1 * kernel-livepatch-5_14_21-150500_13_18-rt-10-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-7-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-7-150500.2.1 * kernel-livepatch-5_14_21-150500_13_18-rt-debuginfo-10-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-7-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-9-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-9-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-debuginfo-9-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_5-debugsource-10-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-9-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_6-debugsource-9-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-9-150500.2.1 * kernel-livepatch-5_14_21-150500_13_18-rt-10-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-7-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-7-150500.2.1 * kernel-livepatch-5_14_21-150500_13_18-rt-debuginfo-10-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-7-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-9-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 16:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 16:30:18 -0000 Subject: SUSE-SU-2024:2094-1: important: Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5) Message-ID: <171881461837.12930.10079287945179742367@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2094-1 Rating: important References: * bsc#1222118 * bsc#1223059 Cross-References: * CVE-2023-52628 * CVE-2024-26852 CVSS scores: * CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_11 fixes several issues. The following security issues were fixed: * CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222118). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2094=1 SUSE-2024-2095=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2094=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-2095=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_1-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_5-rt-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_5-rt-debuginfo-13-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_3-debugsource-11-150500.2.1 * kernel-livepatch-5_14_21-150500_13_11-rt-11-150500.2.1 * kernel-livepatch-5_14_21-150500_13_11-rt-debuginfo-11-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_1-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_5-rt-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_5-rt-debuginfo-13-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_3-debugsource-11-150500.2.1 * kernel-livepatch-5_14_21-150500_13_11-rt-11-150500.2.1 * kernel-livepatch-5_14_21-150500_13_11-rt-debuginfo-11-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52628.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1222118 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 16:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 16:30:22 -0000 Subject: SUSE-SU-2024:2092-1: important: Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5) Message-ID: <171881462290.12930.15378904019631968654@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2092-1 Rating: important References: * bsc#1219296 * bsc#1220211 * bsc#1220828 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1222882 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2022-48651 * CVE-2023-52340 * CVE-2023-52502 * CVE-2023-6546 * CVE-2024-26585 * CVE-2024-26610 * CVE-2024-26622 * CVE-2024-26766 * CVE-2024-26852 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves nine vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_35 fixes several issues. The following security issues were fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220211). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828). * CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big' packets (bsc#1219296). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2092=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2092=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_10-debugsource-5-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_35-rt-5-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_35-rt-debuginfo-5-150500.11.8.1 * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_10-debugsource-5-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_35-rt-5-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_35-rt-debuginfo-5-150500.11.8.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-52340.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-26585.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26622.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1219296 * https://bugzilla.suse.com/show_bug.cgi?id=1220211 * https://bugzilla.suse.com/show_bug.cgi?id=1220828 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 16:30:26 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 16:30:26 -0000 Subject: SUSE-SU-2024:2091-1: important: Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) Message-ID: <171881462640.12930.3477467389388216027@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2091-1 Rating: important References: * bsc#1222118 * bsc#1223059 * bsc#1224043 Cross-References: * CVE-2022-48687 * CVE-2023-52628 * CVE-2024-26852 CVSS scores: * CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-48687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_11 fixes several issues. The following security issues were fixed: * CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222118). * CVE-2022-48687: Fixed fix out-of-bounds read when setting HMAC data (bsc#1224043). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2091=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2091=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_11-rt-14-150500.6.1 * kernel-livepatch-SLE15-SP5-RT_Update_0-debugsource-14-150500.6.1 * kernel-livepatch-5_14_21-150500_11-rt-debuginfo-14-150500.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_11-rt-14-150500.6.1 * kernel-livepatch-SLE15-SP5-RT_Update_0-debugsource-14-150500.6.1 * kernel-livepatch-5_14_21-150500_11-rt-debuginfo-14-150500.6.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48687.html * https://www.suse.com/security/cve/CVE-2023-52628.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1222118 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1224043 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 16:30:29 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 16:30:29 -0000 Subject: SUSE-SU-2024:2102-1: moderate: Security update for opencc Message-ID: <171881462979.12930.11554785939408170959@smelt2.prg2.suse.org> # Security update for opencc Announcement ID: SUSE-SU-2024:2102-1 Rating: moderate References: * bsc#1108310 Cross-References: * CVE-2018-16982 CVSS scores: * CVE-2018-16982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-16982 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-16982 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Desktop Applications Module 15-SP5 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for opencc fixes the following issues: * CVE-2018-16982: Check offset bounds in BinaryDict::NewFromFile method. (bsc#1108310) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2102=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2102=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2102=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * opencc-data-1.0.5-150000.5.3.1 * opencc-debuginfo-1.0.5-150000.5.3.1 * opencc-devel-1.0.5-150000.5.3.1 * libopencc2-1.0.5-150000.5.3.1 * libopencc2-debuginfo-1.0.5-150000.5.3.1 * opencc-1.0.5-150000.5.3.1 * opencc-debugsource-1.0.5-150000.5.3.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * opencc-data-1.0.5-150000.5.3.1 * opencc-debuginfo-1.0.5-150000.5.3.1 * opencc-devel-1.0.5-150000.5.3.1 * libopencc2-1.0.5-150000.5.3.1 * libopencc2-debuginfo-1.0.5-150000.5.3.1 * opencc-1.0.5-150000.5.3.1 * opencc-debugsource-1.0.5-150000.5.3.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libopencc2-1.0.5-150000.5.3.1 * opencc-debugsource-1.0.5-150000.5.3.1 * libopencc2-debuginfo-1.0.5-150000.5.3.1 * opencc-debuginfo-1.0.5-150000.5.3.1 ## References: * https://www.suse.com/security/cve/CVE-2018-16982.html * https://bugzilla.suse.com/show_bug.cgi?id=1108310 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 19 16:30:31 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 19 Jun 2024 16:30:31 -0000 Subject: SUSE-OU-2024:2093-1: low: Optional update for galera-4 Message-ID: <171881463134.12930.262047772481862133@smelt2.prg2.suse.org> # Optional update for galera-4 Announcement ID: SUSE-OU-2024:2093-1 Rating: low References: Affected Products: * Galera for Ericsson 15 SP4 * Galera for Ericsson 15 SP5 * Galera for Ericsson 15 SP6 An update that can now be installed. ## Description: This update for galera-4 fixes the following issue: * Rebuild and also add to SLES_15-SP6-ERICSSON, no source changes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Galera for Ericsson 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-ERICSSON-2024-2093=1 * Galera for Ericsson 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-ERICSSON-2024-2093=1 * Galera for Ericsson 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-ERICSSON-2024-2093=1 ## Package List: * Galera for Ericsson 15 SP5 (x86_64) * galera-4-wsrep-provider-26.4.14-150300.1.17.1 * galera-4-debuginfo-26.4.14-150300.1.17.1 * galera-4-debugsource-26.4.14-150300.1.17.1 * galera-4-wsrep-provider-debuginfo-26.4.14-150300.1.17.1 * galera-4-26.4.14-150300.1.17.1 * Galera for Ericsson 15 SP6 (x86_64) * galera-4-wsrep-provider-26.4.14-150300.1.17.1 * galera-4-debuginfo-26.4.14-150300.1.17.1 * galera-4-debugsource-26.4.14-150300.1.17.1 * galera-4-wsrep-provider-debuginfo-26.4.14-150300.1.17.1 * galera-4-26.4.14-150300.1.17.1 * Galera for Ericsson 15 SP4 (x86_64) * galera-4-wsrep-provider-26.4.14-150300.1.17.1 * galera-4-debuginfo-26.4.14-150300.1.17.1 * galera-4-debugsource-26.4.14-150300.1.17.1 * galera-4-wsrep-provider-debuginfo-26.4.14-150300.1.17.1 * galera-4-26.4.14-150300.1.17.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 20 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 20 Jun 2024 12:30:02 -0000 Subject: SUSE-SU-2024:2105-1: important: Security update for hdf5 Message-ID: <171888660271.15892.10623059386920708558@smelt2.prg2.suse.org> # Security update for hdf5 Announcement ID: SUSE-SU-2024:2105-1 Rating: important References: * bsc#1133222 * bsc#1224158 Cross-References: * CVE-2017-17507 * CVE-2018-11205 * CVE-2024-29158 * CVE-2024-29161 * CVE-2024-29166 * CVE-2024-32608 * CVE-2024-32610 * CVE-2024-32614 * CVE-2024-32619 * CVE-2024-32620 * CVE-2024-33873 * CVE-2024-33874 * CVE-2024-33875 CVSS scores: * CVE-2017-17507 ( SUSE ): 4.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L * CVE-2017-17507 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2018-11205 ( SUSE ): 5.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2018-11205 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H * CVE-2024-29158 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-29161 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-29166 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-32608 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-32610 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-32614 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-32619 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-32620 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-33873 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-33874 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-33875 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H Affected Products: * HPC Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 13 vulnerabilities can now be installed. ## Description: This update for hdf5 fixes the following issues: * Fix various security issues in hdf5 (bsc#1224158): CVE-2024-29158, CVE-2024-29161, CVE-2024-29166, CVE-2024-32608, CVE-2024-32610, CVE-2024-32614, CVE-2024-32619, CVE-2024-32620, CVE-2024-33873, CVE-2024-33874, CVE-2024-33875 * Additionally, these fixes resolve crashes triggered by the reproducers for CVE-2017-17507, CVE-2018-11205. These crashes appear to be unrelated to the original problems. * set higher constraints for succesful mpich tests (bsc#1133222) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * HPC Module 12 zypper in -t patch SUSE-SLE-Module-HPC-12-2024-2105=1 ## Package List: * HPC Module 12 (noarch) * hdf5-gnu-mvapich2-hpc-devel-1.10.11-3.24.1 * hdf5-gnu-openmpi1-hpc-devel-1.10.11-3.24.1 * hdf5-gnu-hpc-devel-1.10.11-3.24.1 * HPC Module 12 (aarch64 x86_64) * hdf5_1_10_11-gnu-openmpi1-hpc-debuginfo-1.10.11-3.24.1 * libhdf5_1_10_11-gnu-openmpi1-hpc-1.10.11-3.24.1 * hdf5_1_10_11-gnu-hpc-1.10.11-3.24.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-3.24.1 * libhdf5_hl_fortran-gnu-openmpi1-hpc-1.10.11-3.24.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-3.24.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-3.24.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-3.24.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-3.24.1 * hdf5_1_10_11-gnu-openmpi1-hpc-devel-1.10.11-3.24.1 * libhdf5_cpp_1_10_11-gnu-openmpi1-hpc-1.10.11-3.24.1 * libhdf5_cpp-gnu-hpc-1.10.11-3.24.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-3.24.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-3.24.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-3.24.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi1-hpc-debuginfo-1.10.11-3.24.1 * libhdf5_fortran_1_10_11-gnu-openmpi1-hpc-debuginfo-1.10.11-3.24.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-3.24.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-3.24.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-3.24.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-3.24.1 * libhdf5_hl-gnu-hpc-1.10.11-3.24.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-3.24.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-3.24.1 * libhdf5_hl_1_10_11-gnu-openmpi1-hpc-debuginfo-1.10.11-3.24.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi1-hpc-1.10.11-3.24.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-3.24.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-3.24.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-3.24.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-3.24.1 * libhdf5_hl_1_10_11-gnu-openmpi1-hpc-1.10.11-3.24.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-3.24.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-3.24.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-3.24.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-3.24.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-3.24.1 * libhdf5_fortran_1_10_11-gnu-openmpi1-hpc-1.10.11-3.24.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-3.24.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-3.24.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-3.24.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-3.24.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-3.24.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-3.24.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-3.24.1 * libhdf5_hl-gnu-openmpi1-hpc-1.10.11-3.24.1 * libhdf5_fortran-gnu-hpc-1.10.11-3.24.1 * libhdf5_fortran-gnu-openmpi1-hpc-1.10.11-3.24.1 * hdf5_1_10_11-gnu-openmpi1-hpc-module-1.10.11-3.24.1 * hdf5_1_10_11-gnu-openmpi1-hpc-1.10.11-3.24.1 * hdf5_1_10_11-gnu-openmpi1-hpc-debugsource-1.10.11-3.24.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-3.24.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-3.24.1 * libhdf5-gnu-openmpi1-hpc-1.10.11-3.24.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-3.24.1 * libhdf5_1_10_11-gnu-openmpi1-hpc-debuginfo-1.10.11-3.24.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-3.24.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-3.24.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi1-hpc-1.10.11-3.24.1 * hdf5_1_10_11-gnu-openmpi1-hpc-devel-static-1.10.11-3.24.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-3.24.1 * libhdf5-gnu-hpc-1.10.11-3.24.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-3.24.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-3.24.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-3.24.1 ## References: * https://www.suse.com/security/cve/CVE-2017-17507.html * https://www.suse.com/security/cve/CVE-2018-11205.html * https://www.suse.com/security/cve/CVE-2024-29158.html * https://www.suse.com/security/cve/CVE-2024-29161.html * https://www.suse.com/security/cve/CVE-2024-29166.html * https://www.suse.com/security/cve/CVE-2024-32608.html * https://www.suse.com/security/cve/CVE-2024-32610.html * https://www.suse.com/security/cve/CVE-2024-32614.html * https://www.suse.com/security/cve/CVE-2024-32619.html * https://www.suse.com/security/cve/CVE-2024-32620.html * https://www.suse.com/security/cve/CVE-2024-33873.html * https://www.suse.com/security/cve/CVE-2024-33874.html * https://www.suse.com/security/cve/CVE-2024-33875.html * https://bugzilla.suse.com/show_bug.cgi?id=1133222 * https://bugzilla.suse.com/show_bug.cgi?id=1224158 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 20 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 20 Jun 2024 12:30:03 -0000 Subject: SUSE-RU-2024:2104-1: moderate: Recommended update for google-cloud SDK Message-ID: <171888660398.15892.14817010288115410645@smelt2.prg2.suse.org> # Recommended update for google-cloud SDK Announcement ID: SUSE-RU-2024:2104-1 Rating: moderate References: Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that can now be installed. ## Description: This update for protobuf and python-grpcio fixes the following issue: * Add python311 binaries to Python Module. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2104=1 openSUSE-SLE-15.6-2024-2104=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2104=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2104=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2104=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2104=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-2104=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libprotobuf-lite25_1_0-debuginfo-25.1-150600.16.4.2 * libprotobuf-lite25_1_0-25.1-150600.16.4.2 * protobuf-debugsource-25.1-150600.16.4.2 * protobuf-java-25.1-150600.16.4.2 * libprotobuf25_1_0-debuginfo-25.1-150600.16.4.2 * libprotoc25_1_0-25.1-150600.16.4.2 * python311-grpcio-1.60.1-150600.16.5.1 * python311-protobuf-4.25.1-150600.16.4.2 * python311-grpcio-debuginfo-1.60.1-150600.16.5.1 * protobuf-devel-debuginfo-25.1-150600.16.4.2 * protobuf-devel-25.1-150600.16.4.2 * python-grpcio-debugsource-1.60.1-150600.16.5.1 * libprotobuf25_1_0-25.1-150600.16.4.2 * libprotoc25_1_0-debuginfo-25.1-150600.16.4.2 * openSUSE Leap 15.6 (x86_64) * libprotobuf25_1_0-32bit-debuginfo-25.1-150600.16.4.2 * libprotobuf25_1_0-32bit-25.1-150600.16.4.2 * libprotoc25_1_0-32bit-debuginfo-25.1-150600.16.4.2 * libprotoc25_1_0-32bit-25.1-150600.16.4.2 * libprotobuf-lite25_1_0-32bit-debuginfo-25.1-150600.16.4.2 * libprotobuf-lite25_1_0-32bit-25.1-150600.16.4.2 * openSUSE Leap 15.6 (aarch64_ilp32) * libprotobuf-lite25_1_0-64bit-25.1-150600.16.4.2 * libprotoc25_1_0-64bit-25.1-150600.16.4.2 * libprotoc25_1_0-64bit-debuginfo-25.1-150600.16.4.2 * libprotobuf-lite25_1_0-64bit-debuginfo-25.1-150600.16.4.2 * libprotobuf25_1_0-64bit-25.1-150600.16.4.2 * libprotobuf25_1_0-64bit-debuginfo-25.1-150600.16.4.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libprotobuf-lite25_1_0-debuginfo-25.1-150600.16.4.2 * libprotobuf-lite25_1_0-25.1-150600.16.4.2 * protobuf-debugsource-25.1-150600.16.4.2 * libprotobuf25_1_0-debuginfo-25.1-150600.16.4.2 * libprotoc25_1_0-25.1-150600.16.4.2 * libprotobuf25_1_0-25.1-150600.16.4.2 * libprotoc25_1_0-debuginfo-25.1-150600.16.4.2 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * protobuf-devel-25.1-150600.16.4.2 * protobuf-devel-debuginfo-25.1-150600.16.4.2 * protobuf-debugsource-25.1-150600.16.4.2 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * protobuf-debugsource-25.1-150600.16.4.2 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python311-grpcio-1.60.1-150600.16.5.1 * python311-grpcio-debuginfo-1.60.1-150600.16.5.1 * python-grpcio-debugsource-1.60.1-150600.16.5.1 * Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python311-protobuf-4.25.1-150600.16.4.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 20 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 20 Jun 2024 16:30:02 -0000 Subject: SUSE-SU-2024:2107-1: important: Security update for php-composer2 Message-ID: <171890100215.21028.3608854403087678637@smelt2.prg2.suse.org> # Security update for php-composer2 Announcement ID: SUSE-SU-2024:2107-1 Rating: important References: * bsc#1226181 * bsc#1226182 Cross-References: * CVE-2024-35241 * CVE-2024-35242 CVSS scores: * CVE-2024-35241 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-35242 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * Web and Scripting Module 15-SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for php-composer2 fixes the following issues: * CVE-2024-35241: Fixed code execution when installing packages in repository with specially crafted branch names (bsc#1226181). * CVE-2024-35242: Fixed command injection via specially crafted branch names during repository cloning (bsc#1226182). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2107=1 openSUSE-SLE-15.6-2024-2107=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2024-2107=1 ## Package List: * openSUSE Leap 15.6 (noarch) * php-composer2-2.6.4-150600.3.3.1 * Web and Scripting Module 15-SP6 (noarch) * php-composer2-2.6.4-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35241.html * https://www.suse.com/security/cve/CVE-2024-35242.html * https://bugzilla.suse.com/show_bug.cgi?id=1226181 * https://bugzilla.suse.com/show_bug.cgi?id=1226182 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 20 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 20 Jun 2024 16:30:03 -0000 Subject: SUSE-SU-2024:2106-1: important: Security update for php-composer2 Message-ID: <171890100397.21028.7131935575306978542@smelt2.prg2.suse.org> # Security update for php-composer2 Announcement ID: SUSE-SU-2024:2106-1 Rating: important References: * bsc#1226181 * bsc#1226182 Cross-References: * CVE-2024-35241 * CVE-2024-35242 CVSS scores: * CVE-2024-35241 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-35242 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for php-composer2 fixes the following issues: * CVE-2024-35241: Fixed code execution when installing packages in repository with specially crafted branch names (bsc#1226181). * CVE-2024-35242: Fixed command injection via specially crafted branch names during repository cloning (bsc#1226182). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2106=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2106=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-2106=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2106=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2106=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2106=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2106=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2106=1 ## Package List: * openSUSE Leap 15.4 (noarch) * php-composer2-2.2.3-150400.3.12.1 * openSUSE Leap 15.5 (noarch) * php-composer2-2.2.3-150400.3.12.1 * Web and Scripting Module 15-SP5 (noarch) * php-composer2-2.2.3-150400.3.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * php-composer2-2.2.3-150400.3.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * php-composer2-2.2.3-150400.3.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * php-composer2-2.2.3-150400.3.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * php-composer2-2.2.3-150400.3.12.1 * SUSE Manager Server 4.3 (noarch) * php-composer2-2.2.3-150400.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35241.html * https://www.suse.com/security/cve/CVE-2024-35242.html * https://bugzilla.suse.com/show_bug.cgi?id=1226181 * https://bugzilla.suse.com/show_bug.cgi?id=1226182 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 20 20:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 20 Jun 2024 20:30:05 -0000 Subject: SUSE-RU-2024:1637-2: moderate: Recommended update for google-cloud SDK Message-ID: <171891540543.14821.3538952883911183135@smelt2.prg2.suse.org> # Recommended update for google-cloud SDK Announcement ID: SUSE-RU-2024:1637-2 Rating: moderate References: * bsc#1210617 * jsc#PED-6697 * jsc#PED-7987 Cross-References: * CVE-2023-30608 CVSS scores: * CVE-2023-30608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-30608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and contains two features can now be installed. ## Description: This update for google-cloud SDK fixes the following issues: * Add python311 cloud services packages and dependencies (jsc#PED-7987, jsc#PED-6697) * Bellow 5 binaries Obsolete the python3.6 counterpart: python311-google- resumable-media python311-google-api-core python311-google-cloud-storage python311-google-cloud-core python311-googleapis-common-protos * Regular python311 updates (without Obsoletes): python-google-auth python- grpcio python-sqlparse * New python311 packages: libcrc32c python-google-cloud-appengine-logging python-google-cloud-artifact-registry python-google-cloud-audit-log python- google-cloud-build python-google-cloud-compute python-google-cloud-dns python-google-cloud-domains python-google-cloud-iam python-google-cloud-kms- inventory python-google-cloud-kms python-google-cloud-logging python-google- cloud-run python-google-cloud-secret-manager python-google-cloud-service- directory python-google-cloud-spanner python-google-cloud-vpc-access python- google-crc32c python-grpc-google-iam-v1 python-grpcio-status python-proto- plus In python-sqlparse this security issue was fixed: CVE-2023-30608: Fixed parser that contained a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) (bsc#1210617) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1637=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-1637=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-1637=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python-google-crc32c-debugsource-1.5.0-150400.9.3.1 * python-cffi-debugsource-1.15.1-150400.8.7.2 * libcrc32c-debugsource-1.1.2-150400.9.3.1 * python311-cffi-1.15.1-150400.8.7.2 * python311-google-crc32c-debuginfo-1.5.0-150400.9.3.1 * libcrc32c1-debuginfo-1.1.2-150400.9.3.1 * python311-cffi-debuginfo-1.15.1-150400.8.7.2 * libcrc32c1-1.1.2-150400.9.3.1 * libcrc32c-devel-1.1.2-150400.9.3.1 * python311-google-crc32c-1.5.0-150400.9.3.1 * openSUSE Leap 15.6 (noarch) * python311-google-cloud-spanner-3.40.1-150400.9.3.1 * python311-google-cloud-kms-2.21.0-150400.9.3.1 * python311-google-cloud-audit-log-0.2.5-150400.9.3.1 * python311-apipkg-3.0.1-150400.12.6.1 * python311-google-cloud-logging-3.9.0-150400.9.3.1 * python311-google-cloud-service-directory-1.11.1-150400.9.3.1 * python311-google-cloud-storage-2.14.0-150400.10.3.1 * python311-charset-normalizer-3.1.0-150400.9.7.2 * python311-google-cloud-compute-1.15.0-150400.9.3.1 * python311-google-cloud-kms-inventory-0.2.2-150400.9.3.1 * python311-certifi-2023.7.22-150400.12.6.2 * python311-sqlparse-0.4.4-150400.6.4.2 * python311-google-cloud-vpc-access-1.10.0-150400.9.3.1 * python311-urllib3-2.0.7-150400.7.14.1 * python311-grpcio-status-1.60.1-150400.9.3.1 * python311-grpc-google-iam-v1-0.13.0-150400.9.3.1 * python311-google-cloud-run-0.10.1-150400.9.3.1 * python311-google-auth-2.27.0-150400.6.7.1 * python311-idna-3.4-150400.11.6.1 * python311-setuptools-67.7.2-150400.3.12.1 * python311-pyasn1-modules-0.3.0-150400.12.7.1 * python311-google-cloud-appengine-logging-1.4.0-150400.9.3.1 * python311-rsa-4.9-150400.12.7.1 * python311-requests-2.31.0-150400.6.8.1 * python311-pycparser-2.21-150400.12.7.2 * python311-iniconfig-2.0.0-150400.10.6.1 * python311-pytz-2023.3-150400.6.6.1 * python311-googleapis-common-protos-1.62.0-150400.10.4.1 * python311-setuptools-wheel-67.7.2-150400.3.12.1 * python311-google-cloud-iam-2.13.0-150400.9.3.1 * python311-proto-plus-1.23.0-150400.9.3.1 * python311-cachetools-5.3.1-150400.8.6.1 * python311-google-cloud-dns-0.35.0-150400.9.3.1 * python311-google-cloud-secret-manager-2.17.0-150400.9.3.1 * python311-google-resumable-media-2.7.0-150400.10.4.1 * python311-google-cloud-domains-1.7.1-150400.9.3.1 * python311-pyasn1-0.5.0-150400.12.7.2 * python311-google-cloud-build-3.22.0-150400.9.3.1 * python311-py-1.11.0-150400.12.7.2 * python311-google-cloud-core-2.4.1-150400.5.4.1 * python311-google-api-core-2.15.0-150400.5.4.1 * python311-google-cloud-artifact-registry-1.11.0-150400.9.3.1 * python311-pyOpenSSL-23.2.0-150400.3.10.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python-google-crc32c-debugsource-1.5.0-150400.9.3.1 * libcrc32c-debugsource-1.1.2-150400.9.3.1 * python311-google-crc32c-debuginfo-1.5.0-150400.9.3.1 * libcrc32c1-debuginfo-1.1.2-150400.9.3.1 * libcrc32c1-1.1.2-150400.9.3.1 * libcrc32c-devel-1.1.2-150400.9.3.1 * python311-google-crc32c-1.5.0-150400.9.3.1 * Public Cloud Module 15-SP6 (noarch) * python311-google-cloud-spanner-3.40.1-150400.9.3.1 * python311-google-cloud-kms-2.21.0-150400.9.3.1 * python311-google-cloud-audit-log-0.2.5-150400.9.3.1 * python311-google-cloud-logging-3.9.0-150400.9.3.1 * python311-google-cloud-service-directory-1.11.1-150400.9.3.1 * python311-google-cloud-storage-2.14.0-150400.10.3.1 * python311-google-cloud-compute-1.15.0-150400.9.3.1 * python311-google-cloud-kms-inventory-0.2.2-150400.9.3.1 * python311-sqlparse-0.4.4-150400.6.4.2 * python311-google-cloud-vpc-access-1.10.0-150400.9.3.1 * python311-grpcio-status-1.60.1-150400.9.3.1 * python311-grpc-google-iam-v1-0.13.0-150400.9.3.1 * python311-google-cloud-run-0.10.1-150400.9.3.1 * python311-google-auth-2.27.0-150400.6.7.1 * python311-google-cloud-appengine-logging-1.4.0-150400.9.3.1 * python311-googleapis-common-protos-1.62.0-150400.10.4.1 * python311-google-cloud-iam-2.13.0-150400.9.3.1 * python311-proto-plus-1.23.0-150400.9.3.1 * python311-google-cloud-dns-0.35.0-150400.9.3.1 * python311-google-cloud-secret-manager-2.17.0-150400.9.3.1 * python311-google-resumable-media-2.7.0-150400.10.4.1 * python311-google-cloud-domains-1.7.1-150400.9.3.1 * python311-google-cloud-build-3.22.0-150400.9.3.1 * python311-google-cloud-core-2.4.1-150400.5.4.1 * python311-google-api-core-2.15.0-150400.5.4.1 * python311-google-cloud-artifact-registry-1.11.0-150400.9.3.1 * Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python311-cffi-1.15.1-150400.8.7.2 * python311-cffi-debuginfo-1.15.1-150400.8.7.2 * python-cffi-debugsource-1.15.1-150400.8.7.2 * Python 3 Module 15-SP6 (noarch) * python311-rsa-4.9-150400.12.7.1 * python311-requests-2.31.0-150400.6.8.1 * python311-pycparser-2.21-150400.12.7.2 * python311-iniconfig-2.0.0-150400.10.6.1 * python311-pyasn1-0.5.0-150400.12.7.2 * python311-setuptools-67.7.2-150400.3.12.1 * python311-py-1.11.0-150400.12.7.2 * python311-pytz-2023.3-150400.6.6.1 * python311-idna-3.4-150400.11.6.1 * python311-urllib3-2.0.7-150400.7.14.1 * python311-apipkg-3.0.1-150400.12.6.1 * python311-google-auth-2.27.0-150400.6.7.1 * python311-charset-normalizer-3.1.0-150400.9.7.2 * python311-cachetools-5.3.1-150400.8.6.1 * python311-pyOpenSSL-23.2.0-150400.3.10.1 * python311-certifi-2023.7.22-150400.12.6.2 * python311-pyasn1-modules-0.3.0-150400.12.7.1 ## References: * https://www.suse.com/security/cve/CVE-2023-30608.html * https://bugzilla.suse.com/show_bug.cgi?id=1210617 * https://jira.suse.com/browse/PED-6697 * https://jira.suse.com/browse/PED-7987 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 20 20:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 20 Jun 2024 20:30:08 -0000 Subject: SUSE-SU-2024:2108-1: important: Security update for containerd Message-ID: <171891540851.14821.1764266743205838832@smelt2.prg2.suse.org> # Security update for containerd Announcement ID: SUSE-SU-2024:2108-1 Rating: important References: * bsc#1221400 * bsc#1224323 Cross-References: * CVE-2023-45288 CVSS scores: * CVE-2023-45288 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Containers Module 15-SP5 * Containers Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for containerd fixes the following issues: Update to containerd v1.7.17. * CVE-2023-45288: Fixed the limit of CONTINUATION frames read for an HTTP/2 request (bsc#1221400). * Fixed /sys/devices/virtual/powercap accessibility by default containers to mitigate power-based side channel attacks (bsc#1224323). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2108=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2108=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2108=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2108=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2108=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2108=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2108=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2108=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2108=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-2108=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-2108=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2108=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2108=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2108=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2108=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2108=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2108=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2108=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2108=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2108=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2108=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2108=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2108=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2108=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2108=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * containerd-1.7.17-150000.111.3 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * containerd-1.7.17-150000.111.3 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * openSUSE Leap 15.5 (noarch) * containerd-devel-1.7.17-150000.111.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * openSUSE Leap 15.6 (noarch) * containerd-devel-1.7.17-150000.111.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * containerd-1.7.17-150000.111.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * containerd-1.7.17-150000.111.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * containerd-1.7.17-150000.111.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * containerd-1.7.17-150000.111.3 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * containerd-1.7.17-150000.111.3 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * Containers Module 15-SP5 (noarch) * containerd-devel-1.7.17-150000.111.3 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * Containers Module 15-SP6 (noarch) * containerd-devel-1.7.17-150000.111.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * containerd-devel-1.7.17-150000.111.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * containerd-devel-1.7.17-150000.111.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * containerd-devel-1.7.17-150000.111.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * containerd-devel-1.7.17-150000.111.3 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * containerd-1.7.17-150000.111.3 * containerd-ctr-1.7.17-150000.111.3 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * containerd-1.7.17-150000.111.3 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * containerd-1.7.17-150000.111.3 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * containerd-1.7.17-150000.111.3 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://bugzilla.suse.com/show_bug.cgi?id=1221400 * https://bugzilla.suse.com/show_bug.cgi?id=1224323 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 08:30:02 -0000 Subject: SUSE-SU-2024:2109-1: important: Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP2) Message-ID: <171895860215.14047.12956432808736634424@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:2109-1 Rating: important References: * bsc#1220537 * bsc#1222118 * bsc#1223059 Cross-References: * CVE-2021-46955 * CVE-2023-52628 * CVE-2024-26852 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_163 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222118). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-2110=1 SUSE-SLE- Module-Live-Patching-15-SP2-2024-2111=1 SUSE-SLE-Module-Live- Patching-15-SP2-2024-2112=1 SUSE-SLE-Module-Live-Patching-15-SP2-2024-2109=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP2_Update_40-debugsource-10-150200.2.2 * kernel-livepatch-5_3_18-150200_24_154-default-debuginfo-13-150200.2.2 * kernel-livepatch-SLE15-SP2_Update_37-debugsource-13-150200.2.2 * kernel-livepatch-5_3_18-150200_24_163-default-10-150200.2.2 * kernel-livepatch-5_3_18-150200_24_163-default-debuginfo-10-150200.2.2 * kernel-livepatch-SLE15-SP2_Update_38-debugsource-12-150200.2.2 * kernel-livepatch-5_3_18-150200_24_160-default-11-150200.2.2 * kernel-livepatch-5_3_18-150200_24_157-default-12-150200.2.2 * kernel-livepatch-5_3_18-150200_24_157-default-debuginfo-12-150200.2.2 * kernel-livepatch-5_3_18-150200_24_154-default-13-150200.2.2 * kernel-livepatch-5_3_18-150200_24_160-default-debuginfo-11-150200.2.2 * kernel-livepatch-SLE15-SP2_Update_39-debugsource-11-150200.2.2 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2023-52628.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1222118 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:30:02 -0000 Subject: SUSE-SU-2024:2139-1: important: Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) Message-ID: <171897300280.32296.9524053092348955803@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:2139-1 Rating: important References: * bsc#1210619 * bsc#1220537 * bsc#1221302 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2021-46955 * CVE-2022-48651 * CVE-2023-1829 * CVE-2024-26610 * CVE-2024-26852 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_158 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2139=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2139=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_158-default-3-150300.7.6.2 * kernel-livepatch-SLE15-SP3_Update_43-debugsource-3-150300.7.6.2 * kernel-livepatch-5_3_18-150300_59_158-default-debuginfo-3-150300.7.6.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_158-preempt-debuginfo-3-150300.7.6.2 * kernel-livepatch-5_3_18-150300_59_158-preempt-3-150300.7.6.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_158-default-3-150300.7.6.2 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:30:05 -0000 Subject: SUSE-SU-2024:2130-1: important: Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) Message-ID: <171897300544.32296.882413568731267923@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:2130-1 Rating: important References: * bsc#1210619 * bsc#1220537 * bsc#1222685 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2021-46955 * CVE-2022-48651 * CVE-2023-1829 * CVE-2023-6546 * CVE-2024-26852 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_201 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-2130=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_201-default-4-8.10.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:30:08 -0000 Subject: SUSE-SU-2024:2124-1: important: Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP3) Message-ID: <171897300821.32296.11628136361687280005@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:2124-1 Rating: important References: * bsc#1220537 * bsc#1222118 * bsc#1223059 Cross-References: * CVE-2021-46955 * CVE-2023-52628 * CVE-2024-26852 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_133 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222118). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-2124=1 SUSE-SLE-Live- Patching-12-SP5-2024-2136=1 SUSE-SLE-Live-Patching-12-SP5-2024-2125=1 SUSE-SLE- Live-Patching-12-SP5-2024-2126=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2132=1 SUSE-2024-2133=1 SUSE-2024-2134=1 SUSE-2024-2131=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2131=1 SUSE-SLE- Module-Live-Patching-15-SP3-2024-2132=1 SUSE-SLE-Module-Live- Patching-15-SP3-2024-2133=1 SUSE-SLE-Module-Live-Patching-15-SP3-2024-2134=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_162-default-14-2.1 * kgraft-patch-4_12_14-122_173-default-11-2.1 * kgraft-patch-4_12_14-122_176-default-10-2.1 * kgraft-patch-4_12_14-122_165-default-13-2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_127-default-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_124-default-debuginfo-13-150300.2.2 * kernel-livepatch-5_3_18-150300_59_130-default-debuginfo-11-150300.2.2 * kernel-livepatch-5_3_18-150300_59_127-default-debuginfo-12-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_36-debugsource-10-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_33-debugsource-13-150300.2.2 * kernel-livepatch-5_3_18-150300_59_130-default-11-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_35-debugsource-11-150300.2.2 * kernel-livepatch-5_3_18-150300_59_124-default-13-150300.2.2 * kernel-livepatch-5_3_18-150300_59_133-default-debuginfo-10-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_34-debugsource-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_133-default-10-150300.2.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_133-preempt-debuginfo-10-150300.2.2 * kernel-livepatch-5_3_18-150300_59_130-preempt-11-150300.2.2 * kernel-livepatch-5_3_18-150300_59_127-preempt-debuginfo-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_124-preempt-13-150300.2.2 * kernel-livepatch-5_3_18-150300_59_133-preempt-10-150300.2.2 * kernel-livepatch-5_3_18-150300_59_124-preempt-debuginfo-13-150300.2.2 * kernel-livepatch-5_3_18-150300_59_127-preempt-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_130-preempt-debuginfo-11-150300.2.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_130-default-11-150300.2.2 * kernel-livepatch-5_3_18-150300_59_133-default-10-150300.2.2 * kernel-livepatch-5_3_18-150300_59_127-default-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_124-default-13-150300.2.2 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2023-52628.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1222118 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:30:15 -0000 Subject: SUSE-SU-2024:2121-1: important: Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) Message-ID: <171897301586.32296.15610856443707298504@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:2121-1 Rating: important References: * bsc#1210619 * bsc#1220537 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2021-46955 * CVE-2022-48651 * CVE-2023-1829 * CVE-2024-26852 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_188 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-2121=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP2_Update_47-debugsource-3-150200.5.6.2 * kernel-livepatch-5_3_18-150200_24_188-default-3-150200.5.6.2 * kernel-livepatch-5_3_18-150200_24_188-default-debuginfo-3-150200.5.6.2 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:30:18 -0000 Subject: SUSE-SU-2024:2120-1: important: Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2) Message-ID: <171897301810.32296.1772242746928167995@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:2120-1 Rating: important References: * bsc#1210619 * bsc#1218487 * bsc#1220537 * bsc#1222685 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2021-46955 * CVE-2022-48651 * CVE-2023-1829 * CVE-2023-6531 * CVE-2023-6546 * CVE-2024-26852 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves six vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_183 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218487). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-2120=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_183-default-4-150200.5.6.2 * kernel-livepatch-5_3_18-150200_24_183-default-debuginfo-4-150200.5.6.2 * kernel-livepatch-SLE15-SP2_Update_46-debugsource-4-150200.5.6.2 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1218487 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:30:20 -0000 Subject: SUSE-SU-2024:2115-1: important: Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2) Message-ID: <171897302017.32296.16715055605601799317@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:2115-1 Rating: important References: * bsc#1218259 * bsc#1220537 * bsc#1223059 Cross-References: * CVE-2021-46955 * CVE-2023-6931 * CVE-2024-26852 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_172 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218259). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-2115=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_172-default-debuginfo-8-150200.2.2 * kernel-livepatch-5_3_18-150200_24_172-default-8-150200.2.2 * kernel-livepatch-SLE15-SP2_Update_43-debugsource-8-150200.2.2 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1218259 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:30:21 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:30:21 -0000 Subject: SUSE-SU-2024:2123-1: important: Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP2) Message-ID: <171897302193.32296.11146526039974896669@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:2123-1 Rating: important References: * bsc#1220537 * bsc#1223059 Cross-References: * CVE-2021-46955 * CVE-2024-26852 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_178 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-2123=1 SUSE-SLE-Live- Patching-12-SP5-2024-2127=1 SUSE-SLE-Live-Patching-12-SP5-2024-2128=1 SUSE-SLE- Live-Patching-12-SP5-2024-2129=1 * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-2113=1 SUSE-SLE- Module-Live-Patching-15-SP2-2024-2114=1 SUSE-SLE-Module-Live- Patching-15-SP2-2024-2116=1 SUSE-SLE-Module-Live-Patching-15-SP2-2024-2119=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_189-default-7-2.1 * kgraft-patch-4_12_14-122_194-default-5-2.1 * kgraft-patch-4_12_14-122_179-default-9-2.1 * kgraft-patch-4_12_14-122_183-default-9-2.1 * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_178-default-6-150200.2.2 * kernel-livepatch-SLE15-SP2_Update_42-debugsource-10-150200.2.2 * kernel-livepatch-5_3_18-150200_24_169-default-10-150200.2.2 * kernel-livepatch-5_3_18-150200_24_175-default-debuginfo-9-150200.2.2 * kernel-livepatch-5_3_18-150200_24_166-default-debuginfo-10-150200.2.2 * kernel-livepatch-5_3_18-150200_24_178-default-debuginfo-6-150200.2.2 * kernel-livepatch-SLE15-SP2_Update_44-debugsource-9-150200.2.2 * kernel-livepatch-5_3_18-150200_24_166-default-10-150200.2.2 * kernel-livepatch-SLE15-SP2_Update_41-debugsource-10-150200.2.2 * kernel-livepatch-SLE15-SP2_Update_45-debugsource-6-150200.2.2 * kernel-livepatch-5_3_18-150200_24_175-default-9-150200.2.2 * kernel-livepatch-5_3_18-150200_24_169-default-debuginfo-10-150200.2.2 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:30:24 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:30:24 -0000 Subject: SUSE-SU-2024:2140-1: moderate: Security update for rmt-server Message-ID: <171897302472.32296.1054448702421020587@smelt2.prg2.suse.org> # Security update for rmt-server Announcement ID: SUSE-SU-2024:2140-1 Rating: moderate References: * bsc#1203171 * bsc#1225997 * jsc#PED-7982 * jsc#PED-8018 Cross-References: * CVE-2024-28103 CVSS scores: * CVE-2024-28103 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-28103 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * Public Cloud Module 15-SP3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves one vulnerability, contains two features and has one security fix can now be installed. ## Description: This update for rmt-server fixes the following issues: * Update to version 2.17 * CVE-2024-28103: Fixed Permissions-Policy that was only served on responses with an HTML related Content-Type. (bsc#1225997) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2140=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2140=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2140=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2140=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2140=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2140=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * rmt-server-2.17-150300.3.37.1 * rmt-server-debugsource-2.17-150300.3.37.1 * rmt-server-pubcloud-2.17-150300.3.37.1 * rmt-server-debuginfo-2.17-150300.3.37.1 * rmt-server-config-2.17-150300.3.37.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * rmt-server-debugsource-2.17-150300.3.37.1 * rmt-server-pubcloud-2.17-150300.3.37.1 * rmt-server-debuginfo-2.17-150300.3.37.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * rmt-server-debuginfo-2.17-150300.3.37.1 * rmt-server-debugsource-2.17-150300.3.37.1 * rmt-server-2.17-150300.3.37.1 * rmt-server-config-2.17-150300.3.37.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.17-150300.3.37.1 * rmt-server-debugsource-2.17-150300.3.37.1 * rmt-server-2.17-150300.3.37.1 * rmt-server-config-2.17-150300.3.37.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * rmt-server-debuginfo-2.17-150300.3.37.1 * rmt-server-debugsource-2.17-150300.3.37.1 * rmt-server-2.17-150300.3.37.1 * rmt-server-config-2.17-150300.3.37.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * rmt-server-debuginfo-2.17-150300.3.37.1 * rmt-server-debugsource-2.17-150300.3.37.1 * rmt-server-2.17-150300.3.37.1 * rmt-server-config-2.17-150300.3.37.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28103.html * https://bugzilla.suse.com/show_bug.cgi?id=1203171 * https://bugzilla.suse.com/show_bug.cgi?id=1225997 * https://jira.suse.com/browse/PED-7982 * https://jira.suse.com/browse/PED-8018 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:30:30 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:30:30 -0000 Subject: SUSE-RU-2024:1638-2: moderate: Recommended update for aws-cli and python311 dependencies Message-ID: <171897303040.32296.8021684977639078681@smelt2.prg2.suse.org> # Recommended update for aws-cli and python311 dependencies Announcement ID: SUSE-RU-2024:1638-2 Rating: moderate References: * bsc#1118027 * bsc#1144357 * bsc#1162712 * bsc#1167148 * bsc#1171933 * bsc#1172579 * bsc#1172948 * bsc#1179890 * bsc#1189649 * bsc#1190538 * bsc#1192298 * bsc#1199722 * bsc#1209255 * bsc#1211830 * bsc#1217336 * bsc#1220168 * jsc#PED-3781 * jsc#PED-4514 * jsc#PED-7487 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains three features and has 16 fixes can now be installed. ## Description: This update for aws-cli and python311 dependencies fixes the following issues: * Upgrade aws-cli to v1.32 (jsc#PED-7487) * This upgrade for aws-cli also provides the needed python311 dependencies. * The bellow packages got obsoleted by the python311 counterpart: * python3-botocore (superseded by python311-botocore) * python3-s3transfer (superseded by python311-s3transfer) * python3-boto (superseded by python311-boto) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1638=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-1638=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-1638=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1638=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python311-jsonschema-format-nongpl-4.17.3-150400.14.6.1 * python311-botocore-1.34.31-150400.42.3.1 * python311-jmespath-1.0.1-150400.12.3.1 * python311-jsonschema-4.17.3-150400.14.6.1 * python311-packaging-23.1-150400.8.6.1 * python311-python-dateutil-2.8.2-150400.5.6.1 * python311-aws-sam-translator-1.87.0-150400.11.3.1 * python311-docopt-0.6.2-150400.11.3.1 * python311-ply-3.11-150400.12.6.1 * python311-colorama-0.4.6-150400.5.6.1 * aws-cli-1.32.31-150400.35.3.1 * python311-jsonschema-format-4.17.3-150400.14.6.1 * python311-six-1.16.0-150400.18.6.1 * python311-boto3-1.34.31-150400.28.3.1 * python311-s3transfer-0.10.0-150400.14.3.1 * python311-attrs-23.1.0-150400.8.6.1 * python311-ec2imgutils-10.0.3-150400.9.3.1 * python311-pydantic-1.10.8-150400.9.6.1 * python311-docutils-0.19-150400.11.6.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python311-PyNaCl-debuginfo-1.5.0-150400.12.6.2 * python311-PyNaCl-1.5.0-150400.12.6.2 * python311-pyrsistent-0.19.3-150400.10.6.1 * python-simplejson-debugsource-3.19.1-150400.6.6.1 * python311-simplejson-3.19.1-150400.6.6.1 * python-PyNaCl-debugsource-1.5.0-150400.12.6.2 * python-PyYAML-debugsource-6.0.1-150400.5.8.1 * python311-pyrsistent-debuginfo-0.19.3-150400.10.6.1 * python311-PyYAML-6.0.1-150400.5.8.1 * python311-bcrypt-debuginfo-4.0.1-150400.5.6.1 * python-pyrsistent-debugsource-0.19.3-150400.10.6.1 * python311-bcrypt-4.0.1-150400.5.6.1 * python311-PyYAML-debuginfo-6.0.1-150400.5.8.1 * python311-simplejson-debuginfo-3.19.1-150400.6.6.1 * Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python311-PyNaCl-debuginfo-1.5.0-150400.12.6.2 * python311-PyNaCl-1.5.0-150400.12.6.2 * python311-pyrsistent-0.19.3-150400.10.6.1 * python-simplejson-debugsource-3.19.1-150400.6.6.1 * python311-simplejson-3.19.1-150400.6.6.1 * python-PyNaCl-debugsource-1.5.0-150400.12.6.2 * python-PyYAML-debugsource-6.0.1-150400.5.8.1 * python311-pyrsistent-debuginfo-0.19.3-150400.10.6.1 * python311-PyYAML-6.0.1-150400.5.8.1 * python311-bcrypt-debuginfo-4.0.1-150400.5.6.1 * python-pyrsistent-debugsource-0.19.3-150400.10.6.1 * python311-bcrypt-4.0.1-150400.5.6.1 * python311-PyYAML-debuginfo-6.0.1-150400.5.8.1 * python311-simplejson-debuginfo-3.19.1-150400.6.6.1 * Python 3 Module 15-SP6 (noarch) * python311-jsonschema-format-nongpl-4.17.3-150400.14.6.1 * python311-python-dateutil-2.8.2-150400.5.6.1 * python311-jsonschema-4.17.3-150400.14.6.1 * python311-ply-3.11-150400.12.6.1 * python311-jsonschema-format-4.17.3-150400.14.6.1 * python311-colorama-0.4.6-150400.5.6.1 * python311-six-1.16.0-150400.18.6.1 * python311-attrs-23.1.0-150400.8.6.1 * python311-pydantic-1.10.8-150400.9.6.1 * python311-docutils-0.19-150400.11.6.1 * Public Cloud Module 15-SP6 (noarch) * python311-botocore-1.34.31-150400.42.3.1 * python311-jmespath-1.0.1-150400.12.3.1 * python311-aws-sam-translator-1.87.0-150400.11.3.1 * python311-docopt-0.6.2-150400.11.3.1 * aws-cli-1.32.31-150400.35.3.1 * python311-boto3-1.34.31-150400.28.3.1 * python311-s3transfer-0.10.0-150400.14.3.1 * python311-ec2imgutils-10.0.3-150400.9.3.1 * openSUSE Leap 15.6 (noarch) * python311-jsonschema-format-nongpl-4.17.3-150400.14.6.1 * python311-botocore-1.34.31-150400.42.3.1 * python311-jmespath-1.0.1-150400.12.3.1 * python311-jsonschema-4.17.3-150400.14.6.1 * python311-python-dateutil-2.8.2-150400.5.6.1 * python311-aws-sam-translator-1.87.0-150400.11.3.1 * python311-docopt-0.6.2-150400.11.3.1 * python311-ply-3.11-150400.12.6.1 * python311-colorama-0.4.6-150400.5.6.1 * aws-cli-1.32.31-150400.35.3.1 * python311-jsonschema-format-4.17.3-150400.14.6.1 * python311-six-1.16.0-150400.18.6.1 * python311-boto3-1.34.31-150400.28.3.1 * python311-s3transfer-0.10.0-150400.14.3.1 * python311-attrs-23.1.0-150400.8.6.1 * python311-ec2imgutils-10.0.3-150400.9.3.1 * python311-pydantic-1.10.8-150400.9.6.1 * python311-docutils-0.19-150400.11.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python311-PyNaCl-debuginfo-1.5.0-150400.12.6.2 * python311-PyNaCl-1.5.0-150400.12.6.2 * python311-pyrsistent-0.19.3-150400.10.6.1 * python-simplejson-debugsource-3.19.1-150400.6.6.1 * python311-simplejson-3.19.1-150400.6.6.1 * python-PyNaCl-debugsource-1.5.0-150400.12.6.2 * python-PyYAML-debugsource-6.0.1-150400.5.8.1 * python311-pyrsistent-debuginfo-0.19.3-150400.10.6.1 * python311-PyYAML-6.0.1-150400.5.8.1 * python311-bcrypt-debuginfo-4.0.1-150400.5.6.1 * python-pyrsistent-debugsource-0.19.3-150400.10.6.1 * python311-bcrypt-4.0.1-150400.5.6.1 * python311-PyYAML-debuginfo-6.0.1-150400.5.8.1 * python311-simplejson-debuginfo-3.19.1-150400.6.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1118027 * https://bugzilla.suse.com/show_bug.cgi?id=1144357 * https://bugzilla.suse.com/show_bug.cgi?id=1162712 * https://bugzilla.suse.com/show_bug.cgi?id=1167148 * https://bugzilla.suse.com/show_bug.cgi?id=1171933 * https://bugzilla.suse.com/show_bug.cgi?id=1172579 * https://bugzilla.suse.com/show_bug.cgi?id=1172948 * https://bugzilla.suse.com/show_bug.cgi?id=1179890 * https://bugzilla.suse.com/show_bug.cgi?id=1189649 * https://bugzilla.suse.com/show_bug.cgi?id=1190538 * https://bugzilla.suse.com/show_bug.cgi?id=1192298 * https://bugzilla.suse.com/show_bug.cgi?id=1199722 * https://bugzilla.suse.com/show_bug.cgi?id=1209255 * https://bugzilla.suse.com/show_bug.cgi?id=1211830 * https://bugzilla.suse.com/show_bug.cgi?id=1217336 * https://bugzilla.suse.com/show_bug.cgi?id=1220168 * https://jira.suse.com/browse/PED-3781 * https://jira.suse.com/browse/PED-4514 * https://jira.suse.com/browse/PED-7487 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:30:33 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:30:33 -0000 Subject: SUSE-SU-2024:2138-1: moderate: Security update for python-cryptography Message-ID: <171897303300.32296.18032992259705302631@smelt2.prg2.suse.org> # Security update for python-cryptography Announcement ID: SUSE-SU-2024:2138-1 Rating: moderate References: * bsc#1220210 Cross-References: * CVE-2024-26130 CVSS scores: * CVE-2024-26130 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for python-cryptography fixes the following issues: * CVE-2024-26130: Fix a NULL pointer dereference in pkcs12.serialize_key_and_certificates(). (bsc#1220210) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2138=1 openSUSE-SLE-15.6-2024-2138=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-2138=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python311-cryptography-41.0.3-150600.23.3.1 * Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python311-cryptography-41.0.3-150600.23.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26130.html * https://bugzilla.suse.com/show_bug.cgi?id=1220210 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:30:35 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:30:35 -0000 Subject: SUSE-SU-2024:2137-1: moderate: Security update for podofo Message-ID: <171897303535.32296.6636727351461841773@smelt2.prg2.suse.org> # Security update for podofo Announcement ID: SUSE-SU-2024:2137-1 Rating: moderate References: * bsc#1127514 * bsc#1127855 * bsc#1131544 Cross-References: * CVE-2018-20797 * CVE-2019-10723 * CVE-2019-9199 CVSS scores: * CVE-2018-20797 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2018-20797 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-10723 ( SUSE ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-10723 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-9199 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2019-9199 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for podofo fixes the following issues: * CVE-2019-9199: Fixed a NULL pointer dereference in podofoimpose (bsc#1127855) * CVE-2018-20797: Fixed an excessive memory allocation in PoDoFo:podofo_calloc (bsc#1127514) * CVE-2019-10723: Fixed a memory leak in PdfPagesTreeCache (bsc#1131544) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2137=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2137=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2137=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2137=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2137=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1 * libpodofo0_9_6-0.9.6-150300.3.9.1 * libpodofo-devel-0.9.6-150300.3.9.1 * podofo-0.9.6-150300.3.9.1 * podofo-debuginfo-0.9.6-150300.3.9.1 * podofo-debugsource-0.9.6-150300.3.9.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1 * libpodofo0_9_6-0.9.6-150300.3.9.1 * libpodofo-devel-0.9.6-150300.3.9.1 * podofo-0.9.6-150300.3.9.1 * podofo-debuginfo-0.9.6-150300.3.9.1 * podofo-debugsource-0.9.6-150300.3.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1 * libpodofo0_9_6-0.9.6-150300.3.9.1 * libpodofo-devel-0.9.6-150300.3.9.1 * podofo-0.9.6-150300.3.9.1 * podofo-debuginfo-0.9.6-150300.3.9.1 * podofo-debugsource-0.9.6-150300.3.9.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1 * libpodofo0_9_6-0.9.6-150300.3.9.1 * libpodofo-devel-0.9.6-150300.3.9.1 * podofo-0.9.6-150300.3.9.1 * podofo-debuginfo-0.9.6-150300.3.9.1 * podofo-debugsource-0.9.6-150300.3.9.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1 * libpodofo0_9_6-0.9.6-150300.3.9.1 * libpodofo-devel-0.9.6-150300.3.9.1 * podofo-0.9.6-150300.3.9.1 * podofo-debuginfo-0.9.6-150300.3.9.1 * podofo-debugsource-0.9.6-150300.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2018-20797.html * https://www.suse.com/security/cve/CVE-2019-10723.html * https://www.suse.com/security/cve/CVE-2019-9199.html * https://bugzilla.suse.com/show_bug.cgi?id=1127514 * https://bugzilla.suse.com/show_bug.cgi?id=1127855 * https://bugzilla.suse.com/show_bug.cgi?id=1131544 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:32:14 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:32:14 -0000 Subject: SUSE-SU-2024:2135-1: important: Security update for the Linux Kernel Message-ID: <171897313444.32296.9740583549483153429@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:2135-1 Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1181674 * bsc#1187716 * bsc#1193599 * bsc#1194869 * bsc#1207948 * bsc#1208593 * bsc#1209657 * bsc#1213573 * bsc#1214852 * bsc#1215199 * bsc#1216196 * bsc#1216358 * bsc#1216702 * bsc#1217169 * bsc#1217384 * bsc#1217408 * bsc#1217489 * bsc#1217750 * bsc#1217959 * bsc#1218205 * bsc#1218336 * bsc#1218447 * bsc#1218562 * bsc#1218779 * bsc#1218917 * bsc#1219104 * bsc#1219170 * bsc#1219596 * bsc#1219623 * bsc#1219834 * bsc#1220021 * bsc#1220045 * bsc#1220120 * bsc#1220148 * bsc#1220328 * bsc#1220342 * bsc#1220428 * bsc#1220430 * bsc#1220569 * bsc#1220587 * bsc#1220738 * bsc#1220783 * bsc#1220915 * bsc#1221044 * bsc#1221276 * bsc#1221293 * bsc#1221303 * bsc#1221375 * bsc#1221504 * bsc#1221612 * bsc#1221615 * bsc#1221635 * bsc#1221645 * bsc#1221649 * bsc#1221765 * bsc#1221777 * bsc#1221783 * bsc#1221816 * bsc#1221829 * bsc#1221830 * bsc#1221858 * bsc#1222115 * bsc#1222173 * bsc#1222264 * bsc#1222273 * bsc#1222294 * bsc#1222301 * bsc#1222303 * bsc#1222304 * bsc#1222307 * bsc#1222357 * bsc#1222366 * bsc#1222368 * bsc#1222371 * bsc#1222378 * bsc#1222379 * bsc#1222385 * bsc#1222422 * bsc#1222426 * bsc#1222428 * bsc#1222437 * bsc#1222445 * bsc#1222459 * bsc#1222464 * bsc#1222489 * bsc#1222522 * bsc#1222525 * bsc#1222527 * bsc#1222531 * bsc#1222532 * bsc#1222549 * bsc#1222550 * bsc#1222557 * bsc#1222559 * bsc#1222563 * bsc#1222585 * bsc#1222586 * bsc#1222596 * bsc#1222606 * bsc#1222608 * bsc#1222613 * bsc#1222615 * bsc#1222618 * bsc#1222622 * bsc#1222624 * bsc#1222627 * bsc#1222630 * bsc#1222635 * bsc#1222721 * bsc#1222727 * bsc#1222769 * bsc#1222771 * bsc#1222772 * bsc#1222775 * bsc#1222777 * bsc#1222780 * bsc#1222782 * bsc#1222793 * bsc#1222799 * bsc#1222801 * bsc#1222968 * bsc#1223007 * bsc#1223011 * bsc#1223015 * bsc#1223016 * bsc#1223020 * bsc#1223023 * bsc#1223024 * bsc#1223030 * bsc#1223033 * bsc#1223034 * bsc#1223035 * bsc#1223038 * bsc#1223039 * bsc#1223041 * bsc#1223045 * bsc#1223046 * bsc#1223051 * bsc#1223052 * bsc#1223058 * bsc#1223060 * bsc#1223061 * bsc#1223076 * bsc#1223077 * bsc#1223084 * bsc#1223111 * bsc#1223113 * bsc#1223138 * bsc#1223143 * bsc#1223187 * bsc#1223189 * bsc#1223190 * bsc#1223191 * bsc#1223198 * bsc#1223202 * bsc#1223285 * bsc#1223315 * bsc#1223338 * bsc#1223369 * bsc#1223380 * bsc#1223384 * bsc#1223390 * bsc#1223439 * bsc#1223462 * bsc#1223532 * bsc#1223539 * bsc#1223575 * bsc#1223590 * bsc#1223591 * bsc#1223592 * bsc#1223593 * bsc#1223625 * bsc#1223628 * bsc#1223629 * bsc#1223633 * bsc#1223634 * bsc#1223637 * bsc#1223641 * bsc#1223643 * bsc#1223649 * bsc#1223650 * bsc#1223651 * bsc#1223652 * bsc#1223653 * bsc#1223654 * bsc#1223655 * bsc#1223660 * bsc#1223661 * bsc#1223663 * bsc#1223664 * bsc#1223665 * bsc#1223666 * bsc#1223668 * bsc#1223669 * bsc#1223670 * bsc#1223671 * bsc#1223675 * bsc#1223677 * bsc#1223678 * bsc#1223686 * bsc#1223692 * bsc#1223693 * bsc#1223695 * bsc#1223696 * bsc#1223698 * bsc#1223705 * bsc#1223712 * bsc#1223718 * bsc#1223728 * bsc#1223732 * bsc#1223735 * bsc#1223739 * bsc#1223741 * bsc#1223744 * bsc#1223745 * bsc#1223747 * bsc#1223748 * bsc#1223749 * bsc#1223750 * bsc#1223752 * bsc#1223754 * bsc#1223757 * bsc#1223759 * bsc#1223761 * bsc#1223762 * bsc#1223774 * bsc#1223782 * bsc#1223787 * bsc#1223788 * bsc#1223789 * bsc#1223790 * bsc#1223802 * bsc#1223805 * bsc#1223810 * bsc#1223822 * bsc#1223827 * bsc#1223831 * bsc#1223834 * bsc#1223838 * bsc#1223869 * bsc#1223870 * bsc#1223871 * bsc#1223872 * bsc#1223874 * bsc#1223944 * bsc#1223945 * bsc#1223946 * bsc#1223991 * bsc#1224076 * bsc#1224096 * bsc#1224098 * bsc#1224099 * bsc#1224137 * bsc#1224166 * bsc#1224174 * bsc#1224177 * bsc#1224180 * bsc#1224181 * bsc#1224331 * bsc#1224348 * bsc#1224423 * bsc#1224429 * bsc#1224430 * bsc#1224432 * bsc#1224433 * bsc#1224437 * bsc#1224438 * bsc#1224442 * bsc#1224443 * bsc#1224445 * bsc#1224449 * bsc#1224477 * bsc#1224479 * bsc#1224480 * bsc#1224481 * bsc#1224482 * bsc#1224486 * bsc#1224487 * bsc#1224488 * bsc#1224491 * bsc#1224492 * bsc#1224493 * bsc#1224494 * bsc#1224495 * bsc#1224500 * bsc#1224501 * bsc#1224502 * bsc#1224504 * bsc#1224505 * bsc#1224506 * bsc#1224507 * bsc#1224508 * bsc#1224509 * bsc#1224511 * bsc#1224513 * bsc#1224517 * bsc#1224519 * bsc#1224521 * bsc#1224524 * bsc#1224525 * bsc#1224526 * bsc#1224530 * bsc#1224531 * bsc#1224534 * bsc#1224537 * bsc#1224541 * bsc#1224542 * bsc#1224543 * bsc#1224546 * bsc#1224550 * bsc#1224552 * bsc#1224553 * bsc#1224555 * bsc#1224557 * bsc#1224558 * bsc#1224559 * bsc#1224562 * bsc#1224565 * bsc#1224566 * bsc#1224567 * bsc#1224568 * bsc#1224569 * bsc#1224571 * bsc#1224573 * bsc#1224576 * bsc#1224577 * bsc#1224578 * bsc#1224579 * bsc#1224580 * bsc#1224581 * bsc#1224582 * bsc#1224585 * bsc#1224586 * bsc#1224587 * bsc#1224588 * bsc#1224592 * bsc#1224596 * bsc#1224598 * bsc#1224600 * bsc#1224601 * bsc#1224602 * bsc#1224603 * bsc#1224605 * bsc#1224607 * bsc#1224608 * bsc#1224609 * bsc#1224611 * bsc#1224613 * bsc#1224615 * bsc#1224617 * bsc#1224618 * bsc#1224620 * bsc#1224621 * bsc#1224622 * bsc#1224623 * bsc#1224624 * bsc#1224626 * bsc#1224627 * bsc#1224628 * bsc#1224629 * bsc#1224630 * bsc#1224632 * bsc#1224633 * bsc#1224634 * bsc#1224636 * bsc#1224637 * bsc#1224638 * bsc#1224639 * bsc#1224640 * bsc#1224643 * bsc#1224644 * bsc#1224645 * bsc#1224646 * bsc#1224647 * bsc#1224648 * bsc#1224649 * bsc#1224650 * bsc#1224651 * bsc#1224652 * bsc#1224653 * bsc#1224654 * bsc#1224657 * bsc#1224660 * bsc#1224663 * bsc#1224664 * bsc#1224665 * bsc#1224666 * bsc#1224667 * bsc#1224668 * bsc#1224671 * bsc#1224672 * bsc#1224674 * bsc#1224675 * bsc#1224676 * bsc#1224677 * bsc#1224678 * bsc#1224679 * bsc#1224680 * bsc#1224681 * bsc#1224682 * bsc#1224683 * bsc#1224685 * bsc#1224686 * bsc#1224687 * bsc#1224688 * bsc#1224692 * bsc#1224696 * bsc#1224697 * bsc#1224699 * bsc#1224701 * bsc#1224703 * bsc#1224704 * bsc#1224705 * bsc#1224706 * bsc#1224707 * bsc#1224709 * bsc#1224710 * bsc#1224712 * bsc#1224714 * bsc#1224716 * bsc#1224717 * bsc#1224718 * bsc#1224719 * bsc#1224720 * bsc#1224721 * bsc#1224722 * bsc#1224723 * bsc#1224725 * bsc#1224727 * bsc#1224728 * bsc#1224729 * bsc#1224730 * bsc#1224731 * bsc#1224732 * bsc#1224733 * bsc#1224736 * bsc#1224738 * bsc#1224739 * bsc#1224740 * bsc#1224741 * bsc#1224742 * bsc#1224747 * bsc#1224749 * bsc#1224763 * bsc#1224764 * bsc#1224765 * bsc#1224766 * bsc#1224790 * bsc#1224792 * bsc#1224793 * bsc#1224803 * bsc#1224804 * bsc#1224866 * bsc#1224936 * bsc#1224989 * bsc#1225007 * bsc#1225053 * bsc#1225133 * bsc#1225134 * bsc#1225136 * bsc#1225172 * bsc#1225502 * bsc#1225578 * bsc#1225579 * bsc#1225580 * bsc#1225593 * bsc#1225605 * bsc#1225607 * bsc#1225610 * bsc#1225616 * bsc#1225618 * bsc#1225640 * bsc#1225642 * bsc#1225692 * bsc#1225694 * bsc#1225695 * bsc#1225696 * bsc#1225698 * bsc#1225699 * bsc#1225704 * bsc#1225705 * bsc#1225708 * bsc#1225710 * bsc#1225712 * bsc#1225714 * bsc#1225715 * bsc#1225720 * bsc#1225722 * bsc#1225728 * bsc#1225734 * bsc#1225735 * bsc#1225736 * bsc#1225747 * bsc#1225748 * bsc#1225749 * bsc#1225750 * bsc#1225756 * bsc#1225765 * bsc#1225766 * bsc#1225769 * bsc#1225773 * bsc#1225775 * bsc#1225842 * bsc#1225945 * jsc#PED-3184 * jsc#PED-3311 * jsc#PED-3535 * jsc#PED-4486 * jsc#PED-4593 * jsc#PED-5062 * jsc#PED-542 * jsc#PED-5728 * jsc#PED-5853 * jsc#PED-6079 * jsc#PED-6252 * jsc#PED-7542 * jsc#PED-7619 * jsc#PED-8111 * jsc#PED-8240 Cross-References: * CVE-2023-0160 * CVE-2023-47233 * CVE-2023-52434 * CVE-2023-52458 * CVE-2023-52463 * CVE-2023-52472 * CVE-2023-52483 * CVE-2023-52492 * CVE-2023-52503 * CVE-2023-52591 * CVE-2023-52608 * CVE-2023-52616 * CVE-2023-52618 * CVE-2023-52631 * CVE-2023-52635 * CVE-2023-52640 * CVE-2023-52641 * CVE-2023-52645 * CVE-2023-52652 * CVE-2023-52653 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52657 * CVE-2023-52658 * CVE-2023-52659 * CVE-2023-52660 * CVE-2023-52661 * CVE-2023-52662 * CVE-2023-52663 * CVE-2023-52664 * CVE-2023-52667 * CVE-2023-52669 * CVE-2023-52670 * CVE-2023-52671 * CVE-2023-52673 * CVE-2023-52674 * CVE-2023-52675 * CVE-2023-52676 * CVE-2023-52678 * CVE-2023-52679 * CVE-2023-52680 * CVE-2023-52681 * CVE-2023-52683 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52687 * CVE-2023-52690 * CVE-2023-52691 * CVE-2023-52692 * CVE-2023-52693 * CVE-2023-52694 * CVE-2023-52695 * CVE-2023-52696 * CVE-2023-52697 * CVE-2023-52698 * CVE-2023-52771 * CVE-2023-52772 * CVE-2023-52860 * CVE-2023-52882 * CVE-2023-6238 * CVE-2023-6270 * CVE-2023-6531 * CVE-2023-7042 * CVE-2024-0639 * CVE-2024-21823 * CVE-2024-22099 * CVE-2024-23848 * CVE-2024-24861 * CVE-2024-25739 * CVE-2024-26601 * CVE-2024-26611 * CVE-2024-26614 * CVE-2024-26632 * CVE-2024-26638 * CVE-2024-26642 * CVE-2024-26643 * CVE-2024-26652 * CVE-2024-26654 * CVE-2024-26656 * CVE-2024-26657 * CVE-2024-26671 * CVE-2024-26673 * CVE-2024-26674 * CVE-2024-26675 * CVE-2024-26679 * CVE-2024-26684 * CVE-2024-26685 * CVE-2024-26692 * CVE-2024-26696 * CVE-2024-26697 * CVE-2024-26704 * CVE-2024-26714 * CVE-2024-26726 * CVE-2024-26731 * CVE-2024-26733 * CVE-2024-26736 * CVE-2024-26737 * CVE-2024-26739 * CVE-2024-26740 * CVE-2024-26742 * CVE-2024-26756 * CVE-2024-26757 * CVE-2024-26760 * CVE-2024-267600 * CVE-2024-26761 * CVE-2024-26764 * CVE-2024-26769 * CVE-2024-26772 * CVE-2024-26773 * CVE-2024-26774 * CVE-2024-26775 * CVE-2024-26779 * CVE-2024-26783 * CVE-2024-26786 * CVE-2024-26791 * CVE-2024-26793 * CVE-2024-26794 * CVE-2024-26802 * CVE-2024-26805 * CVE-2024-26807 * CVE-2024-26815 * CVE-2024-26816 * CVE-2024-26822 * CVE-2024-26828 * CVE-2024-26832 * CVE-2024-26836 * CVE-2024-26844 * CVE-2024-26846 * CVE-2024-26848 * CVE-2024-26853 * CVE-2024-26854 * CVE-2024-26855 * CVE-2024-26856 * CVE-2024-26857 * CVE-2024-26858 * CVE-2024-26860 * CVE-2024-26861 * CVE-2024-26862 * CVE-2024-26866 * CVE-2024-26868 * CVE-2024-26870 * CVE-2024-26878 * CVE-2024-26881 * CVE-2024-26882 * CVE-2024-26883 * CVE-2024-26884 * CVE-2024-26885 * CVE-2024-26898 * CVE-2024-26899 * CVE-2024-26900 * CVE-2024-26901 * CVE-2024-26903 * CVE-2024-26906 * CVE-2024-26909 * CVE-2024-26921 * CVE-2024-26922 * CVE-2024-26923 * CVE-2024-26925 * CVE-2024-26928 * CVE-2024-26932 * CVE-2024-26933 * CVE-2024-26934 * CVE-2024-26935 * CVE-2024-26937 * CVE-2024-26938 * CVE-2024-26940 * CVE-2024-26943 * CVE-2024-26945 * CVE-2024-26946 * CVE-2024-26948 * CVE-2024-26949 * CVE-2024-26950 * CVE-2024-26951 * CVE-2024-26956 * CVE-2024-26957 * CVE-2024-26958 * CVE-2024-26960 * CVE-2024-26961 * CVE-2024-26962 * CVE-2024-26963 * CVE-2024-26964 * CVE-2024-26972 * CVE-2024-26973 * CVE-2024-26978 * CVE-2024-26979 * CVE-2024-26981 * CVE-2024-26982 * CVE-2024-26983 * CVE-2024-26984 * CVE-2024-26986 * CVE-2024-26988 * CVE-2024-26989 * CVE-2024-26990 * CVE-2024-26991 * CVE-2024-26992 * CVE-2024-26993 * CVE-2024-26994 * CVE-2024-26995 * CVE-2024-26996 * CVE-2024-26997 * CVE-2024-26999 * CVE-2024-27000 * CVE-2024-27001 * CVE-2024-27002 * CVE-2024-27003 * CVE-2024-27004 * CVE-2024-27008 * CVE-2024-27013 * CVE-2024-27014 * CVE-2024-27022 * CVE-2024-27027 * CVE-2024-27028 * CVE-2024-27029 * CVE-2024-27030 * CVE-2024-27031 * CVE-2024-27036 * CVE-2024-27046 * CVE-2024-27056 * CVE-2024-27057 * CVE-2024-27062 * CVE-2024-27067 * CVE-2024-27080 * CVE-2024-27388 * CVE-2024-27389 * CVE-2024-27393 * CVE-2024-27395 * CVE-2024-27396 * CVE-2024-27398 * CVE-2024-27399 * CVE-2024-27400 * CVE-2024-27401 * CVE-2024-27405 * CVE-2024-27408 * CVE-2024-27410 * CVE-2024-27411 * CVE-2024-27412 * CVE-2024-27413 * CVE-2024-27416 * CVE-2024-27417 * CVE-2024-27418 * CVE-2024-27431 * CVE-2024-27432 * CVE-2024-27434 * CVE-2024-27435 * CVE-2024-27436 * CVE-2024-35784 * CVE-2024-35786 * CVE-2024-35788 * CVE-2024-35789 * CVE-2024-35790 * CVE-2024-35791 * CVE-2024-35794 * CVE-2024-35795 * CVE-2024-35796 * CVE-2024-35799 * CVE-2024-35800 * CVE-2024-35801 * CVE-2024-35803 * CVE-2024-35804 * CVE-2024-35806 * CVE-2024-35808 * CVE-2024-35809 * CVE-2024-35810 * CVE-2024-35811 * CVE-2024-35812 * CVE-2024-35813 * CVE-2024-35814 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35819 * CVE-2024-35821 * CVE-2024-35822 * CVE-2024-35823 * CVE-2024-35824 * CVE-2024-35825 * CVE-2024-35828 * CVE-2024-35829 * CVE-2024-35830 * CVE-2024-35833 * CVE-2024-35834 * CVE-2024-35835 * CVE-2024-35836 * CVE-2024-35837 * CVE-2024-35838 * CVE-2024-35841 * CVE-2024-35842 * CVE-2024-35845 * CVE-2024-35847 * CVE-2024-35849 * CVE-2024-35850 * CVE-2024-35851 * CVE-2024-35852 * CVE-2024-35854 * CVE-2024-35860 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35865 * CVE-2024-35866 * CVE-2024-35867 * CVE-2024-35868 * CVE-2024-35869 * CVE-2024-35870 * CVE-2024-35872 * CVE-2024-35875 * CVE-2024-35877 * CVE-2024-35878 * CVE-2024-35879 * CVE-2024-35883 * CVE-2024-35885 * CVE-2024-35887 * CVE-2024-35889 * CVE-2024-35891 * CVE-2024-35895 * CVE-2024-35901 * CVE-2024-35903 * CVE-2024-35904 * CVE-2024-35905 * CVE-2024-35907 * CVE-2024-35909 * CVE-2024-35911 * CVE-2024-35912 * CVE-2024-35914 * CVE-2024-35915 * CVE-2024-35916 * CVE-2024-35917 * CVE-2024-35921 * CVE-2024-35922 * CVE-2024-35924 * CVE-2024-35927 * CVE-2024-35928 * CVE-2024-35930 * CVE-2024-35931 * CVE-2024-35932 * CVE-2024-35933 * CVE-2024-35935 * CVE-2024-35936 * CVE-2024-35937 * CVE-2024-35938 * CVE-2024-35940 * CVE-2024-35943 * CVE-2024-35944 * CVE-2024-35945 * CVE-2024-35946 * CVE-2024-35947 * CVE-2024-35950 * CVE-2024-35951 * CVE-2024-35952 * CVE-2024-35953 * CVE-2024-35954 * CVE-2024-35955 * CVE-2024-35956 * CVE-2024-35958 * CVE-2024-35959 * CVE-2024-35960 * CVE-2024-35961 * CVE-2024-35963 * CVE-2024-35964 * CVE-2024-35965 * CVE-2024-35966 * CVE-2024-35967 * CVE-2024-35969 * CVE-2024-35971 * CVE-2024-35972 * CVE-2024-35973 * CVE-2024-35974 * CVE-2024-35975 * CVE-2024-35977 * CVE-2024-35978 * CVE-2024-35981 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-35986 * CVE-2024-35989 * CVE-2024-35990 * CVE-2024-35991 * CVE-2024-35992 * CVE-2024-35995 * CVE-2024-35997 * CVE-2024-35999 * CVE-2024-36002 * CVE-2024-36006 * CVE-2024-36007 * CVE-2024-36009 * CVE-2024-36011 * CVE-2024-36012 * CVE-2024-36013 * CVE-2024-36014 * CVE-2024-36015 * CVE-2024-36016 * CVE-2024-36018 * CVE-2024-36019 * CVE-2024-36020 * CVE-2024-36021 * CVE-2024-36025 * CVE-2024-36026 * CVE-2024-36029 * CVE-2024-36030 * CVE-2024-36032 * CVE-2024-36880 * CVE-2024-36885 * CVE-2024-36890 * CVE-2024-36891 * CVE-2024-36893 * CVE-2024-36894 * CVE-2024-36895 * CVE-2024-36896 * CVE-2024-36897 * CVE-2024-36898 * CVE-2024-36906 * CVE-2024-36918 * CVE-2024-36921 * CVE-2024-36922 * CVE-2024-36928 * CVE-2024-36930 * CVE-2024-36931 * CVE-2024-36936 * CVE-2024-36940 * CVE-2024-36941 * CVE-2024-36942 * CVE-2024-36944 * CVE-2024-36947 * CVE-2024-36949 * CVE-2024-36950 * CVE-2024-36951 * CVE-2024-36955 * CVE-2024-36959 CVSS scores: * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52434 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-52434 ( NVD ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52458 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52463 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52472 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52503 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52618 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52645 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52652 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52771 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52772 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52772 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6238 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6238 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-21823 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24861 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-24861 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-25739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26632 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26638 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26652 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26737 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26836 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26844 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26848 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26901 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26932 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26933 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26979 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-26979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26992 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26993 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27022 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27027 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27029 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27080 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27408 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35803 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35869 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35963 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35999 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36016 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36018 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-36019 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-36020 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36025 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36030 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2024-36885 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36894 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36898 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36921 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-36922 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36936 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36949 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 428 vulnerabilities, contains 15 features and has 78 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170). * CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721). * CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111). * CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368). * CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657). * CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693). * CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745). * CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735). * CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664). * CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822). * CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655). * CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686). * CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104). * CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634). * CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060). * CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198). * CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357). * CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613). * CVE-2024-26906: Disallowed vsyscall page read for copy_from_kernel_nofault() (bsc#1223202). * CVE-2024-26816: Ignore relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624). * CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615). * CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035). * CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189). * CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190). * CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034). * CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033). * CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968). * CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342). * CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618). * CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801). * CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557). * CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585). * CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445). * CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422). * CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044). * CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915). * CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830). * CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293). * CVE-2024-25739: Fixed possible crash in create_empty_lvol() in drivers/mtd/ubi/vtbl.c (bsc#1219834). * CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562). * CVE-2024-36030: Fix the double free in rvu_npc_freemem() (bsc#1225712) * CVE-2023-52698: Fix memory leak in netlbl_calipso_add_pass() (bsc#1224621) * CVE-2024-26860: Fix a memory leak when rechecking the data (bsc#1223077). * CVE-2023-52772: Fix use-after-free in unix_stream_read_actor() (bsc#1224989). * CVE-2024-27431: Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718). * CVE-2024-35860: Support deferring bpf_link dealloc to after RCU grace period BPF link for some program types (bsc#1224531). * CVE-2024-35964: Fix not validating setsockopt user input Check user input length before copying data (bsc#1224581). * CVE-2023-0160: Prevent lock inversion deadlock in map delete elem (bsc#1209657). * CVE-2024-35903: Fix IP after emitting call depth accounting Adjust the IP passed to `emit_patch` so it calculates the correct offset for the CALL instruction if `x86_call_depth_emit_accounting` emits code (bsc#1224493). * CVE-2024-35931: Skip do PCI error slot reset during RAS recovery (bsc#1224652). * CVE-2024-35877: Fix VM_PAT handling in COW mappings (bsc#1224525). * CVE-2024-35969: Fix race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580) * CVE-2024-35852: Fix memory leak when canceling rehash work The rehash delayed work is rescheduled with a delay if the number of credits at end of the work is not negative as supposedly it means that the migration ended (bsc#1224502). * CVE-2024-36006: Fix incorrect list API usage (bsc#1224541). * CVE-2024-36007: Fix warning during rehash (bsc#1224543). * CVE-2024-35872: Fix GUP-fast succeeding on secretmem folios (bsc#1224530). * CVE-2024-35956: Fix qgroup prealloc rsv leak in subvolume operations (bsc#1224674) * CVE-2023-52771: Fix delete_endpoint() vs parent unregistration race (bsc#1225007). * CVE-2024-27408: Add sync read before starting the DMA transfer in remote setup (bsc#1224430). * CVE-2024-35943: Add a null pointer check to the omap_prm_domain_init devm_kasprintf()returns a pointer to dynamically allocated memory which can be NULL upon failure (bsc#1224649). * CVE-2024-35921: Fix oops when HEVC init fails (bsc#1224477). * CVE-2023-52860: Use cpuhp_state_remove_instance_nocalls() for hisi_hns3_pmu uninit process (bsc#1224936). * CVE-2024-35991: kABI workaround for struct idxd_evl (bsc#1224553). * CVE-2024-35854: Fix possible use-after-free during rehash (bsc#1224636). * CVE-2024-27418: Take ownership of skb in mctp_local_output (bsc#1224720) * CVE-2024-27417: Fix potential "struct net" leak in inet6_rtm_getaddr() (bsc#1224721). * CVE-2024-35905: Protect against int overflow for stack access size (bsc#1224488). * CVE-2024-35917: Fix bpf_plt pointer arithmetic (bsc#1224481). * CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() to nsure the value passed to scarlett2_mixer_ctl_put() is between 0 and SCARLETT2_MIXER_MAX_VALUE so we don't attempt to access outside scarlett2_mixer_values[] (bsc#1224727). * CVE-2023-52680: Add missing error checks to __ctl_get() because the_ _ctl_get() functions which call scarlett2_update_ *() were not checking the return value (bsc#1224608). * CVE-2023-52692: Add missing error check to scarlett2_usb_set_config() scarlett2_usb_set_config() calls scarlett2_usb_get() but was not checking the result (bsc#1224628). * CVE-2024-35944: Fix memcpy() run-time warning in dg_dispatch_as_host() Syzkaller hit 'WARNING in dg_dispatch_as_host' bug (bsc#1224648). * CVE-2024-26923: Suppress false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384). * CVE-2023-52659: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (bsc#1224442). * CVE-2024-21823: Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may have allowed an authorized user to potentially enable denial of service via local access (bsc#1223625). * CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084). * CVE-2024-27395: Fix Use-After-Free in ovs_ct_exit Since kfree_rcu (bsc#1224098). * CVE-2023-52483: Perform route lookups under a RCU read-side lock (bsc#1220738). * CVE-2024-27396: Fix Use-After-Free in gtp_dellink (bsc#1224096). * CVE-2024-26632: Fix iterating over an empty bio with bio_for_each_folio_all (bsc#1221635). * CVE-2024-27401: Ensure that packet_buffer_get respects the user_length provided. (bsc#1224181). * CVE-2024-26775: Avoid potential deadlock at set_capacity (bsc#1222627). * CVE-2024-26958: Fix UAF in direct writes (bsc#1223653). * CVE-2024-26643: Mark set as dead when unbinding anonymous set with timeout While the rhashtable set gc runs asynchronously, a race allowed it to collect elements from anonymous sets with timeouts while it is being released from the commit path. (bsc#1221829). * CVE-2023-52618: Check for unlikely string overflow (bsc#1221615). * CVE-2023-6238: Only privileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption (bsc#1217384). * CVE-2024-26946: Use copy_from_kernel_nofault() to read from unsafe address Read from an unsafe address with copy_from_kernel_nofault() in arch_adjust_kprobe_addr() because this function is used before checking the address is in text or not (bsc#1223669). * CVE-2024-26945: Fix nr_cpus nr_iaa case If nr_cpus nr_iaa, the calculated cpus_per_iaa will be 0, which causes a divide-by-0 in rebalance_wq_table() (bsc#1223732). * CVE-2024-26679: Read sk->sk_family once in inet_recv_error() inet_recv_error() is called without holding the socket lock. IPv6 socket could mutate to IPv4 with IPV6_ADDRFORM socket option and trigger a KCSAN warning (bsc#1222385). * CVE-2024-26791: Properly validate device names (bsc#1222793) * CVE-2023-52641: Add NULL ptr dereference checking at the end of attr_allocate_frame() (bsc#1222303) * CVE-2024-26726: Do not drop extent_map for free space inode on write error (bsc#1222532) * CVE-2024-27022: Defer linking file vma until vma is fully initialized (bsc#1223774). * CVE-2024-26899: Fix deadlock between bd_link_disk_holder and partition scan (bsc#1223045). * CVE-2024-26638: Always initialize struct msghdr completely (bsc#1221649). * CVE-2024-26909: Fix drm bridge use-after-free A recent DRM series purporting to simplify support (bsc#1223143). * CVE-2024-26674: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups (bsc#1222378). * CVE-2024-26832: Fix missing folio cleanup in writeback race path (bsc#1223007). * CVE-2024-26844: Fix WARNING in _copy_from_iter (bsc#1223015). * CVE-2024-26774: Avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt (bsc#1222622). * CVE-2024-26815: Properly check TCA_TAPRIO_TC_ENTRY_INDEX (bsc#1222635). * cve-2024-267600: Fix bio_put() for error case (bsc#1222596). * CVE-2024-26731: Fix NULL pointer dereference in sk_psock_verdict_data_ready() (bsc#1222371). * CVE-2024-26740: Use the backlog for mirred ingress (bsc#1222563). * CVE-2023-52640: Fix oob in ntfs_listxattr The length of name cannot exceed the space occupied by ea (bsc#1222301). * CVE-2023-52631: Fix a NULL dereference bug (bsc#1222264). * CVE-2023-52458: Add check that partition length needs to be aligned with block size (bsc#1220428). * CVE-2023-6270: Fix the potential use-after-free problem in aoecmd_cfg_pkts (bsc#1218562). * CVE-2024-26805: Fix kernel-infoleak-after-free in __skb_datagram_iter (bsc#1222630). * CVE-2024-26991: Do not overflow lpage_info when checking attributes (bsc#1223695). * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390). * CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011). * CVE-2023-52434: Fixed potential OOBs in smb2_parse_contexts() (bsc#1220148). * CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532). * CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763). * CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664). * CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678). * CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667). * CVE-2024-35869: Guarantee refcounted children from parent session (bsc#1224679). * CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672). * CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464). * CVE-2024-27036: Fixed writeback data corruption (bsc#1223810). The following non-security bugs were fixed: * 9p: add missing locking around taking dentry fid list (git-fixes) * ACPI: CPPC: Fix access width used for PCC registers (git-fixes). * ACPI: CPPC: Fix bit_offset shift in MASK_VAL() macro (git-fixes). * ACPI: CPPC: Use access_width over bit_width for system memory accesses (stable-fixes). * ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes). * ACPI: LPSS: Advertise number of chip selects via property (git-fixes). * ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes). * ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes). * ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git- fixes). * ACPI: disable -Wstringop-truncation (git-fixes). * ACPI: resource: Add Infinity laptops to irq1_edge_low_force_override (stable-fixes). * ACPI: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes). * ACPI: scan: Do not increase dep_unmet for already met dependencies (git- fixes). * ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (bsc#1217750). * ACPI: x86: Move acpi_quirk_skip_serdev_enumeration() out of CONFIG_X86_ANDROID_TABLETS (stable-fixes). * ACPICA: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() (git-fixes). * ALSA/hda: intel-dsp-config: reduce log verbosity (git-fixes). * ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes). * ALSA: aoa: avoid false-positive format truncation warning (git-fixes). * ALSA: core: Fix NULL module pointer assignment at card init (git-fixes). * ALSA: core: Remove debugfs at disconnection (git-fixes). * ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes). * ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes). * ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes). * ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes). * ALSA: hda/realtek - Set GPIO3 to default at S4 state for Thinkpad with ALC1318 (stable-fixes). * ALSA: hda/realtek - fixed headset Mic not show (stable-fixes). * ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes). * ALSA: hda/realtek: Add quirk for HP Spectre x360 14 eu0000 (stable-fixes). * ALSA: hda/realtek: Add quirks for ASUS Laptops using CS35L56 (stable-fixes). * ALSA: hda/realtek: Add quirks for HP Omen models using CS35L41 (stable- fixes). * ALSA: hda/realtek: Add quirks for Huawei Matebook D14 NBLB-WAX9N (stable- fixes). * ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes). * ALSA: hda/realtek: Add quirks for some Clevo laptops (stable-fixes). * ALSA: hda/realtek: Add sound quirks for Lenovo Legion slim 7 16ARHA7 models (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook 2024 HN7306W (stable-fixes). * ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes). * ALSA: hda/realtek: Drop doubly quirk entry for 103c:8a2e (git-fixes). * ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897 (stable-fixes). * ALSA: hda/realtek: Fix build error without CONFIG_PM (stable-fixes). * ALSA: hda/realtek: Fix conflicting PCI SSID 17aa:386f for Lenovo Legion models (bsc#1223462). * ALSA: hda/realtek: Fix internal speakers for Legion Y9000X 2022 IAH7 (stable-fixes). * ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes). * ALSA: hda/realtek: Fix volumn control of ThinkBook 16P Gen4 (git-fixes). * ALSA: hda/realtek: Fixes for Asus GU605M and GA403U sound (stable-fixes). * ALSA: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone (git-fixes). * ALSA: hda/realtek: cs35l41: Support ASUS ROG G634JYR (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes). * ALSA: hda/realtek: fix the hp playback volume issue for LG machines (stable- fixes). * ALSA: hda/tas2781: Add new vendor_id and subsystem_id to support ThinkPad ICE-1 (stable-fixes). * ALSA: hda/tas2781: add locks to kcontrols (git-fixes). * ALSA: hda/tas2781: correct the register for pow calibrated data (git-fixes). * ALSA: hda/tas2781: remove digital gain kcontrol (git-fixes). * ALSA: hda: Add Intel BMG PCI ID and HDMI codec vid (stable-fixes). * ALSA: hda: clarify Copyright information (stable-fixes). * ALSA: hda: cs35l41: Add support for ASUS ROG 2024 Laptops (stable-fixes). * ALSA: hda: cs35l41: Ignore errors when configuring IRQs (stable-fixes). * ALSA: hda: cs35l41: Remove Speaker ID for Lenovo Legion slim 7 16ARHA7 (git- fixes). * ALSA: hda: cs35l41: Remove redundant argument to cs35l41_request_firmware_file() (stable-fixes). * ALSA: hda: cs35l41: Set the max PCM Gain using tuning setting (stable- fixes). * ALSA: hda: cs35l41: Support HP Omen models without _DSD (stable-fixes). * ALSA: hda: cs35l41: Support Lenovo 13X laptop without _DSD (stable-fixes). * ALSA: hda: cs35l41: Update DSP1RX5/6 Sources for DSP config (stable-fixes). * ALSA: hda: cs35l56: Add ACPI device match tables (git-fixes). * ALSA: hda: cs35l56: Exit cache-only after cs35l56_wait_for_firmware_boot() (stable-fixes). * ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (git-fixes). * ALSA: hda: cs35l56: Set the init_done flag before component_add() (git- fixes). * ALSA: hda: hda_cs_dsp_ctl: Remove notification of driver write (stable- fixes). * ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes). * ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git- fixes). * ALSA: line6: Zero-initialize message buffers (stable-fixes). * ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable- fixes). * ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable- fixes). * ALSA: scarlett2: Add correct product series name to messages (stable-fixes). * ALSA: scarlett2: Add missing error check to scarlett2_config_save() (git- fixes). * ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes). * ALSA: scarlett2: Default mixer driver to enabled (stable-fixes). * ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes). * ALSA: seq: Do not clear bank selection at event -> UMP MIDI2 conversion (git-fixes). * ALSA: seq: Fix incorrect UMP type for system messages (git-fixes). * ALSA: seq: Fix missing bank setup between MIDI1/MIDI2 UMP conversion (git- fixes). * ALSA: seq: Fix yet another spot for system message conversion (git-fixes). * ALSA: seq: ump: Fix conversion from MIDI2 to MIDI1 UMP messages (git-fixes). * ALSA: seq: ump: Fix swapped song position pointer data (git-fixes). * ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes). * ALSA: timer: Set lower bound of start tick time (stable-fixes). * ALSA: ump: Do not accept an invalid UMP protocol number (git-fixes). * ALSA: ump: Do not clear bank selection after sending a program change (git- fixes). * ALSA: ump: Set default protocol when not given explicitly (git-fixes). * ALSA: usb-audio: Add sampling rates support for Mbox3 (stable-fixes). * ALSA: usb-audio: Fix for sampling rates support for Mbox3 (stable-fixes). * ARM: 9381/1: kasan: clear stale stack poison (git-fixes). * ARM: OMAP2+: fix N810 MMC gpiod table (git-fixes). * ARM: OMAP2+: fix USB regression on Nokia N8x0 (git-fixes). * ARM: imx: Check return value of devm_kasprintf in imx_mmdc_perf_init (git- fixes). * ARM: imx_v6_v7_defconfig: Restore CONFIG_BACKLIGHT_CLASS_DEVICE (git-fixes). * ARM: prctl: reject PR_SET_MDWE on pre-ARMv6 (stable-fixes). * ARM: s5pv210: fix pm.c kernel-doc warning (git-fixes). * ASoC: Intel: Disable route checks for Skylake boards (git-fixes). * ASoC: Intel: avs: Fix ASRC module initialization (git-fixes). * ASoC: Intel: avs: Fix potential integer overflow (git-fixes). * ASoC: Intel: avs: Populate board selection with new I2S entries (stable- fixes). * ASoC: Intel: avs: Set name of control as in topology (git-fixes). * ASoC: Intel: avs: Test result of avs_get_module_entry() (git-fixes). * ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes). * ASoC: Intel: bytcr_rt5640: Apply Asus T100TA quirk to Asus T100TAM too (git- fixes). * ASoC: Intel: common: DMI remap for rebranded Intel NUC M15 (LAPRC710) laptops (stable-fixes). * ASoC: SOF: Intel: add default firmware library path for LNL (git-fixes). * ASoC: SOF: Intel: hda-dsp: Skip IMR boot on ACE platforms in case of S3 suspend (stable-fixes). * ASoC: SOF: Intel: lnl: Correct rom_status_reg (git-fixes). * ASoC: SOF: Intel: mtl: Correct rom_status_reg (git-fixes). * ASoC: SOF: Intel: mtl: Disable interrupts when firmware boot failed (git- fixes). * ASoC: SOF: Intel: mtl: Implement firmware boot state check (git-fixes). * ASoC: SOF: Intel: mtl: call dsp dump when boot retry fails (stable-fixes). * ASoC: SOF: amd: Optimize quirk for Valve Galileo (stable-fixes). * ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend (stable-fixes). * ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension (git-fixes). * ASoC: acp: Support microphone from device Acer 315-24p (git-fixes). * ASoC: amd: acp: fix for acp_init function error handling (git-fixes). * ASoC: amd: yc: Add Lenovo ThinkBook 21J0 into DMI quirk table (stable- fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS M7600RE (stable-fixes). * ASoC: amd: yc: Fix non-functional mic on Lenovo 21J2 (stable-fixes). * ASoC: amd: yc: Revert "Fix non-functional mic on Lenovo 21J2" (stable- fixes). * ASoC: codecs: wsa881x: set clk_stop_mode1 flag (git-fixes). * ASoC: cs35l41: Update DSP1RX5/6 Sources for DSP config (git-fixes). * ASoC: cs35l56: Fix unintended bus access while resetting amp (git-fixes). * ASoC: cs35l56: Prevent overwriting firmware ASP config (git-fixes). * ASoC: da7219-aad: fix usage of device_get_named_child_node() (git-fixes). * ASoC: kirkwood: Fix potential NULL dereference (git-fixes). * ASoC: mediatek: Assign dummy when codec not specified for a DAI link (git- fixes). * ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes). * ASoC: meson: axg-card: make links nonatomic (git-fixes). * ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes). * ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes). * ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes). * ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes). * ASoC: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes). * ASoC: rockchip: i2s-tdm: Fix inaccurate sampling rates (git-fixes). * ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (git- fixes). * ASoC: rt5645: Make LattePanda board DMI match more precise (stable-fixes). * ASoC: rt5682-sdw: fix locking sequence (git-fixes). * ASoC: rt711-sdca: fix locking sequence (git-fixes). * ASoC: rt711-sdw: fix locking sequence (git-fixes). * ASoC: rt712-sdca-sdw: fix locking sequence (git-fixes). * ASoC: rt715-sdca: volume step modification (git-fixes). * ASoC: rt715: add vendor clear control register (git-fixes). * ASoC: rt722-sdca-sdw: fix locking sequence (git-fixes). * ASoC: rt722-sdca: add headset microphone vrefo setting (git-fixes). * ASoC: rt722-sdca: modify channel number to support 4 channels (git-fixes). * ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes). * ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes). * ASoC: tas2781: Fix a warning reported by robot kernel test (git-fixes). * ASoC: tas2781: Fix wrong loading calibrated data sequence (git-fixes). * ASoC: tas2781: mark dvc_tlv with __maybe_unused (git-fixes). * ASoC: tegra: Fix DSPK 16-bit playback (git-fixes). * ASoC: ti: Convert Pandora ASoC to GPIO descriptors (stable-fixes). * ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes). * ASoC: tlv320adc3xxx: Do not strip remove function when driver is builtin (git-fixes). * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes). * ASoC: wm_adsp: Add missing MODULE_DESCRIPTION() (git-fixes). * ASoC: wm_adsp: Fix missing mutex_lock in wm_adsp_write_ctl() (git-fixes). * Add alt-commit to a nouveau patch * Add cherry-picked id to amdgpu patch * Add cherry-picked id to amdgpu patch (git-fixes) * Add cherry-picked patch references to amdgpu patches * Add reference to L3 bsc#1225765 in BPF control flow graph and precision backtrack fixes (bsc#1225756) The L3 bsc#1225765 was created seperately since our customer requires PTF. * Bluetooth: Add new quirk for broken read key length on ATS2851 (stable- fixes). * Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes). * Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes). * Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable- fixes). * Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes). * Bluetooth: HCI: Fix potential null-ptr-deref (git-fixes). * Bluetooth: ISO: Align broadcast sync_timeout with connection timeout (stable-fixes). * Bluetooth: ISO: Do not reject BT_ISO_QOS if parameters are unset (git- fixes). * Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes). * Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() (git-fixes). * Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID (bsc#1221504). * Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes). * Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes). * Bluetooth: add quirk for broken address properties (git-fixes). * Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable- fixes). * Bluetooth: btintel: Fixe build regression (git-fixes). * Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable- fixes). * Bluetooth: btusb: Fix triggering coredump implementation for QCA (git- fixes). * Bluetooth: hci_core: Cancel request on command timeout (stable-fixes). * Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes). * Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes). * Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes). * Bluetooth: hci_sync: Fix not checking error on hci_cmd_sync_cancel_sync (git-fixes). * Bluetooth: hci_sync: Fix using the same interval and window for Coded PHY (git-fixes). * Bluetooth: hci_sync: Use QoS to determine which PHY to scan (stable-fixes). * Bluetooth: l2cap: Do not double set the HCI_CONN_MGMT_CONNECTED bit (git- fixes). * Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes). * Bluetooth: mgmt: Fix limited discoverable off timeout (stable-fixes). * Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes). * Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes). * Bluetooth: qca: add missing firmware sanity checks (git-fixes). * Bluetooth: qca: fix NULL-deref on non-serdev setup (git-fixes). * Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes). * Bluetooth: qca: fix NVM configuration parsing (git-fixes). * Bluetooth: qca: fix device-address endianness (git-fixes). * Bluetooth: qca: fix firmware check error path (git-fixes). * Bluetooth: qca: fix info leak when fetching fw build id (git-fixes). * Delete patches.suse/btrfs-qgroup-fix-qgroup-prealloc-rsv-leak-in- subvolu.patch. Quoting bsc#1225945#c11: "So the upstream 6.5 kernel commit (1b53e51a4a8f ("btrfs: do not commit transaction for every subvol create") ) was never backported to SLE, so that fix eb96e221937a ("btrfs: fix unwritten extent buffer after snapshotting a new subvolume") was never backported." * Docs/admin-guide/mm/damon/usage: fix wrong example of DAMOS filter matching sysfs file (git-fixes). * Drop usb gadget patch that was taken mistakenly and reverted (git-fixes) * EDAC/synopsys: Fix ECC status and IRQ control race condition (git-fixes). * Edit "amdkfd: use calloc instead of kzalloc to avoid integer overflow" Reference CVE and bug numbers. * Enable CONFIG_FIPS_SIGNATURE_SELFTEST (bsc#1222771) * Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_ECDSA. * Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_RSA. * Fix a potential infinite loop in extract_user_to_sg() (git-fixes). * Fix build errors due to new UIO_MEM_DMA_COHERENT mess (git-fixes). * Fix patches.suse/coresight-etm4x-Add-ACPI-support-in-platform-driver.patch (bsc#1218779 bsc#1220587) Put back patch hunk which where missed because file rename drivers/acpi/acpi_amba.c -> drivers/acpi/arm64/amba.c * HID: amd_sfh: Handle "no sensors" in PM operations (git-fixes). * HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up (git- fixes). * HID: input: avoid polling stylus battery on Chromebook Pompom (stable- fixes). * HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes). * HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes). * HID: logitech-dj: allow mice to use all types of reports (git-fixes). * HID: multitouch: Add required quirk for Synaptics 0xcddc device (stable- fixes). * IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes) * Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes). * Input: gpio_keys_polled - suppress deferred probe error for gpio (stable- fixes). * Input: imagis - use FIELD_GET where applicable (stable-fixes). * Input: ims-pcu - fix printf string overflow (git-fixes). * Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes). * Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails (stable-fixes). * Input: xpad - add additional HyperX Controller Identifiers (stable-fixes). * Input: xpad - add support for Snakebyte GAMEPADs (stable-fixes). * KEYS: trusted: Do not use WARN when encode fails (git-fixes). * KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes). * KVM: SVM: Add support for allowing zero SEV ASIDs (git-fixes). * KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (git-fixes). * KVM: SVM: Use unsigned integers when dealing with ASIDs (git-fixes). * KVM: VMX: Disable LBR virtualization if the CPU does not support LBR callstacks (git-fixes). * KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes). * KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git- fixes). * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224790). * KVM: x86/mmu: Do not force emulation of L2 accesses to non-APIC internal slots (git-fixes). * KVM: x86/mmu: Move private vs. shared check above slot validity checks (git- fixes). * KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU (git-fixes). * KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status (git-fixes). * KVM: x86/pmu: Allow programming events that match unsupported arch events (git-fixes). * KVM: x86/pmu: Always treat Fixed counters as available when supported (git- fixes). * KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs (git-fixes). * KVM: x86/pmu: Disable support for adaptive PEBS (git-fixes). * KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs (git- fixes). * KVM: x86/pmu: Do not ignore bits 31:30 for RDPMC index on AMD (git-fixes). * KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms (git- fixes). * KVM: x86/pmu: Explicitly check NMI from guest to reducee false positives (git-fixes). * KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (git-fixes). * KVM: x86/pmu: Set enable bits for GP counters in PERF_GLOBAL_CTRL at "RESET" (git-fixes). * KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled (git-fixes). * KVM: x86/xen: fix recursive deadlock in timer injection (git-fixes). * KVM: x86/xen: improve accuracy of Xen timers (git-fixes). * KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled (git- fixes). * KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery (git-fixes). * KVM: x86: Allow, do not ignore, same-value writes to immutable MSRs (git- fixes). * KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes). * KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (git- fixes). * KVM: x86: Introduce __kvm_get_hypervisor_cpuid() helper (git-fixes). * KVM: x86: Mark target gfn of emulated atomic instruction as dirty (git- fixes). * KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabled (git- fixes). * KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible (git-fixes). * KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP (git-fixes). * KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT (git- fixes). * Move out-of-tree powerpc patch to the right section * Move the upstreamed BT fix patch to sorted section * Move the upstreamed BT patch into sorted section * Move upstreamed ACPI patch into sorted section * Move upstreamed HD-audio patch into sorted section * Move upstreamed USB fix into sorted section * Move upstreamed media patches into sorted section * Move upstreamed mm patches into sorted section * Move upstreamed patches into sorted section * Move upstreamed patches into sorted section * Move upstreamed patches into sorted section * Move upstreamed patches into sorted section * Move upstreamed powerpc patches into sorted section * Move upstreamed powerpc patches into sorted section * NFC: trf7970a: disable all regulators on removal (git-fixes). * NFS: Fix an off by one in root_nfs_cat() (git-fixes). * NFS: Fix nfs_netfs_issue_read() xarray locking for writeback interrupt (git- fixes). * NFS: Read unlock folio on nfs_page_create_from_folio() error (git-fixes). * NFSD: Convert the callback workqueue to use delayed_work (git-fixes). * NFSD: Fix nfsd_clid_class use of __string_len() macro (git-fixes). * NFSD: Reschedule CB operations when backchannel rpc_clnt is shut down (git- fixes). * NFSD: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes). * NFSD: Retransmit callbacks after client reconnects (git-fixes). * NFSD: change LISTXATTRS cookie encoding to big-endian (git-fixes). * NFSD: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes). * NFSD: fix LISTXATTRS returning more bytes than maxcount (git-fixes). * NFSD: fix nfsd4_listxattr_validate_cookie (git-fixes). * NFSv4.1/pnfs: fix NFS with TLS in pnfs (git-fixes). * NFSv4.2: fix listxattr maximum XDR buffer size (git-fixes). * NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes). * Octeontx2-af: fix pause frame configuration in GMP mode (git-fixes). * PCI/AER: Block runtime suspend when handling errors (stable-fixes). * PCI/ASPM: Use RMW accessors for changing LNKCTL (git-fixes). * PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (stable-fixes). * PCI/DPC: Use FIELD_GET() (stable-fixes). * PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/PM: Drain runtime-idle callbacks before driver removal (stable-fixes). * PCI: Delay after FLR of Solidigm P44 Pro NVMe (stable-fixes). * PCI: Disable D3cold on Asus B1400 PCI-NVMe bridge (stable-fixes). * PCI: Execute quirk_enable_clear_retrain_link() earlier (stable-fixes). * PCI: Fix typos in docs and comments (stable-fixes). * PCI: Make link retraining use RMW accessors for changing LNKCTL (git-fixes). * PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word() (stable-fixes). * PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes). * PCI: hv: Fix ring buffer size calculation (git-fixes). * PCI: qcom: Add support for sa8775p SoC (git-fixes). * PCI: qcom: Disable ASPM L0s for sc8280xp, sa8540p and sa8295p (git-fixes). * PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes). * PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888). * PCI: switchtec: Add support for PCIe Gen5 devices (stable-fixes). * PCI: switchtec: Use normal comment style (stable-fixes). * PCI: tegra194: Fix probe path for Endpoint mode (git-fixes). * PM / devfreq: Synchronize devfreq_monitor_[start/stop] (stable-fixes). * PM: s2idle: Make sure CPUs will wakeup directly on resume (git-fixes). * Port "certs: Add ECDSA signature verification self-test". * Port "certs: Move RSA self-test data to separate file". * RAS/AMD/FMPM: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619). * RAS/AMD/FMPM: Fix build when debugfs is not enabled (jsc#PED-7619). * RAS/AMD/FMPM: Safely handle saved records of various sizes (jsc#PED-7619). * RDMA/IPoIB: Fix format truncation compilation errors (git-fixes) * RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes) * RDMA/cm: add timeout to cm_destroy_id wait (git-fixes) * RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw (git-fixes) * RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git- fixes) * RDMA/hns: Fix GMV table pagesize (git-fixes) * RDMA/hns: Fix UAF for cq async event (git-fixes) * RDMA/hns: Fix deadlock on SRQ async events. (git-fixes) * RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes) * RDMA/hns: Modify the print level of CQE error (git-fixes) * RDMA/hns: Use complete parentheses in macros (git-fixes) * RDMA/mana_ib: Fix bug in creation of dma regions (git-fixes). * RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes) * RDMA/mlx5: Change check for cacheable mkeys (git-fixes) * RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes) * RDMA/mlx5: Uncacheable mkey has neither rb_key or cache_ent (git-fixes) * RDMA/rxe: Allow good work requests to be executed (git-fixes) * RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes) * RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes) * RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes) * README.BRANCH: Remove copy of branch name * Reapply "drm/qxl: simplify qxl_fence_wait" (stable-fixes). * Refresh patches.suse/0002-PKCS-7-Check-codeSigning-EKU-for-kernel-module- and-k.patch (bsc#1222771). In preparation of enabling CONFIG_FIPS_SIGNATURE_SELFTEST, amend the missing 'usage' argument in the pkcs7_validate_trust() invocation from the PKCS#7 selftest. * Refresh patches.suse/ASoC-SOF-Intel-mtl-Implement-firmware-boot-state- che.patch. * Remove NTFSv3 from configs (bsc#1224429) References: bsc#1224429 comment#3 We only support fuse version of the NTFS-3g driver. Disable NTFSv3 from all configs. This was enabled in d016c04d731 ("Bump to 6.4 kernel (jsc#PED-4593)") * Rename patches.suse/Workaround-broken-chacha-crypto-fallback.patch to patches.suse/powerpc-crypto-chacha-p10-Fix-failure-on-non-Power10.patch. * Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default" (stable-fixes). * Revert "ASoC: SOF: Intel: hda-dai-ops: only allocate/release streams for first CPU DAI" (stable-fixes). * Revert "ASoC: SOF: Intel: hda-dai-ops: reset device count for SoundWire DAIs" (stable-fixes). * Revert "PCI/MSI: Provide IMS (Interrupt Message Store) support" (git-fixes). * Revert "PCI/MSI: Provide pci_ims_alloc/free_irq()" (git-fixes). * Revert "PCI/MSI: Provide stubs for IMS functions" (git-fixes). * Revert "cifs: reconnect work should have reference on server struct" (git- fixes, bsc#1225172). * Revert "drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()" (stable-fixes). * Revert "drm/amd/display: Fix sending VSC (+ colorimetry) packets for DP/eDP displays without PSR" (stable-fixes). * Revert "drm/amdkfd: fix gfx_target_version for certain 11.0.3 devices" (stable-fixes). * Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes). * Revert "drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor()" (stable-fixes). * Revert "drm/qxl: simplify qxl_fence_wait" (git-fixes). * Revert "iommu/amd: Enable PCI/IMS" (git-fixes). * Revert "iommu/vt-d: Enable PCI/IMS" (git-fixes). * Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (git- fixes). * Revert "net/mlx5e: Check the number of elements before walk TC rhashtable" (git-fixes). * Revert "selinux: introduce an initial SID for early boot processes" (bsc#1208593) It caused a regression on ALP-current branch, kernel-obs-qa build failed. * Revert "usb: cdc-wdm: close race between read and workqueue" (git-fixes). * Revert "usb: phy: generic: Get the vbus supply" (git-fixes). * SEV: disable SEV-ES DebugSwap by default (git-fixes). * SUNRPC: fix a memleak in gss_import_v2_context (git-fixes). * SUNRPC: fix some memleaks in gssx_dec_option_array (git-fixes). * USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes). * USB: core: Add hub_get() and hub_put() routines (stable-fixes). * USB: core: Fix access violation during port device removal (git-fixes). * USB: core: Fix deadlock in port "disable" sysfs attribute (stable-fixes). * USB: core: Fix deadlock in usb_deauthorize_interface() (git-fixes). * USB: serial: add device ID for VeriFone adapter (stable-fixes). * USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes). * USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable- fixes). * USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable- fixes). * USB: serial: option: add Fibocom FM135-GL variants (stable-fixes). * USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes). * USB: serial: option: add MeiG Smart SLM320 product (stable-fixes). * USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable- fixes). * USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes). * USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes). * USB: serial: option: support Quectel EM060K sub-models (stable-fixes). * Update patches.suse/Bluetooth-hci_sync-Don-t-double-print-name-in-add- re.patch (bsc#1216358). Added bugzilla reference * Update patches.suse/nvme-ensure-disabling-pairs-with-unquiesce.patch (jsc#PED-6252 jsc#PED-5728 jsc#PED-5062 jsc#PED-3535 bsc#1224534). * Update ath11k suspend patches from the latest subsystem tree (bsc#1207948). * Update config files. Disable N_GSM (jsc#PED-8240). * Update patches.suse/gpio-tegra186-Fix-tegra186_gpio_is_accessible- check.patch (git-fixes bsc#1223439) * Update patches.suse/powerpc-pseries-vas-Hold-mmap_mutex-after-mmap- lock-.patch (bsc#1012628 jsc#PED-542 git-fixes bsc#1213573 ltc#203238). * Update patches.suse/scsi-qedf-Don-t-process-stag-work-during-unload.patch (bsc#1214852) * Update patches.suse/scsi-qedf-Wait-for-stag-work-during-unload.patch (bsc#1214852) * VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes). * VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes). * Workaround broken chacha crypto fallback (bsc#1218205). * accel/ivpu: Fix deadlock in context_xa (git-fixes). * admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes). * ahci: asm1064: asm1166: do not limit reported ports (git-fixes). * ahci: asm1064: correct count of reported ports (stable-fixes). * amd/amdkfd: sync all devices to wait all processes being evicted (stable- fixes). * amdkfd: use calloc instead of kzalloc to avoid integer overflow (stable- fixes). * arm64/head: Disable MMU at EL2 before clearing HCR_EL2.E2H (git-fixes). * arm64/ptrace: Use saved floating point state type to determine SVE (git- fixes) * arm64/sve: Lower the maximum allocation for the SVE ptrace regset (git- fixes) * arm64: Add the arm64.no32bit_el0 command line option (jsc#PED-3184). Please note that some adjustments were needed since the upstream commit is based on kernel 6.9 which has idreg-override.c moved under arch/arm64/kernel/pi/. * arm64: bpf: fix 32bit unconditional bswap (git-fixes). * arm64: dts: Fix dtc interrupt_provider warnings (git-fixes) * arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes) * arm64: dts: allwinner: h616: Fix I2C0 pins (git-fixes) * arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes) * arm64: dts: hi3798cv200: fix the size of GICR (git-fixes) * arm64: dts: imx8-ss-conn: fix usb lpcg indices (git-fixes) * arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes) * arm64: dts: imx8-ss-dma: fix adc lpcg indices (git-fixes) * arm64: dts: imx8-ss-dma: fix can lpcg indices (git-fixes) * arm64: dts: imx8-ss-dma: fix spi lpcg indices (git-fixes) * arm64: dts: imx8-ss-lsio: fix pwm lpcg indices (git-fixes) * arm64: dts: imx8qm-ss-dma: fix can lpcg indices (git-fixes) * arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes) * arm64: dts: microchip: sparx5: fix mdio reg (git-fixes) * arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git- fixes) * arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git- fixes) * arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git- fixes) * arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git- fixes) * arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes) * arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git- fixes) * arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes) * arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes) * arm64: dts: rockchip: regulator for sd needs to be always on for (git-fixes) * arm64: dts: rockchip: set PHY address of MT7531 switch to 0x1f (git-fixes) * arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes). * arm64: tegra: Correct Tegra132 I2C alias (git-fixes) * arm64: tegra: Set the correct PHY mode for MGBE (git-fixes) * arm_pmu: acpi: Add a representative platform device for TRBE (bsc#1220587) * arm_pmu: acpi: Refactor arm_spe_acpi_register_device() (bsc#1220587) * asm-generic: make sparse happy with odd-sized put_unaligned_*() (stable- fixes). * ata: libata-core: Allow command duration limits detection for ACS-4 drives (git-fixes). * ata: pata_legacy: make legacy_exit() work again (git-fixes). * ata: sata_gemini: Check clk_enable() result (stable-fixes). * ata: sata_mv: Fix PCI device ID table declaration compilation warning (git- fixes). * ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes). * autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166). * ax25: Fix netdev refcount issue (git-fixes). * ax25: Fix reference count leak issue of net_device (git-fixes). * ax25: Fix reference count leak issues of ax25_dev (git-fixes). * ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes). * batman-adv: Avoid infinite loop trying to resize local TT (git-fixes). * bitops: add missing prototype check (git-fixes). * blacklist.conf: workqueues: system-wide nr_active enforcement patchset; not worth the risk (bsc#1225580) * blk-cgroup: fix list corruption from reorder of WRITE ->lqueued (bsc#1225605). * blk-cgroup: fix list corruption from resetting io stat (bsc#1225605). * block: fix q->blkg_list corruption during disk rebind (bsc#1223591). * bnx2x: Fix firmware version string character counts (git-fixes). * bnxt_en: Fix error recovery for RoCE ulp client (git-fixes). * bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() (git- fixes). * bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes). * bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git- fixes) * bootconfig: Fix the kerneldoc of _xbc_exit() (git-fixes). * bootconfig: use memblock_free_late to free xbc memory to buddy (git-fixes). * bootmem: use kmemleak_free_part_phys in free_bootmem_page (git-fixes). * bootmem: use kmemleak_free_part_phys in put_page_bootmem (git-fixes). * bpf, arm64: Fix incorrect runtime stats (git-fixes) * bpf, arm64: fix bug in BPF_LDX_MEMSX (git-fixes) * bpf, scripts: Correct GPL license name (git-fixes). * bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes). * bpf: fix precision backtracking instruction iteration (bsc#1225756). * bpf: handle ldimm64 properly in check_cfg() (bsc#1225756). * btrfs: add a helper to read the superblock metadata_uuid (git-fixes) * btrfs: add and use helper to check if block group is used (bsc#1220120). * btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes) * btrfs: add new unused block groups to the list of unused block groups (bsc#1220120). * btrfs: allow to run delayed refs by bytes to be released instead of count (bsc#1220120). * btrfs: always clear PERTRANS metadata during commit (git-fixes) * btrfs: always print transaction aborted messages with an error level (git- fixes) * btrfs: always reserve space for delayed refs when starting transaction (bsc#1220120). * btrfs: assert correct lock is held at btrfs_select_ref_head() (bsc#1220120). * btrfs: assert delayed node locked when removing delayed item (git-fixes) * btrfs: avoid start and commit empty transaction when flushing qgroups (bsc#1220120). * btrfs: avoid start and commit empty transaction when starting qgroup rescan (bsc#1220120). * btrfs: avoid starting and committing empty transaction when flushing space (bsc#1220120). * btrfs: avoid starting new transaction when flushing delayed items and refs (bsc#1220120). * btrfs: check for BTRFS_FS_ERROR in pending ordered assert (git-fixes) * btrfs: compare the correct fsid/metadata_uuid in btrfs_validate_super (git- fixes) * btrfs: defrag: avoid unnecessary defrag caused by incorrect extent size (git-fixes) * btrfs: defrag: reject unknown flags of btrfs_ioctl_defrag_range_args (git- fixes) * btrfs: do not allow non subvolume root targets for snapshot (git-fixes) * btrfs: do not arbitrarily slow down delalloc if we're committing (git-fixes) * btrfs: do not delete unused block group if it may be used soon (bsc#1220120). * btrfs: do not refill whole delayed refs block reserve when starting transaction (bsc#1220120). * btrfs: do not start transaction when joining with TRANS_JOIN_NOSTART (git- fixes) * btrfs: do not steal space from global rsv after a transaction abort (bsc#1220120). * btrfs: do not warn if discard range is not aligned to sector (git-fixes) * btrfs: ensure fiemap does not race with writes when FIEMAP_FLAG_SYNC is given (bsc#1223285). * btrfs: error out when COWing block using a stale transaction (git-fixes) * btrfs: error out when reallocating block for defrag using a stale transaction (git-fixes) * btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes) * btrfs: fail priority metadata ticket with real fs error (bsc#1220120). * btrfs: file_remove_privs needs an exclusive lock in direct io write (git- fixes) * btrfs: fix 64bit compat send ioctl arguments not initializing version member (git-fixes) * btrfs: fix deadlock with fiemap and extent locking (bsc#1223285). * btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes) * btrfs: fix kvcalloc() arguments order in btrfs_ioctl_send() (git-fixes) * btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes) * btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes) * btrfs: fix off-by-one when checking chunk map includes logical address (git- fixes) * btrfs: fix race between ordered extent completion and fiemap (bsc#1223285). * btrfs: fix race when detecting delalloc ranges during fiemap (bsc#1223285). * btrfs: fix race when refilling delayed refs block reserve (git-fixes) * btrfs: fix start transaction qgroup rsv double free (git-fixes) * btrfs: fix stripe length calculation for non-zoned data chunk allocation (bsc#1217489). * btrfs: fix wrong block_start calculation for btrfs_drop_extent_map_range() (git-fixes) Dropped hunk in selftests (test_case_7), 92e1229b204d6. * btrfs: free qgroup rsv on io failure (git-fixes) * btrfs: free the allocated memory if btrfs_alloc_page_array() fails (git- fixes) * btrfs: get rid of label and goto at insert_delayed_ref() (bsc#1220120). * btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git- fixes) * btrfs: handle errors properly in update_inline_extent_backref() (git-fixes) * btrfs: initialize key where it's used when running delayed data ref (bsc#1220120). * btrfs: log message if extent item not found when running delayed extent op (bsc#1220120). * btrfs: make btrfs_cleanup_fs_roots() static (bsc#1220120). * btrfs: make btrfs_destroy_delayed_refs() return void (bsc#1220120). * btrfs: make btrfs_destroy_marked_extents() return void (bsc#1220120). * btrfs: make btrfs_destroy_pinned_extent() return void (bsc#1220120). * btrfs: make error messages more clear when getting a chunk map (git-fixes) * btrfs: make find_first_extent_bit() return a boolean (bsc#1220120). * btrfs: make find_free_dev_extent() static (bsc#1220120). * btrfs: make insert_delayed_ref() return a bool instead of an int (bsc#1220120). * btrfs: merge find_free_dev_extent() and find_free_dev_extent_start() (bsc#1220120). * btrfs: move btrfs_free_excluded_extents() into block-group.c (bsc#1220120). * btrfs: open code trivial btrfs_add_excluded_extent() (bsc#1220120). * btrfs: output extra debug info if we failed to find an inline backref (git- fixes) * btrfs: pass a space_info argument to btrfs_reserve_metadata_bytes() (bsc#1220120). * btrfs: prevent transaction block reserve underflow when starting transaction (git-fixes) * btrfs: print available space across all block groups when dumping space info (bsc#1220120). * btrfs: print available space for a block group when dumping a space info (bsc#1220120). * btrfs: print block group super and delalloc bytes when dumping space info (bsc#1220120). * btrfs: print target number of bytes when dumping free space (bsc#1220120). * btrfs: qgroup: always free reserved space for extent records (bsc#1216196). * btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans (git- fixes) * btrfs: record delayed inode root in transaction (git-fixes) * btrfs: reject encoded write if inode has nodatasum flag set (git-fixes) * btrfs: release path before inode lookup during the ino lookup ioctl (git- fixes) * btrfs: remove pointless 'ref_root' variable from run_delayed_data_ref() (bsc#1220120). * btrfs: remove pointless in_tree field from struct btrfs_delayed_ref_node (bsc#1220120). * btrfs: remove pointless initialization at btrfs_delayed_refs_rsv_release() (bsc#1220120). * btrfs: remove redundant BUG_ON() from __btrfs_inc_extent_ref() (bsc#1220120). * btrfs: remove refs_to_add argument from __btrfs_inc_extent_ref() (bsc#1220120). * btrfs: remove refs_to_drop argument from __btrfs_free_extent() (bsc#1220120). * btrfs: remove the refcount warning/check at btrfs_put_delayed_ref() (bsc#1220120). * btrfs: remove unnecessary logic when running new delayed references (bsc#1220120). * btrfs: remove unnecessary prototype declarations at disk-io.c (bsc#1220120). * btrfs: remove unused is_head field from struct btrfs_delayed_ref_node (bsc#1220120). * btrfs: rename add_new_free_space() to btrfs_add_new_free_space() (bsc#1220120). * btrfs: reorder some members of struct btrfs_delayed_ref_head (bsc#1220120). * btrfs: reserve space for delayed refs on a per ref basis (bsc#1220120). * btrfs: reset destination buffer when read_extent_buffer() gets invalid range (git-fixes) * btrfs: return -EUCLEAN for delayed tree ref with a ref count not equals to 1 (git-fixes) * btrfs: return -EUCLEAN if extent item is missing when searching inline backref (bsc#1220120). * btrfs: return real error when orphan cleanup fails due to a transaction abort (bsc#1220120). * btrfs: send: do not issue unnecessary zero writes for trailing hole (bsc#1222459). * btrfs: send: ensure send_fd is writable (git-fixes) * btrfs: send: handle path ref underflow in header iterate_inode_ref() (git- fixes) * btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes) * btrfs: set page extent mapped after read_folio in relocate_one_page (git- fixes) * btrfs: simplify check for extent item overrun at lookup_inline_extent_backref() (bsc#1220120). * btrfs: stop doing excessive space reservation for csum deletion (bsc#1220120). * btrfs: store the error that turned the fs into error state (bsc#1220120). * btrfs: sysfs: validate scrub_speed_max value (git-fixes) * btrfs: tree-checker: fix inline ref size in error messages (git-fixes) * btrfs: update comment for btrfs_join_transaction_nostart() (bsc#1220120). * btrfs: update documentation for add_new_free_space() (bsc#1220120). * btrfs: use a bool to track qgroup record insertion when adding ref head (bsc#1220120). * btrfs: use a single switch statement when initializing delayed ref head (bsc#1220120). * btrfs: use a single variable for return value at lookup_inline_extent_backref() (bsc#1220120). * btrfs: use a single variable for return value at run_delayed_extent_op() (bsc#1220120). * btrfs: use bool type for delayed ref head fields that are used as booleans (bsc#1220120). * btrfs: use the correct superblock to compare fsid in btrfs_validate_super (git-fixes) * btrfs: use u64 for buffer sizes in the tree search ioctls (git-fixes) * btrfs: zoned: do not skip block groups with 100% zone unusable (bsc#1220120). * bus: mhi: ep: check the correct variable in mhi_ep_register_controller() (git-fixes). * ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE (bsc#1224866). * ceph: stop copying to iter at EOF on sync reads (bsc#1222606). * certs: Add ECDSA signature verification self-test (bsc#1222777). * certs: Move RSA self-test data to separate file (bsc#1222777). * cifs: Do not use certain unnecessary folio_*() functions (bsc#1225172). * cifs: account for primary channel in the interface list (bsc#1225172). * cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1225172). * cifs: distribute channels across interfaces based on speed (bsc#1225172). * cifs: do not pass cifs_sb when trying to add channels (bsc#1225172). * cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1225172). * cifs: fix charset issue in reconnection (bsc#1225172). * cifs: fix leak of iface for primary channel (git-fixes, bsc#1225172). * cifs: handle cases where a channel is closed (bsc#1225172). * cifs: handle cases where multiple sessions share connection (bsc#1225172). * cifs: reconnect work should have reference on server struct (bsc#1225172). * clk: Do not hold prepare_lock when calling kref_put() (stable-fixes). * clk: Get runtime PM before walking tree during disable_unused (git-fixes). * clk: Get runtime PM before walking tree for clk_summary (git-fixes). * clk: Initialize struct clk_core kref earlier (stable-fixes). * clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes). * clk: Show active consumers of clocks in debugfs (stable-fixes). * clk: mediatek: Do a runtime PM get on controllers during probe (git-fixes). * clk: mediatek: mt8365-mm: fix DPI0 parent (git-fixes). * clk: mediatek: pllfh: Do not log error for missing fhctl node (git-fixes). * clk: qcom: clk-alpha-pll: fix rate setting for Stromer PLLs (git-fixes). * clk: qcom: clk-alpha-pll: remove invalid Stromer register offset (git- fixes). * clk: qcom: dispcc-sm6350: fix DisplayPort clocks (git-fixes). * clk: qcom: dispcc-sm8450: fix DisplayPort clocks (git-fixes). * clk: qcom: dispcc-sm8550: fix DisplayPort clocks (git-fixes). * clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes). * clk: qcom: reset: Commonize the de/assert functions (stable-fixes). * clk: qcom: reset: Ensure write completion on reset de/assertion (git-fixes). * clk: renesas: r8a779a0: Fix CANFD parent clock (git-fixes). * clk: renesas: r9a07g043: Add clock and reset entry for PLIC (git-fixes). * clk: rs9: fix wrong default value for clock amplitude (git-fixes). * clk: samsung: exynosautov9: fix wrong pll clock id value (git-fixes). * clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (git-fixes). * clocksource/drivers/arm_global_timer: Fix maximum prescaler value (git- fixes). * clocksource/drivers/imx: Fix -Wunused-but-set-variable warning (git-fixes). * comedi: vmk80xx: fix incomplete endpoint checking (git-fixes). * coresight: trbe: Add a representative coresight_platform_data for (bsc#1220587) * coresight: trbe: Allocate platform data per device (bsc#1220587) * coresight: trbe: Enable ACPI based TRBE devices (bsc#1220587) * counter: linux/counter.h: fix Excess kernel-doc description warning (git- fixes). * cppc_cpufreq: Fix possible null pointer dereference (git-fixes). * cpufreq: brcmstb-avs-cpufreq: ISO C90 forbids mixed declarations (git- fixes). * cpufreq: exit() callback is optional (git-fixes). * cpumask: Add for_each_cpu_from() (bsc#1225053). * crypto: bcm - Fix pointer arithmetic (git-fixes). * crypto: ccp - Add support for PCI device 0x156E (bsc#1223338). * crypto: ccp - Add support for PCI device 0x17E0 (bsc#1223338). * crypto: ccp - drop platform ifdef checks (git-fixes). * crypto: ecc - update ecc_gen_privkey for FIPS 186-5 (bsc#1222782). * crypto: ecdsa - Fix module auto-load on add-key (git-fixes). * crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init (git-fixes). * crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (git-fixes). * crypto: qat - fix ring to service map for dcc in 4xxx (git-fixes). * crypto: qat - improve error logging to be consistent across features (git- fixes). * crypto: qat - relocate and rename get_service_enabled() (stable-fixes). * crypto: qat - specify firmware files for 402xx (git-fixes). * crypto: rsa - add a check for allocation failure (bsc#1222775). * crypto: rsa - allow only odd e and restrict value in FIPS mode (bsc#1222775). * crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c (bsc#1222769). * crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes). * cxl/acpi: Fix load failures due to single window creation failure (git- fixes). * cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window (git-fixes). * cxl/trace: Properly initialize cxl_poison region name (git-fixes). * dax/bus.c: replace driver-core lock usage by a local rwsem (jsc#PED-5853). * dax/bus.c: replace several sprintf() with sysfs_emit() (jsc#PED-5853). * dax: alloc_dax() return ERR_PTR(-EOPNOTSUPP) for CONFIG_DAX=n (jsc#PED-5853). * device-dax: make dax_bus_type const (jsc#PED-5853). * dlm: fix user space lkb refcounting (git-fixes). * dm crypt: remove redundant state settings after waking up (jsc#PED-7542). * dm thin: add braces around conditional code that spans lines (jsc#PED-7542). * dm verity: set DM_TARGET_SINGLETON feature flag (jsc#PED-7542). * dm-integrity: set max_integrity_segments in dm_integrity_io_hints (jsc#PED-7542). * dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575). * dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape (bsc#1219596) Also update diff context in patches.suse/dm-raid- fix-false-positive-for-requeue-needed-during-b25b.patch * dm-raid: add a new helper prepare_suspend() in md_personality (jsc#PED-7542). * dm-raid: really frozen sync_thread during suspend (jsc#PED-7542). * dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes). * dm: update relevant MODULE_AUTHOR entries to latest dm-devel mailing list (jsc#PED-7542). * dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (git-fixes). * dma-buf: Fix NULL pointer dereference in sanitycheck() (git-fixes). * dma-mapping: benchmark: fix node id validation (git-fixes). * dma-mapping: benchmark: handle NUMA_NO_NODE correctly (git-fixes). * dma: xilinx_dpdma: Fix locking (git-fixes). * dmaengine: axi-dmac: fix possible race in remove() (git-fixes). * dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes). * dmaengine: idxd: Avoid unnecessary destruction of file_ida (git-fixes). * dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes). * dmaengine: owl: fix register access functions (git-fixes). * dmaengine: tegra186: Fix residual calculation (git-fixes). * docs: Restore "smart quotes" for quotes (stable-fixes). * docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes). * docs: netdev: Fix typo in Signed-off-by tag (git-fixes). * driver core: Introduce device_link_wait_removal() (stable-fixes). * drivers/nvme: Add quirks for device 126f:2262 (git-fixes). * drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() (stable-fixes). * drm/amd/display: Add dml2 copy functions (stable-fixes). * drm/amd/display: Allow dirty rects to be sent to dmub when abm is active (stable-fixes). * drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes). * drm/amd/display: Change default size for dummy plane in DML2 (stable-fixes). * drm/amd/display: Do not recursively call manual trigger programming (stable- fixes). * drm/amd/display: Enable colorspace property for MST connectors (git-fixes). * drm/amd/display: Fix bounds check for dcn35 DcfClocks (git-fixes). * drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes). * drm/amd/display: Fix idle check for shared firmware state (stable-fixes). * drm/amd/display: Fix incorrect DSC instance for MST (stable-fixes). * drm/amd/display: Fix nanosec stat overflow (stable-fixes). * drm/amd/display: Fix noise issue on HDMI AV mute (stable-fixes). * drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes). * drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes). * drm/amd/display: Init DPPCLK from SMU on dcn32 (stable-fixes). * drm/amd/display: Override min required DCFCLK in dml1_validate (stable- fixes). * drm/amd/display: Prevent crash when disable stream (stable-fixes). * drm/amd/display: Program VSC SDP colorimetry for all DP sinks >= 1.4 (stable-fixes). * drm/amd/display: Remove MPC rate control logic from DCN30 and above (stable- fixes). * drm/amd/display: Remove redundant condition in dcn35_calc_blocks_to_gate() (git-fixes). * drm/amd/display: Return the correct HDCP error code (stable-fixes). * drm/amd/display: Send DTBCLK disable message on first commit (git-fixes). * drm/amd/display: Set DCN351 BB and IP the same as DCN35 (stable-fixes). * drm/amd/display: Set VSC SDP Colorimetry same way for MST and SST (stable- fixes). * drm/amd/display: Update odm when ODM combine is changed on an otg master pipe with no plane (stable-fixes). * drm/amd/display: Use freesync when `DRM_EDID_FEATURE_CONTINUOUS_FREQ` found (stable-fixes). * drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes). * drm/amd/display: fix input states translation error for dcn35 & dcn351 (stable-fixes). * drm/amd/display: handle range offsets in VRR ranges (stable-fixes). * drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes). * drm/amd/swsmu: modify the gfx activity scaling (stable-fixes). * drm/amd: Flush GFXOFF requests in prepare stage (git-fixes). * drm/amdgpu/display: Address kdoc for 'is_psr_su' in 'fill_dc_dirty_rects' (git-fixes). * drm/amdgpu/pm: Check the validity of overdiver power limit (git-fixes). * drm/amdgpu/pm: Fix NULL pointer dereference when get power limit (git- fixes). * drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes). * drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes). * drm/amdgpu: Assign correct bits for SDMA HDP flush (stable-fixes). * drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable- fixes). * drm/amdgpu: Fix VCN allocation in CPX partition (stable-fixes). * drm/amdgpu: Fix comparison in amdgpu_res_cpu_visible (git-fixes). * drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes). * drm/amdgpu: Refine IB schedule error logging (stable-fixes). * drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes). * drm/amdgpu: always force full reset for SOC21 (stable-fixes). * drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes). * drm/amdgpu: drop setting buffer funcs in sdma442 (git-fixes). * drm/amdgpu: fix deadlock while reading mqd from debugfs (git-fixes). * drm/amdgpu: fix doorbell regression (git-fixes). * drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes). * drm/amdgpu: fix mmhub client id out-of-bounds access (git-fixes). * drm/amdgpu: fix use-after-free bug (stable-fixes). * drm/amdgpu: fix visible VRAM handling during faults (git-fixes). * drm/amdgpu: implement IRQ_STATE_ENABLE for SDMA v4.4.2 (stable-fixes). * drm/amdgpu: make damage clips support configurable (stable-fixes). * drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes). * drm/amdgpu: remove invalid resource->start check v2 (git-fixes). * drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes). * drm/amdkfd: Check cgroup when returning DMABuf info (stable-fixes). * drm/amdkfd: Fix memory leak in create_process failure (git-fixes). * drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes). * drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git- fixes). * drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes). * drm/amdkfd: range check cp bad op exception interrupts (stable-fixes). * drm/arm/malidp: fix a possible null pointer dereference (git-fixes). * drm/ast: Fix soft lockup (git-fixes). * drm/bridge: Fix improper bridge init order with pre_enable_prev_first (git- fixes). * drm/bridge: anx7625: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: anx7625: Update audio status while detecting (git-fixes). * drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: icn6211: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611uxc: Do not log an error when DSI host can't be found (git-fixes). * drm/bridge: tc358775: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes). * drm/buddy: check range allocation matches alignment (stable-fixes). * drm/client: Fully protect modes[] with dev->mode_config.mutex (stable- fixes). * drm/connector: Add \n to message about demoting connector force-probes (git- fixes). * drm/display: fix typo (git-fixes). * drm/exynos: do not return negative values from .get_modes() (stable-fixes). * drm/fbdev-generic: Do not set physical framebuffer address (git-fixes). * drm/gma500: Remove lid code (git-fixes). * drm/i915/audio: Fix audio time stamp programming for DP (stable-fixes). * drm/i915/bios: Fix parsing backlight BDB data (git-fixes). * drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (stable-fixes). * drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git- fixes). * drm/i915/display: Use i915_gem_object_get_dma_address to get dma address (stable-fixes). * drm/i915/dp: Fix the computation for compressed_bpp for DISPLAY < 13 (git-fixes). * drm/i915/dp: Remove support for UHBR13.5 (git-fixes). * drm/i915/dpt: Make DPT object unshrinkable (git-fixes). * drm/i915/dsb: Fix DSB vblank waits when using VRR (git-fixes). * drm/i915/dsi: Go back to the previous INIT_OTP/DISPLAY_ON order, mostly (git-fixes). * drm/i915/gt: Automate CCS Mode setting during engine resets (git-fixes). * drm/i915/gt: Disable HW load balancing for CCS (git-fixes). * drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes). * drm/i915/gt: Do not generate the command streamer for all the CCS (git- fixes). * drm/i915/gt: Enable only one CCS for compute workload (git-fixes). * drm/i915/gt: Fix CCS id's calculation for CCS mode setting (git-fixes). * drm/i915/gt: Reset queue_priority_hint on parking (git-fixes). * drm/i915/guc: avoid FIELD_PREP warning (git-fixes). * drm/i915/hwmon: Fix locking inversion in sysfs getter (git-fixes). * drm/i915/lspcon: Separate function to set expected mode (bsc#1193599). * drm/i915/lspcon: Separate lspcon probe and lspcon init (bsc#1193599). * drm/i915/mst: Limit MST+DSC to TGL+ (git-fixes). * drm/i915/mst: Reject FEC+MST on ICL (git-fixes). * drm/i915/mtl: Update workaround 14018575942 (git-fixes). * drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes). * drm/i915/vrr: Generate VRR "safe window" for DSB (git-fixes). * drm/i915: Disable port sync when bigjoiner is used (stable-fixes). * drm/i915: Do not match JSL in ehl_combo_pll_div_frac_wa_needed() (git- fixes). * drm/i915: Fix audio component initialization (git-fixes). * drm/i915: Include the PLL name in the debug messages (stable-fixes). * drm/i915: Pre-populate the cursor physical dma address (git-fixes). * drm/i915: Replace a memset() with zero initialization (stable-fixes). * drm/i915: Stop printing pipe name as hex (stable-fixes). * drm/i915: Suppress old PLL pipe_mask checks for MG/TC/TBT PLLs (stable- fixes). * drm/i915: Try to preserve the current shared_dpll for fastset on type-c ports (stable-fixes). * drm/i915: Use named initializers for DPLL info (stable-fixes). * drm/imx/ipuv3: do not return negative values from .get_modes() (stable- fixes). * drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes). * drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes). * drm/mediatek: Init `ddp_comp` with devm_kcalloc() (git-fixes). * drm/mediatek: dp: Fix mtk_dp_aux_transfer return value (git-fixes). * drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes). * drm/meson: dw-hdmi: power up phy on device init (git-fixes). * drm/meson: gate px_clk when setting rate (git-fixes). * drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes). * drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git- fixes). * drm/msm/adreno: fix CP cycles stat retrieval on a7xx (git-fixes). * drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git- fixes). * drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes). * drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes). * drm/msm/dpu: Add callback function pointer check before its call (git- fixes). * drm/msm/dpu: Allow configuring multiple active DSC blocks (git-fixes). * drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes). * drm/msm/dpu: do not allow overriding data from catalog (git-fixes). * drm/msm/dpu: make error messages at dpu_core_irq_register_callback() more sensible (git-fixes). * drm/msm/dpu: use devres-managed allocation for MDP TOP (stable-fixes). * drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes). * drm/msm: Add newlines to some debug prints (git-fixes). * drm/nouveau/disp: Fix missing backlight control on Macbook 5, 1 (bsc#1223838). * drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes). * drm/nouveau/dp: Fix incorrect return code in r535_dp_aux_xfer() (git-fixes). * drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (stable- fixes). * drm/nouveau: use tile_mode and pte_kind for VM_BIND bo allocations (git- fixes). * drm/omapdrm: Fix console by implementing fb_dirty (git-fixes). * drm/panel: do not return negative error codes from drm_panel_get_modes() (stable-fixes). * drm/panel: ili9341: Respect deferred probe (git-fixes). * drm/panel: ili9341: Use predefined error codes (git-fixes). * drm/panel: ltk050h3146w: add MIPI_DSI_MODE_VIDEO to LTK050H3148W flags (git- fixes). * drm/panel: ltk050h3146w: drop duplicate commands from LTK050H3148W init (git-fixes). * drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes). * drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes). * drm/panel: sitronix-st7789v: fix display size for jt240mhqs_hwt_ek_e3 panel (git-fixes). * drm/panel: sitronix-st7789v: fix timing for jt240mhqs_hwt_ek_e3 panel (git- fixes). * drm/panel: sitronix-st7789v: tweak timing for jt240mhqs_hwt_ek_e3 panel (git-fixes). * drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes). * drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() (git- fixes). * drm/panfrost: fix power transition timeout warnings (git-fixes). * drm/prime: Unbreak virtgpu dma-buf export (git-fixes). * drm/probe-helper: warn about negative .get_modes() (stable-fixes). * drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git- fixes). * drm/qxl: remove unused variable from `qxl_process_single_command()` (git- fixes). * drm/radeon: make -fstrict-flex-arrays=3 happy (git-fixes). * drm/radeon: silence UBSAN warning (v3) (stable-fixes). * drm/rockchip: vop2: Do not divide height twice for YUV (git-fixes). * drm/rockchip: vop2: Remove AR30 and AB30 format support (git-fixes). * drm/sched: fix null-ptr-deref in init entity (git-fixes). * drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (git-fixes). * drm/ttm: return ENOSPC from ttm_bo_mem_space v3 (stable-fixes). * drm/ttm: stop pooling cached NUMA pages v2 (git-fixes). * drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes). * drm/vc4: hdmi: do not return negative values from .get_modes() (stable- fixes). * drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git- fixes). * drm/vmwgfx: Enable DMA mappings with SEV (git-fixes). * drm/vmwgfx: Fix Legacy Display Unit (git-fixes). * drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes). * drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes). * drm/vmwgfx: Fix prime import/export (git-fixes). * drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes). * drm: Check output polling initialized before disabling (stable-fixes). * drm: Check polling initialized before enabling in drm_helper_probe_single_connector_modes (stable-fixes). * drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes). * drm: add drm_gem_object_is_shared_for_memory_stats() helper (stable-fixes). * drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git- fixes). * drm: nv04: Fix out of bounds access (git-fixes). * drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes). * drm: vc4: Fix possible null pointer dereference (git-fixes). * drm: zynqmp_dpsub: Always register bridge (git-fixes). * dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes) * dump_stack: Do not get cpu_sync for panic CPU (bsc#1225607). * dyndbg: fix old BUG_ON in >control parser (stable-fixes). * e1000e: Minor flow correction in e1000_shutdown function (git-fixes). * e1000e: Workaround for sporadic MDI error on Meteor Lake systems (git- fixes). * e1000e: move force SMBUS from enable ulp function to avoid PHY loss issue (git-fixes). * ecryptfs: Fix buffer size for tag 66 packet (git-fixes) * ecryptfs: Reject casefold directory inodes (git-fixes) * efi/unaccepted: do not let /proc/vmcore try to access unaccepted memory (git-fixes). * efi/unaccepted: touch soft lockup during memory accept (git-fixes). * efi: disable mirror feature during crashkernel (stable-fixes). * efi: fix panic in kdump kernel (git-fixes). * efi: libstub: only free priv.runtime_map when allocated (git-fixes). * extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes). * fast_dput(): handle underflows gracefully (git-fixes) * fat: fix uninitialized field in nostale filehandles (git-fixes) * fbdev: fix incorrect address computation in deferred IO (git-fixes). * fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes). * fbdev: sh7760fb: allow modular build (git-fixes). * fbdev: shmobile: fix snprintf truncation (git-fixes). * fbdev: sisfb: hide unused variables (git-fixes). * fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes). * fbmon: prevent division by zero in fb_videomode_from_videomode() (stable- fixes). * firewire: core: use long bus reset on gap count error (stable-fixes). * firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes). * firmware: arm_scmi: Make raw debugfs entries non-seekable (git-fixes). * firmware: dmi-id: add a release callback function (git-fixes). * firmware: raspberrypi: Use correct device for DMA mappings (git-fixes). * firmware: tegra: bpmp: Return directly after a failed kzalloc() in get_filename() (stable-fixes). * fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes) * fs/9p: translate O_TRUNC into OTRUNC (git-fixes) * fs: Fix error checking for d_hash_and_lookup() (git-fixes) * fs: indicate request originates from old mount API (git-fixes) * fs: relax mount_setattr() permission checks (git-fixes) * fsverity: skip PKCS#7 parser when keyring is empty (git-fixes) * ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes). * fuse: do not unhash root (bsc#1223946). * fuse: fix root lookup with nonzero generation (bsc#1223945). * geneve: fix header validation in geneve[6]_xmit_skb (git-fixes). * geneve: make sure to pull inner header in geneve_rx() (git-fixes). * gpio: cdev: check for NULL labels when sanitizing them for irqs (git-fixes). * gpio: cdev: fix missed label sanitizing in debounce_setup() (git-fixes). * gpio: cdev: sanitize the label before requesting the interrupt (stable- fixes). * gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes). * gpio: tangier: Use correct type for the IRQ chip data (git-fixes). * gpio: tegra186: Fix tegra186_gpio_is_accessible() check (git-fixes). * gpio: wcove: Use -ENOTSUPP consistently (stable-fixes). * gpiolib: cdev: fix uninitialised kfifo (git-fixes). * gpiolib: cdev: relocate debounce_period_us from struct gpio_desc (stable- fixes). * gpiolib: swnode: Remove wrong header inclusion (git-fixes). * gpu: host1x: Do not setup DMA for virtual devices (stable-fixes). * gtp: fix use-after-free and null-ptr-deref in gtp_newlink() (git-fixes). * hwmon: (amc6821) add of_match table (stable-fixes). * hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git- fixes). * hwmon: (corsair-cpro) Use a separate buffer for sending commands (git- fixes). * hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes). * hwmon: (intel-m10-bmc-hwmon) Fix multiplier for N6000 board power sensor (git-fixes). * hwmon: (lm70) fix links in doc and comments (git-fixes). * hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes). * hwmon: (shtc1) Fix property misspelling (git-fixes). * hwtracing: hisi_ptt: Move type check to the beginning of hisi_ptt_pmu_event_init() (git-fixes). * i2c: cadence: Avoid fifo clear after start (git-fixes). * i2c: pxa: hide unused icr_bits[] variable (git-fixes). * i2c: smbus: fix NULL function pointer dereference (git-fixes). * i2c: synquacer: Fix an error handling path in synquacer_i2c_probe() (git- fixes). * i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes). * i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes). * i40e: Enforce software interrupt during busy-poll exit (git-fixes). * i40e: Fix VF MAC filter removal (git-fixes). * i40e: Fix firmware version comparison function (git-fixes). * i40e: disable NAPI right after disabling irqs when handling xsk_pool (git- fixes). * i40e: fix i40e_count_filters() to count only active/new filters (git-fixes). * i40e: fix vf may be used uninitialized in this function warning (git-fixes). * i915: make inject_virtual_interrupt() void (stable-fixes). * ice: Refactor FW data type and fix bitmap casting issue (git-fixes). * ice: fix enabling RX VLAN filtering (git-fixes). * ice: fix memory corruption bug with suspend and rebuild (git-fixes). * ice: fix stats being updated by way too large values (git-fixes). * ice: fix typo in assignment (git-fixes). * ice: fix uninitialized dplls mutex usage (git-fixes). * ice: reconfig host after changing MSI-X on VF (git-fixes). * ice: reorder disabling IRQ and NAPI in ice_qp_dis (git-fixes). * ice: use relative VSI index for VFs instead of PF VSI number (git-fixes). * ice: virtchnl: stop pretending to support RSS over AQ or registers (git- fixes). * ida: make 'ida_dump' static (git-fixes). * idma64: Do not try to serve interrupts when device is powered off (git- fixes). * idpf: disable local BH when scheduling napi for marker packets (git-fixes). * idpf: extend tx watchdog timeout (bsc#1224137). * idpf: fix kernel panic on unknown packet types (git-fixes). * igb: Fix missing time sync events (git-fixes). * igb: extend PTP timestamp adjustments to i211 (git-fixes). * igc: Fix missing time sync events (git-fixes). * igc: Remove stale comment about Tx timestamping (git-fixes). * igc: avoid returning frame twice in XDP_REDIRECT (git-fixes). * iio: accel: mxc4005: Interrupt handling fixes (git-fixes). * iio: adc: stm32: Fixing err code to not indicate success (git-fixes). * iio: core: Leave private pointer NULL when no private data supplied (git- fixes). * iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes). * iio: gts-helper: Fix division loop (git-fixes). * iio: pressure: Fixes BME280 SPI driver data (git-fixes). * iio: pressure: dps310: support negative temperature values (git-fixes). * iio:imu: adis16475: Fix sync mode setting (git-fixes). * inet: frags: eliminate kernel-doc warning (git-fixes). * inet_diag: annotate data-races around inet_diag_table[] (git-fixes). * init/main.c: Fix potential static_command_line memory overflow (git-fixes). * init: open /initrd.image with O_LARGEFILE (stable-fixes). * input/touchscreen: imagis: Correct the maximum touch area value (stable- fixes). * intel: legacy: Partial revert of field get conversion (git-fixes). * interconnect: qcom: osm-l3: Replace custom implementation of COUNT_ARGS() (git-fixes). * interconnect: qcom: qcm2290: Fix mas_snoc_bimc QoS port assignment (git- fixes). * interconnect: qcom: sc8180x: Mark CO0 BCM keepalive (git-fixes). * interconnect: qcom: sm8550: Enable sync_state (git-fixes). * io_uring: kabi cookie remove (bsc#1217384). * iomap: clear the per-folio dirty bits on all writeback failures (git-fixes) * iommu/arm-smmu-v3: Check that the RID domain is S1 in SVA (git-fixes). * iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331) * iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes). * iommu/vt-d: Allocate local memory for page request queue (git-fixes). * iommu/vt-d: Fix wrong use of pasid config (git-fixes). * iommu/vt-d: Set SSADE when attaching to a parent with dirty tracking (git- fixes). * iommu: Map reserved memory as cacheable if device is coherent (git-fixes). * iommufd/iova_bitmap: Bounds check mapped::pages access (git-fixes). * iommufd/iova_bitmap: Consider page offset for the pages to be pinned (git- fixes). * iommufd/iova_bitmap: Switch iova_bitmap::bitmap to an u8 array (git-fixes). * iommufd: Add missing IOMMUFD_DRIVER kconfig for the selftest (git-fixes). * iommufd: Fix iopt_access_list_id overwrite bug (git-fixes). * iommufd: Reject non-zero data_type if no data_len is provided (git-fixes). * ionic: set adminq irq affinity (git-fixes). * ipv4: annotate data-races around fi->fib_dead (git-fixes). * irqchip/alpine-msi: Fix off-by-one in allocation error path (git-fixes). * irqchip/armada-370-xp: Suppress unused-function warning (git-fixes). * irqchip/gic-v3-its: Do not assume vPE tables are preallocated (git-fixes). * irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git- fixes). * irqchip/gic-v3-its: Prevent double free on error (git-fixes). * irqchip/loongson-pch-msi: Fix off-by-one on allocation error path (git- fixes). * irqchip/mbigen: Do not use bus_get_dev_root() to find the parent (git- fixes). * irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on register's index (stable-fixes). * irqchip/renesas-rzg2l: Flush posted write in irq_eoi() (git-fixes). * irqchip/renesas-rzg2l: Implement restriction when writing ISCR register (stable-fixes). * irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type (git-fixes). * irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() (stable-fixes). * irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() (stable-fixes). * ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes). * ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes). * jffs2: prevent xattr node from overflowing the eraseblock (git-fixes). * kABI fix of KVM: x86/pmu: Allow programming events that match unsupported arch events (bsc#1225696). * kABI fix of KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible (git-fixes). * kABI workaround for cs35l56 (git-fixes). * kABI workaround for of driver changes (git-fixes). * kABI: Adjust trace_iterator.wait_index (git-fixes). * kabi fix of perf/x86/intel: Expose existence of callback support to KVM (git fixes). * kabi/severities: Remove mitigation-related symbols Those are used by the core kernel to implement CPU vulnerabilities mitigation and are not expected to be consumed by 3rd party users. * kabi/severities: ignore IMS functions They were dropped in previous patches. Noone is supposed to use them. * kabi/severities: ignore TAS2781 symbol drop, it's only locally used * kabi/severities: ignore Wangxun ethernet driver local symbols * kabi/severities: ignore brcmfmac-specific local symbols * kasan, fortify: properly rename memintrinsics (git-fixes). * kasan/test: avoid gcc warning for intentional overflow (git-fixes). * kasan: disable kasan_non_canonical_hook() for HW tags (git-fixes). * kasan: print the original fault addr when access invalid shadow (git-fixes). * kbuild: Move -Wenum-{compare-conditional,enum-conversion} into W=1 (stable- fixes). * kconfig: fix infinite loop when expanding a macro at the end of file (git- fixes). * kexec: do syscore_shutdown() in kernel_kexec (git-fixes). * kprobes: Fix possible use-after-free issue on kprobe registration (git- fixes). * kselftest: Add a ksft_perror() helper (stable-fixes). * kunit/fortify: Fix mismatched kvalloc()/vfree() usage (git-fixes). * leds: pwm: Disable PWM when going to suspend (git-fixes). * lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (git-fixes). * libnvdimm: Fix ACPI_NFIT in BLK_DEV_PMEM help (jsc#PED-5853). * libperf evlist: Avoid out-of-bounds access (git-fixes). * libsubcmd: Fix parse-options memory leak (git-fixes). * livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539). * locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes) * lsm: fix the logic in security_inode_getsecctx() (git-fixes). * mac802154: fix llsec key resources release in mac802154_llsec_key_del (git- fixes). * maple_tree: fix mas_empty_area_rev() null pointer dereference (git-fixes). * md/dm-raid: do not call md_reap_sync_thread() directly (jsc#PED-7542). * md/raid1-10: add a helper raid1_check_read_range() (jsc#PED-7542). * md/raid1-10: factor out a new helper raid1_should_read_first() (jsc#PED-7542). * md/raid1: factor out choose_bb_rdev() from read_balance() (jsc#PED-7542). * md/raid1: factor out choose_slow_rdev() from read_balance() (jsc#PED-7542). * md/raid1: factor out helpers to add rdev to conf (jsc#PED-7542). * md/raid1: factor out helpers to choose the best rdev from read_balance() (jsc#PED-7542). * md/raid1: factor out read_first_rdev() from read_balance() (jsc#PED-7542). * md/raid1: factor out the code to manage sequential IO (jsc#PED-7542). * md/raid1: fix choose next idle in read_balance() (jsc#PED-7542). * md/raid1: record nonrot rdevs while adding/removing rdevs to conf (jsc#PED-7542). * md: Do not clear MD_CLOSING when the raid is about to stop (jsc#PED-7542). * md: add a new helper rdev_has_badblock() (jsc#PED-7542). * md: add a new helper reshape_interrupted() (jsc#PED-7542). * md: changed the switch of RAID_VERSION to if (jsc#PED-7542). * md: check mddev->pers before calling md_set_readonly() (jsc#PED-7542). * md: clean up invalid BUG_ON in md_ioctl (jsc#PED-7542). * md: clean up openers check in do_md_stop() and md_set_readonly() (jsc#PED-7542). * md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (jsc#PED-7542). * md: export helper md_is_rdwr() (jsc#PED-7542). * md: export helpers to stop sync_thread (jsc#PED-7542). * md: factor out a helper to sync mddev (jsc#PED-7542). * md: fix kmemleak of rdev->serial (jsc#PED-7542). * md: get rdev->mddev with READ_ONCE() (jsc#PED-7542). * md: merge the check of capabilities into md_ioctl_valid() (jsc#PED-7542). * md: preserve KABI in struct md_personality (jsc#PED-7542). * md: remove redundant check of 'mddev->sync_thread' (jsc#PED-7542). * md: remove redundant md_wakeup_thread() (jsc#PED-7542). * md: return directly before setting did_set_md_closing (jsc#PED-7542). * md: sync blockdev before stopping raid or setting readonly (jsc#PED-7542). * md: use RCU lock to protect traversal in md_spares_need_change() (jsc#PED-7542). * media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes). * media: cadence: csi2rx: use match fwnode for media link (git-fixes). * media: cec: core: remove length check of Timer Status (stable-fixes). * media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes). * media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes). * media: i2c: et8ek8: Do not strip remove function when driver is builtin (git-fixes). * media: ipu3-cio2: Request IRQ earlier (git-fixes). * media: mc: Fix flags handling when creating pad links (stable-fixes). * media: mc: Fix graph walk in media_pipeline_start (git-fixes). * media: mc: Rename pad variable to clarify intent (stable-fixes). * media: mc: mark the media devnode as registered from the, start (git-fixes). * media: ngene: Add dvb_ca_en50221_init return value check (git-fixes). * media: rcar-vin: work around -Wenum-compare-conditional warning (git-fixes). * media: rkisp1: Fix IRQ handling due to shared interrupts (stable-fixes). * media: sta2x11: fix irq handler cast (stable-fixes). * media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes). * media: sunxi: a83-mips-csi2: also select GENERIC_PHY (git-fixes). * media: uvcvideo: Add quirk for Logitech Rally Bar (git-fixes). * media: v4l2-subdev: Fix stream handling for crop API (git-fixes). * media: v4l: Do not turn on privacy LED if streamon fails (git-fixes). * mei: me: add arrow lake point H DID (stable-fixes). * mei: me: add arrow lake point S DID (stable-fixes). * mei: me: add lunar lake point M DID (stable-fixes). * mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes). * mlxbf_gige: call request_irq() after NAPI initialized (git-fixes). * mlxbf_gige: stop PHY during open() error paths (git-fixes). * mlxbf_gige: stop interface during shutdown (git-fixes). * mlxsw: Use refcount_t for reference counting (git-fixes). * mm,page_owner: Defer enablement of static branch (bsc#1222366). * mm,page_owner: Fix accounting of pages when migrating (bsc#1222366). * mm,page_owner: Fix printing of stack records (bsc#1222366). * mm,page_owner: Fix refcount imbalance (bsc#1222366). * mm,page_owner: Update metadata for tail pages (bsc#1222366). * mm,page_owner: check for null stack_record before bumping its refcount (bsc#1222366). * mm,page_owner: drop unnecessary check (bsc#1222366). * mm,page_owner: fix recursion (bsc#1222366). * mm/slab: make __free(kfree) accept error pointers (git-fixes). * mm: memcg: do not periodically flush stats when memcg is disabled (bsc#1222525). * mm: memcg: use larger batches for proactive reclaim (bsc#1222522). * mm: page_owner: fix wrong information in dump_page_owner (git-fixes). * mm_init kABI workaround (git-fixes). * mmc: core: Add HS400 tuning in HS400es initialization (stable-fixes). * mmc: core: Avoid negative index with array access (git-fixes). * mmc: core: Initialize mmc_blk_ioc_data (git-fixes). * mmc: davinci: Do not strip remove function when driver is builtin (git- fixes). * mmc: omap: fix broken slot switch lookup (git-fixes). * mmc: omap: fix deferred probe (git-fixes). * mmc: omap: restore original power up/down steps (git-fixes). * mmc: sdhci-msm: pervent access to suspended controller (git-fixes). * mmc: sdhci-omap: re-tuning is needed after a pm transition to support emmc HS200 mode (git-fixes). * mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes). * mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes). * mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes). * mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes). * mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes). * modpost: Add '.ltext' and '.ltext.*' to TEXT_SECTIONS (stable-fixes). * mptcp: Remove unnecessary test for __mptcp_init_sock() (git-fixes). * mptcp: annotate data-races around msk->rmem_fwd_alloc (git-fixes). * mptcp: fix bogus receive window shrinkage with multiple subflows (git- fixes). * mptcp: move __mptcp_error_report in protocol.c (git-fixes). * mptcp: process pending subflow error on close (git-fixes). * mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes). * mtd: diskonchip: work around ubsan link failure (stable-fixes). * mtd: rawnand: hynix: fixed typo (git-fixes). * mtd: spinand: Add support for 5-byte IDs (stable-fixes). * net/mlx5: Correctly compare pkt reformat ids (git-fixes). * net/mlx5: E-switch, Change flow rule destination checking (git-fixes). * net/mlx5: E-switch, store eswitch pointer before registering devlink_param (git-fixes). * net/mlx5: Fix fw reporter diagnose output (git-fixes). * net/mlx5: Fix peer devlink set for SF representor devlink port (git-fixes). * net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes). * net/mlx5: Properly link new fs rules into the tree (git-fixes). * net/mlx5: Register devlink first under devlink lock (git-fixes). * net/mlx5: Restore mistakenly dropped parts in register devlink flow (git- fixes). * net/mlx5: SF, Stop waiting for FW as teardown was called (git-fixes). * net/mlx5: offset comp irq index in name by one (git-fixes). * net/mlx5e: Change the warning when ignore_flow_level is not supported (git- fixes). * net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit (git-fixes). * net/mlx5e: Fix mlx5e_priv_init() cleanup flow (git-fixes). * net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes). * net/mlx5e: RSS, Block XOR hash with over 128 channels (git-fixes). * net/mlx5e: RSS, Block changing channels number when RXFH is configured (git- fixes). * net/mlx5e: Switch to using _bh variant of of spinlock API in port timestamping NAPI poll context (git-fixes). * net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (git-fixes). * net/smc: bugfix for smcr v2 server connect success statistic (git-fixes). * net/smc: fix documentation of buffer sizes (git-fixes). * net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add (git-fixes). * net/x25: fix incorrect parameter validation in the x25_getsockopt() function (git-fixes). * net: NSH: fix kernel-doc notation warning (git-fixes). * net: Use sockaddr_storage for getsockopt(SO_PEERNAME) (git-fixes). * net: add netdev_lockdep_set_classes() to virtual drivers (git-fixes). * net: annotate data-races around sk->sk_bind_phc (git-fixes). * net: annotate data-races around sk->sk_forward_alloc (git-fixes). * net: annotate data-races around sk->sk_lingertime (git-fixes). * net: annotate data-races around sk->sk_tsflags (git-fixes). * net: bonding: remove kernel-doc comment marker (git-fixes). * net: cfg802154: fix kernel-doc notation warnings (git-fixes). * net: dsa: microchip: fix register write order in ksz8_ind_write8() (git- fixes). * net: dsa: mt7530: fix handling of all link-local frames (git-fixes). * net: dsa: mt7530: fix link-local frames that ingress vlan filtering ports (git-fixes). * net: dsa: mt7530: prevent possible incorrect XTAL frequency selection (git- fixes). * net: dsa: mt7530: trap link-local frames regardless of ST Port State (git- fixes). * net: dsa: sja1105: Fix parameters order in sja1110_pcs_mdio_write_c45() (git-fixes). * net: ena: Fix incorrect descriptor free behavior (git-fixes). * net: ena: Fix potential sign extension issue (git-fixes). * net: ena: Move XDP code to its new files (git-fixes). * net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() (git- fixes). * net: ena: Remove ena_select_queue (git-fixes). * net: ena: Set tx_info->xdpf value to NULL (git-fixes). * net: ena: Use tx_ring instead of xdp_ring for XDP channel TX (git-fixes). * net: ena: Wrong missing IO completions check order (git-fixes). * net: ethernet: mtk_eth_soc: fix PPE hanging issue (git-fixes). * net: ethernet: ti: cpsw: enable mac_managed_pm to fix mdio (git-fixes). * net: fec: Set mac_managed_pm during probe (git-fixes). * net: hns3: fix index limit to support all queue stats (git-fixes). * net: hns3: fix kernel crash when 1588 is received on HIP08 devices (git- fixes). * net: hns3: fix kernel crash when devlink reload during pf initialization (git-fixes). * net: hns3: fix port duplex configure error in IMP reset (git-fixes). * net: hns3: fix wrong judgment condition issue (git-fixes). * net: hns3: mark unexcuted loopback test result as UNEXECUTED (git-fixes). * net: hns3: tracing: fix hclgevf trace event strings (git-fixes). * net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() (git-fixes). * net: ks8851: Handle softirqs at the end of IRQ thread to fix hang (git- fixes). * net: ks8851: Inline ks8851_rx_skb() (git-fixes). * net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs (git- fixes). * net: lan743x: Add set RFE read fifo threshold for PCI1x1x chips (git-fixes). * net: libwx: fix memory leak on free page (git-fixes). * net: ll_temac: platform_get_resource replaced by wrong function (git-fixes). * net: llc: fix kernel-doc notation warnings (git-fixes). * net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes). * net: mediatek: mtk_eth_soc: clear MAC_MCR_FORCE_LINK only when MAC is up (git-fixes). * net: nfc: remove inappropriate attrs check (stable-fixes). * net: pcs: xpcs: Return EINVAL in the internal methods (git-fixes). * net: phy: fix phy_read_poll_timeout argument type in genphy_loopback (git- fixes). * net: phy: micrel: Fix potential null pointer dereference (git-fixes). * net: phy: micrel: lan8814: Fix when enabling/disabling 1-step timestamping (git-fixes). * net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8061 (git-fixes). * net: phy: phy_device: Prevent nullptr exceptions on ISR (git-fixes). * net: phy: phy_device: Prevent nullptr exceptions on ISR (stable-fixes). * net: ravb: Always process TX descriptor ring (git-fixes). * net: ravb: Let IP-specific receive function to interrogate descriptors (git- fixes). * net: smsc95xx: add support for SYS TEC USB-SPEmodule1 (git-fixes). * net: sparx5: Fix use after free inside sparx5_del_mact_entry (git-fixes). * net: sparx5: fix wrong config being used when reconfiguring PCS (git-fixes). * net: sparx5: flower: fix fragment flags handling (git-fixes). * net: stmmac: Fix incorrect dereference in interrupt handlers (git-fixes). * net: stmmac: dwmac-starfive: Add support for JH7100 SoC (git-fixes). * net: stmmac: fix rx queue priority assignment (git-fixes). * net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes). * net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes). * net: tls, fix WARNIING in __sk_msg_free (bsc#1221858). * net: tls: fix returned read length with async decrypt (bsc#1221858). * net: tls: fix use-after-free with partial reads and async (bsc#1221858). * net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes). * net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes). * net: usb: ax88179_178a: fix link status when link is set to down/up (git- fixes). * net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes). * net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git- fixes). * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes). * net: usb: sr9700: stop lying about skb->truesize (git-fixes). * net: veth: do not manipulate GRO when using XDP (git-fixes). * net: wwan: t7xx: Split 64bit accesses to fix alignment issues (git-fixes). * net:usb:qmi_wwan: support Rolling modules (stable-fixes). * netfilter: nf_tables: disable toggling dormant table state more than once (git-fixes). * netfilter: nf_tables: uapi: Describe NFTA_RULE_CHAIN_ID (git-fixes). * netfilter: nft_ct: fix l3num expectations with inet pseudo family (git- fixes). * netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes). * nf_conntrack: fix -Wunused-const-variable= (git-fixes). * nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git- fixes). * nfc: nci: Fix kcov check in nci_rx_work() (git-fixes). * nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes). * nfc: nci: Fix uninit-value in nci_rx_work (git-fixes). * nfp: flower: handle acti_netdevs allocation failure (git-fixes). * nfs: fix panic when nfs4_ff_layout_prepare_ds() fails (git-fixes). * nfsd: Fix a regression in nfsd_setattr() (git-fixes). * nfsd: do not call locks_release_private() twice concurrently (git-fixes). * nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408). * nilfs2: fix OOB in nilfs_set_de_type (git-fixes). * nilfs2: fix out-of-range warning (git-fixes). * nilfs2: fix potential bug in end_buffer_async_write (git-fixes). * nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes). * nilfs2: fix use-after-free of timer for log writer thread (git-fixes). * nilfs2: make superblock data array index computation sparse friendly (git- fixes). * nouveau/dmem: handle kcalloc() allocation failure (git-fixes). * nouveau/gsp: do not check devinit disable on GSP (git-fixes). * nouveau/uvmm: fix addr/range calcs for remap operations (git-fixes). * nouveau: fix devinit paths to only handle display on GSP (git-fixes). * nouveau: fix function cast warning (git-fixes). * nouveau: fix instmem race condition around ptr stores (git-fixes). * nouveau: lock the client object tree (stable-fixes). * nouveau: reset the bo resource bus info after an eviction (git-fixes). * nvdimm/pmem: Treat alloc_dax() -EOPNOTSUPP failure as non-fatal (jsc#PED-5853). * nvdimm/pmem: fix leak on dax_add_host() failure (jsc#PED-5853). * nvdimm: make nvdimm_bus_type const (jsc#PED-5853). * nvme-fc: do not wait in vain when unloading module (git-fixes). * nvme-multipath: fix io accounting on failover (git-fixes). * nvme-pci: Add quirk for broken MSIs (git-fixes). * nvme-tcp: strict pdu pacing to avoid send stalls on TLS (bsc#1221858). * nvme: fix multipath batched completion accounting (git-fixes). * nvme: fix reconnection fail due to reserved tag allocation (git-fixes). * nvme: fix warn output about shared namespaces without CONFIG_NVME_MULTIPATH (git-fixes). * nvmet-fc: abort command when there is no binding (git-fixes). * nvmet-fc: defer cleanup using RCU properly (git-fixes). * nvmet-fc: hold reference on hostport match (git-fixes). * nvmet-fc: release reference on target port (git-fixes). * nvmet-fcloop: swap the list_add_tail arguments (git-fixes). * nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).++ kernel-source- azure.spec (revision 4)%define git_commit ba2f81d0ba1ad117dc6a5494a21d358f354126d7Release: <RELEASE>.gba2f81d * nvmet: fix ns enable/disable possible hang (git-fixes). * octeontx2-af: Add array index check (git-fixes). * octeontx2-af: Fix NIX SQ mode and BP config (git-fixes). * octeontx2-af: Fix devlink params (git-fixes). * octeontx2-af: Fix issue with loading coalesced KPU profiles (git-fixes). * octeontx2-af: Use matching wake_up API variant in CGX command interface (git-fixes). * octeontx2-af: Use separate handlers for interrupts (git-fixes). * octeontx2-pf: Fix transmit scheduler resource leak (git-fixes). * octeontx2-pf: Send UP messages to VF only when VF is up (git-fixes). * octeontx2-pf: Use default max_active works instead of one (git-fixes). * octeontx2-pf: Wait till detach_resources msg is complete (git-fixes). * octeontx2-pf: check negative error code in otx2_open() (git-fixes). * octeontx2-pf: fix FLOW_DIS_IS_FRAGMENT implementation (git-fixes). * octeontx2: Detect the mbox up or down message via register (git-fixes). * of: dynamic: Synchronize of_changeset_destroy() with the devlink removals (git-fixes). * of: module: add buffer overflow check in of_modalias() (git-fixes). * of: module: prevent NULL pointer dereference in vsnprintf() (stable-fixes). * of: property: Add in-ports/out-ports support to of_graph_get_port_parent() (stable-fixes). * of: property: Improve finding the consumer of a remote-endpoint property (git-fixes). * of: property: Improve finding the supplier of a remote-endpoint property (git-fixes). * of: property: fix typo in io-channels (git-fixes). * of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing (git- fixes). * of: unittest: Fix compile in the non-dynamic case (git-fixes). * overflow: Allow non-type arg to type_max() and type_min() (stable-fixes). * peci: linux/peci.h: fix Excess kernel-doc description warning (git-fixes). * perf annotate: Fix annotation_calc_lines() to pass correct address to get_srcline() (git-fixes). * perf annotate: Get rid of duplicate --group option item (git-fixes). * perf auxtrace: Fix multiple use of --itrace option (git-fixes). * perf bench internals inject-build-id: Fix trap divide when collecting just one DSO (git-fixes). * perf bench uprobe: Remove lib64 from libc.so.6 binary path (git-fixes). * perf bpf: Clean up the generated/copied vmlinux.h (git-fixes). * perf daemon: Fix file leak in daemon_session__control (git-fixes). * perf docs: Document bpf event modifier (git-fixes). * perf evsel: Fix duplicate initialization of data->id in evsel__parse_sample() (git-fixes). * perf expr: Fix "has_event" function for metric style events (git-fixes). * perf intel-pt: Fix unassigned instruction op (discovered by MemorySanitizer) (git-fixes). * perf jevents: Drop or simplify small integer values (git-fixes). * perf list: fix short description for some cache events (git-fixes). * perf lock contention: Add a missing NULL check (git-fixes). * perf metric: Do not remove scale from counts (git-fixes). * perf pmu: Count sys and cpuid JSON events separately (git fixes). * perf pmu: Fix a potential memory leak in perf_pmu__lookup() (git-fixes). * perf pmu: Treat the msr pmu as software (git-fixes). * perf print-events: make is_event_supported() more robust (git-fixes). * perf probe: Add missing libgen.h header needed for using basename() (git- fixes). * perf record: Check conflict between '\--timestamp-filename' option and pipe mode before recording (git-fixes). * perf record: Fix debug message placement for test consumption (git-fixes). * perf record: Fix possible incorrect free in record__switch_output() (git- fixes). * perf report: Avoid SEGV in report__setup_sample_type() (git-fixes). * perf sched timehist: Fix -g/--call-graph option failure (git-fixes). * perf script: Show also errors for --insn-trace option (git-fixes). * perf srcline: Add missed addr2line closes (git-fixes). * perf stat: Avoid metric-only segv (git-fixes). * perf stat: Do not display metric header for non-leader uncore events (git- fixes). * perf stat: Do not fail on metrics on s390 z/VM systems (git-fixes). * perf symbols: Fix ownership of string in dso__load_vmlinux() (git-fixes). * perf test shell arm_coresight: Increase buffer size for Coresight basic tests (git-fixes). * perf tests: Apply attributes to all events in object code reading test (git- fixes). * perf tests: Make "test data symbol" more robust on Neoverse N1 (git-fixes). * perf tests: Make data symbol test wait for perf to start (bsc#1220045). * perf tests: Skip data symbol test if buf1 symbol is missing (bsc#1220045). * perf thread: Fixes to thread__new() related to initializing comm (git- fixes). * perf thread_map: Free strlist on normal path in thread_map__new_by_tid_str() (git-fixes). * perf top: Uniform the event name for the hybrid machine (git-fixes). * perf top: Use evsel's cpus to replace user_requested_cpus (git-fixes). * perf ui browser: Avoid SEGV on title (git fixes). * perf ui browser: Do not save pointer to stack memory (git-fixes). * perf vendor events amd: Add Zen 4 memory controller events (git-fixes). * perf vendor events amd: Fix Zen 4 cache latency events (git-fixes). * perf/x86/amd/core: Avoid register reset when CPU is dead (git-fixes). * perf/x86/amd/core: Update and fix stalled-cycles-* events for Zen 2 and later (git-fixes). * perf/x86/amd/lbr: Discard erroneous branch entries (git-fixes). * perf/x86/amd/lbr: Use freeze based on availability (git-fixes). * perf/x86/intel/ds: Do not clear ->pebs_data_cfg for the last PEBS event (git-fixes). * perf/x86/intel: Expose existence of callback support to KVM (git-fixes). * perf/x86: Fix out of range data (git-fixes). * phy: freescale: imx8m-pcie: fix pcie link-up instability (git-fixes). * phy: marvell: a3700-comphy: Fix hardcoded array size (git-fixes). * phy: marvell: a3700-comphy: Fix out of bounds read (git-fixes). * phy: rockchip-snps-pcie3: fix bifurcation on rk3588 (git-fixes). * phy: rockchip-snps-pcie3: fix clearing PHP_GRF_PCIESEL_CON bits (git-fixes). * phy: rockchip: naneng-combphy: Fix mux on rk3588 (git-fixes). * phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered (git-fixes). * pinctrl/meson: fix typo in PDM's pin name (git-fixes). * pinctrl: armada-37xx: remove an unused variable (git-fixes). * pinctrl: baytrail: Fix selecting gpio pinctrl state (git-fixes). * pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes). * pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes). * pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback (git- fixes). * pinctrl: mediatek: paris: Rework support for PIN_CONFIG_{INPUT,OUTPUT}_ENABLE (git-fixes). * pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git- fixes). * pinctrl: qcom: pinctrl-sm7150: Fix sdc1 and ufs special pins regs (git- fixes). * pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes). * platform/chrome: cros_ec_uart: properly fix race condition (git-fixes). * platform/x86/amd/pmc: Extend Framework 13 quirk to more BIOSes (stable- fixes). * platform/x86/intel-uncore-freq: Do not present root domain on error (git- fixes). * platform/x86: ISST: Add Granite Rapids-D to HPM CPU list (stable-fixes). * platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes). * platform/x86: x86-android-tablets: Fix acer_b1_750_goodix_gpios name (stable-fixes). * platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git- fixes). * power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes). * power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator (git- fixes). * powerpc/crypto/chacha-p10: Fix failure on non Power10 (bsc#1218205). * powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740). * powerpc/hv-gpci: Fix the H_GET_PERF_COUNTER_INFO hcall return value checks (git-fixes). * powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes). * powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783). * powerpc/pseries: make max polling consistent for longer H_CALLs (bsc#1215199). * powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869). * powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869). * powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191). * ppdev: Add an error check in register_device (git-fixes). * prctl: generalize PR_SET_MDWE support check to be per-arch (bsc#1225610). * printk: Add this_cpu_in_panic() (bsc#1225607). * printk: Adjust mapping for 32bit seq macros (bsc#1225607). * printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1225607). * printk: Consolidate console deferred printing (bsc#1225607). * printk: Disable passing console lock owner completely during panic() (bsc#1225607). * printk: Do not take console lock for console_flush_on_panic() (bsc#1225607). * printk: For @suppress_panic_printk check for other CPU in panic (bsc#1225607). * printk: Keep non-panic-CPUs out of console lock (bsc#1225607). * printk: Let no_printk() use _printk() (bsc#1225618). * printk: Reduce console_unblank() usage in unsafe scenarios (bsc#1225607). * printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1225607). * printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616). * printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1225607). * printk: Wait for all reserved records with pr_flush() (bsc#1225607). * printk: nbcon: Relocate 32bit seq macros (bsc#1225607). * printk: ringbuffer: Clarify special lpos values (bsc#1225607). * printk: ringbuffer: Cleanup reader terminology (bsc#1225607). * printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1225607). * printk: ringbuffer: Skip non-finalized records in panic (bsc#1225607). * proc/kcore: do not try to access unaccepted memory (git-fixes). * pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes). * pstore: inode: Convert mutex usage to guard(mutex) (stable-fixes). * pstore: inode: Only d_invalidate() is needed (git-fixes). * pwm: img: fix pwm clock lookup (git-fixes). * qibfs: fix dentry leak (git-fixes) * r8169: fix issue caused by buggy BIOS on certain boards with RTL8168d (git- fixes). * r8169: skip DASH fw status checks when DASH is disabled (git-fixes). * random: handle creditable entropy from atomic process context (git-fixes). * regmap: Add regmap_read_bypassed() (git-fixes). * regmap: kunit: Ensure that changed bytes are actually different (stable- fixes). * regmap: maple: Fix cache corruption in regcache_maple_drop() (git-fixes). * regmap: maple: Fix uninitialized symbol 'ret' warnings (git-fixes). * regulator: bd71828: Do not overwrite runtime voltages (git-fixes). * regulator: change devm_regulator_get_enable_optional() stub to return Ok (git-fixes). * regulator: change stubbed devm_regulator_get_enable to return Ok (git- fixes). * regulator: core: fix debugfs creation regression (git-fixes). * regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes). * regulator: tps65132: Add of_match table (stable-fixes). * remoteproc: k3-r5: Do not allow core1 to power up before core0 via sysfs (git-fixes). * remoteproc: k3-r5: Jump to error handling labels in start/stop errors (git- fixes). * remoteproc: k3-r5: Wait for core0 power-up before powering up core1 (git- fixes). * remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes). * remoteproc: stm32: Fix incorrect type assignment returned by stm32_rproc_get_loaded_rsc_tablef (git-fixes). * remoteproc: virtio: Fix wdg cannot recovery remote processor (git-fixes). * ring-buffer: Do not set shortest_full when full target is hit (git-fixes). * ring-buffer: Fix a race between readers and resize checks (git-fixes). * ring-buffer: Fix full_waiters_pending in poll (git-fixes). * ring-buffer: Fix resetting of shortest_full (git-fixes). * ring-buffer: Fix waking up ring buffer readers (git-fixes). * ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes). * ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git- fixes). * ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes). * rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes). * s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224792). * s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223869). * s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224793). * s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1225133). * s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224348). * s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225136). * s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225134). * s390/ism: Properly fix receive message buffer allocation (git-fixes bsc#1223590). * s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223871). * s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223872). * s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223874). * s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223870). * s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223593). * s390/vtime: fix average steal time calculation (git-fixes bsc#1221783). * s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223592). * sched-fair-Add-EAS-checks-before-updating-root_domain-overutilized.patch. * sched-fair-Combine-EAS-check-with-overutilized-access.patch. * sched-fair-Introduce-is_rd_overutilized-helper-function-to-access- root_domain-overutilized.patch. * sched/balancing: Rename newidle_balance() => sched_balance_newidle() (bsc#1222173). * sched/fair: Check root_domain::overload value before update (bsc#1222173). * sched/fair: Use helper functions to access root_domain::overload (bsc#1222173). * sched/psi: Select KERNFS as needed (git-fixes). * sched/topology: Optimize topology_span_sane() (bsc#1225053). * scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes). * scsi: core: Consult supported VPD page list prior to fetching page (git- fixes). * scsi: core: Fix unremoved procfs host directory regression (git-fixes). * scsi: csiostor: Avoid function pointer casts (git-fixes). * scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() (git-fixes). * scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() (git-fixes). * scsi: libsas: Fix disk not being scanned in after being removed (git-fixes). * scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842). * scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842). * scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842). Refresh: - patches.suse/lpfc-reintroduce-old-irq-probe-logic.patch * scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842). * scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777). * scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842). * scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777). * scsi: lpfc: Correct size for wqe for memset() (bsc#1221777). * scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777). * scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777). * scsi: lpfc: Define types in a union for generic void *context3 ptr (bsc#1221777). * scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842). * scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (bsc#1221777). * scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1221777). * scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777 bsc#1217959). * scsi: lpfc: Remove unnecessary log message in queuecommand path (bsc#1221777). * scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port() (bsc#1221777). * scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842). * scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777). * scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842). * scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777). * scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777). * scsi: mpi3mr: Reduce stack usage in mpi3mr_refresh_sas_ports() (git-fixes). * scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git- fixes). * scsi: mylex: Fix sysfs buffer lengths (git-fixes). * scsi: qla2xxx: Change debug message during driver unload (bsc1221816). * scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816). * scsi: qla2xxx: Fix N2N stuck connection (bsc1221816). * scsi: qla2xxx: Fix command flush on cable pull (bsc1221816). * scsi: qla2xxx: Fix double free of fcport (bsc1221816). * scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816). * scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes). * scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816). * scsi: qla2xxx: Prevent command send on chip reset (bsc1221816). * scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816). * scsi: qla2xxx: Update manufacturer detail (bsc1221816). * scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816). * scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git- fixes). * scsi: sg: Avoid race in error handling & drop bogus warn (git-fixes). * scsi: sg: Avoid sg device teardown race (git-fixes). * scsi: smartpqi: Fix disable_managed_interrupts (git-fixes). * sctp: annotate data-races around sk->sk_wmem_queued (git-fixes). * sdhci-of-dwcmshc: disable PM runtime in dwcmshc_remove() (git-fixes). * selftests/binderfs: use the Makefile's rules, not Make's implicit rules (git-fixes). * selftests/bpf: add edge case backtracking logic test (bsc#1225756). * selftests/bpf: precision tracking test for BPF_NEG and BPF_END (bsc#1225756). * selftests/ftrace: Fix event filter target_func selection (stable-fixes). * selftests/ftrace: Limit length in subsystem-enable tests (git-fixes). * selftests/kcmp: remove unused open mode (git-fixes). * selftests/net: convert test_bridge_neigh_suppress.sh to run it in unique namespace (stable-fixes). * selftests/pidfd: Fix config for pidfd_setns_test (git-fixes). * selftests/powerpc/dexcr: Add -no-pie to hashchk tests (git-fixes). * selftests/powerpc/papr-vpd: Fix missing variable initialization (jsc#PED-4486 git-fixes). * selftests/resctrl: fix clang build failure: use LOCAL_HDRS (git-fixes). * selftests/timers/posix_timers: Reimplement check_timer_distribution() (git- fixes). * selftests: default to host arch for LLVM builds (git-fixes). * selftests: forwarding: Fix ping failure due to short timeout (git-fixes). * selftests: kselftest: Fix build failure with NOLIBC (git-fixes). * selftests: kselftest: Mark functions that unconditionally call exit() as __noreturn (git-fixes). * selftests: net: bridge: increase IGMP/MLD exclude timeout membership interval (git-fixes). * selftests: net: kill smcrouted in the cleanup logic in amt.sh (git-fixes). * selftests: net: move amt to socat for better compatibility (git-fixes). * selftests: test_bridge_neigh_suppress.sh: Fix failures due to duplicate MAC (git-fixes). * selftests: timers: Convert posix_timers test to generate KTAP output (stable-fixes). * selftests: timers: Fix abs() warning in posix_timers test (git-fixes). * selftests: timers: Fix posix_timers ksft_print_msg() warning (git-fixes). * selftests: timers: Fix valid-adjtimex signed left-shift undefined behavior (stable-fixes). * selftests: vxlan_mdb: Fix failures with old libnet (git-fixes). * selinux: avoid dereference of garbage after mount failure (git-fixes). * selinux: introduce an initial SID for early boot processes (bsc#1208593). * serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes). * serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes). * serial: 8250_dw: Revert: Do not reclock if already at correct rate (git- fixes). * serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes). * serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup (git-fixes). * serial: Lock console when calling into driver before registration (git- fixes). * serial: core: Fix atomicity violation in uart_tiocmget (git-fixes). * serial: core: only stop transmit when HW fifo is empty (git-fixes). * serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable- fixes). * serial: max3100: Fix bitwise types (git-fixes). * serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git- fixes). * serial: max310x: fix NULL pointer dereference in I2C instantiation (git- fixes). * serial: max310x: fix syntax error in IRQ error message (git-fixes). * serial: mxs-auart: add spinlock around changing cts state (git-fixes). * serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git- fixes). * serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes). * serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes). * serial: stm32: Reset .throttled state in .startup() (git-fixes). * series.conf: cleanup Fix subsection header to silence series_insert error. * slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git- fixes). * slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes). * smb3: show beginning time for per share stats (bsc#1225172). * smb: client: ensure to try all targets when finding nested links (bsc#1225172). * smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1225172). * smb: client: fix parsing of SMB3.1.1 POSIX create context (git-fixes, bsc#1225172). * smb: client: get rid of dfs code dep in namespace.c (bsc#1225172). * smb: client: get rid of dfs naming in automount code (bsc#1225172). * smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1225172). * smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1225172). * smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1225172). * smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1225172). * soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes). * soc: fsl: qbman: Use raw spinlock for cgr_lock (git-fixes). * soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes). * soc: microchip: Fix POLARFIRE_SOC_SYS_CTRL input prompt (stable-fixes). * soc: qcom: pmic_glink: Make client-lock non-sleeping (git-fixes). * soc: qcom: pmic_glink: do not traverse clients list without a lock (git- fixes). * soc: qcom: pmic_glink: notify clients about the current state (git-fixes). * soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes). * sock_diag: annotate data-races around sock_diag_handlers[family] (git- fixes). * soundwire: amd: fix for wake interrupt handling for clockstop mode (git- fixes). * speakup: Avoid crash on very long word (git-fixes). * speakup: Fix 8bit characters from direct synth (git-fixes). * speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes). * spi: Do not mark message DMA mapped when no transfer in it is (git-fixes). * spi: fix null pointer dereference within spi_sync (git-fixes). * spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs (git-fixes). * spi: intel-pci: Add support for Lunar Lake-M SPI serial flash (stable- fixes). * spi: lm70llp: fix links in doc and comments (git-fixes). * spi: lpspi: Avoid potential use-after-free in probe() (git-fixes). * spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probe (git-fixes). * spi: microchip-core-qspi: fix setting spi bus clock rate (git-fixes). * spi: spi-fsl-lpspi: remove redundant spi_controller_put call (git-fixes). * spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes). * spi: stm32: Do not warn about spurious interrupts (git-fixes). * spi: xilinx: Fix kernel documentation in the xilinx_spi.h (git-fixes). * spmi: hisi-spmi-controller: Do not override device identifier (git-fixes). * staging: vc04_services: changen strncpy() to strscpy_pad() (stable-fixes). * staging: vc04_services: fix information leak in create_component() (git- fixes). * staging: vt6655: Remove unused declaration of RFbAL7230SelectChannelPostProcess() (git-fixes). * stmmac: Clear variable when destroying workqueue (git-fixes). * supported.conf: support tcp_dctcp module (jsc#PED-8111) * swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331) * swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331) * swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331) * swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331) * swiotlb: use the calculated number of areas (git-fixes). * thermal/drivers/qcom/lmh: Check for SCM availability at probe (git-fixes). * thermal/drivers/tsens: Fix null pointer dereference (git-fixes). * thermal/of: Assume polling-delay(-passive) 0 when absent (stable-fixes). * thermal: devfreq_cooling: Fix perf state when calculate dfc res_util (git- fixes). * thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes). * thunderbolt: Do not create DisplayPort tunnels on adapters of the same router (git-fixes). * thunderbolt: Fix wake configurations after device unplug (stable-fixes). * thunderbolt: Introduce tb_path_deactivate_hop() (stable-fixes). * thunderbolt: Introduce tb_port_reset() (stable-fixes). * thunderbolt: Make tb_switch_reset() support Thunderbolt 2, 3 and USB4 routers (stable-fixes). * thunderbolt: Reset only non-USB4 host routers in resume (git-fixes). * tls: break out of main loop when PEEK gets a non-data record (bsc#1221858). * tls: do not skip over different type records from the rx_list (bsc#1221858). * tls: fix peeking with sync+async decryption (bsc#1221858). * tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1221858). * tools/arch/x86/intel_sdsi: Fix maximum meter bundle length (git-fixes). * tools/arch/x86/intel_sdsi: Fix meter_certificate decoding (git-fixes). * tools/arch/x86/intel_sdsi: Fix meter_show display (git-fixes). * tools/latency-collector: Fix -Wformat-security compile warns (git-fixes). * tools/power turbostat: Expand probe_intel_uncore_frequency() (bsc#1221765). * tools/power/turbostat: Fix uncore frequency file string (bsc#1221765). * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes). * tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git- fixes). * tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes). * tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes). * tracing: Have saved_cmdlines arrays all in one allocation (git-fixes). * tracing: Remove precision vsnprintf() check from print event (git-fixes). * tracing: Use .flush() call to wake up readers (git-fixes). * tracing: hide unused ftrace_event_id_fops (git-fixes). * tty: n_gsm: fix missing receive state reset after mode switch (git-fixes). * tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes). * tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes). * tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes). * ubifs: Queue up space reservation tasks if retrying many times (git-fixes). * ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes). * ubifs: Set page uptodate in the correct place (git-fixes). * ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes). * ubifs: fix sort function prototype (git-fixes). * usb: Disable USB3 LPM at shutdown (stable-fixes). * usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (bsc#1220569). * usb: aqc111: stop lying about skb->truesize (git-fixes). * usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor (git-fixes). * usb: cdc-wdm: close race between read and workqueue (git-fixes). * usb: dwc2: gadget: Fix exiting from clock gating (git-fixes). * usb: dwc2: gadget: LPM flow fix (git-fixes). * usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes). * usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes). * usb: dwc2: host: Fix hibernation flow (git-fixes). * usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes). * usb: dwc3-am62: Disable wakeup at remove (git-fixes). * usb: dwc3-am62: Rename private data (git-fixes). * usb: dwc3-am62: fix module unload/reload behavior (git-fixes). * usb: dwc3: Properly set system wakeup (git-fixes). * usb: dwc3: Wait unconditionally after issuing EndXfer command (git-fixes). * usb: dwc3: core: Prevent phy suspend during init (Git-fixes). * usb: dwc3: pci: Drop duplicate ID (git-fixes). * usb: fotg210: Add missing kernel doc description (git-fixes). * usb: gadget: composite: fix OS descriptors w_value logic (git-fixes). * usb: gadget: f_fs: Fix a race condition when processing setup packets (git- fixes). * usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (git-fixes). * usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes). * usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git- fixes). * usb: gadget: u_audio: Clear uac pointer when freed (git-fixes). * usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (git-fixes). * usb: gadget: uvc: mark incomplete frames with UVC_STREAM_ERR (stable-fixes). * usb: gadget: uvc: use correct buffer size when parsing configfs lists (git- fixes). * usb: ohci: Prevent missed ohci interrupts (git-fixes). * usb: phy: generic: Get the vbus supply (git-fixes). * usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes). * usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes). * usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes). * usb: typec: tcpm: Check for port partner validity before consuming it (git- fixes). * usb: typec: tcpm: Correct port source pdo array in pd_set callback (git- fixes). * usb: typec: tcpm: Correct the PDO counting in pd_set (git-fixes). * usb: typec: tcpm: Update PD of Type-C port upon pd_set (git-fixes). * usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes). * usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd() (git- fixes). * usb: typec: tcpm: unregister existing source caps before re-registration (git-fixes). * usb: typec: tipd: fix event checking for tps6598x (git-fixes). * usb: typec: ucsi: Ack unsupported commands (stable-fixes). * usb: typec: ucsi: Check for notifications after init (git-fixes). * usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes). * usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes). * usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes). * usb: typec: ucsi: Fix connector check on init (git-fixes). * usb: typec: ucsi: Fix race between typec_switch and role_switch (git-fixes). * usb: typec: ucsi: Limit read size on v1.2 (stable-fixes). * usb: typec: ucsi: always register a link to USB PD device (git-fixes). * usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes). * usb: typec: ucsi: simplify partner's PD caps registration (git-fixes). * usb: typec: ucsi_acpi: Refactor and fix DELL quirk (git-fixes). * usb: udc: remove warning when queue disabled ep (stable-fixes). * usb: xhci-plat: Do not include xhci.h (stable-fixes). * usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes). * usb: xhci: Implement xhci_handshake_check_state() helper. * usb: xhci: correct return value in case of STS_HCE (git-fixes). * vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes). * vboxsf: explicitly deny setlease attempts (stable-fixes). * vdpa/mlx5: Allow CVQ size changes (git-fixes). * vdpa_sim: reset must not run (git-fixes). * veth: try harder when allocating queue memory (git-fixes). * vhost: Add smp_rmb() in vhost_enable_notify() (git-fixes). * vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes). * virtio-blk: Ensure no requests in virtqueues before deleting vqs (git- fixes). * virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223944). * virtio_net: Do not send RSS key if it is not supported (git-fixes). * vmci: prevent speculation leaks by sanitizing event in event_deliver() (git- fixes). * vsock/virtio: fix packet delivery to tap device (git-fixes). * watchdog: bd9576: Drop "always-running" property (git-fixes). * watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git- fixes). * watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes). * watchdog: sa1100: Fix PTR_ERR_OR_ZERO() vs NULL check in sa1100dog_probe() (git-fixes). * wifi: ar5523: enable proper endpoint verification (git-fixes). * wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes). * wifi: ath10k: poll service ready message before failing (git-fixes). * wifi: ath10k: populate board data for WCN3990 (git-fixes). * wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948). * wifi: ath11k: do not force enable power save on non-running vdevs (git- fixes). * wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() (git-fixes). * wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes). * wifi: brcmfmac: Add DMI nvram filename quirk for ACEPC W5 Pro (stable- fixes). * wifi: brcmfmac: Demote vendor-specific attach/detach messages to info (git- fixes). * wifi: brcmfmac: add per-vendor feature detection callback (stable-fixes). * wifi: brcmfmac: cfg80211: Use WSEC to set SAE password (stable-fixes). * wifi: brcmfmac: pcie: handle randbuf allocation failure (git-fixes). * wifi: carl9170: add a proper sanity check for endpoints (git-fixes). * wifi: carl9170: re-fix fortified-memset warning (git-fixes). * wifi: cfg80211: check A-MSDU format more carefully (stable-fixes). * wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes). * wifi: ieee80211: fix ieee80211_mle_basic_sta_prof_size_ok() (git-fixes). * wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes). * wifi: iwlwifi: fw: fix compile w/o CONFIG_ACPI (git-fixes). * wifi: iwlwifi: mvm: allocate STA links only for active links (git-fixes). * wifi: iwlwifi: mvm: fix active link counting during recovery (git-fixes). * wifi: iwlwifi: mvm: fix check in iwl_mvm_sta_fw_id_mask (git-fixes). * wifi: iwlwifi: mvm: guard against invalid STA ID on removal (stable-fixes). * wifi: iwlwifi: mvm: include link ID when releasing frames (git-fixes). * wifi: iwlwifi: mvm: init vif works only once (git-fixes). * wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git- fixes). * wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes). * wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes). * wifi: iwlwifi: mvm: select STA mask only for active links (git-fixes). * wifi: iwlwifi: mvm: use correct address 3 in A-MSDU (stable-fixes). * wifi: iwlwifi: pcie: Add the PCI device id for new hardware (stable-fixes). * wifi: iwlwifi: pcie: fix RB status reading (stable-fixes). * wifi: iwlwifi: read txq->read_ptr under lock (stable-fixes). * wifi: iwlwifi: reconfigure TLC during HW restart (git-fixes). * wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable- fixes). * wifi: mac80211: clean up assignments to pointer cache (stable-fixes). * wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes). * wifi: mac80211: fix prep_connection error path (stable-fixes). * wifi: mac80211: fix unaligned le16 access (git-fixes). * wifi: mac80211: only call drv_sta_rc_update for uploaded stations (stable- fixes). * wifi: mac80211: remove link before AP (git-fixes). * wifi: mac80211_hwsim: init peer measurement result (git-fixes). * wifi: mt76: mt7603: add wpdma tx eof flag for PSE client reset (git-fixes). * wifi: mt76: mt7603: fix tx queue of loopback packets (git-fixes). * wifi: mt76: mt7915: workaround too long expansion sparse warnings (git- fixes). * wifi: mt76: mt7996: add locking for accessing mapped registers (stable- fixes). * wifi: mt76: mt7996: disable AMSDU for non-data frames (stable-fixes). * wifi: mwl8k: initialize cmd->addr[] properly (git-fixes). * wifi: nl80211: do not free NULL coalescing rule (git-fixes). * wifi: rtw88: 8821cu: Fix connection failure (stable-fixes). * wifi: rtw88: Add missing VID/PIDs for 8811CU and 8821CU (stable-fixes). * wifi: rtw89: fix null pointer access when abort scan (stable-fixes). * wifi: rtw89: pci: correct TX resource checking for PCI DMA channel of firmware command (git-fixes). * wifi: rtw89: pci: enlarge RX DMA buffer to consider size of RX descriptor (stable-fixes). * wireguard: netlink: access device through ctx instead of peer (git-fixes). * wireguard: netlink: check for dangling peer via is_dead instead of empty list (git-fixes). * wireguard: receive: annotate data-race around receiving_counter.counter (git-fixes). * x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (git-fixes). * x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (git-fixes). * x86/bugs: Fix BHI retpoline check (git-fixes). * x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes). * x86/bugs: Remove default case for fully switched enums (git-fixes). * x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk() (git- fixes). * x86/coco: Require seeding RNG with RDRAND on CoCo systems (git-fixes). * x86/cpu: Add model number for Intel Arrow Lake mobile processor (git-fixes). * x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git- fixes). * x86/efistub: Add missing boot_params for mixed mode compat entry (git- fixes). * x86/efistub: Call mixed mode boot services on the firmware's stack (git- fixes). * x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes). * x86/hyperv: Allow 15-bit APIC IDs for VTL platforms (git-fixes). * x86/hyperv: Use per cpu initial stack for vtl context (git-fixes). * x86/kconfig: Select ARCH_WANT_FRAME_POINTERS again when UNWINDER_FRAME_POINTER=y (git-fixes). * x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (git-fixes). * x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes). * x86/nmi: Fix the inverse "in NMI handler" check (git-fixes). * x86/nospec: Refactor UNTRAIN_RET[_*] (git-fixes). * x86/pm: Work around false positive kmemleak report in msr_build_context() (git-fixes). * x86/purgatory: Switch to the position-independent small code model (git- fixes). * x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros (git-fixes). * x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk (git- fixes). * x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes). * x86/srso: Disentangle rethunk-dependent options (git-fixes). * x86/srso: Fix unret validation dependencies (git-fixes). * x86/srso: Improve i-cache locality for alias mitigation (git-fixes). * x86/srso: Print actual mitigation if requested mitigation isn't possible (git-fixes). * x86/srso: Remove 'pred_cmd' label (git-fixes). * x86/srso: Unexport untraining functions (git-fixes). * x86/xen: Add some null pointer checking to smp.c (git-fixes). * x86/xen: attempt to inflate the memory balloon on PVH (git-fixes). * xdp, bonding: Fix feature flags when there are no slave devs anymore (git- fixes). * xen-netfront: Add missing skb_mark_for_recycle (git-fixes). * xen/events: drop xen_allocate_irqs_dynamic() (git-fixes). * xen/events: fix error code in xen_bind_pirq_msi_to_irq() (git-fixes). * xen/events: increment refcnt only if event channel is refcounted (git- fixes). * xen/events: modify internal [un]bind interfaces (git-fixes). * xen/events: reduce externally visible helper functions (git-fixes). * xen/events: remove some simple helpers from events_base.c (git-fixes). * xen/evtchn: avoid WARN() when unbinding an event channel (git-fixes). * xen: evtchn: Allow shared registration of IRQ handers (git-fixes). * xfs: add lock protection when remove perag from radix tree (git-fixes). * xfs: allow extent free intents to be retried (git-fixes). * xfs: fix perag leak when growfs fails (git-fixes). * xfs: force all buffers to be written during btree bulk load (git-fixes). * xfs: make xchk_iget safer in the presence of corrupt inode btrees (git- fixes). * xfs: pass the xfs_defer_pending object to iop_recover (git-fixes). * xfs: recompute growfsrtfree transaction reservation while growing rt volume (git-fixes). * xfs: transfer recovered intent item ownership in ->iop_recover (git-fixes). * xfs: use xfs_defer_pending objects to recover intent items (git-fixes). * xhci: Simplify event ring dequeue pointer update for port change events (git-fixes). * xhci: add helper that checks for unhandled events on a event ring (git- fixes). * xhci: remove unnecessary event_ring_deq parameter from xhci_handle_event() (git-fixes). * xhci: simplify event ring dequeue tracking for transfer events (git-fixes). * 9p: add missing locking around taking dentry fid list (git-fixes) * accel/ivpu: Fix deadlock in context_xa (git-fixes). * ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes). * ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes). * ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git- fixes). * ACPI: CPPC: Fix access width used for PCC registers (git-fixes). * ACPI: CPPC: Fix bit_offset shift in MASK_VAL() macro (git-fixes). * ACPI: CPPC: Use access_width over bit_width for system memory accesses (stable-fixes). * ACPI: disable -Wstringop-truncation (git-fixes). * ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes). * ACPI: LPSS: Advertise number of chip selects via property (git-fixes). * ACPI: resource: Add Infinity laptops to irq1_edge_low_force_override (stable-fixes). * ACPI: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes). * ACPI: scan: Do not increase dep_unmet for already met dependencies (git- fixes). * ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (bsc#1217750). * ACPI: x86: Move acpi_quirk_skip_serdev_enumeration() out of CONFIG_X86_ANDROID_TABLETS (stable-fixes). * ACPICA: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() (git-fixes). * admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes). * ahci: asm1064: asm1166: do not limit reported ports (git-fixes). * ahci: asm1064: correct count of reported ports (stable-fixes). * ALSA: aoa: avoid false-positive format truncation warning (git-fixes). * ALSA: core: Fix NULL module pointer assignment at card init (git-fixes). * ALSA: core: Remove debugfs at disconnection (git-fixes). * ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes). * ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes). * ALSA: hda: Add Intel BMG PCI ID and HDMI codec vid (stable-fixes). * ALSA: hda: clarify Copyright information (stable-fixes). * ALSA: hda: cs35l41: Add support for ASUS ROG 2024 Laptops (stable-fixes). * ALSA: hda: cs35l41: Ignore errors when configuring IRQs (stable-fixes). * ALSA: hda: cs35l41: Remove redundant argument to cs35l41_request_firmware_file() (stable-fixes). * ALSA: hda: cs35l41: Remove Speaker ID for Lenovo Legion slim 7 16ARHA7 (git- fixes). * ALSA: hda: cs35l41: Set the max PCM Gain using tuning setting (stable- fixes). * ALSA: hda: cs35l41: Support HP Omen models without _DSD (stable-fixes). * ALSA: hda: cs35l41: Support Lenovo 13X laptop without _DSD (stable-fixes). * ALSA: hda: cs35l41: Update DSP1RX5/6 Sources for DSP config (stable-fixes). * ALSA: hda: cs35l56: Add ACPI device match tables (git-fixes). * ALSA: hda: cs35l56: Exit cache-only after cs35l56_wait_for_firmware_boot() (stable-fixes). * ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (git-fixes). * ALSA: hda: cs35l56: Set the init_done flag before component_add() (git- fixes). * ALSA: hda: hda_cs_dsp_ctl: Remove notification of driver write (stable- fixes). * ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes). * ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git- fixes). * ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes). * ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes). * ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes). * ALSA: hda/realtek - fixed headset Mic not show (stable-fixes). * ALSA: hda/realtek - Set GPIO3 to default at S4 state for Thinkpad with ALC1318 (stable-fixes). * ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes). * ALSA: hda/realtek: Add quirk for HP Spectre x360 14 eu0000 (stable-fixes). * ALSA: hda/realtek: Add quirks for ASUS Laptops using CS35L56 (stable-fixes). * ALSA: hda/realtek: Add quirks for HP Omen models using CS35L41 (stable- fixes). * ALSA: hda/realtek: Add quirks for Huawei Matebook D14 NBLB-WAX9N (stable- fixes). * ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes). * ALSA: hda/realtek: Add quirks for some Clevo laptops (stable-fixes). * ALSA: hda/realtek: Add sound quirks for Lenovo Legion slim 7 16ARHA7 models (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook 2024 HN7306W (stable-fixes). * ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes). * ALSA: hda/realtek: cs35l41: Support ASUS ROG G634JYR (stable-fixes). * ALSA: hda/realtek: Drop doubly quirk entry for 103c:8a2e (git-fixes). * ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897 (stable-fixes). * ALSA: hda/realtek: Fix build error without CONFIG_PM (stable-fixes). * ALSA: hda/realtek: Fix conflicting PCI SSID 17aa:386f for Lenovo Legion models (bsc#1223462). * ALSA: hda/realtek: Fix internal speakers for Legion Y9000X 2022 IAH7 (stable-fixes). * ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes). * ALSA: hda/realtek: fix the hp playback volume issue for LG machines (stable- fixes). * ALSA: hda/realtek: Fix volumn control of ThinkBook 16P Gen4 (git-fixes). * ALSA: hda/realtek: Fixes for Asus GU605M and GA403U sound (stable-fixes). * ALSA: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone (git-fixes). * ALSA: hda/tas2781: add locks to kcontrols (git-fixes). * ALSA: hda/tas2781: Add new vendor_id and subsystem_id to support ThinkPad ICE-1 (stable-fixes). * ALSA: hda/tas2781: correct the register for pow calibrated data (git-fixes). * ALSA: hda/tas2781: remove digital gain kcontrol (git-fixes). * ALSA: line6: Zero-initialize message buffers (stable-fixes). * ALSA: scarlett2: Add correct product series name to messages (stable-fixes). * ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable- fixes). * ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable- fixes). * ALSA: scarlett2: Add missing error check to scarlett2_config_save() (git- fixes). * ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes). * ALSA: scarlett2: Default mixer driver to enabled (stable-fixes). * ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes). * ALSA: seq: Do not clear bank selection at event -> UMP MIDI2 conversion (git-fixes). * ALSA: seq: Fix incorrect UMP type for system messages (git-fixes). * ALSA: seq: Fix missing bank setup between MIDI1/MIDI2 UMP conversion (git- fixes). * ALSA: seq: Fix yet another spot for system message conversion (git-fixes). * ALSA: seq: ump: Fix conversion from MIDI2 to MIDI1 UMP messages (git-fixes). * ALSA: seq: ump: Fix swapped song position pointer data (git-fixes). * ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes). * ALSA: timer: Set lower bound of start tick time (stable-fixes). * ALSA: ump: Do not accept an invalid UMP protocol number (git-fixes). * ALSA: ump: Do not clear bank selection after sending a program change (git- fixes). * ALSA: ump: Set default protocol when not given explicitly (git-fixes). * ALSA: usb-audio: Add sampling rates support for Mbox3 (stable-fixes). * ALSA: usb-audio: Fix for sampling rates support for Mbox3 (stable-fixes). * ALSA/hda: intel-dsp-config: reduce log verbosity (git-fixes). * amd/amdkfd: sync all devices to wait all processes being evicted (stable- fixes). * amdkfd: use calloc instead of kzalloc to avoid integer overflow (stable- fixes). * arm_pmu: acpi: Add a representative platform device for TRBE (bsc#1220587) * arm_pmu: acpi: Refactor arm_spe_acpi_register_device() (bsc#1220587) * ARM: 9381/1: kasan: clear stale stack poison (git-fixes). * ARM: imx_v6_v7_defconfig: Restore CONFIG_BACKLIGHT_CLASS_DEVICE (git-fixes). * ARM: imx: Check return value of devm_kasprintf in imx_mmdc_perf_init (git- fixes). * ARM: OMAP2+: fix N810 MMC gpiod table (git-fixes). * ARM: OMAP2+: fix USB regression on Nokia N8x0 (git-fixes). * ARM: prctl: reject PR_SET_MDWE on pre-ARMv6 (stable-fixes). * ARM: s5pv210: fix pm.c kernel-doc warning (git-fixes). * arm64: Add the arm64.no32bit_el0 command line option (jsc#PED-3184). * arm64: bpf: fix 32bit unconditional bswap (git-fixes). * arm64: dts: allwinner: h616: Fix I2C0 pins (git-fixes) * arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes) * arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes) * arm64: dts: Fix dtc interrupt_provider warnings (git-fixes) * arm64: dts: hi3798cv200: fix the size of GICR (git-fixes) * arm64: dts: imx8-ss-conn: fix usb lpcg indices (git-fixes) * arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes) * arm64: dts: imx8-ss-dma: fix adc lpcg indices (git-fixes) * arm64: dts: imx8-ss-dma: fix can lpcg indices (git-fixes) * arm64: dts: imx8-ss-dma: fix spi lpcg indices (git-fixes) * arm64: dts: imx8-ss-lsio: fix pwm lpcg indices (git-fixes) * arm64: dts: imx8qm-ss-dma: fix can lpcg indices (git-fixes) * arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes) * arm64: dts: microchip: sparx5: fix mdio reg (git-fixes) * arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git- fixes) * arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git- fixes) * arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git- fixes) * arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes) * arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git- fixes) * arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes) * arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes) * arm64: dts: rockchip: regulator for sd needs to be always on for (git-fixes) * arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git- fixes) * arm64: dts: rockchip: set PHY address of MT7531 switch to 0x1f (git-fixes) * arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes). * arm64: tegra: Correct Tegra132 I2C alias (git-fixes) * arm64: tegra: Set the correct PHY mode for MGBE (git-fixes) * arm64/head: Disable MMU at EL2 before clearing HCR_EL2.E2H (git-fixes). * arm64/ptrace: Use saved floating point state type to determine SVE (git- fixes) * arm64/sve: Lower the maximum allocation for the SVE ptrace regset (git- fixes) * asm-generic: make sparse happy with odd-sized put_unaligned_*() (stable- fixes). * ASoC: acp: Support microphone from device Acer 315-24p (git-fixes). * ASoC: amd: acp: fix for acp_init function error handling (git-fixes). * ASoC: amd: yc: Add Lenovo ThinkBook 21J0 into DMI quirk table (stable- fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS M7600RE (stable-fixes). * ASoC: amd: yc: Fix non-functional mic on Lenovo 21J2 (stable-fixes). * ASoC: amd: yc: Revert "Fix non-functional mic on Lenovo 21J2" (stable- fixes). * ASoC: codecs: wsa881x: set clk_stop_mode1 flag (git-fixes). * ASoC: cs35l41: Update DSP1RX5/6 Sources for DSP config (git-fixes). * ASoC: cs35l56: Fix unintended bus access while resetting amp (git-fixes). * ASoC: cs35l56: Prevent overwriting firmware ASP config (git-fixes). * ASoC: da7219-aad: fix usage of device_get_named_child_node() (git-fixes). * ASoC: Intel: avs: Fix ASRC module initialization (git-fixes). * ASoC: Intel: avs: Fix potential integer overflow (git-fixes). * ASoC: Intel: avs: Populate board selection with new I2S entries (stable- fixes). * ASoC: Intel: avs: Set name of control as in topology (git-fixes). * ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes). * ASoC: Intel: avs: Test result of avs_get_module_entry() (git-fixes). * ASoC: Intel: bytcr_rt5640: Apply Asus T100TA quirk to Asus T100TAM too (git- fixes). * ASoC: Intel: common: DMI remap for rebranded Intel NUC M15 (LAPRC710) laptops (stable-fixes). * ASoC: Intel: Disable route checks for Skylake boards (git-fixes). * ASoC: kirkwood: Fix potential NULL dereference (git-fixes). * ASoC: mediatek: Assign dummy when codec not specified for a DAI link (git- fixes). * ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes). * ASoC: meson: axg-card: make links nonatomic (git-fixes). * ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes). * ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes). * ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes). * ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes). * ASoC: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes). * ASoC: rockchip: i2s-tdm: Fix inaccurate sampling rates (git-fixes). * ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (git- fixes). * ASoC: rt5645: Make LattePanda board DMI match more precise (stable-fixes). * ASoC: rt5682-sdw: fix locking sequence (git-fixes). * ASoC: rt711-sdca: fix locking sequence (git-fixes). * ASoC: rt711-sdw: fix locking sequence (git-fixes). * ASoC: rt712-sdca-sdw: fix locking sequence (git-fixes). * ASoC: rt715-sdca: volume step modification (git-fixes). * ASoC: rt715: add vendor clear control register (git-fixes). * ASoC: rt722-sdca-sdw: fix locking sequence (git-fixes). * ASoC: rt722-sdca: add headset microphone vrefo setting (git-fixes). * ASoC: rt722-sdca: modify channel number to support 4 channels (git-fixes). * ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes). * ASoC: SOF: amd: Optimize quirk for Valve Galileo (stable-fixes). * ASoC: SOF: Intel: add default firmware library path for LNL (git-fixes). * ASoC: SOF: Intel: hda-dsp: Skip IMR boot on ACE platforms in case of S3 suspend (stable-fixes). * ASoC: SOF: Intel: lnl: Correct rom_status_reg (git-fixes). * ASoC: SOF: Intel: mtl: call dsp dump when boot retry fails (stable-fixes). * ASoC: SOF: Intel: mtl: Correct rom_status_reg (git-fixes). * ASoC: SOF: Intel: mtl: Disable interrupts when firmware boot failed (git- fixes). * ASoC: SOF: Intel: mtl: Implement firmware boot state check (git-fixes). * ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend (stable-fixes). * ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension (git-fixes). * ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes). * ASoC: tas2781: Fix a warning reported by robot kernel test (git-fixes). * ASoC: tas2781: Fix wrong loading calibrated data sequence (git-fixes). * ASoC: tas2781: mark dvc_tlv with __maybe_unused (git-fixes). * ASoC: tegra: Fix DSPK 16-bit playback (git-fixes). * ASoC: ti: Convert Pandora ASoC to GPIO descriptors (stable-fixes). * ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes). * ASoC: tlv320adc3xxx: Do not strip remove function when driver is builtin (git-fixes). * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes). * ASoC: wm_adsp: Add missing MODULE_DESCRIPTION() (git-fixes). * ASoC: wm_adsp: Fix missing mutex_lock in wm_adsp_write_ctl() (git-fixes). * ata: libata-core: Allow command duration limits detection for ACS-4 drives (git-fixes). * ata: pata_legacy: make legacy_exit() work again (git-fixes). * ata: sata_gemini: Check clk_enable() result (stable-fixes). * ata: sata_mv: Fix PCI device ID table declaration compilation warning (git- fixes). * ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes). * autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166). * ax25: Fix netdev refcount issue (git-fixes). * ax25: Fix reference count leak issue of net_device (git-fixes). * ax25: Fix reference count leak issues of ax25_dev (git-fixes). * ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes). * batman-adv: Avoid infinite loop trying to resize local TT (git-fixes). * bitops: add missing prototype check (git-fixes). * blk-cgroup: fix list corruption from reorder of WRITE ->lqueued (bsc#1225605). * blk-cgroup: fix list corruption from resetting io stat (bsc#1225605). * block: fix q->blkg_list corruption during disk rebind (bsc#1223591). * Bluetooth: Add new quirk for broken read key length on ATS2851 (stable- fixes). * Bluetooth: add quirk for broken address properties (git-fixes). * Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable- fixes). * Bluetooth: btintel: Fixe build regression (git-fixes). * Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable- fixes). * Bluetooth: btusb: Fix triggering coredump implementation for QCA (git- fixes). * Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes). * Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes). * Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable- fixes). * Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes). * Bluetooth: hci_core: Cancel request on command timeout (stable-fixes). * Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes). * Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes). * Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes). * Bluetooth: hci_sync: Fix not checking error on hci_cmd_sync_cancel_sync (git-fixes). * Bluetooth: hci_sync: Fix using the same interval and window for Coded PHY (git-fixes). * Bluetooth: hci_sync: Use QoS to determine which PHY to scan (stable-fixes). * Bluetooth: HCI: Fix potential null-ptr-deref (git-fixes). * Bluetooth: ISO: Align broadcast sync_timeout with connection timeout (stable-fixes). * Bluetooth: ISO: Do not reject BT_ISO_QOS if parameters are unset (git- fixes). * Bluetooth: l2cap: Do not double set the HCI_CONN_MGMT_CONNECTED bit (git- fixes). * Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes). * Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes). * Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() (git-fixes). * Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID (bsc#1221504). * Bluetooth: mgmt: Fix limited discoverable off timeout (stable-fixes). * Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes). * Bluetooth: qca: add missing firmware sanity checks (git-fixes). * Bluetooth: qca: fix device-address endianness (git-fixes). * Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes). * Bluetooth: qca: fix firmware check error path (git-fixes). * Bluetooth: qca: fix info leak when fetching fw build id (git-fixes). * Bluetooth: qca: fix NULL-deref on non-serdev setup (git-fixes). * Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes). * Bluetooth: qca: fix NVM configuration parsing (git-fixes). * Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes). * Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes). * bnx2x: Fix firmware version string character counts (git-fixes). * bnxt_en: Fix error recovery for RoCE ulp client (git-fixes). * bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() (git- fixes). * bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes). * bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git- fixes) * bootconfig: Fix the kerneldoc of _xbc_exit() (git-fixes). * bootconfig: use memblock_free_late to free xbc memory to buddy (git-fixes). * bootmem: use kmemleak_free_part_phys in free_bootmem_page (git-fixes). * bootmem: use kmemleak_free_part_phys in put_page_bootmem (git-fixes). * bpf, arm64: fix bug in BPF_LDX_MEMSX (git-fixes) * bpf, arm64: Fix incorrect runtime stats (git-fixes) * bpf, scripts: Correct GPL license name (git-fixes). * bpf: fix precision backtracking instruction iteration (bsc#1225756). * bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes). * bpf: handle ldimm64 properly in check_cfg() (bsc#1225756). * btrfs: add a helper to read the superblock metadata_uuid (git-fixes) * btrfs: add and use helper to check if block group is used (bsc#1220120). * btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes) * btrfs: add new unused block groups to the list of unused block groups (bsc#1220120). * btrfs: allow to run delayed refs by bytes to be released instead of count (bsc#1220120). * btrfs: always clear PERTRANS metadata during commit (git-fixes) * btrfs: always print transaction aborted messages with an error level (git- fixes) * btrfs: always reserve space for delayed refs when starting transaction (bsc#1220120). * btrfs: assert correct lock is held at btrfs_select_ref_head() (bsc#1220120). * btrfs: assert delayed node locked when removing delayed item (git-fixes) * btrfs: avoid start and commit empty transaction when flushing qgroups (bsc#1220120). * btrfs: avoid start and commit empty transaction when starting qgroup rescan (bsc#1220120). * btrfs: avoid starting and committing empty transaction when flushing space (bsc#1220120). * btrfs: avoid starting new transaction when flushing delayed items and refs (bsc#1220120). * btrfs: check for BTRFS_FS_ERROR in pending ordered assert (git-fixes) * btrfs: compare the correct fsid/metadata_uuid in btrfs_validate_super (git- fixes) * btrfs: defrag: avoid unnecessary defrag caused by incorrect extent size (git-fixes) * btrfs: defrag: reject unknown flags of btrfs_ioctl_defrag_range_args (git- fixes) * btrfs: do not allow non subvolume root targets for snapshot (git-fixes) * btrfs: do not arbitrarily slow down delalloc if we're committing (git-fixes) * btrfs: do not delete unused block group if it may be used soon (bsc#1220120). * btrfs: do not refill whole delayed refs block reserve when starting transaction (bsc#1220120). * btrfs: do not start transaction when joining with TRANS_JOIN_NOSTART (git- fixes) * btrfs: do not steal space from global rsv after a transaction abort (bsc#1220120). * btrfs: do not warn if discard range is not aligned to sector (git-fixes) * btrfs: ensure fiemap does not race with writes when FIEMAP_FLAG_SYNC is given (bsc#1223285). * btrfs: error out when COWing block using a stale transaction (git-fixes) * btrfs: error out when reallocating block for defrag using a stale transaction (git-fixes) * btrfs: error when COWing block from a root that is being deleted (git-fixes) * btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes) * btrfs: fail priority metadata ticket with real fs error (bsc#1220120). * btrfs: file_remove_privs needs an exclusive lock in direct io write (git- fixes) * btrfs: fix 64bit compat send ioctl arguments not initializing version member (git-fixes) * btrfs: fix deadlock with fiemap and extent locking (bsc#1223285). * btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes) * btrfs: fix kvcalloc() arguments order in btrfs_ioctl_send() (git-fixes) * btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes) * btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes) * btrfs: fix off-by-one when checking chunk map includes logical address (git- fixes) * btrfs: fix race between ordered extent completion and fiemap (bsc#1223285). * btrfs: fix race when detecting delalloc ranges during fiemap (bsc#1223285). * btrfs: fix race when refilling delayed refs block reserve (git-fixes) * btrfs: fix start transaction qgroup rsv double free (git-fixes) * btrfs: fix stripe length calculation for non-zoned data chunk allocation (bsc#1217489). * btrfs: fix wrong block_start calculation for btrfs_drop_extent_map_range() (git-fixes) Dropped hunk in selftests (test_case_7), 92e1229b204d6. * btrfs: free qgroup rsv on io failure (git-fixes) * btrfs: free the allocated memory if btrfs_alloc_page_array() fails (git- fixes) * btrfs: get rid of label and goto at insert_delayed_ref() (bsc#1220120). * btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git- fixes) * btrfs: handle errors properly in update_inline_extent_backref() (git-fixes) * btrfs: initialize key where it's used when running delayed data ref (bsc#1220120). * btrfs: log message if extent item not found when running delayed extent op (bsc#1220120). * btrfs: make btrfs_cleanup_fs_roots() static (bsc#1220120). * btrfs: make btrfs_destroy_delayed_refs() return void (bsc#1220120). * btrfs: make btrfs_destroy_marked_extents() return void (bsc#1220120). * btrfs: make btrfs_destroy_pinned_extent() return void (bsc#1220120). * btrfs: make error messages more clear when getting a chunk map (git-fixes) * btrfs: make find_first_extent_bit() return a boolean (bsc#1220120). * btrfs: make find_free_dev_extent() static (bsc#1220120). * btrfs: make insert_delayed_ref() return a bool instead of an int (bsc#1220120). * btrfs: merge find_free_dev_extent() and find_free_dev_extent_start() (bsc#1220120). * btrfs: move btrfs_free_excluded_extents() into block-group.c (bsc#1220120). * btrfs: open code trivial btrfs_add_excluded_extent() (bsc#1220120). * btrfs: output extra debug info if we failed to find an inline backref (git- fixes) * btrfs: pass a space_info argument to btrfs_reserve_metadata_bytes() (bsc#1220120). * btrfs: prevent transaction block reserve underflow when starting transaction (git-fixes) * btrfs: print available space across all block groups when dumping space info (bsc#1220120). * btrfs: print available space for a block group when dumping a space info (bsc#1220120). * btrfs: print block group super and delalloc bytes when dumping space info (bsc#1220120). * btrfs: print target number of bytes when dumping free space (bsc#1220120). * btrfs: qgroup: always free reserved space for extent records (bsc#1216196). * btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans (git- fixes) * btrfs: record delayed inode root in transaction (git-fixes) * btrfs: reject encoded write if inode has nodatasum flag set (git-fixes) * btrfs: release path before inode lookup during the ino lookup ioctl (git- fixes) * btrfs: remove pointless 'ref_root' variable from run_delayed_data_ref() (bsc#1220120). * btrfs: remove pointless in_tree field from struct btrfs_delayed_ref_node (bsc#1220120). * btrfs: remove pointless initialization at btrfs_delayed_refs_rsv_release() (bsc#1220120). * btrfs: remove redundant BUG_ON() from __btrfs_inc_extent_ref() (bsc#1220120). * btrfs: remove refs_to_add argument from __btrfs_inc_extent_ref() (bsc#1220120). * btrfs: remove refs_to_drop argument from __btrfs_free_extent() (bsc#1220120). * btrfs: remove the refcount warning/check at btrfs_put_delayed_ref() (bsc#1220120). * btrfs: remove unnecessary logic when running new delayed references (bsc#1220120). * btrfs: remove unnecessary prototype declarations at disk-io.c (bsc#1220120). * btrfs: remove unused is_head field from struct btrfs_delayed_ref_node (bsc#1220120). * btrfs: rename add_new_free_space() to btrfs_add_new_free_space() (bsc#1220120). * btrfs: reorder some members of struct btrfs_delayed_ref_head (bsc#1220120). * btrfs: reserve space for delayed refs on a per ref basis (bsc#1220120). * btrfs: reset destination buffer when read_extent_buffer() gets invalid range (git-fixes) * btrfs: return -EUCLEAN for delayed tree ref with a ref count not equals to 1 (git-fixes) * btrfs: return -EUCLEAN if extent item is missing when searching inline backref (bsc#1220120). * btrfs: return real error when orphan cleanup fails due to a transaction abort (bsc#1220120). * btrfs: send: do not issue unnecessary zero writes for trailing hole (bsc#1222459). * btrfs: send: ensure send_fd is writable (git-fixes) * btrfs: send: handle path ref underflow in header iterate_inode_ref() (git- fixes) * btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes) * btrfs: set page extent mapped after read_folio in relocate_one_page (git- fixes) * btrfs: simplify check for extent item overrun at lookup_inline_extent_backref() (bsc#1220120). * btrfs: stop doing excessive space reservation for csum deletion (bsc#1220120). * btrfs: store the error that turned the fs into error state (bsc#1220120). * btrfs: sysfs: validate scrub_speed_max value (git-fixes) * btrfs: tree-checker: fix inline ref size in error messages (git-fixes) * btrfs: update comment for btrfs_join_transaction_nostart() (bsc#1220120). * btrfs: update documentation for add_new_free_space() (bsc#1220120). * btrfs: use a bool to track qgroup record insertion when adding ref head (bsc#1220120). * btrfs: use a single switch statement when initializing delayed ref head (bsc#1220120). * btrfs: use a single variable for return value at lookup_inline_extent_backref() (bsc#1220120). * btrfs: use a single variable for return value at run_delayed_extent_op() (bsc#1220120). * btrfs: use bool type for delayed ref head fields that are used as booleans (bsc#1220120). * btrfs: use the correct superblock to compare fsid in btrfs_validate_super (git-fixes) * btrfs: use u64 for buffer sizes in the tree search ioctls (git-fixes) * btrfs: zoned: do not skip block groups with 100% zone unusable (bsc#1220120). * bus: mhi: ep: check the correct variable in mhi_ep_register_controller() (git-fixes). * ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE (bsc#1224866). * ceph: stop copying to iter at EOF on sync reads (bsc#1222606). * certs: Add ECDSA signature verification self-test (bsc#1222777). * certs: Move RSA self-test data to separate file (bsc#1222777). * clk: Do not hold prepare_lock when calling kref_put() (stable-fixes). * clk: Get runtime PM before walking tree during disable_unused (git-fixes). * clk: Get runtime PM before walking tree for clk_summary (git-fixes). * clk: Initialize struct clk_core kref earlier (stable-fixes). * clk: mediatek: Do a runtime PM get on controllers during probe (git-fixes). * clk: mediatek: mt8365-mm: fix DPI0 parent (git-fixes). * clk: mediatek: pllfh: Do not log error for missing fhctl node (git-fixes). * clk: qcom: clk-alpha-pll: fix rate setting for Stromer PLLs (git-fixes). * clk: qcom: clk-alpha-pll: remove invalid Stromer register offset (git- fixes). * clk: qcom: dispcc-sm6350: fix DisplayPort clocks (git-fixes). * clk: qcom: dispcc-sm8450: fix DisplayPort clocks (git-fixes). * clk: qcom: dispcc-sm8550: fix DisplayPort clocks (git-fixes). * clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes). * clk: qcom: reset: Commonize the de/assert functions (stable-fixes). * clk: qcom: reset: Ensure write completion on reset de/assertion (git-fixes). * clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes). * clk: renesas: r8a779a0: Fix CANFD parent clock (git-fixes). * clk: renesas: r9a07g043: Add clock and reset entry for PLIC (git-fixes). * clk: rs9: fix wrong default value for clock amplitude (git-fixes). * clk: samsung: exynosautov9: fix wrong pll clock id value (git-fixes). * clk: Show active consumers of clocks in debugfs (stable-fixes). * clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (git-fixes). * clocksource/drivers/arm_global_timer: Fix maximum prescaler value (git- fixes). * clocksource/drivers/imx: Fix -Wunused-but-set-variable warning (git-fixes). * comedi: vmk80xx: fix incomplete endpoint checking (git-fixes). * coresight: trbe: Add a representative coresight_platform_data for (bsc#1220587) * coresight: trbe: Allocate platform data per device (bsc#1220587) * coresight: trbe: Enable ACPI based TRBE devices (bsc#1220587) * counter: linux/counter.h: fix Excess kernel-doc description warning (git- fixes). * cppc_cpufreq: Fix possible null pointer dereference (git-fixes). * cpufreq: brcmstb-avs-cpufreq: ISO C90 forbids mixed declarations (git- fixes). * cpufreq: exit() callback is optional (git-fixes). * cpumask: Add for_each_cpu_from() (bsc#1225053). * crypto: bcm - Fix pointer arithmetic (git-fixes). * crypto: ccp - Add support for PCI device 0x156E (bsc#1223338). * crypto: ccp - Add support for PCI device 0x17E0 (bsc#1223338). * crypto: ccp - drop platform ifdef checks (git-fixes). * crypto: ecc - update ecc_gen_privkey for FIPS 186-5 (bsc#1222782). * crypto: ecdsa - Fix module auto-load on add-key (git-fixes). * crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init (git-fixes). * crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (git-fixes). * crypto: qat - fix ring to service map for dcc in 4xxx (git-fixes). * crypto: qat - improve error logging to be consistent across features (git- fixes). * crypto: qat - relocate and rename get_service_enabled() (stable-fixes). * crypto: qat - specify firmware files for 402xx (git-fixes). * crypto: rsa - add a check for allocation failure (bsc#1222775). * crypto: rsa - allow only odd e and restrict value in FIPS mode (bsc#1222775). * crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c (bsc#1222769). * crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes). * cxl/acpi: Fix load failures due to single window creation failure (git- fixes). * cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window (git-fixes). * cxl/trace: Properly initialize cxl_poison region name (git-fixes). * dax: alloc_dax() return ERR_PTR(-EOPNOTSUPP) for CONFIG_DAX=n (jsc#PED-5853). * dax/bus.c: replace driver-core lock usage by a local rwsem (jsc#PED-5853). * dax/bus.c: replace several sprintf() with sysfs_emit() (jsc#PED-5853). * device-dax: make dax_bus_type const (jsc#PED-5853). * dlm: fix user space lkb refcounting (git-fixes). * dm crypt: remove redundant state settings after waking up (jsc#PED-7542). * dm thin: add braces around conditional code that spans lines (jsc#PED-7542). * dm verity: set DM_TARGET_SINGLETON feature flag (jsc#PED-7542). * dm-integrity: set max_integrity_segments in dm_integrity_io_hints (jsc#PED-7542). * dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575). * dm-raid: add a new helper prepare_suspend() in md_personality (jsc#PED-7542). * dm-raid: really frozen sync_thread during suspend (jsc#PED-7542). * dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape (bsc#1219596) * dm: update relevant MODULE_AUTHOR entries to latest dm-devel mailing list (jsc#PED-7542). * dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes). * dma-buf: Fix NULL pointer dereference in sanitycheck() (git-fixes). * dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (git-fixes). * dma-mapping: benchmark: fix node id validation (git-fixes). * dma-mapping: benchmark: handle NUMA_NO_NODE correctly (git-fixes). * dma: xilinx_dpdma: Fix locking (git-fixes). * dmaengine: axi-dmac: fix possible race in remove() (git-fixes). * dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes). * dmaengine: idxd: Avoid unnecessary destruction of file_ida (git-fixes). * dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes). * dmaengine: owl: fix register access functions (git-fixes). * dmaengine: tegra186: Fix residual calculation (git-fixes). * driver core: Introduce device_link_wait_removal() (stable-fixes). * drivers/nvme: Add quirks for device 126f:2262 (git-fixes). * drm: add drm_gem_object_is_shared_for_memory_stats() helper (stable-fixes). * drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git- fixes). * drm: Check output polling initialized before disabling (stable-fixes). * drm: Check polling initialized before enabling in drm_helper_probe_single_connector_modes (stable-fixes). * drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes). * drm: nv04: Fix out of bounds access (git-fixes). * drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes). * drm: vc4: Fix possible null pointer dereference (git-fixes). * drm: zynqmp_dpsub: Always register bridge (git-fixes). * drm/amd: Flush GFXOFF requests in prepare stage (git-fixes). * drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() (stable-fixes). * drm/amd/display: Add dml2 copy functions (stable-fixes). * drm/amd/display: Allow dirty rects to be sent to dmub when abm is active (stable-fixes). * drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes). * drm/amd/display: Change default size for dummy plane in DML2 (stable-fixes). * drm/amd/display: Do not recursively call manual trigger programming (stable- fixes). * drm/amd/display: Enable colorspace property for MST connectors (git-fixes). * drm/amd/display: Fix bounds check for dcn35 DcfClocks (git-fixes). * drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes). * drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes). * drm/amd/display: Fix idle check for shared firmware state (stable-fixes). * drm/amd/display: Fix incorrect DSC instance for MST (stable-fixes). * drm/amd/display: fix input states translation error for dcn35 & dcn351 (stable-fixes). * drm/amd/display: Fix nanosec stat overflow (stable-fixes). * drm/amd/display: Fix noise issue on HDMI AV mute (stable-fixes). * drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes). * drm/amd/display: handle range offsets in VRR ranges (stable-fixes). * drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes). * drm/amd/display: Init DPPCLK from SMU on dcn32 (stable-fixes). * drm/amd/display: Override min required DCFCLK in dml1_validate (stable- fixes). * drm/amd/display: Prevent crash when disable stream (stable-fixes). * drm/amd/display: Program VSC SDP colorimetry for all DP sinks >= 1.4 (stable-fixes). * drm/amd/display: Remove MPC rate control logic from DCN30 and above (stable- fixes). * drm/amd/display: Remove redundant condition in dcn35_calc_blocks_to_gate() (git-fixes). * drm/amd/display: Return the correct HDCP error code (stable-fixes). * drm/amd/display: Send DTBCLK disable message on first commit (git-fixes). * drm/amd/display: Set DCN351 BB and IP the same as DCN35 (stable-fixes). * drm/amd/display: Set VSC SDP Colorimetry same way for MST and SST (stable- fixes). * drm/amd/display: Update odm when ODM combine is changed on an otg master pipe with no plane (stable-fixes). * drm/amd/display: Use freesync when `DRM_EDID_FEATURE_CONTINUOUS_FREQ` found (stable-fixes). * drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes). * drm/amd/swsmu: modify the gfx activity scaling (stable-fixes). * drm/amdgpu: always force full reset for SOC21 (stable-fixes). * drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes). * drm/amdgpu: Assign correct bits for SDMA HDP flush (stable-fixes). * drm/amdgpu: drop setting buffer funcs in sdma442 (git-fixes). * drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable- fixes). * drm/amdgpu: Fix comparison in amdgpu_res_cpu_visible (git-fixes). * drm/amdgpu: fix deadlock while reading mqd from debugfs (git-fixes). * drm/amdgpu: fix doorbell regression (git-fixes). * drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes). * drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes). * drm/amdgpu: fix mmhub client id out-of-bounds access (git-fixes). * drm/amdgpu: fix use-after-free bug (stable-fixes). * drm/amdgpu: Fix VCN allocation in CPX partition (stable-fixes). * drm/amdgpu: fix visible VRAM handling during faults (git-fixes). * drm/amdgpu: implement IRQ_STATE_ENABLE for SDMA v4.4.2 (stable-fixes). * drm/amdgpu: make damage clips support configurable (stable-fixes). * drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes). * drm/amdgpu: Refine IB schedule error logging (stable-fixes). * drm/amdgpu: remove invalid resource->start check v2 (git-fixes). * drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes). * drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes). * drm/amdgpu/display: Address kdoc for 'is_psr_su' in 'fill_dc_dirty_rects' (git-fixes). * drm/amdgpu/pm: Check the validity of overdiver power limit (git-fixes). * drm/amdgpu/pm: Fix NULL pointer dereference when get power limit (git- fixes). * drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes). * drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes). * drm/amdkfd: Check cgroup when returning DMABuf info (stable-fixes). * drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git- fixes). * drm/amdkfd: Fix memory leak in create_process failure (git-fixes). * drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes). * drm/amdkfd: range check cp bad op exception interrupts (stable-fixes). * drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes). * drm/arm/malidp: fix a possible null pointer dereference (git-fixes). * drm/ast: Fix soft lockup (git-fixes). * drm/bridge: anx7625: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: anx7625: Update audio status while detecting (git-fixes). * drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: Fix improper bridge init order with pre_enable_prev_first (git- fixes). * drm/bridge: icn6211: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611uxc: Do not log an error when DSI host can't be found (git-fixes). * drm/bridge: tc358775: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes). * drm/buddy: check range allocation matches alignment (stable-fixes). * drm/ci: update device type for volteer devices (git-fixes). * drm/client: Fully protect modes[] with dev->mode_config.mutex (stable- fixes). * drm/connector: Add \n to message about demoting connector force-probes (git- fixes). * drm/display: fix typo (git-fixes). * drm/exynos: do not return negative values from .get_modes() (stable-fixes). * drm/fbdev-generic: Do not set physical framebuffer address (git-fixes). * drm/gma500: Remove lid code (git-fixes). * drm/i915: Disable live M/N updates when using bigjoiner (stable-fixes). * drm/i915: Disable port sync when bigjoiner is used (stable-fixes). * drm/i915: Do not match JSL in ehl_combo_pll_div_frac_wa_needed() (git- fixes). * drm/i915: Fix audio component initialization (git-fixes). * drm/i915: Include the PLL name in the debug messages (stable-fixes). * drm/i915: Pre-populate the cursor physical dma address (git-fixes). * drm/i915: Replace a memset() with zero initialization (stable-fixes). * drm/i915: Stop printing pipe name as hex (stable-fixes). * drm/i915: Suppress old PLL pipe_mask checks for MG/TC/TBT PLLs (stable- fixes). * drm/i915: Try to preserve the current shared_dpll for fastset on type-c ports (stable-fixes). * drm/i915: Use named initializers for DPLL info (stable-fixes). * drm/i915/audio: Fix audio time stamp programming for DP (stable-fixes). * drm/i915/bios: Fix parsing backlight BDB data (git-fixes). * drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (stable-fixes). * drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git- fixes). * drm/i915/display: Use i915_gem_object_get_dma_address to get dma address (stable-fixes). * drm/i915/dp: Fix the computation for compressed_bpp for DISPLAY < 13 (git-fixes). * drm/i915/dp: Remove support for UHBR13.5 (git-fixes). * drm/i915/dpt: Make DPT object unshrinkable (git-fixes). * drm/i915/dsb: Fix DSB vblank waits when using VRR (git-fixes). * drm/i915/dsi: Go back to the previous INIT_OTP/DISPLAY_ON order, mostly (git-fixes). * drm/i915/gt: Automate CCS Mode setting during engine resets (git-fixes). * drm/i915/gt: Disable HW load balancing for CCS (git-fixes). * drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes). * drm/i915/gt: Do not generate the command streamer for all the CCS (git- fixes). * drm/i915/gt: Enable only one CCS for compute workload (git-fixes). * drm/i915/gt: Fix CCS id's calculation for CCS mode setting (git-fixes). * drm/i915/gt: Reset queue_priority_hint on parking (git-fixes). * drm/i915/guc: avoid FIELD_PREP warning (git-fixes). * drm/i915/hwmon: Fix locking inversion in sysfs getter (git-fixes). * drm/i915/lspcon: Separate function to set expected mode (bsc#1193599). * drm/i915/lspcon: Separate lspcon probe and lspcon init (bsc#1193599). * drm/i915/mst: Limit MST+DSC to TGL+ (git-fixes). * drm/i915/mst: Reject FEC+MST on ICL (git-fixes). * drm/i915/mtl: Update workaround 14018575942 (git-fixes). * drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes). * drm/i915/vrr: Generate VRR "safe window" for DSB (git-fixes). * drm/imx/ipuv3: do not return negative values from .get_modes() (stable- fixes). * drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes). * drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes). * drm/mediatek: dp: Fix mtk_dp_aux_transfer return value (git-fixes). * drm/mediatek: Init `ddp_comp` with devm_kcalloc() (git-fixes). * drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes). * drm/meson: dw-hdmi: power up phy on device init (git-fixes). * drm/meson: gate px_clk when setting rate (git-fixes). * drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes). * drm/msm: Add newlines to some debug prints (git-fixes). * drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git- fixes). * drm/msm/adreno: fix CP cycles stat retrieval on a7xx (git-fixes). * drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes). * drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git- fixes). * drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes). * drm/msm/dpu: Add callback function pointer check before its call (git- fixes). * drm/msm/dpu: Allow configuring multiple active DSC blocks (git-fixes). * drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes). * drm/msm/dpu: do not allow overriding data from catalog (git-fixes). * drm/msm/dpu: make error messages at dpu_core_irq_register_callback() more sensible (git-fixes). * drm/msm/dpu: use devres-managed allocation for MDP TOP (stable-fixes). * drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes). * drm/nouveau: use tile_mode and pte_kind for VM_BIND bo allocations (git- fixes). * drm/nouveau/disp: Fix missing backlight control on Macbook 5, 1 (bsc#1223838). * drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes). * drm/nouveau/dp: Fix incorrect return code in r535_dp_aux_xfer() (git-fixes). * drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (stable- fixes). * drm/omapdrm: Fix console by implementing fb_dirty (git-fixes). * drm/panel: do not return negative error codes from drm_panel_get_modes() (stable-fixes). * drm/panel: ili9341: Respect deferred probe (git-fixes). * drm/panel: ili9341: Use predefined error codes (git-fixes). * drm/panel: ltk050h3146w: add MIPI_DSI_MODE_VIDEO to LTK050H3148W flags (git- fixes). * drm/panel: ltk050h3146w: drop duplicate commands from LTK050H3148W init (git-fixes). * drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes). * drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes). * drm/panel: sitronix-st7789v: fix display size for jt240mhqs_hwt_ek_e3 panel (git-fixes). * drm/panel: sitronix-st7789v: fix timing for jt240mhqs_hwt_ek_e3 panel (git- fixes). * drm/panel: sitronix-st7789v: tweak timing for jt240mhqs_hwt_ek_e3 panel (git-fixes). * drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes). * drm/panfrost: fix power transition timeout warnings (git-fixes). * drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() (git- fixes). * drm/prime: Unbreak virtgpu dma-buf export (git-fixes). * drm/probe-helper: warn about negative .get_modes() (stable-fixes). * drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git- fixes). * drm/qxl: remove unused variable from `qxl_process_single_command()` (git- fixes). * drm/radeon: make -fstrict-flex-arrays=3 happy (git-fixes). * drm/radeon: silence UBSAN warning (v3) (stable-fixes). * drm/rockchip: vop2: Do not divide height twice for YUV (git-fixes). * drm/rockchip: vop2: Remove AR30 and AB30 format support (git-fixes). * drm/sched: fix null-ptr-deref in init entity (git-fixes). * drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (git-fixes). * drm/ttm: return ENOSPC from ttm_bo_mem_space v3 (stable-fixes). * drm/ttm: stop pooling cached NUMA pages v2 (git-fixes). * drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes). * drm/vc4: hdmi: do not return negative values from .get_modes() (stable- fixes). * drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git- fixes). * drm/vmwgfx: Enable DMA mappings with SEV (git-fixes). * drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes). * drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes). * drm/vmwgfx: Fix Legacy Display Unit (git-fixes). * drm/vmwgfx: Fix prime import/export (git-fixes). * drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes). * dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes) * dump_stack: Do not get cpu_sync for panic CPU (bsc#1225607). * dyndbg: fix old BUG_ON in >control parser (stable-fixes). * e1000e: Minor flow correction in e1000_shutdown function (git-fixes). * e1000e: move force SMBUS from enable ulp function to avoid PHY loss issue (git-fixes). * e1000e: Workaround for sporadic MDI error on Meteor Lake systems (git- fixes). * ecryptfs: Fix buffer size for tag 66 packet (git-fixes) * ecryptfs: Reject casefold directory inodes (git-fixes) * EDAC/synopsys: Fix ECC status and IRQ control race condition (git-fixes). * efi: disable mirror feature during crashkernel (stable-fixes). * efi: fix panic in kdump kernel (git-fixes). * efi: libstub: only free priv.runtime_map when allocated (git-fixes). * efi/unaccepted: do not let /proc/vmcore try to access unaccepted memory (git-fixes). * efi/unaccepted: touch soft lockup during memory accept (git-fixes). * extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes). * fast_dput(): handle underflows gracefully (git-fixes) * fat: fix uninitialized field in nostale filehandles (git-fixes) * fbdev: fix incorrect address computation in deferred IO (git-fixes). * fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes). * fbdev: sh7760fb: allow modular build (git-fixes). * fbdev: shmobile: fix snprintf truncation (git-fixes). * fbdev: sisfb: hide unused variables (git-fixes). * fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes). * fbmon: prevent division by zero in fb_videomode_from_videomode() (stable- fixes). * firewire: core: use long bus reset on gap count error (stable-fixes). * firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes). * firmware: arm_scmi: Make raw debugfs entries non-seekable (git-fixes). * firmware: dmi-id: add a release callback function (git-fixes). * firmware: raspberrypi: Use correct device for DMA mappings (git-fixes). * firmware: tegra: bpmp: Return directly after a failed kzalloc() in get_filename() (stable-fixes). * fs: Fix error checking for d_hash_and_lookup() (git-fixes) * fs: indicate request originates from old mount API (git-fixes) * fs: relax mount_setattr() permission checks (git-fixes) * fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes) * fs/9p: translate O_TRUNC into OTRUNC (git-fixes) * fsverity: skip PKCS#7 parser when keyring is empty (git-fixes) * ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes). * fuse: do not unhash root (bsc#1223946). * fuse: fix root lookup with nonzero generation (bsc#1223945). * geneve: fix header validation in geneve[6]_xmit_skb (git-fixes). * geneve: make sure to pull inner header in geneve_rx() (git-fixes). * gpio: cdev: check for NULL labels when sanitizing them for irqs (git-fixes). * gpio: cdev: fix missed label sanitizing in debounce_setup() (git-fixes). * gpio: cdev: sanitize the label before requesting the interrupt (stable- fixes). * gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes). * gpio: tangier: Use correct type for the IRQ chip data (git-fixes). * gpio: tegra186: Fix tegra186_gpio_is_accessible() check (git-fixes). * gpio: wcove: Use -ENOTSUPP consistently (stable-fixes). * gpiolib: cdev: fix uninitialised kfifo (git-fixes). * gpiolib: cdev: relocate debounce_period_us from struct gpio_desc (stable- fixes). * gpiolib: swnode: Remove wrong header inclusion (git-fixes). * gpu: host1x: Do not setup DMA for virtual devices (stable-fixes). * gtp: fix use-after-free and null-ptr-deref in gtp_newlink() (git-fixes). * HID: amd_sfh: Handle "no sensors" in PM operations (git-fixes). * HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up (git- fixes). * HID: input: avoid polling stylus battery on Chromebook Pompom (stable- fixes). * HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes). * HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes). * HID: logitech-dj: allow mice to use all types of reports (git-fixes). * HID: multitouch: Add required quirk for Synaptics 0xcddc device (stable- fixes). * hwmon: (amc6821) add of_match table (stable-fixes). * hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git- fixes). * hwmon: (corsair-cpro) Use a separate buffer for sending commands (git- fixes). * hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes). * hwmon: (intel-m10-bmc-hwmon) Fix multiplier for N6000 board power sensor (git-fixes). * hwmon: (lm70) fix links in doc and comments (git-fixes). * hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes). * hwmon: (shtc1) Fix property misspelling (git-fixes). * hwtracing: hisi_ptt: Move type check to the beginning of hisi_ptt_pmu_event_init() (git-fixes). * i2c: acpi: Unbind mux adapters before delete (git-fixes). * i2c: cadence: Avoid fifo clear after start (git-fixes). * i2c: pxa: hide unused icr_bits[] variable (git-fixes). * i2c: smbus: fix NULL function pointer dereference (git-fixes). * i2c: synquacer: Fix an error handling path in synquacer_i2c_probe() (git- fixes). * i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes). * i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes). * i40e: disable NAPI right after disabling irqs when handling xsk_pool (git- fixes). * i40e: Enforce software interrupt during busy-poll exit (git-fixes). * i40e: Fix firmware version comparison function (git-fixes). * i40e: fix i40e_count_filters() to count only active/new filters (git-fixes). * i40e: Fix VF MAC filter removal (git-fixes). * i40e: fix vf may be used uninitialized in this function warning (git-fixes). * i915: make inject_virtual_interrupt() void (stable-fixes). * IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes) * ice: fix enabling RX VLAN filtering (git-fixes). * ice: fix memory corruption bug with suspend and rebuild (git-fixes). * ice: fix stats being updated by way too large values (git-fixes). * ice: fix typo in assignment (git-fixes). * ice: fix uninitialized dplls mutex usage (git-fixes). * ice: reconfig host after changing MSI-X on VF (git-fixes). * ice: Refactor FW data type and fix bitmap casting issue (git-fixes). * ice: reorder disabling IRQ and NAPI in ice_qp_dis (git-fixes). * ice: use relative VSI index for VFs instead of PF VSI number (git-fixes). * ice: virtchnl: stop pretending to support RSS over AQ or registers (git- fixes). * ida: make 'ida_dump' static (git-fixes). * idma64: Do not try to serve interrupts when device is powered off (git- fixes). * idpf: disable local BH when scheduling napi for marker packets (git-fixes). * idpf: extend tx watchdog timeout (bsc#1224137). * idpf: fix kernel panic on unknown packet types (git-fixes). * igb: extend PTP timestamp adjustments to i211 (git-fixes). * igb: Fix missing time sync events (git-fixes). * igc: avoid returning frame twice in XDP_REDIRECT (git-fixes). * igc: Fix missing time sync events (git-fixes). * igc: Remove stale comment about Tx timestamping (git-fixes). * iio: accel: mxc4005: Interrupt handling fixes (git-fixes). * iio: adc: stm32: Fixing err code to not indicate success (git-fixes). * iio: core: Leave private pointer NULL when no private data supplied (git- fixes). * iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes). * iio: gts-helper: Fix division loop (git-fixes). * iio: pressure: dps310: support negative temperature values (git-fixes). * iio: pressure: Fixes BME280 SPI driver data (git-fixes). * iio:imu: adis16475: Fix sync mode setting (git-fixes). * inet_diag: annotate data-races around inet_diag_table[] (git-fixes). * inet: frags: eliminate kernel-doc warning (git-fixes). * init: open /initrd.image with O_LARGEFILE (stable-fixes). * init/main.c: Fix potential static_command_line memory overflow (git-fixes). * Input: allocate keycode for Display refresh rate toggle (stable-fixes). * Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes). * Input: gpio_keys_polled - suppress deferred probe error for gpio (stable- fixes). * Input: imagis - use FIELD_GET where applicable (stable-fixes). * Input: ims-pcu - fix printf string overflow (git-fixes). * Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes). * Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails (stable-fixes). * Input: xpad - add additional HyperX Controller Identifiers (stable-fixes). * Input: xpad - add support for Snakebyte GAMEPADs (stable-fixes). * input/touchscreen: imagis: Correct the maximum touch area value (stable- fixes). * intel: legacy: Partial revert of field get conversion (git-fixes). * interconnect: qcom: osm-l3: Replace custom implementation of COUNT_ARGS() (git-fixes). * interconnect: qcom: qcm2290: Fix mas_snoc_bimc QoS port assignment (git- fixes). * interconnect: qcom: sc8180x: Mark CO0 BCM keepalive (git-fixes). * interconnect: qcom: sm8550: Enable sync_state (git-fixes). * io_uring: kabi cookie remove (bsc#1217384). * iomap: clear the per-folio dirty bits on all writeback failures (git-fixes) * iommu: Map reserved memory as cacheable if device is coherent (git-fixes). * iommu/arm-smmu-v3: Check that the RID domain is S1 in SVA (git-fixes). * iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331) * iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes). * iommu/vt-d: Allocate local memory for page request queue (git-fixes). * iommu/vt-d: Fix wrong use of pasid config (git-fixes). * iommu/vt-d: Set SSADE when attaching to a parent with dirty tracking (git- fixes). * iommu/vt-d: Update iotlb in nested domain attach (git-fixes). * iommufd: Add missing IOMMUFD_DRIVER kconfig for the selftest (git-fixes). * iommufd: Fix iopt_access_list_id overwrite bug (git-fixes). * iommufd: Reject non-zero data_type if no data_len is provided (git-fixes). * iommufd/iova_bitmap: Bounds check mapped::pages access (git-fixes). * iommufd/iova_bitmap: Consider page offset for the pages to be pinned (git- fixes). * iommufd/iova_bitmap: Switch iova_bitmap::bitmap to an u8 array (git-fixes). * ionic: set adminq irq affinity (git-fixes). * ipv4: annotate data-races around fi->fib_dead (git-fixes). * irqchip/alpine-msi: Fix off-by-one in allocation error path (git-fixes). * irqchip/armada-370-xp: Suppress unused-function warning (git-fixes). * irqchip/gic-v3-its: Do not assume vPE tables are preallocated (git-fixes). * irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git- fixes). * irqchip/gic-v3-its: Prevent double free on error (git-fixes). * irqchip/loongson-pch-msi: Fix off-by-one on allocation error path (git- fixes). * irqchip/mbigen: Do not use bus_get_dev_root() to find the parent (git- fixes). * irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on register's index (stable-fixes). * irqchip/renesas-rzg2l: Flush posted write in irq_eoi() (git-fixes). * irqchip/renesas-rzg2l: Implement restriction when writing ISCR register (stable-fixes). * irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type (git-fixes). * irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() (stable-fixes). * irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() (stable-fixes). * ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes). * ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes). * jffs2: prevent xattr node from overflowing the eraseblock (git-fixes). * kabi/severities: ignore brcmfmac-specific local symbols * kabi/severities: ignore IMS functions They were dropped in previous patches. Noone is supposed to use them. * kabi/severities: ignore TAS2781 symbol drop, it's only locally used * kabi/severities: ignore Wangxun ethernet driver local symbols * kabi/severities: Remove mitigation-related symbols Those are used by the core kernel to implement CPU vulnerabilities mitigation and are not expected to be consumed by 3rd party users. * kasan, fortify: properly rename memintrinsics (git-fixes). * kasan: disable kasan_non_canonical_hook() for HW tags (git-fixes). * kasan: print the original fault addr when access invalid shadow (git-fixes). * kasan/test: avoid gcc warning for intentional overflow (git-fixes). * kexec: do syscore_shutdown() in kernel_kexec (git-fixes). * KEYS: trusted: Do not use WARN when encode fails (git-fixes). * KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes). * kprobes: Fix possible use-after-free issue on kprobe registration (git- fixes). * kselftest: Add a ksft_perror() helper (stable-fixes). * kunit/fortify: Fix mismatched kvalloc()/vfree() usage (git-fixes). * KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git- fixes). * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224790). * KVM: SVM: Add support for allowing zero SEV ASIDs (git-fixes). * KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (git-fixes). * KVM: SVM: Use unsigned integers when dealing with ASIDs (git-fixes). * KVM: VMX: Disable LBR virtualization if the CPU does not support LBR callstacks (git-fixes). * KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes). * KVM: x86: Allow, do not ignore, same-value writes to immutable MSRs (git- fixes). * KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes). * KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (git- fixes). * KVM: x86: Introduce __kvm_get_hypervisor_cpuid() helper (git-fixes). * KVM: x86: Mark target gfn of emulated atomic instruction as dirty (git- fixes). * KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabled (git- fixes). * KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible (git-fixes). * KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP (git-fixes). * KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT (git- fixes). * KVM: x86/mmu: Do not force emulation of L2 accesses to non-APIC internal slots (git-fixes). * KVM: x86/mmu: Move private vs. shared check above slot validity checks (git- fixes). * KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU (git-fixes). * KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status (git-fixes). * KVM: x86/pmu: Allow programming events that match unsupported arch events (git-fixes). * KVM: x86/pmu: Always treat Fixed counters as available when supported (git- fixes). * KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs (git-fixes). * KVM: x86/pmu: Disable support for adaptive PEBS (git-fixes). * KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs (git- fixes). * KVM: x86/pmu: Do not ignore bits 31:30 for RDPMC index on AMD (git-fixes). * KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms (git- fixes). * KVM: x86/pmu: Explicitly check NMI from guest to reducee false positives (git-fixes). * KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (git-fixes). * KVM: x86/pmu: Set enable bits for GP counters in PERF_GLOBAL_CTRL at "RESET" (git-fixes). * KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled (git-fixes). * KVM: x86/xen: fix recursive deadlock in timer injection (git-fixes). * KVM: x86/xen: improve accuracy of Xen timers (git-fixes). * KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled (git- fixes). * KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery (git-fixes). * leds: pwm: Disable PWM when going to suspend (git-fixes). * lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (git-fixes). * libnvdimm: Fix ACPI_NFIT in BLK_DEV_PMEM help (jsc#PED-5853). * libsubcmd: Fix parse-options memory leak (git-fixes). * livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539). * locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes) * lsm: fix the logic in security_inode_getsecctx() (git-fixes). * mac802154: fix llsec key resources release in mac802154_llsec_key_del (git- fixes). * maple_tree: fix mas_empty_area_rev() null pointer dereference (git-fixes). * md: add a new helper rdev_has_badblock() (jsc#PED-7542). * md: add a new helper reshape_interrupted() (jsc#PED-7542). * md: changed the switch of RAID_VERSION to if (jsc#PED-7542). * md: check mddev->pers before calling md_set_readonly() (jsc#PED-7542). * md: clean up invalid BUG_ON in md_ioctl (jsc#PED-7542). * md: clean up openers check in do_md_stop() and md_set_readonly() (jsc#PED-7542). * md: Do not clear MD_CLOSING when the raid is about to stop (jsc#PED-7542). * md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (jsc#PED-7542). * md: export helper md_is_rdwr() (jsc#PED-7542). * md: export helpers to stop sync_thread (jsc#PED-7542). * md: factor out a helper to sync mddev (jsc#PED-7542). * md: fix kmemleak of rdev->serial (jsc#PED-7542). * md: get rdev->mddev with READ_ONCE() (jsc#PED-7542). * md: merge the check of capabilities into md_ioctl_valid() (jsc#PED-7542). * md: preserve KABI in struct md_personality (jsc#PED-7542). * md: remove redundant check of 'mddev->sync_thread' (jsc#PED-7542). * md: remove redundant md_wakeup_thread() (jsc#PED-7542). * md: return directly before setting did_set_md_closing (jsc#PED-7542). * md: sync blockdev before stopping raid or setting readonly (jsc#PED-7542). * md: use RCU lock to protect traversal in md_spares_need_change() (jsc#PED-7542). * md/dm-raid: do not call md_reap_sync_thread() directly (jsc#PED-7542). * md/raid1-10: add a helper raid1_check_read_range() (jsc#PED-7542). * md/raid1-10: factor out a new helper raid1_should_read_first() (jsc#PED-7542). * md/raid1: factor out choose_bb_rdev() from read_balance() (jsc#PED-7542). * md/raid1: factor out choose_slow_rdev() from read_balance() (jsc#PED-7542). * md/raid1: factor out helpers to add rdev to conf (jsc#PED-7542). * md/raid1: factor out helpers to choose the best rdev from read_balance() (jsc#PED-7542). * md/raid1: factor out read_first_rdev() from read_balance() (jsc#PED-7542). * md/raid1: factor out the code to manage sequential IO (jsc#PED-7542). * md/raid1: fix choose next idle in read_balance() (jsc#PED-7542). * md/raid1: record nonrot rdevs while adding/removing rdevs to conf (jsc#PED-7542). * media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes). * media: cadence: csi2rx: use match fwnode for media link (git-fixes). * media: cec: core: remove length check of Timer Status (stable-fixes). * media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes). * media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes). * media: i2c: et8ek8: Do not strip remove function when driver is builtin (git-fixes). * media: ipu3-cio2: Request IRQ earlier (git-fixes). * media: mc: Fix flags handling when creating pad links (stable-fixes). * media: mc: Fix graph walk in media_pipeline_start (git-fixes). * media: mc: mark the media devnode as registered from the, start (git-fixes). * media: mc: Rename pad variable to clarify intent (stable-fixes). * media: ngene: Add dvb_ca_en50221_init return value check (git-fixes). * media: rcar-vin: work around -Wenum-compare-conditional warning (git-fixes). * media: rkisp1: Fix IRQ handling due to shared interrupts (stable-fixes). * media: sta2x11: fix irq handler cast (stable-fixes). * media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes). * media: sunxi: a83-mips-csi2: also select GENERIC_PHY (git-fixes). * media: uvcvideo: Add quirk for Logitech Rally Bar (git-fixes). * media: v4l: Do not turn on privacy LED if streamon fails (git-fixes). * media: v4l2-subdev: Fix stream handling for crop API (git-fixes). * mei: me: add arrow lake point H DID (stable-fixes). * mei: me: add arrow lake point S DID (stable-fixes). * mei: me: add lunar lake point M DID (stable-fixes). * mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes). * mlxbf_gige: call request_irq() after NAPI initialized (git-fixes). * mlxbf_gige: stop interface during shutdown (git-fixes). * mlxbf_gige: stop PHY during open() error paths (git-fixes). * mlxsw: Use refcount_t for reference counting (git-fixes). * mm_init kABI workaround (git-fixes). * mm,page_owner: check for null stack_record before bumping its refcount (bsc#1222366). * mm,page_owner: Defer enablement of static branch (bsc#1222366). * mm,page_owner: drop unnecessary check (bsc#1222366). * mm,page_owner: Fix accounting of pages when migrating (bsc#1222366). * mm,page_owner: Fix printing of stack records (bsc#1222366). * mm,page_owner: fix recursion (bsc#1222366). * mm,page_owner: Fix refcount imbalance (bsc#1222366). * mm,page_owner: Update metadata for tail pages (bsc#1222366). * mm: memcg: do not periodically flush stats when memcg is disabled (bsc#1222525). * mm: memcg: use larger batches for proactive reclaim (bsc#1222522). * mm: page_owner: fix wrong information in dump_page_owner (git-fixes). * mm/slab: make __free(kfree) accept error pointers (git-fixes). * mmc: core: Add HS400 tuning in HS400es initialization (stable-fixes). * mmc: core: Avoid negative index with array access (git-fixes). * mmc: core: Initialize mmc_blk_ioc_data (git-fixes). * mmc: davinci: Do not strip remove function when driver is builtin (git- fixes). * mmc: omap: fix broken slot switch lookup (git-fixes). * mmc: omap: fix deferred probe (git-fixes). * mmc: omap: restore original power up/down steps (git-fixes). * mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes). * mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes). * mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes). * mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes). * mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes). * mmc: sdhci-msm: pervent access to suspended controller (git-fixes). * mmc: sdhci-omap: re-tuning is needed after a pm transition to support emmc HS200 mode (git-fixes). * modpost: Add '.ltext' and '.ltext.*' to TEXT_SECTIONS (stable-fixes). * mptcp: annotate data-races around msk->rmem_fwd_alloc (git-fixes). * mptcp: fix bogus receive window shrinkage with multiple subflows (git- fixes). * mptcp: move __mptcp_error_report in protocol.c (git-fixes). * mptcp: process pending subflow error on close (git-fixes). * mptcp: Remove unnecessary test for __mptcp_init_sock() (git-fixes). * mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes). * mtd: diskonchip: work around ubsan link failure (stable-fixes). * mtd: rawnand: hynix: fixed typo (git-fixes). * mtd: spinand: Add support for 5-byte IDs (stable-fixes). * net: add netdev_lockdep_set_classes() to virtual drivers (git-fixes). * net: annotate data-races around sk->sk_bind_phc (git-fixes). * net: annotate data-races around sk->sk_forward_alloc (git-fixes). * net: annotate data-races around sk->sk_lingertime (git-fixes). * net: annotate data-races around sk->sk_tsflags (git-fixes). * net: bonding: remove kernel-doc comment marker (git-fixes). * net: cfg802154: fix kernel-doc notation warnings (git-fixes). * net: dsa: microchip: fix register write order in ksz8_ind_write8() (git- fixes). * net: dsa: mt7530: fix handling of all link-local frames (git-fixes). * net: dsa: mt7530: fix link-local frames that ingress vlan filtering ports (git-fixes). * net: dsa: mt7530: prevent possible incorrect XTAL frequency selection (git- fixes). * net: dsa: mt7530: trap link-local frames regardless of ST Port State (git- fixes). * net: dsa: sja1105: Fix parameters order in sja1110_pcs_mdio_write_c45() (git-fixes). * net: ena: Fix incorrect descriptor free behavior (git-fixes). * net: ena: Fix potential sign extension issue (git-fixes). * net: ena: Move XDP code to its new files (git-fixes). * net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() (git- fixes). * net: ena: Remove ena_select_queue (git-fixes). * net: ena: Set tx_info->xdpf value to NULL (git-fixes). * net: ena: Use tx_ring instead of xdp_ring for XDP channel TX (git-fixes). * net: ena: Wrong missing IO completions check order (git-fixes). * net: ethernet: mtk_eth_soc: fix PPE hanging issue (git-fixes). * net: ethernet: ti: cpsw: enable mac_managed_pm to fix mdio (git-fixes). * net: fec: Set mac_managed_pm during probe (git-fixes). * net: hns3: fix index limit to support all queue stats (git-fixes). * net: hns3: fix kernel crash when 1588 is received on HIP08 devices (git- fixes). * net: hns3: fix kernel crash when devlink reload during pf initialization (git-fixes). * net: hns3: fix port duplex configure error in IMP reset (git-fixes). * net: hns3: fix wrong judgment condition issue (git-fixes). * net: hns3: mark unexcuted loopback test result as UNEXECUTED (git-fixes). * net: hns3: tracing: fix hclgevf trace event strings (git-fixes). * net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() (git-fixes). * net: ks8851: Handle softirqs at the end of IRQ thread to fix hang (git- fixes). * net: ks8851: Inline ks8851_rx_skb() (git-fixes). * net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs (git- fixes). * net: lan743x: Add set RFE read fifo threshold for PCI1x1x chips (git-fixes). * net: libwx: fix memory leak on free page (git-fixes). * net: ll_temac: platform_get_resource replaced by wrong function (git-fixes). * net: llc: fix kernel-doc notation warnings (git-fixes). * net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes). * net: mediatek: mtk_eth_soc: clear MAC_MCR_FORCE_LINK only when MAC is up (git-fixes). * net: nfc: remove inappropriate attrs check (stable-fixes). * net: NSH: fix kernel-doc notation warning (git-fixes). * net: pcs: xpcs: Return EINVAL in the internal methods (git-fixes). * net: phy: fix phy_read_poll_timeout argument type in genphy_loopback (git- fixes). * net: phy: micrel: Fix potential null pointer dereference (git-fixes). * net: phy: micrel: lan8814: Fix when enabling/disabling 1-step timestamping (git-fixes). * net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8061 (git-fixes). * net: phy: phy_device: Prevent nullptr exceptions on ISR (git-fixes). * net: phy: phy_device: Prevent nullptr exceptions on ISR (stable-fixes). * net: ravb: Always process TX descriptor ring (git-fixes). * net: ravb: Always update error counters (git-fixes). * net: ravb: Let IP-specific receive function to interrogate descriptors (git- fixes). * net: smsc95xx: add support for SYS TEC USB-SPEmodule1 (git-fixes). * net: sparx5: Fix use after free inside sparx5_del_mact_entry (git-fixes). * net: sparx5: fix wrong config being used when reconfiguring PCS (git-fixes). * net: sparx5: flower: fix fragment flags handling (git-fixes). * net: stmmac: dwmac-starfive: Add support for JH7100 SoC (git-fixes). * net: stmmac: Fix incorrect dereference in interrupt handlers (git-fixes). * net: stmmac: fix rx queue priority assignment (git-fixes). * net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes). * net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes). * net: tls, fix WARNIING in __sk_msg_free (bsc#1221858). * net: tls: fix returned read length with async decrypt (bsc#1221858). * net: tls: fix use-after-free with partial reads and async (bsc#1221858). * net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes). * net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes). * net: usb: ax88179_178a: fix link status when link is set to down/up (git- fixes). * net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes). * net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git- fixes). * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes). * net: usb: sr9700: stop lying about skb->truesize (git-fixes). * net: Use sockaddr_storage for getsockopt(SO_PEERNAME) (git-fixes). * net: veth: do not manipulate GRO when using XDP (git-fixes). * net: wwan: t7xx: Split 64bit accesses to fix alignment issues (git-fixes). * net:usb:qmi_wwan: support Rolling modules (stable-fixes). * net/mlx5: Correctly compare pkt reformat ids (git-fixes). * net/mlx5: E-switch, Change flow rule destination checking (git-fixes). * net/mlx5: E-switch, store eswitch pointer before registering devlink_param (git-fixes). * net/mlx5: Fix fw reporter diagnose output (git-fixes). * net/mlx5: Fix peer devlink set for SF representor devlink port (git-fixes). * net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes). * net/mlx5: offset comp irq index in name by one (git-fixes). * net/mlx5: Properly link new fs rules into the tree (git-fixes). * net/mlx5: Register devlink first under devlink lock (git-fixes). * net/mlx5: Restore mistakenly dropped parts in register devlink flow (git- fixes). * net/mlx5: SF, Stop waiting for FW as teardown was called (git-fixes). * net/mlx5e: Change the warning when ignore_flow_level is not supported (git- fixes). * net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit (git-fixes). * net/mlx5e: Fix MACsec state loss upon state update in offload path (git- fixes). * net/mlx5e: Fix mlx5e_priv_init() cleanup flow (git-fixes). * net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes). * net/mlx5e: RSS, Block changing channels number when RXFH is configured (git- fixes). * net/mlx5e: RSS, Block XOR hash with over 128 channels (git-fixes). * net/mlx5e: Switch to using _bh variant of of spinlock API in port timestamping NAPI poll context (git-fixes). * net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (git-fixes). * net/smc: bugfix for smcr v2 server connect success statistic (git-fixes). * net/smc: fix documentation of buffer sizes (git-fixes). * net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add (git-fixes). * net/x25: fix incorrect parameter validation in the x25_getsockopt() function (git-fixes). * netfilter: nf_tables: disable toggling dormant table state more than once (git-fixes). * netfilter: nf_tables: uapi: Describe NFTA_RULE_CHAIN_ID (git-fixes). * netfilter: nft_ct: fix l3num expectations with inet pseudo family (git- fixes). * netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes). * nf_conntrack: fix -Wunused-const-variable= (git-fixes). * nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git- fixes). * nfc: nci: Fix kcov check in nci_rx_work() (git-fixes). * nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes). * nfc: nci: Fix uninit-value in nci_rx_work (git-fixes). * NFC: trf7970a: disable all regulators on removal (git-fixes). * nfp: flower: handle acti_netdevs allocation failure (git-fixes). * NFS: Fix an off by one in root_nfs_cat() (git-fixes). * NFS: Fix nfs_netfs_issue_read() xarray locking for writeback interrupt (git- fixes). * nfs: fix panic when nfs4_ff_layout_prepare_ds() fails (git-fixes). * NFS: Read unlock folio on nfs_page_create_from_folio() error (git-fixes). * NFSD: change LISTXATTRS cookie encoding to big-endian (git-fixes). * NFSD: Convert the callback workqueue to use delayed_work (git-fixes). * nfsd: do not call locks_release_private() twice concurrently (git-fixes). * nfsd: Fix a regression in nfsd_setattr() (git-fixes). * NFSD: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes). * NFSD: fix LISTXATTRS returning more bytes than maxcount (git-fixes). * NFSD: Fix nfsd_clid_class use of __string_len() macro (git-fixes). * NFSD: fix nfsd4_listxattr_validate_cookie (git-fixes). * NFSD: Reschedule CB operations when backchannel rpc_clnt is shut down (git- fixes). * NFSD: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes). * NFSD: Retransmit callbacks after client reconnects (git-fixes). * nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408). * NFSv4.1/pnfs: fix NFS with TLS in pnfs (git-fixes). * NFSv4.2: fix listxattr maximum XDR buffer size (git-fixes). * NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes). * nilfs2: fix OOB in nilfs_set_de_type (git-fixes). * nilfs2: fix out-of-range warning (git-fixes). * nilfs2: fix potential bug in end_buffer_async_write (git-fixes). * nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes). * nilfs2: fix use-after-free of timer for log writer thread (git-fixes). * nilfs2: make superblock data array index computation sparse friendly (git- fixes). * nouveau: fix devinit paths to only handle display on GSP (git-fixes). * nouveau: fix function cast warning (git-fixes). * nouveau: fix instmem race condition around ptr stores (git-fixes). * nouveau: lock the client object tree (stable-fixes). * nouveau: reset the bo resource bus info after an eviction (git-fixes). * nouveau/dmem: handle kcalloc() allocation failure (git-fixes). * nouveau/gsp: do not check devinit disable on GSP (git-fixes). * nouveau/uvmm: fix addr/range calcs for remap operations (git-fixes). * nvdimm: make nvdimm_bus_type const (jsc#PED-5853). * nvdimm/pmem: fix leak on dax_add_host() failure (jsc#PED-5853). * nvdimm/pmem: Treat alloc_dax() -EOPNOTSUPP failure as non-fatal (jsc#PED-5853). * nvme-fc: do not wait in vain when unloading module (git-fixes). * nvme-pci: Add quirk for broken MSIs (git-fixes). * nvme-tcp: strict pdu pacing to avoid send stalls on TLS (bsc#1221858). * nvme: fix reconnection fail due to reserved tag allocation (git-fixes). * nvme: fix warn output about shared namespaces without CONFIG_NVME_MULTIPATH (git-fixes). * nvmet-fc: abort command when there is no binding (git-fixes). * nvmet-fc: avoid deadlock on delete association path (git-fixes). * nvmet-fc: defer cleanup using RCU properly (git-fixes). * nvmet-fc: hold reference on hostport match (git-fixes). * nvmet-fc: release reference on target port (git-fixes). * nvmet-fc: take ref count on tgtport before delete assoc (git-fixes). * nvmet-fcloop: swap the list_add_tail arguments (git-fixes). * nvmet-tcp: fix nvme tcp ida memory leak (git-fixes). * octeontx2-af: Add array index check (git-fixes). * octeontx2-af: Fix devlink params (git-fixes). * octeontx2-af: Fix issue with loading coalesced KPU profiles (git-fixes). * octeontx2-af: Fix NIX SQ mode and BP config (git-fixes). * Octeontx2-af: fix pause frame configuration in GMP mode (git-fixes). * octeontx2-af: Use matching wake_up API variant in CGX command interface (git-fixes). * octeontx2-af: Use separate handlers for interrupts (git-fixes). * octeontx2-pf: check negative error code in otx2_open() (git-fixes). * octeontx2-pf: fix FLOW_DIS_IS_FRAGMENT implementation (git-fixes). * octeontx2-pf: Fix transmit scheduler resource leak (git-fixes). * octeontx2-pf: Send UP messages to VF only when VF is up (git-fixes). * octeontx2-pf: Use default max_active works instead of one (git-fixes). * octeontx2-pf: Wait till detach_resources msg is complete (git-fixes). * octeontx2: Detect the mbox up or down message via register (git-fixes). * of: dynamic: Synchronize of_changeset_destroy() with the devlink removals (git-fixes). * of: module: add buffer overflow check in of_modalias() (git-fixes). * of: module: prevent NULL pointer dereference in vsnprintf() (stable-fixes). * of: property: Add in-ports/out-ports support to of_graph_get_port_parent() (stable-fixes). * of: property: fix typo in io-channels (git-fixes). * of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing (git- fixes). * of: property: Improve finding the consumer of a remote-endpoint property (git-fixes). * of: property: Improve finding the supplier of a remote-endpoint property (git-fixes). * of: unittest: Fix compile in the non-dynamic case (git-fixes). * PCI: Delay after FLR of Solidigm P44 Pro NVMe (stable-fixes). * PCI: Disable D3cold on Asus B1400 PCI-NVMe bridge (stable-fixes). * PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes). * PCI: Execute quirk_enable_clear_retrain_link() earlier (stable-fixes). * PCI: Fix typos in docs and comments (stable-fixes). * PCI: hv: Fix ring buffer size calculation (git-fixes). * PCI: Make link retraining use RMW accessors for changing LNKCTL (git-fixes). * PCI: qcom: Add support for sa8775p SoC (git-fixes). * PCI: qcom: Disable ASPM L0s for sc8280xp, sa8540p and sa8295p (git-fixes). * PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes). * PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888). * PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word() (stable-fixes). * PCI: switchtec: Add support for PCIe Gen5 devices (stable-fixes). * PCI: switchtec: Use normal comment style (stable-fixes). * PCI: tegra194: Fix probe path for Endpoint mode (git-fixes). * PCI/AER: Block runtime suspend when handling errors (stable-fixes). * PCI/ASPM: Use RMW accessors for changing LNKCTL (git-fixes). * PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (stable-fixes). * PCI/DPC: Use FIELD_GET() (stable-fixes). * PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/PM: Drain runtime-idle callbacks before driver removal (stable-fixes). * peci: linux/peci.h: fix Excess kernel-doc description warning (git-fixes). * perf tests: Make data symbol test wait for perf to start (bsc#1220045). * perf tests: Skip data symbol test if buf1 symbol is missing (bsc#1220045). * perf/x86/amd/core: Avoid register reset when CPU is dead (git-fixes). * perf/x86/amd/core: Update and fix stalled-cycles-* events for Zen 2 and later (git-fixes). * perf/x86/amd/lbr: Use freeze based on availability (git-fixes). * perf/x86/intel: Expose existence of callback support to KVM (git-fixes). * phy: freescale: imx8m-pcie: fix pcie link-up instability (git-fixes). * phy: marvell: a3700-comphy: Fix hardcoded array size (git-fixes). * phy: marvell: a3700-comphy: Fix out of bounds read (git-fixes). * phy: rockchip-snps-pcie3: fix bifurcation on rk3588 (git-fixes). * phy: rockchip-snps-pcie3: fix clearing PHP_GRF_PCIESEL_CON bits (git-fixes). * phy: rockchip: naneng-combphy: Fix mux on rk3588 (git-fixes). * phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered (git-fixes). * pinctrl: armada-37xx: remove an unused variable (git-fixes). * pinctrl: baytrail: Fix selecting gpio pinctrl state (git-fixes). * pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes). * pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes). * pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback (git- fixes). * pinctrl: mediatek: paris: Rework support for PIN_CONFIG_{INPUT,OUTPUT}_ENABLE (git-fixes). * pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git- fixes). * pinctrl: qcom: pinctrl-sm7150: Fix sdc1 and ufs special pins regs (git- fixes). * pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes). * pinctrl/meson: fix typo in PDM's pin name (git-fixes). * platform/chrome: cros_ec_uart: properly fix race condition (git-fixes). * platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git- fixes). * platform/x86: ISST: Add Granite Rapids-D to HPM CPU list (stable-fixes). * platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes). * platform/x86: x86-android-tablets: Fix acer_b1_750_goodix_gpios name (stable-fixes). * platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git- fixes). * platform/x86/amd/pmc: Extend Framework 13 quirk to more BIOSes (stable- fixes). * platform/x86/intel-uncore-freq: Do not present root domain on error (git- fixes). * PM / devfreq: Synchronize devfreq_monitor_[start/stop] (stable-fixes). * PM: s2idle: Make sure CPUs will wakeup directly on resume (git-fixes). * power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes). * power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator (git- fixes). * powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191). * powerpc/crypto/chacha-p10: Fix failure on non Power10 (bsc#1218205). * powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740). * powerpc/hv-gpci: Fix the H_GET_PERF_COUNTER_INFO hcall return value checks (git-fixes). * powerpc/pseries: make max polling consistent for longer H_CALLs (bsc#1215199). * powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783). * ppdev: Add an error check in register_device (git-fixes). * prctl: generalize PR_SET_MDWE support check to be per-arch (bsc#1225610). * printk: Add this_cpu_in_panic() (bsc#1225607). * printk: Adjust mapping for 32bit seq macros (bsc#1225607). * printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1225607). * printk: Consolidate console deferred printing (bsc#1225607). * printk: Disable passing console lock owner completely during panic() (bsc#1225607). * printk: Do not take console lock for console_flush_on_panic() (bsc#1225607). * printk: For @suppress_panic_printk check for other CPU in panic (bsc#1225607). * printk: Keep non-panic-CPUs out of console lock (bsc#1225607). * printk: Let no_printk() use _printk() (bsc#1225618). * printk: nbcon: Relocate 32bit seq macros (bsc#1225607). * printk: Reduce console_unblank() usage in unsafe scenarios (bsc#1225607). * printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1225607). * printk: ringbuffer: Clarify special lpos values (bsc#1225607). * printk: ringbuffer: Cleanup reader terminology (bsc#1225607). * printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1225607). * printk: ringbuffer: Skip non-finalized records in panic (bsc#1225607). * printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616). * printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1225607). * printk: Wait for all reserved records with pr_flush() (bsc#1225607). * proc/kcore: do not try to access unaccepted memory (git-fixes). * pstore: inode: Convert mutex usage to guard(mutex) (stable-fixes). * pstore: inode: Only d_invalidate() is needed (git-fixes). * pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes). * pwm: img: fix pwm clock lookup (git-fixes). * qibfs: fix dentry leak (git-fixes) * r8169: fix issue caused by buggy BIOS on certain boards with RTL8168d (git- fixes). * r8169: skip DASH fw status checks when DASH is disabled (git-fixes). * random: handle creditable entropy from atomic process context (git-fixes). * RAS/AMD/FMPM: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619). * RAS/AMD/FMPM: Fix build when debugfs is not enabled (jsc#PED-7619). * RAS/AMD/FMPM: Safely handle saved records of various sizes (jsc#PED-7619). * RDMA/cm: add timeout to cm_destroy_id wait (git-fixes) * RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes) * RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw (git-fixes) * RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git- fixes) * RDMA/hns: Fix deadlock on SRQ async events. (git-fixes) * RDMA/hns: Fix GMV table pagesize (git-fixes) * RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes) * RDMA/hns: Fix UAF for cq async event (git-fixes) * RDMA/hns: Modify the print level of CQE error (git-fixes) * RDMA/hns: Use complete parentheses in macros (git-fixes) * RDMA/IPoIB: Fix format truncation compilation errors (git-fixes) * RDMA/mana_ib: Fix bug in creation of dma regions (git-fixes). * RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes) * RDMA/mlx5: Change check for cacheable mkeys (git-fixes) * RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes) * RDMA/mlx5: Uncacheable mkey has neither rb_key or cache_ent (git-fixes) * RDMA/rxe: Allow good work requests to be executed (git-fixes) * RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes) * RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes) * RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes) * regmap: Add regmap_read_bypassed() (git-fixes). * regmap: kunit: Ensure that changed bytes are actually different (stable- fixes). * regmap: maple: Fix cache corruption in regcache_maple_drop() (git-fixes). * regmap: maple: Fix uninitialized symbol 'ret' warnings (git-fixes). * regulator: bd71828: Do not overwrite runtime voltages (git-fixes). * regulator: change devm_regulator_get_enable_optional() stub to return Ok (git-fixes). * regulator: change stubbed devm_regulator_get_enable to return Ok (git- fixes). * regulator: core: fix debugfs creation regression (git-fixes). * regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes). * regulator: tps65132: Add of_match table (stable-fixes). * remoteproc: k3-r5: Do not allow core1 to power up before core0 via sysfs (git-fixes). * remoteproc: k3-r5: Jump to error handling labels in start/stop errors (git- fixes). * remoteproc: k3-r5: Wait for core0 power-up before powering up core1 (git- fixes). * remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes). * remoteproc: stm32: Fix incorrect type assignment returned by stm32_rproc_get_loaded_rsc_tablef (git-fixes). * remoteproc: virtio: Fix wdg cannot recovery remote processor (git-fixes). * Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default" (stable-fixes). * Revert "ASoC: SOF: Intel: hda-dai-ops: only allocate/release streams for first CPU DAI" (stable-fixes). * Revert "ASoC: SOF: Intel: hda-dai-ops: reset device count for SoundWire DAIs" (stable-fixes). * Revert "drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()" (stable-fixes). * Revert "drm/amd/display: Fix sending VSC (+ colorimetry) packets for DP/eDP displays without PSR" (stable-fixes). * Revert "drm/amd/display: fix USB-C flag update after enc10 feature init" (stable-fixes). * Revert "drm/amdkfd: fix gfx_target_version for certain 11.0.3 devices" (stable-fixes). * Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes). * Revert "drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor()" (stable-fixes). * Revert "drm/qxl: simplify qxl_fence_wait" (git-fixes). * Revert "iommu/amd: Enable PCI/IMS" (git-fixes). * Revert "iommu/vt-d: Enable PCI/IMS" (git-fixes). * Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (git- fixes). * Revert "net/mlx5e: Check the number of elements before walk TC rhashtable" (git-fixes). * Revert "PCI/MSI: Provide IMS (Interrupt Message Store) support" (git-fixes). * Revert "PCI/MSI: Provide pci_ims_alloc/free_irq()" (git-fixes). * Revert "PCI/MSI: Provide stubs for IMS functions" (git-fixes). * Revert "selinux: introduce an initial SID for early boot processes" (bsc#1208593) It caused a regression on ALP-current branch, kernel-obs-qa build failed. * Revert "thermal: core: Do not update trip points inside the hysteresis range" (git-fixes). * Revert "usb: cdc-wdm: close race between read and workqueue" (git-fixes). * Revert "usb: phy: generic: Get the vbus supply" (git-fixes). * ring-buffer: Do not set shortest_full when full target is hit (git-fixes). * ring-buffer: Fix a race between readers and resize checks (git-fixes). * ring-buffer: Fix full_waiters_pending in poll (git-fixes). * ring-buffer: Fix resetting of shortest_full (git-fixes). * ring-buffer: Fix waking up ring buffer readers (git-fixes). * ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes). * ring-buffer: Only update pages_touched when a new page is touched (git- fixes). * ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes). * ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git- fixes). * rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes). * s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224792). * s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223869). * s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224793). * s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1225133). * s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224348). * s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225136). * s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225134). * s390/ism: Properly fix receive message buffer allocation (git-fixes bsc#1223590). * s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223871). * s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223872). * s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223874). * s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223870). * s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223593). * s390/vtime: fix average steal time calculation (git-fixes bsc#1221783). * s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223592). * sched/balancing: Rename newidle_balance() => sched_balance_newidle() (bsc#1222173). * sched/fair: Check root_domain::overload value before update (bsc#1222173). * sched/fair: Use helper functions to access root_domain::overload (bsc#1222173). * sched/psi: Select KERNFS as needed (git-fixes). * sched/topology: Optimize topology_span_sane() (bsc#1225053). * scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes). * scsi: core: Consult supported VPD page list prior to fetching page (git- fixes). * scsi: core: Fix unremoved procfs host directory regression (git-fixes). * scsi: csiostor: Avoid function pointer casts (git-fixes). * scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() (git-fixes). * scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() (git-fixes). * scsi: libsas: Fix disk not being scanned in after being removed (git-fixes). * scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777). * scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777). * scsi: lpfc: Correct size for wqe for memset() (bsc#1221777). * scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777). * scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777). * scsi: lpfc: Define types in a union for generic void *context3 ptr (bsc#1221777). * scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (bsc#1221777). * scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1221777). * scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777 bsc#1217959). * scsi: lpfc: Remove unnecessary log message in queuecommand path (bsc#1221777). * scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port() (bsc#1221777). * scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777). * scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777). * scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777). * scsi: mpi3mr: Reduce stack usage in mpi3mr_refresh_sas_ports() (git-fixes). * scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git- fixes). * scsi: mylex: Fix sysfs buffer lengths (git-fixes). * scsi: qla2xxx: Change debug message during driver unload (bsc1221816). * scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816). * scsi: qla2xxx: Fix command flush on cable pull (bsc1221816). * scsi: qla2xxx: Fix double free of fcport (bsc1221816). * scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816). * scsi: qla2xxx: Fix N2N stuck connection (bsc1221816). * scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes). * scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816). * scsi: qla2xxx: Prevent command send on chip reset (bsc1221816). * scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816). * scsi: qla2xxx: Update manufacturer detail (bsc1221816). * scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816). * scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git- fixes). * scsi: sg: Avoid race in error handling & drop bogus warn (git-fixes). * scsi: sg: Avoid sg device teardown race (git-fixes). * scsi: smartpqi: Fix disable_managed_interrupts (git-fixes). * sctp: annotate data-races around sk->sk_wmem_queued (git-fixes). * sdhci-of-dwcmshc: disable PM runtime in dwcmshc_remove() (git-fixes). * selftests: default to host arch for LLVM builds (git-fixes). * selftests: forwarding: Fix ping failure due to short timeout (git-fixes). * selftests: kselftest: Fix build failure with NOLIBC (git-fixes). * selftests: kselftest: Mark functions that unconditionally call exit() as __noreturn (git-fixes). * selftests: net: bridge: increase IGMP/MLD exclude timeout membership interval (git-fixes). * selftests: net: kill smcrouted in the cleanup logic in amt.sh (git-fixes). * selftests: net: move amt to socat for better compatibility (git-fixes). * selftests: test_bridge_neigh_suppress.sh: Fix failures due to duplicate MAC (git-fixes). * selftests: timers: Convert posix_timers test to generate KTAP output (stable-fixes). * selftests: timers: Fix abs() warning in posix_timers test (git-fixes). * selftests: timers: Fix posix_timers ksft_print_msg() warning (git-fixes). * selftests: timers: Fix valid-adjtimex signed left-shift undefined behavior (stable-fixes). * selftests: vxlan_mdb: Fix failures with old libnet (git-fixes). * selftests/binderfs: use the Makefile's rules, not Make's implicit rules (git-fixes). * selftests/bpf: add edge case backtracking logic test (bsc#1225756). * selftests/bpf: precision tracking test for BPF_NEG and BPF_END (bsc#1225756). * selftests/ftrace: Fix event filter target_func selection (stable-fixes). * selftests/ftrace: Limit length in subsystem-enable tests (git-fixes). * selftests/kcmp: remove unused open mode (git-fixes). * selftests/net: convert test_bridge_neigh_suppress.sh to run it in unique namespace (stable-fixes). * selftests/pidfd: Fix config for pidfd_setns_test (git-fixes). * selftests/powerpc/dexcr: Add -no-pie to hashchk tests (git-fixes). * selftests/powerpc/papr-vpd: Fix missing variable initialization (jsc#PED-4486 git-fixes). * selftests/resctrl: fix clang build failure: use LOCAL_HDRS (git-fixes). * selftests/timers/posix_timers: Reimplement check_timer_distribution() (git- fixes). * selinux: avoid dereference of garbage after mount failure (git-fixes). * selinux: introduce an initial SID for early boot processes (bsc#1208593). * serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes). * serial: 8250_dw: Revert: Do not reclock if already at correct rate (git- fixes). * serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes). * serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup (git-fixes). * serial: core: Fix atomicity violation in uart_tiocmget (git-fixes). * serial: core: only stop transmit when HW fifo is empty (git-fixes). * serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable- fixes). * serial: Lock console when calling into driver before registration (git- fixes). * serial: max3100: Fix bitwise types (git-fixes). * serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git- fixes). * serial: max3100: Update uart_driver_registered on driver removal (git- fixes). * serial: max310x: fix NULL pointer dereference in I2C instantiation (git- fixes). * serial: max310x: fix syntax error in IRQ error message (git-fixes). * serial: mxs-auart: add spinlock around changing cts state (git-fixes). * serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git- fixes). * serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes). * serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes). * serial: stm32: Reset .throttled state in .startup() (git-fixes). * serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes). * SEV: disable SEV-ES DebugSwap by default (git-fixes). * slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git- fixes). * slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes). * soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes). * soc: fsl: qbman: Use raw spinlock for cgr_lock (git-fixes). * soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes). * soc: microchip: Fix POLARFIRE_SOC_SYS_CTRL input prompt (stable-fixes). * soc: qcom: pmic_glink: do not traverse clients list without a lock (git- fixes). * soc: qcom: pmic_glink: Make client-lock non-sleeping (git-fixes). * soc: qcom: pmic_glink: notify clients about the current state (git-fixes). * soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes). * sock_diag: annotate data-races around sock_diag_handlers[family] (git- fixes). * soundwire: amd: fix for wake interrupt handling for clockstop mode (git- fixes). * speakup: Avoid crash on very long word (git-fixes). * speakup: Fix 8bit characters from direct synth (git-fixes). * speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes). * spi: Do not mark message DMA mapped when no transfer in it is (git-fixes). * spi: fix null pointer dereference within spi_sync (git-fixes). * spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs (git-fixes). * spi: intel-pci: Add support for Lunar Lake-M SPI serial flash (stable- fixes). * spi: lm70llp: fix links in doc and comments (git-fixes). * spi: lpspi: Avoid potential use-after-free in probe() (git-fixes). * spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probe (git-fixes). * spi: microchip-core-qspi: fix setting spi bus clock rate (git-fixes). * spi: spi-fsl-lpspi: remove redundant spi_controller_put call (git-fixes). * spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes). * spi: stm32: Do not warn about spurious interrupts (git-fixes). * spi: xilinx: Fix kernel documentation in the xilinx_spi.h (git-fixes). * spmi: hisi-spmi-controller: Do not override device identifier (git-fixes). * staging: vc04_services: changen strncpy() to strscpy_pad() (stable-fixes). * staging: vc04_services: fix information leak in create_component() (git- fixes). * staging: vt6655: Remove unused declaration of RFbAL7230SelectChannelPostProcess() (git-fixes). * stmmac: Clear variable when destroying workqueue (git-fixes). * SUNRPC: fix a memleak in gss_import_v2_context (git-fixes). * SUNRPC: fix some memleaks in gssx_dec_option_array (git-fixes). * supported.conf: support tcp_dctcp module (jsc#PED-8111) * swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331) * swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331) * swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331) * swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331) * swiotlb: use the calculated number of areas (git-fixes). * thermal: devfreq_cooling: Fix perf state when calculate dfc res_util (git- fixes). * thermal/drivers/qcom/lmh: Check for SCM availability at probe (git-fixes). * thermal/drivers/tsens: Fix null pointer dereference (git-fixes). * thermal/of: Assume polling-delay(-passive) 0 when absent (stable-fixes). * thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes). * thunderbolt: Do not create DisplayPort tunnels on adapters of the same router (git-fixes). * thunderbolt: Fix wake configurations after device unplug (stable-fixes). * thunderbolt: Introduce tb_path_deactivate_hop() (stable-fixes). * thunderbolt: Introduce tb_port_reset() (stable-fixes). * thunderbolt: Make tb_switch_reset() support Thunderbolt 2, 3 and USB4 routers (stable-fixes). * thunderbolt: Reset only non-USB4 host routers in resume (git-fixes). * tls: break out of main loop when PEEK gets a non-data record (bsc#1221858). * tls: do not skip over different type records from the rx_list (bsc#1221858). * tls: fix peeking with sync+async decryption (bsc#1221858). * tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1221858). * tools/arch/x86/intel_sdsi: Fix maximum meter bundle length (git-fixes). * tools/arch/x86/intel_sdsi: Fix meter_certificate decoding (git-fixes). * tools/arch/x86/intel_sdsi: Fix meter_show display (git-fixes). * tools/latency-collector: Fix -Wformat-security compile warns (git-fixes). * tools/power turbostat: Expand probe_intel_uncore_frequency() (bsc#1221765). * tools/power/turbostat: Fix uncore frequency file string (bsc#1221765). * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes). * tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes). * tracing: Have saved_cmdlines arrays all in one allocation (git-fixes). * tracing: hide unused ftrace_event_id_fops (git-fixes). * tracing: Remove precision vsnprintf() check from print event (git-fixes). * tracing: Use .flush() call to wake up readers (git-fixes). * tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git- fixes). * tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes). * tty: n_gsm: fix missing receive state reset after mode switch (git-fixes). * tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes). * tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes). * tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes). * ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes). * ubifs: fix sort function prototype (git-fixes). * ubifs: Queue up space reservation tasks if retrying many times (git-fixes). * ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes). * ubifs: Set page uptodate in the correct place (git-fixes). * usb: aqc111: stop lying about skb->truesize (git-fixes). * usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor (git-fixes). * usb: cdc-wdm: close race between read and workqueue (git-fixes). * USB: core: Add hub_get() and hub_put() routines (stable-fixes). * USB: core: Fix access violation during port device removal (git-fixes). * USB: core: Fix deadlock in port "disable" sysfs attribute (stable-fixes). * USB: core: Fix deadlock in usb_deauthorize_interface() (git-fixes). * usb: Disable USB3 LPM at shutdown (stable-fixes). * usb: dwc2: gadget: Fix exiting from clock gating (git-fixes). * usb: dwc2: gadget: LPM flow fix (git-fixes). * usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes). * usb: dwc2: host: Fix hibernation flow (git-fixes). * usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes). * usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes). * usb: dwc3-am62: Disable wakeup at remove (git-fixes). * usb: dwc3-am62: fix module unload/reload behavior (git-fixes). * usb: dwc3-am62: Rename private data (git-fixes). * usb: dwc3: core: Prevent phy suspend during init (Git-fixes). * usb: dwc3: pci: Drop duplicate ID (git-fixes). * usb: dwc3: Properly set system wakeup (git-fixes). * usb: dwc3: Wait unconditionally after issuing EndXfer command (git-fixes). * usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (bsc#1220569). * usb: fotg210: Add missing kernel doc description (git-fixes). * usb: gadget: composite: fix OS descriptors w_value logic (git-fixes). * usb: gadget: f_fs: Fix a race condition when processing setup packets (git- fixes). * usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (git-fixes). * usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes). * usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git- fixes). * usb: gadget: u_audio: Clear uac pointer when freed (git-fixes). * usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (git-fixes). * usb: gadget: uvc: mark incomplete frames with UVC_STREAM_ERR (stable-fixes). * usb: gadget: uvc: use correct buffer size when parsing configfs lists (git- fixes). * usb: ohci: Prevent missed ohci interrupts (git-fixes). * usb: phy: generic: Get the vbus supply (git-fixes). * USB: serial: add device ID for VeriFone adapter (stable-fixes). * USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes). * USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable- fixes). * USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable- fixes). * USB: serial: option: add Fibocom FM135-GL variants (stable-fixes). * USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes). * USB: serial: option: add MeiG Smart SLM320 product (stable-fixes). * USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable- fixes). * USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes). * USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes). * USB: serial: option: support Quectel EM060K sub-models (stable-fixes). * usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes). * usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes). * usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes). * usb: typec: tcpm: Check for port partner validity before consuming it (git- fixes). * usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes). * usb: typec: tcpm: Correct port source pdo array in pd_set callback (git- fixes). * usb: typec: tcpm: Correct the PDO counting in pd_set (git-fixes). * usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd() (git- fixes). * usb: typec: tcpm: unregister existing source caps before re-registration (git-fixes). * usb: typec: tcpm: Update PD of Type-C port upon pd_set (git-fixes). * usb: typec: tipd: fix event checking for tps6598x (git-fixes). * usb: typec: ucsi_acpi: Refactor and fix DELL quirk (git-fixes). * usb: typec: ucsi: Ack unsupported commands (stable-fixes). * usb: typec: ucsi: always register a link to USB PD device (git-fixes). * usb: typec: ucsi: Check for notifications after init (git-fixes). * usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes). * usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes). * usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes). * usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes). * usb: typec: ucsi: Fix connector check on init (git-fixes). * usb: typec: ucsi: Fix race between typec_switch and role_switch (git-fixes). * usb: typec: ucsi: Limit read size on v1.2 (stable-fixes). * usb: typec: ucsi: simplify partner's PD caps registration (git-fixes). * USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes). * usb: udc: remove warning when queue disabled ep (stable-fixes). * usb: xhci-plat: Do not include xhci.h (stable-fixes). * usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes). * usb: xhci: correct return value in case of STS_HCE (git-fixes). * usb: xhci: Implement xhci_handshake_check_state() helper. * vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes). * vboxsf: explicitly deny setlease attempts (stable-fixes). * vdpa_sim: reset must not run (git-fixes). * vdpa/mlx5: Allow CVQ size changes (git-fixes). * veth: try harder when allocating queue memory (git-fixes). * vhost: Add smp_rmb() in vhost_enable_notify() (git-fixes). * vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes). * virtio_net: Do not send RSS key if it is not supported (git-fixes). * virtio-blk: Ensure no requests in virtqueues before deleting vqs (git- fixes). * virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223944). * VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes). * VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes). * vmci: prevent speculation leaks by sanitizing event in event_deliver() (git- fixes). * vsock/virtio: fix packet delivery to tap device (git-fixes). * watchdog: bd9576: Drop "always-running" property (git-fixes). * watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git- fixes). * watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes). * watchdog: sa1100: Fix PTR_ERR_OR_ZERO() vs NULL check in sa1100dog_probe() (git-fixes). * wifi: ar5523: enable proper endpoint verification (git-fixes). * wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes). * wifi: ath10k: poll service ready message before failing (git-fixes). * wifi: ath10k: populate board data for WCN3990 (git-fixes). * wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948). * wifi: ath11k: do not force enable power save on non-running vdevs (git- fixes). * wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() (git-fixes). * wifi: ath12k: Update Qualcomm Innovation Center, Inc. copyrights (stable- fixes). * wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes). * wifi: brcmfmac: Add DMI nvram filename quirk for ACEPC W5 Pro (stable- fixes). * wifi: brcmfmac: add per-vendor feature detection callback (stable-fixes). * wifi: brcmfmac: cfg80211: Use WSEC to set SAE password (stable-fixes). * wifi: brcmfmac: Demote vendor-specific attach/detach messages to info (git- fixes). * wifi: brcmfmac: pcie: handle randbuf allocation failure (git-fixes). * wifi: carl9170: add a proper sanity check for endpoints (git-fixes). * wifi: carl9170: re-fix fortified-memset warning (git-fixes). * wifi: cfg80211: check A-MSDU format more carefully (stable-fixes). * wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes). * wifi: ieee80211: fix ieee80211_mle_basic_sta_prof_size_ok() (git-fixes). * wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes). * wifi: iwlwifi: fw: fix compile w/o CONFIG_ACPI (git-fixes). * wifi: iwlwifi: mvm: allocate STA links only for active links (git-fixes). * wifi: iwlwifi: mvm: fix active link counting during recovery (git-fixes). * wifi: iwlwifi: mvm: fix check in iwl_mvm_sta_fw_id_mask (git-fixes). * wifi: iwlwifi: mvm: guard against invalid STA ID on removal (stable-fixes). * wifi: iwlwifi: mvm: include link ID when releasing frames (git-fixes). * wifi: iwlwifi: mvm: init vif works only once (git-fixes). * wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git- fixes). * wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes). * wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes). * wifi: iwlwifi: mvm: select STA mask only for active links (git-fixes). * wifi: iwlwifi: mvm: use correct address 3 in A-MSDU (stable-fixes). * wifi: iwlwifi: pcie: Add the PCI device id for new hardware (stable-fixes). * wifi: iwlwifi: pcie: fix RB status reading (stable-fixes). * wifi: iwlwifi: read txq->read_ptr under lock (stable-fixes). * wifi: iwlwifi: reconfigure TLC during HW restart (git-fixes). * wifi: mac80211_hwsim: init peer measurement result (git-fixes). * wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable- fixes). * wifi: mac80211: clean up assignments to pointer cache (stable-fixes). * wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes). * wifi: mac80211: fix prep_connection error path (stable-fixes). * wifi: mac80211: fix unaligned le16 access (git-fixes). * wifi: mac80211: only call drv_sta_rc_update for uploaded stations (stable- fixes). * wifi: mac80211: remove link before AP (git-fixes). * wifi: mt76: mt7603: add wpdma tx eof flag for PSE client reset (git-fixes). * wifi: mt76: mt7603: fix tx queue of loopback packets (git-fixes). * wifi: mt76: mt7915: workaround too long expansion sparse warnings (git- fixes). * wifi: mt76: mt7996: add locking for accessing mapped registers (stable- fixes). * wifi: mt76: mt7996: disable AMSDU for non-data frames (stable-fixes). * wifi: mwl8k: initialize cmd->addr[] properly (git-fixes). * wifi: nl80211: do not free NULL coalescing rule (git-fixes). * wifi: rtw88: 8821cu: Fix connection failure (stable-fixes). * wifi: rtw88: Add missing VID/PIDs for 8811CU and 8821CU (stable-fixes). * wifi: rtw89: fix null pointer access when abort scan (stable-fixes). * wifi: rtw89: pci: correct TX resource checking for PCI DMA channel of firmware command (git-fixes). * wifi: rtw89: pci: enlarge RX DMA buffer to consider size of RX descriptor (stable-fixes). * wireguard: netlink: access device through ctx instead of peer (git-fixes). * wireguard: netlink: check for dangling peer via is_dead instead of empty list (git-fixes). * wireguard: receive: annotate data-race around receiving_counter.counter (git-fixes). * x86/bugs: Fix BHI retpoline check (git-fixes). * x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes). * x86/bugs: Remove default case for fully switched enums (git-fixes). * x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk() (git- fixes). * x86/coco: Require seeding RNG with RDRAND on CoCo systems (git-fixes). * x86/cpu: Add model number for Intel Arrow Lake mobile processor (git-fixes). * x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (git-fixes). * x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes). * x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git- fixes). * x86/efistub: Add missing boot_params for mixed mode compat entry (git- fixes). * x86/efistub: Call mixed mode boot services on the firmware's stack (git- fixes). * x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes). * x86/hyperv: Allow 15-bit APIC IDs for VTL platforms (git-fixes). * x86/hyperv: Use per cpu initial stack for vtl context (git-fixes). * x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (git-fixes). * x86/kconfig: Select ARCH_WANT_FRAME_POINTERS again when UNWINDER_FRAME_POINTER=y (git-fixes). * x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (git-fixes). * x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes). * x86/nmi: Fix the inverse "in NMI handler" check (git-fixes). * x86/nospec: Refactor UNTRAIN_RET[_*] (git-fixes). * x86/pm: Work around false positive kmemleak report in msr_build_context() (git-fixes). * x86/purgatory: Switch to the position-independent small code model (git- fixes). * x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros (git-fixes). * x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk (git- fixes). * x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes). * x86/srso: Disentangle rethunk-dependent options (git-fixes). * x86/srso: Fix unret validation dependencies (git-fixes). * x86/srso: Improve i-cache locality for alias mitigation (git-fixes). * x86/srso: Print actual mitigation if requested mitigation isn't possible (git-fixes). * x86/srso: Remove 'pred_cmd' label (git-fixes). * x86/srso: Unexport untraining functions (git-fixes). * x86/xen: Add some null pointer checking to smp.c (git-fixes). * x86/xen: attempt to inflate the memory balloon on PVH (git-fixes). * xdp, bonding: Fix feature flags when there are no slave devs anymore (git- fixes). * xen-netfront: Add missing skb_mark_for_recycle (git-fixes). * xen: evtchn: Allow shared registration of IRQ handers (git-fixes). * xen/events: drop xen_allocate_irqs_dynamic() (git-fixes). * xen/events: fix error code in xen_bind_pirq_msi_to_irq() (git-fixes). * xen/events: increment refcnt only if event channel is refcounted (git- fixes). * xen/events: modify internal [un]bind interfaces (git-fixes). * xen/events: reduce externally visible helper functions (git-fixes). * xen/events: remove some simple helpers from events_base.c (git-fixes). * xen/evtchn: avoid WARN() when unbinding an event channel (git-fixes). * xfs: add lock protection when remove perag from radix tree (git-fixes). * xfs: allow extent free intents to be retried (git-fixes). * xfs: fix perag leak when growfs fails (git-fixes). * xfs: force all buffers to be written during btree bulk load (git-fixes). * xfs: make xchk_iget safer in the presence of corrupt inode btrees (git- fixes). * xfs: pass the xfs_defer_pending object to iop_recover (git-fixes). * xfs: recompute growfsrtfree transaction reservation while growing rt volume (git-fixes). * xfs: transfer recovered intent item ownership in ->iop_recover (git-fixes). * xfs: use xfs_defer_pending objects to recover intent items (git-fixes). * xhci: add helper that checks for unhandled events on a event ring (git- fixes). * xhci: remove unnecessary event_ring_deq parameter from xhci_handle_event() (git-fixes). * xhci: Simplify event ring dequeue pointer update for port change events (git-fixes). * xhci: simplify event ring dequeue tracking for transfer events (git-fixes). * xhci: update event ring dequeue pointer position to controller correctly (git-fixes). Altered because we cannot take the multiple interrupter code ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2135=1 openSUSE-SLE-15.6-2024-2135=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2135=1 ## Package List: * openSUSE Leap 15.6 (aarch64 x86_64) * reiserfs-kmp-azure-6.4.0-150600.8.5.4 * kernel-azure-extra-6.4.0-150600.8.5.4 * kernel-azure-debuginfo-6.4.0-150600.8.5.4 * kernel-azure-extra-debuginfo-6.4.0-150600.8.5.4 * dlm-kmp-azure-debuginfo-6.4.0-150600.8.5.4 * dlm-kmp-azure-6.4.0-150600.8.5.4 * kernel-azure-optional-6.4.0-150600.8.5.4 * ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.5.4 * gfs2-kmp-azure-6.4.0-150600.8.5.4 * kselftests-kmp-azure-debuginfo-6.4.0-150600.8.5.4 * cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.5.4 * kernel-syms-azure-6.4.0-150600.8.5.1 * kernel-azure-devel-debuginfo-6.4.0-150600.8.5.4 * gfs2-kmp-azure-debuginfo-6.4.0-150600.8.5.4 * cluster-md-kmp-azure-6.4.0-150600.8.5.4 * kernel-azure-livepatch-devel-6.4.0-150600.8.5.4 * ocfs2-kmp-azure-6.4.0-150600.8.5.4 * reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.5.4 * kernel-azure-debugsource-6.4.0-150600.8.5.4 * kernel-azure-devel-6.4.0-150600.8.5.4 * kselftests-kmp-azure-6.4.0-150600.8.5.4 * kernel-azure-optional-debuginfo-6.4.0-150600.8.5.4 * openSUSE Leap 15.6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.5.4 * openSUSE Leap 15.6 (x86_64) * kernel-azure-vdso-debuginfo-6.4.0-150600.8.5.4 * kernel-azure-vdso-6.4.0-150600.8.5.4 * openSUSE Leap 15.6 (noarch) * kernel-devel-azure-6.4.0-150600.8.5.4 * kernel-source-azure-6.4.0-150600.8.5.4 * Public Cloud Module 15-SP6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.5.4 * Public Cloud Module 15-SP6 (aarch64 x86_64) * kernel-syms-azure-6.4.0-150600.8.5.1 * kernel-azure-devel-debuginfo-6.4.0-150600.8.5.4 * kernel-azure-debugsource-6.4.0-150600.8.5.4 * kernel-azure-devel-6.4.0-150600.8.5.4 * kernel-azure-debuginfo-6.4.0-150600.8.5.4 * Public Cloud Module 15-SP6 (noarch) * kernel-devel-azure-6.4.0-150600.8.5.4 * kernel-source-azure-6.4.0-150600.8.5.4 ## References: * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52434.html * https://www.suse.com/security/cve/CVE-2023-52458.html * https://www.suse.com/security/cve/CVE-2023-52463.html * https://www.suse.com/security/cve/CVE-2023-52472.html * https://www.suse.com/security/cve/CVE-2023-52483.html * https://www.suse.com/security/cve/CVE-2023-52492.html * https://www.suse.com/security/cve/CVE-2023-52503.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52608.html * https://www.suse.com/security/cve/CVE-2023-52616.html * https://www.suse.com/security/cve/CVE-2023-52618.html * https://www.suse.com/security/cve/CVE-2023-52631.html * https://www.suse.com/security/cve/CVE-2023-52635.html * https://www.suse.com/security/cve/CVE-2023-52640.html * https://www.suse.com/security/cve/CVE-2023-52641.html * https://www.suse.com/security/cve/CVE-2023-52645.html * https://www.suse.com/security/cve/CVE-2023-52652.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52657.html * https://www.suse.com/security/cve/CVE-2023-52658.html * https://www.suse.com/security/cve/CVE-2023-52659.html * https://www.suse.com/security/cve/CVE-2023-52660.html * https://www.suse.com/security/cve/CVE-2023-52661.html * https://www.suse.com/security/cve/CVE-2023-52662.html * https://www.suse.com/security/cve/CVE-2023-52663.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52667.html * https://www.suse.com/security/cve/CVE-2023-52669.html * https://www.suse.com/security/cve/CVE-2023-52670.html * https://www.suse.com/security/cve/CVE-2023-52671.html * https://www.suse.com/security/cve/CVE-2023-52673.html * https://www.suse.com/security/cve/CVE-2023-52674.html * https://www.suse.com/security/cve/CVE-2023-52675.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52678.html * https://www.suse.com/security/cve/CVE-2023-52679.html * https://www.suse.com/security/cve/CVE-2023-52680.html * https://www.suse.com/security/cve/CVE-2023-52681.html * https://www.suse.com/security/cve/CVE-2023-52683.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52687.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52692.html * https://www.suse.com/security/cve/CVE-2023-52693.html * https://www.suse.com/security/cve/CVE-2023-52694.html * https://www.suse.com/security/cve/CVE-2023-52695.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52697.html * https://www.suse.com/security/cve/CVE-2023-52698.html * https://www.suse.com/security/cve/CVE-2023-52771.html * https://www.suse.com/security/cve/CVE-2023-52772.html * https://www.suse.com/security/cve/CVE-2023-52860.html * https://www.suse.com/security/cve/CVE-2023-52882.html * https://www.suse.com/security/cve/CVE-2023-6238.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-7042.html * https://www.suse.com/security/cve/CVE-2024-0639.html * https://www.suse.com/security/cve/CVE-2024-21823.html * https://www.suse.com/security/cve/CVE-2024-22099.html * https://www.suse.com/security/cve/CVE-2024-23848.html * https://www.suse.com/security/cve/CVE-2024-24861.html * https://www.suse.com/security/cve/CVE-2024-25739.html * https://www.suse.com/security/cve/CVE-2024-26601.html * https://www.suse.com/security/cve/CVE-2024-26611.html * https://www.suse.com/security/cve/CVE-2024-26614.html * https://www.suse.com/security/cve/CVE-2024-26632.html * https://www.suse.com/security/cve/CVE-2024-26638.html * https://www.suse.com/security/cve/CVE-2024-26642.html * https://www.suse.com/security/cve/CVE-2024-26643.html * https://www.suse.com/security/cve/CVE-2024-26652.html * https://www.suse.com/security/cve/CVE-2024-26654.html * https://www.suse.com/security/cve/CVE-2024-26656.html * https://www.suse.com/security/cve/CVE-2024-26657.html * https://www.suse.com/security/cve/CVE-2024-26671.html * https://www.suse.com/security/cve/CVE-2024-26673.html * https://www.suse.com/security/cve/CVE-2024-26674.html * https://www.suse.com/security/cve/CVE-2024-26675.html * https://www.suse.com/security/cve/CVE-2024-26679.html * https://www.suse.com/security/cve/CVE-2024-26684.html * https://www.suse.com/security/cve/CVE-2024-26685.html * https://www.suse.com/security/cve/CVE-2024-26692.html * https://www.suse.com/security/cve/CVE-2024-26696.html * https://www.suse.com/security/cve/CVE-2024-26697.html * https://www.suse.com/security/cve/CVE-2024-26704.html * https://www.suse.com/security/cve/CVE-2024-26714.html * https://www.suse.com/security/cve/CVE-2024-26726.html * https://www.suse.com/security/cve/CVE-2024-26731.html * https://www.suse.com/security/cve/CVE-2024-26733.html * https://www.suse.com/security/cve/CVE-2024-26736.html * https://www.suse.com/security/cve/CVE-2024-26737.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26740.html * https://www.suse.com/security/cve/CVE-2024-26742.html * https://www.suse.com/security/cve/CVE-2024-26756.html * https://www.suse.com/security/cve/CVE-2024-26757.html * https://www.suse.com/security/cve/CVE-2024-26760.html * https://www.suse.com/security/cve/CVE-2024-267600.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26769.html * https://www.suse.com/security/cve/CVE-2024-26772.html * https://www.suse.com/security/cve/CVE-2024-26773.html * https://www.suse.com/security/cve/CVE-2024-26774.html * https://www.suse.com/security/cve/CVE-2024-26775.html * https://www.suse.com/security/cve/CVE-2024-26779.html * https://www.suse.com/security/cve/CVE-2024-26783.html * https://www.suse.com/security/cve/CVE-2024-26786.html * https://www.suse.com/security/cve/CVE-2024-26791.html * https://www.suse.com/security/cve/CVE-2024-26793.html * https://www.suse.com/security/cve/CVE-2024-26794.html * https://www.suse.com/security/cve/CVE-2024-26802.html * https://www.suse.com/security/cve/CVE-2024-26805.html * https://www.suse.com/security/cve/CVE-2024-26807.html * https://www.suse.com/security/cve/CVE-2024-26815.html * https://www.suse.com/security/cve/CVE-2024-26816.html * https://www.suse.com/security/cve/CVE-2024-26822.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26832.html * https://www.suse.com/security/cve/CVE-2024-26836.html * https://www.suse.com/security/cve/CVE-2024-26844.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26848.html * https://www.suse.com/security/cve/CVE-2024-26853.html * https://www.suse.com/security/cve/CVE-2024-26854.html * https://www.suse.com/security/cve/CVE-2024-26855.html * https://www.suse.com/security/cve/CVE-2024-26856.html * https://www.suse.com/security/cve/CVE-2024-26857.html * https://www.suse.com/security/cve/CVE-2024-26858.html * https://www.suse.com/security/cve/CVE-2024-26860.html * https://www.suse.com/security/cve/CVE-2024-26861.html * https://www.suse.com/security/cve/CVE-2024-26862.html * https://www.suse.com/security/cve/CVE-2024-26866.html * https://www.suse.com/security/cve/CVE-2024-26868.html * https://www.suse.com/security/cve/CVE-2024-26870.html * https://www.suse.com/security/cve/CVE-2024-26878.html * https://www.suse.com/security/cve/CVE-2024-26881.html * https://www.suse.com/security/cve/CVE-2024-26882.html * https://www.suse.com/security/cve/CVE-2024-26883.html * https://www.suse.com/security/cve/CVE-2024-26884.html * https://www.suse.com/security/cve/CVE-2024-26885.html * https://www.suse.com/security/cve/CVE-2024-26898.html * https://www.suse.com/security/cve/CVE-2024-26899.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26901.html * https://www.suse.com/security/cve/CVE-2024-26903.html * https://www.suse.com/security/cve/CVE-2024-26906.html * https://www.suse.com/security/cve/CVE-2024-26909.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26922.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26928.html * https://www.suse.com/security/cve/CVE-2024-26932.html * https://www.suse.com/security/cve/CVE-2024-26933.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26935.html * https://www.suse.com/security/cve/CVE-2024-26937.html * https://www.suse.com/security/cve/CVE-2024-26938.html * https://www.suse.com/security/cve/CVE-2024-26940.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26945.html * https://www.suse.com/security/cve/CVE-2024-26946.html * https://www.suse.com/security/cve/CVE-2024-26948.html * https://www.suse.com/security/cve/CVE-2024-26949.html * https://www.suse.com/security/cve/CVE-2024-26950.html * https://www.suse.com/security/cve/CVE-2024-26951.html * https://www.suse.com/security/cve/CVE-2024-26956.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26958.html * https://www.suse.com/security/cve/CVE-2024-26960.html * https://www.suse.com/security/cve/CVE-2024-26961.html * https://www.suse.com/security/cve/CVE-2024-26962.html * https://www.suse.com/security/cve/CVE-2024-26963.html * https://www.suse.com/security/cve/CVE-2024-26964.html * https://www.suse.com/security/cve/CVE-2024-26972.html * https://www.suse.com/security/cve/CVE-2024-26973.html * https://www.suse.com/security/cve/CVE-2024-26978.html * https://www.suse.com/security/cve/CVE-2024-26979.html * https://www.suse.com/security/cve/CVE-2024-26981.html * https://www.suse.com/security/cve/CVE-2024-26982.html * https://www.suse.com/security/cve/CVE-2024-26983.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26986.html * https://www.suse.com/security/cve/CVE-2024-26988.html * https://www.suse.com/security/cve/CVE-2024-26989.html * https://www.suse.com/security/cve/CVE-2024-26990.html * https://www.suse.com/security/cve/CVE-2024-26991.html * https://www.suse.com/security/cve/CVE-2024-26992.html * https://www.suse.com/security/cve/CVE-2024-26993.html * https://www.suse.com/security/cve/CVE-2024-26994.html * https://www.suse.com/security/cve/CVE-2024-26995.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-26997.html * https://www.suse.com/security/cve/CVE-2024-26999.html * https://www.suse.com/security/cve/CVE-2024-27000.html * https://www.suse.com/security/cve/CVE-2024-27001.html * https://www.suse.com/security/cve/CVE-2024-27002.html * https://www.suse.com/security/cve/CVE-2024-27003.html * https://www.suse.com/security/cve/CVE-2024-27004.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27013.html * https://www.suse.com/security/cve/CVE-2024-27014.html * https://www.suse.com/security/cve/CVE-2024-27022.html * https://www.suse.com/security/cve/CVE-2024-27027.html * https://www.suse.com/security/cve/CVE-2024-27028.html * https://www.suse.com/security/cve/CVE-2024-27029.html * https://www.suse.com/security/cve/CVE-2024-27030.html * https://www.suse.com/security/cve/CVE-2024-27031.html * https://www.suse.com/security/cve/CVE-2024-27036.html * https://www.suse.com/security/cve/CVE-2024-27046.html * https://www.suse.com/security/cve/CVE-2024-27056.html * https://www.suse.com/security/cve/CVE-2024-27057.html * https://www.suse.com/security/cve/CVE-2024-27062.html * https://www.suse.com/security/cve/CVE-2024-27067.html * https://www.suse.com/security/cve/CVE-2024-27080.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27389.html * https://www.suse.com/security/cve/CVE-2024-27393.html * https://www.suse.com/security/cve/CVE-2024-27395.html * https://www.suse.com/security/cve/CVE-2024-27396.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27399.html * https://www.suse.com/security/cve/CVE-2024-27400.html * https://www.suse.com/security/cve/CVE-2024-27401.html * https://www.suse.com/security/cve/CVE-2024-27405.html * https://www.suse.com/security/cve/CVE-2024-27408.html * https://www.suse.com/security/cve/CVE-2024-27410.html * https://www.suse.com/security/cve/CVE-2024-27411.html * https://www.suse.com/security/cve/CVE-2024-27412.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-27416.html * https://www.suse.com/security/cve/CVE-2024-27417.html * https://www.suse.com/security/cve/CVE-2024-27418.html * https://www.suse.com/security/cve/CVE-2024-27431.html * https://www.suse.com/security/cve/CVE-2024-27432.html * https://www.suse.com/security/cve/CVE-2024-27434.html * https://www.suse.com/security/cve/CVE-2024-27435.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-35784.html * https://www.suse.com/security/cve/CVE-2024-35786.html * https://www.suse.com/security/cve/CVE-2024-35788.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35790.html * https://www.suse.com/security/cve/CVE-2024-35791.html * https://www.suse.com/security/cve/CVE-2024-35794.html * https://www.suse.com/security/cve/CVE-2024-35795.html * https://www.suse.com/security/cve/CVE-2024-35796.html * https://www.suse.com/security/cve/CVE-2024-35799.html * https://www.suse.com/security/cve/CVE-2024-35800.html * https://www.suse.com/security/cve/CVE-2024-35801.html * https://www.suse.com/security/cve/CVE-2024-35803.html * https://www.suse.com/security/cve/CVE-2024-35804.html * https://www.suse.com/security/cve/CVE-2024-35806.html * https://www.suse.com/security/cve/CVE-2024-35808.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35810.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35812.html * https://www.suse.com/security/cve/CVE-2024-35813.html * https://www.suse.com/security/cve/CVE-2024-35814.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35819.html * https://www.suse.com/security/cve/CVE-2024-35821.html * https://www.suse.com/security/cve/CVE-2024-35822.html * https://www.suse.com/security/cve/CVE-2024-35823.html * https://www.suse.com/security/cve/CVE-2024-35824.html * https://www.suse.com/security/cve/CVE-2024-35825.html * https://www.suse.com/security/cve/CVE-2024-35828.html * https://www.suse.com/security/cve/CVE-2024-35829.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35833.html * https://www.suse.com/security/cve/CVE-2024-35834.html * https://www.suse.com/security/cve/CVE-2024-35835.html * https://www.suse.com/security/cve/CVE-2024-35836.html * https://www.suse.com/security/cve/CVE-2024-35837.html * https://www.suse.com/security/cve/CVE-2024-35838.html * https://www.suse.com/security/cve/CVE-2024-35841.html * https://www.suse.com/security/cve/CVE-2024-35842.html * https://www.suse.com/security/cve/CVE-2024-35845.html * https://www.suse.com/security/cve/CVE-2024-35847.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35850.html * https://www.suse.com/security/cve/CVE-2024-35851.html * https://www.suse.com/security/cve/CVE-2024-35852.html * https://www.suse.com/security/cve/CVE-2024-35854.html * https://www.suse.com/security/cve/CVE-2024-35860.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35865.html * https://www.suse.com/security/cve/CVE-2024-35866.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35868.html * https://www.suse.com/security/cve/CVE-2024-35869.html * https://www.suse.com/security/cve/CVE-2024-35870.html * https://www.suse.com/security/cve/CVE-2024-35872.html * https://www.suse.com/security/cve/CVE-2024-35875.html * https://www.suse.com/security/cve/CVE-2024-35877.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35879.html * https://www.suse.com/security/cve/CVE-2024-35883.html * https://www.suse.com/security/cve/CVE-2024-35885.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35889.html * https://www.suse.com/security/cve/CVE-2024-35891.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35901.html * https://www.suse.com/security/cve/CVE-2024-35903.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35907.html * https://www.suse.com/security/cve/CVE-2024-35909.html * https://www.suse.com/security/cve/CVE-2024-35911.html * https://www.suse.com/security/cve/CVE-2024-35912.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35915.html * https://www.suse.com/security/cve/CVE-2024-35916.html * https://www.suse.com/security/cve/CVE-2024-35917.html * https://www.suse.com/security/cve/CVE-2024-35921.html * https://www.suse.com/security/cve/CVE-2024-35922.html * https://www.suse.com/security/cve/CVE-2024-35924.html * https://www.suse.com/security/cve/CVE-2024-35927.html * https://www.suse.com/security/cve/CVE-2024-35928.html * https://www.suse.com/security/cve/CVE-2024-35930.html * https://www.suse.com/security/cve/CVE-2024-35931.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35933.html * https://www.suse.com/security/cve/CVE-2024-35935.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35937.html * https://www.suse.com/security/cve/CVE-2024-35938.html * https://www.suse.com/security/cve/CVE-2024-35940.html * https://www.suse.com/security/cve/CVE-2024-35943.html * https://www.suse.com/security/cve/CVE-2024-35944.html * https://www.suse.com/security/cve/CVE-2024-35945.html * https://www.suse.com/security/cve/CVE-2024-35946.html * https://www.suse.com/security/cve/CVE-2024-35947.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-35951.html * https://www.suse.com/security/cve/CVE-2024-35952.html * https://www.suse.com/security/cve/CVE-2024-35953.html * https://www.suse.com/security/cve/CVE-2024-35954.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35956.html * https://www.suse.com/security/cve/CVE-2024-35958.html * https://www.suse.com/security/cve/CVE-2024-35959.html * https://www.suse.com/security/cve/CVE-2024-35960.html * https://www.suse.com/security/cve/CVE-2024-35961.html * https://www.suse.com/security/cve/CVE-2024-35963.html * https://www.suse.com/security/cve/CVE-2024-35964.html * https://www.suse.com/security/cve/CVE-2024-35965.html * https://www.suse.com/security/cve/CVE-2024-35966.html * https://www.suse.com/security/cve/CVE-2024-35967.html * https://www.suse.com/security/cve/CVE-2024-35969.html * https://www.suse.com/security/cve/CVE-2024-35971.html * https://www.suse.com/security/cve/CVE-2024-35972.html * https://www.suse.com/security/cve/CVE-2024-35973.html * https://www.suse.com/security/cve/CVE-2024-35974.html * https://www.suse.com/security/cve/CVE-2024-35975.html * https://www.suse.com/security/cve/CVE-2024-35977.html * https://www.suse.com/security/cve/CVE-2024-35978.html * https://www.suse.com/security/cve/CVE-2024-35981.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-35986.html * https://www.suse.com/security/cve/CVE-2024-35989.html * https://www.suse.com/security/cve/CVE-2024-35990.html * https://www.suse.com/security/cve/CVE-2024-35991.html * https://www.suse.com/security/cve/CVE-2024-35992.html * https://www.suse.com/security/cve/CVE-2024-35995.html * https://www.suse.com/security/cve/CVE-2024-35997.html * https://www.suse.com/security/cve/CVE-2024-35999.html * https://www.suse.com/security/cve/CVE-2024-36002.html * https://www.suse.com/security/cve/CVE-2024-36006.html * https://www.suse.com/security/cve/CVE-2024-36007.html * https://www.suse.com/security/cve/CVE-2024-36009.html * https://www.suse.com/security/cve/CVE-2024-36011.html * https://www.suse.com/security/cve/CVE-2024-36012.html * https://www.suse.com/security/cve/CVE-2024-36013.html * https://www.suse.com/security/cve/CVE-2024-36014.html * https://www.suse.com/security/cve/CVE-2024-36015.html * https://www.suse.com/security/cve/CVE-2024-36016.html * https://www.suse.com/security/cve/CVE-2024-36018.html * https://www.suse.com/security/cve/CVE-2024-36019.html * https://www.suse.com/security/cve/CVE-2024-36020.html * https://www.suse.com/security/cve/CVE-2024-36021.html * https://www.suse.com/security/cve/CVE-2024-36025.html * https://www.suse.com/security/cve/CVE-2024-36026.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36030.html * https://www.suse.com/security/cve/CVE-2024-36032.html * https://www.suse.com/security/cve/CVE-2024-36880.html * https://www.suse.com/security/cve/CVE-2024-36885.html * https://www.suse.com/security/cve/CVE-2024-36890.html * https://www.suse.com/security/cve/CVE-2024-36891.html * https://www.suse.com/security/cve/CVE-2024-36893.html * https://www.suse.com/security/cve/CVE-2024-36894.html * https://www.suse.com/security/cve/CVE-2024-36895.html * https://www.suse.com/security/cve/CVE-2024-36896.html * https://www.suse.com/security/cve/CVE-2024-36897.html * https://www.suse.com/security/cve/CVE-2024-36898.html * https://www.suse.com/security/cve/CVE-2024-36906.html * https://www.suse.com/security/cve/CVE-2024-36918.html * https://www.suse.com/security/cve/CVE-2024-36921.html * https://www.suse.com/security/cve/CVE-2024-36922.html * https://www.suse.com/security/cve/CVE-2024-36928.html * https://www.suse.com/security/cve/CVE-2024-36930.html * https://www.suse.com/security/cve/CVE-2024-36931.html * https://www.suse.com/security/cve/CVE-2024-36936.html * https://www.suse.com/security/cve/CVE-2024-36940.html * https://www.suse.com/security/cve/CVE-2024-36941.html * https://www.suse.com/security/cve/CVE-2024-36942.html * https://www.suse.com/security/cve/CVE-2024-36944.html * https://www.suse.com/security/cve/CVE-2024-36947.html * https://www.suse.com/security/cve/CVE-2024-36949.html * https://www.suse.com/security/cve/CVE-2024-36950.html * https://www.suse.com/security/cve/CVE-2024-36951.html * https://www.suse.com/security/cve/CVE-2024-36955.html * https://www.suse.com/security/cve/CVE-2024-36959.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1187716 * https://bugzilla.suse.com/show_bug.cgi?id=1193599 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1208593 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1213573 * https://bugzilla.suse.com/show_bug.cgi?id=1214852 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216196 * https://bugzilla.suse.com/show_bug.cgi?id=1216358 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217384 * https://bugzilla.suse.com/show_bug.cgi?id=1217408 * https://bugzilla.suse.com/show_bug.cgi?id=1217489 * https://bugzilla.suse.com/show_bug.cgi?id=1217750 * https://bugzilla.suse.com/show_bug.cgi?id=1217959 * https://bugzilla.suse.com/show_bug.cgi?id=1218205 * https://bugzilla.suse.com/show_bug.cgi?id=1218336 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218779 * https://bugzilla.suse.com/show_bug.cgi?id=1218917 * https://bugzilla.suse.com/show_bug.cgi?id=1219104 * https://bugzilla.suse.com/show_bug.cgi?id=1219170 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219623 * https://bugzilla.suse.com/show_bug.cgi?id=1219834 * https://bugzilla.suse.com/show_bug.cgi?id=1220021 * https://bugzilla.suse.com/show_bug.cgi?id=1220045 * https://bugzilla.suse.com/show_bug.cgi?id=1220120 * https://bugzilla.suse.com/show_bug.cgi?id=1220148 * https://bugzilla.suse.com/show_bug.cgi?id=1220328 * https://bugzilla.suse.com/show_bug.cgi?id=1220342 * https://bugzilla.suse.com/show_bug.cgi?id=1220428 * https://bugzilla.suse.com/show_bug.cgi?id=1220430 * https://bugzilla.suse.com/show_bug.cgi?id=1220569 * https://bugzilla.suse.com/show_bug.cgi?id=1220587 * https://bugzilla.suse.com/show_bug.cgi?id=1220738 * https://bugzilla.suse.com/show_bug.cgi?id=1220783 * https://bugzilla.suse.com/show_bug.cgi?id=1220915 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221276 * https://bugzilla.suse.com/show_bug.cgi?id=1221293 * https://bugzilla.suse.com/show_bug.cgi?id=1221303 * https://bugzilla.suse.com/show_bug.cgi?id=1221375 * https://bugzilla.suse.com/show_bug.cgi?id=1221504 * https://bugzilla.suse.com/show_bug.cgi?id=1221612 * https://bugzilla.suse.com/show_bug.cgi?id=1221615 * https://bugzilla.suse.com/show_bug.cgi?id=1221635 * https://bugzilla.suse.com/show_bug.cgi?id=1221645 * https://bugzilla.suse.com/show_bug.cgi?id=1221649 * https://bugzilla.suse.com/show_bug.cgi?id=1221765 * https://bugzilla.suse.com/show_bug.cgi?id=1221777 * https://bugzilla.suse.com/show_bug.cgi?id=1221783 * https://bugzilla.suse.com/show_bug.cgi?id=1221816 * https://bugzilla.suse.com/show_bug.cgi?id=1221829 * https://bugzilla.suse.com/show_bug.cgi?id=1221830 * https://bugzilla.suse.com/show_bug.cgi?id=1221858 * https://bugzilla.suse.com/show_bug.cgi?id=1222115 * https://bugzilla.suse.com/show_bug.cgi?id=1222173 * https://bugzilla.suse.com/show_bug.cgi?id=1222264 * https://bugzilla.suse.com/show_bug.cgi?id=1222273 * https://bugzilla.suse.com/show_bug.cgi?id=1222294 * https://bugzilla.suse.com/show_bug.cgi?id=1222301 * https://bugzilla.suse.com/show_bug.cgi?id=1222303 * https://bugzilla.suse.com/show_bug.cgi?id=1222304 * https://bugzilla.suse.com/show_bug.cgi?id=1222307 * https://bugzilla.suse.com/show_bug.cgi?id=1222357 * https://bugzilla.suse.com/show_bug.cgi?id=1222366 * https://bugzilla.suse.com/show_bug.cgi?id=1222368 * https://bugzilla.suse.com/show_bug.cgi?id=1222371 * https://bugzilla.suse.com/show_bug.cgi?id=1222378 * https://bugzilla.suse.com/show_bug.cgi?id=1222379 * https://bugzilla.suse.com/show_bug.cgi?id=1222385 * https://bugzilla.suse.com/show_bug.cgi?id=1222422 * https://bugzilla.suse.com/show_bug.cgi?id=1222426 * https://bugzilla.suse.com/show_bug.cgi?id=1222428 * https://bugzilla.suse.com/show_bug.cgi?id=1222437 * https://bugzilla.suse.com/show_bug.cgi?id=1222445 * https://bugzilla.suse.com/show_bug.cgi?id=1222459 * https://bugzilla.suse.com/show_bug.cgi?id=1222464 * https://bugzilla.suse.com/show_bug.cgi?id=1222489 * https://bugzilla.suse.com/show_bug.cgi?id=1222522 * https://bugzilla.suse.com/show_bug.cgi?id=1222525 * https://bugzilla.suse.com/show_bug.cgi?id=1222527 * https://bugzilla.suse.com/show_bug.cgi?id=1222531 * https://bugzilla.suse.com/show_bug.cgi?id=1222532 * https://bugzilla.suse.com/show_bug.cgi?id=1222549 * https://bugzilla.suse.com/show_bug.cgi?id=1222550 * https://bugzilla.suse.com/show_bug.cgi?id=1222557 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222563 * https://bugzilla.suse.com/show_bug.cgi?id=1222585 * https://bugzilla.suse.com/show_bug.cgi?id=1222586 * https://bugzilla.suse.com/show_bug.cgi?id=1222596 * https://bugzilla.suse.com/show_bug.cgi?id=1222606 * https://bugzilla.suse.com/show_bug.cgi?id=1222608 * https://bugzilla.suse.com/show_bug.cgi?id=1222613 * https://bugzilla.suse.com/show_bug.cgi?id=1222615 * https://bugzilla.suse.com/show_bug.cgi?id=1222618 * https://bugzilla.suse.com/show_bug.cgi?id=1222622 * https://bugzilla.suse.com/show_bug.cgi?id=1222624 * https://bugzilla.suse.com/show_bug.cgi?id=1222627 * https://bugzilla.suse.com/show_bug.cgi?id=1222630 * https://bugzilla.suse.com/show_bug.cgi?id=1222635 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222727 * https://bugzilla.suse.com/show_bug.cgi?id=1222769 * https://bugzilla.suse.com/show_bug.cgi?id=1222771 * https://bugzilla.suse.com/show_bug.cgi?id=1222772 * https://bugzilla.suse.com/show_bug.cgi?id=1222775 * https://bugzilla.suse.com/show_bug.cgi?id=1222777 * https://bugzilla.suse.com/show_bug.cgi?id=1222780 * https://bugzilla.suse.com/show_bug.cgi?id=1222782 * https://bugzilla.suse.com/show_bug.cgi?id=1222793 * https://bugzilla.suse.com/show_bug.cgi?id=1222799 * https://bugzilla.suse.com/show_bug.cgi?id=1222801 * https://bugzilla.suse.com/show_bug.cgi?id=1222968 * https://bugzilla.suse.com/show_bug.cgi?id=1223007 * https://bugzilla.suse.com/show_bug.cgi?id=1223011 * https://bugzilla.suse.com/show_bug.cgi?id=1223015 * https://bugzilla.suse.com/show_bug.cgi?id=1223016 * https://bugzilla.suse.com/show_bug.cgi?id=1223020 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223024 * https://bugzilla.suse.com/show_bug.cgi?id=1223030 * https://bugzilla.suse.com/show_bug.cgi?id=1223033 * https://bugzilla.suse.com/show_bug.cgi?id=1223034 * https://bugzilla.suse.com/show_bug.cgi?id=1223035 * https://bugzilla.suse.com/show_bug.cgi?id=1223038 * https://bugzilla.suse.com/show_bug.cgi?id=1223039 * https://bugzilla.suse.com/show_bug.cgi?id=1223041 * https://bugzilla.suse.com/show_bug.cgi?id=1223045 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223051 * https://bugzilla.suse.com/show_bug.cgi?id=1223052 * https://bugzilla.suse.com/show_bug.cgi?id=1223058 * https://bugzilla.suse.com/show_bug.cgi?id=1223060 * https://bugzilla.suse.com/show_bug.cgi?id=1223061 * https://bugzilla.suse.com/show_bug.cgi?id=1223076 * https://bugzilla.suse.com/show_bug.cgi?id=1223077 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223111 * https://bugzilla.suse.com/show_bug.cgi?id=1223113 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223143 * https://bugzilla.suse.com/show_bug.cgi?id=1223187 * https://bugzilla.suse.com/show_bug.cgi?id=1223189 * https://bugzilla.suse.com/show_bug.cgi?id=1223190 * https://bugzilla.suse.com/show_bug.cgi?id=1223191 * https://bugzilla.suse.com/show_bug.cgi?id=1223198 * https://bugzilla.suse.com/show_bug.cgi?id=1223202 * https://bugzilla.suse.com/show_bug.cgi?id=1223285 * https://bugzilla.suse.com/show_bug.cgi?id=1223315 * https://bugzilla.suse.com/show_bug.cgi?id=1223338 * https://bugzilla.suse.com/show_bug.cgi?id=1223369 * https://bugzilla.suse.com/show_bug.cgi?id=1223380 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223439 * https://bugzilla.suse.com/show_bug.cgi?id=1223462 * https://bugzilla.suse.com/show_bug.cgi?id=1223532 * https://bugzilla.suse.com/show_bug.cgi?id=1223539 * https://bugzilla.suse.com/show_bug.cgi?id=1223575 * https://bugzilla.suse.com/show_bug.cgi?id=1223590 * https://bugzilla.suse.com/show_bug.cgi?id=1223591 * https://bugzilla.suse.com/show_bug.cgi?id=1223592 * https://bugzilla.suse.com/show_bug.cgi?id=1223593 * https://bugzilla.suse.com/show_bug.cgi?id=1223625 * https://bugzilla.suse.com/show_bug.cgi?id=1223628 * https://bugzilla.suse.com/show_bug.cgi?id=1223629 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223634 * https://bugzilla.suse.com/show_bug.cgi?id=1223637 * https://bugzilla.suse.com/show_bug.cgi?id=1223641 * https://bugzilla.suse.com/show_bug.cgi?id=1223643 * https://bugzilla.suse.com/show_bug.cgi?id=1223649 * https://bugzilla.suse.com/show_bug.cgi?id=1223650 * https://bugzilla.suse.com/show_bug.cgi?id=1223651 * https://bugzilla.suse.com/show_bug.cgi?id=1223652 * https://bugzilla.suse.com/show_bug.cgi?id=1223653 * https://bugzilla.suse.com/show_bug.cgi?id=1223654 * https://bugzilla.suse.com/show_bug.cgi?id=1223655 * https://bugzilla.suse.com/show_bug.cgi?id=1223660 * https://bugzilla.suse.com/show_bug.cgi?id=1223661 * https://bugzilla.suse.com/show_bug.cgi?id=1223663 * https://bugzilla.suse.com/show_bug.cgi?id=1223664 * https://bugzilla.suse.com/show_bug.cgi?id=1223665 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223668 * https://bugzilla.suse.com/show_bug.cgi?id=1223669 * https://bugzilla.suse.com/show_bug.cgi?id=1223670 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1223677 * https://bugzilla.suse.com/show_bug.cgi?id=1223678 * https://bugzilla.suse.com/show_bug.cgi?id=1223686 * https://bugzilla.suse.com/show_bug.cgi?id=1223692 * https://bugzilla.suse.com/show_bug.cgi?id=1223693 * https://bugzilla.suse.com/show_bug.cgi?id=1223695 * https://bugzilla.suse.com/show_bug.cgi?id=1223696 * https://bugzilla.suse.com/show_bug.cgi?id=1223698 * https://bugzilla.suse.com/show_bug.cgi?id=1223705 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223718 * https://bugzilla.suse.com/show_bug.cgi?id=1223728 * https://bugzilla.suse.com/show_bug.cgi?id=1223732 * https://bugzilla.suse.com/show_bug.cgi?id=1223735 * https://bugzilla.suse.com/show_bug.cgi?id=1223739 * https://bugzilla.suse.com/show_bug.cgi?id=1223741 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223745 * https://bugzilla.suse.com/show_bug.cgi?id=1223747 * https://bugzilla.suse.com/show_bug.cgi?id=1223748 * https://bugzilla.suse.com/show_bug.cgi?id=1223749 * https://bugzilla.suse.com/show_bug.cgi?id=1223750 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223754 * https://bugzilla.suse.com/show_bug.cgi?id=1223757 * https://bugzilla.suse.com/show_bug.cgi?id=1223759 * https://bugzilla.suse.com/show_bug.cgi?id=1223761 * https://bugzilla.suse.com/show_bug.cgi?id=1223762 * https://bugzilla.suse.com/show_bug.cgi?id=1223774 * https://bugzilla.suse.com/show_bug.cgi?id=1223782 * https://bugzilla.suse.com/show_bug.cgi?id=1223787 * https://bugzilla.suse.com/show_bug.cgi?id=1223788 * https://bugzilla.suse.com/show_bug.cgi?id=1223789 * https://bugzilla.suse.com/show_bug.cgi?id=1223790 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223805 * https://bugzilla.suse.com/show_bug.cgi?id=1223810 * https://bugzilla.suse.com/show_bug.cgi?id=1223822 * https://bugzilla.suse.com/show_bug.cgi?id=1223827 * https://bugzilla.suse.com/show_bug.cgi?id=1223831 * https://bugzilla.suse.com/show_bug.cgi?id=1223834 * https://bugzilla.suse.com/show_bug.cgi?id=1223838 * https://bugzilla.suse.com/show_bug.cgi?id=1223869 * https://bugzilla.suse.com/show_bug.cgi?id=1223870 * https://bugzilla.suse.com/show_bug.cgi?id=1223871 * https://bugzilla.suse.com/show_bug.cgi?id=1223872 * https://bugzilla.suse.com/show_bug.cgi?id=1223874 * https://bugzilla.suse.com/show_bug.cgi?id=1223944 * https://bugzilla.suse.com/show_bug.cgi?id=1223945 * https://bugzilla.suse.com/show_bug.cgi?id=1223946 * https://bugzilla.suse.com/show_bug.cgi?id=1223991 * https://bugzilla.suse.com/show_bug.cgi?id=1224076 * https://bugzilla.suse.com/show_bug.cgi?id=1224096 * https://bugzilla.suse.com/show_bug.cgi?id=1224098 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224137 * https://bugzilla.suse.com/show_bug.cgi?id=1224166 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224177 * https://bugzilla.suse.com/show_bug.cgi?id=1224180 * https://bugzilla.suse.com/show_bug.cgi?id=1224181 * https://bugzilla.suse.com/show_bug.cgi?id=1224331 * https://bugzilla.suse.com/show_bug.cgi?id=1224348 * https://bugzilla.suse.com/show_bug.cgi?id=1224423 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224430 * https://bugzilla.suse.com/show_bug.cgi?id=1224432 * https://bugzilla.suse.com/show_bug.cgi?id=1224433 * https://bugzilla.suse.com/show_bug.cgi?id=1224437 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224442 * https://bugzilla.suse.com/show_bug.cgi?id=1224443 * https://bugzilla.suse.com/show_bug.cgi?id=1224445 * https://bugzilla.suse.com/show_bug.cgi?id=1224449 * https://bugzilla.suse.com/show_bug.cgi?id=1224477 * https://bugzilla.suse.com/show_bug.cgi?id=1224479 * https://bugzilla.suse.com/show_bug.cgi?id=1224480 * https://bugzilla.suse.com/show_bug.cgi?id=1224481 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224486 * https://bugzilla.suse.com/show_bug.cgi?id=1224487 * https://bugzilla.suse.com/show_bug.cgi?id=1224488 * https://bugzilla.suse.com/show_bug.cgi?id=1224491 * https://bugzilla.suse.com/show_bug.cgi?id=1224492 * https://bugzilla.suse.com/show_bug.cgi?id=1224493 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224495 * https://bugzilla.suse.com/show_bug.cgi?id=1224500 * https://bugzilla.suse.com/show_bug.cgi?id=1224501 * https://bugzilla.suse.com/show_bug.cgi?id=1224502 * https://bugzilla.suse.com/show_bug.cgi?id=1224504 * https://bugzilla.suse.com/show_bug.cgi?id=1224505 * https://bugzilla.suse.com/show_bug.cgi?id=1224506 * https://bugzilla.suse.com/show_bug.cgi?id=1224507 * https://bugzilla.suse.com/show_bug.cgi?id=1224508 * https://bugzilla.suse.com/show_bug.cgi?id=1224509 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224513 * https://bugzilla.suse.com/show_bug.cgi?id=1224517 * https://bugzilla.suse.com/show_bug.cgi?id=1224519 * https://bugzilla.suse.com/show_bug.cgi?id=1224521 * https://bugzilla.suse.com/show_bug.cgi?id=1224524 * https://bugzilla.suse.com/show_bug.cgi?id=1224525 * https://bugzilla.suse.com/show_bug.cgi?id=1224526 * https://bugzilla.suse.com/show_bug.cgi?id=1224530 * https://bugzilla.suse.com/show_bug.cgi?id=1224531 * https://bugzilla.suse.com/show_bug.cgi?id=1224534 * https://bugzilla.suse.com/show_bug.cgi?id=1224537 * https://bugzilla.suse.com/show_bug.cgi?id=1224541 * https://bugzilla.suse.com/show_bug.cgi?id=1224542 * https://bugzilla.suse.com/show_bug.cgi?id=1224543 * https://bugzilla.suse.com/show_bug.cgi?id=1224546 * https://bugzilla.suse.com/show_bug.cgi?id=1224550 * https://bugzilla.suse.com/show_bug.cgi?id=1224552 * https://bugzilla.suse.com/show_bug.cgi?id=1224553 * https://bugzilla.suse.com/show_bug.cgi?id=1224555 * https://bugzilla.suse.com/show_bug.cgi?id=1224557 * https://bugzilla.suse.com/show_bug.cgi?id=1224558 * https://bugzilla.suse.com/show_bug.cgi?id=1224559 * https://bugzilla.suse.com/show_bug.cgi?id=1224562 * https://bugzilla.suse.com/show_bug.cgi?id=1224565 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224567 * https://bugzilla.suse.com/show_bug.cgi?id=1224568 * https://bugzilla.suse.com/show_bug.cgi?id=1224569 * https://bugzilla.suse.com/show_bug.cgi?id=1224571 * https://bugzilla.suse.com/show_bug.cgi?id=1224573 * https://bugzilla.suse.com/show_bug.cgi?id=1224576 * https://bugzilla.suse.com/show_bug.cgi?id=1224577 * https://bugzilla.suse.com/show_bug.cgi?id=1224578 * https://bugzilla.suse.com/show_bug.cgi?id=1224579 * https://bugzilla.suse.com/show_bug.cgi?id=1224580 * https://bugzilla.suse.com/show_bug.cgi?id=1224581 * https://bugzilla.suse.com/show_bug.cgi?id=1224582 * https://bugzilla.suse.com/show_bug.cgi?id=1224585 * https://bugzilla.suse.com/show_bug.cgi?id=1224586 * https://bugzilla.suse.com/show_bug.cgi?id=1224587 * https://bugzilla.suse.com/show_bug.cgi?id=1224588 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224596 * https://bugzilla.suse.com/show_bug.cgi?id=1224598 * https://bugzilla.suse.com/show_bug.cgi?id=1224600 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224602 * https://bugzilla.suse.com/show_bug.cgi?id=1224603 * https://bugzilla.suse.com/show_bug.cgi?id=1224605 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224608 * https://bugzilla.suse.com/show_bug.cgi?id=1224609 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224613 * https://bugzilla.suse.com/show_bug.cgi?id=1224615 * https://bugzilla.suse.com/show_bug.cgi?id=1224617 * https://bugzilla.suse.com/show_bug.cgi?id=1224618 * https://bugzilla.suse.com/show_bug.cgi?id=1224620 * https://bugzilla.suse.com/show_bug.cgi?id=1224621 * https://bugzilla.suse.com/show_bug.cgi?id=1224622 * https://bugzilla.suse.com/show_bug.cgi?id=1224623 * https://bugzilla.suse.com/show_bug.cgi?id=1224624 * https://bugzilla.suse.com/show_bug.cgi?id=1224626 * https://bugzilla.suse.com/show_bug.cgi?id=1224627 * https://bugzilla.suse.com/show_bug.cgi?id=1224628 * https://bugzilla.suse.com/show_bug.cgi?id=1224629 * https://bugzilla.suse.com/show_bug.cgi?id=1224630 * https://bugzilla.suse.com/show_bug.cgi?id=1224632 * https://bugzilla.suse.com/show_bug.cgi?id=1224633 * https://bugzilla.suse.com/show_bug.cgi?id=1224634 * https://bugzilla.suse.com/show_bug.cgi?id=1224636 * https://bugzilla.suse.com/show_bug.cgi?id=1224637 * https://bugzilla.suse.com/show_bug.cgi?id=1224638 * https://bugzilla.suse.com/show_bug.cgi?id=1224639 * https://bugzilla.suse.com/show_bug.cgi?id=1224640 * https://bugzilla.suse.com/show_bug.cgi?id=1224643 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224645 * https://bugzilla.suse.com/show_bug.cgi?id=1224646 * https://bugzilla.suse.com/show_bug.cgi?id=1224647 * https://bugzilla.suse.com/show_bug.cgi?id=1224648 * https://bugzilla.suse.com/show_bug.cgi?id=1224649 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224651 * https://bugzilla.suse.com/show_bug.cgi?id=1224652 * https://bugzilla.suse.com/show_bug.cgi?id=1224653 * https://bugzilla.suse.com/show_bug.cgi?id=1224654 * https://bugzilla.suse.com/show_bug.cgi?id=1224657 * https://bugzilla.suse.com/show_bug.cgi?id=1224660 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224664 * https://bugzilla.suse.com/show_bug.cgi?id=1224665 * https://bugzilla.suse.com/show_bug.cgi?id=1224666 * https://bugzilla.suse.com/show_bug.cgi?id=1224667 * https://bugzilla.suse.com/show_bug.cgi?id=1224668 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224672 * https://bugzilla.suse.com/show_bug.cgi?id=1224674 * https://bugzilla.suse.com/show_bug.cgi?id=1224675 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224677 * https://bugzilla.suse.com/show_bug.cgi?id=1224678 * https://bugzilla.suse.com/show_bug.cgi?id=1224679 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224681 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224683 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224686 * https://bugzilla.suse.com/show_bug.cgi?id=1224687 * https://bugzilla.suse.com/show_bug.cgi?id=1224688 * https://bugzilla.suse.com/show_bug.cgi?id=1224692 * https://bugzilla.suse.com/show_bug.cgi?id=1224696 * https://bugzilla.suse.com/show_bug.cgi?id=1224697 * https://bugzilla.suse.com/show_bug.cgi?id=1224699 * https://bugzilla.suse.com/show_bug.cgi?id=1224701 * https://bugzilla.suse.com/show_bug.cgi?id=1224703 * https://bugzilla.suse.com/show_bug.cgi?id=1224704 * https://bugzilla.suse.com/show_bug.cgi?id=1224705 * https://bugzilla.suse.com/show_bug.cgi?id=1224706 * https://bugzilla.suse.com/show_bug.cgi?id=1224707 * https://bugzilla.suse.com/show_bug.cgi?id=1224709 * https://bugzilla.suse.com/show_bug.cgi?id=1224710 * https://bugzilla.suse.com/show_bug.cgi?id=1224712 * https://bugzilla.suse.com/show_bug.cgi?id=1224714 * https://bugzilla.suse.com/show_bug.cgi?id=1224716 * https://bugzilla.suse.com/show_bug.cgi?id=1224717 * https://bugzilla.suse.com/show_bug.cgi?id=1224718 * https://bugzilla.suse.com/show_bug.cgi?id=1224719 * https://bugzilla.suse.com/show_bug.cgi?id=1224720 * https://bugzilla.suse.com/show_bug.cgi?id=1224721 * https://bugzilla.suse.com/show_bug.cgi?id=1224722 * https://bugzilla.suse.com/show_bug.cgi?id=1224723 * https://bugzilla.suse.com/show_bug.cgi?id=1224725 * https://bugzilla.suse.com/show_bug.cgi?id=1224727 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224729 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224731 * https://bugzilla.suse.com/show_bug.cgi?id=1224732 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224739 * https://bugzilla.suse.com/show_bug.cgi?id=1224740 * https://bugzilla.suse.com/show_bug.cgi?id=1224741 * https://bugzilla.suse.com/show_bug.cgi?id=1224742 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224763 * https://bugzilla.suse.com/show_bug.cgi?id=1224764 * https://bugzilla.suse.com/show_bug.cgi?id=1224765 * https://bugzilla.suse.com/show_bug.cgi?id=1224766 * https://bugzilla.suse.com/show_bug.cgi?id=1224790 * https://bugzilla.suse.com/show_bug.cgi?id=1224792 * https://bugzilla.suse.com/show_bug.cgi?id=1224793 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224804 * https://bugzilla.suse.com/show_bug.cgi?id=1224866 * https://bugzilla.suse.com/show_bug.cgi?id=1224936 * https://bugzilla.suse.com/show_bug.cgi?id=1224989 * https://bugzilla.suse.com/show_bug.cgi?id=1225007 * https://bugzilla.suse.com/show_bug.cgi?id=1225053 * https://bugzilla.suse.com/show_bug.cgi?id=1225133 * https://bugzilla.suse.com/show_bug.cgi?id=1225134 * https://bugzilla.suse.com/show_bug.cgi?id=1225136 * https://bugzilla.suse.com/show_bug.cgi?id=1225172 * https://bugzilla.suse.com/show_bug.cgi?id=1225502 * https://bugzilla.suse.com/show_bug.cgi?id=1225578 * https://bugzilla.suse.com/show_bug.cgi?id=1225579 * https://bugzilla.suse.com/show_bug.cgi?id=1225580 * https://bugzilla.suse.com/show_bug.cgi?id=1225593 * https://bugzilla.suse.com/show_bug.cgi?id=1225605 * https://bugzilla.suse.com/show_bug.cgi?id=1225607 * https://bugzilla.suse.com/show_bug.cgi?id=1225610 * https://bugzilla.suse.com/show_bug.cgi?id=1225616 * https://bugzilla.suse.com/show_bug.cgi?id=1225618 * https://bugzilla.suse.com/show_bug.cgi?id=1225640 * https://bugzilla.suse.com/show_bug.cgi?id=1225642 * https://bugzilla.suse.com/show_bug.cgi?id=1225692 * https://bugzilla.suse.com/show_bug.cgi?id=1225694 * https://bugzilla.suse.com/show_bug.cgi?id=1225695 * https://bugzilla.suse.com/show_bug.cgi?id=1225696 * https://bugzilla.suse.com/show_bug.cgi?id=1225698 * https://bugzilla.suse.com/show_bug.cgi?id=1225699 * https://bugzilla.suse.com/show_bug.cgi?id=1225704 * https://bugzilla.suse.com/show_bug.cgi?id=1225705 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225710 * https://bugzilla.suse.com/show_bug.cgi?id=1225712 * https://bugzilla.suse.com/show_bug.cgi?id=1225714 * https://bugzilla.suse.com/show_bug.cgi?id=1225715 * https://bugzilla.suse.com/show_bug.cgi?id=1225720 * https://bugzilla.suse.com/show_bug.cgi?id=1225722 * https://bugzilla.suse.com/show_bug.cgi?id=1225728 * https://bugzilla.suse.com/show_bug.cgi?id=1225734 * https://bugzilla.suse.com/show_bug.cgi?id=1225735 * https://bugzilla.suse.com/show_bug.cgi?id=1225736 * https://bugzilla.suse.com/show_bug.cgi?id=1225747 * https://bugzilla.suse.com/show_bug.cgi?id=1225748 * https://bugzilla.suse.com/show_bug.cgi?id=1225749 * https://bugzilla.suse.com/show_bug.cgi?id=1225750 * https://bugzilla.suse.com/show_bug.cgi?id=1225756 * https://bugzilla.suse.com/show_bug.cgi?id=1225765 * https://bugzilla.suse.com/show_bug.cgi?id=1225766 * https://bugzilla.suse.com/show_bug.cgi?id=1225769 * https://bugzilla.suse.com/show_bug.cgi?id=1225773 * https://bugzilla.suse.com/show_bug.cgi?id=1225775 * https://bugzilla.suse.com/show_bug.cgi?id=1225842 * https://bugzilla.suse.com/show_bug.cgi?id=1225945 * https://jira.suse.com/browse/PED-3184 * https://jira.suse.com/browse/PED-3311 * https://jira.suse.com/browse/PED-3535 * https://jira.suse.com/browse/PED-4486 * https://jira.suse.com/browse/PED-4593 * https://jira.suse.com/browse/PED-5062 * https://jira.suse.com/browse/PED-542 * https://jira.suse.com/browse/PED-5728 * https://jira.suse.com/browse/PED-5853 * https://jira.suse.com/browse/PED-6079 * https://jira.suse.com/browse/PED-6252 * https://jira.suse.com/browse/PED-7542 * https://jira.suse.com/browse/PED-7619 * https://jira.suse.com/browse/PED-8111 * https://jira.suse.com/browse/PED-8240 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 12:32:22 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 12:32:22 -0000 Subject: SUSE-RU-2024:2118-1: moderate: Recommended update for rpmlint Message-ID: <171897314221.32296.3685205303976899606@smelt2.prg2.suse.org> # Recommended update for rpmlint Announcement ID: SUSE-RU-2024:2118-1 Rating: moderate References: * bsc#1225343 Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for rpmlint fixes the following issues: * Support python >= 3.7 pyc parsing. (bsc#1225343) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2118=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2118=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2118=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2118=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2118=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2118=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2118=1 openSUSE-SLE-15.5-2024-2118=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2118=1 openSUSE-SLE-15.6-2024-2118=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2118=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2118=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2118=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2118=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2118=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2118=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2118=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2118=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2118=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2118=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * rpmlint-1.10-150000.7.87.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * rpmlint-mini-debugsource-1.10-150200.13.13.3 * rpmlint-mini-1.10-150200.13.13.3 * rpmlint-mini-debuginfo-1.10-150200.13.13.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * rpmlint-1.10-150000.7.87.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * rpmlint-mini-1.10-150300.18.19.2 * rpmlint-mini-debuginfo-1.10-150300.18.19.2 * rpmlint-mini-debugsource-1.10-150300.18.19.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * rpmlint-1.10-150000.7.87.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * rpmlint-mini-debuginfo-1.10-150400.23.22.5 * rpmlint-mini-1.10-150400.23.22.5 * rpmlint-mini-debugsource-1.10-150400.23.22.5 * SUSE Enterprise Storage 7.1 (noarch) * rpmlint-1.10-150000.7.87.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * rpmlint-mini-1.10-150300.18.19.2 * rpmlint-mini-debuginfo-1.10-150300.18.19.2 * rpmlint-mini-debugsource-1.10-150300.18.19.2 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * rpmlint-mini-1.10-150300.18.19.2 * rpmlint-mini-debuginfo-1.10-150300.18.19.2 * rpmlint-mini-debugsource-1.10-150300.18.19.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * rpmlint-mini-debuginfo-1.10-150400.23.22.5 * rpmlint-mini-1.10-150400.23.22.5 * rpmlint-mini-debugsource-1.10-150400.23.22.5 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * rpmlint-mini-1.10-150500.26.7.3 * rpmlint-mini-debuginfo-1.10-150500.26.7.3 * rpmlint-mini-debugsource-1.10-150500.26.7.3 * openSUSE Leap 15.5 (noarch) * rpmlint-1.10-150000.7.87.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * rpmlint-mini-debuginfo-1.10-150600.31.2.2 * rpmlint-mini-1.10-150600.31.2.2 * rpmlint-mini-debugsource-1.10-150600.31.2.2 * openSUSE Leap 15.6 (noarch) * rpmlint-1.10-150000.7.87.1 * Development Tools Module 15-SP5 (noarch) * rpmlint-1.10-150000.7.87.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rpmlint-mini-1.10-150500.26.7.3 * rpmlint-mini-debuginfo-1.10-150500.26.7.3 * rpmlint-mini-debugsource-1.10-150500.26.7.3 * Development Tools Module 15-SP6 (noarch) * rpmlint-1.10-150000.7.87.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * rpmlint-mini-debuginfo-1.10-150600.31.2.2 * rpmlint-mini-1.10-150600.31.2.2 * rpmlint-mini-debugsource-1.10-150600.31.2.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * rpmlint-1.10-150000.7.87.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * rpmlint-mini-debugsource-1.10-150200.13.13.3 * rpmlint-mini-1.10-150200.13.13.3 * rpmlint-mini-debuginfo-1.10-150200.13.13.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * rpmlint-1.10-150000.7.87.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * rpmlint-mini-1.10-150300.18.19.2 * rpmlint-mini-debuginfo-1.10-150300.18.19.2 * rpmlint-mini-debugsource-1.10-150300.18.19.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * rpmlint-1.10-150000.7.87.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * rpmlint-mini-debuginfo-1.10-150400.23.22.5 * rpmlint-mini-1.10-150400.23.22.5 * rpmlint-mini-debugsource-1.10-150400.23.22.5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * rpmlint-1.10-150000.7.87.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * rpmlint-mini-debuginfo-1.10-150400.23.22.5 * rpmlint-mini-1.10-150400.23.22.5 * rpmlint-mini-debugsource-1.10-150400.23.22.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * rpmlint-1.10-150000.7.87.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * rpmlint-mini-debuginfo-1.10-150400.23.22.5 * rpmlint-mini-1.10-150400.23.22.5 * rpmlint-mini-debugsource-1.10-150400.23.22.5 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * rpmlint-1.10-150000.7.87.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * rpmlint-mini-debugsource-1.10-150200.13.13.3 * rpmlint-mini-1.10-150200.13.13.3 * rpmlint-mini-debuginfo-1.10-150200.13.13.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * rpmlint-1.10-150000.7.87.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * rpmlint-mini-1.10-150300.18.19.2 * rpmlint-mini-debuginfo-1.10-150300.18.19.2 * rpmlint-mini-debugsource-1.10-150300.18.19.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * rpmlint-1.10-150000.7.87.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * rpmlint-mini-debuginfo-1.10-150400.23.22.5 * rpmlint-mini-1.10-150400.23.22.5 * rpmlint-mini-debugsource-1.10-150400.23.22.5 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1225343 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:03 -0000 Subject: SUSE-SU-2024:2163-1: important: Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) Message-ID: <171898740323.4399.3095684228200970120@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:2163-1 Rating: important References: * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1222882 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2022-48651 * CVE-2023-52502 * CVE-2023-6546 * CVE-2024-26610 * CVE-2024-26766 * CVE-2024-26852 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves six vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_111 fixes several issues. The following security issues were fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2163=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2163=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_111-default-3-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-3-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_24-debugsource-3-150400.9.6.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_111-default-3-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-3-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_24-debugsource-3-150400.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:07 -0000 Subject: SUSE-SU-2024:2162-1: important: Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4) Message-ID: <171898740749.4399.18432948333726186447@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:2162-1 Rating: important References: * bsc#1219296 * bsc#1220211 * bsc#1220828 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1222882 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2022-48651 * CVE-2023-52340 * CVE-2023-52502 * CVE-2023-6546 * CVE-2024-26585 * CVE-2024-26610 * CVE-2024-26622 * CVE-2024-26766 * CVE-2024-26852 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves nine vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_108 fixes several issues. The following security issues were fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220211). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828). * CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big' packets (bsc#1219296). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2162=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2162=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-5-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_108-default-5-150400.9.8.1 * kernel-livepatch-SLE15-SP4_Update_23-debugsource-5-150400.9.8.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-5-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_108-default-5-150400.9.8.1 * kernel-livepatch-SLE15-SP4_Update_23-debugsource-5-150400.9.8.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-52340.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-26585.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26622.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1219296 * https://bugzilla.suse.com/show_bug.cgi?id=1220211 * https://bugzilla.suse.com/show_bug.cgi?id=1220828 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:09 -0000 Subject: SUSE-SU-2024:2160-1: important: Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4) Message-ID: <171898740942.4399.15182081054686861570@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:2160-1 Rating: important References: * bsc#1223059 Cross-References: * CVE-2024-26852 CVSS scores: * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_103 fixes one issue. The following security issue was fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2160=1 SUSE-SLE- Module-Live-Patching-15-SP4-2024-2161=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2161=1 SUSE-2024-2160=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_20-debugsource-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_22-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-8-150400.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_20-debugsource-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_22-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-8-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:11 -0000 Subject: SUSE-SU-2024:2156-1: important: Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP4) Message-ID: <171898741156.4399.8567267083128756357@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:2156-1 Rating: important References: * bsc#1222118 * bsc#1223059 Cross-References: * CVE-2023-52628 * CVE-2024-26852 CVSS scores: * CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_88 fixes several issues. The following security issues were fixed: * CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222118). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2157=1 SUSE-2024-2158=1 SUSE-2024-2159=1 SUSE-2024-2156=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2156=1 SUSE-SLE- Module-Live-Patching-15-SP4-2024-2157=1 SUSE-SLE-Module-Live- Patching-15-SP4-2024-2158=1 SUSE-SLE-Module-Live-Patching-15-SP4-2024-2159=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_18-debugsource-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_14-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_66-default-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_88-default-debuginfo-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_69-default-debuginfo-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_66-default-debuginfo-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_88-default-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_81-default-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_81-default-debuginfo-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_13-debugsource-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_69-default-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_16-debugsource-11-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_18-debugsource-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_14-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_66-default-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_88-default-debuginfo-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_69-default-debuginfo-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_66-default-debuginfo-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_88-default-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_81-default-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_81-default-debuginfo-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_13-debugsource-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_69-default-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_16-debugsource-11-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52628.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1222118 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:16 -0000 Subject: SUSE-SU-2024:2149-1: important: Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) Message-ID: <171898741632.4399.3506206448143632948@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:2149-1 Rating: important References: * bsc#1210619 Cross-References: * CVE-2023-1829 CVSS scores: * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_161 fixes one issue. The following security issue was fixed: * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-2149=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2150=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2150=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_191-default-2-150200.5.6.2 * kernel-livepatch-5_3_18-150200_24_191-default-debuginfo-2-150200.5.6.2 * kernel-livepatch-SLE15-SP2_Update_48-debugsource-2-150200.5.6.2 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_161-default-2-150300.7.6.2 * kernel-livepatch-SLE15-SP3_Update_44-debugsource-2-150300.7.6.2 * kernel-livepatch-5_3_18-150300_59_161-default-debuginfo-2-150300.7.6.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_161-preempt-2-150300.7.6.2 * kernel-livepatch-5_3_18-150300_59_161-preempt-debuginfo-2-150300.7.6.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_161-default-2-150300.7.6.2 ## References: * https://www.suse.com/security/cve/CVE-2023-1829.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:19 -0000 Subject: SUSE-SU-2024:2148-1: important: Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3) Message-ID: <171898741907.4399.3473291144777024259@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:2148-1 Rating: important References: * bsc#1210619 * bsc#1218487 * bsc#1220537 * bsc#1221302 * bsc#1222685 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2021-46955 * CVE-2022-48651 * CVE-2023-1829 * CVE-2023-6531 * CVE-2023-6546 * CVE-2024-26610 * CVE-2024-26852 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves seven vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_153 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218487). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2148=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2148=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_153-default-4-150300.7.6.2 * kernel-livepatch-5_3_18-150300_59_153-default-debuginfo-4-150300.7.6.2 * kernel-livepatch-SLE15-SP3_Update_42-debugsource-4-150300.7.6.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_153-preempt-4-150300.7.6.2 * kernel-livepatch-5_3_18-150300_59_153-preempt-debuginfo-4-150300.7.6.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_153-default-4-150300.7.6.2 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1218487 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:21 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:21 -0000 Subject: SUSE-SU-2024:2147-1: important: Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) Message-ID: <171898742116.4399.6250881822222268926@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:2147-1 Rating: important References: * bsc#1210619 * bsc#1220537 Cross-References: * CVE-2021-46955 * CVE-2023-1829 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_216 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-2147=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_216-default-2-8.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:24 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:24 -0000 Subject: SUSE-SU-2024:2145-1: important: Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3) Message-ID: <171898742459.4399.10705942333237273497@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:2145-1 Rating: important References: * bsc#1218259 * bsc#1220537 * bsc#1223059 Cross-References: * CVE-2021-46955 * CVE-2023-6931 * CVE-2024-26852 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_144 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218259). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2145=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2145=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_144-default-8-150300.2.2 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_39-debugsource-8-150300.2.2 * kernel-livepatch-5_3_18-150300_59_144-default-debuginfo-8-150300.2.2 * kernel-livepatch-5_3_18-150300_59_144-default-8-150300.2.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_144-preempt-8-150300.2.2 * kernel-livepatch-5_3_18-150300_59_144-preempt-debuginfo-8-150300.2.2 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1218259 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:38 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:38 -0000 Subject: SUSE-SU-2024:2143-1: important: Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) Message-ID: <171898743821.4399.12016896249784643023@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:2143-1 Rating: important References: * bsc#1220537 * bsc#1223059 Cross-References: * CVE-2021-46955 * CVE-2024-26852 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_150 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2144=1 SUSE-2024-2141=1 SUSE-2024-2146=1 SUSE-2024-2143=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2143=1 SUSE-SLE- Module-Live-Patching-15-SP3-2024-2144=1 SUSE-SLE-Module-Live- Patching-15-SP3-2024-2141=1 SUSE-SLE-Module-Live-Patching-15-SP3-2024-2146=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_141-default-9-150300.2.2 * kernel-livepatch-5_3_18-150300_59_138-default-debuginfo-10-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_37-debugsource-10-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_38-debugsource-9-150300.2.2 * kernel-livepatch-5_3_18-150300_59_150-default-7-150300.2.2 * kernel-livepatch-5_3_18-150300_59_141-default-debuginfo-9-150300.2.2 * kernel-livepatch-5_3_18-150300_59_150-default-debuginfo-7-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_41-debugsource-7-150300.2.2 * kernel-livepatch-5_3_18-150300_59_147-default-debuginfo-8-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_40-debugsource-8-150300.2.2 * kernel-livepatch-5_3_18-150300_59_138-default-10-150300.2.2 * kernel-livepatch-5_3_18-150300_59_147-default-8-150300.2.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_141-preempt-9-150300.2.2 * kernel-livepatch-5_3_18-150300_59_141-preempt-debuginfo-9-150300.2.2 * kernel-livepatch-5_3_18-150300_59_147-preempt-debuginfo-8-150300.2.2 * kernel-livepatch-5_3_18-150300_59_147-preempt-8-150300.2.2 * kernel-livepatch-5_3_18-150300_59_138-preempt-debuginfo-10-150300.2.2 * kernel-livepatch-5_3_18-150300_59_150-preempt-7-150300.2.2 * kernel-livepatch-5_3_18-150300_59_150-preempt-debuginfo-7-150300.2.2 * kernel-livepatch-5_3_18-150300_59_138-preempt-10-150300.2.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_141-default-9-150300.2.2 * kernel-livepatch-5_3_18-150300_59_138-default-10-150300.2.2 * kernel-livepatch-5_3_18-150300_59_150-default-7-150300.2.2 * kernel-livepatch-5_3_18-150300_59_147-default-8-150300.2.2 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:40 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:40 -0000 Subject: SUSE-RU-2024:2155-1: moderate: Recommended update for libserf Message-ID: <171898744074.4399.640685111579172840@smelt2.prg2.suse.org> # Recommended update for libserf Announcement ID: SUSE-RU-2024:2155-1 Rating: moderate References: * bsc#1221211 * bsc#1222854 * bsc#1224089 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has three fixes can now be installed. ## Description: This update for libserf fixes the following issues: * The following bugs were affecting SLE but not Tumbleweed: * Fix build with openSSL 3 by removing usage of ERR_GET_FUNC (bsc#1221211) * Fix hanging in subversion by updating libserf (bsc#1224089, bsc#1222854) * general update with these fixes: * Fix handling of invalid chunk lengths in the dechunk bucket * Fix an endless loop in the deflate bucket with truncated input * Fix BIO control handlers to support BIO_CTRL_EOF * Fix a CRT mismatch issue caused by using certain OpenSSL functions * dropping upstream patches * fix Leap 15.4/15.4 build with krb5 GSSAPI * remove superfluous build dependencies * add patch to avoid using removed functionality in an irrelvant place * Autodetect krb5/mit prefix using krb5-config: prepare for future changes on krb5 packaging. * Use %license for license install ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2155=1 openSUSE-SLE-15.6-2024-2155=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2155=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libserf-debugsource-1.3.10-150600.18.8.2 * libserf-1-1-1.3.10-150600.18.8.2 * libserf-devel-1.3.10-150600.18.8.2 * libserf-1-1-debuginfo-1.3.10-150600.18.8.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libserf-debugsource-1.3.10-150600.18.8.2 * libserf-1-1-1.3.10-150600.18.8.2 * libserf-devel-1.3.10-150600.18.8.2 * libserf-1-1-debuginfo-1.3.10-150600.18.8.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221211 * https://bugzilla.suse.com/show_bug.cgi?id=1222854 * https://bugzilla.suse.com/show_bug.cgi?id=1224089 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:49 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:49 -0000 Subject: SUSE-SU-2024:2152-1: important: Security update for vte Message-ID: <171898744917.4399.11505628666175503303@smelt2.prg2.suse.org> # Security update for vte Announcement ID: SUSE-SU-2024:2152-1 Rating: important References: * bsc#1226134 Cross-References: * CVE-2024-37535 CVSS scores: * CVE-2024-37535 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for vte fixes the following issues: * CVE-2024-37535: Fixed a bug that allowed an attacker to cause a denial of service (memory consumption) via a window resize escape. (bsc#1226134) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2152=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2152=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2152=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2152=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2152=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2152=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2152=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * typelib-1_0-Vte-2.91-0.58.3-150200.3.3.1 * vte-devel-0.58.3-150200.3.3.1 * libvte-2_91-0-0.58.3-150200.3.3.1 * vte-debuginfo-0.58.3-150200.3.3.1 * vte-debugsource-0.58.3-150200.3.3.1 * libvte-2_91-0-debuginfo-0.58.3-150200.3.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * vte-lang-0.58.3-150200.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * typelib-1_0-Vte-2.91-0.58.3-150200.3.3.1 * vte-devel-0.58.3-150200.3.3.1 * libvte-2_91-0-0.58.3-150200.3.3.1 * vte-debuginfo-0.58.3-150200.3.3.1 * vte-debugsource-0.58.3-150200.3.3.1 * libvte-2_91-0-debuginfo-0.58.3-150200.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * vte-lang-0.58.3-150200.3.3.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * typelib-1_0-Vte-2.91-0.58.3-150200.3.3.1 * vte-devel-0.58.3-150200.3.3.1 * libvte-2_91-0-0.58.3-150200.3.3.1 * vte-debuginfo-0.58.3-150200.3.3.1 * vte-debugsource-0.58.3-150200.3.3.1 * libvte-2_91-0-debuginfo-0.58.3-150200.3.3.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * vte-lang-0.58.3-150200.3.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * typelib-1_0-Vte-2.91-0.58.3-150200.3.3.1 * vte-devel-0.58.3-150200.3.3.1 * libvte-2_91-0-0.58.3-150200.3.3.1 * vte-debuginfo-0.58.3-150200.3.3.1 * vte-debugsource-0.58.3-150200.3.3.1 * libvte-2_91-0-debuginfo-0.58.3-150200.3.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * vte-lang-0.58.3-150200.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * typelib-1_0-Vte-2.91-0.58.3-150200.3.3.1 * vte-devel-0.58.3-150200.3.3.1 * libvte-2_91-0-0.58.3-150200.3.3.1 * vte-debuginfo-0.58.3-150200.3.3.1 * vte-debugsource-0.58.3-150200.3.3.1 * libvte-2_91-0-debuginfo-0.58.3-150200.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * vte-lang-0.58.3-150200.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * typelib-1_0-Vte-2.91-0.58.3-150200.3.3.1 * vte-devel-0.58.3-150200.3.3.1 * libvte-2_91-0-0.58.3-150200.3.3.1 * vte-debuginfo-0.58.3-150200.3.3.1 * vte-debugsource-0.58.3-150200.3.3.1 * libvte-2_91-0-debuginfo-0.58.3-150200.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * vte-lang-0.58.3-150200.3.3.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * typelib-1_0-Vte-2.91-0.58.3-150200.3.3.1 * vte-devel-0.58.3-150200.3.3.1 * libvte-2_91-0-0.58.3-150200.3.3.1 * vte-debuginfo-0.58.3-150200.3.3.1 * vte-debugsource-0.58.3-150200.3.3.1 * libvte-2_91-0-debuginfo-0.58.3-150200.3.3.1 * SUSE Enterprise Storage 7.1 (noarch) * vte-lang-0.58.3-150200.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-37535.html * https://bugzilla.suse.com/show_bug.cgi?id=1226134 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:43 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:43 -0000 Subject: SUSE-SU-2024:2154-1: moderate: Security update for wget Message-ID: <171898744365.4399.903714708877585144@smelt2.prg2.suse.org> # Security update for wget Announcement ID: SUSE-SU-2024:2154-1 Rating: moderate References: * bsc#1226419 Cross-References: * CVE-2024-38428 CVSS scores: * CVE-2024-38428 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for wget fixes the following issues: * CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a URI. (bsc#1226419) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2154=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2154=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2154=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * wget-debuginfo-1.14-21.19.1 * wget-debugsource-1.14-21.19.1 * wget-1.14-21.19.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * wget-debuginfo-1.14-21.19.1 * wget-debugsource-1.14-21.19.1 * wget-1.14-21.19.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * wget-debuginfo-1.14-21.19.1 * wget-debugsource-1.14-21.19.1 * wget-1.14-21.19.1 ## References: * https://www.suse.com/security/cve/CVE-2024-38428.html * https://bugzilla.suse.com/show_bug.cgi?id=1226419 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:46 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:46 -0000 Subject: SUSE-SU-2024:2153-1: important: Security update for vte Message-ID: <171898744628.4399.11679894533423821503@smelt2.prg2.suse.org> # Security update for vte Announcement ID: SUSE-SU-2024:2153-1 Rating: important References: * bsc#1226134 Cross-References: * CVE-2024-37535 CVSS scores: * CVE-2024-37535 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for vte fixes the following issues: * CVE-2024-37535: Fixed a bug that allowed an attacker to cause a denial of service (memory consumption) via a window resize escape. (bsc#1226134) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2153=1 SUSE-2024-2153=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2153=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2153=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-Vte-3_91-0.74.2-150600.3.3.1 * typelib-1_0-Vte-2_91-0.74.2-150600.3.3.1 * libvte-2_91-0-0.74.2-150600.3.3.1 * vte-tools-gtk4-0.74.2-150600.3.3.1 * vte-devel-0.74.2-150600.3.3.1 * vte-tools-0.74.2-150600.3.3.1 * libvte-2_91-0-debuginfo-0.74.2-150600.3.3.1 * vte-debuginfo-0.74.2-150600.3.3.1 * vte-tools-debuginfo-0.74.2-150600.3.3.1 * vte-tools-gtk4-debuginfo-0.74.2-150600.3.3.1 * vte-debugsource-0.74.2-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * vte-lang-0.74.2-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * typelib-1_0-Vte-2_91-0.74.2-150600.3.3.1 * libvte-2_91-0-0.74.2-150600.3.3.1 * libvte-2_91-0-debuginfo-0.74.2-150600.3.3.1 * vte-debuginfo-0.74.2-150600.3.3.1 * vte-debugsource-0.74.2-150600.3.3.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * vte-debuginfo-0.74.2-150600.3.3.1 * vte-devel-0.74.2-150600.3.3.1 * typelib-1_0-Vte-3_91-0.74.2-150600.3.3.1 * vte-debugsource-0.74.2-150600.3.3.1 * Desktop Applications Module 15-SP6 (noarch) * vte-lang-0.74.2-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-37535.html * https://bugzilla.suse.com/show_bug.cgi?id=1226134 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:51 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:51 -0000 Subject: SUSE-SU-2024:2151-1: important: Security update for vte Message-ID: <171898745190.4399.7660317120061173137@smelt2.prg2.suse.org> # Security update for vte Announcement ID: SUSE-SU-2024:2151-1 Rating: important References: * bsc#1226134 Cross-References: * CVE-2024-37535 CVSS scores: * CVE-2024-37535 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for vte fixes the following issues: * CVE-2024-37535: Fixed a bug that allowed an attacker to cause a denial of service (memory consumption) via a window resize escape. (bsc#1226134) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2151=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2151=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2151=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2151=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * vte-debugsource-0.44.2-9.6.1 * vte-devel-0.44.2-9.6.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * typelib-1_0-Vte-2.91-0.44.2-9.6.1 * vte-debugsource-0.44.2-9.6.1 * libvte-2_91-0-0.44.2-9.6.1 * libvte-2_91-0-debuginfo-0.44.2-9.6.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * vte-lang-0.44.2-9.6.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * typelib-1_0-Vte-2.91-0.44.2-9.6.1 * vte-debugsource-0.44.2-9.6.1 * libvte-2_91-0-0.44.2-9.6.1 * libvte-2_91-0-debuginfo-0.44.2-9.6.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * vte-lang-0.44.2-9.6.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * typelib-1_0-Vte-2.91-0.44.2-9.6.1 * vte-debugsource-0.44.2-9.6.1 * libvte-2_91-0-0.44.2-9.6.1 * libvte-2_91-0-debuginfo-0.44.2-9.6.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * vte-lang-0.44.2-9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-37535.html * https://bugzilla.suse.com/show_bug.cgi?id=1226134 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 16:30:53 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 16:30:53 -0000 Subject: SUSE-RU-2024:2142-1: moderate: Recommended update for scap-security-guide Message-ID: <171898745350.4399.14409832166963619032@smelt2.prg2.suse.org> # Recommended update for scap-security-guide Announcement ID: SUSE-RU-2024:2142-1 Rating: moderate References: * jsc#ECO-3319 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for scap-security-guide fixes the following issues: scap-security-guid was updated to 0.1.73 (jsc#ECO-3319) * CMP 2417: Implement PCI-DSS v4.0 outline for OpenShift (#11651) * Update all RHEL ANSSI BP028 profiles to be aligned with configuration recommendations version 2.0 * Generate rule references from control files (#11540) * Initial implementation of STIG V1R1 profile for Ubuntu 22.04 LTS (#11820) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2142=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2142=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2142=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2142=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2142=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2142=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2142=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2142=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-2142=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2142=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2142=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2142=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2142=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2142=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2142=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2142=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2142=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2142=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2142=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2142=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Manager Proxy 4.3 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Manager Server 4.3 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Enterprise Storage 7.1 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * openSUSE Leap 15.5 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * openSUSE Leap 15.6 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * Basesystem Module 15-SP5 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * Basesystem Module 15-SP6 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * scap-security-guide-0.1.73-150000.1.81.1 * scap-security-guide-ubuntu-0.1.73-150000.1.81.1 * scap-security-guide-redhat-0.1.73-150000.1.81.1 * scap-security-guide-debian-0.1.73-150000.1.81.1 ## References: * https://jira.suse.com/browse/ECO-3319 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 20:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 20:30:03 -0000 Subject: SUSE-SU-2024:2166-1: important: Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4) Message-ID: <171900180369.10223.16515161384005198206@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:2166-1 Rating: important References: * bsc#1218259 * bsc#1223059 Cross-References: * CVE-2023-6931 * CVE-2024-26852 CVSS scores: * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_100 fixes several issues. The following security issues were fixed: * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218259). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2166=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2166=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_21-debugsource-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-8-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_21-debugsource-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-8-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1218259 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 20:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 20:30:05 -0000 Subject: SUSE-SU-2024:2165-1: important: Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) Message-ID: <171900180546.10223.5810208154843626752@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:2165-1 Rating: important References: * bsc#1223059 Cross-References: * CVE-2024-26852 CVSS scores: * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_119 fixes one issue. The following security issue was fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2165=1 SUSE-2024-2167=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2165=1 SUSE-SLE- Module-Live-Patching-15-SP4-2024-2167=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_26-debugsource-2-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_119-default-2-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_92-default-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-2-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_19-debugsource-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_92-default-debuginfo-9-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_26-debugsource-2-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_119-default-2-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_92-default-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-2-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_19-debugsource-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_92-default-debuginfo-9-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 21 20:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 21 Jun 2024 20:30:07 -0000 Subject: SUSE-SU-2024:2164-1: important: Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP4) Message-ID: <171900180745.10223.17327014580526987941@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:2164-1 Rating: important References: * bsc#1222118 * bsc#1223059 Cross-References: * CVE-2023-52628 * CVE-2024-26852 CVSS scores: * CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_74 fixes several issues. The following security issues were fixed: * CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222118). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2164=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2164=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_15-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_74-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_74-default-debuginfo-12-150400.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_15-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_74-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_74-default-debuginfo-12-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52628.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1222118 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 08:30:50 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 08:30:50 -0000 Subject: SUSE-RU-2024:2176-1: moderate: Recommended update for grpc, libzypp, protobuf, python-grpcio. re2, zypper Message-ID: <171921785088.17454.15439613025813664051@smelt2.prg2.suse.org> # Recommended update for grpc, libzypp, protobuf, python-grpcio. re2, zypper Announcement ID: SUSE-RU-2024:2176-1 Rating: moderate References: * bsc#1222261 * bsc#1222343 * bsc#1222348 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * Public Cloud Module 15-SP5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Package Hub 15 15-SP5 An update that has three fixes can now be installed. ## Description: This update for grpc, libzypp, protobuf, python-grpcio, re2, zypper fixes the following issues: * rebuild packages using protobuf against newer protobuf and abseil-cpp libraries. (bsc#1222261) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2176=1 openSUSE-SLE-15.5-2024-2176=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-2176=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-2176=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-2176=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-2176=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2176=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2176=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2176=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2176=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2176=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2176=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2176=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-2176=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-2176=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * protobuf-debugsource-25.1-150500.12.2.2 * libphonenumber-devel-8.12.23-150500.6.2.1 * libre2-11-debuginfo-20240201-150500.12.2.1 * libgrpc37-debuginfo-1.60.0-150500.11.5.16 * libprotobuf25_1_0-25.1-150500.12.2.2 * zypper-debugsource-1.14.73-150500.6.2.1 * abseil-cpp-devel-20240116.1-150500.13.7.8 * libgrpc1_60-1.60.0-150500.11.5.16 * libupb37-1.60.0-150500.11.5.16 * re2-debugsource-20240201-150500.12.2.1 * protobuf-devel-25.1-150500.12.2.2 * libgrpc++1_60-debuginfo-1.60.0-150500.11.5.16 * protobuf-java-25.1-150500.12.2.2 * python311-grpcio-debuginfo-1.60.1-150500.12.3.16 * libgrpc1_60-debuginfo-1.60.0-150500.11.5.16 * zypper-1.14.73-150500.6.2.1 * libphonenumber8-8.12.23-150500.6.2.1 * libprotoc25_1_0-25.1-150500.12.2.2 * libzypp-17.34.1-150500.6.2.1 * libprotobuf25_1_0-debuginfo-25.1-150500.12.2.2 * re2-devel-20240201-150500.12.2.1 * libupb37-debuginfo-1.60.0-150500.11.5.16 * libzypp-debuginfo-17.34.1-150500.6.2.1 * libphonenumber8-debuginfo-8.12.23-150500.6.2.1 * libzypp-debugsource-17.34.1-150500.6.2.1 * libabsl2401_0_0-debuginfo-20240116.1-150500.13.7.8 * grpc-devel-1.60.0-150500.11.5.16 * libgrpc37-1.60.0-150500.11.5.16 * libgrpc++1_60-1.60.0-150500.11.5.16 * grpc-debuginfo-1.60.0-150500.11.5.16 * abseil-cpp-debugsource-20240116.1-150500.13.7.8 * libzypp-devel-17.34.1-150500.6.2.1 * libprotoc25_1_0-debuginfo-25.1-150500.12.2.2 * libzypp-devel-doc-17.34.1-150500.6.2.1 * libprotobuf-lite25_1_0-25.1-150500.12.2.2 * python-grpcio-debugsource-1.60.1-150500.12.3.16 * libabsl2401_0_0-20240116.1-150500.13.7.8 * grpc-debugsource-1.60.0-150500.11.5.16 * python311-protobuf-4.25.1-150500.12.2.2 * grpc-devel-debuginfo-1.60.0-150500.11.5.16 * python311-grpcio-1.60.1-150500.12.3.16 * upb-devel-1.60.0-150500.11.5.16 * libphonenumber-debugsource-8.12.23-150500.6.2.1 * libre2-11-20240201-150500.12.2.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150500.12.2.2 * protobuf-devel-debuginfo-25.1-150500.12.2.2 * zypper-debuginfo-1.14.73-150500.6.2.1 * openSUSE Leap 15.5 (x86_64) * libprotoc25_1_0-32bit-25.1-150500.12.2.2 * libabsl2401_0_0-32bit-20240116.1-150500.13.7.8 * libre2-11-32bit-20240201-150500.12.2.1 * libprotobuf25_1_0-32bit-debuginfo-25.1-150500.12.2.2 * libprotobuf-lite25_1_0-32bit-debuginfo-25.1-150500.12.2.2 * libprotobuf25_1_0-32bit-25.1-150500.12.2.2 * libre2-11-32bit-debuginfo-20240201-150500.12.2.1 * libprotoc25_1_0-32bit-debuginfo-25.1-150500.12.2.2 * libabsl2401_0_0-32bit-debuginfo-20240116.1-150500.13.7.8 * libprotobuf-lite25_1_0-32bit-25.1-150500.12.2.2 * openSUSE Leap 15.5 (noarch) * zypper-log-1.14.73-150500.6.2.1 * grpc-source-1.60.0-150500.11.5.16 * zypper-aptitude-1.14.73-150500.6.2.1 * zypper-needs-restarting-1.14.73-150500.6.2.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libprotobuf25_1_0-64bit-25.1-150500.12.2.2 * libre2-11-64bit-20240201-150500.12.2.1 * libprotobuf-lite25_1_0-64bit-debuginfo-25.1-150500.12.2.2 * libprotoc25_1_0-64bit-debuginfo-25.1-150500.12.2.2 * libprotobuf-lite25_1_0-64bit-25.1-150500.12.2.2 * libabsl2401_0_0-64bit-20240116.1-150500.13.7.8 * libre2-11-64bit-debuginfo-20240201-150500.12.2.1 * libprotobuf25_1_0-64bit-debuginfo-25.1-150500.12.2.2 * libabsl2401_0_0-64bit-debuginfo-20240116.1-150500.13.7.8 * libprotoc25_1_0-64bit-25.1-150500.12.2.2 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libzypp-17.34.1-150500.6.2.1 * libprotobuf-lite25_1_0-25.1-150500.12.2.2 * libabsl2401_0_0-20240116.1-150500.13.7.8 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libzypp-17.34.1-150500.6.2.1 * libprotobuf-lite25_1_0-25.1-150500.12.2.2 * libabsl2401_0_0-20240116.1-150500.13.7.8 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libzypp-17.34.1-150500.6.2.1 * libprotobuf-lite25_1_0-25.1-150500.12.2.2 * libabsl2401_0_0-20240116.1-150500.13.7.8 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libzypp-17.34.1-150500.6.2.1 * libprotobuf-lite25_1_0-25.1-150500.12.2.2 * libabsl2401_0_0-20240116.1-150500.13.7.8 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * abseil-cpp-debugsource-20240116.1-150500.13.7.8 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * abseil-cpp-debugsource-20240116.1-150500.13.7.8 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * protobuf-debugsource-25.1-150500.12.2.2 * libprotobuf-lite25_1_0-25.1-150500.12.2.2 * libabsl2401_0_0-20240116.1-150500.13.7.8 * libzypp-debuginfo-17.34.1-150500.6.2.1 * libzypp-debugsource-17.34.1-150500.6.2.1 * zypper-debugsource-1.14.73-150500.6.2.1 * zypper-1.14.73-150500.6.2.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150500.12.2.2 * abseil-cpp-debugsource-20240116.1-150500.13.7.8 * zypper-debuginfo-1.14.73-150500.6.2.1 * libzypp-17.34.1-150500.6.2.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * zypper-needs-restarting-1.14.73-150500.6.2.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * protobuf-debugsource-25.1-150500.12.2.2 * libre2-11-debuginfo-20240201-150500.12.2.1 * libgrpc37-debuginfo-1.60.0-150500.11.5.16 * libprotobuf25_1_0-25.1-150500.12.2.2 * zypper-debugsource-1.14.73-150500.6.2.1 * abseil-cpp-devel-20240116.1-150500.13.7.8 * libgrpc1_60-1.60.0-150500.11.5.16 * libupb37-1.60.0-150500.11.5.16 * re2-debugsource-20240201-150500.12.2.1 * libgrpc++1_60-debuginfo-1.60.0-150500.11.5.16 * libgrpc1_60-debuginfo-1.60.0-150500.11.5.16 * zypper-1.14.73-150500.6.2.1 * libprotoc25_1_0-25.1-150500.12.2.2 * libzypp-17.34.1-150500.6.2.1 * libprotobuf25_1_0-debuginfo-25.1-150500.12.2.2 * re2-devel-20240201-150500.12.2.1 * libupb37-debuginfo-1.60.0-150500.11.5.16 * libzypp-debuginfo-17.34.1-150500.6.2.1 * libzypp-debugsource-17.34.1-150500.6.2.1 * grpc-devel-1.60.0-150500.11.5.16 * libabsl2401_0_0-debuginfo-20240116.1-150500.13.7.8 * libgrpc37-1.60.0-150500.11.5.16 * libgrpc++1_60-1.60.0-150500.11.5.16 * grpc-debuginfo-1.60.0-150500.11.5.16 * abseil-cpp-debugsource-20240116.1-150500.13.7.8 * libzypp-devel-17.34.1-150500.6.2.1 * libprotoc25_1_0-debuginfo-25.1-150500.12.2.2 * libprotobuf-lite25_1_0-25.1-150500.12.2.2 * libabsl2401_0_0-20240116.1-150500.13.7.8 * grpc-debugsource-1.60.0-150500.11.5.16 * libre2-11-20240201-150500.12.2.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150500.12.2.2 * zypper-debuginfo-1.14.73-150500.6.2.1 * Basesystem Module 15-SP5 (noarch) * zypper-log-1.14.73-150500.6.2.1 * zypper-needs-restarting-1.14.73-150500.6.2.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * protobuf-debugsource-25.1-150500.12.2.2 * libabsl2401_0_0-20240116.1-150500.13.7.8 * protobuf-devel-25.1-150500.12.2.2 * libabsl2401_0_0-debuginfo-20240116.1-150500.13.7.8 * abseil-cpp-devel-20240116.1-150500.13.7.8 * protobuf-devel-debuginfo-25.1-150500.12.2.2 * libprotoc25_1_0-25.1-150500.12.2.2 * libprotoc25_1_0-debuginfo-25.1-150500.12.2.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * libabsl2401_0_0-debuginfo-20240116.1-150500.13.7.8 * libabsl2401_0_0-20240116.1-150500.13.7.8 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * protobuf-debugsource-25.1-150500.12.2.2 * libphonenumber8-8.12.23-150500.6.2.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * protobuf-debugsource-25.1-150500.12.2.2 * python-grpcio-debugsource-1.60.1-150500.12.3.16 * re2-debugsource-20240201-150500.12.2.1 * libre2-11-debuginfo-20240201-150500.12.2.1 * libupb37-debuginfo-1.60.0-150500.11.5.16 * libgrpc37-debuginfo-1.60.0-150500.11.5.16 * grpc-debugsource-1.60.0-150500.11.5.16 * python311-grpcio-1.60.1-150500.12.3.16 * libgrpc37-1.60.0-150500.11.5.16 * libre2-11-20240201-150500.12.2.1 * python311-grpcio-debuginfo-1.60.1-150500.12.3.16 * libgrpc1_60-debuginfo-1.60.0-150500.11.5.16 * libgrpc1_60-1.60.0-150500.11.5.16 * grpc-debuginfo-1.60.0-150500.11.5.16 * libprotoc25_1_0-25.1-150500.12.2.2 * libprotoc25_1_0-debuginfo-25.1-150500.12.2.2 * libupb37-1.60.0-150500.11.5.16 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-grpcio-1.60.1-150500.12.3.16 * python311-grpcio-debuginfo-1.60.1-150500.12.3.16 * python-grpcio-debugsource-1.60.1-150500.12.3.16 * python311-protobuf-4.25.1-150500.12.2.2 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * libabsl2401_0_0-20240116.1-150500.13.7.8 * libphonenumber8-debuginfo-8.12.23-150500.6.2.1 * libabsl2401_0_0-debuginfo-20240116.1-150500.13.7.8 * libphonenumber-debugsource-8.12.23-150500.6.2.1 * abseil-cpp-debugsource-20240116.1-150500.13.7.8 * libphonenumber8-8.12.23-150500.6.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222261 * https://bugzilla.suse.com/show_bug.cgi?id=1222343 * https://bugzilla.suse.com/show_bug.cgi?id=1222348 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 08:30:52 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 08:30:52 -0000 Subject: SUSE-RU-2024:2175-1: important: Recommended update for wicked Message-ID: <171921785270.17454.5056264338087914298@smelt2.prg2.suse.org> # Recommended update for wicked Announcement ID: SUSE-RU-2024:2175-1 Rating: important References: * bsc#1218668 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for wicked fixes the following issues: * Fix VLANs/bonds randomly not coming up after reboot or wicked restart (bsc#1218668) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2175=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2175=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2175=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * wicked-debugsource-0.6.75-3.43.1 * wicked-0.6.75-3.43.1 * wicked-debuginfo-0.6.75-3.43.1 * wicked-service-0.6.75-3.43.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * wicked-debugsource-0.6.75-3.43.1 * wicked-0.6.75-3.43.1 * wicked-debuginfo-0.6.75-3.43.1 * wicked-service-0.6.75-3.43.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * wicked-debugsource-0.6.75-3.43.1 * wicked-0.6.75-3.43.1 * wicked-debuginfo-0.6.75-3.43.1 * wicked-service-0.6.75-3.43.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218668 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 08:30:53 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 08:30:53 -0000 Subject: SUSE-SU-2024:2174-1: moderate: Security update for wget Message-ID: <171921785378.17454.56363509256819223@smelt2.prg2.suse.org> # Security update for wget Announcement ID: SUSE-SU-2024:2174-1 Rating: moderate References: * bsc#1226419 Cross-References: * CVE-2024-38428 CVSS scores: * CVE-2024-38428 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for wget fixes the following issues: * CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a URI. (bsc#1226419) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2174=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2174=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2174=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * wget-debugsource-1.20.3-150000.3.20.1 * wget-debuginfo-1.20.3-150000.3.20.1 * wget-1.20.3-150000.3.20.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * wget-debugsource-1.20.3-150000.3.20.1 * wget-debuginfo-1.20.3-150000.3.20.1 * wget-1.20.3-150000.3.20.1 * openSUSE Leap 15.5 (noarch) * wget-lang-1.20.3-150000.3.20.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * wget-debugsource-1.20.3-150000.3.20.1 * wget-debuginfo-1.20.3-150000.3.20.1 * wget-1.20.3-150000.3.20.1 ## References: * https://www.suse.com/security/cve/CVE-2024-38428.html * https://bugzilla.suse.com/show_bug.cgi?id=1226419 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 08:30:56 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 08:30:56 -0000 Subject: SUSE-SU-2024:2173-1: low: Security update for qpdf Message-ID: <171921785647.17454.15066582906072520216@smelt2.prg2.suse.org> # Security update for qpdf Announcement ID: SUSE-SU-2024:2173-1 Rating: low References: * bsc#1089090 Cross-References: * CVE-2018-9918 CVSS scores: * CVE-2018-9918 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-9918 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-9918 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for qpdf fixes the following issues: * CVE-2018-9918: Fixed mishandled "expected dictionary key but found non-name object" cases that could have allowed attackers to cause a denial of service. (bsc#1089090) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2173=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2173=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2173=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2173=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * qpdf-debugsource-7.1.1-3.11.1 * qpdf-devel-7.1.1-3.11.1 * qpdf-debuginfo-7.1.1-3.11.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * qpdf-debugsource-7.1.1-3.11.1 * qpdf-7.1.1-3.11.1 * qpdf-debuginfo-7.1.1-3.11.1 * libqpdf18-7.1.1-3.11.1 * libqpdf18-debuginfo-7.1.1-3.11.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * qpdf-debugsource-7.1.1-3.11.1 * qpdf-7.1.1-3.11.1 * qpdf-debuginfo-7.1.1-3.11.1 * libqpdf18-7.1.1-3.11.1 * libqpdf18-debuginfo-7.1.1-3.11.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * qpdf-debugsource-7.1.1-3.11.1 * qpdf-7.1.1-3.11.1 * qpdf-debuginfo-7.1.1-3.11.1 * libqpdf18-7.1.1-3.11.1 * libqpdf18-debuginfo-7.1.1-3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2018-9918.html * https://bugzilla.suse.com/show_bug.cgi?id=1089090 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 08:30:58 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 08:30:58 -0000 Subject: SUSE-RU-2024:2172-1: moderate: Recommended update for iproute2 Message-ID: <171921785873.17454.2331838758340889068@smelt2.prg2.suse.org> # Recommended update for iproute2 Announcement ID: SUSE-RU-2024:2172-1 Rating: moderate References: * bsc#1204562 * jsc#PED-6820 * jsc#PED-6844 * jsc#PED-8358 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains three features and has one fix can now be installed. ## Description: This update for iproute2 fixes the following issues: iproute2 was updated to version 6.4 (jsc#PED-6820 jsc#PED-6844, jsc#PED-8358): * Fixed display of bound but unconnected sockets (bsc#1204562) * Changes in version 6.4: * bridge: mdb: added underlay destination IP support, UDP destination port support, destination VNI support, source VNI support, outgoing interface support * macvlan: added the "bclim" parameter * Changes in version 6.3: * New release of iproute2 corresponding to the 6.3 kernel. No large feature improvements only incremental improvements to the bridge mdb support, mostly just bug fixes. * Changes in version 6.2: * f_flower: Introduce L2TPv3 support * bridge: fdb: Add support for locked FDB entries * bridge: link: Add MAC Authentication Bypass (MAB) support * ip: Support --json on `ip neigh get` * tc: Add JSON output to tc-class * Changes in version 6.1: * man: ss.8: fix a typo * testsuite: fix build failure * genl: remove unused vars in Makefile * json: do not escape single quotes * ip-monitor: Do not error out when RTNLGRP_STATS is not available * ip-link: man: Document existence of netns argument in add command * macsec: add Extended Packet Number support * macsec: add user manual description for extended packet number feature * ip: xfrm: support "external" (`collect_md`) mode in xfrm interfaces * ip: xfrm: support adding xfrm metadata as lwtunnel info in routes * ip: add NLM_F_ECHO support * libnetlink: add offset for nl_dump_ext_ack_done * tc/tc_monitor: print netlink extack message * rtnetlink: add new function rtnl_echo_talk() * ip: fix return value for rtnl_talk failures * iplink_bridge: Add no_linklocal_learn option support * devlink: use dl_no_arg instead of checking dl_argc == 0 * devlink: remove dl_argv_parse_put * mnlg: remove unnused mnlg_socket structure * utils: extract CTRL_ATTR_MAXATTR and save it * devlink: expose nested devlink for a line card object * devlink: load port-ifname map on demand * devlink: fix parallel flash notifications processing * devlink: move use_iec into struct dl * devlink: fix typo in variable name in ifname_map_cb() * devlink: load ifname map on demand from ifname_map_rev_lookup() as well * dcb: unblock mnl_socket_recvfrom if not message received * libnetlink: Fix memory leak in __rtnl_talk_iov() * tc_util: Fix no error return when large parent id used * tc_util: Change datatype for maj to avoid overflow issue * ss: man: add missing entries for MPTCP * ss: man: add missing entries for TIPC * ss: usage: add missing parameters * ss: re-add TIPC query support * devlink: Fix setting parent for 'rate add' * link: display 'allmulti' counter * seg6: add support for flavors in SRv6 End* behaviors * tc: ct: Fix invalid pointer dereference * uapi: update from 6.1 pre rc1 * u32: fix json formatting of flowid * tc_stab: remove dead code * uapi: update for in.h and ip.h * remove #if 0 code * tc: add json support to size table * tc: put size table options in json object * tc/basic: fix json output filter * iplink: support JSON in MPLS output * tc: print errors on stderr * ip: print mpls errors on stderr * tc: make prefix const * man: add missing tc class show * iplink_can: add missing `]' of the bitrate, dbitrate and termination arrays * ip link: add sub-command to view and change DSA conduit interface * Changes in version 6.0: * ipstats: Add param.h for musl * Update kernel headers * libbpf: add xdp program name support * iplink: bond_slave: add per port prio support * seg6: add support for SRv6 Headend Reduced Encapsulation * lib: Introduce ppp protocols * f_flower: Introduce PPPoE support * Changes in version 5.19: * ip/iplink_virt_wifi: add support for virt_wifi * Update kernel headers * libnetlink: Add filtering to rtnl_statsdump_req_filter() * ipstats: Add a "set" command * ipstats: Add a group "link" * libbpf: Use bpf_object__load instead of bpf_object__load_xattr * uapi: change name for zerocopy sendfile in tls * bridge: vxlan device vnifilter support * f_flower: Add num of vlans parameter * Changes in version 5.18: * The build issues with libbpf should be fixed now. * Building with clang is now supported. * There are still some warnings with gcc-12 that will need to be fixed in the upstream kernel headers. * Changes in version 5.17: * lib/fs: fix memory leak in get_task_name() * bridge: Remove vlan listing from `bridge link` * bond: add arp_missed_max option * libnetlink: fix socket leak in rtnl_open_byproto() * dcb: Fix error reporting when accessing "dcb app" * tc_util: Fix parsing action control with space and slash * lib: fix ax25.h include for musl * uapi: add missing rose and ax25 files * rdma: Fix res_print_uint() and add res_print_u64() * tc: Add support for ce_threshold_value/mask in fq_codel * Add tmpfiles.d conf for /run/netns * Changes in version 5.16: * devlink: Fix cmd_dev_param_set() to check configuration mode * ip: add AMT support * iplink_can: fix configuration ranges in print_usage() and add unit * tc: flower: Fix buffer overflow on large labels * ip/ipnexthop: fix unsigned overflow in parse_nh_group_type_res() * tc/m_vlan: fix print_vlan() conditional on TCA_VLAN_ACT_PUSH_ETH * iplink_can: add new CAN FD bittiming parameters: Transmitter Delay Compensation (TDC) * Changes in version 5.15: * lib: bpf_legacy: fix bpffs mount when /sys/fs/bpf exists * man: devlink-port: fix the devlink port add synopsis * man: devlink-port: fix pfnum for devlink port add * iptuntap: fix multi-queue flag display * mptcp: unbreak JSON endpoint list * ipneigh: add support to print brief output of neigh cache in tabular format * ip/bond: add LACP active support * ip/tunnel: always print all known attributes * Add, show, link, remove IOAM namespaces and schemas * New IOAM6 encap type for routes * tc/skbmod: Introduce SKBMOD_F_ECN option * tc/f_flower: fix port range parsing ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2172=1 openSUSE-SLE-15.6-2024-2172=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2172=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * iproute2-arpd-debuginfo-6.4-150600.7.3.1 * libnetlink-devel-6.4-150600.7.3.1 * iproute2-debugsource-6.4-150600.7.3.1 * iproute2-arpd-6.4-150600.7.3.1 * iproute2-6.4-150600.7.3.1 * iproute2-bash-completion-6.4-150600.7.3.1 * iproute2-debuginfo-6.4-150600.7.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * iproute2-arpd-debuginfo-6.4-150600.7.3.1 * libnetlink-devel-6.4-150600.7.3.1 * iproute2-debugsource-6.4-150600.7.3.1 * iproute2-arpd-6.4-150600.7.3.1 * iproute2-6.4-150600.7.3.1 * iproute2-bash-completion-6.4-150600.7.3.1 * iproute2-debuginfo-6.4-150600.7.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1204562 * https://jira.suse.com/browse/PED-6820 * https://jira.suse.com/browse/PED-6844 * https://jira.suse.com/browse/PED-8358 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 08:31:00 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 08:31:00 -0000 Subject: SUSE-SU-2024:2171-1: important: Security update for libarchive Message-ID: <171921786049.17454.13972376614949034935@smelt2.prg2.suse.org> # Security update for libarchive Announcement ID: SUSE-SU-2024:2171-1 Rating: important References: * bsc#1225971 Cross-References: * CVE-2024-20696 CVSS scores: * CVE-2024-20696 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for libarchive fixes the following issues: * CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2171=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2171=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2171=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2171=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2171=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2171=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2171=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2171=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2171=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2171=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2171=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2171=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2171=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2171=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2171=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2171=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2171=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2171=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2171=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * bsdtar-debuginfo-3.5.1-150400.3.15.1 * libarchive-devel-3.5.1-150400.3.15.1 * bsdtar-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * openSUSE Leap 15.4 (x86_64) * libarchive13-32bit-3.5.1-150400.3.15.1 * libarchive13-32bit-debuginfo-3.5.1-150400.3.15.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libarchive13-64bit-3.5.1-150400.3.15.1 * libarchive13-64bit-debuginfo-3.5.1-150400.3.15.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * bsdtar-debuginfo-3.5.1-150400.3.15.1 * libarchive-devel-3.5.1-150400.3.15.1 * bsdtar-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * openSUSE Leap 15.5 (x86_64) * libarchive13-32bit-3.5.1-150400.3.15.1 * libarchive13-32bit-debuginfo-3.5.1-150400.3.15.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libarchive-devel-3.5.1-150400.3.15.1 * libarchive13-debuginfo-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * bsdtar-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * bsdtar-debuginfo-3.5.1-150400.3.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * bsdtar-debuginfo-3.5.1-150400.3.15.1 * libarchive-devel-3.5.1-150400.3.15.1 * bsdtar-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * bsdtar-debuginfo-3.5.1-150400.3.15.1 * libarchive-devel-3.5.1-150400.3.15.1 * bsdtar-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * bsdtar-debuginfo-3.5.1-150400.3.15.1 * libarchive-devel-3.5.1-150400.3.15.1 * bsdtar-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * bsdtar-debuginfo-3.5.1-150400.3.15.1 * libarchive-devel-3.5.1-150400.3.15.1 * bsdtar-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libarchive13-debuginfo-3.5.1-150400.3.15.1 * bsdtar-debuginfo-3.5.1-150400.3.15.1 * libarchive-devel-3.5.1-150400.3.15.1 * bsdtar-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * SUSE Manager Proxy 4.3 (x86_64) * libarchive-devel-3.5.1-150400.3.15.1 * libarchive13-debuginfo-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libarchive-devel-3.5.1-150400.3.15.1 * libarchive13-debuginfo-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libarchive-devel-3.5.1-150400.3.15.1 * libarchive13-debuginfo-3.5.1-150400.3.15.1 * libarchive-debugsource-3.5.1-150400.3.15.1 * libarchive13-3.5.1-150400.3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2024-20696.html * https://bugzilla.suse.com/show_bug.cgi?id=1225971 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 08:31:04 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 08:31:04 -0000 Subject: SUSE-SU-2024:2170-1: important: Security update for gnome-settings-daemon Message-ID: <171921786469.17454.6180418464142523804@smelt2.prg2.suse.org> # Security update for gnome-settings-daemon Announcement ID: SUSE-SU-2024:2170-1 Rating: important References: * bsc#1226423 Cross-References: * CVE-2024-38394 CVSS scores: * CVE-2024-38394 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for gnome-settings-daemon fixes the following issues: * CVE-2024-38394: Fixed mismatches in interpreting USB authorization policy (bsc#1226423). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2170=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2170=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2170=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2170=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2170=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2170=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gnome-settings-daemon-41.0-150400.3.3.1 * gnome-settings-daemon-debuginfo-41.0-150400.3.3.1 * gnome-settings-daemon-debugsource-41.0-150400.3.3.1 * gnome-settings-daemon-devel-41.0-150400.3.3.1 * openSUSE Leap 15.4 (noarch) * gnome-settings-daemon-lang-41.0-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * gnome-settings-daemon-41.0-150400.3.3.1 * gnome-settings-daemon-debuginfo-41.0-150400.3.3.1 * gnome-settings-daemon-debugsource-41.0-150400.3.3.1 * gnome-settings-daemon-devel-41.0-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gnome-settings-daemon-lang-41.0-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * gnome-settings-daemon-41.0-150400.3.3.1 * gnome-settings-daemon-debuginfo-41.0-150400.3.3.1 * gnome-settings-daemon-debugsource-41.0-150400.3.3.1 * gnome-settings-daemon-devel-41.0-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gnome-settings-daemon-lang-41.0-150400.3.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * gnome-settings-daemon-41.0-150400.3.3.1 * gnome-settings-daemon-debuginfo-41.0-150400.3.3.1 * gnome-settings-daemon-debugsource-41.0-150400.3.3.1 * gnome-settings-daemon-devel-41.0-150400.3.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * gnome-settings-daemon-lang-41.0-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * gnome-settings-daemon-41.0-150400.3.3.1 * gnome-settings-daemon-debuginfo-41.0-150400.3.3.1 * gnome-settings-daemon-debugsource-41.0-150400.3.3.1 * gnome-settings-daemon-devel-41.0-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * gnome-settings-daemon-lang-41.0-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * gnome-settings-daemon-41.0-150400.3.3.1 * gnome-settings-daemon-debuginfo-41.0-150400.3.3.1 * gnome-settings-daemon-debugsource-41.0-150400.3.3.1 * gnome-settings-daemon-devel-41.0-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gnome-settings-daemon-lang-41.0-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-38394.html * https://bugzilla.suse.com/show_bug.cgi?id=1226423 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 08:31:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 08:31:06 -0000 Subject: SUSE-SU-2024:2168-1: important: Security update for gnome-settings-daemon Message-ID: <171921786652.17454.7672027579017711512@smelt2.prg2.suse.org> # Security update for gnome-settings-daemon Announcement ID: SUSE-SU-2024:2168-1 Rating: important References: * bsc#1226423 Cross-References: * CVE-2024-38394 CVSS scores: * CVE-2024-38394 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for gnome-settings-daemon fixes the following issues: * CVE-2024-38394: Fixed mismatches in interpreting USB authorization policy (bsc#1226423). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2168=1 SUSE-2024-2168=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2168=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * gnome-settings-daemon-debugsource-41.0-150500.4.3.1 * gnome-settings-daemon-devel-41.0-150500.4.3.1 * gnome-settings-daemon-41.0-150500.4.3.1 * gnome-settings-daemon-debuginfo-41.0-150500.4.3.1 * openSUSE Leap 15.5 (noarch) * gnome-settings-daemon-lang-41.0-150500.4.3.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gnome-settings-daemon-debugsource-41.0-150500.4.3.1 * gnome-settings-daemon-devel-41.0-150500.4.3.1 * gnome-settings-daemon-41.0-150500.4.3.1 * gnome-settings-daemon-debuginfo-41.0-150500.4.3.1 * Desktop Applications Module 15-SP5 (noarch) * gnome-settings-daemon-lang-41.0-150500.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-38394.html * https://bugzilla.suse.com/show_bug.cgi?id=1226423 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 12:30:02 -0000 Subject: SUSE-SU-2024:2180-1: important: Security update for vte Message-ID: <171923220204.4810.12857567506635565786@smelt2.prg2.suse.org> # Security update for vte Announcement ID: SUSE-SU-2024:2180-1 Rating: important References: * bsc#1226134 Cross-References: * CVE-2024-37535 CVSS scores: * CVE-2024-37535 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for vte fixes the following issues: * CVE-2024-37535: Fixed a bug that allowed an attacker to cause a denial of service (memory consumption) via a window resize escape. (bsc#1226134) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2180=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2180=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2180=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2180=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2180=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2180=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2180=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2180=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2180=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2180=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2180=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2180=1 ## Package List: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * vte-debugsource-0.66.2-150400.3.5.1 * libvte-2_91-0-0.66.2-150400.3.5.1 * vte-devel-0.66.2-150400.3.5.1 * vte-debuginfo-0.66.2-150400.3.5.1 * typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1 * libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * vte-lang-0.66.2-150400.3.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * vte-debugsource-0.66.2-150400.3.5.1 * libvte-2_91-0-0.66.2-150400.3.5.1 * vte-devel-0.66.2-150400.3.5.1 * vte-debuginfo-0.66.2-150400.3.5.1 * typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1 * libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * vte-lang-0.66.2-150400.3.5.1 * SUSE Manager Proxy 4.3 (x86_64) * vte-debugsource-0.66.2-150400.3.5.1 * libvte-2_91-0-0.66.2-150400.3.5.1 * vte-debuginfo-0.66.2-150400.3.5.1 * typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1 * libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * vte-debugsource-0.66.2-150400.3.5.1 * libvte-2_91-0-0.66.2-150400.3.5.1 * vte-debuginfo-0.66.2-150400.3.5.1 * typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1 * libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * vte-debugsource-0.66.2-150400.3.5.1 * libvte-2_91-0-0.66.2-150400.3.5.1 * vte-debuginfo-0.66.2-150400.3.5.1 * typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1 * libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * vte-debugsource-0.66.2-150400.3.5.1 * vte-tools-0.66.2-150400.3.5.1 * libvte-2_91-0-0.66.2-150400.3.5.1 * vte-devel-0.66.2-150400.3.5.1 * glade-catalog-vte-0.66.2-150400.3.5.1 * vte-debuginfo-0.66.2-150400.3.5.1 * typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1 * vte-tools-debuginfo-0.66.2-150400.3.5.1 * libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1 * openSUSE Leap 15.4 (noarch) * vte-lang-0.66.2-150400.3.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * vte-debugsource-0.66.2-150400.3.5.1 * vte-tools-0.66.2-150400.3.5.1 * libvte-2_91-0-0.66.2-150400.3.5.1 * vte-devel-0.66.2-150400.3.5.1 * glade-catalog-vte-0.66.2-150400.3.5.1 * vte-debuginfo-0.66.2-150400.3.5.1 * typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1 * vte-tools-debuginfo-0.66.2-150400.3.5.1 * libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1 * openSUSE Leap 15.5 (noarch) * vte-lang-0.66.2-150400.3.5.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * vte-debugsource-0.66.2-150400.3.5.1 * libvte-2_91-0-0.66.2-150400.3.5.1 * vte-debuginfo-0.66.2-150400.3.5.1 * typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1 * libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * vte-debugsource-0.66.2-150400.3.5.1 * vte-debuginfo-0.66.2-150400.3.5.1 * vte-devel-0.66.2-150400.3.5.1 * Desktop Applications Module 15-SP5 (noarch) * vte-lang-0.66.2-150400.3.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * vte-debugsource-0.66.2-150400.3.5.1 * libvte-2_91-0-0.66.2-150400.3.5.1 * vte-devel-0.66.2-150400.3.5.1 * vte-debuginfo-0.66.2-150400.3.5.1 * typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1 * libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * vte-lang-0.66.2-150400.3.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * vte-debugsource-0.66.2-150400.3.5.1 * libvte-2_91-0-0.66.2-150400.3.5.1 * vte-devel-0.66.2-150400.3.5.1 * vte-debuginfo-0.66.2-150400.3.5.1 * typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1 * libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * vte-lang-0.66.2-150400.3.5.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * vte-debugsource-0.66.2-150400.3.5.1 * libvte-2_91-0-0.66.2-150400.3.5.1 * vte-devel-0.66.2-150400.3.5.1 * vte-debuginfo-0.66.2-150400.3.5.1 * typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1 * libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * vte-lang-0.66.2-150400.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-37535.html * https://bugzilla.suse.com/show_bug.cgi?id=1226134 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 12:30:04 -0000 Subject: SUSE-RU-2024:2179-1: moderate: Recommended update for sssd Message-ID: <171923220453.4810.4943352631697103161@smelt2.prg2.suse.org> # Recommended update for sssd Announcement ID: SUSE-RU-2024:2179-1 Rating: moderate References: * bsc#1226407 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for sssd fixes the following issue: * Reenable pam_sss after upgrade, was removed by sssd-common postun (bsc#1226407) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2179=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2179=1 openSUSE-SLE-15.6-2024-2179=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * sssd-ad-2.9.3-150600.3.6.2 * sssd-ldap-2.9.3-150600.3.6.2 * sssd-ipa-2.9.3-150600.3.6.2 * sssd-kcm-2.9.3-150600.3.6.2 * libipa_hbac-devel-2.9.3-150600.3.6.2 * sssd-ipa-debuginfo-2.9.3-150600.3.6.2 * sssd-2.9.3-150600.3.6.2 * sssd-dbus-2.9.3-150600.3.6.2 * sssd-tools-2.9.3-150600.3.6.2 * sssd-ad-debuginfo-2.9.3-150600.3.6.2 * libsss_simpleifp0-2.9.3-150600.3.6.2 * libipa_hbac0-2.9.3-150600.3.6.2 * python3-sssd-config-2.9.3-150600.3.6.2 * libsss_idmap-devel-2.9.3-150600.3.6.2 * libsss_nss_idmap0-debuginfo-2.9.3-150600.3.6.2 * libsss_idmap0-2.9.3-150600.3.6.2 * libsss_simpleifp-devel-2.9.3-150600.3.6.2 * sssd-dbus-debuginfo-2.9.3-150600.3.6.2 * sssd-debugsource-2.9.3-150600.3.6.2 * libsss_idmap0-debuginfo-2.9.3-150600.3.6.2 * sssd-proxy-debuginfo-2.9.3-150600.3.6.2 * libsss_nss_idmap-devel-2.9.3-150600.3.6.2 * sssd-krb5-common-debuginfo-2.9.3-150600.3.6.2 * sssd-winbind-idmap-2.9.3-150600.3.6.2 * libipa_hbac0-debuginfo-2.9.3-150600.3.6.2 * libsss_nss_idmap0-2.9.3-150600.3.6.2 * sssd-ldap-debuginfo-2.9.3-150600.3.6.2 * libsss_certmap-devel-2.9.3-150600.3.6.2 * libsss_simpleifp0-debuginfo-2.9.3-150600.3.6.2 * python3-sssd-config-debuginfo-2.9.3-150600.3.6.2 * sssd-debuginfo-2.9.3-150600.3.6.2 * sssd-krb5-common-2.9.3-150600.3.6.2 * sssd-kcm-debuginfo-2.9.3-150600.3.6.2 * libsss_certmap0-2.9.3-150600.3.6.2 * sssd-krb5-2.9.3-150600.3.6.2 * libsss_certmap0-debuginfo-2.9.3-150600.3.6.2 * sssd-winbind-idmap-debuginfo-2.9.3-150600.3.6.2 * sssd-tools-debuginfo-2.9.3-150600.3.6.2 * sssd-proxy-2.9.3-150600.3.6.2 * sssd-krb5-debuginfo-2.9.3-150600.3.6.2 * Basesystem Module 15-SP6 (x86_64) * sssd-32bit-2.9.3-150600.3.6.2 * sssd-32bit-debuginfo-2.9.3-150600.3.6.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * sssd-ad-2.9.3-150600.3.6.2 * sssd-ldap-2.9.3-150600.3.6.2 * python3-ipa_hbac-debuginfo-2.9.3-150600.3.6.2 * sssd-ipa-2.9.3-150600.3.6.2 * sssd-kcm-2.9.3-150600.3.6.2 * python3-sss_nss_idmap-2.9.3-150600.3.6.2 * libipa_hbac-devel-2.9.3-150600.3.6.2 * python3-sss-murmur-2.9.3-150600.3.6.2 * sssd-ipa-debuginfo-2.9.3-150600.3.6.2 * sssd-2.9.3-150600.3.6.2 * sssd-dbus-2.9.3-150600.3.6.2 * sssd-tools-2.9.3-150600.3.6.2 * libnfsidmap-sss-debuginfo-2.9.3-150600.3.6.2 * sssd-ad-debuginfo-2.9.3-150600.3.6.2 * libsss_simpleifp0-2.9.3-150600.3.6.2 * libipa_hbac0-2.9.3-150600.3.6.2 * python3-sssd-config-2.9.3-150600.3.6.2 * libsss_idmap-devel-2.9.3-150600.3.6.2 * libsss_nss_idmap0-debuginfo-2.9.3-150600.3.6.2 * libsss_idmap0-2.9.3-150600.3.6.2 * libsss_simpleifp-devel-2.9.3-150600.3.6.2 * sssd-dbus-debuginfo-2.9.3-150600.3.6.2 * sssd-debugsource-2.9.3-150600.3.6.2 * libsss_idmap0-debuginfo-2.9.3-150600.3.6.2 * sssd-proxy-debuginfo-2.9.3-150600.3.6.2 * libsss_nss_idmap-devel-2.9.3-150600.3.6.2 * sssd-krb5-common-debuginfo-2.9.3-150600.3.6.2 * sssd-winbind-idmap-2.9.3-150600.3.6.2 * libipa_hbac0-debuginfo-2.9.3-150600.3.6.2 * libnfsidmap-sss-2.9.3-150600.3.6.2 * libsss_nss_idmap0-2.9.3-150600.3.6.2 * sssd-ldap-debuginfo-2.9.3-150600.3.6.2 * libsss_certmap-devel-2.9.3-150600.3.6.2 * libsss_simpleifp0-debuginfo-2.9.3-150600.3.6.2 * python3-sssd-config-debuginfo-2.9.3-150600.3.6.2 * python3-ipa_hbac-2.9.3-150600.3.6.2 * sssd-debuginfo-2.9.3-150600.3.6.2 * sssd-krb5-common-2.9.3-150600.3.6.2 * sssd-kcm-debuginfo-2.9.3-150600.3.6.2 * libsss_certmap0-2.9.3-150600.3.6.2 * python3-sss_nss_idmap-debuginfo-2.9.3-150600.3.6.2 * sssd-krb5-2.9.3-150600.3.6.2 * libsss_certmap0-debuginfo-2.9.3-150600.3.6.2 * sssd-winbind-idmap-debuginfo-2.9.3-150600.3.6.2 * sssd-tools-debuginfo-2.9.3-150600.3.6.2 * python3-sss-murmur-debuginfo-2.9.3-150600.3.6.2 * sssd-proxy-2.9.3-150600.3.6.2 * sssd-krb5-debuginfo-2.9.3-150600.3.6.2 * openSUSE Leap 15.6 (x86_64) * sssd-32bit-2.9.3-150600.3.6.2 * sssd-32bit-debuginfo-2.9.3-150600.3.6.2 * openSUSE Leap 15.6 (aarch64_ilp32) * sssd-64bit-debuginfo-2.9.3-150600.3.6.2 * sssd-64bit-2.9.3-150600.3.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226407 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 12:30:06 -0000 Subject: SUSE-RU-2024:2178-1: moderate: Recommended update for s390-tools Message-ID: <171923220600.4810.12329161490192178548@smelt2.prg2.suse.org> # Recommended update for s390-tools Announcement ID: SUSE-RU-2024:2178-1 Rating: moderate References: * bsc#1226609 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for s390-tools fixes the following issues: * Amended read_values.c (bsc#1226609) * Updated %description in the .spec file ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2178=1 openSUSE-SLE-15.6-2024-2178=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2178=1 ## Package List: * openSUSE Leap 15.6 (s390x) * s390-tools-chreipl-fcp-mpath-2.31.0-150600.8.3.2 * libkmipclient1-debuginfo-2.31.0-150600.8.3.2 * s390-tools-zdsfs-2.31.0-150600.8.3.2 * osasnmpd-2.31.0-150600.8.3.2 * libekmfweb1-2.31.0-150600.8.3.2 * libekmfweb1-debuginfo-2.31.0-150600.8.3.2 * s390-tools-hmcdrvfs-2.31.0-150600.8.3.2 * s390-tools-hmcdrvfs-debuginfo-2.31.0-150600.8.3.2 * osasnmpd-debuginfo-2.31.0-150600.8.3.2 * libkmipclient1-2.31.0-150600.8.3.2 * s390-tools-zdsfs-debuginfo-2.31.0-150600.8.3.2 * libkmipclient1-devel-2.31.0-150600.8.3.2 * libekmfweb1-devel-2.31.0-150600.8.3.2 * openSUSE Leap 15.6 (s390x x86_64) * s390-tools-debuginfo-2.31.0-150600.8.3.2 * s390-tools-debugsource-2.31.0-150600.8.3.2 * s390-tools-2.31.0-150600.8.3.2 * openSUSE Leap 15.6 (noarch) * s390-tools-genprotimg-data-2.31.0-150600.8.3.2 * Basesystem Module 15-SP6 (s390x) * s390-tools-chreipl-fcp-mpath-2.31.0-150600.8.3.2 * libkmipclient1-debuginfo-2.31.0-150600.8.3.2 * osasnmpd-2.31.0-150600.8.3.2 * s390-tools-zdsfs-2.31.0-150600.8.3.2 * libekmfweb1-2.31.0-150600.8.3.2 * libekmfweb1-debuginfo-2.31.0-150600.8.3.2 * s390-tools-hmcdrvfs-2.31.0-150600.8.3.2 * s390-tools-hmcdrvfs-debuginfo-2.31.0-150600.8.3.2 * osasnmpd-debuginfo-2.31.0-150600.8.3.2 * libkmipclient1-2.31.0-150600.8.3.2 * s390-tools-zdsfs-debuginfo-2.31.0-150600.8.3.2 * libekmfweb1-devel-2.31.0-150600.8.3.2 * Basesystem Module 15-SP6 (s390x x86_64) * s390-tools-debuginfo-2.31.0-150600.8.3.2 * s390-tools-debugsource-2.31.0-150600.8.3.2 * s390-tools-2.31.0-150600.8.3.2 * Basesystem Module 15-SP6 (noarch) * s390-tools-genprotimg-data-2.31.0-150600.8.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226609 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 12:30:07 -0000 Subject: SUSE-RU-2024:2177-1: moderate: Recommended update for s390-tools Message-ID: <171923220743.4810.11502325575669646615@smelt2.prg2.suse.org> # Recommended update for s390-tools Announcement ID: SUSE-RU-2024:2177-1 Rating: moderate References: * bsc#1226609 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for s390-tools fixes the following issue: * Amended read_values.c (bsc#1226609) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2177=1 SUSE-2024-2177=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2177=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2177=1 ## Package List: * openSUSE Leap 15.5 (s390x x86_64) * s390-tools-debugsource-2.30.0-150500.9.16.2 * s390-tools-2.30.0-150500.9.16.2 * s390-tools-debuginfo-2.30.0-150500.9.16.2 * openSUSE Leap 15.5 (s390x) * libekmfweb1-debuginfo-2.30.0-150500.9.16.2 * libekmfweb1-2.30.0-150500.9.16.2 * osasnmpd-2.30.0-150500.9.16.2 * libekmfweb1-devel-2.30.0-150500.9.16.2 * libkmipclient1-debuginfo-2.30.0-150500.9.16.2 * libkmipclient1-devel-2.30.0-150500.9.16.2 * s390-tools-hmcdrvfs-2.30.0-150500.9.16.2 * s390-tools-zdsfs-2.30.0-150500.9.16.2 * libkmipclient1-2.30.0-150500.9.16.2 * osasnmpd-debuginfo-2.30.0-150500.9.16.2 * s390-tools-zdsfs-debuginfo-2.30.0-150500.9.16.2 * s390-tools-hmcdrvfs-debuginfo-2.30.0-150500.9.16.2 * s390-tools-chreipl-fcp-mpath-2.30.0-150500.9.16.2 * SUSE Linux Enterprise Micro 5.5 (s390x) * libkmipclient1-2.30.0-150500.9.16.2 * libekmfweb1-debuginfo-2.30.0-150500.9.16.2 * libekmfweb1-2.30.0-150500.9.16.2 * libkmipclient1-debuginfo-2.30.0-150500.9.16.2 * SUSE Linux Enterprise Micro 5.5 (s390x x86_64) * s390-tools-debugsource-2.30.0-150500.9.16.2 * s390-tools-2.30.0-150500.9.16.2 * s390-tools-debuginfo-2.30.0-150500.9.16.2 * Basesystem Module 15-SP5 (s390x) * libekmfweb1-debuginfo-2.30.0-150500.9.16.2 * libekmfweb1-2.30.0-150500.9.16.2 * osasnmpd-2.30.0-150500.9.16.2 * libekmfweb1-devel-2.30.0-150500.9.16.2 * libkmipclient1-debuginfo-2.30.0-150500.9.16.2 * s390-tools-hmcdrvfs-2.30.0-150500.9.16.2 * s390-tools-zdsfs-2.30.0-150500.9.16.2 * libkmipclient1-2.30.0-150500.9.16.2 * osasnmpd-debuginfo-2.30.0-150500.9.16.2 * s390-tools-zdsfs-debuginfo-2.30.0-150500.9.16.2 * s390-tools-hmcdrvfs-debuginfo-2.30.0-150500.9.16.2 * s390-tools-chreipl-fcp-mpath-2.30.0-150500.9.16.2 * Basesystem Module 15-SP5 (s390x x86_64) * s390-tools-debugsource-2.30.0-150500.9.16.2 * s390-tools-2.30.0-150500.9.16.2 * s390-tools-debuginfo-2.30.0-150500.9.16.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226609 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 12:30:08 -0000 Subject: SUSE-RU-2024:0950-2: important: Recommended update for spack Message-ID: <171923220881.4810.17780642539106998503@smelt2.prg2.suse.org> # Recommended update for spack Announcement ID: SUSE-RU-2024:0950-2 Rating: important References: * bsc#1221471 * bsc#1221503 Affected Products: * HPC Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 An update that has two fixes can now be installed. ## Description: This update for spack fixes the following issues: * Spack was updated to version 0.21.2: * Bugs fixed: * Containerize: accommodate nested or pre-existing `spack-env` paths. * Fix `setup-env` script, when going back and forth between instances. * Fix using fully-qualified namespaces from root specs. * Fix a bug when a required provider is requested for multiple virtuals. * OCI buildcaches: * only push in parallel when forking. * use pickleable errors (#42160) * Fix using sticky variants in externals. * Fix a rare issue with conditional requirements and multi-valued variants. * Recipy updates: * `rust`: add v1.75, rework a few variants. * `py-transformers`: add v4.35.2. * Fix path to setup-env.sh in the Apptainer template (bsc#1221471). * Add libgfortran, libfl2 and libzip5 to the Spack runtime container as the Spack build container has the corresponding devel packages but these libraries are not installed in a BCI-style base container by default (bsc#1221503). * Make python version used configurable. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-950=1 * HPC Module 15-SP6 zypper in -t patch SUSE-SLE-Module-HPC-15-SP6-2024-950=1 ## Package List: * openSUSE Leap 15.6 (noarch) * spack-info-0.21.2-150400.15.2 * spack-recipes-0.21.2-150400.15.2 * spack-man-0.21.2-150400.15.2 * spack-0.21.2-150400.15.2 * HPC Module 15-SP6 (noarch) * spack-info-0.21.2-150400.15.2 * spack-recipes-0.21.2-150400.15.2 * spack-man-0.21.2-150400.15.2 * spack-0.21.2-150400.15.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221471 * https://bugzilla.suse.com/show_bug.cgi?id=1221503 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 16:30:02 -0000 Subject: SUSE-SU-2024:2182-1: moderate: Security update for python-docker Message-ID: <171924660216.15886.18255539342393395937@smelt2.prg2.suse.org> # Security update for python-docker Announcement ID: SUSE-SU-2024:2182-1 Rating: moderate References: * bsc#1224788 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 An update that solves one vulnerability can now be installed. ## Description: This update for python-docker fixes the following issues: * CVE-2024-35195: Fixed missing certificate verification (bsc#1224788). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-2182=1 ## Package List: * SUSE Manager Client Tools for SLE 15 (noarch) * python3-docker-2.6.1-150000.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1224788 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 16:30:03 -0000 Subject: SUSE-RU-2024:2181-1: moderate: Recommended update for sles15-image Message-ID: <171924660350.15886.2379362191113328716@smelt2.prg2.suse.org> # Recommended update for sles15-image Announcement ID: SUSE-RU-2024:2181-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.5 An update that can now be installed. ## Description: This update for sles15-image fixes the following issues: * restore procps in 15.5, will be gone with 15.6 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2181=1 ## Package List: * openSUSE Leap 15.5 (noarch) * container:sles15-image-15.0.0-36.12.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 20:31:15 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 20:31:15 -0000 Subject: SUSE-SU-2024:2184-1: important: Security update for the Linux Kernel Message-ID: <171926107530.28263.4012262948409342302@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:2184-1 Rating: important References: * bsc#1065729 * bsc#1101816 * bsc#1141539 * bsc#1181674 * bsc#1185902 * bsc#1187716 * bsc#1188616 * bsc#1190317 * bsc#1190795 * bsc#1191452 * bsc#1194591 * bsc#1197760 * bsc#1197894 * bsc#1203935 * bsc#1206213 * bsc#1206646 * bsc#1207186 * bsc#1209657 * bsc#1210335 * bsc#1215702 * bsc#1216702 * bsc#1217169 * bsc#1217519 * bsc#1218917 * bsc#1220487 * bsc#1220513 * bsc#1220854 * bsc#1220928 * bsc#1221044 * bsc#1221081 * bsc#1221086 * bsc#1221543 * bsc#1221545 * bsc#1221816 * bsc#1221977 * bsc#1221994 * bsc#1222559 * bsc#1222619 * bsc#1222627 * bsc#1222667 * bsc#1222671 * bsc#1222793 * bsc#1222893 * bsc#1222894 * bsc#1223023 * bsc#1223046 * bsc#1223048 * bsc#1223062 * bsc#1223084 * bsc#1223119 * bsc#1223138 * bsc#1223207 * bsc#1223360 * bsc#1223384 * bsc#1223432 * bsc#1223509 * bsc#1223512 * bsc#1223539 * bsc#1223540 * bsc#1223626 * bsc#1223627 * bsc#1223633 * bsc#1223653 * bsc#1223666 * bsc#1223671 * bsc#1223712 * bsc#1223715 * bsc#1223738 * bsc#1223744 * bsc#1223752 * bsc#1223802 * bsc#1223819 * bsc#1223834 * bsc#1223922 * bsc#1223923 * bsc#1223931 * bsc#1223932 * bsc#1223948 * bsc#1223969 * bsc#1224096 * bsc#1224174 * bsc#1224181 * bsc#1224347 * bsc#1224482 * bsc#1224511 * bsc#1224525 * bsc#1224566 * bsc#1224580 * bsc#1224592 * bsc#1224601 * bsc#1224607 * bsc#1224621 * bsc#1224644 * bsc#1224645 * bsc#1224648 * bsc#1224650 * bsc#1224663 * bsc#1224671 * bsc#1224676 * bsc#1224680 * bsc#1224682 * bsc#1224725 * bsc#1224728 * bsc#1224733 * bsc#1224738 * bsc#1224747 * bsc#1224749 * bsc#1224759 * bsc#1224803 * bsc#1224827 * bsc#1224830 * bsc#1224831 * bsc#1224834 * bsc#1224838 * bsc#1224841 * bsc#1224844 * bsc#1224846 * bsc#1224847 * bsc#1224849 * bsc#1224854 * bsc#1224859 * bsc#1224867 * bsc#1224880 * bsc#1224882 * bsc#1224888 * bsc#1224889 * bsc#1224892 * bsc#1224893 * bsc#1224899 * bsc#1224904 * bsc#1224907 * bsc#1224916 * bsc#1224917 * bsc#1224922 * bsc#1224926 * bsc#1224930 * bsc#1224931 * bsc#1224942 * bsc#1224954 * bsc#1224956 * bsc#1224957 * bsc#1224959 * bsc#1224960 * bsc#1224961 * bsc#1224963 * bsc#1224966 * bsc#1224968 * bsc#1224981 * bsc#1224982 * bsc#1224983 * bsc#1224987 * bsc#1224990 * bsc#1224996 * bsc#1225008 * bsc#1225009 * bsc#1225010 * bsc#1225022 * bsc#1225026 * bsc#1225030 * bsc#1225054 * bsc#1225058 * bsc#1225059 * bsc#1225060 * bsc#1225062 * bsc#1225082 * bsc#1225084 * bsc#1225086 * bsc#1225092 * bsc#1225096 * bsc#1225112 * bsc#1225124 * bsc#1225128 * bsc#1225132 * bsc#1225141 * bsc#1225143 * bsc#1225144 * bsc#1225151 * bsc#1225153 * bsc#1225155 * bsc#1225157 * bsc#1225164 * bsc#1225177 * bsc#1225189 * bsc#1225192 * bsc#1225193 * bsc#1225198 * bsc#1225201 * bsc#1225207 * bsc#1225208 * bsc#1225222 * bsc#1225230 * bsc#1225242 * bsc#1225244 * bsc#1225247 * bsc#1225251 * bsc#1225252 * bsc#1225256 * bsc#1225303 * bsc#1225318 * bsc#1225322 * bsc#1225329 * bsc#1225330 * bsc#1225336 * bsc#1225347 * bsc#1225351 * bsc#1225354 * bsc#1225355 * bsc#1225360 * bsc#1225366 * bsc#1225367 * bsc#1225384 * bsc#1225390 * bsc#1225404 * bsc#1225409 * bsc#1225411 * bsc#1225438 * bsc#1225453 * bsc#1225479 * bsc#1225482 * bsc#1225506 * bsc#1225549 * bsc#1225560 * bsc#1225572 * bsc#1225640 * bsc#1225708 * bsc#1225764 Cross-References: * CVE-2021-46933 * CVE-2021-46955 * CVE-2021-47074 * CVE-2021-47113 * CVE-2021-47131 * CVE-2021-47162 * CVE-2021-47171 * CVE-2021-47188 * CVE-2021-47206 * CVE-2021-47220 * CVE-2021-47229 * CVE-2021-47231 * CVE-2021-47235 * CVE-2021-47236 * CVE-2021-47237 * CVE-2021-47238 * CVE-2021-47239 * CVE-2021-47245 * CVE-2021-47246 * CVE-2021-47248 * CVE-2021-47249 * CVE-2021-47250 * CVE-2021-47252 * CVE-2021-47254 * CVE-2021-47258 * CVE-2021-47260 * CVE-2021-47261 * CVE-2021-47265 * CVE-2021-47269 * CVE-2021-47274 * CVE-2021-47276 * CVE-2021-47277 * CVE-2021-47280 * CVE-2021-47281 * CVE-2021-47284 * CVE-2021-47285 * CVE-2021-47288 * CVE-2021-47301 * CVE-2021-47302 * CVE-2021-47305 * CVE-2021-47307 * CVE-2021-47308 * CVE-2021-47310 * CVE-2021-47311 * CVE-2021-47314 * CVE-2021-47315 * CVE-2021-47319 * CVE-2021-47320 * CVE-2021-47321 * CVE-2021-47323 * CVE-2021-47324 * CVE-2021-47330 * CVE-2021-47334 * CVE-2021-47337 * CVE-2021-47343 * CVE-2021-47344 * CVE-2021-47345 * CVE-2021-47347 * CVE-2021-47352 * CVE-2021-47353 * CVE-2021-47355 * CVE-2021-47356 * CVE-2021-47357 * CVE-2021-47361 * CVE-2021-47362 * CVE-2021-47369 * CVE-2021-47375 * CVE-2021-47378 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47391 * CVE-2021-47397 * CVE-2021-47400 * CVE-2021-47401 * CVE-2021-47404 * CVE-2021-47409 * CVE-2021-47416 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47431 * CVE-2021-47435 * CVE-2021-47436 * CVE-2021-47456 * CVE-2021-47458 * CVE-2021-47460 * CVE-2021-47469 * CVE-2021-47472 * CVE-2021-47473 * CVE-2021-47478 * CVE-2021-47480 * CVE-2021-47483 * CVE-2021-47485 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47500 * CVE-2021-47506 * CVE-2021-47509 * CVE-2021-47511 * CVE-2021-47523 * CVE-2021-47541 * CVE-2021-47548 * CVE-2021-47565 * CVE-2022-48636 * CVE-2022-48650 * CVE-2022-48672 * CVE-2022-48686 * CVE-2022-48697 * CVE-2022-48702 * CVE-2022-48704 * CVE-2022-48708 * CVE-2022-48710 * CVE-2023-0160 * CVE-2023-1829 * CVE-2023-42755 * CVE-2023-47233 * CVE-2023-52527 * CVE-2023-52586 * CVE-2023-52591 * CVE-2023-52646 * CVE-2023-52653 * CVE-2023-52655 * CVE-2023-52664 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52691 * CVE-2023-52696 * CVE-2023-52698 * CVE-2023-52703 * CVE-2023-52730 * CVE-2023-52732 * CVE-2023-52741 * CVE-2023-52742 * CVE-2023-52747 * CVE-2023-52759 * CVE-2023-52774 * CVE-2023-52781 * CVE-2023-52796 * CVE-2023-52803 * CVE-2023-52821 * CVE-2023-52864 * CVE-2023-52865 * CVE-2023-52867 * CVE-2023-52875 * CVE-2023-52880 * CVE-2024-0639 * CVE-2024-26625 * CVE-2024-26739 * CVE-2024-26752 * CVE-2024-26775 * CVE-2024-26791 * CVE-2024-26828 * CVE-2024-26846 * CVE-2024-26874 * CVE-2024-26876 * CVE-2024-26900 * CVE-2024-26915 * CVE-2024-26920 * CVE-2024-26921 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-26931 * CVE-2024-26934 * CVE-2024-26957 * CVE-2024-26958 * CVE-2024-26984 * CVE-2024-26996 * CVE-2024-27008 * CVE-2024-27054 * CVE-2024-27059 * CVE-2024-27062 * CVE-2024-27388 * CVE-2024-27396 * CVE-2024-27398 * CVE-2024-27401 * CVE-2024-27419 * CVE-2024-27436 * CVE-2024-35789 * CVE-2024-35791 * CVE-2024-35809 * CVE-2024-35811 * CVE-2024-35830 * CVE-2024-35849 * CVE-2024-35877 * CVE-2024-35878 * CVE-2024-35887 * CVE-2024-35895 * CVE-2024-35914 * CVE-2024-35932 * CVE-2024-35935 * CVE-2024-35936 * CVE-2024-35944 * CVE-2024-35955 * CVE-2024-35969 * CVE-2024-35982 * CVE-2024-36015 * CVE-2024-36029 * CVE-2024-36954 CVSS scores: * CVE-2021-46933 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-46933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47074 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47131 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47237 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47248 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47249 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47250 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47311 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47319 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47337 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47343 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47345 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47352 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47355 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47357 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47548 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-48672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48686 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42755 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-42755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52586 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves 198 vulnerabilities and has 28 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513). * CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854). * CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543). * CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545). * CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894). * CVE-2021-47238: Fixed memory leak in ip_mc_add1_src (bsc#1224847) * CVE-2021-47245: Fixed out of bounds when parsing TCP options (bsc#1224838) * CVE-2021-47246: Fixed page reclaim for dead peer hairpin (CVE-2021-47246 bsc#1224831). * CVE-2021-47249: Fixed memory leak in rds_recvmsg (bsc#1224880) * CVE-2021-47250: Fixed memory leak in netlbl_cipsov4_add_std (bsc#1224827) * CVE-2021-47265: Verify port when creating flow rule (bsc#1224957) * CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960). * CVE-2021-47281: Fixed race of snd_seq_timer_open() (bsc#1224983). * CVE-2021-47334: Fixed two use after free in ibmasm_init_one (bsc#1225112). * CVE-2021-47352: Add validation for used length (bsc#1225124). * CVE-2021-47355: Fixed possible use-after-free in nicstar_cleanup() (bsc#1225141). * CVE-2021-47357: Fixed possible use-after-free in ia_module_exit() (bsc#1225144). * CVE-2021-47361: Fixed error handling in mcb_alloc_bus() (bsc#1225151). * CVE-2021-47362: Update intermediate power state for SI (bsc#1225153). * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225208). * CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082) * CVE-2021-47401: Fixed stack information leak (bsc#1225242). * CVE-2021-47423: Fixed file release memory leak (bsc#1225366). * CVE-2021-47431: Fixed gart.bo pin_count leak (bsc#1225390). * CVE-2021-47469: Add SPI fix commit to be ignored (bsc#1225347) * CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907). * CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354) * CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355). * CVE-2021-47500: Fixed trigger reference couting (bsc#1225360). * CVE-2021-47509: Limit the period size to 16MB (bsc#1225409). * CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411). * CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506) * CVE-2022-48672: Fixed off-by-one error in unflatten_dt_nodes() (CVE-2022-48672 bsc#1223931). * CVE-2022-48686: Fixed UAF when detecting digest errors (bsc#1223948). * CVE-2022-48697: Fixed a use-after-free (bsc#1223922). * CVE-2022-48702: Fixed out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923). * CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932) * CVE-2022-48708: Fixed potential NULL dereference (bsc#1224942). * CVE-2022-48710: Fixed a possible null pointer dereference (bsc#1225230). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). * CVE-2023-42755: Check user supplied offsets (bsc#1215702). * CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081). * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169). * CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747). * CVE-2023-52691: Fixed a double-free in si_dpm_init (bsc#1224607). * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621) * CVE-2023-52730: Fixed possible resource leaks in some error paths (bsc#1224956). * CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222). * CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931) * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930). * CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022). * CVE-2023-52864: Fixed opening of char device (bsc#1225132). * CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086). * CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009). * CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096). * CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917). * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086) * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627). * CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793) * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). * CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023). * CVE-2024-26874: Fixed a null pointer crash in (bsc#1223048) * CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119). * CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046). * CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207) * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2024-26957: Fixed reference counting on zcrypt card objects (bsc#1223666). * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653). * CVE-2024-26984: Fixed instmem race condition around ptr stores (bsc#1223633) * CVE-2024-26996: Fixed UAF ncm object at re-bind after usb ep transport error (bsc#1223752). * CVE-2024-27008: Fixed out of bounds access (CVE-2024-27008 bsc#1223802). * CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834). * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181). * CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759) * CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803). * CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749). * CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725). * CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738). * CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680). * CVE-2024-35849: Fixed information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733). * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525). * CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671). * CVE-2024-35887: Fixed use-after-free bugs caused by ax25_ds_del_timer (bsc#1224663) * CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650). * CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645) * CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644) * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648). * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580). * CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566) * CVE-2024-36029: Prevent access to suspended controller (bsc#1225708) The following non-security bugs were fixed: * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes). * assoc_array: Fix BUG_ON during garbage collect. * autofs: fix a leak in autofs_expire_indirect() (git-fixes) * Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes). * btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes) * btrfs: check if root is readonly while setting security xattr (git-fixes) * btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes) * btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes) * btrfs: do not stop integrity writeback too early (git-fixes) * btrfs: Explicitly handle btrfs_update_root failure (git-fixes) * btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes) * btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes) * btrfs: fix deadlock when writing out space cache (git-fixes) * Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes) * btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes) * btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes) * btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes) * btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes) * btrfs: fix race when deleting quota root from the dirty cow roots list (git- fixes) * btrfs: fix range_end calculation in extent_write_locked_range (git-fixes) * btrfs: fix return value mixup in btrfs_get_extent (git-fixes) * btrfs: fix unaligned access in readdir (git-fixes) * btrfs: limit device extents to the device size (git-fixes) * btrfs: prevent to set invalid default subvolid (git-fixes) * btrfs: record delayed inode root in transaction (git-fixes) * btrfs: scrub: reject unsupported scrub flags (git-fixes) * btrfs: send: ensure send_fd is writable (git-fixes) * btrfs: send: in case of IO error log it (git-fixes) * btrfs: send: limit number of clones and allocated memory size (git-fixes) * btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include * btrfs: tree-checker: add missing return after error in root_item (git-fixes) * btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes) * btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes) * btrfs: tree-checker: fix inline ref size in error messages (git-fixes) * btrfs: tree-checker: Fix misleading group system information (git-fixes) * btrfs: undo writable superblocke when sprouting fails (git-fixes) * btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes) * ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes) * ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes) * ecryptfs: fix kernel panic with null dev_name (git-fixes) * ecryptfs: Fix typo in message (git-fixes) * ep_create_wakeup_source(): dentry name can change under you (git-fixes) * exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes) * fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes) * fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes) * ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git- fixes). * ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git- fixes). * kprobes: Fix possible use-after-free issue on kprobe registration (git- fixes). * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059). * l2tp: pass correct message length to ip6_append_data (git-fixes). * lib/mpi: use kcalloc in mpi_resize (git-fixes). * list: fix a data-race around ep->rdllist (git-fixes). * livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539). * mass-cve: Add convenience KBUILD_USER environment variable * mass-cve: Always use bash in Makefile Some constrcts are just too convenient to leave them in favor of POSIX'd /bin/sh. Switch to explicit bash. * mass-cve: Fail early without data files curl >$@ would create/update the file even if download fails. Use explicit argument to prevent continuation with empty cve2bugzilla file. * mass-cve: Fix update detection with packed-refs Per-branch files are thing of the past, git may non-deterministically pack the ref files. Therefore use the timestamp of the whole packed-ref file (better false positive detection of update than breakage or false negative). Add unified approach to read packed-refs regardless of KSOURCE_GIT worktree or not. * mass-cve: Make BRANCH mandatory * mass-cve: Use dedicated worktree for reference updates So that any checkout in KSOURCE_GIT is not changed. * net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes). * netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes). * netfilter: nft_compat: explicitly reject ERROR and standard target (git- fixes). * netfilter: x_tables: set module owner for icmp(6) matches (git-fixes). * net/smc: fix fallback failed while sendmsg with fastopen (git-fixes). * net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes). * net/tls: Remove the context from the list in tls_device_down (bsc#1221545). * net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes). * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes). * net: usb: sr9700: stop lying about skb->truesize (git-fixes). * net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360). * nfc: change order inside nfc_se_io error path (git-fixes). * powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes). * ppdev: Add an error check in register_device (git-fixes). * printk: Disable passing console lock owner completely during panic() (bsc#1197894). * printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969). * rds: avoid unenecessary cong_update in loop transport (git-fixes). * rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes). * ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes). * ring-buffer: Fix a race between readers and resize checks (bsc#1222893). * rxrpc: Do not put crypto buffers on the stack (git-fixes). * rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes). * rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls (git-fixes). * rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git- fixes). * rxrpc: Work around usercopy check (git-fixes). * s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347). * s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062). * scripts/check-kernel-fix: add -F parameter * scripts/check-kernel-fix: avoid rechecking child branches when parents are OK Topological sorted dependency tree allows to optimize check-kernel-fixe in cases where parent already has the fix. There is not reason to check branches which merge from that branch as they will get the fix eventually. * scripts/check-kernel-fix: print a message when no action is needed. Script exits without printing anything about the actions necessary in non-verbose mode. This can be confusing to a beginner user. * scripts/common-functions: for_each_build_branch traverse branches in dependency topo sorted list * scripts/common-functions: There are cases where Fixes tag is incorrect. Example would be bsc1223062 comment 3. * scripts/cve_tools: Update README Issue was fixed in ad3235427c3 * scripts/git_sort/git_sort.py: add rafael/linux-pm.git#linux-next to remotes * scripts/log2: Fix References: update detection The following change -REferences: git-fixes +REferences: git-fixes bsc#123456 (note the typo in E) will not be detected as a reference update and generates a commit message like * scripts/PMU: Always use 12 digits for abbreviated hash references Kernel developers tend to use 12 digits for abbreviated hash references as this is mandatory for upstream work. Enforce this count in PMU for consistency. * tcp: tcp_make_synack() can be called from process context (git-fixes). * tls: Fix context leak on tls_device_down (bsc#1221545). * tracing: Fix blocked reader of snapshot buffer (git-fixes). * tracing: hide unused ftrace_event_id_fops (git-fixes). * tracing: Use .flush() call to wake up readers (git-fixes). * tracing: Use strncpy instead of memcpy when copying comm in trace.c (git- fixes). * tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540). * usb: aqc111: stop lying about skb->truesize (git-fixes). * wifi: cfg80211: avoid leaking stack data into trace (git-fixes). * wifi: radiotap: fix kernel-doc notation warnings (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2184=1 SUSE-SLE- SERVER-12-SP5-2024-2184=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2184=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-2184=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2184=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2184=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2184=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-2184=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * kernel-default-base-debuginfo-4.12.14-122.219.1 * kernel-default-base-4.12.14-122.219.1 * ocfs2-kmp-default-4.12.14-122.219.1 * gfs2-kmp-default-debuginfo-4.12.14-122.219.1 * dlm-kmp-default-debuginfo-4.12.14-122.219.1 * kernel-syms-4.12.14-122.219.1 * cluster-md-kmp-default-4.12.14-122.219.1 * kernel-default-debugsource-4.12.14-122.219.1 * dlm-kmp-default-4.12.14-122.219.1 * kernel-default-devel-4.12.14-122.219.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.219.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.219.1 * kernel-default-debuginfo-4.12.14-122.219.1 * gfs2-kmp-default-4.12.14-122.219.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le x86_64) * kernel-default-4.12.14-122.219.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-macros-4.12.14-122.219.1 * kernel-source-4.12.14-122.219.1 * kernel-devel-4.12.14-122.219.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.219.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64) * ocfs2-kmp-default-4.12.14-122.219.1 * gfs2-kmp-default-debuginfo-4.12.14-122.219.1 * dlm-kmp-default-debuginfo-4.12.14-122.219.1 * cluster-md-kmp-default-4.12.14-122.219.1 * kernel-default-debugsource-4.12.14-122.219.1 * dlm-kmp-default-4.12.14-122.219.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.219.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.219.1 * kernel-default-debuginfo-4.12.14-122.219.1 * gfs2-kmp-default-4.12.14-122.219.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc) * kernel-default-4.12.14-122.219.1 * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc) * kernel-default-4.12.14-122.219.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kernel-default-kgraft-4.12.14-122.219.1 * kernel-default-debugsource-4.12.14-122.219.1 * kernel-default-kgraft-devel-4.12.14-122.219.1 * kgraft-patch-4_12_14-122_219-default-1-8.3.1 * kernel-default-debuginfo-4.12.14-122.219.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch nosrc) * kernel-docs-4.12.14-122.219.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-4.12.14-122.219.1 * kernel-obs-build-debugsource-4.12.14-122.219.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 nosrc x86_64) * kernel-default-4.12.14-122.219.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * kernel-default-base-debuginfo-4.12.14-122.219.1 * kernel-default-base-4.12.14-122.219.1 * kernel-syms-4.12.14-122.219.1 * kernel-default-debugsource-4.12.14-122.219.1 * kernel-default-devel-4.12.14-122.219.1 * kernel-default-debuginfo-4.12.14-122.219.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-macros-4.12.14-122.219.1 * kernel-source-4.12.14-122.219.1 * kernel-devel-4.12.14-122.219.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.219.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-122.219.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * kernel-default-base-debuginfo-4.12.14-122.219.1 * kernel-default-base-4.12.14-122.219.1 * kernel-syms-4.12.14-122.219.1 * kernel-default-debugsource-4.12.14-122.219.1 * kernel-default-devel-4.12.14-122.219.1 * kernel-default-debuginfo-4.12.14-122.219.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-macros-4.12.14-122.219.1 * kernel-source-4.12.14-122.219.1 * kernel-devel-4.12.14-122.219.1 * SUSE Linux Enterprise Server 12 SP5 (s390x) * kernel-default-man-4.12.14-122.219.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.219.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (nosrc) * kernel-default-4.12.14-122.219.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * kernel-default-extra-debuginfo-4.12.14-122.219.1 * kernel-default-extra-4.12.14-122.219.1 * kernel-default-debuginfo-4.12.14-122.219.1 * kernel-default-debugsource-4.12.14-122.219.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46933.html * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47074.html * https://www.suse.com/security/cve/CVE-2021-47113.html * https://www.suse.com/security/cve/CVE-2021-47131.html * https://www.suse.com/security/cve/CVE-2021-47162.html * https://www.suse.com/security/cve/CVE-2021-47171.html * https://www.suse.com/security/cve/CVE-2021-47188.html * https://www.suse.com/security/cve/CVE-2021-47206.html * https://www.suse.com/security/cve/CVE-2021-47220.html * https://www.suse.com/security/cve/CVE-2021-47229.html * https://www.suse.com/security/cve/CVE-2021-47231.html * https://www.suse.com/security/cve/CVE-2021-47235.html * https://www.suse.com/security/cve/CVE-2021-47236.html * https://www.suse.com/security/cve/CVE-2021-47237.html * https://www.suse.com/security/cve/CVE-2021-47238.html * https://www.suse.com/security/cve/CVE-2021-47239.html * https://www.suse.com/security/cve/CVE-2021-47245.html * https://www.suse.com/security/cve/CVE-2021-47246.html * https://www.suse.com/security/cve/CVE-2021-47248.html * https://www.suse.com/security/cve/CVE-2021-47249.html * https://www.suse.com/security/cve/CVE-2021-47250.html * https://www.suse.com/security/cve/CVE-2021-47252.html * https://www.suse.com/security/cve/CVE-2021-47254.html * https://www.suse.com/security/cve/CVE-2021-47258.html * https://www.suse.com/security/cve/CVE-2021-47260.html * https://www.suse.com/security/cve/CVE-2021-47261.html * https://www.suse.com/security/cve/CVE-2021-47265.html * https://www.suse.com/security/cve/CVE-2021-47269.html * https://www.suse.com/security/cve/CVE-2021-47274.html * https://www.suse.com/security/cve/CVE-2021-47276.html * https://www.suse.com/security/cve/CVE-2021-47277.html * https://www.suse.com/security/cve/CVE-2021-47280.html * https://www.suse.com/security/cve/CVE-2021-47281.html * https://www.suse.com/security/cve/CVE-2021-47284.html * https://www.suse.com/security/cve/CVE-2021-47285.html * https://www.suse.com/security/cve/CVE-2021-47288.html * https://www.suse.com/security/cve/CVE-2021-47301.html * https://www.suse.com/security/cve/CVE-2021-47302.html * https://www.suse.com/security/cve/CVE-2021-47305.html * https://www.suse.com/security/cve/CVE-2021-47307.html * https://www.suse.com/security/cve/CVE-2021-47308.html * https://www.suse.com/security/cve/CVE-2021-47310.html * https://www.suse.com/security/cve/CVE-2021-47311.html * https://www.suse.com/security/cve/CVE-2021-47314.html * https://www.suse.com/security/cve/CVE-2021-47315.html * https://www.suse.com/security/cve/CVE-2021-47319.html * https://www.suse.com/security/cve/CVE-2021-47320.html * https://www.suse.com/security/cve/CVE-2021-47321.html * https://www.suse.com/security/cve/CVE-2021-47323.html * https://www.suse.com/security/cve/CVE-2021-47324.html * https://www.suse.com/security/cve/CVE-2021-47330.html * https://www.suse.com/security/cve/CVE-2021-47334.html * https://www.suse.com/security/cve/CVE-2021-47337.html * https://www.suse.com/security/cve/CVE-2021-47343.html * https://www.suse.com/security/cve/CVE-2021-47344.html * https://www.suse.com/security/cve/CVE-2021-47345.html * https://www.suse.com/security/cve/CVE-2021-47347.html * https://www.suse.com/security/cve/CVE-2021-47352.html * https://www.suse.com/security/cve/CVE-2021-47353.html * https://www.suse.com/security/cve/CVE-2021-47355.html * https://www.suse.com/security/cve/CVE-2021-47356.html * https://www.suse.com/security/cve/CVE-2021-47357.html * https://www.suse.com/security/cve/CVE-2021-47361.html * https://www.suse.com/security/cve/CVE-2021-47362.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47397.html * https://www.suse.com/security/cve/CVE-2021-47400.html * https://www.suse.com/security/cve/CVE-2021-47401.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47409.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47435.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47458.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47469.html * https://www.suse.com/security/cve/CVE-2021-47472.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47478.html * https://www.suse.com/security/cve/CVE-2021-47480.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47509.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47523.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47548.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2022-48636.html * https://www.suse.com/security/cve/CVE-2022-48650.html * https://www.suse.com/security/cve/CVE-2022-48672.html * https://www.suse.com/security/cve/CVE-2022-48686.html * https://www.suse.com/security/cve/CVE-2022-48697.html * https://www.suse.com/security/cve/CVE-2022-48702.html * https://www.suse.com/security/cve/CVE-2022-48704.html * https://www.suse.com/security/cve/CVE-2022-48708.html * https://www.suse.com/security/cve/CVE-2022-48710.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-42755.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52527.html * https://www.suse.com/security/cve/CVE-2023-52586.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52646.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52698.html * https://www.suse.com/security/cve/CVE-2023-52703.html * https://www.suse.com/security/cve/CVE-2023-52730.html * https://www.suse.com/security/cve/CVE-2023-52732.html * https://www.suse.com/security/cve/CVE-2023-52741.html * https://www.suse.com/security/cve/CVE-2023-52742.html * https://www.suse.com/security/cve/CVE-2023-52747.html * https://www.suse.com/security/cve/CVE-2023-52759.html * https://www.suse.com/security/cve/CVE-2023-52774.html * https://www.suse.com/security/cve/CVE-2023-52781.html * https://www.suse.com/security/cve/CVE-2023-52796.html * https://www.suse.com/security/cve/CVE-2023-52803.html * https://www.suse.com/security/cve/CVE-2023-52821.html * https://www.suse.com/security/cve/CVE-2023-52864.html * https://www.suse.com/security/cve/CVE-2023-52865.html * https://www.suse.com/security/cve/CVE-2023-52867.html * https://www.suse.com/security/cve/CVE-2023-52875.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2024-0639.html * https://www.suse.com/security/cve/CVE-2024-26625.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26752.html * https://www.suse.com/security/cve/CVE-2024-26775.html * https://www.suse.com/security/cve/CVE-2024-26791.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26874.html * https://www.suse.com/security/cve/CVE-2024-26876.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26915.html * https://www.suse.com/security/cve/CVE-2024-26920.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-26931.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26958.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27054.html * https://www.suse.com/security/cve/CVE-2024-27059.html * https://www.suse.com/security/cve/CVE-2024-27062.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27396.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27401.html * https://www.suse.com/security/cve/CVE-2024-27419.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35791.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35877.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35935.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35944.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35969.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-36015.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1101816 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1185902 * https://bugzilla.suse.com/show_bug.cgi?id=1187716 * https://bugzilla.suse.com/show_bug.cgi?id=1188616 * https://bugzilla.suse.com/show_bug.cgi?id=1190317 * https://bugzilla.suse.com/show_bug.cgi?id=1190795 * https://bugzilla.suse.com/show_bug.cgi?id=1191452 * https://bugzilla.suse.com/show_bug.cgi?id=1194591 * https://bugzilla.suse.com/show_bug.cgi?id=1197760 * https://bugzilla.suse.com/show_bug.cgi?id=1197894 * https://bugzilla.suse.com/show_bug.cgi?id=1203935 * https://bugzilla.suse.com/show_bug.cgi?id=1206213 * https://bugzilla.suse.com/show_bug.cgi?id=1206646 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1215702 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217519 * https://bugzilla.suse.com/show_bug.cgi?id=1218917 * https://bugzilla.suse.com/show_bug.cgi?id=1220487 * https://bugzilla.suse.com/show_bug.cgi?id=1220513 * https://bugzilla.suse.com/show_bug.cgi?id=1220854 * https://bugzilla.suse.com/show_bug.cgi?id=1220928 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221081 * https://bugzilla.suse.com/show_bug.cgi?id=1221086 * https://bugzilla.suse.com/show_bug.cgi?id=1221543 * https://bugzilla.suse.com/show_bug.cgi?id=1221545 * https://bugzilla.suse.com/show_bug.cgi?id=1221816 * https://bugzilla.suse.com/show_bug.cgi?id=1221977 * https://bugzilla.suse.com/show_bug.cgi?id=1221994 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222627 * https://bugzilla.suse.com/show_bug.cgi?id=1222667 * https://bugzilla.suse.com/show_bug.cgi?id=1222671 * https://bugzilla.suse.com/show_bug.cgi?id=1222793 * https://bugzilla.suse.com/show_bug.cgi?id=1222893 * https://bugzilla.suse.com/show_bug.cgi?id=1222894 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223048 * https://bugzilla.suse.com/show_bug.cgi?id=1223062 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223119 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223207 * https://bugzilla.suse.com/show_bug.cgi?id=1223360 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223432 * https://bugzilla.suse.com/show_bug.cgi?id=1223509 * https://bugzilla.suse.com/show_bug.cgi?id=1223512 * https://bugzilla.suse.com/show_bug.cgi?id=1223539 * https://bugzilla.suse.com/show_bug.cgi?id=1223540 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223627 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223653 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223738 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223819 * https://bugzilla.suse.com/show_bug.cgi?id=1223834 * https://bugzilla.suse.com/show_bug.cgi?id=1223922 * https://bugzilla.suse.com/show_bug.cgi?id=1223923 * https://bugzilla.suse.com/show_bug.cgi?id=1223931 * https://bugzilla.suse.com/show_bug.cgi?id=1223932 * https://bugzilla.suse.com/show_bug.cgi?id=1223948 * https://bugzilla.suse.com/show_bug.cgi?id=1223969 * https://bugzilla.suse.com/show_bug.cgi?id=1224096 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224181 * https://bugzilla.suse.com/show_bug.cgi?id=1224347 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224525 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224580 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224621 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224645 * https://bugzilla.suse.com/show_bug.cgi?id=1224648 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224725 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224759 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224827 * https://bugzilla.suse.com/show_bug.cgi?id=1224830 * https://bugzilla.suse.com/show_bug.cgi?id=1224831 * https://bugzilla.suse.com/show_bug.cgi?id=1224834 * https://bugzilla.suse.com/show_bug.cgi?id=1224838 * https://bugzilla.suse.com/show_bug.cgi?id=1224841 * https://bugzilla.suse.com/show_bug.cgi?id=1224844 * https://bugzilla.suse.com/show_bug.cgi?id=1224846 * https://bugzilla.suse.com/show_bug.cgi?id=1224847 * https://bugzilla.suse.com/show_bug.cgi?id=1224849 * https://bugzilla.suse.com/show_bug.cgi?id=1224854 * https://bugzilla.suse.com/show_bug.cgi?id=1224859 * https://bugzilla.suse.com/show_bug.cgi?id=1224867 * https://bugzilla.suse.com/show_bug.cgi?id=1224880 * https://bugzilla.suse.com/show_bug.cgi?id=1224882 * https://bugzilla.suse.com/show_bug.cgi?id=1224888 * https://bugzilla.suse.com/show_bug.cgi?id=1224889 * https://bugzilla.suse.com/show_bug.cgi?id=1224892 * https://bugzilla.suse.com/show_bug.cgi?id=1224893 * https://bugzilla.suse.com/show_bug.cgi?id=1224899 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224916 * https://bugzilla.suse.com/show_bug.cgi?id=1224917 * https://bugzilla.suse.com/show_bug.cgi?id=1224922 * https://bugzilla.suse.com/show_bug.cgi?id=1224926 * https://bugzilla.suse.com/show_bug.cgi?id=1224930 * https://bugzilla.suse.com/show_bug.cgi?id=1224931 * https://bugzilla.suse.com/show_bug.cgi?id=1224942 * https://bugzilla.suse.com/show_bug.cgi?id=1224954 * https://bugzilla.suse.com/show_bug.cgi?id=1224956 * https://bugzilla.suse.com/show_bug.cgi?id=1224957 * https://bugzilla.suse.com/show_bug.cgi?id=1224959 * https://bugzilla.suse.com/show_bug.cgi?id=1224960 * https://bugzilla.suse.com/show_bug.cgi?id=1224961 * https://bugzilla.suse.com/show_bug.cgi?id=1224963 * https://bugzilla.suse.com/show_bug.cgi?id=1224966 * https://bugzilla.suse.com/show_bug.cgi?id=1224968 * https://bugzilla.suse.com/show_bug.cgi?id=1224981 * https://bugzilla.suse.com/show_bug.cgi?id=1224982 * https://bugzilla.suse.com/show_bug.cgi?id=1224983 * https://bugzilla.suse.com/show_bug.cgi?id=1224987 * https://bugzilla.suse.com/show_bug.cgi?id=1224990 * https://bugzilla.suse.com/show_bug.cgi?id=1224996 * https://bugzilla.suse.com/show_bug.cgi?id=1225008 * https://bugzilla.suse.com/show_bug.cgi?id=1225009 * https://bugzilla.suse.com/show_bug.cgi?id=1225010 * https://bugzilla.suse.com/show_bug.cgi?id=1225022 * https://bugzilla.suse.com/show_bug.cgi?id=1225026 * https://bugzilla.suse.com/show_bug.cgi?id=1225030 * https://bugzilla.suse.com/show_bug.cgi?id=1225054 * https://bugzilla.suse.com/show_bug.cgi?id=1225058 * https://bugzilla.suse.com/show_bug.cgi?id=1225059 * https://bugzilla.suse.com/show_bug.cgi?id=1225060 * https://bugzilla.suse.com/show_bug.cgi?id=1225062 * https://bugzilla.suse.com/show_bug.cgi?id=1225082 * https://bugzilla.suse.com/show_bug.cgi?id=1225084 * https://bugzilla.suse.com/show_bug.cgi?id=1225086 * https://bugzilla.suse.com/show_bug.cgi?id=1225092 * https://bugzilla.suse.com/show_bug.cgi?id=1225096 * https://bugzilla.suse.com/show_bug.cgi?id=1225112 * https://bugzilla.suse.com/show_bug.cgi?id=1225124 * https://bugzilla.suse.com/show_bug.cgi?id=1225128 * https://bugzilla.suse.com/show_bug.cgi?id=1225132 * https://bugzilla.suse.com/show_bug.cgi?id=1225141 * https://bugzilla.suse.com/show_bug.cgi?id=1225143 * https://bugzilla.suse.com/show_bug.cgi?id=1225144 * https://bugzilla.suse.com/show_bug.cgi?id=1225151 * https://bugzilla.suse.com/show_bug.cgi?id=1225153 * https://bugzilla.suse.com/show_bug.cgi?id=1225155 * https://bugzilla.suse.com/show_bug.cgi?id=1225157 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225177 * https://bugzilla.suse.com/show_bug.cgi?id=1225189 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225198 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225222 * https://bugzilla.suse.com/show_bug.cgi?id=1225230 * https://bugzilla.suse.com/show_bug.cgi?id=1225242 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225247 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225252 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225322 * https://bugzilla.suse.com/show_bug.cgi?id=1225329 * https://bugzilla.suse.com/show_bug.cgi?id=1225330 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225347 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225409 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225438 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225479 * https://bugzilla.suse.com/show_bug.cgi?id=1225482 * https://bugzilla.suse.com/show_bug.cgi?id=1225506 * https://bugzilla.suse.com/show_bug.cgi?id=1225549 * https://bugzilla.suse.com/show_bug.cgi?id=1225560 * https://bugzilla.suse.com/show_bug.cgi?id=1225572 * https://bugzilla.suse.com/show_bug.cgi?id=1225640 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 20:31:47 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 20:31:47 -0000 Subject: SUSE-SU-2024:2183-1: important: Security update for the Linux Kernel Message-ID: <171926110756.28263.11451977623496686778@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:2183-1 Rating: important References: * bsc#1065729 * bsc#1151927 * bsc#1154353 * bsc#1156395 * bsc#1174585 * bsc#1176869 * bsc#1184631 * bsc#1185589 * bsc#1185902 * bsc#1188616 * bsc#1188772 * bsc#1189883 * bsc#1190795 * bsc#1191452 * bsc#1192107 * bsc#1194288 * bsc#1196956 * bsc#1200619 * bsc#1208813 * bsc#1209657 * bsc#1210335 * bsc#1210629 * bsc#1215356 * bsc#1215420 * bsc#1216702 * bsc#1217169 * bsc#1220137 * bsc#1220144 * bsc#1220754 * bsc#1220877 * bsc#1220960 * bsc#1221044 * bsc#1221829 * bsc#1222251 * bsc#1222619 * bsc#1223084 * bsc#1223384 * bsc#1223390 * bsc#1223934 * bsc#1224099 * bsc#1224174 * bsc#1224438 * bsc#1224482 * bsc#1224511 * bsc#1224592 * bsc#1224831 * bsc#1224832 * bsc#1224834 * bsc#1224841 * bsc#1224843 * bsc#1224846 * bsc#1224849 * bsc#1224854 * bsc#1224859 * bsc#1224882 * bsc#1224888 * bsc#1224889 * bsc#1224891 * bsc#1224892 * bsc#1224893 * bsc#1224904 * bsc#1224907 * bsc#1224909 * bsc#1224916 * bsc#1224917 * bsc#1224922 * bsc#1224923 * bsc#1224924 * bsc#1224928 * bsc#1224953 * bsc#1224954 * bsc#1224961 * bsc#1224963 * bsc#1224965 * bsc#1224966 * bsc#1224968 * bsc#1224981 * bsc#1224982 * bsc#1224984 * bsc#1224987 * bsc#1224990 * bsc#1224993 * bsc#1224996 * bsc#1224997 * bsc#1225026 * bsc#1225030 * bsc#1225058 * bsc#1225060 * bsc#1225084 * bsc#1225091 * bsc#1225112 * bsc#1225113 * bsc#1225140 * bsc#1225143 * bsc#1225164 * bsc#1225177 * bsc#1225181 * bsc#1225192 * bsc#1225193 * bsc#1225201 * bsc#1225206 * bsc#1225207 * bsc#1225208 * bsc#1225214 * bsc#1225223 * bsc#1225224 * bsc#1225232 * bsc#1225238 * bsc#1225244 * bsc#1225251 * bsc#1225256 * bsc#1225261 * bsc#1225262 * bsc#1225263 * bsc#1225301 * bsc#1225303 * bsc#1225318 * bsc#1225321 * bsc#1225326 * bsc#1225327 * bsc#1225328 * bsc#1225336 * bsc#1225341 * bsc#1225346 * bsc#1225351 * bsc#1225354 * bsc#1225355 * bsc#1225360 * bsc#1225366 * bsc#1225367 * bsc#1225384 * bsc#1225390 * bsc#1225393 * bsc#1225400 * bsc#1225404 * bsc#1225411 * bsc#1225427 * bsc#1225437 * bsc#1225448 * bsc#1225453 * bsc#1225455 * bsc#1225499 * bsc#1225500 * bsc#1225534 Cross-References: * CVE-2021-3743 * CVE-2021-39698 * CVE-2021-43056 * CVE-2021-47104 * CVE-2021-47220 * CVE-2021-47229 * CVE-2021-47231 * CVE-2021-47236 * CVE-2021-47239 * CVE-2021-47240 * CVE-2021-47246 * CVE-2021-47252 * CVE-2021-47254 * CVE-2021-47255 * CVE-2021-47259 * CVE-2021-47260 * CVE-2021-47261 * CVE-2021-47267 * CVE-2021-47269 * CVE-2021-47270 * CVE-2021-47274 * CVE-2021-47275 * CVE-2021-47276 * CVE-2021-47280 * CVE-2021-47284 * CVE-2021-47285 * CVE-2021-47288 * CVE-2021-47289 * CVE-2021-47296 * CVE-2021-47301 * CVE-2021-47302 * CVE-2021-47305 * CVE-2021-47307 * CVE-2021-47308 * CVE-2021-47314 * CVE-2021-47315 * CVE-2021-47320 * CVE-2021-47321 * CVE-2021-47323 * CVE-2021-47324 * CVE-2021-47330 * CVE-2021-47332 * CVE-2021-47333 * CVE-2021-47334 * CVE-2021-47338 * CVE-2021-47341 * CVE-2021-47344 * CVE-2021-47347 * CVE-2021-47350 * CVE-2021-47354 * CVE-2021-47356 * CVE-2021-47369 * CVE-2021-47375 * CVE-2021-47378 * CVE-2021-47381 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47388 * CVE-2021-47391 * CVE-2021-47393 * CVE-2021-47395 * CVE-2021-47396 * CVE-2021-47399 * CVE-2021-47402 * CVE-2021-47404 * CVE-2021-47405 * CVE-2021-47416 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47425 * CVE-2021-47431 * CVE-2021-47434 * CVE-2021-47436 * CVE-2021-47441 * CVE-2021-47442 * CVE-2021-47443 * CVE-2021-47445 * CVE-2021-47456 * CVE-2021-47460 * CVE-2021-47464 * CVE-2021-47465 * CVE-2021-47468 * CVE-2021-47473 * CVE-2021-47482 * CVE-2021-47483 * CVE-2021-47485 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47500 * CVE-2021-47505 * CVE-2021-47506 * CVE-2021-47511 * CVE-2021-47516 * CVE-2021-47522 * CVE-2021-47527 * CVE-2021-47538 * CVE-2021-47541 * CVE-2021-47542 * CVE-2021-47562 * CVE-2021-47563 * CVE-2021-47565 * CVE-2022-20132 * CVE-2022-48673 * CVE-2023-0160 * CVE-2023-1829 * CVE-2023-2176 * CVE-2023-424 * CVE-2023-4244 * CVE-2023-47233 * CVE-2023-52433 * CVE-2023-52581 * CVE-2023-52591 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52686 * CVE-2023-52840 * CVE-2023-52871 * CVE-2023-52880 * CVE-2023-6531 * CVE-2024-26581 * CVE-2024-26643 * CVE-2024-26828 * CVE-2024-26925 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-27413 * CVE-2024-35811 * CVE-2024-35895 * CVE-2024-35914 CVSS scores: * CVE-2021-3743 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47259 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47267 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47296 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47333 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47338 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47341 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47538 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-20132 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2022-20132 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4244 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4244 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52433 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26581 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Proxy 4.1 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Server 4.1 An update that solves 131 vulnerabilities and has 13 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355). * CVE-2021-47500: Fixed trigger reference couting (bsc#1225360). * CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208). * CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420). * CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201). * CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354) * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934). * CVE-2023-52871: Handle a second device without data corruption (bsc#1225534) * CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084). * CVE-2024-27413: Fix incorrect allocation size (bsc#1224438). * CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928). * CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954) * CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888). * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169). * CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729). The following non-security bugs were fixed: * NFC: nxp: add NXP1002 (bsc#1185589). * PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243). * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * btrfs: do not start relocation until in progress drops are done (bsc#1222251). * md: Replace snprintf with scnprintf (git-fixes). * netfilter: nf_tables: GC transaction race with abort path (git-fixes). * netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes). * netfilter: nf_tables: defer gc run if previous batch is still pending (git- fixes). * netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path (git-fixes). * netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes). * netfilter: nf_tables: fix memleak when more than 255 elements expired (git- fixes). * netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes). * netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (git-fixes). * netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git- fixes). * netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (git-fixes). * netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes). * netfilter: nf_tables: use correct lock to protect gc_list (git-fixes). * netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git- fixes). * netfilter: nft_set_rbtree: Add missing expired checks (git-fixes). * netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match (git-fixes). * netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes). * netfilter: nft_set_rbtree: Do not account for expired elements on insertion (git-fixes). * netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on insertion (git-fixes). * netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap detection (git-fixes). * netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start() (git-fixes). * netfilter: nft_set_rbtree: Switch to node list walk for overlap detection (git-fixes). * netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named sets (git-fixes). * netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes). * netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes). * netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (git-fixes). * netfilter: nft_set_rbtree: skip elements in transaction from garbage collection (git-fixes). * netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes). * netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction (git-fixes). * netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes). * x86/pkeys: Revert a5eff7259790 ("x86/pkeys: Add PKRU value to init_fpstate") (bsc#1215356). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-2183=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-2183=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2183=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2183=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2183=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (nosrc) * kernel-default-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP2_Update_49-debugsource-1-150200.5.3.1 * kernel-default-livepatch-5.3.18-150200.24.194.1 * kernel-default-livepatch-devel-5.3.18-150200.24.194.1 * kernel-default-debuginfo-5.3.18-150200.24.194.1 * kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1 * kernel-default-debugsource-5.3.18-150200.24.194.1 * kernel-livepatch-5_3_18-150200_24_194-default-debuginfo-1-150200.5.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-debuginfo-5.3.18-150200.24.194.1 * cluster-md-kmp-default-debuginfo-5.3.18-150200.24.194.1 * dlm-kmp-default-debuginfo-5.3.18-150200.24.194.1 * gfs2-kmp-default-5.3.18-150200.24.194.1 * cluster-md-kmp-default-5.3.18-150200.24.194.1 * ocfs2-kmp-default-debuginfo-5.3.18-150200.24.194.1 * dlm-kmp-default-5.3.18-150200.24.194.1 * kernel-default-debuginfo-5.3.18-150200.24.194.1 * ocfs2-kmp-default-5.3.18-150200.24.194.1 * kernel-default-debugsource-5.3.18-150200.24.194.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (nosrc) * kernel-default-5.3.18-150200.24.194.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150200.24.194.1 * kernel-default-5.3.18-150200.24.194.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1 * kernel-preempt-debuginfo-5.3.18-150200.24.194.1 * kernel-preempt-devel-5.3.18-150200.24.194.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.194.1 * kernel-obs-build-5.3.18-150200.24.194.1 * kernel-default-debuginfo-5.3.18-150200.24.194.1 * kernel-default-devel-debuginfo-5.3.18-150200.24.194.1 * kernel-default-devel-5.3.18-150200.24.194.1 * kernel-preempt-debugsource-5.3.18-150200.24.194.1 * kernel-default-debugsource-5.3.18-150200.24.194.1 * kernel-syms-5.3.18-150200.24.194.1 * kernel-obs-build-debugsource-5.3.18-150200.24.194.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * kernel-source-5.3.18-150200.24.194.1 * kernel-devel-5.3.18-150200.24.194.1 * kernel-macros-5.3.18-150200.24.194.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1 * kernel-obs-build-5.3.18-150200.24.194.1 * reiserfs-kmp-default-debuginfo-5.3.18-150200.24.194.1 * reiserfs-kmp-default-5.3.18-150200.24.194.1 * kernel-default-debuginfo-5.3.18-150200.24.194.1 * kernel-default-devel-debuginfo-5.3.18-150200.24.194.1 * kernel-default-devel-5.3.18-150200.24.194.1 * kernel-default-debugsource-5.3.18-150200.24.194.1 * kernel-syms-5.3.18-150200.24.194.1 * kernel-obs-build-debugsource-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * kernel-source-5.3.18-150200.24.194.1 * kernel-devel-5.3.18-150200.24.194.1 * kernel-macros-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * kernel-preempt-debugsource-5.3.18-150200.24.194.1 * kernel-preempt-devel-5.3.18-150200.24.194.1 * kernel-preempt-debuginfo-5.3.18-150200.24.194.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1 * kernel-obs-build-5.3.18-150200.24.194.1 * reiserfs-kmp-default-debuginfo-5.3.18-150200.24.194.1 * reiserfs-kmp-default-5.3.18-150200.24.194.1 * kernel-default-debuginfo-5.3.18-150200.24.194.1 * kernel-default-devel-debuginfo-5.3.18-150200.24.194.1 * kernel-default-devel-5.3.18-150200.24.194.1 * kernel-default-debugsource-5.3.18-150200.24.194.1 * kernel-syms-5.3.18-150200.24.194.1 * kernel-obs-build-debugsource-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * kernel-source-5.3.18-150200.24.194.1 * kernel-devel-5.3.18-150200.24.194.1 * kernel-macros-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc x86_64) * kernel-preempt-5.3.18-150200.24.194.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * kernel-preempt-debugsource-5.3.18-150200.24.194.1 * kernel-preempt-devel-5.3.18-150200.24.194.1 * kernel-preempt-debuginfo-5.3.18-150200.24.194.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.194.1 ## References: * https://www.suse.com/security/cve/CVE-2021-3743.html * https://www.suse.com/security/cve/CVE-2021-39698.html * https://www.suse.com/security/cve/CVE-2021-43056.html * https://www.suse.com/security/cve/CVE-2021-47104.html * https://www.suse.com/security/cve/CVE-2021-47220.html * https://www.suse.com/security/cve/CVE-2021-47229.html * https://www.suse.com/security/cve/CVE-2021-47231.html * https://www.suse.com/security/cve/CVE-2021-47236.html * https://www.suse.com/security/cve/CVE-2021-47239.html * https://www.suse.com/security/cve/CVE-2021-47240.html * https://www.suse.com/security/cve/CVE-2021-47246.html * https://www.suse.com/security/cve/CVE-2021-47252.html * https://www.suse.com/security/cve/CVE-2021-47254.html * https://www.suse.com/security/cve/CVE-2021-47255.html * https://www.suse.com/security/cve/CVE-2021-47259.html * https://www.suse.com/security/cve/CVE-2021-47260.html * https://www.suse.com/security/cve/CVE-2021-47261.html * https://www.suse.com/security/cve/CVE-2021-47267.html * https://www.suse.com/security/cve/CVE-2021-47269.html * https://www.suse.com/security/cve/CVE-2021-47270.html * https://www.suse.com/security/cve/CVE-2021-47274.html * https://www.suse.com/security/cve/CVE-2021-47275.html * https://www.suse.com/security/cve/CVE-2021-47276.html * https://www.suse.com/security/cve/CVE-2021-47280.html * https://www.suse.com/security/cve/CVE-2021-47284.html * https://www.suse.com/security/cve/CVE-2021-47285.html * https://www.suse.com/security/cve/CVE-2021-47288.html * https://www.suse.com/security/cve/CVE-2021-47289.html * https://www.suse.com/security/cve/CVE-2021-47296.html * https://www.suse.com/security/cve/CVE-2021-47301.html * https://www.suse.com/security/cve/CVE-2021-47302.html * https://www.suse.com/security/cve/CVE-2021-47305.html * https://www.suse.com/security/cve/CVE-2021-47307.html * https://www.suse.com/security/cve/CVE-2021-47308.html * https://www.suse.com/security/cve/CVE-2021-47314.html * https://www.suse.com/security/cve/CVE-2021-47315.html * https://www.suse.com/security/cve/CVE-2021-47320.html * https://www.suse.com/security/cve/CVE-2021-47321.html * https://www.suse.com/security/cve/CVE-2021-47323.html * https://www.suse.com/security/cve/CVE-2021-47324.html * https://www.suse.com/security/cve/CVE-2021-47330.html * https://www.suse.com/security/cve/CVE-2021-47332.html * https://www.suse.com/security/cve/CVE-2021-47333.html * https://www.suse.com/security/cve/CVE-2021-47334.html * https://www.suse.com/security/cve/CVE-2021-47338.html * https://www.suse.com/security/cve/CVE-2021-47341.html * https://www.suse.com/security/cve/CVE-2021-47344.html * https://www.suse.com/security/cve/CVE-2021-47347.html * https://www.suse.com/security/cve/CVE-2021-47350.html * https://www.suse.com/security/cve/CVE-2021-47354.html * https://www.suse.com/security/cve/CVE-2021-47356.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47381.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47388.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47393.html * https://www.suse.com/security/cve/CVE-2021-47395.html * https://www.suse.com/security/cve/CVE-2021-47396.html * https://www.suse.com/security/cve/CVE-2021-47399.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47405.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47425.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47434.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47441.html * https://www.suse.com/security/cve/CVE-2021-47442.html * https://www.suse.com/security/cve/CVE-2021-47443.html * https://www.suse.com/security/cve/CVE-2021-47445.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47464.html * https://www.suse.com/security/cve/CVE-2021-47465.html * https://www.suse.com/security/cve/CVE-2021-47468.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47482.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47505.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47516.html * https://www.suse.com/security/cve/CVE-2021-47522.html * https://www.suse.com/security/cve/CVE-2021-47527.html * https://www.suse.com/security/cve/CVE-2021-47538.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47542.html * https://www.suse.com/security/cve/CVE-2021-47562.html * https://www.suse.com/security/cve/CVE-2021-47563.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2022-20132.html * https://www.suse.com/security/cve/CVE-2022-48673.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-2176.html * https://www.suse.com/security/cve/CVE-2023-424.html * https://www.suse.com/security/cve/CVE-2023-4244.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52433.html * https://www.suse.com/security/cve/CVE-2023-52581.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52840.html * https://www.suse.com/security/cve/CVE-2023-52871.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2024-26581.html * https://www.suse.com/security/cve/CVE-2024-26643.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1151927 * https://bugzilla.suse.com/show_bug.cgi?id=1154353 * https://bugzilla.suse.com/show_bug.cgi?id=1156395 * https://bugzilla.suse.com/show_bug.cgi?id=1174585 * https://bugzilla.suse.com/show_bug.cgi?id=1176869 * https://bugzilla.suse.com/show_bug.cgi?id=1184631 * https://bugzilla.suse.com/show_bug.cgi?id=1185589 * https://bugzilla.suse.com/show_bug.cgi?id=1185902 * https://bugzilla.suse.com/show_bug.cgi?id=1188616 * https://bugzilla.suse.com/show_bug.cgi?id=1188772 * https://bugzilla.suse.com/show_bug.cgi?id=1189883 * https://bugzilla.suse.com/show_bug.cgi?id=1190795 * https://bugzilla.suse.com/show_bug.cgi?id=1191452 * https://bugzilla.suse.com/show_bug.cgi?id=1192107 * https://bugzilla.suse.com/show_bug.cgi?id=1194288 * https://bugzilla.suse.com/show_bug.cgi?id=1196956 * https://bugzilla.suse.com/show_bug.cgi?id=1200619 * https://bugzilla.suse.com/show_bug.cgi?id=1208813 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1210629 * https://bugzilla.suse.com/show_bug.cgi?id=1215356 * https://bugzilla.suse.com/show_bug.cgi?id=1215420 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1220137 * https://bugzilla.suse.com/show_bug.cgi?id=1220144 * https://bugzilla.suse.com/show_bug.cgi?id=1220754 * https://bugzilla.suse.com/show_bug.cgi?id=1220877 * https://bugzilla.suse.com/show_bug.cgi?id=1220960 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221829 * https://bugzilla.suse.com/show_bug.cgi?id=1222251 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223934 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224831 * https://bugzilla.suse.com/show_bug.cgi?id=1224832 * https://bugzilla.suse.com/show_bug.cgi?id=1224834 * https://bugzilla.suse.com/show_bug.cgi?id=1224841 * https://bugzilla.suse.com/show_bug.cgi?id=1224843 * https://bugzilla.suse.com/show_bug.cgi?id=1224846 * https://bugzilla.suse.com/show_bug.cgi?id=1224849 * https://bugzilla.suse.com/show_bug.cgi?id=1224854 * https://bugzilla.suse.com/show_bug.cgi?id=1224859 * https://bugzilla.suse.com/show_bug.cgi?id=1224882 * https://bugzilla.suse.com/show_bug.cgi?id=1224888 * https://bugzilla.suse.com/show_bug.cgi?id=1224889 * https://bugzilla.suse.com/show_bug.cgi?id=1224891 * https://bugzilla.suse.com/show_bug.cgi?id=1224892 * https://bugzilla.suse.com/show_bug.cgi?id=1224893 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224909 * https://bugzilla.suse.com/show_bug.cgi?id=1224916 * https://bugzilla.suse.com/show_bug.cgi?id=1224917 * https://bugzilla.suse.com/show_bug.cgi?id=1224922 * https://bugzilla.suse.com/show_bug.cgi?id=1224923 * https://bugzilla.suse.com/show_bug.cgi?id=1224924 * https://bugzilla.suse.com/show_bug.cgi?id=1224928 * https://bugzilla.suse.com/show_bug.cgi?id=1224953 * https://bugzilla.suse.com/show_bug.cgi?id=1224954 * https://bugzilla.suse.com/show_bug.cgi?id=1224961 * https://bugzilla.suse.com/show_bug.cgi?id=1224963 * https://bugzilla.suse.com/show_bug.cgi?id=1224965 * https://bugzilla.suse.com/show_bug.cgi?id=1224966 * https://bugzilla.suse.com/show_bug.cgi?id=1224968 * https://bugzilla.suse.com/show_bug.cgi?id=1224981 * https://bugzilla.suse.com/show_bug.cgi?id=1224982 * https://bugzilla.suse.com/show_bug.cgi?id=1224984 * https://bugzilla.suse.com/show_bug.cgi?id=1224987 * https://bugzilla.suse.com/show_bug.cgi?id=1224990 * https://bugzilla.suse.com/show_bug.cgi?id=1224993 * https://bugzilla.suse.com/show_bug.cgi?id=1224996 * https://bugzilla.suse.com/show_bug.cgi?id=1224997 * https://bugzilla.suse.com/show_bug.cgi?id=1225026 * https://bugzilla.suse.com/show_bug.cgi?id=1225030 * https://bugzilla.suse.com/show_bug.cgi?id=1225058 * https://bugzilla.suse.com/show_bug.cgi?id=1225060 * https://bugzilla.suse.com/show_bug.cgi?id=1225084 * https://bugzilla.suse.com/show_bug.cgi?id=1225091 * https://bugzilla.suse.com/show_bug.cgi?id=1225112 * https://bugzilla.suse.com/show_bug.cgi?id=1225113 * https://bugzilla.suse.com/show_bug.cgi?id=1225140 * https://bugzilla.suse.com/show_bug.cgi?id=1225143 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225177 * https://bugzilla.suse.com/show_bug.cgi?id=1225181 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225206 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225214 * https://bugzilla.suse.com/show_bug.cgi?id=1225223 * https://bugzilla.suse.com/show_bug.cgi?id=1225224 * https://bugzilla.suse.com/show_bug.cgi?id=1225232 * https://bugzilla.suse.com/show_bug.cgi?id=1225238 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225261 * https://bugzilla.suse.com/show_bug.cgi?id=1225262 * https://bugzilla.suse.com/show_bug.cgi?id=1225263 * https://bugzilla.suse.com/show_bug.cgi?id=1225301 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225321 * https://bugzilla.suse.com/show_bug.cgi?id=1225326 * https://bugzilla.suse.com/show_bug.cgi?id=1225327 * https://bugzilla.suse.com/show_bug.cgi?id=1225328 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225341 * https://bugzilla.suse.com/show_bug.cgi?id=1225346 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225393 * https://bugzilla.suse.com/show_bug.cgi?id=1225400 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225427 * https://bugzilla.suse.com/show_bug.cgi?id=1225437 * https://bugzilla.suse.com/show_bug.cgi?id=1225448 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225455 * https://bugzilla.suse.com/show_bug.cgi?id=1225499 * https://bugzilla.suse.com/show_bug.cgi?id=1225500 * https://bugzilla.suse.com/show_bug.cgi?id=1225534 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 20:32:32 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 20:32:32 -0000 Subject: SUSE-SU-2024:2185-1: important: Security update for the Linux Kernel Message-ID: <171926115229.28263.1741496441124183501@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:2185-1 Rating: important References: * bsc#1065729 * bsc#1151927 * bsc#1152472 * bsc#1154353 * bsc#1156395 * bsc#1174585 * bsc#1176447 * bsc#1176774 * bsc#1176869 * bsc#1178134 * bsc#1181147 * bsc#1184631 * bsc#1185570 * bsc#1185589 * bsc#1185902 * bsc#1186885 * bsc#1187357 * bsc#1188616 * bsc#1188772 * bsc#1189883 * bsc#1190795 * bsc#1191452 * bsc#1192107 * bsc#1194288 * bsc#1194591 * bsc#1196956 * bsc#1197760 * bsc#1198029 * bsc#1199304 * bsc#1200619 * bsc#1203389 * bsc#1206646 * bsc#1209657 * bsc#1210335 * bsc#1210629 * bsc#1213476 * bsc#1215420 * bsc#1216702 * bsc#1217169 * bsc#1220137 * bsc#1220144 * bsc#1220754 * bsc#1220877 * bsc#1220960 * bsc#1221044 * bsc#1221113 * bsc#1221829 * bsc#1222251 * bsc#1222619 * bsc#1222838 * bsc#1222867 * bsc#1223084 * bsc#1223138 * bsc#1223384 * bsc#1223390 * bsc#1223512 * bsc#1223932 * bsc#1223934 * bsc#1224099 * bsc#1224174 * bsc#1224438 * bsc#1224482 * bsc#1224511 * bsc#1224592 * bsc#1224816 * bsc#1224826 * bsc#1224830 * bsc#1224831 * bsc#1224832 * bsc#1224834 * bsc#1224841 * bsc#1224842 * bsc#1224843 * bsc#1224844 * bsc#1224846 * bsc#1224849 * bsc#1224852 * bsc#1224853 * bsc#1224854 * bsc#1224859 * bsc#1224882 * bsc#1224886 * bsc#1224888 * bsc#1224889 * bsc#1224891 * bsc#1224892 * bsc#1224893 * bsc#1224899 * bsc#1224904 * bsc#1224907 * bsc#1224909 * bsc#1224916 * bsc#1224917 * bsc#1224922 * bsc#1224923 * bsc#1224924 * bsc#1224926 * bsc#1224928 * bsc#1224953 * bsc#1224954 * bsc#1224955 * bsc#1224957 * bsc#1224961 * bsc#1224963 * bsc#1224965 * bsc#1224966 * bsc#1224968 * bsc#1224981 * bsc#1224982 * bsc#1224983 * bsc#1224984 * bsc#1224987 * bsc#1224990 * bsc#1224993 * bsc#1224996 * bsc#1224997 * bsc#1225026 * bsc#1225030 * bsc#1225058 * bsc#1225060 * bsc#1225083 * bsc#1225084 * bsc#1225091 * bsc#1225112 * bsc#1225113 * bsc#1225128 * bsc#1225140 * bsc#1225143 * bsc#1225148 * bsc#1225155 * bsc#1225164 * bsc#1225177 * bsc#1225178 * bsc#1225181 * bsc#1225192 * bsc#1225193 * bsc#1225198 * bsc#1225201 * bsc#1225206 * bsc#1225207 * bsc#1225208 * bsc#1225214 * bsc#1225223 * bsc#1225224 * bsc#1225230 * bsc#1225232 * bsc#1225233 * bsc#1225237 * bsc#1225238 * bsc#1225243 * bsc#1225244 * bsc#1225247 * bsc#1225251 * bsc#1225252 * bsc#1225256 * bsc#1225261 * bsc#1225262 * bsc#1225263 * bsc#1225301 * bsc#1225303 * bsc#1225316 * bsc#1225318 * bsc#1225320 * bsc#1225321 * bsc#1225322 * bsc#1225326 * bsc#1225327 * bsc#1225328 * bsc#1225330 * bsc#1225333 * bsc#1225336 * bsc#1225341 * bsc#1225346 * bsc#1225351 * bsc#1225354 * bsc#1225355 * bsc#1225357 * bsc#1225358 * bsc#1225360 * bsc#1225361 * bsc#1225366 * bsc#1225367 * bsc#1225369 * bsc#1225370 * bsc#1225372 * bsc#1225374 * bsc#1225384 * bsc#1225386 * bsc#1225387 * bsc#1225390 * bsc#1225393 * bsc#1225400 * bsc#1225404 * bsc#1225405 * bsc#1225409 * bsc#1225411 * bsc#1225424 * bsc#1225427 * bsc#1225435 * bsc#1225437 * bsc#1225438 * bsc#1225439 * bsc#1225446 * bsc#1225447 * bsc#1225448 * bsc#1225450 * bsc#1225453 * bsc#1225455 * bsc#1225468 * bsc#1225499 * bsc#1225500 * bsc#1225508 * bsc#1225534 Cross-References: * CVE-2020-36788 * CVE-2021-3743 * CVE-2021-39698 * CVE-2021-43056 * CVE-2021-47104 * CVE-2021-47192 * CVE-2021-47200 * CVE-2021-47220 * CVE-2021-47227 * CVE-2021-47228 * CVE-2021-47229 * CVE-2021-47230 * CVE-2021-47231 * CVE-2021-47235 * CVE-2021-47236 * CVE-2021-47237 * CVE-2021-47239 * CVE-2021-47240 * CVE-2021-47241 * CVE-2021-47246 * CVE-2021-47252 * CVE-2021-47253 * CVE-2021-47254 * CVE-2021-47255 * CVE-2021-47258 * CVE-2021-47259 * CVE-2021-47260 * CVE-2021-47261 * CVE-2021-47263 * CVE-2021-47265 * CVE-2021-47267 * CVE-2021-47269 * CVE-2021-47270 * CVE-2021-47274 * CVE-2021-47275 * CVE-2021-47276 * CVE-2021-47280 * CVE-2021-47281 * CVE-2021-47284 * CVE-2021-47285 * CVE-2021-47288 * CVE-2021-47289 * CVE-2021-47296 * CVE-2021-47301 * CVE-2021-47302 * CVE-2021-47305 * CVE-2021-47307 * CVE-2021-47308 * CVE-2021-47314 * CVE-2021-47315 * CVE-2021-47320 * CVE-2021-47321 * CVE-2021-47323 * CVE-2021-47324 * CVE-2021-47329 * CVE-2021-47330 * CVE-2021-47332 * CVE-2021-47333 * CVE-2021-47334 * CVE-2021-47337 * CVE-2021-47338 * CVE-2021-47340 * CVE-2021-47341 * CVE-2021-47343 * CVE-2021-47344 * CVE-2021-47347 * CVE-2021-47348 * CVE-2021-47350 * CVE-2021-47353 * CVE-2021-47354 * CVE-2021-47356 * CVE-2021-47369 * CVE-2021-47375 * CVE-2021-47378 * CVE-2021-47381 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47387 * CVE-2021-47388 * CVE-2021-47391 * CVE-2021-47392 * CVE-2021-47393 * CVE-2021-47395 * CVE-2021-47396 * CVE-2021-47399 * CVE-2021-47402 * CVE-2021-47404 * CVE-2021-47405 * CVE-2021-47409 * CVE-2021-47413 * CVE-2021-47416 * CVE-2021-47422 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47425 * CVE-2021-47426 * CVE-2021-47428 * CVE-2021-47431 * CVE-2021-47434 * CVE-2021-47435 * CVE-2021-47436 * CVE-2021-47441 * CVE-2021-47442 * CVE-2021-47443 * CVE-2021-47444 * CVE-2021-47445 * CVE-2021-47451 * CVE-2021-47456 * CVE-2021-47458 * CVE-2021-47460 * CVE-2021-47464 * CVE-2021-47465 * CVE-2021-47468 * CVE-2021-47473 * CVE-2021-47478 * CVE-2021-47480 * CVE-2021-47482 * CVE-2021-47483 * CVE-2021-47485 * CVE-2021-47493 * CVE-2021-47494 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47498 * CVE-2021-47499 * CVE-2021-47500 * CVE-2021-47501 * CVE-2021-47502 * CVE-2021-47503 * CVE-2021-47505 * CVE-2021-47506 * CVE-2021-47507 * CVE-2021-47509 * CVE-2021-47511 * CVE-2021-47512 * CVE-2021-47516 * CVE-2021-47518 * CVE-2021-47521 * CVE-2021-47522 * CVE-2021-47523 * CVE-2021-47527 * CVE-2021-47535 * CVE-2021-47536 * CVE-2021-47538 * CVE-2021-47540 * CVE-2021-47541 * CVE-2021-47542 * CVE-2021-47549 * CVE-2021-47557 * CVE-2021-47562 * CVE-2021-47563 * CVE-2021-47565 * CVE-2022-1195 * CVE-2022-20132 * CVE-2022-48636 * CVE-2022-48673 * CVE-2022-48704 * CVE-2022-48710 * CVE-2023-0160 * CVE-2023-1829 * CVE-2023-2176 * CVE-2023-424 * CVE-2023-4244 * CVE-2023-47233 * CVE-2023-52433 * CVE-2023-52581 * CVE-2023-52591 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52686 * CVE-2023-52840 * CVE-2023-52871 * CVE-2023-52880 * CVE-2023-6531 * CVE-2024-26581 * CVE-2024-26643 * CVE-2024-26828 * CVE-2024-26921 * CVE-2024-26925 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-27413 * CVE-2024-35811 * CVE-2024-35895 * CVE-2024-35914 CVSS scores: * CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-3743 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47228 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47237 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47253 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47259 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47267 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47296 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47329 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47333 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47337 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47338 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47340 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47341 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47343 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47348 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2021-47538 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-20132 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2022-20132 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4244 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4244 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52433 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26581 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves 187 vulnerabilities and has 26 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201). * CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354) * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934). * CVE-2023-52871: Handle a second device without data corruption (bsc#1225534) * CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084). * CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355). * CVE-2021-47500: Fixed trigger reference couting (bsc#1225360). * CVE-2024-27413: Fix incorrect allocation size (bsc#1224438). * CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208). * CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411). * CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928). * CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954) * CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169). * CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420). * CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). * CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729). The following non-security bugs were fixed: * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * btrfs: do not start relocation until in progress drops are done (bsc#1222251). * btrfs: do not start relocation until in progress drops are done (bsc#1222251). * cifs: add missing spinlock around tcon refcount (bsc#1213476). * cifs: avoid dup prefix path in dfs_get_automount_devname() (bsc#1213476). * cifs: avoid race conditions with parallel reconnects (bsc#1213476). * cifs: avoid re-lookups in dfs_cache_find() (bsc#1213476). * cifs: avoid use of global locks for high contention data (bsc#1213476). * cifs: check only tcon status on tcon related functions (bsc#1213476). * cifs: do all necessary checks for credits within or before locking (bsc#1213476). * cifs: do not block in dfs_cache_noreq_update_tgthint() (bsc#1213476). * cifs: do not refresh cached referrals from unactive mounts (bsc#1213476). * cifs: do not take exclusive lock for updating target hints (bsc#1213476). * cifs: fix confusing debug message (bsc#1213476). * cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1213476). * cifs: fix potential deadlock in cache_refresh_path() (bsc#1213476). * cifs: fix refresh of cached referrals (bsc#1213476). * cifs: fix return of uninitialized rc in dfs_cache_update_tgthint() (bsc#1213476). * cifs: fix source pathname comparison of dfs supers (bsc#1213476). * cifs: fix status checks in cifs_tree_connect (bsc#1213476). * cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1213476). * cifs: get rid of dns resolve worker (bsc#1213476). * cifs: get rid of mount options string parsing (bsc#1213476). * cifs: handle cache lookup errors different than -ENOENT (bsc#1213476). * cifs: ignore ipc reconnect failures during dfs failover (bsc#1213476). * cifs: match even the scope id for ipv6 addresses (bsc#1213476). * cifs: optimize reconnect of nested links (bsc#1213476). * cifs: prevent data race in smb2_reconnect() (bsc#1213476). * cifs: refresh root referrals (bsc#1213476). * cifs: remove duplicate code in __refresh_tcon() (bsc#1213476). * cifs: remove unused function (bsc#1213476). * cifs: remove unused smb3_fs_context::mount_options (bsc#1213476). * cifs: return DFS root session id in DebugData (bsc#1213476). * cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1213476). * cifs: set correct ipc status after initial tree connect (bsc#1213476). * cifs: set correct status of tcon ipc when reconnecting (bsc#1213476). * cifs: set correct tcon status after initial tree connect (bsc#1213476). * cifs: set DFS root session in cifs_get_smb_ses() (bsc#1213476). * cifs: set resolved ip in sockaddr (bsc#1213476). * cifs: share dfs connections and supers (bsc#1213476). * cifs: split out ses and tcon retrieval from mount_get_conns() (bsc#1213476). * cifs: use fs_context for automounts (bsc#1213476). * cifs: use origin fullpath for automounts (bsc#1213476). * cifs: use tcon allocation functions even for dummy tcon (bsc#1213476). * netfilter: nf_tables: defer gc run if previous batch is still pending (git- fixes). * netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path (git-fixes). * netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes). * netfilter: nf_tables: fix memleak when more than 255 elements expired (git- fixes). * netfilter: nf_tables: GC transaction race with abort path (git-fixes). * netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes). * netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes). * netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (git-fixes). * netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git- fixes). * netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (git-fixes). * netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes). * netfilter: nf_tables: use correct lock to protect gc_list (git-fixes). * netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git- fixes). * netfilter: nft_set_rbtree: Add missing expired checks (git-fixes). * netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named sets (git-fixes). * netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match (git-fixes). * netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes). * netfilter: nft_set_rbtree: Do not account for expired elements on insertion (git-fixes). * netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on insertion (git-fixes). * netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes). * netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes). * netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap detection (git-fixes). * netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start() (git-fixes). * netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (git-fixes). * netfilter: nft_set_rbtree: skip elements in transaction from garbage collection (git-fixes). * netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes). * netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction (git-fixes). * netfilter: nft_set_rbtree: Switch to node list walk for overlap detection (git-fixes). * netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes). * NFC: nxp: add NXP1002 (bsc#1185589). * PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243). * smb: client: fix dfs link mount against w2k8 (git-fixes). * smb: client: fix null auth (bsc#1213476). * smb: client: set correct id, uid and cruid for multiuser automounts (git- fixes). * x86/xen: Drop USERGS_SYSRET64 paravirt call (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2185=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2185=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-2185=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2185=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2185=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2185=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2185=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2185=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1 ## Package List: * openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (noarch) * kernel-macros-5.3.18-150300.59.164.1 * kernel-source-5.3.18-150300.59.164.1 * kernel-source-vanilla-5.3.18-150300.59.164.1 * kernel-devel-5.3.18-150300.59.164.1 * kernel-docs-html-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-kvmsmall-5.3.18-150300.59.164.1 * kernel-debug-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-kvmsmall-devel-5.3.18-150300.59.164.1 * kernel-debug-devel-5.3.18-150300.59.164.1 * kernel-debug-livepatch-devel-5.3.18-150300.59.164.1 * kernel-kvmsmall-debugsource-5.3.18-150300.59.164.1 * kernel-debug-debugsource-5.3.18-150300.59.164.1 * kernel-debug-debuginfo-5.3.18-150300.59.164.1 * kernel-debug-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.164.1 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-obs-build-5.3.18-150300.59.164.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * cluster-md-kmp-default-5.3.18-150300.59.164.1 * ocfs2-kmp-default-5.3.18-150300.59.164.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-obs-build-debugsource-5.3.18-150300.59.164.1 * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-livepatch-devel-5.3.18-150300.59.164.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * dlm-kmp-default-5.3.18-150300.59.164.1 * kernel-default-livepatch-5.3.18-150300.59.164.1 * kernel-default-extra-5.3.18-150300.59.164.1 * kernel-default-optional-5.3.18-150300.59.164.1 * kernel-syms-5.3.18-150300.59.164.1 * kselftests-kmp-default-5.3.18-150300.59.164.1 * gfs2-kmp-default-5.3.18-150300.59.164.1 * kernel-default-optional-debuginfo-5.3.18-150300.59.164.1 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.164.1 * reiserfs-kmp-default-5.3.18-150300.59.164.1 * kernel-default-devel-5.3.18-150300.59.164.1 * kernel-default-base-rebuild-5.3.18-150300.59.164.1.150300.18.96.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-extra-debuginfo-5.3.18-150300.59.164.1 * kernel-obs-qa-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_45-debugsource-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-1-150300.7.3.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_164-preempt-1-150300.7.3.1 * openSUSE Leap 15.3 (aarch64 x86_64) * cluster-md-kmp-preempt-5.3.18-150300.59.164.1 * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1 * ocfs2-kmp-preempt-5.3.18-150300.59.164.1 * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-debugsource-5.3.18-150300.59.164.1 * gfs2-kmp-preempt-5.3.18-150300.59.164.1 * kselftests-kmp-preempt-5.3.18-150300.59.164.1 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-debuginfo-5.3.18-150300.59.164.1 * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-optional-5.3.18-150300.59.164.1 * kernel-preempt-extra-5.3.18-150300.59.164.1 * dlm-kmp-preempt-5.3.18-150300.59.164.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-devel-5.3.18-150300.59.164.1 * kernel-preempt-livepatch-devel-5.3.18-150300.59.164.1 * reiserfs-kmp-preempt-5.3.18-150300.59.164.1 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1 * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (aarch64) * dtb-rockchip-5.3.18-150300.59.164.1 * dtb-sprd-5.3.18-150300.59.164.1 * dtb-hisilicon-5.3.18-150300.59.164.1 * dtb-arm-5.3.18-150300.59.164.1 * kernel-64kb-debugsource-5.3.18-150300.59.164.1 * kernel-64kb-livepatch-devel-5.3.18-150300.59.164.1 * reiserfs-kmp-64kb-5.3.18-150300.59.164.1 * dtb-freescale-5.3.18-150300.59.164.1 * kernel-64kb-optional-5.3.18-150300.59.164.1 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1 * dtb-apm-5.3.18-150300.59.164.1 * dtb-exynos-5.3.18-150300.59.164.1 * dtb-socionext-5.3.18-150300.59.164.1 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1 * dtb-amd-5.3.18-150300.59.164.1 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.164.1 * dtb-qcom-5.3.18-150300.59.164.1 * dtb-marvell-5.3.18-150300.59.164.1 * dtb-mediatek-5.3.18-150300.59.164.1 * dtb-altera-5.3.18-150300.59.164.1 * dtb-broadcom-5.3.18-150300.59.164.1 * dtb-zte-5.3.18-150300.59.164.1 * kernel-64kb-debuginfo-5.3.18-150300.59.164.1 * ocfs2-kmp-64kb-5.3.18-150300.59.164.1 * kselftests-kmp-64kb-5.3.18-150300.59.164.1 * dlm-kmp-64kb-5.3.18-150300.59.164.1 * gfs2-kmp-64kb-5.3.18-150300.59.164.1 * kernel-64kb-devel-5.3.18-150300.59.164.1 * dtb-cavium-5.3.18-150300.59.164.1 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.164.1 * dtb-renesas-5.3.18-150300.59.164.1 * dtb-xilinx-5.3.18-150300.59.164.1 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.164.1 * cluster-md-kmp-64kb-5.3.18-150300.59.164.1 * kernel-64kb-extra-5.3.18-150300.59.164.1 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.164.1 * dtb-nvidia-5.3.18-150300.59.164.1 * dtb-amlogic-5.3.18-150300.59.164.1 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.164.1 * dtb-al-5.3.18-150300.59.164.1 * dtb-lg-5.3.18-150300.59.164.1 * dtb-allwinner-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-livepatch-devel-5.3.18-150300.59.164.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1 * kernel-default-livepatch-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-debuginfo-5.3.18-150300.59.164.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1 * dlm-kmp-default-5.3.18-150300.59.164.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * cluster-md-kmp-default-5.3.18-150300.59.164.1 * gfs2-kmp-default-5.3.18-150300.59.164.1 * ocfs2-kmp-default-5.3.18-150300.59.164.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-debugsource-5.3.18-150300.59.164.1 * kernel-64kb-devel-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.164.1 * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-obs-build-5.3.18-150300.59.164.1 * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * kernel-preempt-debuginfo-5.3.18-150300.59.164.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-devel-5.3.18-150300.59.164.1 * kernel-syms-5.3.18-150300.59.164.1 * reiserfs-kmp-default-5.3.18-150300.59.164.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-devel-5.3.18-150300.59.164.1 * kernel-preempt-debugsource-5.3.18-150300.59.164.1 * kernel-obs-build-debugsource-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.164.1 * kernel-macros-5.3.18-150300.59.164.1 * kernel-devel-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-debugsource-5.3.18-150300.59.164.1 * kernel-64kb-devel-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-5.3.18-150300.59.164.1 * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-syms-5.3.18-150300.59.164.1 * reiserfs-kmp-default-5.3.18-150300.59.164.1 * kernel-default-devel-5.3.18-150300.59.164.1 * kernel-obs-build-debugsource-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * kernel-source-5.3.18-150300.59.164.1 * kernel-macros-5.3.18-150300.59.164.1 * kernel-devel-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-debugsource-5.3.18-150300.59.164.1 * kernel-preempt-devel-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * kernel-obs-build-5.3.18-150300.59.164.1 * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-syms-5.3.18-150300.59.164.1 * reiserfs-kmp-default-5.3.18-150300.59.164.1 * kernel-default-devel-5.3.18-150300.59.164.1 * kernel-obs-build-debugsource-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.164.1 * kernel-macros-5.3.18-150300.59.164.1 * kernel-devel-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-debugsource-5.3.18-150300.59.164.1 * kernel-preempt-devel-5.3.18-150300.59.164.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.164.1 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-debugsource-5.3.18-150300.59.164.1 * kernel-64kb-devel-5.3.18-150300.59.164.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.164.1 * kernel-default-5.3.18-150300.59.164.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-obs-build-5.3.18-150300.59.164.1 * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * kernel-preempt-debuginfo-5.3.18-150300.59.164.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-devel-5.3.18-150300.59.164.1 * kernel-syms-5.3.18-150300.59.164.1 * reiserfs-kmp-default-5.3.18-150300.59.164.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-devel-5.3.18-150300.59.164.1 * kernel-preempt-debugsource-5.3.18-150300.59.164.1 * kernel-obs-build-debugsource-5.3.18-150300.59.164.1 * SUSE Enterprise Storage 7.1 (noarch) * kernel-source-5.3.18-150300.59.164.1 * kernel-macros-5.3.18-150300.59.164.1 * kernel-devel-5.3.18-150300.59.164.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 ## References: * https://www.suse.com/security/cve/CVE-2020-36788.html * https://www.suse.com/security/cve/CVE-2021-3743.html * https://www.suse.com/security/cve/CVE-2021-39698.html * https://www.suse.com/security/cve/CVE-2021-43056.html * https://www.suse.com/security/cve/CVE-2021-47104.html * https://www.suse.com/security/cve/CVE-2021-47192.html * https://www.suse.com/security/cve/CVE-2021-47200.html * https://www.suse.com/security/cve/CVE-2021-47220.html * https://www.suse.com/security/cve/CVE-2021-47227.html * https://www.suse.com/security/cve/CVE-2021-47228.html * https://www.suse.com/security/cve/CVE-2021-47229.html * https://www.suse.com/security/cve/CVE-2021-47230.html * https://www.suse.com/security/cve/CVE-2021-47231.html * https://www.suse.com/security/cve/CVE-2021-47235.html * https://www.suse.com/security/cve/CVE-2021-47236.html * https://www.suse.com/security/cve/CVE-2021-47237.html * https://www.suse.com/security/cve/CVE-2021-47239.html * https://www.suse.com/security/cve/CVE-2021-47240.html * https://www.suse.com/security/cve/CVE-2021-47241.html * https://www.suse.com/security/cve/CVE-2021-47246.html * https://www.suse.com/security/cve/CVE-2021-47252.html * https://www.suse.com/security/cve/CVE-2021-47253.html * https://www.suse.com/security/cve/CVE-2021-47254.html * https://www.suse.com/security/cve/CVE-2021-47255.html * https://www.suse.com/security/cve/CVE-2021-47258.html * https://www.suse.com/security/cve/CVE-2021-47259.html * https://www.suse.com/security/cve/CVE-2021-47260.html * https://www.suse.com/security/cve/CVE-2021-47261.html * https://www.suse.com/security/cve/CVE-2021-47263.html * https://www.suse.com/security/cve/CVE-2021-47265.html * https://www.suse.com/security/cve/CVE-2021-47267.html * https://www.suse.com/security/cve/CVE-2021-47269.html * https://www.suse.com/security/cve/CVE-2021-47270.html * https://www.suse.com/security/cve/CVE-2021-47274.html * https://www.suse.com/security/cve/CVE-2021-47275.html * https://www.suse.com/security/cve/CVE-2021-47276.html * https://www.suse.com/security/cve/CVE-2021-47280.html * https://www.suse.com/security/cve/CVE-2021-47281.html * https://www.suse.com/security/cve/CVE-2021-47284.html * https://www.suse.com/security/cve/CVE-2021-47285.html * https://www.suse.com/security/cve/CVE-2021-47288.html * https://www.suse.com/security/cve/CVE-2021-47289.html * https://www.suse.com/security/cve/CVE-2021-47296.html * https://www.suse.com/security/cve/CVE-2021-47301.html * https://www.suse.com/security/cve/CVE-2021-47302.html * https://www.suse.com/security/cve/CVE-2021-47305.html * https://www.suse.com/security/cve/CVE-2021-47307.html * https://www.suse.com/security/cve/CVE-2021-47308.html * https://www.suse.com/security/cve/CVE-2021-47314.html * https://www.suse.com/security/cve/CVE-2021-47315.html * https://www.suse.com/security/cve/CVE-2021-47320.html * https://www.suse.com/security/cve/CVE-2021-47321.html * https://www.suse.com/security/cve/CVE-2021-47323.html * https://www.suse.com/security/cve/CVE-2021-47324.html * https://www.suse.com/security/cve/CVE-2021-47329.html * https://www.suse.com/security/cve/CVE-2021-47330.html * https://www.suse.com/security/cve/CVE-2021-47332.html * https://www.suse.com/security/cve/CVE-2021-47333.html * https://www.suse.com/security/cve/CVE-2021-47334.html * https://www.suse.com/security/cve/CVE-2021-47337.html * https://www.suse.com/security/cve/CVE-2021-47338.html * https://www.suse.com/security/cve/CVE-2021-47340.html * https://www.suse.com/security/cve/CVE-2021-47341.html * https://www.suse.com/security/cve/CVE-2021-47343.html * https://www.suse.com/security/cve/CVE-2021-47344.html * https://www.suse.com/security/cve/CVE-2021-47347.html * https://www.suse.com/security/cve/CVE-2021-47348.html * https://www.suse.com/security/cve/CVE-2021-47350.html * https://www.suse.com/security/cve/CVE-2021-47353.html * https://www.suse.com/security/cve/CVE-2021-47354.html * https://www.suse.com/security/cve/CVE-2021-47356.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47381.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47387.html * https://www.suse.com/security/cve/CVE-2021-47388.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47392.html * https://www.suse.com/security/cve/CVE-2021-47393.html * https://www.suse.com/security/cve/CVE-2021-47395.html * https://www.suse.com/security/cve/CVE-2021-47396.html * https://www.suse.com/security/cve/CVE-2021-47399.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47405.html * https://www.suse.com/security/cve/CVE-2021-47409.html * https://www.suse.com/security/cve/CVE-2021-47413.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47422.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47425.html * https://www.suse.com/security/cve/CVE-2021-47426.html * https://www.suse.com/security/cve/CVE-2021-47428.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47434.html * https://www.suse.com/security/cve/CVE-2021-47435.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47441.html * https://www.suse.com/security/cve/CVE-2021-47442.html * https://www.suse.com/security/cve/CVE-2021-47443.html * https://www.suse.com/security/cve/CVE-2021-47444.html * https://www.suse.com/security/cve/CVE-2021-47445.html * https://www.suse.com/security/cve/CVE-2021-47451.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47458.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47464.html * https://www.suse.com/security/cve/CVE-2021-47465.html * https://www.suse.com/security/cve/CVE-2021-47468.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47478.html * https://www.suse.com/security/cve/CVE-2021-47480.html * https://www.suse.com/security/cve/CVE-2021-47482.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47493.html * https://www.suse.com/security/cve/CVE-2021-47494.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47498.html * https://www.suse.com/security/cve/CVE-2021-47499.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47501.html * https://www.suse.com/security/cve/CVE-2021-47502.html * https://www.suse.com/security/cve/CVE-2021-47503.html * https://www.suse.com/security/cve/CVE-2021-47505.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47507.html * https://www.suse.com/security/cve/CVE-2021-47509.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47512.html * https://www.suse.com/security/cve/CVE-2021-47516.html * https://www.suse.com/security/cve/CVE-2021-47518.html * https://www.suse.com/security/cve/CVE-2021-47521.html * https://www.suse.com/security/cve/CVE-2021-47522.html * https://www.suse.com/security/cve/CVE-2021-47523.html * https://www.suse.com/security/cve/CVE-2021-47527.html * https://www.suse.com/security/cve/CVE-2021-47535.html * https://www.suse.com/security/cve/CVE-2021-47536.html * https://www.suse.com/security/cve/CVE-2021-47538.html * https://www.suse.com/security/cve/CVE-2021-47540.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47542.html * https://www.suse.com/security/cve/CVE-2021-47549.html * https://www.suse.com/security/cve/CVE-2021-47557.html * https://www.suse.com/security/cve/CVE-2021-47562.html * https://www.suse.com/security/cve/CVE-2021-47563.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2022-1195.html * https://www.suse.com/security/cve/CVE-2022-20132.html * https://www.suse.com/security/cve/CVE-2022-48636.html * https://www.suse.com/security/cve/CVE-2022-48673.html * https://www.suse.com/security/cve/CVE-2022-48704.html * https://www.suse.com/security/cve/CVE-2022-48710.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-2176.html * https://www.suse.com/security/cve/CVE-2023-424.html * https://www.suse.com/security/cve/CVE-2023-4244.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52433.html * https://www.suse.com/security/cve/CVE-2023-52581.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52840.html * https://www.suse.com/security/cve/CVE-2023-52871.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2024-26581.html * https://www.suse.com/security/cve/CVE-2024-26643.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1151927 * https://bugzilla.suse.com/show_bug.cgi?id=1152472 * https://bugzilla.suse.com/show_bug.cgi?id=1154353 * https://bugzilla.suse.com/show_bug.cgi?id=1156395 * https://bugzilla.suse.com/show_bug.cgi?id=1174585 * https://bugzilla.suse.com/show_bug.cgi?id=1176447 * https://bugzilla.suse.com/show_bug.cgi?id=1176774 * https://bugzilla.suse.com/show_bug.cgi?id=1176869 * https://bugzilla.suse.com/show_bug.cgi?id=1178134 * https://bugzilla.suse.com/show_bug.cgi?id=1181147 * https://bugzilla.suse.com/show_bug.cgi?id=1184631 * https://bugzilla.suse.com/show_bug.cgi?id=1185570 * https://bugzilla.suse.com/show_bug.cgi?id=1185589 * https://bugzilla.suse.com/show_bug.cgi?id=1185902 * https://bugzilla.suse.com/show_bug.cgi?id=1186885 * https://bugzilla.suse.com/show_bug.cgi?id=1187357 * https://bugzilla.suse.com/show_bug.cgi?id=1188616 * https://bugzilla.suse.com/show_bug.cgi?id=1188772 * https://bugzilla.suse.com/show_bug.cgi?id=1189883 * https://bugzilla.suse.com/show_bug.cgi?id=1190795 * https://bugzilla.suse.com/show_bug.cgi?id=1191452 * https://bugzilla.suse.com/show_bug.cgi?id=1192107 * https://bugzilla.suse.com/show_bug.cgi?id=1194288 * https://bugzilla.suse.com/show_bug.cgi?id=1194591 * https://bugzilla.suse.com/show_bug.cgi?id=1196956 * https://bugzilla.suse.com/show_bug.cgi?id=1197760 * https://bugzilla.suse.com/show_bug.cgi?id=1198029 * https://bugzilla.suse.com/show_bug.cgi?id=1199304 * https://bugzilla.suse.com/show_bug.cgi?id=1200619 * https://bugzilla.suse.com/show_bug.cgi?id=1203389 * https://bugzilla.suse.com/show_bug.cgi?id=1206646 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1210629 * https://bugzilla.suse.com/show_bug.cgi?id=1213476 * https://bugzilla.suse.com/show_bug.cgi?id=1215420 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1220137 * https://bugzilla.suse.com/show_bug.cgi?id=1220144 * https://bugzilla.suse.com/show_bug.cgi?id=1220754 * https://bugzilla.suse.com/show_bug.cgi?id=1220877 * https://bugzilla.suse.com/show_bug.cgi?id=1220960 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221113 * https://bugzilla.suse.com/show_bug.cgi?id=1221829 * https://bugzilla.suse.com/show_bug.cgi?id=1222251 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222838 * https://bugzilla.suse.com/show_bug.cgi?id=1222867 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223512 * https://bugzilla.suse.com/show_bug.cgi?id=1223932 * https://bugzilla.suse.com/show_bug.cgi?id=1223934 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224816 * https://bugzilla.suse.com/show_bug.cgi?id=1224826 * https://bugzilla.suse.com/show_bug.cgi?id=1224830 * https://bugzilla.suse.com/show_bug.cgi?id=1224831 * https://bugzilla.suse.com/show_bug.cgi?id=1224832 * https://bugzilla.suse.com/show_bug.cgi?id=1224834 * https://bugzilla.suse.com/show_bug.cgi?id=1224841 * https://bugzilla.suse.com/show_bug.cgi?id=1224842 * https://bugzilla.suse.com/show_bug.cgi?id=1224843 * https://bugzilla.suse.com/show_bug.cgi?id=1224844 * https://bugzilla.suse.com/show_bug.cgi?id=1224846 * https://bugzilla.suse.com/show_bug.cgi?id=1224849 * https://bugzilla.suse.com/show_bug.cgi?id=1224852 * https://bugzilla.suse.com/show_bug.cgi?id=1224853 * https://bugzilla.suse.com/show_bug.cgi?id=1224854 * https://bugzilla.suse.com/show_bug.cgi?id=1224859 * https://bugzilla.suse.com/show_bug.cgi?id=1224882 * https://bugzilla.suse.com/show_bug.cgi?id=1224886 * https://bugzilla.suse.com/show_bug.cgi?id=1224888 * https://bugzilla.suse.com/show_bug.cgi?id=1224889 * https://bugzilla.suse.com/show_bug.cgi?id=1224891 * https://bugzilla.suse.com/show_bug.cgi?id=1224892 * https://bugzilla.suse.com/show_bug.cgi?id=1224893 * https://bugzilla.suse.com/show_bug.cgi?id=1224899 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224909 * https://bugzilla.suse.com/show_bug.cgi?id=1224916 * https://bugzilla.suse.com/show_bug.cgi?id=1224917 * https://bugzilla.suse.com/show_bug.cgi?id=1224922 * https://bugzilla.suse.com/show_bug.cgi?id=1224923 * https://bugzilla.suse.com/show_bug.cgi?id=1224924 * https://bugzilla.suse.com/show_bug.cgi?id=1224926 * https://bugzilla.suse.com/show_bug.cgi?id=1224928 * https://bugzilla.suse.com/show_bug.cgi?id=1224953 * https://bugzilla.suse.com/show_bug.cgi?id=1224954 * https://bugzilla.suse.com/show_bug.cgi?id=1224955 * https://bugzilla.suse.com/show_bug.cgi?id=1224957 * https://bugzilla.suse.com/show_bug.cgi?id=1224961 * https://bugzilla.suse.com/show_bug.cgi?id=1224963 * https://bugzilla.suse.com/show_bug.cgi?id=1224965 * https://bugzilla.suse.com/show_bug.cgi?id=1224966 * https://bugzilla.suse.com/show_bug.cgi?id=1224968 * https://bugzilla.suse.com/show_bug.cgi?id=1224981 * https://bugzilla.suse.com/show_bug.cgi?id=1224982 * https://bugzilla.suse.com/show_bug.cgi?id=1224983 * https://bugzilla.suse.com/show_bug.cgi?id=1224984 * https://bugzilla.suse.com/show_bug.cgi?id=1224987 * https://bugzilla.suse.com/show_bug.cgi?id=1224990 * https://bugzilla.suse.com/show_bug.cgi?id=1224993 * https://bugzilla.suse.com/show_bug.cgi?id=1224996 * https://bugzilla.suse.com/show_bug.cgi?id=1224997 * https://bugzilla.suse.com/show_bug.cgi?id=1225026 * https://bugzilla.suse.com/show_bug.cgi?id=1225030 * https://bugzilla.suse.com/show_bug.cgi?id=1225058 * https://bugzilla.suse.com/show_bug.cgi?id=1225060 * https://bugzilla.suse.com/show_bug.cgi?id=1225083 * https://bugzilla.suse.com/show_bug.cgi?id=1225084 * https://bugzilla.suse.com/show_bug.cgi?id=1225091 * https://bugzilla.suse.com/show_bug.cgi?id=1225112 * https://bugzilla.suse.com/show_bug.cgi?id=1225113 * https://bugzilla.suse.com/show_bug.cgi?id=1225128 * https://bugzilla.suse.com/show_bug.cgi?id=1225140 * https://bugzilla.suse.com/show_bug.cgi?id=1225143 * https://bugzilla.suse.com/show_bug.cgi?id=1225148 * https://bugzilla.suse.com/show_bug.cgi?id=1225155 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225177 * https://bugzilla.suse.com/show_bug.cgi?id=1225178 * https://bugzilla.suse.com/show_bug.cgi?id=1225181 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225198 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225206 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225214 * https://bugzilla.suse.com/show_bug.cgi?id=1225223 * https://bugzilla.suse.com/show_bug.cgi?id=1225224 * https://bugzilla.suse.com/show_bug.cgi?id=1225230 * https://bugzilla.suse.com/show_bug.cgi?id=1225232 * https://bugzilla.suse.com/show_bug.cgi?id=1225233 * https://bugzilla.suse.com/show_bug.cgi?id=1225237 * https://bugzilla.suse.com/show_bug.cgi?id=1225238 * https://bugzilla.suse.com/show_bug.cgi?id=1225243 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225247 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225252 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225261 * https://bugzilla.suse.com/show_bug.cgi?id=1225262 * https://bugzilla.suse.com/show_bug.cgi?id=1225263 * https://bugzilla.suse.com/show_bug.cgi?id=1225301 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225316 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225320 * https://bugzilla.suse.com/show_bug.cgi?id=1225321 * https://bugzilla.suse.com/show_bug.cgi?id=1225322 * https://bugzilla.suse.com/show_bug.cgi?id=1225326 * https://bugzilla.suse.com/show_bug.cgi?id=1225327 * https://bugzilla.suse.com/show_bug.cgi?id=1225328 * https://bugzilla.suse.com/show_bug.cgi?id=1225330 * https://bugzilla.suse.com/show_bug.cgi?id=1225333 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225341 * https://bugzilla.suse.com/show_bug.cgi?id=1225346 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225357 * https://bugzilla.suse.com/show_bug.cgi?id=1225358 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225361 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225369 * https://bugzilla.suse.com/show_bug.cgi?id=1225370 * https://bugzilla.suse.com/show_bug.cgi?id=1225372 * https://bugzilla.suse.com/show_bug.cgi?id=1225374 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225386 * https://bugzilla.suse.com/show_bug.cgi?id=1225387 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225393 * https://bugzilla.suse.com/show_bug.cgi?id=1225400 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225405 * https://bugzilla.suse.com/show_bug.cgi?id=1225409 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225424 * https://bugzilla.suse.com/show_bug.cgi?id=1225427 * https://bugzilla.suse.com/show_bug.cgi?id=1225435 * https://bugzilla.suse.com/show_bug.cgi?id=1225437 * https://bugzilla.suse.com/show_bug.cgi?id=1225438 * https://bugzilla.suse.com/show_bug.cgi?id=1225439 * https://bugzilla.suse.com/show_bug.cgi?id=1225446 * https://bugzilla.suse.com/show_bug.cgi?id=1225447 * https://bugzilla.suse.com/show_bug.cgi?id=1225448 * https://bugzilla.suse.com/show_bug.cgi?id=1225450 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225455 * https://bugzilla.suse.com/show_bug.cgi?id=1225468 * https://bugzilla.suse.com/show_bug.cgi?id=1225499 * https://bugzilla.suse.com/show_bug.cgi?id=1225500 * https://bugzilla.suse.com/show_bug.cgi?id=1225508 * https://bugzilla.suse.com/show_bug.cgi?id=1225534 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 20:32:36 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 20:32:36 -0000 Subject: SUSE-SU-2024:1530-2: moderate: Security update for grafana and mybatis Message-ID: <171926115612.28263.12583902510032960434@smelt2.prg2.suse.org> # Security update for grafana and mybatis Announcement ID: SUSE-SU-2024:1530-2 Rating: moderate References: * bsc#1219912 * bsc#1222155 * jsc#MSQA-760 Cross-References: * CVE-2023-6152 * CVE-2024-1313 CVSS scores: * CVE-2023-6152 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-1313 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves two vulnerabilities and contains one feature can now be installed. ## Description: This update for grafana and mybatis fixes the following issues: grafana was updated to version 9.5.18: * Grafana now requires Go 1.20 * Security issues fixed: * CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155) * CVE-2023-6152: Add email verification when updating user email (bsc#1219912) * Other non-security related changes: * Version 9.5.17: * [FEATURE] Alerting: Backport use Alertmanager API v2 * Version 9.5.16: * [BUGFIX] Annotations: Split cleanup into separate queries and deletes to avoid deadlocks on MySQL * Version 9.5.15: * [FEATURE] Alerting: Attempt to retry retryable errors * Version 9.5.14: * [BUGFIX] Alerting: Fix state manager to not keep datasource_uid and ref_id labels in state after Error * [BUGFIX] Transformations: Config overrides being lost when config from query transform is applied * [BUGFIX] LDAP: Fix enable users on successfull login * Version 9.5.13: * [BUGFIX] BrowseDashboards: Only remember the most recent expanded folder * [BUGFIX] Licensing: Pass func to update env variables when starting plugin * Version 9.5.12: * [FEATURE] Azure: Add support for Workload Identity authentication * Version 9.5.9: * [FEATURE] SSE: Fix DSNode to not panic when response has empty response * [FEATURE] Prometheus: Handle the response with different field key order * [BUGFIX] LDAP: Fix user disabling mybatis: * `apache-commons-ognl` is now a non-optional dependency * Fixed building with log4j v1 and v2 dependencies ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1530=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1530=1 ## Package List: * openSUSE Leap 15.6 (noarch) * mybatis-javadoc-3.5.6-150200.5.6.1 * mybatis-3.5.6-150200.5.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * grafana-9.5.18-150200.3.56.1 * grafana-debuginfo-9.5.18-150200.3.56.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * grafana-9.5.18-150200.3.56.1 * grafana-debuginfo-9.5.18-150200.3.56.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6152.html * https://www.suse.com/security/cve/CVE-2024-1313.html * https://bugzilla.suse.com/show_bug.cgi?id=1219912 * https://bugzilla.suse.com/show_bug.cgi?id=1222155 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 24 20:32:38 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 24 Jun 2024 20:32:38 -0000 Subject: SUSE-RU-2024:1531-2: moderate: Recommended update for golang-github-prometheus-alertmanager, golang-github-prometheus-node_exporter Message-ID: <171926115859.28263.11110092819088055124@smelt2.prg2.suse.org> # Recommended update for golang-github-prometheus-alertmanager, golang-github- prometheus-node_exporter Announcement ID: SUSE-RU-2024:1531-2 Rating: moderate References: * jsc#MSQA-760 * jsc#PED-7893 * jsc#PED-7928 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that contains three features can now be installed. ## Description: This update for golang-github-prometheus-alertmanager, golang-github-prometheus- node_exporter fixes the following issues: * update to 1.7.0 (jsc#PED-7893, jsc#PED-7928): * [FEATURE] Add ZFS freebsd per dataset stats #2753 * [FEATURE] Add cpu vulnerabilities reporting from sysfs #2721 * [ENHANCEMENT] Parallelize stat calls in Linux filesystem collector #1772 * [ENHANCEMENT] Add missing linkspeeds to ethtool collector #2711 * [ENHANCEMENT] Add CPU MHz as the value for node_cpu_info metric #2778 * [ENHANCEMENT] Improve qdisc collector performance #2779 * [ENHANCEMENT] Add include and exclude filter for hwmon collector #2699 * [ENHANCEMENT] Optionally fetch ARP stats via rtnetlink instead of procfs #2777 * [BUFFIX] Fix ZFS arcstats on FreeBSD 14.0+ 2754 * [BUGFIX] Fallback to 32-bit stats in netdev #2757 * [BUGFIX] Close btrfs.FS handle after use #2780 * [BUGFIX] Move RO status before error return #2807 * [BUFFIX] Fix promhttp_metric_handler_errors_total being always active #2808 * [BUGFIX] Fix nfsd v4 index miss #2824 * update to 1.6.1: (no source code changes in this release) * BuildRequire go1.20 * update to 1.6.0: * [CHANGE] Fix cpustat when some cpus are offline #2318 * [CHANGE] Remove metrics of offline CPUs in CPU collector #2605 * [CHANGE] Deprecate ntp collector #2603 * [CHANGE] Remove bcache `cache_readaheads_totals` metrics #2583 * [CHANGE] Deprecate supervisord collector #2685 * [FEATURE] Enable uname collector on NetBSD #2559 * [FEATURE] NetBSD support for the meminfo collector #2570 * [FEATURE] NetBSD support for CPU collector #2626 * [FEATURE] Add FreeBSD collector for netisr subsystem #2668 * [FEATURE] Add softirqs collector #2669 * [ENHANCEMENT] Add suspended as a `node_zfs_zpool_state` #2449 * [ENHANCEMENT] Add administrative state of Linux network interfaces #2515 * [ENHANCEMENT] Log current value of GOMAXPROCS #2537 * [ENHANCEMENT] Add profiler options for perf collector #2542 * [ENHANCEMENT] Allow root path as metrics path #2590 * [ENHANCEMENT] Add cpu frequency governor metrics #2569 * [ENHANCEMENT] Add new landing page #2622 * [ENHANCEMENT] Reduce privileges needed for btrfs device stats #2634 * [ENHANCEMENT] Add ZFS `memory_available_bytes` #2687 * [ENHANCEMENT] Use `SCSI_IDENT_SERIAL` as serial in diskstats #2612 * [ENHANCEMENT] Read missing from netlink netclass attributes from sysfs #2669 * [BUGFIX] perf: fixes for automatically detecting the correct tracefs mountpoints #2553 * [BUGFIX] Fix `thermal_zone` collector noise @2554 * [BUGFIX] Fix a problem fetching the user wire count on FreeBSD 2584 * [BUGFIX] interrupts: Fix fields on linux aarch64 #2631 * [BUGFIX] Remove metrics of offline CPUs in CPU collector #2605 * [BUGFIX] Fix OpenBSD filesystem collector string parsing #2637 * [BUGFIX] Fix bad reporting of `node_cpu_seconds_total` in OpenBSD #2663 * change go_modules archive in _service to use obscpio file ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1531=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1531=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1531=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-debuginfo-0.26.0-150100.4.22.1 * golang-github-prometheus-alertmanager-0.26.0-150100.4.22.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-debuginfo-0.26.0-150100.4.22.1 * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * golang-github-prometheus-alertmanager-0.26.0-150100.4.22.1 ## References: * https://jira.suse.com/browse/MSQA-760 * https://jira.suse.com/browse/PED-7893 * https://jira.suse.com/browse/PED-7928 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 08:31:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 08:31:08 -0000 Subject: SUSE-SU-2024:2189-1: important: Security update for the Linux Kernel Message-ID: <171930426828.25877.7361176918763787360@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:2189-1 Rating: important References: * bsc#1065729 * bsc#1174585 * bsc#1190569 * bsc#1191949 * bsc#1192107 * bsc#1193983 * bsc#1194288 * bsc#1194869 * bsc#1196869 * bsc#1196956 * bsc#1197915 * bsc#1200313 * bsc#1201308 * bsc#1201489 * bsc#1208149 * bsc#1209657 * bsc#1209799 * bsc#1209834 * bsc#1210335 * bsc#1211592 * bsc#1213863 * bsc#1216702 * bsc#1217169 * bsc#1217515 * bsc#1218447 * bsc#1218917 * bsc#1220492 * bsc#1220783 * bsc#1221044 * bsc#1221645 * bsc#1221958 * bsc#1222011 * bsc#1222559 * bsc#1222619 * bsc#1222721 * bsc#1222976 * bsc#1223057 * bsc#1223084 * bsc#1223111 * bsc#1223138 * bsc#1223191 * bsc#1223384 * bsc#1223390 * bsc#1223481 * bsc#1223501 * bsc#1223505 * bsc#1223512 * bsc#1223520 * bsc#1223532 * bsc#1223626 * bsc#1223715 * bsc#1223894 * bsc#1223921 * bsc#1223922 * bsc#1223923 * bsc#1223924 * bsc#1223929 * bsc#1223931 * bsc#1223932 * bsc#1223934 * bsc#1223941 * bsc#1223948 * bsc#1223952 * bsc#1223953 * bsc#1223957 * bsc#1223962 * bsc#1223963 * bsc#1223964 * bsc#1223996 * bsc#1224085 * bsc#1224099 * bsc#1224137 * bsc#1224174 * bsc#1224438 * bsc#1224482 * bsc#1224488 * bsc#1224494 * bsc#1224511 * bsc#1224592 * bsc#1224611 * bsc#1224664 * bsc#1224678 * bsc#1224682 * bsc#1224685 * bsc#1224730 * bsc#1224736 * bsc#1224763 * bsc#1224816 * bsc#1224895 * bsc#1224898 * bsc#1224900 * bsc#1224901 * bsc#1224902 * bsc#1224903 * bsc#1224904 * bsc#1224905 * bsc#1224907 * bsc#1224909 * bsc#1224910 * bsc#1224911 * bsc#1224912 * bsc#1224913 * bsc#1224914 * bsc#1224915 * bsc#1224920 * bsc#1224928 * bsc#1224931 * bsc#1224932 * bsc#1224937 * bsc#1224942 * bsc#1224944 * bsc#1224945 * bsc#1224947 * bsc#1224956 * bsc#1224988 * bsc#1225000 * bsc#1225003 * bsc#1225005 * bsc#1225009 * bsc#1225022 * bsc#1225031 * bsc#1225032 * bsc#1225036 * bsc#1225044 * bsc#1225076 * bsc#1225077 * bsc#1225082 * bsc#1225086 * bsc#1225092 * bsc#1225095 * bsc#1225096 * bsc#1225106 * bsc#1225108 * bsc#1225109 * bsc#1225118 * bsc#1225121 * bsc#1225122 * bsc#1225123 * bsc#1225125 * bsc#1225126 * bsc#1225127 * bsc#1225129 * bsc#1225131 * bsc#1225132 * bsc#1225145 * bsc#1225151 * bsc#1225153 * bsc#1225156 * bsc#1225158 * bsc#1225160 * bsc#1225161 * bsc#1225164 * bsc#1225167 * bsc#1225180 * bsc#1225183 * bsc#1225184 * bsc#1225186 * bsc#1225187 * bsc#1225189 * bsc#1225190 * bsc#1225191 * bsc#1225192 * bsc#1225193 * bsc#1225195 * bsc#1225198 * bsc#1225201 * bsc#1225203 * bsc#1225205 * bsc#1225206 * bsc#1225207 * bsc#1225208 * bsc#1225209 * bsc#1225210 * bsc#1225214 * bsc#1225223 * bsc#1225224 * bsc#1225225 * bsc#1225227 * bsc#1225228 * bsc#1225229 * bsc#1225230 * bsc#1225232 * bsc#1225233 * bsc#1225235 * bsc#1225236 * bsc#1225237 * bsc#1225238 * bsc#1225239 * bsc#1225240 * bsc#1225241 * bsc#1225242 * bsc#1225243 * bsc#1225244 * bsc#1225245 * bsc#1225246 * bsc#1225247 * bsc#1225248 * bsc#1225249 * bsc#1225250 * bsc#1225251 * bsc#1225252 * bsc#1225253 * bsc#1225254 * bsc#1225255 * bsc#1225256 * bsc#1225257 * bsc#1225258 * bsc#1225259 * bsc#1225260 * bsc#1225261 * bsc#1225262 * bsc#1225263 * bsc#1225268 * bsc#1225301 * bsc#1225303 * bsc#1225304 * bsc#1225306 * bsc#1225316 * bsc#1225318 * bsc#1225320 * bsc#1225321 * bsc#1225322 * bsc#1225323 * bsc#1225326 * bsc#1225327 * bsc#1225328 * bsc#1225329 * bsc#1225330 * bsc#1225331 * bsc#1225332 * bsc#1225333 * bsc#1225334 * bsc#1225335 * bsc#1225336 * bsc#1225337 * bsc#1225338 * bsc#1225339 * bsc#1225341 * bsc#1225342 * bsc#1225344 * bsc#1225346 * bsc#1225347 * bsc#1225351 * bsc#1225353 * bsc#1225354 * bsc#1225355 * bsc#1225357 * bsc#1225358 * bsc#1225360 * bsc#1225361 * bsc#1225366 * bsc#1225367 * bsc#1225368 * bsc#1225369 * bsc#1225370 * bsc#1225372 * bsc#1225373 * bsc#1225374 * bsc#1225375 * bsc#1225376 * bsc#1225377 * bsc#1225379 * bsc#1225380 * bsc#1225383 * bsc#1225384 * bsc#1225386 * bsc#1225387 * bsc#1225388 * bsc#1225390 * bsc#1225392 * bsc#1225393 * bsc#1225396 * bsc#1225400 * bsc#1225404 * bsc#1225405 * bsc#1225409 * bsc#1225410 * bsc#1225411 * bsc#1225425 * bsc#1225427 * bsc#1225431 * bsc#1225435 * bsc#1225436 * bsc#1225437 * bsc#1225438 * bsc#1225439 * bsc#1225441 * bsc#1225445 * bsc#1225446 * bsc#1225447 * bsc#1225450 * bsc#1225453 * bsc#1225455 * bsc#1225461 * bsc#1225463 * bsc#1225464 * bsc#1225466 * bsc#1225471 * bsc#1225472 * bsc#1225478 * bsc#1225479 * bsc#1225482 * bsc#1225483 * bsc#1225486 * bsc#1225488 * bsc#1225490 * bsc#1225492 * bsc#1225495 * bsc#1225499 * bsc#1225500 * bsc#1225501 * bsc#1225508 * bsc#1225510 * bsc#1225529 * bsc#1225530 * bsc#1225532 * bsc#1225534 * bsc#1225549 * bsc#1225550 * bsc#1225553 * bsc#1225554 * bsc#1225557 * bsc#1225559 * bsc#1225560 * bsc#1225565 * bsc#1225566 * bsc#1225569 * bsc#1225570 * bsc#1225571 * bsc#1225572 * bsc#1225577 * bsc#1225583 * bsc#1225584 * bsc#1225588 * bsc#1225589 * bsc#1225590 * bsc#1225591 * bsc#1225592 * bsc#1225595 * bsc#1225599 * jsc#PED-8111 Cross-References: * CVE-2020-36788 * CVE-2021-39698 * CVE-2021-4148 * CVE-2021-43056 * CVE-2021-47358 * CVE-2021-47359 * CVE-2021-47360 * CVE-2021-47361 * CVE-2021-47362 * CVE-2021-47363 * CVE-2021-47364 * CVE-2021-47365 * CVE-2021-47366 * CVE-2021-47367 * CVE-2021-47368 * CVE-2021-47369 * CVE-2021-47370 * CVE-2021-47371 * CVE-2021-47372 * CVE-2021-47373 * CVE-2021-47374 * CVE-2021-47375 * CVE-2021-47376 * CVE-2021-47378 * CVE-2021-47379 * CVE-2021-47380 * CVE-2021-47381 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47384 * CVE-2021-47385 * CVE-2021-47386 * CVE-2021-47387 * CVE-2021-47388 * CVE-2021-47389 * CVE-2021-47390 * CVE-2021-47391 * CVE-2021-47392 * CVE-2021-47393 * CVE-2021-47394 * CVE-2021-47395 * CVE-2021-47396 * CVE-2021-47397 * CVE-2021-47398 * CVE-2021-47399 * CVE-2021-47400 * CVE-2021-47401 * CVE-2021-47402 * CVE-2021-47403 * CVE-2021-47404 * CVE-2021-47405 * CVE-2021-47406 * CVE-2021-47407 * CVE-2021-47408 * CVE-2021-47409 * CVE-2021-47410 * CVE-2021-47412 * CVE-2021-47413 * CVE-2021-47414 * CVE-2021-47415 * CVE-2021-47416 * CVE-2021-47417 * CVE-2021-47418 * CVE-2021-47419 * CVE-2021-47420 * CVE-2021-47421 * CVE-2021-47422 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47425 * CVE-2021-47426 * CVE-2021-47427 * CVE-2021-47428 * CVE-2021-47429 * CVE-2021-47430 * CVE-2021-47431 * CVE-2021-47433 * CVE-2021-47434 * CVE-2021-47435 * CVE-2021-47436 * CVE-2021-47437 * CVE-2021-47438 * CVE-2021-47439 * CVE-2021-47440 * CVE-2021-47441 * CVE-2021-47442 * CVE-2021-47443 * CVE-2021-47444 * CVE-2021-47445 * CVE-2021-47446 * CVE-2021-47447 * CVE-2021-47448 * CVE-2021-47449 * CVE-2021-47450 * CVE-2021-47451 * CVE-2021-47452 * CVE-2021-47453 * CVE-2021-47454 * CVE-2021-47455 * CVE-2021-47456 * CVE-2021-47457 * CVE-2021-47458 * CVE-2021-47459 * CVE-2021-47460 * CVE-2021-47461 * CVE-2021-47462 * CVE-2021-47463 * CVE-2021-47464 * CVE-2021-47465 * CVE-2021-47466 * CVE-2021-47467 * CVE-2021-47468 * CVE-2021-47469 * CVE-2021-47470 * CVE-2021-47471 * CVE-2021-47472 * CVE-2021-47473 * CVE-2021-47474 * CVE-2021-47475 * CVE-2021-47476 * CVE-2021-47477 * CVE-2021-47478 * CVE-2021-47479 * CVE-2021-47480 * CVE-2021-47481 * CVE-2021-47482 * CVE-2021-47483 * CVE-2021-47484 * CVE-2021-47485 * CVE-2021-47486 * CVE-2021-47488 * CVE-2021-47489 * CVE-2021-47490 * CVE-2021-47491 * CVE-2021-47492 * CVE-2021-47493 * CVE-2021-47494 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47498 * CVE-2021-47499 * CVE-2021-47500 * CVE-2021-47501 * CVE-2021-47502 * CVE-2021-47503 * CVE-2021-47505 * CVE-2021-47506 * CVE-2021-47507 * CVE-2021-47509 * CVE-2021-47510 * CVE-2021-47511 * CVE-2021-47513 * CVE-2021-47514 * CVE-2021-47516 * CVE-2021-47518 * CVE-2021-47520 * CVE-2021-47521 * CVE-2021-47522 * CVE-2021-47523 * CVE-2021-47524 * CVE-2021-47525 * CVE-2021-47526 * CVE-2021-47527 * CVE-2021-47528 * CVE-2021-47529 * CVE-2021-47533 * CVE-2021-47534 * CVE-2021-47535 * CVE-2021-47536 * CVE-2021-47537 * CVE-2021-47540 * CVE-2021-47541 * CVE-2021-47542 * CVE-2021-47544 * CVE-2021-47549 * CVE-2021-47550 * CVE-2021-47551 * CVE-2021-47553 * CVE-2021-47554 * CVE-2021-47556 * CVE-2021-47558 * CVE-2021-47559 * CVE-2021-47560 * CVE-2021-47562 * CVE-2021-47563 * CVE-2021-47564 * CVE-2021-47565 * CVE-2022-48632 * CVE-2022-48634 * CVE-2022-48636 * CVE-2022-48652 * CVE-2022-48662 * CVE-2022-48671 * CVE-2022-48672 * CVE-2022-48673 * CVE-2022-48675 * CVE-2022-48686 * CVE-2022-48687 * CVE-2022-48688 * CVE-2022-48692 * CVE-2022-48693 * CVE-2022-48694 * CVE-2022-48695 * CVE-2022-48697 * CVE-2022-48699 * CVE-2022-48700 * CVE-2022-48701 * CVE-2022-48702 * CVE-2022-48703 * CVE-2022-48704 * CVE-2022-48708 * CVE-2022-48709 * CVE-2022-48710 * CVE-2023-0160 * CVE-2023-1829 * CVE-2023-2860 * CVE-2023-47233 * CVE-2023-52591 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52676 * CVE-2023-52686 * CVE-2023-52690 * CVE-2023-52702 * CVE-2023-52703 * CVE-2023-52707 * CVE-2023-52708 * CVE-2023-52730 * CVE-2023-52733 * CVE-2023-52736 * CVE-2023-52738 * CVE-2023-52739 * CVE-2023-52740 * CVE-2023-52741 * CVE-2023-52742 * CVE-2023-52743 * CVE-2023-52744 * CVE-2023-52745 * CVE-2023-52747 * CVE-2023-52753 * CVE-2023-52754 * CVE-2023-52756 * CVE-2023-52759 * CVE-2023-52763 * CVE-2023-52764 * CVE-2023-52766 * CVE-2023-52774 * CVE-2023-52781 * CVE-2023-52788 * CVE-2023-52789 * CVE-2023-52791 * CVE-2023-52798 * CVE-2023-52799 * CVE-2023-52800 * CVE-2023-52804 * CVE-2023-52805 * CVE-2023-52806 * CVE-2023-52810 * CVE-2023-52811 * CVE-2023-52814 * CVE-2023-52816 * CVE-2023-52817 * CVE-2023-52818 * CVE-2023-52819 * CVE-2023-52821 * CVE-2023-52825 * CVE-2023-52826 * CVE-2023-52832 * CVE-2023-52833 * CVE-2023-52834 * CVE-2023-52838 * CVE-2023-52840 * CVE-2023-52841 * CVE-2023-52844 * CVE-2023-52847 * CVE-2023-52853 * CVE-2023-52854 * CVE-2023-52855 * CVE-2023-52856 * CVE-2023-52858 * CVE-2023-52864 * CVE-2023-52865 * CVE-2023-52867 * CVE-2023-52868 * CVE-2023-52870 * CVE-2023-52871 * CVE-2023-52872 * CVE-2023-52873 * CVE-2023-52875 * CVE-2023-52876 * CVE-2023-52877 * CVE-2023-52878 * CVE-2023-52880 * CVE-2023-6531 * CVE-2024-0639 * CVE-2024-26739 * CVE-2024-26764 * CVE-2024-26828 * CVE-2024-26840 * CVE-2024-26852 * CVE-2024-26862 * CVE-2024-26921 * CVE-2024-26925 * CVE-2024-26928 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-27413 * CVE-2024-35811 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35863 * CVE-2024-35867 * CVE-2024-35868 * CVE-2024-35895 * CVE-2024-35904 * CVE-2024-35905 * CVE-2024-35914 * CVE-2024-36926 CVSS scores: * CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-4148 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-4148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47358 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47364 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47365 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47366 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2021-47367 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47368 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47371 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47372 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47373 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47379 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47389 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2021-47390 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47394 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47398 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47407 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47414 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47418 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47420 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47421 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47429 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47439 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47448 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2021-47449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47452 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47466 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47467 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47470 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47474 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47475 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47476 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47477 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47488 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47489 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47490 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47510 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47513 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47514 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47520 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47520 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47524 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47525 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47525 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47526 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47528 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47529 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47533 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2021-47537 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47544 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47550 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47553 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47556 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-48672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48675 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48686 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-48687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48694 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-48699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48700 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48701 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48709 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2023-2860 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52702 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52707 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52739 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52745 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52756 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 320 vulnerabilities, contains one feature and has 20 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488). * CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084). * CVE-2024-35863: Fix potential UAF in is_valid_oplock_break() (bsc#1224763). * CVE-2024-35867: Fix potential UAF in cifs_stats_proc_show() (bsc#1224664). * CVE-2024-35868: Fix potential UAF in cifs_stats_proc_write() (bsc#1224678). * CVE-2024-26928: Fix potential UAF in cifs_debug_files_proc_show() (bsc#1223532). * CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE (bsc#1222011). * CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390). * CVE-2024-27413: Fix incorrect allocation size (bsc#1224438). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736). * CVE-2024-35904: Avoid dereference of garbage after mount failure (bsc#1224494). * CVE-2024-26929: Fixed double free of fcport (bsc#1223715). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223626). * CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976). * CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111). * CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917). * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). The following non-security bugs were fixed: * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * filemap: remove use of wait bookmarks (bsc#1224085). * idpf: extend tx watchdog timeout (bsc#1224137). * ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958) * powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191). * powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729). * powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869). * powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV (bsc#1220492 ltc#205270). * powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783). * powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191). * powerpc: Refactor verification of MSR_RI (bsc#1223191). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2189=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2189=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2189=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2189=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2189=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2189=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2189=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2189=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-2189=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2189=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2189=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2189=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2189=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2189=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2189=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2189=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2189=1 ## Package List: * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.122.2 * openSUSE Leap 15.4 (noarch) * kernel-devel-5.14.21-150400.24.122.1 * kernel-docs-html-5.14.21-150400.24.122.2 * kernel-source-vanilla-5.14.21-150400.24.122.1 * kernel-source-5.14.21-150400.24.122.1 * kernel-macros-5.14.21-150400.24.122.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.122.2 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-livepatch-devel-5.14.21-150400.24.122.2 * kernel-debug-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-debug-debugsource-5.14.21-150400.24.122.2 * kernel-debug-devel-5.14.21-150400.24.122.2 * kernel-debug-debuginfo-5.14.21-150400.24.122.2 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.122.2 * kernel-kvmsmall-debuginfo-5.14.21-150400.24.122.2 * kernel-kvmsmall-devel-5.14.21-150400.24.122.2 * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-default-base-rebuild-5.14.21-150400.24.122.2.150400.24.58.2 * kernel-kvmsmall-debugsource-5.14.21-150400.24.122.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-5.14.21-150400.24.122.2 * kernel-obs-build-5.14.21-150400.24.122.2 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2 * dlm-kmp-default-debuginfo-5.14.21-150400.24.122.2 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-syms-5.14.21-150400.24.122.1 * dlm-kmp-default-5.14.21-150400.24.122.2 * kernel-default-optional-5.14.21-150400.24.122.2 * kernel-obs-qa-5.14.21-150400.24.122.1 * cluster-md-kmp-default-5.14.21-150400.24.122.2 * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-optional-debuginfo-5.14.21-150400.24.122.2 * kernel-default-devel-5.14.21-150400.24.122.2 * gfs2-kmp-default-5.14.21-150400.24.122.2 * kernel-default-livepatch-devel-5.14.21-150400.24.122.2 * kselftests-kmp-default-5.14.21-150400.24.122.2 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-extra-5.14.21-150400.24.122.2 * kernel-obs-build-debugsource-5.14.21-150400.24.122.2 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.122.2 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-livepatch-5.14.21-150400.24.122.2 * kernel-default-extra-debuginfo-5.14.21-150400.24.122.2 * ocfs2-kmp-default-5.14.21-150400.24.122.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.122.2 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.122.2 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2 * kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-1-150400.9.3.2 * kernel-livepatch-SLE15-SP4_Update_27-debugsource-1-150400.9.3.2 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.122.2 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.122.2 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.122.2 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.122.1 * openSUSE Leap 15.4 (aarch64) * dtb-socionext-5.14.21-150400.24.122.1 * dtb-allwinner-5.14.21-150400.24.122.1 * kernel-64kb-devel-5.14.21-150400.24.122.2 * gfs2-kmp-64kb-5.14.21-150400.24.122.2 * cluster-md-kmp-64kb-5.14.21-150400.24.122.2 * dtb-rockchip-5.14.21-150400.24.122.1 * dtb-hisilicon-5.14.21-150400.24.122.1 * dtb-qcom-5.14.21-150400.24.122.1 * dtb-apple-5.14.21-150400.24.122.1 * dtb-sprd-5.14.21-150400.24.122.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2 * kselftests-kmp-64kb-5.14.21-150400.24.122.2 * dtb-nvidia-5.14.21-150400.24.122.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.122.2 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.122.2 * dtb-exynos-5.14.21-150400.24.122.1 * kernel-64kb-livepatch-devel-5.14.21-150400.24.122.2 * dtb-amazon-5.14.21-150400.24.122.1 * kernel-64kb-extra-5.14.21-150400.24.122.2 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.122.2 * kernel-64kb-optional-5.14.21-150400.24.122.2 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.122.2 * kernel-64kb-debuginfo-5.14.21-150400.24.122.2 * dtb-broadcom-5.14.21-150400.24.122.1 * dtb-freescale-5.14.21-150400.24.122.1 * dtb-cavium-5.14.21-150400.24.122.1 * dtb-altera-5.14.21-150400.24.122.1 * dtb-xilinx-5.14.21-150400.24.122.1 * dtb-amd-5.14.21-150400.24.122.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.122.2 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.122.2 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.122.2 * reiserfs-kmp-64kb-5.14.21-150400.24.122.2 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.122.2 * dtb-mediatek-5.14.21-150400.24.122.1 * dtb-amlogic-5.14.21-150400.24.122.1 * dtb-apm-5.14.21-150400.24.122.1 * dlm-kmp-64kb-5.14.21-150400.24.122.2 * dtb-arm-5.14.21-150400.24.122.1 * ocfs2-kmp-64kb-5.14.21-150400.24.122.2 * dtb-lg-5.14.21-150400.24.122.1 * dtb-renesas-5.14.21-150400.24.122.1 * kernel-64kb-debugsource-5.14.21-150400.24.122.2 * dtb-marvell-5.14.21-150400.24.122.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.122.2 * openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.122.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.122.2 * openSUSE Leap Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2 * kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-1-150400.9.3.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-livepatch-devel-5.14.21-150400.24.122.2 * kernel-default-livepatch-5.14.21-150400.24.122.2 * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-livepatch-SLE15-SP4_Update_27-debugsource-1-150400.9.3.2 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150400.24.122.2 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * dlm-kmp-default-debuginfo-5.14.21-150400.24.122.2 * cluster-md-kmp-default-5.14.21-150400.24.122.2 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debugsource-5.14.21-150400.24.122.2 * gfs2-kmp-default-5.14.21-150400.24.122.2 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.122.2 * ocfs2-kmp-default-5.14.21-150400.24.122.2 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.122.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.122.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-debuginfo-5.14.21-150400.24.122.2 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-64kb-debugsource-5.14.21-150400.24.122.2 * kernel-64kb-devel-5.14.21-150400.24.122.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.122.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-5.14.21-150400.24.122.2 * kernel-obs-build-5.14.21-150400.24.122.2 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * kernel-syms-5.14.21-150400.24.122.1 * kernel-default-devel-5.14.21-150400.24.122.2 * kernel-obs-build-debugsource-5.14.21-150400.24.122.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.122.1 * kernel-source-5.14.21-150400.24.122.1 * kernel-macros-5.14.21-150400.24.122.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.122.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.122.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-debuginfo-5.14.21-150400.24.122.2 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-64kb-debugsource-5.14.21-150400.24.122.2 * kernel-64kb-devel-5.14.21-150400.24.122.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.122.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-5.14.21-150400.24.122.2 * kernel-obs-build-5.14.21-150400.24.122.2 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * kernel-syms-5.14.21-150400.24.122.1 * kernel-default-devel-5.14.21-150400.24.122.2 * kernel-obs-build-debugsource-5.14.21-150400.24.122.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.122.1 * kernel-source-5.14.21-150400.24.122.1 * kernel-macros-5.14.21-150400.24.122.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64) * kernel-default-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * kernel-obs-build-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-default-extra-5.14.21-150400.24.122.2 * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * kernel-syms-5.14.21-150400.24.122.1 * kernel-default-devel-5.14.21-150400.24.122.2 * kernel-obs-build-debugsource-5.14.21-150400.24.122.2 * kernel-default-extra-debuginfo-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * kernel-devel-5.14.21-150400.24.122.1 * kernel-source-5.14.21-150400.24.122.1 * kernel-macros-5.14.21-150400.24.122.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * kernel-64kb-debuginfo-5.14.21-150400.24.122.2 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-64kb-debugsource-5.14.21-150400.24.122.2 * kernel-64kb-devel-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-5.14.21-150400.24.122.2 * kernel-obs-build-5.14.21-150400.24.122.2 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-syms-5.14.21-150400.24.122.1 * kernel-default-devel-5.14.21-150400.24.122.2 * kernel-obs-build-debugsource-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * kernel-devel-5.14.21-150400.24.122.1 * kernel-source-5.14.21-150400.24.122.1 * kernel-macros-5.14.21-150400.24.122.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.122.2 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * reiserfs-kmp-default-5.14.21-150400.24.122.2 * kernel-obs-build-5.14.21-150400.24.122.2 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * kernel-syms-5.14.21-150400.24.122.1 * kernel-default-devel-5.14.21-150400.24.122.2 * kernel-obs-build-debugsource-5.14.21-150400.24.122.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.122.1 * kernel-source-5.14.21-150400.24.122.1 * kernel-macros-5.14.21-150400.24.122.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.122.2 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.122.2 * SUSE Manager Proxy 4.3 (x86_64) * kernel-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * kernel-syms-5.14.21-150400.24.122.1 * kernel-default-devel-5.14.21-150400.24.122.2 * SUSE Manager Proxy 4.3 (noarch) * kernel-devel-5.14.21-150400.24.122.1 * kernel-source-5.14.21-150400.24.122.1 * kernel-macros-5.14.21-150400.24.122.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.122.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * kernel-default-devel-5.14.21-150400.24.122.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.122.1 * kernel-macros-5.14.21-150400.24.122.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.122.2 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.122.2 * kernel-default-debugsource-5.14.21-150400.24.122.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.122.2 * kernel-syms-5.14.21-150400.24.122.1 * kernel-default-devel-5.14.21-150400.24.122.2 * SUSE Manager Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.122.1 * kernel-source-5.14.21-150400.24.122.1 * kernel-macros-5.14.21-150400.24.122.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.122.2 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.122.2 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.122.2 ## References: * https://www.suse.com/security/cve/CVE-2020-36788.html * https://www.suse.com/security/cve/CVE-2021-39698.html * https://www.suse.com/security/cve/CVE-2021-4148.html * https://www.suse.com/security/cve/CVE-2021-43056.html * https://www.suse.com/security/cve/CVE-2021-47358.html * https://www.suse.com/security/cve/CVE-2021-47359.html * https://www.suse.com/security/cve/CVE-2021-47360.html * https://www.suse.com/security/cve/CVE-2021-47361.html * https://www.suse.com/security/cve/CVE-2021-47362.html * https://www.suse.com/security/cve/CVE-2021-47363.html * https://www.suse.com/security/cve/CVE-2021-47364.html * https://www.suse.com/security/cve/CVE-2021-47365.html * https://www.suse.com/security/cve/CVE-2021-47366.html * https://www.suse.com/security/cve/CVE-2021-47367.html * https://www.suse.com/security/cve/CVE-2021-47368.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47370.html * https://www.suse.com/security/cve/CVE-2021-47371.html * https://www.suse.com/security/cve/CVE-2021-47372.html * https://www.suse.com/security/cve/CVE-2021-47373.html * https://www.suse.com/security/cve/CVE-2021-47374.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47376.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47379.html * https://www.suse.com/security/cve/CVE-2021-47380.html * https://www.suse.com/security/cve/CVE-2021-47381.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47384.html * https://www.suse.com/security/cve/CVE-2021-47385.html * https://www.suse.com/security/cve/CVE-2021-47386.html * https://www.suse.com/security/cve/CVE-2021-47387.html * https://www.suse.com/security/cve/CVE-2021-47388.html * https://www.suse.com/security/cve/CVE-2021-47389.html * https://www.suse.com/security/cve/CVE-2021-47390.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47392.html * https://www.suse.com/security/cve/CVE-2021-47393.html * https://www.suse.com/security/cve/CVE-2021-47394.html * https://www.suse.com/security/cve/CVE-2021-47395.html * https://www.suse.com/security/cve/CVE-2021-47396.html * https://www.suse.com/security/cve/CVE-2021-47397.html * https://www.suse.com/security/cve/CVE-2021-47398.html * https://www.suse.com/security/cve/CVE-2021-47399.html * https://www.suse.com/security/cve/CVE-2021-47400.html * https://www.suse.com/security/cve/CVE-2021-47401.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47403.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47405.html * https://www.suse.com/security/cve/CVE-2021-47406.html * https://www.suse.com/security/cve/CVE-2021-47407.html * https://www.suse.com/security/cve/CVE-2021-47408.html * https://www.suse.com/security/cve/CVE-2021-47409.html * https://www.suse.com/security/cve/CVE-2021-47410.html * https://www.suse.com/security/cve/CVE-2021-47412.html * https://www.suse.com/security/cve/CVE-2021-47413.html * https://www.suse.com/security/cve/CVE-2021-47414.html * https://www.suse.com/security/cve/CVE-2021-47415.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47417.html * https://www.suse.com/security/cve/CVE-2021-47418.html * https://www.suse.com/security/cve/CVE-2021-47419.html * https://www.suse.com/security/cve/CVE-2021-47420.html * https://www.suse.com/security/cve/CVE-2021-47421.html * https://www.suse.com/security/cve/CVE-2021-47422.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47425.html * https://www.suse.com/security/cve/CVE-2021-47426.html * https://www.suse.com/security/cve/CVE-2021-47427.html * https://www.suse.com/security/cve/CVE-2021-47428.html * https://www.suse.com/security/cve/CVE-2021-47429.html * https://www.suse.com/security/cve/CVE-2021-47430.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47433.html * https://www.suse.com/security/cve/CVE-2021-47434.html * https://www.suse.com/security/cve/CVE-2021-47435.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47437.html * https://www.suse.com/security/cve/CVE-2021-47438.html * https://www.suse.com/security/cve/CVE-2021-47439.html * https://www.suse.com/security/cve/CVE-2021-47440.html * https://www.suse.com/security/cve/CVE-2021-47441.html * https://www.suse.com/security/cve/CVE-2021-47442.html * https://www.suse.com/security/cve/CVE-2021-47443.html * https://www.suse.com/security/cve/CVE-2021-47444.html * https://www.suse.com/security/cve/CVE-2021-47445.html * https://www.suse.com/security/cve/CVE-2021-47446.html * https://www.suse.com/security/cve/CVE-2021-47447.html * https://www.suse.com/security/cve/CVE-2021-47448.html * https://www.suse.com/security/cve/CVE-2021-47449.html * https://www.suse.com/security/cve/CVE-2021-47450.html * https://www.suse.com/security/cve/CVE-2021-47451.html * https://www.suse.com/security/cve/CVE-2021-47452.html * https://www.suse.com/security/cve/CVE-2021-47453.html * https://www.suse.com/security/cve/CVE-2021-47454.html * https://www.suse.com/security/cve/CVE-2021-47455.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47457.html * https://www.suse.com/security/cve/CVE-2021-47458.html * https://www.suse.com/security/cve/CVE-2021-47459.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47461.html * https://www.suse.com/security/cve/CVE-2021-47462.html * https://www.suse.com/security/cve/CVE-2021-47463.html * https://www.suse.com/security/cve/CVE-2021-47464.html * https://www.suse.com/security/cve/CVE-2021-47465.html * https://www.suse.com/security/cve/CVE-2021-47466.html * https://www.suse.com/security/cve/CVE-2021-47467.html * https://www.suse.com/security/cve/CVE-2021-47468.html * https://www.suse.com/security/cve/CVE-2021-47469.html * https://www.suse.com/security/cve/CVE-2021-47470.html * https://www.suse.com/security/cve/CVE-2021-47471.html * https://www.suse.com/security/cve/CVE-2021-47472.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47474.html * https://www.suse.com/security/cve/CVE-2021-47475.html * https://www.suse.com/security/cve/CVE-2021-47476.html * https://www.suse.com/security/cve/CVE-2021-47477.html * https://www.suse.com/security/cve/CVE-2021-47478.html * https://www.suse.com/security/cve/CVE-2021-47479.html * https://www.suse.com/security/cve/CVE-2021-47480.html * https://www.suse.com/security/cve/CVE-2021-47481.html * https://www.suse.com/security/cve/CVE-2021-47482.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47484.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47486.html * https://www.suse.com/security/cve/CVE-2021-47488.html * https://www.suse.com/security/cve/CVE-2021-47489.html * https://www.suse.com/security/cve/CVE-2021-47490.html * https://www.suse.com/security/cve/CVE-2021-47491.html * https://www.suse.com/security/cve/CVE-2021-47492.html * https://www.suse.com/security/cve/CVE-2021-47493.html * https://www.suse.com/security/cve/CVE-2021-47494.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47498.html * https://www.suse.com/security/cve/CVE-2021-47499.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47501.html * https://www.suse.com/security/cve/CVE-2021-47502.html * https://www.suse.com/security/cve/CVE-2021-47503.html * https://www.suse.com/security/cve/CVE-2021-47505.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47507.html * https://www.suse.com/security/cve/CVE-2021-47509.html * https://www.suse.com/security/cve/CVE-2021-47510.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47513.html * https://www.suse.com/security/cve/CVE-2021-47514.html * https://www.suse.com/security/cve/CVE-2021-47516.html * https://www.suse.com/security/cve/CVE-2021-47518.html * https://www.suse.com/security/cve/CVE-2021-47520.html * https://www.suse.com/security/cve/CVE-2021-47521.html * https://www.suse.com/security/cve/CVE-2021-47522.html * https://www.suse.com/security/cve/CVE-2021-47523.html * https://www.suse.com/security/cve/CVE-2021-47524.html * https://www.suse.com/security/cve/CVE-2021-47525.html * https://www.suse.com/security/cve/CVE-2021-47526.html * https://www.suse.com/security/cve/CVE-2021-47527.html * https://www.suse.com/security/cve/CVE-2021-47528.html * https://www.suse.com/security/cve/CVE-2021-47529.html * https://www.suse.com/security/cve/CVE-2021-47533.html * https://www.suse.com/security/cve/CVE-2021-47534.html * https://www.suse.com/security/cve/CVE-2021-47535.html * https://www.suse.com/security/cve/CVE-2021-47536.html * https://www.suse.com/security/cve/CVE-2021-47537.html * https://www.suse.com/security/cve/CVE-2021-47540.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47542.html * https://www.suse.com/security/cve/CVE-2021-47544.html * https://www.suse.com/security/cve/CVE-2021-47549.html * https://www.suse.com/security/cve/CVE-2021-47550.html * https://www.suse.com/security/cve/CVE-2021-47551.html * https://www.suse.com/security/cve/CVE-2021-47553.html * https://www.suse.com/security/cve/CVE-2021-47554.html * https://www.suse.com/security/cve/CVE-2021-47556.html * https://www.suse.com/security/cve/CVE-2021-47558.html * https://www.suse.com/security/cve/CVE-2021-47559.html * https://www.suse.com/security/cve/CVE-2021-47560.html * https://www.suse.com/security/cve/CVE-2021-47562.html * https://www.suse.com/security/cve/CVE-2021-47563.html * https://www.suse.com/security/cve/CVE-2021-47564.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2022-48632.html * https://www.suse.com/security/cve/CVE-2022-48634.html * https://www.suse.com/security/cve/CVE-2022-48636.html * https://www.suse.com/security/cve/CVE-2022-48652.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2022-48671.html * https://www.suse.com/security/cve/CVE-2022-48672.html * https://www.suse.com/security/cve/CVE-2022-48673.html * https://www.suse.com/security/cve/CVE-2022-48675.html * https://www.suse.com/security/cve/CVE-2022-48686.html * https://www.suse.com/security/cve/CVE-2022-48687.html * https://www.suse.com/security/cve/CVE-2022-48688.html * https://www.suse.com/security/cve/CVE-2022-48692.html * https://www.suse.com/security/cve/CVE-2022-48693.html * https://www.suse.com/security/cve/CVE-2022-48694.html * https://www.suse.com/security/cve/CVE-2022-48695.html * https://www.suse.com/security/cve/CVE-2022-48697.html * https://www.suse.com/security/cve/CVE-2022-48699.html * https://www.suse.com/security/cve/CVE-2022-48700.html * https://www.suse.com/security/cve/CVE-2022-48701.html * https://www.suse.com/security/cve/CVE-2022-48702.html * https://www.suse.com/security/cve/CVE-2022-48703.html * https://www.suse.com/security/cve/CVE-2022-48704.html * https://www.suse.com/security/cve/CVE-2022-48708.html * https://www.suse.com/security/cve/CVE-2022-48709.html * https://www.suse.com/security/cve/CVE-2022-48710.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-2860.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52702.html * https://www.suse.com/security/cve/CVE-2023-52703.html * https://www.suse.com/security/cve/CVE-2023-52707.html * https://www.suse.com/security/cve/CVE-2023-52708.html * https://www.suse.com/security/cve/CVE-2023-52730.html * https://www.suse.com/security/cve/CVE-2023-52733.html * https://www.suse.com/security/cve/CVE-2023-52736.html * https://www.suse.com/security/cve/CVE-2023-52738.html * https://www.suse.com/security/cve/CVE-2023-52739.html * https://www.suse.com/security/cve/CVE-2023-52740.html * https://www.suse.com/security/cve/CVE-2023-52741.html * https://www.suse.com/security/cve/CVE-2023-52742.html * https://www.suse.com/security/cve/CVE-2023-52743.html * https://www.suse.com/security/cve/CVE-2023-52744.html * https://www.suse.com/security/cve/CVE-2023-52745.html * https://www.suse.com/security/cve/CVE-2023-52747.html * https://www.suse.com/security/cve/CVE-2023-52753.html * https://www.suse.com/security/cve/CVE-2023-52754.html * https://www.suse.com/security/cve/CVE-2023-52756.html * https://www.suse.com/security/cve/CVE-2023-52759.html * https://www.suse.com/security/cve/CVE-2023-52763.html * https://www.suse.com/security/cve/CVE-2023-52764.html * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52774.html * https://www.suse.com/security/cve/CVE-2023-52781.html * https://www.suse.com/security/cve/CVE-2023-52788.html * https://www.suse.com/security/cve/CVE-2023-52789.html * https://www.suse.com/security/cve/CVE-2023-52791.html * https://www.suse.com/security/cve/CVE-2023-52798.html * https://www.suse.com/security/cve/CVE-2023-52799.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52804.html * https://www.suse.com/security/cve/CVE-2023-52805.html * https://www.suse.com/security/cve/CVE-2023-52806.html * https://www.suse.com/security/cve/CVE-2023-52810.html * https://www.suse.com/security/cve/CVE-2023-52811.html * https://www.suse.com/security/cve/CVE-2023-52814.html * https://www.suse.com/security/cve/CVE-2023-52816.html * https://www.suse.com/security/cve/CVE-2023-52817.html * https://www.suse.com/security/cve/CVE-2023-52818.html * https://www.suse.com/security/cve/CVE-2023-52819.html * https://www.suse.com/security/cve/CVE-2023-52821.html * https://www.suse.com/security/cve/CVE-2023-52825.html * https://www.suse.com/security/cve/CVE-2023-52826.html * https://www.suse.com/security/cve/CVE-2023-52832.html * https://www.suse.com/security/cve/CVE-2023-52833.html * https://www.suse.com/security/cve/CVE-2023-52834.html * https://www.suse.com/security/cve/CVE-2023-52838.html * https://www.suse.com/security/cve/CVE-2023-52840.html * https://www.suse.com/security/cve/CVE-2023-52841.html * https://www.suse.com/security/cve/CVE-2023-52844.html * https://www.suse.com/security/cve/CVE-2023-52847.html * https://www.suse.com/security/cve/CVE-2023-52853.html * https://www.suse.com/security/cve/CVE-2023-52854.html * https://www.suse.com/security/cve/CVE-2023-52855.html * https://www.suse.com/security/cve/CVE-2023-52856.html * https://www.suse.com/security/cve/CVE-2023-52858.html * https://www.suse.com/security/cve/CVE-2023-52864.html * https://www.suse.com/security/cve/CVE-2023-52865.html * https://www.suse.com/security/cve/CVE-2023-52867.html * https://www.suse.com/security/cve/CVE-2023-52868.html * https://www.suse.com/security/cve/CVE-2023-52870.html * https://www.suse.com/security/cve/CVE-2023-52871.html * https://www.suse.com/security/cve/CVE-2023-52872.html * https://www.suse.com/security/cve/CVE-2023-52873.html * https://www.suse.com/security/cve/CVE-2023-52875.html * https://www.suse.com/security/cve/CVE-2023-52876.html * https://www.suse.com/security/cve/CVE-2023-52877.html * https://www.suse.com/security/cve/CVE-2023-52878.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2024-0639.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26840.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26862.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26928.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35868.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-36926.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1174585 * https://bugzilla.suse.com/show_bug.cgi?id=1190569 * https://bugzilla.suse.com/show_bug.cgi?id=1191949 * https://bugzilla.suse.com/show_bug.cgi?id=1192107 * https://bugzilla.suse.com/show_bug.cgi?id=1193983 * https://bugzilla.suse.com/show_bug.cgi?id=1194288 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1196869 * https://bugzilla.suse.com/show_bug.cgi?id=1196956 * https://bugzilla.suse.com/show_bug.cgi?id=1197915 * https://bugzilla.suse.com/show_bug.cgi?id=1200313 * https://bugzilla.suse.com/show_bug.cgi?id=1201308 * https://bugzilla.suse.com/show_bug.cgi?id=1201489 * https://bugzilla.suse.com/show_bug.cgi?id=1208149 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1209799 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1211592 * https://bugzilla.suse.com/show_bug.cgi?id=1213863 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217515 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218917 * https://bugzilla.suse.com/show_bug.cgi?id=1220492 * https://bugzilla.suse.com/show_bug.cgi?id=1220783 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221645 * https://bugzilla.suse.com/show_bug.cgi?id=1221958 * https://bugzilla.suse.com/show_bug.cgi?id=1222011 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222976 * https://bugzilla.suse.com/show_bug.cgi?id=1223057 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223111 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223191 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223481 * https://bugzilla.suse.com/show_bug.cgi?id=1223501 * https://bugzilla.suse.com/show_bug.cgi?id=1223505 * https://bugzilla.suse.com/show_bug.cgi?id=1223512 * https://bugzilla.suse.com/show_bug.cgi?id=1223520 * https://bugzilla.suse.com/show_bug.cgi?id=1223532 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223894 * https://bugzilla.suse.com/show_bug.cgi?id=1223921 * https://bugzilla.suse.com/show_bug.cgi?id=1223922 * https://bugzilla.suse.com/show_bug.cgi?id=1223923 * https://bugzilla.suse.com/show_bug.cgi?id=1223924 * https://bugzilla.suse.com/show_bug.cgi?id=1223929 * https://bugzilla.suse.com/show_bug.cgi?id=1223931 * https://bugzilla.suse.com/show_bug.cgi?id=1223932 * https://bugzilla.suse.com/show_bug.cgi?id=1223934 * https://bugzilla.suse.com/show_bug.cgi?id=1223941 * https://bugzilla.suse.com/show_bug.cgi?id=1223948 * https://bugzilla.suse.com/show_bug.cgi?id=1223952 * https://bugzilla.suse.com/show_bug.cgi?id=1223953 * https://bugzilla.suse.com/show_bug.cgi?id=1223957 * https://bugzilla.suse.com/show_bug.cgi?id=1223962 * https://bugzilla.suse.com/show_bug.cgi?id=1223963 * https://bugzilla.suse.com/show_bug.cgi?id=1223964 * https://bugzilla.suse.com/show_bug.cgi?id=1223996 * https://bugzilla.suse.com/show_bug.cgi?id=1224085 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224137 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224488 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224664 * https://bugzilla.suse.com/show_bug.cgi?id=1224678 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224763 * https://bugzilla.suse.com/show_bug.cgi?id=1224816 * https://bugzilla.suse.com/show_bug.cgi?id=1224895 * https://bugzilla.suse.com/show_bug.cgi?id=1224898 * https://bugzilla.suse.com/show_bug.cgi?id=1224900 * https://bugzilla.suse.com/show_bug.cgi?id=1224901 * https://bugzilla.suse.com/show_bug.cgi?id=1224902 * https://bugzilla.suse.com/show_bug.cgi?id=1224903 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224905 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224909 * https://bugzilla.suse.com/show_bug.cgi?id=1224910 * https://bugzilla.suse.com/show_bug.cgi?id=1224911 * https://bugzilla.suse.com/show_bug.cgi?id=1224912 * https://bugzilla.suse.com/show_bug.cgi?id=1224913 * https://bugzilla.suse.com/show_bug.cgi?id=1224914 * https://bugzilla.suse.com/show_bug.cgi?id=1224915 * https://bugzilla.suse.com/show_bug.cgi?id=1224920 * https://bugzilla.suse.com/show_bug.cgi?id=1224928 * https://bugzilla.suse.com/show_bug.cgi?id=1224931 * https://bugzilla.suse.com/show_bug.cgi?id=1224932 * https://bugzilla.suse.com/show_bug.cgi?id=1224937 * https://bugzilla.suse.com/show_bug.cgi?id=1224942 * https://bugzilla.suse.com/show_bug.cgi?id=1224944 * https://bugzilla.suse.com/show_bug.cgi?id=1224945 * https://bugzilla.suse.com/show_bug.cgi?id=1224947 * https://bugzilla.suse.com/show_bug.cgi?id=1224956 * https://bugzilla.suse.com/show_bug.cgi?id=1224988 * https://bugzilla.suse.com/show_bug.cgi?id=1225000 * https://bugzilla.suse.com/show_bug.cgi?id=1225003 * https://bugzilla.suse.com/show_bug.cgi?id=1225005 * https://bugzilla.suse.com/show_bug.cgi?id=1225009 * https://bugzilla.suse.com/show_bug.cgi?id=1225022 * https://bugzilla.suse.com/show_bug.cgi?id=1225031 * https://bugzilla.suse.com/show_bug.cgi?id=1225032 * https://bugzilla.suse.com/show_bug.cgi?id=1225036 * https://bugzilla.suse.com/show_bug.cgi?id=1225044 * https://bugzilla.suse.com/show_bug.cgi?id=1225076 * https://bugzilla.suse.com/show_bug.cgi?id=1225077 * https://bugzilla.suse.com/show_bug.cgi?id=1225082 * https://bugzilla.suse.com/show_bug.cgi?id=1225086 * https://bugzilla.suse.com/show_bug.cgi?id=1225092 * https://bugzilla.suse.com/show_bug.cgi?id=1225095 * https://bugzilla.suse.com/show_bug.cgi?id=1225096 * https://bugzilla.suse.com/show_bug.cgi?id=1225106 * https://bugzilla.suse.com/show_bug.cgi?id=1225108 * https://bugzilla.suse.com/show_bug.cgi?id=1225109 * https://bugzilla.suse.com/show_bug.cgi?id=1225118 * https://bugzilla.suse.com/show_bug.cgi?id=1225121 * https://bugzilla.suse.com/show_bug.cgi?id=1225122 * https://bugzilla.suse.com/show_bug.cgi?id=1225123 * https://bugzilla.suse.com/show_bug.cgi?id=1225125 * https://bugzilla.suse.com/show_bug.cgi?id=1225126 * https://bugzilla.suse.com/show_bug.cgi?id=1225127 * https://bugzilla.suse.com/show_bug.cgi?id=1225129 * https://bugzilla.suse.com/show_bug.cgi?id=1225131 * https://bugzilla.suse.com/show_bug.cgi?id=1225132 * https://bugzilla.suse.com/show_bug.cgi?id=1225145 * https://bugzilla.suse.com/show_bug.cgi?id=1225151 * https://bugzilla.suse.com/show_bug.cgi?id=1225153 * https://bugzilla.suse.com/show_bug.cgi?id=1225156 * https://bugzilla.suse.com/show_bug.cgi?id=1225158 * https://bugzilla.suse.com/show_bug.cgi?id=1225160 * https://bugzilla.suse.com/show_bug.cgi?id=1225161 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225167 * https://bugzilla.suse.com/show_bug.cgi?id=1225180 * https://bugzilla.suse.com/show_bug.cgi?id=1225183 * https://bugzilla.suse.com/show_bug.cgi?id=1225184 * https://bugzilla.suse.com/show_bug.cgi?id=1225186 * https://bugzilla.suse.com/show_bug.cgi?id=1225187 * https://bugzilla.suse.com/show_bug.cgi?id=1225189 * https://bugzilla.suse.com/show_bug.cgi?id=1225190 * https://bugzilla.suse.com/show_bug.cgi?id=1225191 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225195 * https://bugzilla.suse.com/show_bug.cgi?id=1225198 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225203 * https://bugzilla.suse.com/show_bug.cgi?id=1225205 * https://bugzilla.suse.com/show_bug.cgi?id=1225206 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225209 * https://bugzilla.suse.com/show_bug.cgi?id=1225210 * https://bugzilla.suse.com/show_bug.cgi?id=1225214 * https://bugzilla.suse.com/show_bug.cgi?id=1225223 * https://bugzilla.suse.com/show_bug.cgi?id=1225224 * https://bugzilla.suse.com/show_bug.cgi?id=1225225 * https://bugzilla.suse.com/show_bug.cgi?id=1225227 * https://bugzilla.suse.com/show_bug.cgi?id=1225228 * https://bugzilla.suse.com/show_bug.cgi?id=1225229 * https://bugzilla.suse.com/show_bug.cgi?id=1225230 * https://bugzilla.suse.com/show_bug.cgi?id=1225232 * https://bugzilla.suse.com/show_bug.cgi?id=1225233 * https://bugzilla.suse.com/show_bug.cgi?id=1225235 * https://bugzilla.suse.com/show_bug.cgi?id=1225236 * https://bugzilla.suse.com/show_bug.cgi?id=1225237 * https://bugzilla.suse.com/show_bug.cgi?id=1225238 * https://bugzilla.suse.com/show_bug.cgi?id=1225239 * https://bugzilla.suse.com/show_bug.cgi?id=1225240 * https://bugzilla.suse.com/show_bug.cgi?id=1225241 * https://bugzilla.suse.com/show_bug.cgi?id=1225242 * https://bugzilla.suse.com/show_bug.cgi?id=1225243 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225245 * https://bugzilla.suse.com/show_bug.cgi?id=1225246 * https://bugzilla.suse.com/show_bug.cgi?id=1225247 * https://bugzilla.suse.com/show_bug.cgi?id=1225248 * https://bugzilla.suse.com/show_bug.cgi?id=1225249 * https://bugzilla.suse.com/show_bug.cgi?id=1225250 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225252 * https://bugzilla.suse.com/show_bug.cgi?id=1225253 * https://bugzilla.suse.com/show_bug.cgi?id=1225254 * https://bugzilla.suse.com/show_bug.cgi?id=1225255 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225257 * https://bugzilla.suse.com/show_bug.cgi?id=1225258 * https://bugzilla.suse.com/show_bug.cgi?id=1225259 * https://bugzilla.suse.com/show_bug.cgi?id=1225260 * https://bugzilla.suse.com/show_bug.cgi?id=1225261 * https://bugzilla.suse.com/show_bug.cgi?id=1225262 * https://bugzilla.suse.com/show_bug.cgi?id=1225263 * https://bugzilla.suse.com/show_bug.cgi?id=1225268 * https://bugzilla.suse.com/show_bug.cgi?id=1225301 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225304 * https://bugzilla.suse.com/show_bug.cgi?id=1225306 * https://bugzilla.suse.com/show_bug.cgi?id=1225316 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225320 * https://bugzilla.suse.com/show_bug.cgi?id=1225321 * https://bugzilla.suse.com/show_bug.cgi?id=1225322 * https://bugzilla.suse.com/show_bug.cgi?id=1225323 * https://bugzilla.suse.com/show_bug.cgi?id=1225326 * https://bugzilla.suse.com/show_bug.cgi?id=1225327 * https://bugzilla.suse.com/show_bug.cgi?id=1225328 * https://bugzilla.suse.com/show_bug.cgi?id=1225329 * https://bugzilla.suse.com/show_bug.cgi?id=1225330 * https://bugzilla.suse.com/show_bug.cgi?id=1225331 * https://bugzilla.suse.com/show_bug.cgi?id=1225332 * https://bugzilla.suse.com/show_bug.cgi?id=1225333 * https://bugzilla.suse.com/show_bug.cgi?id=1225334 * https://bugzilla.suse.com/show_bug.cgi?id=1225335 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225337 * https://bugzilla.suse.com/show_bug.cgi?id=1225338 * https://bugzilla.suse.com/show_bug.cgi?id=1225339 * https://bugzilla.suse.com/show_bug.cgi?id=1225341 * https://bugzilla.suse.com/show_bug.cgi?id=1225342 * https://bugzilla.suse.com/show_bug.cgi?id=1225344 * https://bugzilla.suse.com/show_bug.cgi?id=1225346 * https://bugzilla.suse.com/show_bug.cgi?id=1225347 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225353 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225357 * https://bugzilla.suse.com/show_bug.cgi?id=1225358 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225361 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225368 * https://bugzilla.suse.com/show_bug.cgi?id=1225369 * https://bugzilla.suse.com/show_bug.cgi?id=1225370 * https://bugzilla.suse.com/show_bug.cgi?id=1225372 * https://bugzilla.suse.com/show_bug.cgi?id=1225373 * https://bugzilla.suse.com/show_bug.cgi?id=1225374 * https://bugzilla.suse.com/show_bug.cgi?id=1225375 * https://bugzilla.suse.com/show_bug.cgi?id=1225376 * https://bugzilla.suse.com/show_bug.cgi?id=1225377 * https://bugzilla.suse.com/show_bug.cgi?id=1225379 * https://bugzilla.suse.com/show_bug.cgi?id=1225380 * https://bugzilla.suse.com/show_bug.cgi?id=1225383 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225386 * https://bugzilla.suse.com/show_bug.cgi?id=1225387 * https://bugzilla.suse.com/show_bug.cgi?id=1225388 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225392 * https://bugzilla.suse.com/show_bug.cgi?id=1225393 * https://bugzilla.suse.com/show_bug.cgi?id=1225396 * https://bugzilla.suse.com/show_bug.cgi?id=1225400 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225405 * https://bugzilla.suse.com/show_bug.cgi?id=1225409 * https://bugzilla.suse.com/show_bug.cgi?id=1225410 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225425 * https://bugzilla.suse.com/show_bug.cgi?id=1225427 * https://bugzilla.suse.com/show_bug.cgi?id=1225431 * https://bugzilla.suse.com/show_bug.cgi?id=1225435 * https://bugzilla.suse.com/show_bug.cgi?id=1225436 * https://bugzilla.suse.com/show_bug.cgi?id=1225437 * https://bugzilla.suse.com/show_bug.cgi?id=1225438 * https://bugzilla.suse.com/show_bug.cgi?id=1225439 * https://bugzilla.suse.com/show_bug.cgi?id=1225441 * https://bugzilla.suse.com/show_bug.cgi?id=1225445 * https://bugzilla.suse.com/show_bug.cgi?id=1225446 * https://bugzilla.suse.com/show_bug.cgi?id=1225447 * https://bugzilla.suse.com/show_bug.cgi?id=1225450 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225455 * https://bugzilla.suse.com/show_bug.cgi?id=1225461 * https://bugzilla.suse.com/show_bug.cgi?id=1225463 * https://bugzilla.suse.com/show_bug.cgi?id=1225464 * https://bugzilla.suse.com/show_bug.cgi?id=1225466 * https://bugzilla.suse.com/show_bug.cgi?id=1225471 * https://bugzilla.suse.com/show_bug.cgi?id=1225472 * https://bugzilla.suse.com/show_bug.cgi?id=1225478 * https://bugzilla.suse.com/show_bug.cgi?id=1225479 * https://bugzilla.suse.com/show_bug.cgi?id=1225482 * https://bugzilla.suse.com/show_bug.cgi?id=1225483 * https://bugzilla.suse.com/show_bug.cgi?id=1225486 * https://bugzilla.suse.com/show_bug.cgi?id=1225488 * https://bugzilla.suse.com/show_bug.cgi?id=1225490 * https://bugzilla.suse.com/show_bug.cgi?id=1225492 * https://bugzilla.suse.com/show_bug.cgi?id=1225495 * https://bugzilla.suse.com/show_bug.cgi?id=1225499 * https://bugzilla.suse.com/show_bug.cgi?id=1225500 * https://bugzilla.suse.com/show_bug.cgi?id=1225501 * https://bugzilla.suse.com/show_bug.cgi?id=1225508 * https://bugzilla.suse.com/show_bug.cgi?id=1225510 * https://bugzilla.suse.com/show_bug.cgi?id=1225529 * https://bugzilla.suse.com/show_bug.cgi?id=1225530 * https://bugzilla.suse.com/show_bug.cgi?id=1225532 * https://bugzilla.suse.com/show_bug.cgi?id=1225534 * https://bugzilla.suse.com/show_bug.cgi?id=1225549 * https://bugzilla.suse.com/show_bug.cgi?id=1225550 * https://bugzilla.suse.com/show_bug.cgi?id=1225553 * https://bugzilla.suse.com/show_bug.cgi?id=1225554 * https://bugzilla.suse.com/show_bug.cgi?id=1225557 * https://bugzilla.suse.com/show_bug.cgi?id=1225559 * https://bugzilla.suse.com/show_bug.cgi?id=1225560 * https://bugzilla.suse.com/show_bug.cgi?id=1225565 * https://bugzilla.suse.com/show_bug.cgi?id=1225566 * https://bugzilla.suse.com/show_bug.cgi?id=1225569 * https://bugzilla.suse.com/show_bug.cgi?id=1225570 * https://bugzilla.suse.com/show_bug.cgi?id=1225571 * https://bugzilla.suse.com/show_bug.cgi?id=1225572 * https://bugzilla.suse.com/show_bug.cgi?id=1225577 * https://bugzilla.suse.com/show_bug.cgi?id=1225583 * https://bugzilla.suse.com/show_bug.cgi?id=1225584 * https://bugzilla.suse.com/show_bug.cgi?id=1225588 * https://bugzilla.suse.com/show_bug.cgi?id=1225589 * https://bugzilla.suse.com/show_bug.cgi?id=1225590 * https://bugzilla.suse.com/show_bug.cgi?id=1225591 * https://bugzilla.suse.com/show_bug.cgi?id=1225592 * https://bugzilla.suse.com/show_bug.cgi?id=1225595 * https://bugzilla.suse.com/show_bug.cgi?id=1225599 * https://jira.suse.com/browse/PED-8111 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 12:30:05 -0000 Subject: SUSE-SU-2024:2191-1: important: Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) Message-ID: <171931860586.7836.2966555533361129408@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:2191-1 Rating: important References: * bsc#1221302 * bsc#1222882 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2022-48651 * CVE-2024-26610 * CVE-2024-26766 * CVE-2024-26852 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_116 fixes several issues. The following security issues were fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2191=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2191=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_25-debugsource-3-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_116-default-3-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-3-150400.9.8.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_25-debugsource-3-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_116-default-3-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-3-150400.9.8.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 12:30:07 -0000 Subject: SUSE-SU-2024:2201-1: moderate: Security update for wget Message-ID: <171931860752.7836.11946346913677972708@smelt2.prg2.suse.org> # Security update for wget Announcement ID: SUSE-SU-2024:2201-1 Rating: moderate References: * bsc#1226419 Cross-References: * CVE-2024-38428 CVSS scores: * CVE-2024-38428 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for wget fixes the following issues: * CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a URI. (bsc#1226419) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2201=1 openSUSE-SLE-15.6-2024-2201=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2201=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * wget-1.20.3-150600.19.3.1 * wget-debugsource-1.20.3-150600.19.3.1 * wget-debuginfo-1.20.3-150600.19.3.1 * openSUSE Leap 15.6 (noarch) * wget-lang-1.20.3-150600.19.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * wget-1.20.3-150600.19.3.1 * wget-debugsource-1.20.3-150600.19.3.1 * wget-debuginfo-1.20.3-150600.19.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-38428.html * https://bugzilla.suse.com/show_bug.cgi?id=1226419 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 12:30:10 -0000 Subject: SUSE-SU-2024:2200-1: moderate: Security update for avahi Message-ID: <171931861044.7836.12161216459251048046@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2024:2200-1 Rating: moderate References: * bsc#1216594 * bsc#1216598 * bsc#1226586 Cross-References: * CVE-2023-38469 * CVE-2023-38471 CVSS scores: * CVE-2023-38469 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38469 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38471 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38471 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for avahi fixes the following issues: * CVE-2023-38471: Fixed a reachable assertion in dbus_set_host_name. (bsc#1216594) * CVE-2023-38469: Fixed a reachable assertion in avahi_dns_packet_append_record. (bsc#1216598) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2200=1 SUSE-2024-2200=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2200=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2200=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2200=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python3-avahi-0.8-150600.15.3.1 * libavahi-qt5-devel-0.8-150600.15.3.1 * avahi-debugsource-0.8-150600.15.3.1 * libavahi-client3-0.8-150600.15.3.1 * libavahi-glib-devel-0.8-150600.15.3.1 * typelib-1_0-Avahi-0_6-0.8-150600.15.3.1 * libdns_sd-debuginfo-0.8-150600.15.3.1 * avahi-autoipd-0.8-150600.15.3.1 * libavahi-gobject0-debuginfo-0.8-150600.15.3.1 * libavahi-gobject-devel-0.8-150600.15.3.1 * avahi-debuginfo-0.8-150600.15.3.1 * python3-avahi-gtk-0.8-150600.15.3.1 * libavahi-gobject0-0.8-150600.15.3.1 * libavahi-devel-0.8-150600.15.3.1 * avahi-0.8-150600.15.3.1 * libavahi-core7-0.8-150600.15.3.1 * libdns_sd-0.8-150600.15.3.1 * libavahi-common3-debuginfo-0.8-150600.15.3.1 * avahi-compat-howl-devel-0.8-150600.15.3.1 * libavahi-libevent1-0.8-150600.15.3.1 * avahi-utils-debuginfo-0.8-150600.15.3.1 * libavahi-qt5-1-0.8-150600.15.3.1 * libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.3.1 * libhowl0-0.8-150600.15.3.1 * libavahi-ui-gtk3-0-0.8-150600.15.3.1 * avahi-utils-0.8-150600.15.3.1 * libavahi-glib1-debuginfo-0.8-150600.15.3.1 * avahi-glib2-debugsource-0.8-150600.15.3.1 * libavahi-client3-debuginfo-0.8-150600.15.3.1 * libhowl0-debuginfo-0.8-150600.15.3.1 * libavahi-core7-debuginfo-0.8-150600.15.3.1 * libavahi-common3-0.8-150600.15.3.1 * libavahi-qt5-1-debuginfo-0.8-150600.15.3.1 * avahi-utils-gtk-debuginfo-0.8-150600.15.3.1 * avahi-autoipd-debuginfo-0.8-150600.15.3.1 * libavahi-glib1-0.8-150600.15.3.1 * libavahi-libevent1-debuginfo-0.8-150600.15.3.1 * avahi-qt5-debugsource-0.8-150600.15.3.1 * avahi-compat-mDNSResponder-devel-0.8-150600.15.3.1 * avahi-utils-gtk-0.8-150600.15.3.1 * openSUSE Leap 15.6 (x86_64) * libavahi-glib1-32bit-debuginfo-0.8-150600.15.3.1 * avahi-32bit-debuginfo-0.8-150600.15.3.1 * libavahi-glib1-32bit-0.8-150600.15.3.1 * libdns_sd-32bit-debuginfo-0.8-150600.15.3.1 * libavahi-common3-32bit-0.8-150600.15.3.1 * libavahi-client3-32bit-debuginfo-0.8-150600.15.3.1 * libdns_sd-32bit-0.8-150600.15.3.1 * libavahi-client3-32bit-0.8-150600.15.3.1 * libavahi-common3-32bit-debuginfo-0.8-150600.15.3.1 * openSUSE Leap 15.6 (noarch) * avahi-lang-0.8-150600.15.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libavahi-common3-64bit-debuginfo-0.8-150600.15.3.1 * libdns_sd-64bit-0.8-150600.15.3.1 * avahi-64bit-debuginfo-0.8-150600.15.3.1 * libdns_sd-64bit-debuginfo-0.8-150600.15.3.1 * libavahi-glib1-64bit-debuginfo-0.8-150600.15.3.1 * libavahi-glib1-64bit-0.8-150600.15.3.1 * libavahi-client3-64bit-debuginfo-0.8-150600.15.3.1 * libavahi-common3-64bit-0.8-150600.15.3.1 * libavahi-client3-64bit-0.8-150600.15.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * avahi-debugsource-0.8-150600.15.3.1 * libavahi-client3-0.8-150600.15.3.1 * libavahi-glib-devel-0.8-150600.15.3.1 * typelib-1_0-Avahi-0_6-0.8-150600.15.3.1 * libdns_sd-debuginfo-0.8-150600.15.3.1 * libavahi-gobject0-debuginfo-0.8-150600.15.3.1 * avahi-debuginfo-0.8-150600.15.3.1 * libavahi-gobject0-0.8-150600.15.3.1 * libavahi-devel-0.8-150600.15.3.1 * avahi-0.8-150600.15.3.1 * libavahi-core7-0.8-150600.15.3.1 * libdns_sd-0.8-150600.15.3.1 * libavahi-common3-debuginfo-0.8-150600.15.3.1 * avahi-compat-howl-devel-0.8-150600.15.3.1 * libavahi-libevent1-0.8-150600.15.3.1 * avahi-utils-debuginfo-0.8-150600.15.3.1 * libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.3.1 * libhowl0-0.8-150600.15.3.1 * libavahi-ui-gtk3-0-0.8-150600.15.3.1 * avahi-utils-0.8-150600.15.3.1 * libavahi-glib1-debuginfo-0.8-150600.15.3.1 * avahi-glib2-debugsource-0.8-150600.15.3.1 * libavahi-client3-debuginfo-0.8-150600.15.3.1 * libhowl0-debuginfo-0.8-150600.15.3.1 * libavahi-core7-debuginfo-0.8-150600.15.3.1 * libavahi-common3-0.8-150600.15.3.1 * libavahi-glib1-0.8-150600.15.3.1 * libavahi-libevent1-debuginfo-0.8-150600.15.3.1 * avahi-compat-mDNSResponder-devel-0.8-150600.15.3.1 * Basesystem Module 15-SP6 (noarch) * avahi-lang-0.8-150600.15.3.1 * Basesystem Module 15-SP6 (x86_64) * avahi-32bit-debuginfo-0.8-150600.15.3.1 * libavahi-common3-32bit-0.8-150600.15.3.1 * libavahi-client3-32bit-debuginfo-0.8-150600.15.3.1 * libavahi-client3-32bit-0.8-150600.15.3.1 * libavahi-common3-32bit-debuginfo-0.8-150600.15.3.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * avahi-autoipd-debuginfo-0.8-150600.15.3.1 * avahi-debuginfo-0.8-150600.15.3.1 * avahi-debugsource-0.8-150600.15.3.1 * avahi-glib2-debugsource-0.8-150600.15.3.1 * avahi-autoipd-0.8-150600.15.3.1 * avahi-utils-gtk-0.8-150600.15.3.1 * libavahi-gobject-devel-0.8-150600.15.3.1 * avahi-utils-gtk-debuginfo-0.8-150600.15.3.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * avahi-debuginfo-0.8-150600.15.3.1 * python3-avahi-0.8-150600.15.3.1 * avahi-debugsource-0.8-150600.15.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-38469.html * https://www.suse.com/security/cve/CVE-2023-38471.html * https://bugzilla.suse.com/show_bug.cgi?id=1216594 * https://bugzilla.suse.com/show_bug.cgi?id=1216598 * https://bugzilla.suse.com/show_bug.cgi?id=1226586 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 12:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 12:30:12 -0000 Subject: SUSE-SU-2024:2199-1: important: Security update for ghostscript Message-ID: <171931861245.7836.5934633694862653417@smelt2.prg2.suse.org> # Security update for ghostscript Announcement ID: SUSE-SU-2024:2199-1 Rating: important References: * bsc#1225491 Cross-References: * CVE-2024-33871 CVSS scores: * CVE-2024-33871 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for ghostscript fixes the following issues: * CVE-2024-33871: Prevent OPVP device arbitrary code execution via custom Driver library. (bsc#1225491) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2199=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2199=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2199=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2199=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * ghostscript-debuginfo-9.52-23.77.1 * ghostscript-debugsource-9.52-23.77.1 * ghostscript-devel-9.52-23.77.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * ghostscript-devel-9.52-23.77.1 * ghostscript-x11-debuginfo-9.52-23.77.1 * ghostscript-9.52-23.77.1 * ghostscript-debuginfo-9.52-23.77.1 * ghostscript-debugsource-9.52-23.77.1 * ghostscript-x11-9.52-23.77.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * ghostscript-devel-9.52-23.77.1 * ghostscript-x11-debuginfo-9.52-23.77.1 * ghostscript-9.52-23.77.1 * ghostscript-debuginfo-9.52-23.77.1 * ghostscript-debugsource-9.52-23.77.1 * ghostscript-x11-9.52-23.77.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * ghostscript-devel-9.52-23.77.1 * ghostscript-x11-debuginfo-9.52-23.77.1 * ghostscript-9.52-23.77.1 * ghostscript-debuginfo-9.52-23.77.1 * ghostscript-debugsource-9.52-23.77.1 * ghostscript-x11-9.52-23.77.1 ## References: * https://www.suse.com/security/cve/CVE-2024-33871.html * https://bugzilla.suse.com/show_bug.cgi?id=1225491 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 12:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 12:30:13 -0000 Subject: SUSE-SU-2024:2198-1: important: Security update for ghostscript Message-ID: <171931861395.7836.6339183353887970665@smelt2.prg2.suse.org> # Security update for ghostscript Announcement ID: SUSE-SU-2024:2198-1 Rating: important References: * bsc#1225491 Cross-References: * CVE-2024-33871 CVSS scores: * CVE-2024-33871 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for ghostscript fixes the following issues: * CVE-2024-33871: Prevent OPVP device arbitrary code execution via custom Driver library. (bsc#1225491) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2198=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2198=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2198=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2198=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2198=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2198=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2198=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2198=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2198=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2198=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2198=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2198=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2198=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2198=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2198=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2198=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2198=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2198=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2198=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Manager Proxy 4.3 (x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * ghostscript-9.52-150000.191.1 * ghostscript-devel-9.52-150000.191.1 * ghostscript-x11-debuginfo-9.52-150000.191.1 * ghostscript-debugsource-9.52-150000.191.1 * ghostscript-debuginfo-9.52-150000.191.1 * ghostscript-x11-9.52-150000.191.1 ## References: * https://www.suse.com/security/cve/CVE-2024-33871.html * https://bugzilla.suse.com/show_bug.cgi?id=1225491 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 12:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 12:30:16 -0000 Subject: SUSE-SU-2024:2197-1: important: Security update for openssl-1_1-livepatches Message-ID: <171931861693.7836.2237829940126966066@smelt2.prg2.suse.org> # Security update for openssl-1_1-livepatches Announcement ID: SUSE-SU-2024:2197-1 Rating: important References: * bsc#1224458 * bsc#1225552 Cross-References: * CVE-2024-4741 CVSS scores: * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for openssl-1_1-livepatches fixes the following issues: * CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2197=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2197=1 ## Package List: * openSUSE Leap 15.4 (x86_64) * openssl-1_1-livepatches-debuginfo-0.4-150400.3.11.1 * openssl-1_1-livepatches-0.4-150400.3.11.1 * openssl-1_1-livepatches-debugsource-0.4-150400.3.11.1 * SUSE Linux Enterprise Live Patching 15-SP4 (x86_64) * openssl-1_1-livepatches-0.4-150400.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4741.html * https://bugzilla.suse.com/show_bug.cgi?id=1224458 * https://bugzilla.suse.com/show_bug.cgi?id=1225552 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 12:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 12:30:19 -0000 Subject: SUSE-RU-2024:2196-1: important: Recommended update for wicked Message-ID: <171931861905.7836.17955351571837840443@smelt2.prg2.suse.org> # Recommended update for wicked Announcement ID: SUSE-RU-2024:2196-1 Rating: important References: * bsc#1218668 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for wicked fixes the following issues: * Fix VLANs/bonds randomly not coming up after reboot or wicked restart. [bsc#1218668] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2196=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2196=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2196=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2196=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2196=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2196=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2196=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2196=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2196=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2196=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2196=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2196=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2196=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2196=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2196=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * SUSE Manager Proxy 4.3 (x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * wicked-debuginfo-0.6.75-150400.3.27.1 * wicked-debugsource-0.6.75-150400.3.27.1 * wicked-service-0.6.75-150400.3.27.1 * wicked-0.6.75-150400.3.27.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218668 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 12:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 12:30:22 -0000 Subject: SUSE-SU-2024:2195-1: important: Security update for hdf5 Message-ID: <171931862288.7836.18442032037261076078@smelt2.prg2.suse.org> # Security update for hdf5 Announcement ID: SUSE-SU-2024:2195-1 Rating: important References: * bsc#1224158 Cross-References: * CVE-2017-17507 * CVE-2018-11205 * CVE-2024-29158 * CVE-2024-29161 * CVE-2024-29166 * CVE-2024-32608 * CVE-2024-32610 * CVE-2024-32614 * CVE-2024-32619 * CVE-2024-32620 * CVE-2024-33873 * CVE-2024-33874 * CVE-2024-33875 CVSS scores: * CVE-2017-17507 ( SUSE ): 4.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L * CVE-2017-17507 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2018-11205 ( SUSE ): 5.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2018-11205 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H * CVE-2024-29158 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-29161 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-29166 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-32608 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-32610 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-32614 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-32619 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-32620 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-33873 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-33874 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-33875 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H Affected Products: * HPC Module 15-SP5 * HPC Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves 13 vulnerabilities can now be installed. ## Description: This update for hdf5 fixes the following issues: * Fix bsc#1224158 - this fixes: CVE-2024-29158, CVE-2024-29161, CVE-2024-29166, CVE-2024-32608, CVE-2024-32610, CVE-2024-32614, CVE-2024-32619, CVE-2024-32620, CVE-2024-33873, CVE-2024-33874, CVE-2024-33875 Additionally, these fixes resolve crashes triggered by the reproducers for CVE-2017-17507, CVE-2018-11205. These crashes appear to be unrelated to the original problems. This update also ships several missing PackageHub packages for 15 SP5 and 15 SP6. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2195=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2195=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2195=1 openSUSE-SLE-15.5-2024-2195=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2195=1 SUSE-2024-2195=1 * HPC Module 15-SP5 zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-2195=1 * HPC Module 15-SP6 zypper in -t patch SUSE-SLE-Module-HPC-15-SP6-2024-2195=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2195=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2195=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-2195=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2195=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2195=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2195=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2195=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2195=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libpmix2-debuginfo-3.2.3-150300.3.10.1 * pmix-3.2.3-150300.3.10.1 * pmix-test-3.2.3-150300.3.10.1 * pmix-devel-3.2.3-150300.3.10.1 * pmix-plugin-munge-3.2.3-150300.3.10.1 * pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1 * pmix-debugsource-3.2.3-150300.3.10.1 * libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1 * libpmix2-3.2.3-150300.3.10.1 * pmix-test-debuginfo-3.2.3-150300.3.10.1 * pmix-plugins-3.2.3-150300.3.10.1 * libmca_common_dstore1-3.2.3-150300.3.10.1 * pmix-plugins-debuginfo-3.2.3-150300.3.10.1 * pmix-debuginfo-3.2.3-150300.3.10.1 * openSUSE Leap 15.3 (noarch) * pmix-headers-3.2.3-150300.3.10.1 * pmix-mca-params-3.2.3-150300.3.10.1 * openSUSE Leap 15.4 (noarch) * hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5-hpc-examples-1.10.11-150400.3.17.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-hpc-1.10.11-150400.3.17.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * mvapich2-gnu-hpc-2.3.7-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * mpich-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * openmpi4-debugsource-4.1.4-150500.3.2.1 * mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1 * openmpi4-devel-4.1.4-150500.3.2.1 * openmpi4-devel-debuginfo-4.1.4-150500.3.2.1 * mpich-ofi-4.0.2-150500.3.2.1 * mvapich2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1 * mvapich2-gnu-hpc-devel-2.3.7-150500.3.2.1 * mpich-ofi-debugsource-4.0.2-150500.3.2.1 * openmpi4-libs-debuginfo-4.1.4-150500.3.2.1 * mpich-gnu-hpc-devel-4.0.2-150500.3.2.1 * mpich-debuginfo-4.0.2-150500.3.2.1 * mvapich2-devel-static-2.3.7-150500.3.2.1 * mvapich2-debugsource-2.3.7-150500.3.2.1 * mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1 * openmpi_4_1_4-gnu-hpc-devel-debuginfo-4.1.4-150500.3.2.1 * openmpi4-config-4.1.4-150500.3.2.1 * mpich-ofi-devel-4.0.2-150500.3.2.1 * openmpi4-debuginfo-4.1.4-150500.3.2.1 * openmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1 * mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1 * libopenmpi4-gnu-hpc-4.1.4-150500.3.2.1 * mpich_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1 * openmpi_4_1_4-gnu-hpc-debugsource-4.1.4-150500.3.2.1 * libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1 * openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1 * mvapich2-2.3.7-150500.3.2.1 * mpich-gnu-hpc-4.0.2-150500.3.2.1 * mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 * mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 * openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1 * mpich-debugsource-4.0.2-150500.3.2.1 * mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1 * openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1 * mpich-ofi-gnu-hpc-4.0.2-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1 * mpich-devel-4.0.2-150500.3.2.1 * mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * libopenmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1 * mvapich2-debuginfo-2.3.7-150500.3.2.1 * mpich_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1 * openmpi4-docs-4.1.4-150500.3.2.1 * openmpi4-gnu-hpc-4.1.4-150500.3.2.1 * mvapich2-devel-2.3.7-150500.3.2.1 * mpich-ofi-gnu-hpc-devel-4.0.2-150500.3.2.1 * mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1 * mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1 * openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1 * mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1 * openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1 * openmpi4-4.1.4-150500.3.2.1 * openmpi4-macros-devel-4.1.4-150500.3.2.1 * openmpi4-libs-4.1.4-150500.3.2.1 * mvapich2-doc-2.3.7-150500.3.2.1 * mpich-4.0.2-150500.3.2.1 * openmpi4-gnu-hpc-devel-static-4.1.4-150500.3.2.1 * mpich-ofi-debuginfo-4.0.2-150500.3.2.1 * mpich-ofi-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1 * openSUSE Leap 15.5 (noarch) * hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * mvapich2-psm-gnu-hpc-doc-2.3.7-150500.3.2.1 * mvapich2-psm-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5-hpc-examples-1.10.11-150400.3.17.1 * openmpi4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1 * mvapich2-psm2-gnu-hpc-doc-2.3.7-150500.3.2.1 * mvapich2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * mvapich2-gnu-hpc-doc-2.3.7-150500.3.2.1 * luaposix-doc-34.1.1-150200.3.5.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * openmpi4-gnu-hpc-devel-4.1.4-150500.3.2.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * openmpi4-gnu-hpc-docs-4.1.4-150500.3.2.1 * mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-hpc-1.10.11-150400.3.17.1 * openmpi4-testsuite-4.1.4-150500.3.2.1 * mpich-ofi-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 * mpich-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 * pmix-headers-3.2.3-150300.3.10.1 * openmpi_4_1_4-gnu-hpc-testsuite-4.1.4-150500.3.2.1 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * pmix-mca-params-3.2.3-150300.3.10.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * openSUSE Leap 15.5 (x86_64 i586) * mvapich2-psm_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1 * mvapich2-psm-debuginfo-2.3.7-150500.3.2.1 * mvapich2-psm-doc-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1 * mvapich2-psm-2.3.7-150500.3.2.1 * mvapich2-psm-devel-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * mvapich2-psm-debugsource-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-2.3.7-150500.3.2.1 * mvapich2-psm-gnu-hpc-devel-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1 * mvapich2-psm-gnu-hpc-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1 * mvapich2-psm-devel-static-2.3.7-150500.3.2.1 * openSUSE Leap 15.5 (x86_64) * mvapich2-psm2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1 * openmpi4-libs-32bit-debuginfo-4.1.4-150500.3.2.1 * openmpi4-libs-32bit-4.1.4-150500.3.2.1 * mvapich2-psm2-debuginfo-2.3.7-150500.3.2.1 * mvapich2-psm2-debugsource-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1 * mvapich2-psm2-2.3.7-150500.3.2.1 * mvapich2-psm2-gnu-hpc-devel-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1 * mvapich2-psm2-devel-static-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1 * mvapich2-psm2-doc-2.3.7-150500.3.2.1 * mvapich2-psm2-devel-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1 * mvapich2-psm2-gnu-hpc-2.3.7-150500.3.2.1 * openSUSE Leap 15.5 (aarch64_ilp32) * openmpi4-libs-64bit-debuginfo-4.1.4-150500.3.2.1 * openmpi4-libs-64bit-4.1.4-150500.3.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * pmix-plugin-munge-3.2.3-150300.3.10.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * lua51-luaposix-34.1.1-150200.3.5.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * pmix-plugins-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * pmix-3.2.3-150300.3.10.1 * pmix-devel-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libpmix2-3.2.3-150300.3.10.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-test-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * lua53-luaterm-0.07-150000.5.5.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2 * lua53-luaposix-34.1.1-150200.3.5.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * lua51-luaterm-debuginfo-0.07-150000.5.5.1 * pmix-test-3.2.3-150300.3.10.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * lua51-luaterm-0.07-150000.5.5.1 * libmca_common_dstore1-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2 * libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1 * lua53-luaterm-debuginfo-0.07-150000.5.5.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2 * libpmix2-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-plugins-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * lua51-luaposix-debuginfo-34.1.1-150200.3.5.1 * lua51-luaterm-debugsource-0.07-150000.5.5.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * lua53-luaterm-debugsource-0.07-150000.5.5.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * lua53-luaposix-debuginfo-34.1.1-150200.3.5.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * pmix-debugsource-3.2.3-150300.3.10.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * mpich-4.1.2-150600.3.2.1 * mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1 * mvapich2-debugsource-2.3.7-150600.9.2.1 * mpich-ofi_4_1_2-gnu-hpc-4.1.2-150600.3.2.1 * openmpi_4_1_6-gnu-hpc-docs-4.1.6-150600.3.2.1 * openmpi4-docs-4.1.6-150600.3.2.1 * openmpi4-libs-debuginfo-4.1.6-150600.3.2.1 * mvapich2-gnu-hpc-devel-2.3.7-150600.9.2.1 * mpich-ofi-debugsource-4.1.2-150600.3.2.1 * openmpi4-gnu-hpc-devel-static-4.1.6-150600.3.2.1 * libopenmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1 * mpich-ofi_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1 * mpich-ofi_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1 * mpich-ofi_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1 * mpich-debugsource-4.1.2-150600.3.2.1 * libopenmpi4-gnu-hpc-4.1.6-150600.3.2.1 * mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1 * openmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1 * openmpi_4_1_6-gnu-hpc-devel-debuginfo-4.1.6-150600.3.2.1 * openmpi4-config-4.1.6-150600.3.2.1 * openmpi4-macros-devel-4.1.6-150600.3.2.1 * mpich_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1 * mvapich2-devel-2.3.7-150600.9.2.1 * openmpi_4_1_6-gnu-hpc-macros-devel-4.1.6-150600.3.2.1 * openmpi4-gnu-hpc-4.1.6-150600.3.2.1 * mpich-ofi-gnu-hpc-4.1.2-150600.3.2.1 * mpich-gnu-hpc-devel-4.1.2-150600.3.2.1 * mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1 * mpich-devel-4.1.2-150600.3.2.1 * openmpi_4_1_6-gnu-hpc-debugsource-4.1.6-150600.3.2.1 * openmpi_4_1_6-gnu-hpc-devel-4.1.6-150600.3.2.1 * openmpi4-debuginfo-4.1.6-150600.3.2.1 * mpich-gnu-hpc-4.1.2-150600.3.2.1 * mpich-ofi_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1 * openmpi4-debugsource-4.1.6-150600.3.2.1 * mvapich2-gnu-hpc-2.3.7-150600.9.2.1 * mpich-gnu-hpc-devel-static-4.1.2-150600.3.2.1 * mpich-ofi_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1 * mvapich2-devel-static-2.3.7-150600.9.2.1 * mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1 * mpich-debuginfo-4.1.2-150600.3.2.1 * mpich-ofi-4.1.2-150600.3.2.1 * mpich-ofi-devel-4.1.2-150600.3.2.1 * mvapich2-2.3.7-150600.9.2.1 * openmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1 * mpich_4_1_2-gnu-hpc-4.1.2-150600.3.2.1 * mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1 * libopenmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1 * mpich_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1 * mpich_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1 * openmpi_4_1_6-gnu-hpc-devel-static-4.1.6-150600.3.2.1 * mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1 * openmpi4-devel-debuginfo-4.1.6-150600.3.2.1 * mpich_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1 * mpich_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1 * mpich-ofi-gnu-hpc-devel-static-4.1.2-150600.3.2.1 * mpich-ofi-debuginfo-4.1.2-150600.3.2.1 * mvapich2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1 * openmpi4-libs-4.1.6-150600.3.2.1 * mvapich2-doc-2.3.7-150600.9.2.1 * mpich-ofi-gnu-hpc-devel-4.1.2-150600.3.2.1 * mvapich2-debuginfo-2.3.7-150600.9.2.1 * openmpi4-4.1.6-150600.3.2.1 * openmpi4-devel-4.1.6-150600.3.2.1 * openSUSE Leap 15.6 (noarch) * mpich-ofi-gnu-hpc-macros-devel-4.1.2-150600.3.2.1 * mpich-gnu-hpc-macros-devel-4.1.2-150600.3.2.1 * openmpi4-testsuite-4.1.6-150600.3.2.1 * openmpi4-gnu-hpc-devel-4.1.6-150600.3.2.1 * openmpi4-gnu-hpc-docs-4.1.6-150600.3.2.1 * openmpi_4_1_6-gnu-hpc-testsuite-4.1.6-150600.3.2.1 * openmpi_4_1_4-gnu-hpc-testsuite-4.1.4-150500.3.2.1 * mvapich2-psm-gnu-hpc-doc-2.3.7-150500.3.2.1 * mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1 * mvapich2-psm-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * pmix-headers-3.2.3-150300.3.10.1 * pmix-mca-params-3.2.3-150300.3.10.1 * openmpi4-gnu-hpc-macros-devel-4.1.6-150600.3.2.1 * luaposix-doc-34.1.1-150200.3.5.1 * mvapich2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1 * mvapich2-gnu-hpc-doc-2.3.7-150600.9.2.1 * mvapich2-psm2-gnu-hpc-doc-2.3.7-150600.9.2.1 * openSUSE Leap 15.6 (x86_64) * mvapich2-psm2-debugsource-2.3.7-150600.9.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1 * mvapich2-psm-2.3.7-150500.3.2.1 * openmpi4-libs-32bit-4.1.6-150600.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1 * mvapich2-psm2-gnu-hpc-2.3.7-150600.9.2.1 * mvapich2-psm2-debuginfo-2.3.7-150600.9.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1 * mvapich2-psm_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1 * mvapich2-psm2-2.3.7-150600.9.2.1 * mvapich2-psm-devel-2.3.7-150500.3.2.1 * mvapich2-psm2-devel-2.3.7-150600.9.2.1 * mvapich2-psm2-devel-static-2.3.7-150600.9.2.1 * mvapich2-psm-gnu-hpc-devel-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1 * mvapich2-psm2-gnu-hpc-devel-2.3.7-150600.9.2.1 * mvapich2-psm-devel-static-2.3.7-150500.3.2.1 * mvapich2-psm-debuginfo-2.3.7-150500.3.2.1 * mvapich2-psm-doc-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * mvapich2-psm-debugsource-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1 * mvapich2-psm2-doc-2.3.7-150600.9.2.1 * mvapich2-psm_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1 * mvapich2-psm_2_3_7-gnu-hpc-2.3.7-150500.3.2.1 * mvapich2-psm-gnu-hpc-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1 * openmpi4-libs-32bit-debuginfo-4.1.6-150600.3.2.1 * openSUSE Leap 15.6 (aarch64_ilp32) * openmpi4-libs-64bit-debuginfo-4.1.6-150600.3.2.1 * openmpi4-libs-64bit-4.1.6-150600.3.2.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * pmix-plugin-munge-3.2.3-150300.3.10.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * lua51-luaposix-34.1.1-150200.3.5.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * pmix-plugins-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * openmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * pmix-3.2.3-150300.3.10.1 * pmix-devel-3.2.3-150300.3.10.1 * openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libpmix2-3.2.3-150300.3.10.1 * mpich-ofi_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-test-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_4-gnu-hpc-devel-debuginfo-4.1.4-150500.3.2.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * lua53-luaterm-0.07-150000.5.5.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1 * pmix-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2 * lua53-luaposix-34.1.1-150200.3.5.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2 * mpich_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * lua51-luaterm-debuginfo-0.07-150000.5.5.1 * pmix-test-3.2.3-150300.3.10.1 * openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * lua51-luaterm-0.07-150000.5.5.1 * mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1 * libmca_common_dstore1-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2 * libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1 * mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 * pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1 * lua53-luaterm-debuginfo-0.07-150000.5.5.1 * libopenmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1 * mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2 * libpmix2-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-plugins-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * lua51-luaposix-debuginfo-34.1.1-150200.3.5.1 * lua51-luaterm-debugsource-0.07-150000.5.5.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2 * openmpi_4_1_4-gnu-hpc-debugsource-4.1.4-150500.3.2.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * lua53-luaterm-debugsource-0.07-150000.5.5.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * mpich-ofi_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * lua53-luaposix-debuginfo-34.1.1-150200.3.5.1 * openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * pmix-debugsource-3.2.3-150300.3.10.1 * HPC Module 15-SP5 (noarch) * hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * mvapich2-psm-gnu-hpc-doc-2.3.7-150500.3.2.1 * mvapich2-psm-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * hdf5-hpc-examples-1.10.11-150400.3.17.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openmpi4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1 * mvapich2-psm2-gnu-hpc-doc-2.3.7-150500.3.2.1 * mvapich2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * mvapich2-gnu-hpc-doc-2.3.7-150500.3.2.1 * luaposix-doc-34.1.1-150200.3.5.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * openmpi4-gnu-hpc-devel-4.1.4-150500.3.2.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * openmpi4-gnu-hpc-docs-4.1.4-150500.3.2.1 * mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-hpc-1.10.11-150400.3.17.1 * mpich-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 * pmix-headers-3.2.3-150300.3.10.1 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * pmix-mca-params-3.2.3-150300.3.10.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * HPC Module 15-SP5 (aarch64 x86_64) * mvapich2-gnu-hpc-2.3.7-150500.3.2.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * mvapich2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * mvapich2-gnu-hpc-devel-2.3.7-150500.3.2.1 * pmix-plugin-munge-3.2.3-150300.3.10.1 * mpich-gnu-hpc-devel-4.0.2-150500.3.2.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * pmix-plugins-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * openmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * pmix-3.2.3-150300.3.10.1 * openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libpmix2-3.2.3-150300.3.10.1 * mpich-ofi_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1 * mpich-ofi-gnu-hpc-4.0.2-150500.3.2.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-test-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1 * mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openmpi4-gnu-hpc-devel-static-4.1.4-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_4-gnu-hpc-devel-debuginfo-4.1.4-150500.3.2.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * lua53-luaterm-0.07-150000.5.5.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1 * pmix-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2 * lua53-luaposix-34.1.1-150200.3.5.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2 * mpich_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openmpi4-gnu-hpc-4.1.4-150500.3.2.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-test-3.2.3-150300.3.10.1 * openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * mpich-ofi-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * mpich-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1 * libmca_common_dstore1-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libopenmpi4-gnu-hpc-4.1.4-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2 * libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1 * mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1 * pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1 * lua53-luaterm-debuginfo-0.07-150000.5.5.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libopenmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1 * mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2 * libpmix2-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-plugins-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2 * libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * openmpi_4_1_4-gnu-hpc-debugsource-4.1.4-150500.3.2.1 * mpich-gnu-hpc-4.0.2-150500.3.2.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5-gnu-hpc-1.10.11-150400.3.17.1 * mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * lua53-luaterm-debugsource-0.07-150000.5.5.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * mpich-ofi_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * mpich-ofi-gnu-hpc-devel-4.0.2-150500.3.2.1 * lua53-luaposix-debuginfo-34.1.1-150200.3.5.1 * openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * pmix-debugsource-3.2.3-150300.3.10.1 * HPC Module 15-SP5 (x86_64) * mvapich2-psm_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * pmix-devel-3.2.3-150300.3.10.1 * mvapich2-psm_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1 * mvapich2-psm2-gnu-hpc-devel-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-2.3.7-150500.3.2.1 * mvapich2-psm-gnu-hpc-devel-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1 * mvapich2-psm_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1 * mvapich2-psm-gnu-hpc-2.3.7-150500.3.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1 * mvapich2-psm2-gnu-hpc-2.3.7-150500.3.2.1 * HPC Module 15-SP6 (noarch) * hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1 * mvapich2-psm2-gnu-hpc-doc-2.3.7-150600.9.2.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * mpich-gnu-hpc-macros-devel-4.1.2-150600.3.2.1 * openmpi4-gnu-hpc-devel-4.1.6-150600.3.2.1 * luaposix-doc-34.1.1-150200.3.5.1 * openmpi4-gnu-hpc-docs-4.1.6-150600.3.2.1 * pmix-headers-3.2.3-150300.3.10.1 * mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * pmix-mca-params-3.2.3-150300.3.10.1 * openmpi4-gnu-hpc-macros-devel-4.1.6-150600.3.2.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5-hpc-examples-1.10.11-150400.3.17.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-hpc-1.10.11-150400.3.17.1 * mvapich2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1 * mvapich2-gnu-hpc-doc-2.3.7-150600.9.2.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * HPC Module 15-SP6 (aarch64 x86_64) * openmpi_4_1_6-gnu-hpc-docs-4.1.6-150600.3.2.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * pmix-plugin-munge-3.2.3-150300.3.10.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * mvapich2-gnu-hpc-devel-2.3.7-150600.9.2.1 * mpich-ofi_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * pmix-plugins-3.2.3-150300.3.10.1 * libopenmpi4-gnu-hpc-4.1.6-150600.3.2.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_6-gnu-hpc-devel-debuginfo-4.1.6-150600.3.2.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * pmix-3.2.3-150300.3.10.1 * openmpi_4_1_6-gnu-hpc-macros-devel-4.1.6-150600.3.2.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libpmix2-3.2.3-150300.3.10.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1 * pmix-test-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1 * openmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1 * mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * lua53-luaterm-0.07-150000.5.5.1 * openmpi4-gnu-hpc-devel-static-4.1.6-150600.3.2.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libopenmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2 * mpich_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_6-gnu-hpc-debugsource-4.1.6-150600.3.2.1 * pmix-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2 * lua53-luaposix-34.1.1-150200.3.5.1 * mvapich2-gnu-hpc-2.3.7-150600.9.2.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich-ofi_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-test-3.2.3-150300.3.10.1 * mpich_4_1_2-gnu-hpc-4.1.2-150600.3.2.1 * libopenmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1 * openmpi_4_1_6-gnu-hpc-devel-static-4.1.6-150600.3.2.1 * mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * mpich-ofi_4_1_2-gnu-hpc-4.1.2-150600.3.2.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libmca_common_dstore1-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * mpich-ofi_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2 * openmpi4-gnu-hpc-4.1.6-150600.3.2.1 * mpich-ofi-gnu-hpc-4.1.2-150600.3.2.1 * mpich-gnu-hpc-devel-4.1.2-150600.3.2.1 * libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1 * lua53-luaterm-debuginfo-0.07-150000.5.5.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2 * libpmix2-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1 * mpich_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-plugins-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * openmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1 * libhdf5-gnu-hpc-1.10.11-150400.3.17.1 * openmpi_4_1_6-gnu-hpc-devel-4.1.6-150600.3.2.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * lua53-luaterm-debugsource-0.07-150000.5.5.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * mpich-gnu-hpc-4.1.2-150600.3.2.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * mpich-ofi_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * mpich-gnu-hpc-devel-static-4.1.2-150600.3.2.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * lua53-luaposix-debuginfo-34.1.1-150200.3.5.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1 * mpich-ofi-gnu-hpc-devel-static-4.1.2-150600.3.2.1 * pmix-debugsource-3.2.3-150300.3.10.1 * mvapich2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1 * mpich-ofi-gnu-hpc-devel-4.1.2-150600.3.2.1 * HPC Module 15-SP6 (x86_64) * mvapich2-psm2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1 * pmix-devel-3.2.3-150300.3.10.1 * mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1 * mvapich2-psm2-gnu-hpc-2.3.7-150600.9.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1 * mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1 * mvapich2-psm2-gnu-hpc-devel-2.3.7-150600.9.2.1 * SUSE Package Hub 15 15-SP5 (noarch) * hdf5-hpc-examples-1.10.11-150400.3.17.1 * openmpi4-gnu-hpc-docs-4.1.4-150500.3.2.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1 * mpich-ofi-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 * mvapich2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * mpich-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 * mvapich2-gnu-hpc-doc-2.3.7-150500.3.2.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * pmix-mca-params-3.2.3-150300.3.10.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-hpc-1.10.11-150400.3.17.1 * openmpi4-gnu-hpc-devel-4.1.4-150500.3.2.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * openmpi4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1 * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * mvapich2-gnu-hpc-2.3.7-150500.3.2.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1 * pmix-plugin-munge-3.2.3-150300.3.10.1 * mvapich2-gnu-hpc-devel-2.3.7-150500.3.2.1 * mpich-gnu-hpc-devel-4.0.2-150500.3.2.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * pmix-plugins-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * openmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * pmix-3.2.3-150300.3.10.1 * openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libpmix2-3.2.3-150300.3.10.1 * mpich-ofi_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich-ofi_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * mpich-ofi-gnu-hpc-4.0.2-150500.3.2.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-test-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openmpi4-gnu-hpc-devel-static-4.1.4-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_4-gnu-hpc-devel-debuginfo-4.1.4-150500.3.2.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * lua53-luaterm-0.07-150000.5.5.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * lua53-luafilesystem-1.7.0-150000.3.5.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1 * pmix-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2 * lua53-luaposix-34.1.1-150200.3.5.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2 * mpich_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openmpi4-gnu-hpc-4.1.4-150500.3.2.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-test-3.2.3-150300.3.10.1 * openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * mpich-ofi-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * mpich-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1 * libmca_common_dstore1-3.2.3-150300.3.10.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libopenmpi4-gnu-hpc-4.1.4-150500.3.2.1 * mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1 * libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1 * mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1 * pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libopenmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1 * mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1 * libpmix2-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-plugins-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2 * libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * openmpi_4_1_4-gnu-hpc-debugsource-4.1.4-150500.3.2.1 * mpich-gnu-hpc-4.0.2-150500.3.2.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5-gnu-hpc-1.10.11-150400.3.17.1 * mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * mpich-ofi_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich-ofi-gnu-hpc-devel-4.0.2-150500.3.2.1 * openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * pmix-debugsource-3.2.3-150300.3.10.1 * SUSE Package Hub 15 15-SP6 (noarch) * hdf5-hpc-examples-1.10.11-150400.3.17.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1 * mpich-ofi-gnu-hpc-macros-devel-4.1.2-150600.3.2.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * mpich-gnu-hpc-macros-devel-4.1.2-150600.3.2.1 * openmpi4-gnu-hpc-devel-4.1.6-150600.3.2.1 * openmpi4-gnu-hpc-docs-4.1.6-150600.3.2.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * pmix-mca-params-3.2.3-150300.3.10.1 * openmpi4-gnu-hpc-macros-devel-4.1.6-150600.3.2.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-hpc-1.10.11-150400.3.17.1 * mvapich2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1 * mvapich2-gnu-hpc-doc-2.3.7-150600.9.2.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * SUSE Package Hub 15 15-SP6 (ppc64le s390x) * openmpi_4_1_6-gnu-hpc-docs-4.1.6-150600.3.2.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * pmix-plugin-munge-3.2.3-150300.3.10.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * mvapich2-gnu-hpc-devel-2.3.7-150600.9.2.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * mpich-ofi_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * pmix-plugins-3.2.3-150300.3.10.1 * libopenmpi4-gnu-hpc-4.1.6-150600.3.2.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_6-gnu-hpc-devel-debuginfo-4.1.6-150600.3.2.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * pmix-3.2.3-150300.3.10.1 * openmpi_4_1_6-gnu-hpc-macros-devel-4.1.6-150600.3.2.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libpmix2-3.2.3-150300.3.10.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-test-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1 * openmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * lua53-luaterm-0.07-150000.5.5.1 * openmpi4-gnu-hpc-devel-static-4.1.6-150600.3.2.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libopenmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1 * lua53-luafilesystem-1.7.0-150000.3.5.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2 * mpich_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * openmpi_4_1_6-gnu-hpc-debugsource-4.1.6-150600.3.2.1 * pmix-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2 * lua53-luaposix-34.1.1-150200.3.5.1 * mvapich2-gnu-hpc-2.3.7-150600.9.2.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2 * mpich-ofi_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-test-3.2.3-150300.3.10.1 * mpich_4_1_2-gnu-hpc-4.1.2-150600.3.2.1 * libopenmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1 * openmpi_4_1_6-gnu-hpc-devel-static-4.1.6-150600.3.2.1 * mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * mpich-ofi_4_1_2-gnu-hpc-4.1.2-150600.3.2.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libmca_common_dstore1-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * mpich-ofi_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * openmpi4-gnu-hpc-4.1.6-150600.3.2.1 * mpich-ofi-gnu-hpc-4.1.2-150600.3.2.1 * mpich-gnu-hpc-devel-4.1.2-150600.3.2.1 * libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libpmix2-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * mpich_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1 * mpich_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-plugins-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * mpich-ofi_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1 * openmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1 * libhdf5-gnu-hpc-1.10.11-150400.3.17.1 * openmpi_4_1_6-gnu-hpc-devel-4.1.6-150600.3.2.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * mpich-gnu-hpc-4.1.2-150600.3.2.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * mpich-ofi_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * mpich-gnu-hpc-devel-static-4.1.2-150600.3.2.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * mpich_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1 * mpich-ofi-gnu-hpc-devel-static-4.1.2-150600.3.2.1 * pmix-debugsource-3.2.3-150300.3.10.1 * mvapich2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1 * mpich-ofi-gnu-hpc-devel-4.1.2-150600.3.2.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * openmpi4-debugsource-4.1.4-150500.3.2.1 * openmpi4-libs-debuginfo-4.1.4-150500.3.2.1 * openmpi4-devel-4.1.4-150500.3.2.1 * openmpi4-devel-debuginfo-4.1.4-150500.3.2.1 * mpich-ofi-4.0.2-150500.3.2.1 * mpich-ofi-debugsource-4.0.2-150500.3.2.1 * mpich-debuginfo-4.0.2-150500.3.2.1 * openmpi4-config-4.1.4-150500.3.2.1 * mvapich2-devel-static-2.3.7-150500.3.2.1 * mvapich2-debugsource-2.3.7-150500.3.2.1 * mpich-ofi-devel-4.0.2-150500.3.2.1 * openmpi4-debuginfo-4.1.4-150500.3.2.1 * mvapich2-2.3.7-150500.3.2.1 * mpich-debugsource-4.0.2-150500.3.2.1 * mpich-devel-4.0.2-150500.3.2.1 * mvapich2-debuginfo-2.3.7-150500.3.2.1 * openmpi4-docs-4.1.4-150500.3.2.1 * mvapich2-devel-2.3.7-150500.3.2.1 * openmpi4-4.1.4-150500.3.2.1 * openmpi4-libs-4.1.4-150500.3.2.1 * mpich-4.0.2-150500.3.2.1 * mpich-ofi-debuginfo-4.0.2-150500.3.2.1 * mvapich2-doc-2.3.7-150500.3.2.1 * Server Applications Module 15-SP5 (x86_64) * mvapich2-psm-debuginfo-2.3.7-150500.3.2.1 * mvapich2-psm-2.3.7-150500.3.2.1 * mvapich2-psm-devel-2.3.7-150500.3.2.1 * mvapich2-psm2-debugsource-2.3.7-150500.3.2.1 * mvapich2-psm-debugsource-2.3.7-150500.3.2.1 * mvapich2-psm2-2.3.7-150500.3.2.1 * mvapich2-psm2-devel-2.3.7-150500.3.2.1 * mvapich2-psm2-debuginfo-2.3.7-150500.3.2.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * mpich-4.1.2-150600.3.2.1 * openmpi4-docs-4.1.6-150600.3.2.1 * openmpi4-libs-debuginfo-4.1.6-150600.3.2.1 * mpich-ofi-debugsource-4.1.2-150600.3.2.1 * mpich-debugsource-4.1.2-150600.3.2.1 * openmpi4-config-4.1.6-150600.3.2.1 * mvapich2-devel-2.3.7-150600.9.2.1 * mpich-devel-4.1.2-150600.3.2.1 * openmpi4-debuginfo-4.1.6-150600.3.2.1 * openmpi4-debugsource-4.1.6-150600.3.2.1 * mvapich2-devel-static-2.3.7-150600.9.2.1 * mpich-debuginfo-4.1.2-150600.3.2.1 * mpich-ofi-4.1.2-150600.3.2.1 * mpich-ofi-devel-4.1.2-150600.3.2.1 * mvapich2-2.3.7-150600.9.2.1 * openmpi4-devel-debuginfo-4.1.6-150600.3.2.1 * mpich-ofi-debuginfo-4.1.2-150600.3.2.1 * openmpi4-libs-4.1.6-150600.3.2.1 * mvapich2-doc-2.3.7-150600.9.2.1 * mvapich2-debugsource-2.3.7-150600.9.2.1 * mvapich2-debuginfo-2.3.7-150600.9.2.1 * openmpi4-4.1.6-150600.3.2.1 * openmpi4-devel-4.1.6-150600.3.2.1 * Server Applications Module 15-SP6 (x86_64) * mvapich2-psm2-2.3.7-150600.9.2.1 * mvapich2-psm2-debuginfo-2.3.7-150600.9.2.1 * mvapich2-psm2-devel-2.3.7-150600.9.2.1 * mvapich2-psm2-debugsource-2.3.7-150600.9.2.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * lua53-luaterm-debugsource-0.07-150000.5.5.1 * lua53-luaposix-debuginfo-34.1.1-150200.3.5.1 * lua53-luafilesystem-debuginfo-1.7.0-150000.3.5.1 * lua53-luaposix-34.1.1-150200.3.5.1 * lua53-luaterm-0.07-150000.5.5.1 * lua53-luafilesystem-debugsource-1.7.0-150000.3.5.1 * lua53-luaterm-debuginfo-0.07-150000.5.5.1 * lua53-luafilesystem-1.7.0-150000.3.5.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * luaposix-doc-34.1.1-150200.3.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pmix-plugin-munge-3.2.3-150300.3.10.1 * lua53-luaterm-0.07-150000.5.5.1 * pmix-plugins-3.2.3-150300.3.10.1 * libmca_common_dstore1-3.2.3-150300.3.10.1 * lua53-luafilesystem-1.7.0-150000.3.5.1 * pmix-3.2.3-150300.3.10.1 * lua53-luafilesystem-debuginfo-1.7.0-150000.3.5.1 * lua53-luafilesystem-debugsource-1.7.0-150000.3.5.1 * libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1 * libpmix2-3.2.3-150300.3.10.1 * pmix-debuginfo-3.2.3-150300.3.10.1 * lua53-luaterm-debugsource-0.07-150000.5.5.1 * lua53-luaposix-34.1.1-150200.3.5.1 * pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1 * lua53-luaterm-debuginfo-0.07-150000.5.5.1 * pmix-test-debuginfo-3.2.3-150300.3.10.1 * libpmix2-debuginfo-3.2.3-150300.3.10.1 * lua53-luaposix-debuginfo-34.1.1-150200.3.5.1 * pmix-test-3.2.3-150300.3.10.1 * pmix-debugsource-3.2.3-150300.3.10.1 * pmix-plugins-debuginfo-3.2.3-150300.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * pmix-headers-3.2.3-150300.3.10.1 * pmix-mca-params-3.2.3-150300.3.10.1 * luaposix-doc-34.1.1-150200.3.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * pmix-devel-3.2.3-150300.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * hdf5-hpc-examples-1.10.11-150400.3.17.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-headers-3.2.3-150300.3.10.1 * luaposix-doc-34.1.1-150200.3.5.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * pmix-mca-params-3.2.3-150300.3.10.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-hpc-1.10.11-150400.3.17.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * pmix-plugin-munge-3.2.3-150300.3.10.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * pmix-plugins-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * pmix-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libpmix2-3.2.3-150300.3.10.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-test-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * lua53-luaterm-0.07-150000.5.5.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * lua53-luafilesystem-1.7.0-150000.3.5.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * lua53-luafilesystem-debuginfo-1.7.0-150000.3.5.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * lua53-luafilesystem-debugsource-1.7.0-150000.3.5.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2 * lua53-luaposix-34.1.1-150200.3.5.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-test-3.2.3-150300.3.10.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libmca_common_dstore1-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2 * libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1 * lua53-luaterm-debuginfo-0.07-150000.5.5.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2 * libpmix2-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-plugins-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * lua53-luaterm-debugsource-0.07-150000.5.5.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * lua53-luaposix-debuginfo-34.1.1-150200.3.5.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * pmix-debugsource-3.2.3-150300.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * pmix-devel-3.2.3-150300.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * hdf5-hpc-examples-1.10.11-150400.3.17.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-headers-3.2.3-150300.3.10.1 * luaposix-doc-34.1.1-150200.3.5.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * pmix-mca-params-3.2.3-150300.3.10.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * hdf5-gnu-hpc-1.10.11-150400.3.17.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * pmix-plugin-munge-3.2.3-150300.3.10.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 * pmix-plugins-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * pmix-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libpmix2-3.2.3-150300.3.10.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-test-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * lua53-luaterm-0.07-150000.5.5.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 * lua53-luafilesystem-1.7.0-150000.3.5.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * lua53-luafilesystem-debuginfo-1.7.0-150000.3.5.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * lua53-luafilesystem-debugsource-1.7.0-150000.3.5.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-debuginfo-3.2.3-150300.3.10.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2 * lua53-luaposix-34.1.1-150200.3.5.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-test-3.2.3-150300.3.10.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libmca_common_dstore1-3.2.3-150300.3.10.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2 * libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1 * lua53-luaterm-debuginfo-0.07-150000.5.5.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2 * libpmix2-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * pmix-plugins-debuginfo-3.2.3-150300.3.10.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 * lua53-luaterm-debugsource-0.07-150000.5.5.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1 * lua53-luaposix-debuginfo-34.1.1-150200.3.5.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 * pmix-debugsource-3.2.3-150300.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * pmix-devel-3.2.3-150300.3.10.1 ## References: * https://www.suse.com/security/cve/CVE-2017-17507.html * https://www.suse.com/security/cve/CVE-2018-11205.html * https://www.suse.com/security/cve/CVE-2024-29158.html * https://www.suse.com/security/cve/CVE-2024-29161.html * https://www.suse.com/security/cve/CVE-2024-29166.html * https://www.suse.com/security/cve/CVE-2024-32608.html * https://www.suse.com/security/cve/CVE-2024-32610.html * https://www.suse.com/security/cve/CVE-2024-32614.html * https://www.suse.com/security/cve/CVE-2024-32619.html * https://www.suse.com/security/cve/CVE-2024-32620.html * https://www.suse.com/security/cve/CVE-2024-33873.html * https://www.suse.com/security/cve/CVE-2024-33874.html * https://www.suse.com/security/cve/CVE-2024-33875.html * https://bugzilla.suse.com/show_bug.cgi?id=1224158 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 12:30:25 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 12:30:25 -0000 Subject: SUSE-FU-2024:2194-1: moderate: Feature update for openldap2_5 Message-ID: <171931862570.7836.2992635254595002133@smelt2.prg2.suse.org> # Feature update for openldap2_5 Announcement ID: SUSE-FU-2024:2194-1 Rating: moderate References: * jsc#PED-7178 * jsc#PED-7240 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains two features can now be installed. ## Description: This update for openldap2_5 fixes the following issues: Added initial OpenLDAP 2.5 version 2.5.17+50, (jsc#PED-7178,jsc#PED-7240) This version is in parallel to the existing openldap 2.4 version. The openldap 2.5 server is also shipped in the openldap2_5 package. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2194=1 SUSE-2024-2194=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2194=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2194=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2194=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-2194=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2194=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * openldap2_5-devel-2.5.17+50-150500.11.3.1 * libldap-2_5-0-debuginfo-2.5.17+50-150500.11.3.1 * openldap2_5-client-2.5.17+50-150500.11.3.1 * openldap2_5-debugsource-2.5.17+50-150500.11.3.1 * openldap2_5-2.5.17+50-150500.11.3.1 * libldap-2_5-0-2.5.17+50-150500.11.3.1 * openldap2_5-debuginfo-2.5.17+50-150500.11.3.1 * openldap2_5-contrib-2.5.17+50-150500.11.3.1 * openldap2_5-contrib-debuginfo-2.5.17+50-150500.11.3.1 * openSUSE Leap 15.5 (noarch) * openldap2_5-doc-2.5.17+50-150500.11.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * openldap2_5-devel-2.5.17+50-150500.11.3.1 * libldap-2_5-0-debuginfo-2.5.17+50-150500.11.3.1 * openldap2_5-client-2.5.17+50-150500.11.3.1 * openldap2_5-debugsource-2.5.17+50-150500.11.3.1 * openldap2_5-2.5.17+50-150500.11.3.1 * libldap-2_5-0-2.5.17+50-150500.11.3.1 * openldap2_5-debuginfo-2.5.17+50-150500.11.3.1 * openldap2_5-contrib-2.5.17+50-150500.11.3.1 * openldap2_5-contrib-debuginfo-2.5.17+50-150500.11.3.1 * openSUSE Leap 15.6 (noarch) * openldap2_5-doc-2.5.17+50-150500.11.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * openldap2_5-devel-2.5.17+50-150500.11.3.1 * libldap-2_5-0-debuginfo-2.5.17+50-150500.11.3.1 * openldap2_5-client-2.5.17+50-150500.11.3.1 * openldap2_5-debugsource-2.5.17+50-150500.11.3.1 * libldap-2_5-0-2.5.17+50-150500.11.3.1 * openldap2_5-debuginfo-2.5.17+50-150500.11.3.1 * Basesystem Module 15-SP5 (noarch) * openldap2_5-doc-2.5.17+50-150500.11.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * openldap2_5-devel-2.5.17+50-150500.11.3.1 * libldap-2_5-0-debuginfo-2.5.17+50-150500.11.3.1 * openldap2_5-client-2.5.17+50-150500.11.3.1 * openldap2_5-debugsource-2.5.17+50-150500.11.3.1 * libldap-2_5-0-2.5.17+50-150500.11.3.1 * openldap2_5-debuginfo-2.5.17+50-150500.11.3.1 * Basesystem Module 15-SP6 (noarch) * openldap2_5-doc-2.5.17+50-150500.11.3.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * openldap2_5-debugsource-2.5.17+50-150500.11.3.1 * openldap2_5-2.5.17+50-150500.11.3.1 * openldap2_5-debuginfo-2.5.17+50-150500.11.3.1 * openldap2_5-contrib-2.5.17+50-150500.11.3.1 * openldap2_5-contrib-debuginfo-2.5.17+50-150500.11.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * openldap2_5-debugsource-2.5.17+50-150500.11.3.1 * openldap2_5-2.5.17+50-150500.11.3.1 * openldap2_5-debuginfo-2.5.17+50-150500.11.3.1 * openldap2_5-contrib-2.5.17+50-150500.11.3.1 * openldap2_5-contrib-debuginfo-2.5.17+50-150500.11.3.1 ## References: * https://jira.suse.com/browse/PED-7178 * https://jira.suse.com/browse/PED-7240 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 12:30:27 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 12:30:27 -0000 Subject: SUSE-RU-2024:2192-1: moderate: Recommended update for certification-sles-eal4 Message-ID: <171931862727.7836.6077251200146015687@smelt2.prg2.suse.org> # Recommended update for certification-sles-eal4 Announcement ID: SUSE-RU-2024:2192-1 Rating: moderate References: * bsc#1221928 Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for certification-sles-eal4 fixes the following issues: Update to version 15.6+git20240502.420b237: * fix permissions * remove the rootlogin * set the crypto policies to FIPS (bsc#1221928) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2192=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2192=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * certification-sles-eal4-15.6+git20240502.420b237-150600.14.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * certification-sles-eal4-15.6+git20240502.420b237-150600.14.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221928 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 12:32:30 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 12:32:30 -0000 Subject: SUSE-SU-2024:2190-1: important: Security update for the Linux Kernel Message-ID: <171931875033.7836.666968926394362480@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:2190-1 Rating: important References: * bsc#1065729 * bsc#1141539 * bsc#1174585 * bsc#1181674 * bsc#1187716 * bsc#1190569 * bsc#1191949 * bsc#1192107 * bsc#1193983 * bsc#1194288 * bsc#1194869 * bsc#1196956 * bsc#1197915 * bsc#1200465 * bsc#1205205 * bsc#1207284 * bsc#1207361 * bsc#1207948 * bsc#1208149 * bsc#1209657 * bsc#1209799 * bsc#1209834 * bsc#1209980 * bsc#1210335 * bsc#1213863 * bsc#1214852 * bsc#1215322 * bsc#1215702 * bsc#1216358 * bsc#1216702 * bsc#1217169 * bsc#1217339 * bsc#1217515 * bsc#1218447 * bsc#1220021 * bsc#1220267 * bsc#1220363 * bsc#1220783 * bsc#1221044 * bsc#1221081 * bsc#1221615 * bsc#1221777 * bsc#1221816 * bsc#1221829 * bsc#1222011 * bsc#1222374 * bsc#1222385 * bsc#1222413 * bsc#1222464 * bsc#1222513 * bsc#1222559 * bsc#1222561 * bsc#1222608 * bsc#1222619 * bsc#1222627 * bsc#1222721 * bsc#1222765 * bsc#1222770 * bsc#1222783 * bsc#1222793 * bsc#1222870 * bsc#1222893 * bsc#1222960 * bsc#1222961 * bsc#1222974 * bsc#1222975 * bsc#1222976 * bsc#1223011 * bsc#1223023 * bsc#1223027 * bsc#1223031 * bsc#1223043 * bsc#1223046 * bsc#1223048 * bsc#1223049 * bsc#1223084 * bsc#1223113 * bsc#1223119 * bsc#1223137 * bsc#1223138 * bsc#1223140 * bsc#1223188 * bsc#1223203 * bsc#1223207 * bsc#1223315 * bsc#1223360 * bsc#1223384 * bsc#1223390 * bsc#1223432 * bsc#1223489 * bsc#1223505 * bsc#1223532 * bsc#1223575 * bsc#1223595 * bsc#1223626 * bsc#1223627 * bsc#1223628 * bsc#1223631 * bsc#1223633 * bsc#1223638 * bsc#1223650 * bsc#1223653 * bsc#1223666 * bsc#1223670 * bsc#1223671 * bsc#1223675 * bsc#1223677 * bsc#1223678 * bsc#1223679 * bsc#1223698 * bsc#1223712 * bsc#1223715 * bsc#1223717 * bsc#1223718 * bsc#1223737 * bsc#1223738 * bsc#1223741 * bsc#1223744 * bsc#1223747 * bsc#1223748 * bsc#1223750 * bsc#1223752 * bsc#1223754 * bsc#1223756 * bsc#1223757 * bsc#1223762 * bsc#1223769 * bsc#1223770 * bsc#1223779 * bsc#1223780 * bsc#1223781 * bsc#1223788 * bsc#1223802 * bsc#1223819 * bsc#1223823 * bsc#1223826 * bsc#1223828 * bsc#1223829 * bsc#1223837 * bsc#1223842 * bsc#1223843 * bsc#1223844 * bsc#1223847 * bsc#1223858 * bsc#1223875 * bsc#1223879 * bsc#1223895 * bsc#1223959 * bsc#1223961 * bsc#1223991 * bsc#1223996 * bsc#1224020 * bsc#1224076 * bsc#1224096 * bsc#1224098 * bsc#1224099 * bsc#1224137 * bsc#1224166 * bsc#1224174 * bsc#1224177 * bsc#1224180 * bsc#1224181 * bsc#1224187 * bsc#1224331 * bsc#1224346 * bsc#1224423 * bsc#1224432 * bsc#1224437 * bsc#1224438 * bsc#1224442 * bsc#1224443 * bsc#1224445 * bsc#1224449 * bsc#1224479 * bsc#1224482 * bsc#1224487 * bsc#1224488 * bsc#1224492 * bsc#1224494 * bsc#1224495 * bsc#1224502 * bsc#1224508 * bsc#1224509 * bsc#1224511 * bsc#1224519 * bsc#1224524 * bsc#1224525 * bsc#1224530 * bsc#1224531 * bsc#1224534 * bsc#1224535 * bsc#1224537 * bsc#1224541 * bsc#1224543 * bsc#1224549 * bsc#1224550 * bsc#1224558 * bsc#1224559 * bsc#1224566 * bsc#1224567 * bsc#1224571 * bsc#1224575 * bsc#1224576 * bsc#1224579 * bsc#1224580 * bsc#1224581 * bsc#1224582 * bsc#1224586 * bsc#1224587 * bsc#1224592 * bsc#1224598 * bsc#1224601 * bsc#1224607 * bsc#1224608 * bsc#1224611 * bsc#1224615 * bsc#1224617 * bsc#1224618 * bsc#1224621 * bsc#1224622 * bsc#1224624 * bsc#1224627 * bsc#1224628 * bsc#1224629 * bsc#1224632 * bsc#1224636 * bsc#1224637 * bsc#1224638 * bsc#1224640 * bsc#1224643 * bsc#1224644 * bsc#1224645 * bsc#1224647 * bsc#1224648 * bsc#1224649 * bsc#1224650 * bsc#1224651 * bsc#1224657 * bsc#1224659 * bsc#1224660 * bsc#1224663 * bsc#1224664 * bsc#1224665 * bsc#1224666 * bsc#1224667 * bsc#1224668 * bsc#1224671 * bsc#1224672 * bsc#1224676 * bsc#1224678 * bsc#1224679 * bsc#1224680 * bsc#1224681 * bsc#1224682 * bsc#1224685 * bsc#1224686 * bsc#1224692 * bsc#1224697 * bsc#1224699 * bsc#1224701 * bsc#1224703 * bsc#1224705 * bsc#1224707 * bsc#1224717 * bsc#1224718 * bsc#1224721 * bsc#1224722 * bsc#1224723 * bsc#1224725 * bsc#1224727 * bsc#1224728 * bsc#1224729 * bsc#1224730 * bsc#1224731 * bsc#1224732 * bsc#1224733 * bsc#1224736 * bsc#1224738 * bsc#1224739 * bsc#1224740 * bsc#1224747 * bsc#1224749 * bsc#1224759 * bsc#1224763 * bsc#1224764 * bsc#1224765 * bsc#1224766 * bsc#1224794 * bsc#1224795 * bsc#1224796 * bsc#1224803 * bsc#1224816 * bsc#1224895 * bsc#1224898 * bsc#1224900 * bsc#1224901 * bsc#1224902 * bsc#1224903 * bsc#1224904 * bsc#1224905 * bsc#1224907 * bsc#1224909 * bsc#1224910 * bsc#1224911 * bsc#1224912 * bsc#1224913 * bsc#1224914 * bsc#1224915 * bsc#1224920 * bsc#1224928 * bsc#1224929 * bsc#1224930 * bsc#1224931 * bsc#1224932 * bsc#1224936 * bsc#1224937 * bsc#1224941 * bsc#1224942 * bsc#1224944 * bsc#1224945 * bsc#1224947 * bsc#1224956 * bsc#1224988 * bsc#1224992 * bsc#1225000 * bsc#1225003 * bsc#1225005 * bsc#1225008 * bsc#1225009 * bsc#1225022 * bsc#1225031 * bsc#1225032 * bsc#1225036 * bsc#1225041 * bsc#1225044 * bsc#1225053 * bsc#1225076 * bsc#1225077 * bsc#1225082 * bsc#1225085 * bsc#1225086 * bsc#1225092 * bsc#1225095 * bsc#1225096 * bsc#1225097 * bsc#1225106 * bsc#1225108 * bsc#1225109 * bsc#1225114 * bsc#1225118 * bsc#1225121 * bsc#1225122 * bsc#1225123 * bsc#1225125 * bsc#1225126 * bsc#1225127 * bsc#1225129 * bsc#1225131 * bsc#1225132 * bsc#1225138 * bsc#1225139 * bsc#1225145 * bsc#1225151 * bsc#1225153 * bsc#1225156 * bsc#1225158 * bsc#1225160 * bsc#1225161 * bsc#1225164 * bsc#1225167 * bsc#1225180 * bsc#1225183 * bsc#1225184 * bsc#1225186 * bsc#1225187 * bsc#1225189 * bsc#1225190 * bsc#1225191 * bsc#1225192 * bsc#1225193 * bsc#1225195 * bsc#1225198 * bsc#1225201 * bsc#1225203 * bsc#1225205 * bsc#1225206 * bsc#1225207 * bsc#1225208 * bsc#1225209 * bsc#1225210 * bsc#1225214 * bsc#1225222 * bsc#1225223 * bsc#1225224 * bsc#1225225 * bsc#1225227 * bsc#1225228 * bsc#1225229 * bsc#1225230 * bsc#1225232 * bsc#1225233 * bsc#1225235 * bsc#1225236 * bsc#1225237 * bsc#1225238 * bsc#1225239 * bsc#1225240 * bsc#1225241 * bsc#1225242 * bsc#1225243 * bsc#1225244 * bsc#1225245 * bsc#1225246 * bsc#1225247 * bsc#1225248 * bsc#1225249 * bsc#1225250 * bsc#1225251 * bsc#1225252 * bsc#1225253 * bsc#1225254 * bsc#1225255 * bsc#1225256 * bsc#1225257 * bsc#1225258 * bsc#1225259 * bsc#1225260 * bsc#1225261 * bsc#1225262 * bsc#1225263 * bsc#1225268 * bsc#1225301 * bsc#1225303 * bsc#1225304 * bsc#1225306 * bsc#1225316 * bsc#1225318 * bsc#1225320 * bsc#1225321 * bsc#1225322 * bsc#1225323 * bsc#1225326 * bsc#1225327 * bsc#1225328 * bsc#1225329 * bsc#1225330 * bsc#1225331 * bsc#1225332 * bsc#1225333 * bsc#1225334 * bsc#1225335 * bsc#1225336 * bsc#1225337 * bsc#1225338 * bsc#1225339 * bsc#1225341 * bsc#1225342 * bsc#1225344 * bsc#1225346 * bsc#1225347 * bsc#1225351 * bsc#1225353 * bsc#1225354 * bsc#1225355 * bsc#1225357 * bsc#1225358 * bsc#1225360 * bsc#1225361 * bsc#1225366 * bsc#1225367 * bsc#1225368 * bsc#1225369 * bsc#1225370 * bsc#1225372 * bsc#1225373 * bsc#1225374 * bsc#1225375 * bsc#1225376 * bsc#1225377 * bsc#1225379 * bsc#1225380 * bsc#1225382 * bsc#1225383 * bsc#1225384 * bsc#1225386 * bsc#1225387 * bsc#1225388 * bsc#1225390 * bsc#1225392 * bsc#1225393 * bsc#1225396 * bsc#1225400 * bsc#1225404 * bsc#1225405 * bsc#1225408 * bsc#1225409 * bsc#1225410 * bsc#1225411 * bsc#1225424 * bsc#1225425 * bsc#1225427 * bsc#1225431 * bsc#1225435 * bsc#1225436 * bsc#1225437 * bsc#1225438 * bsc#1225439 * bsc#1225441 * bsc#1225442 * bsc#1225443 * bsc#1225444 * bsc#1225445 * bsc#1225446 * bsc#1225447 * bsc#1225450 * bsc#1225453 * bsc#1225455 * bsc#1225461 * bsc#1225463 * bsc#1225464 * bsc#1225466 * bsc#1225467 * bsc#1225468 * bsc#1225471 * bsc#1225472 * bsc#1225478 * bsc#1225479 * bsc#1225480 * bsc#1225482 * bsc#1225483 * bsc#1225486 * bsc#1225488 * bsc#1225490 * bsc#1225492 * bsc#1225495 * bsc#1225499 * bsc#1225500 * bsc#1225501 * bsc#1225502 * bsc#1225506 * bsc#1225508 * bsc#1225510 * bsc#1225513 * bsc#1225515 * bsc#1225529 * bsc#1225530 * bsc#1225532 * bsc#1225534 * bsc#1225535 * bsc#1225548 * bsc#1225549 * bsc#1225550 * bsc#1225553 * bsc#1225554 * bsc#1225555 * bsc#1225556 * bsc#1225557 * bsc#1225559 * bsc#1225560 * bsc#1225565 * bsc#1225566 * bsc#1225568 * bsc#1225569 * bsc#1225570 * bsc#1225571 * bsc#1225572 * bsc#1225577 * bsc#1225583 * bsc#1225584 * bsc#1225587 * bsc#1225588 * bsc#1225589 * bsc#1225590 * bsc#1225591 * bsc#1225592 * bsc#1225593 * bsc#1225595 * bsc#1225599 * bsc#1225616 * bsc#1225640 * bsc#1225642 * bsc#1225705 * bsc#1225708 * bsc#1225715 * bsc#1225720 * bsc#1225722 * bsc#1225734 * bsc#1225735 * bsc#1225747 * bsc#1225748 * bsc#1225756 * bsc#1225761 * bsc#1225766 * bsc#1225775 * bsc#1225810 * bsc#1225820 * bsc#1225829 * bsc#1225835 * bsc#1225842 * jsc#PED-3259 * jsc#PED-7167 Cross-References: * CVE-2020-36788 * CVE-2021-4148 * CVE-2021-47358 * CVE-2021-47359 * CVE-2021-47360 * CVE-2021-47361 * CVE-2021-47362 * CVE-2021-47363 * CVE-2021-47364 * CVE-2021-47365 * CVE-2021-47366 * CVE-2021-47367 * CVE-2021-47368 * CVE-2021-47369 * CVE-2021-47370 * CVE-2021-47371 * CVE-2021-47372 * CVE-2021-47373 * CVE-2021-47374 * CVE-2021-47375 * CVE-2021-47376 * CVE-2021-47378 * CVE-2021-47379 * CVE-2021-47380 * CVE-2021-47381 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47384 * CVE-2021-47385 * CVE-2021-47386 * CVE-2021-47387 * CVE-2021-47388 * CVE-2021-47389 * CVE-2021-47390 * CVE-2021-47391 * CVE-2021-47392 * CVE-2021-47393 * CVE-2021-47394 * CVE-2021-47395 * CVE-2021-47396 * CVE-2021-47397 * CVE-2021-47398 * CVE-2021-47399 * CVE-2021-47400 * CVE-2021-47401 * CVE-2021-47402 * CVE-2021-47403 * CVE-2021-47404 * CVE-2021-47405 * CVE-2021-47406 * CVE-2021-47407 * CVE-2021-47408 * CVE-2021-47409 * CVE-2021-47410 * CVE-2021-47412 * CVE-2021-47413 * CVE-2021-47414 * CVE-2021-47415 * CVE-2021-47416 * CVE-2021-47417 * CVE-2021-47418 * CVE-2021-47419 * CVE-2021-47420 * CVE-2021-47421 * CVE-2021-47422 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47425 * CVE-2021-47426 * CVE-2021-47427 * CVE-2021-47428 * CVE-2021-47429 * CVE-2021-47430 * CVE-2021-47431 * CVE-2021-47433 * CVE-2021-47434 * CVE-2021-47435 * CVE-2021-47436 * CVE-2021-47437 * CVE-2021-47438 * CVE-2021-47439 * CVE-2021-47440 * CVE-2021-47441 * CVE-2021-47442 * CVE-2021-47443 * CVE-2021-47444 * CVE-2021-47445 * CVE-2021-47446 * CVE-2021-47447 * CVE-2021-47448 * CVE-2021-47449 * CVE-2021-47450 * CVE-2021-47451 * CVE-2021-47452 * CVE-2021-47453 * CVE-2021-47454 * CVE-2021-47455 * CVE-2021-47456 * CVE-2021-47457 * CVE-2021-47458 * CVE-2021-47459 * CVE-2021-47460 * CVE-2021-47461 * CVE-2021-47462 * CVE-2021-47463 * CVE-2021-47464 * CVE-2021-47465 * CVE-2021-47466 * CVE-2021-47467 * CVE-2021-47468 * CVE-2021-47469 * CVE-2021-47470 * CVE-2021-47471 * CVE-2021-47472 * CVE-2021-47473 * CVE-2021-47474 * CVE-2021-47475 * CVE-2021-47476 * CVE-2021-47477 * CVE-2021-47478 * CVE-2021-47479 * CVE-2021-47480 * CVE-2021-47481 * CVE-2021-47482 * CVE-2021-47483 * CVE-2021-47484 * CVE-2021-47485 * CVE-2021-47486 * CVE-2021-47488 * CVE-2021-47489 * CVE-2021-47490 * CVE-2021-47491 * CVE-2021-47492 * CVE-2021-47493 * CVE-2021-47494 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47498 * CVE-2021-47499 * CVE-2021-47500 * CVE-2021-47501 * CVE-2021-47502 * CVE-2021-47503 * CVE-2021-47504 * CVE-2021-47505 * CVE-2021-47506 * CVE-2021-47507 * CVE-2021-47508 * CVE-2021-47509 * CVE-2021-47510 * CVE-2021-47511 * CVE-2021-47512 * CVE-2021-47513 * CVE-2021-47514 * CVE-2021-47516 * CVE-2021-47518 * CVE-2021-47520 * CVE-2021-47521 * CVE-2021-47522 * CVE-2021-47523 * CVE-2021-47524 * CVE-2021-47525 * CVE-2021-47526 * CVE-2021-47527 * CVE-2021-47528 * CVE-2021-47529 * CVE-2021-47530 * CVE-2021-47531 * CVE-2021-47532 * CVE-2021-47533 * CVE-2021-47534 * CVE-2021-47535 * CVE-2021-47536 * CVE-2021-47537 * CVE-2021-47540 * CVE-2021-47541 * CVE-2021-47542 * CVE-2021-47544 * CVE-2021-47548 * CVE-2021-47549 * CVE-2021-47550 * CVE-2021-47551 * CVE-2021-47552 * CVE-2021-47553 * CVE-2021-47554 * CVE-2021-47555 * CVE-2021-47556 * CVE-2021-47557 * CVE-2021-47558 * CVE-2021-47559 * CVE-2021-47560 * CVE-2021-47562 * CVE-2021-47563 * CVE-2021-47564 * CVE-2021-47565 * CVE-2021-47569 * CVE-2022-48633 * CVE-2022-48662 * CVE-2022-48669 * CVE-2022-48689 * CVE-2022-48691 * CVE-2022-48699 * CVE-2022-48705 * CVE-2022-48708 * CVE-2022-48709 * CVE-2022-48710 * CVE-2023-0160 * CVE-2023-1829 * CVE-2023-42755 * CVE-2023-47233 * CVE-2023-52586 * CVE-2023-52591 * CVE-2023-52618 * CVE-2023-52642 * CVE-2023-52643 * CVE-2023-52644 * CVE-2023-52646 * CVE-2023-52650 * CVE-2023-52653 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52656 * CVE-2023-52657 * CVE-2023-52659 * CVE-2023-52660 * CVE-2023-52661 * CVE-2023-52662 * CVE-2023-52664 * CVE-2023-52669 * CVE-2023-52671 * CVE-2023-52674 * CVE-2023-52676 * CVE-2023-52678 * CVE-2023-52679 * CVE-2023-52680 * CVE-2023-52683 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52690 * CVE-2023-52691 * CVE-2023-52692 * CVE-2023-52693 * CVE-2023-52694 * CVE-2023-52696 * CVE-2023-52698 * CVE-2023-52699 * CVE-2023-52702 * CVE-2023-52703 * CVE-2023-52705 * CVE-2023-52707 * CVE-2023-52708 * CVE-2023-52730 * CVE-2023-52731 * CVE-2023-52732 * CVE-2023-52733 * CVE-2023-52736 * CVE-2023-52738 * CVE-2023-52739 * CVE-2023-52740 * CVE-2023-52741 * CVE-2023-52742 * CVE-2023-52743 * CVE-2023-52744 * CVE-2023-52745 * CVE-2023-52746 * CVE-2023-52747 * CVE-2023-52753 * CVE-2023-52754 * CVE-2023-52756 * CVE-2023-52757 * CVE-2023-52759 * CVE-2023-52763 * CVE-2023-52764 * CVE-2023-52766 * CVE-2023-52773 * CVE-2023-52774 * CVE-2023-52777 * CVE-2023-52781 * CVE-2023-52788 * CVE-2023-52789 * CVE-2023-52791 * CVE-2023-52795 * CVE-2023-52796 * CVE-2023-52798 * CVE-2023-52799 * CVE-2023-52800 * CVE-2023-52803 * CVE-2023-52804 * CVE-2023-52805 * CVE-2023-52806 * CVE-2023-52807 * CVE-2023-52808 * CVE-2023-52809 * CVE-2023-52810 * CVE-2023-52811 * CVE-2023-52814 * CVE-2023-52815 * CVE-2023-52816 * CVE-2023-52817 * CVE-2023-52818 * CVE-2023-52819 * CVE-2023-52821 * CVE-2023-52825 * CVE-2023-52826 * CVE-2023-52832 * CVE-2023-52833 * CVE-2023-52834 * CVE-2023-52838 * CVE-2023-52840 * CVE-2023-52841 * CVE-2023-52844 * CVE-2023-52847 * CVE-2023-52851 * CVE-2023-52853 * CVE-2023-52854 * CVE-2023-52855 * CVE-2023-52856 * CVE-2023-52858 * CVE-2023-52860 * CVE-2023-52861 * CVE-2023-52864 * CVE-2023-52865 * CVE-2023-52867 * CVE-2023-52868 * CVE-2023-52870 * CVE-2023-52871 * CVE-2023-52872 * CVE-2023-52873 * CVE-2023-52875 * CVE-2023-52876 * CVE-2023-52877 * CVE-2023-52878 * CVE-2023-52880 * CVE-2023-6531 * CVE-2024-2201 * CVE-2024-26597 * CVE-2024-26643 * CVE-2024-26679 * CVE-2024-26692 * CVE-2024-26698 * CVE-2024-26700 * CVE-2024-26715 * CVE-2024-26739 * CVE-2024-26742 * CVE-2024-26748 * CVE-2024-26758 * CVE-2024-26764 * CVE-2024-26775 * CVE-2024-26777 * CVE-2024-26778 * CVE-2024-26788 * CVE-2024-26791 * CVE-2024-26801 * CVE-2024-26822 * CVE-2024-26828 * CVE-2024-26829 * CVE-2024-26838 * CVE-2024-26839 * CVE-2024-26840 * CVE-2024-26846 * CVE-2024-26859 * CVE-2024-26870 * CVE-2024-26874 * CVE-2024-26876 * CVE-2024-26877 * CVE-2024-26880 * CVE-2024-26889 * CVE-2024-26894 * CVE-2024-26900 * CVE-2024-26907 * CVE-2024-26915 * CVE-2024-26916 * CVE-2024-26919 * CVE-2024-26920 * CVE-2024-26921 * CVE-2024-26922 * CVE-2024-26925 * CVE-2024-26928 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-26931 * CVE-2024-26933 * CVE-2024-26934 * CVE-2024-26935 * CVE-2024-26937 * CVE-2024-26938 * CVE-2024-26939 * CVE-2024-26940 * CVE-2024-26943 * CVE-2024-26957 * CVE-2024-26958 * CVE-2024-26964 * CVE-2024-26974 * CVE-2024-26977 * CVE-2024-26979 * CVE-2024-26984 * CVE-2024-26988 * CVE-2024-26989 * CVE-2024-26994 * CVE-2024-26996 * CVE-2024-26997 * CVE-2024-26999 * CVE-2024-27000 * CVE-2024-27001 * CVE-2024-27004 * CVE-2024-27008 * CVE-2024-27028 * CVE-2024-27037 * CVE-2024-27042 * CVE-2024-27045 * CVE-2024-27047 * CVE-2024-27051 * CVE-2024-27052 * CVE-2024-27053 * CVE-2024-27054 * CVE-2024-27059 * CVE-2024-27072 * CVE-2024-27073 * CVE-2024-27074 * CVE-2024-27075 * CVE-2024-27076 * CVE-2024-27077 * CVE-2024-27078 * CVE-2024-27388 * CVE-2024-27393 * CVE-2024-27395 * CVE-2024-27396 * CVE-2024-27398 * CVE-2024-27399 * CVE-2024-27400 * CVE-2024-27401 * CVE-2024-27405 * CVE-2024-27410 * CVE-2024-27412 * CVE-2024-27413 * CVE-2024-27416 * CVE-2024-27417 * CVE-2024-27419 * CVE-2024-27431 * CVE-2024-27435 * CVE-2024-27436 * CVE-2024-35789 * CVE-2024-35791 * CVE-2024-35796 * CVE-2024-35799 * CVE-2024-35801 * CVE-2024-35804 * CVE-2024-35806 * CVE-2024-35809 * CVE-2024-35811 * CVE-2024-35812 * CVE-2024-35813 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35821 * CVE-2024-35822 * CVE-2024-35823 * CVE-2024-35825 * CVE-2024-35828 * CVE-2024-35829 * CVE-2024-35830 * CVE-2024-35833 * CVE-2024-35845 * CVE-2024-35847 * CVE-2024-35849 * CVE-2024-35851 * CVE-2024-35852 * CVE-2024-35854 * CVE-2024-35860 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35865 * CVE-2024-35866 * CVE-2024-35867 * CVE-2024-35868 * CVE-2024-35869 * CVE-2024-35870 * CVE-2024-35872 * CVE-2024-35875 * CVE-2024-35877 * CVE-2024-35878 * CVE-2024-35879 * CVE-2024-35885 * CVE-2024-35887 * CVE-2024-35895 * CVE-2024-35901 * CVE-2024-35904 * CVE-2024-35905 * CVE-2024-35907 * CVE-2024-35912 * CVE-2024-35914 * CVE-2024-35915 * CVE-2024-35922 * CVE-2024-35924 * CVE-2024-35930 * CVE-2024-35932 * CVE-2024-35933 * CVE-2024-35935 * CVE-2024-35936 * CVE-2024-35938 * CVE-2024-35939 * CVE-2024-35940 * CVE-2024-35943 * CVE-2024-35944 * CVE-2024-35947 * CVE-2024-35950 * CVE-2024-35951 * CVE-2024-35952 * CVE-2024-35955 * CVE-2024-35959 * CVE-2024-35963 * CVE-2024-35964 * CVE-2024-35965 * CVE-2024-35966 * CVE-2024-35967 * CVE-2024-35969 * CVE-2024-35973 * CVE-2024-35976 * CVE-2024-35978 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-35989 * CVE-2024-35990 * CVE-2024-35998 * CVE-2024-35999 * CVE-2024-36006 * CVE-2024-36007 * CVE-2024-36012 * CVE-2024-36014 * CVE-2024-36015 * CVE-2024-36016 * CVE-2024-36026 * CVE-2024-36029 * CVE-2024-36032 * CVE-2024-36880 * CVE-2024-36893 * CVE-2024-36896 * CVE-2024-36897 * CVE-2024-36906 * CVE-2024-36918 * CVE-2024-36924 * CVE-2024-36926 * CVE-2024-36928 * CVE-2024-36931 * CVE-2024-36938 * CVE-2024-36940 * CVE-2024-36941 * CVE-2024-36942 * CVE-2024-36944 * CVE-2024-36947 * CVE-2024-36950 * CVE-2024-36952 * CVE-2024-36955 * CVE-2024-36959 CVSS scores: * CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-4148 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-4148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47358 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47364 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47365 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47366 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2021-47367 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47368 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47371 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47372 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47373 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47379 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47389 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2021-47390 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47394 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47398 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47407 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47414 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47418 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47420 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47421 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47429 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47439 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47448 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2021-47449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47452 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47466 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47467 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47470 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47474 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47475 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47476 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47477 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47488 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47489 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47490 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47504 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47508 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47510 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47513 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47514 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47520 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47520 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47524 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47525 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47525 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47526 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47528 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47529 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47530 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47531 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47533 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2021-47537 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47544 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2021-47548 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47550 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47553 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47556 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47569 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48689 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48709 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42755 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-42755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52586 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52618 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52642 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52656 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52702 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52707 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52731 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52739 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52745 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52746 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52756 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52773 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52795 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52807 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52815 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52861 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26597 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26597 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26715 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26877 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26880 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26907 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-26907 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26933 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26939 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26979 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-26979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27051 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27052 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27053 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35869 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35940 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35963 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35998 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35999 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36016 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36938 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * Legacy Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves 557 vulnerabilities, contains two features and has 42 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506) * CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959) * CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961) * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). * CVE-2023-42755: Check user supplied offsets (bsc#1215702). * CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081). * CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615). * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169). * CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187). * CVE-2023-52660: Fiedx IRQ handling due to shared interrupts (bsc#1224443). * CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747). * CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729). * CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727). * CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608). * CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628). * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621) * CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr() (bsc#1225114) * CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548). * CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085). * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930). * CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs (bsc#1225097). * CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). * CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339). * CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829). * CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385). * CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464). * CVE-2024-26700: Fixed drm/amd/display: Fix MST Null Ptr for RV (bsc#1222870) * CVE-2024-26715: Fixed NULL pointer dereference in dwc3_gadget_suspend (bsc#1222561). * CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes bsc#1222608). * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627). * CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis (bsc#1222765) * CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage (bsc#1222770) * CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793) * CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). * CVE-2024-26839: Fixed a memleak in init_credit_return() (bsc#1222975) * CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119). * CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046). * CVE-2024-26907: Fixed a fortify source warning while accessing Eth segment in mlx5 (bsc#1223203). * CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207) * CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847). * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390). * CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532). * CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679). * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653). * CVE-2024-27042: Fixed potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (bsc#1223823). * CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098). * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181). * CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438). * CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr() (bsc#1224721) * CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759) * CVE-2024-27431: Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718). * CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725). * CVE-2024-35799: Prevent crash when disable stream (bsc#1224740). * CVE-2024-35804: Mark target gfn of emulated atomic instruction as dirty (bsc#1224638). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736). * CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502). * CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636). * CVE-2024-35860: Struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765,). * CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668). * CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664). * CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678). * CVE-2024-35869: Guarantee refcounted children from parent session (bsc#1224679). * CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224020, bsc#1224672). * CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530). * CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665). * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525). * CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671). * CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524). * CVE-2024-35885: Stop interface during shutdown (bsc#1224519). * CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488). * CVE-2024-35907: Call request_irq() after NAPI initialized (bsc#1224492). * CVE-2024-35924: Limit read size on v1.2 (bsc#1224657). * CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535). * CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649). * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648). * CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701). * CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666). * CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581). * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580). * CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb (bsc#1224586). * CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575). * CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549). * CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550). * CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541). * CVE-2024-36007: Fixed warning during rehash (bsc#1224543). * CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761). The following non-security bugs were fixed: * 9p: explicitly deny setlease attempts (git-fixes). * ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes). * ACPI: disable -Wstringop-truncation (git-fixes). * ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes). * ACPI: LPSS: Advertise number of chip selects via property (git-fixes). * admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes). * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * ALSA: core: Fix NULL module pointer assignment at card init (git-fixes). * ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes). * ALSA: line6: Zero-initialize message buffers (stable-fixes). * ARM: 9381/1: kasan: clear stale stack poison (git-fixes). * ASoC: Intel: avs: Fix ASRC module initialization (git-fixes). * ASoC: Intel: avs: Fix potential integer overflow (git-fixes). * ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes). * ASoC: Intel: Disable route checks for Skylake boards (git-fixes). * ASoC: kirkwood: Fix potential NULL dereference (git-fixes). * ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes). * ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes). * ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes). * ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes). * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes). * ata: pata_legacy: make legacy_exit() work again (git-fixes). * ata: sata_gemini: Check clk_enable() result (stable-fixes). * autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166). * Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes). * Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes). * Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358). * Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes). * Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes). * Bluetooth: qca: add missing firmware sanity checks (git-fixes). * Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes). * Bluetooth: qca: fix firmware check error path (git-fixes). * Bluetooth: qca: fix info leak when fetching fw build id (git-fixes). * Bluetooth: qca: fix NVM configuration parsing (git-fixes). * bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git- fixes) * bpf: decouple prune and jump points (bsc#1225756). * bpf: fix precision backtracking instruction iteration (bsc#1225756). * bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes). * bpf: handle ldimm64 properly in check_cfg() (bsc#1225756). * bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756). * bpf: remove unnecessary prune and jump points (bsc#1225756). * btrfs: add error messages to all unrecognized mount options (git-fixes) * btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes) * btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes) * btrfs: extend locking to all space_info members accesses (git-fixes) * btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes) * btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes) * btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes) * btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes) * btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes) * btrfs: fix silent failure when deleting root reference (git-fixes) * btrfs: fix use-after-free after failure to create a snapshot (git-fixes) * btrfs: free exchange changeset on failures (git-fixes) * btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git- fixes) * btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes) * btrfs: prevent copying too big compressed lzo segment (git-fixes) * btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes) * btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes) * btrfs: repair super block num_devices automatically (git-fixes) * btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes) * btrfs: send: ensure send_fd is writable (git-fixes) * btrfs: send: handle path ref underflow in header iterate_inode_ref() (git- fixes) * btrfs: send: in case of IO error log it (git-fixes) * btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes) * btrfs: tree-checker: check item_size for dev_item (git-fixes) * btrfs: tree-checker: check item_size for inode_item (git-fixes) * cifs: account for primary channel in the interface list (bsc#1224020). * cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020). * cifs: distribute channels across interfaces based on speed (bsc#1224020). * cifs: do not pass cifs_sb when trying to add channels (bsc#1224020). * cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020). * cifs: fix charset issue in reconnection (bsc#1224020). * cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020). * cifs: handle cases where a channel is closed (bsc#1224020). * cifs: handle cases where multiple sessions share connection (bsc#1224020). * cifs: reconnect work should have reference on server struct (bsc#1224020). * clk: Do not hold prepare_lock when calling kref_put() (stable-fixes). * clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes). * counter: stm32-lptimer-cnt: Provide defines for clock polarities (git- fixes). * counter: stm32-timer-cnt: Provide defines for slave mode selection (git- fixes). * cppc_cpufreq: Fix possible null pointer dereference (git-fixes). * cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes). * cpumask: Add for_each_cpu_from() (bsc#1225053). * crypto: bcm - Fix pointer arithmetic (git-fixes). * crypto: ccp - drop platform ifdef checks (git-fixes). * crypto: ecdsa - Fix module auto-load on add-key (git-fixes). * crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes). * dmaengine: axi-dmac: fix possible race in remove() (git-fixes). * dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes). * dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes). * dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575). * docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes). * drivers/nvme: Add quirks for device 126f:2262 (git-fixes). * drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes). * drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes). * drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes). * drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes). * drm/amd: Flush GFXOFF requests in prepare stage (git-fixes). * drm/amdgpu: Refine IB schedule error logging (stable-fixes). * drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git- fixes). * drm/arm/malidp: fix a possible null pointer dereference (git-fixes). * drm/bridge: anx7625: Do not log an error when DSI host can't be found (git- fixes). * drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git- fixes). * drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: icn6211: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: tc358775: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes). * drm/connector: Add \n to message about demoting connector force-probes (git- fixes). * drm/i915/bios: Fix parsing backlight BDB data (git-fixes). * drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes). * drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes). * drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes). * drm/meson: dw-hdmi: power up phy on device init (git-fixes). * drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes). * drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes). * drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes). * drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes). * drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes). * drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes). * drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes). * drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes). * drm: vc4: Fix possible null pointer dereference (git-fixes). * dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes) * dyndbg: fix old BUG_ON in >control parser (stable-fixes). * efi: libstub: only free priv.runtime_map when allocated (git-fixes). * extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes). * fail_function: fix wrong use of fei_attr_remove(). * fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes). * fbdev: shmobile: fix snprintf truncation (git-fixes). * fbdev: sisfb: hide unused variables (git-fixes). * firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes). * firmware: dmi-id: add a release callback function (git-fixes). * firmware: raspberrypi: Use correct device for DMA mappings (git-fixes). * fs/9p: drop inodes immediately on non-.L too (git-fixes). * fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes). * fs/9p: translate O_TRUNC into OTRUNC (git-fixes). * gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes). * gpio: wcove: Use -ENOTSUPP consistently (stable-fixes). * gpu: host1x: Do not setup DMA for virtual devices (stable-fixes). * HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes). * hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git- fixes). * hwmon: (corsair-cpro) Use a separate buffer for sending commands (git- fixes). * hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes). * hwmon: (lm70) fix links in doc and comments (git-fixes). * hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes). * i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes). * i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes). * IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes) * idpf: extend tx watchdog timeout (bsc#1224137). * iio: core: Leave private pointer NULL when no private data supplied (git- fixes). * iio: pressure: dps310: support negative temperature values (git-fixes). * Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes). * Input: ims-pcu - fix printf string overflow (git-fixes). * Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes). * iomap: Fix inline extent handling in iomap_readpage (git-fixes) * iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes) * iomap: Support partial direct I/O on user copy failures (git-fixes) * iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331) * io_uring/unix: drop usage of io_uring socket (git-fixes). * irqchip/gic-v3-its: Prevent double free on error (git-fixes). * jffs2: prevent xattr node from overflowing the eraseblock (git-fixes). * kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756). * kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959) * KEYS: trusted: Do not use WARN when encode fails (git-fixes). * KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes). * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794). * leds: pwm: Disable PWM when going to suspend (git-fixes). * libsubcmd: Fix parse-options memory leak (git-fixes). * locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes). * media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes). * media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes). * media: mc: mark the media devnode as registered from the, start (git-fixes). * media: ngene: Add dvb_ca_en50221_init return value check (git-fixes). * media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes). * mei: me: add lunar lake point M DID (stable-fixes). * mfd: intel-lpss: Revert "Add missing check for platform_get_resource" (git- fixes). * mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git- fixes). * mfd: tqmx86: Specify IO port register range more precisely (git-fixes). * mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes). * mlxbf_gige: Fix intermittent no ip issue (git-fixes). * mlxbf_gige: stop PHY during open() error paths (git-fixes). * mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes). * mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes). * Move upstreamed patches into sorted section * mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes). * mtd: rawnand: hynix: fixed typo (git-fixes). * net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959) * netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961) * net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959) * net: nfc: remove inappropriate attrs check (stable-fixes). * net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes). * net: usb: ax88179_178a: fix link status when link is set to down/up (git- fixes). * net:usb:qmi_wwan: support Rolling modules (stable-fixes). * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes). * net: usb: sr9700: stop lying about skb->truesize (git-fixes). * net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360). * nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git- fixes). * nfc: nci: Fix uninit-value in nci_rx_work (git-fixes). * nilfs2: fix out-of-range warning (git-fixes). * nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes). * nilfs2: fix use-after-free of timer for log writer thread (git-fixes). * nilfs2: make superblock data array index computation sparse friendly (git- fixes). * nvme: ensure disabling pairs with unquiesce (bsc#1224534). * nvme: fix miss command type check (git-fixes). * nvme: fix multipath batched completion accounting (git-fixes). * nvme-multipath: fix io accounting on failover (git-fixes). * nvmet: fix ns enable/disable possible hang (git-fixes). * PCI: dwc: Detect iATU settings after getting "addr_space" resource (git- fixes). * PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes). * PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes). * PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes). * PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes). * PCI: tegra194: Fix probe path for Endpoint mode (git-fixes). * pinctrl: armada-37xx: remove an unused variable (git-fixes). * pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes). * pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes). * pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes). * pinctrl/meson: fix typo in PDM's pin name (git-fixes). * pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git- fixes). * platform/x86/intel-uncore-freq: Do not present root domain on error (git- fixes). * platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git- fixes). * powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740). * powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740). * powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740). * powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729). * powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes). * powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783). * powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869). * powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869). * power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes). * ppdev: Add an error check in register_device (git-fixes). * printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616). * qibfs: fix dentry leak (git-fixes) * RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git- fixes) * RDMA/hns: Fix deadlock on SRQ async events. (git-fixes) * RDMA/hns: Fix GMV table pagesize (git-fixes) * RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes) * RDMA/hns: Fix UAF for cq async event (git-fixes) * RDMA/hns: Modify the print level of CQE error (git-fixes) * RDMA/hns: Use complete parentheses in macros (git-fixes) * RDMA/IPoIB: Fix format truncation compilation errors (git-fixes) * RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes) * RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes) * RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes) * RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes) * RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes) * RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes) * RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes) * RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes) * regulator: bd71828: Do not overwrite runtime voltages (git-fixes). * regulator: core: fix debugfs creation regression (git-fixes). * regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes). * remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes). * Revert "cifs: reconnect work should have reference on server struct" (git- fixes, bsc#1224020). * Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes). * ring-buffer: Fix a race between readers and resize checks (git-fixes). * s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795). * s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796). * s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346). * s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139). * s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138). * sched/topology: Optimize topology_span_sane() (bsc#1225053). * scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes). * scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes). * scsi: core: Consult supported VPD page list prior to fetching page (git- fixes). * scsi: core: Fix unremoved procfs host directory regression (git-fixes). * scsi: csiostor: Avoid function pointer casts (git-fixes). * scsi: libfc: Do not schedule abort twice (git-fixes). * scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes). * scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842). * scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842). * scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842). * scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842). * scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842). * scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842). * scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842). * scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842). * scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git- fixes). * scsi: mylex: Fix sysfs buffer lengths (git-fixes). * scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes). * scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git- fixes). * selftests/pidfd: Fix config for pidfd_setns_test (git-fixes). * serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes). * serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable- fixes). * serial: max3100: Fix bitwise types (git-fixes). * serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git- fixes). * serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git- fixes). * serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes). * serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes). * smb3: show beginning time for per share stats (bsc#1224020). * smb: client: ensure to try all targets when finding nested links (bsc#1224020). * smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020). * smb: client: get rid of dfs code dep in namespace.c (bsc#1224020). * smb: client: get rid of dfs naming in automount code (bsc#1224020). * smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020). * smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020). * smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020). * smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020). * soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes). * soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes). * Sort recent BHI patches * speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes). * spmi: Add a check for remove callback when removing a SPMI driver (git- fixes). * spmi: hisi-spmi-controller: Do not override device identifier (git-fixes). * swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331). * swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331) * swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331) * swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331) * sysv: do not call sb_bread() with pointers_lock held (git-fixes). * thermal/drivers/tsens: Fix null pointer dereference (git-fixes). * tools/latency-collector: Fix -Wformat-security compile warns (git-fixes). * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535) * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes). * tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes). * tracing: hide unused ftrace_event_id_fops (git-fixes). * tty: n_gsm: fix missing receive state reset after mode switch (git-fixes). * tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes). * usb: aqc111: stop lying about skb->truesize (git-fixes). * USB: core: Add hub_get() and hub_put() routines (git-fixes). * USB: core: Fix access violation during port device removal (git-fixes). * USB: core: Fix deadlock in port "disable" sysfs attribute (git-fixes). * usb: dwc3: core: Prevent phy suspend during init (Git-fixes). * usb: gadget: u_audio: Clear uac pointer when freed (git-fixes). * usb: typec: tipd: fix event checking for tps6598x (git-fixes). * usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes). * VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes). * VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes). * vmci: prevent speculation leaks by sanitizing event in event_deliver() (git- fixes). * watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git- fixes). * watchdog: ixp4xx: Make sure restart always works (git-fixes). * watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes). * wifi: ar5523: enable proper endpoint verification (git-fixes). * wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes). * wifi: ath10k: poll service ready message before failing (git-fixes). * wifi: ath10k: populate board data for WCN3990 (git-fixes). * wifi: ath11k: do not force enable power save on non-running vdevs (git- fixes). * wifi: carl9170: add a proper sanity check for endpoints (git-fixes). * wifi: carl9170: re-fix fortified-memset warning (git-fixes). * wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes). * wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes). * wifi: mwl8k: initialize cmd->addr[] properly (git-fixes). * x86/boot: Ignore NMIs during very early boot (git-fixes). * x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes). * x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git- fixes). * x86/bugs: Fix BHI documentation (git-fixes). * x86/bugs: Fix BHI handling of RRSBA (git-fixes). * x86/bugs: Fix BHI retpoline check (git-fixes). * x86/bugs: Fix return type of spectre_bhi_state() (git-fixes). * x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git- fixes). * x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git- fixes). * x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes). * x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes). * x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes). * x86/lib: Fix overflow when counting digits (git-fixes). * x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes). * x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes). * x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes). * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git- fixes). * x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes). * x86/tdx: Preserve shared bit on mprotect() (git-fixes). * xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git- fixes). * xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes). * xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes). * xfs: fix inode reservation space for removing transaction (git-fixes). * xfs: shrink failure needs to hold AGI buffer (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2190=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-2190=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2190=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-2190=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-2190=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2190=1 openSUSE-SLE-15.5-2024-2190=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2190=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2190=1 ## Package List: * Development Tools Module 15-SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.68.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-syms-5.14.21-150500.55.68.1 * kernel-obs-build-5.14.21-150500.55.68.1 * kernel-obs-build-debugsource-5.14.21-150500.55.68.1 * Development Tools Module 15-SP5 (noarch) * kernel-source-5.14.21-150500.55.68.1 * Legacy Module 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.68.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-5.14.21-150500.55.68.1 * kernel-default-debugsource-5.14.21-150500.55.68.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.68.1 * kernel-default-debuginfo-5.14.21-150500.55.68.1 * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.68.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_15-debugsource-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 * kernel-default-livepatch-devel-5.14.21-150500.55.68.1 * kernel-default-debuginfo-5.14.21-150500.55.68.1 * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-1-150500.11.3.1 * kernel-default-debugsource-5.14.21-150500.55.68.1 * kernel-default-livepatch-5.14.21-150500.55.68.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-5.14.21-150500.55.68.1 * kernel-default-debuginfo-5.14.21-150500.55.68.1 * cluster-md-kmp-default-5.14.21-150500.55.68.1 * ocfs2-kmp-default-5.14.21-150500.55.68.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.68.1 * kernel-default-debugsource-5.14.21-150500.55.68.1 * dlm-kmp-default-5.14.21-150500.55.68.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.68.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.68.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.68.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * kernel-default-extra-debuginfo-5.14.21-150500.55.68.1 * kernel-default-debugsource-5.14.21-150500.55.68.1 * kernel-default-extra-5.14.21-150500.55.68.1 * kernel-default-debuginfo-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (noarch) * kernel-macros-5.14.21-150500.55.68.1 * kernel-docs-html-5.14.21-150500.55.68.1 * kernel-devel-5.14.21-150500.55.68.1 * kernel-source-5.14.21-150500.55.68.1 * kernel-source-vanilla-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (ppc64le x86_64) * kernel-debug-debugsource-5.14.21-150500.55.68.1 * kernel-debug-devel-5.14.21-150500.55.68.1 * kernel-debug-debuginfo-5.14.21-150500.55.68.1 * kernel-debug-livepatch-devel-5.14.21-150500.55.68.1 * kernel-debug-devel-debuginfo-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (x86_64) * kernel-default-vdso-5.14.21-150500.55.68.1 * kernel-debug-vdso-debuginfo-5.14.21-150500.55.68.1 * kernel-debug-vdso-5.14.21-150500.55.68.1 * kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.68.1 * kernel-kvmsmall-vdso-5.14.21-150500.55.68.1 * kernel-default-vdso-debuginfo-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * kernel-default-base-rebuild-5.14.21-150500.55.68.1.150500.6.31.1 * kernel-kvmsmall-debuginfo-5.14.21-150500.55.68.1 * kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.68.1 * kernel-kvmsmall-debugsource-5.14.21-150500.55.68.1 * kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.68.1 * kernel-kvmsmall-devel-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * kernel-default-extra-debuginfo-5.14.21-150500.55.68.1 * cluster-md-kmp-default-5.14.21-150500.55.68.1 * kernel-default-devel-5.14.21-150500.55.68.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1 * kernel-obs-build-5.14.21-150500.55.68.1 * kernel-default-debugsource-5.14.21-150500.55.68.1 * kernel-default-livepatch-5.14.21-150500.55.68.1 * kernel-syms-5.14.21-150500.55.68.1 * kernel-default-optional-debuginfo-5.14.21-150500.55.68.1 * kernel-default-debuginfo-5.14.21-150500.55.68.1 * kernel-default-extra-5.14.21-150500.55.68.1 * kernel-default-livepatch-devel-5.14.21-150500.55.68.1 * kselftests-kmp-default-debuginfo-5.14.21-150500.55.68.1 * kernel-obs-build-debugsource-5.14.21-150500.55.68.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.68.1 * dlm-kmp-default-5.14.21-150500.55.68.1 * kselftests-kmp-default-5.14.21-150500.55.68.1 * kernel-default-optional-5.14.21-150500.55.68.1 * ocfs2-kmp-default-5.14.21-150500.55.68.1 * kernel-obs-qa-5.14.21-150500.55.68.1 * reiserfs-kmp-default-5.14.21-150500.55.68.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.68.1 * gfs2-kmp-default-5.14.21-150500.55.68.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.68.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_15-debugsource-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 * openSUSE Leap 15.5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150500.55.68.1 * kernel-zfcpdump-debugsource-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (nosrc) * dtb-aarch64-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (aarch64) * kernel-64kb-optional-debuginfo-5.14.21-150500.55.68.1 * reiserfs-kmp-64kb-5.14.21-150500.55.68.1 * kernel-64kb-optional-5.14.21-150500.55.68.1 * dlm-kmp-64kb-5.14.21-150500.55.68.1 * dtb-apple-5.14.21-150500.55.68.1 * dtb-lg-5.14.21-150500.55.68.1 * dtb-broadcom-5.14.21-150500.55.68.1 * dtb-amd-5.14.21-150500.55.68.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.68.1 * dtb-nvidia-5.14.21-150500.55.68.1 * kernel-64kb-debuginfo-5.14.21-150500.55.68.1 * dtb-renesas-5.14.21-150500.55.68.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.68.1 * dtb-sprd-5.14.21-150500.55.68.1 * dtb-arm-5.14.21-150500.55.68.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.68.1 * dtb-xilinx-5.14.21-150500.55.68.1 * dtb-apm-5.14.21-150500.55.68.1 * dtb-hisilicon-5.14.21-150500.55.68.1 * gfs2-kmp-64kb-5.14.21-150500.55.68.1 * dtb-rockchip-5.14.21-150500.55.68.1 * kselftests-kmp-64kb-5.14.21-150500.55.68.1 * dlm-kmp-64kb-debuginfo-5.14.21-150500.55.68.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.68.1 * kernel-64kb-extra-5.14.21-150500.55.68.1 * cluster-md-kmp-64kb-5.14.21-150500.55.68.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.68.1 * dtb-altera-5.14.21-150500.55.68.1 * dtb-qcom-5.14.21-150500.55.68.1 * dtb-socionext-5.14.21-150500.55.68.1 * kernel-64kb-devel-5.14.21-150500.55.68.1 * dtb-mediatek-5.14.21-150500.55.68.1 * dtb-marvell-5.14.21-150500.55.68.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.68.1 * kernel-64kb-debugsource-5.14.21-150500.55.68.1 * kernel-64kb-livepatch-devel-5.14.21-150500.55.68.1 * dtb-allwinner-5.14.21-150500.55.68.1 * dtb-cavium-5.14.21-150500.55.68.1 * dtb-amlogic-5.14.21-150500.55.68.1 * ocfs2-kmp-64kb-5.14.21-150500.55.68.1 * kernel-64kb-extra-debuginfo-5.14.21-150500.55.68.1 * dtb-amazon-5.14.21-150500.55.68.1 * dtb-freescale-5.14.21-150500.55.68.1 * dtb-exynos-5.14.21-150500.55.68.1 * openSUSE Leap 15.5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.68.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150500.55.68.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.68.1 * kernel-default-debuginfo-5.14.21-150500.55.68.1 * Basesystem Module 15-SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.68.1 * Basesystem Module 15-SP5 (aarch64) * kernel-64kb-debugsource-5.14.21-150500.55.68.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.68.1 * kernel-64kb-devel-5.14.21-150500.55.68.1 * kernel-64kb-debuginfo-5.14.21-150500.55.68.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.68.1 * Basesystem Module 15-SP5 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-5.14.21-150500.55.68.1 * kernel-default-debugsource-5.14.21-150500.55.68.1 * kernel-default-devel-5.14.21-150500.55.68.1 * kernel-default-debuginfo-5.14.21-150500.55.68.1 * Basesystem Module 15-SP5 (noarch) * kernel-macros-5.14.21-150500.55.68.1 * kernel-devel-5.14.21-150500.55.68.1 * Basesystem Module 15-SP5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.68.1 * Basesystem Module 15-SP5 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150500.55.68.1 * kernel-zfcpdump-debugsource-5.14.21-150500.55.68.1 ## References: * https://www.suse.com/security/cve/CVE-2020-36788.html * https://www.suse.com/security/cve/CVE-2021-4148.html * https://www.suse.com/security/cve/CVE-2021-47358.html * https://www.suse.com/security/cve/CVE-2021-47359.html * https://www.suse.com/security/cve/CVE-2021-47360.html * https://www.suse.com/security/cve/CVE-2021-47361.html * https://www.suse.com/security/cve/CVE-2021-47362.html * https://www.suse.com/security/cve/CVE-2021-47363.html * https://www.suse.com/security/cve/CVE-2021-47364.html * https://www.suse.com/security/cve/CVE-2021-47365.html * https://www.suse.com/security/cve/CVE-2021-47366.html * https://www.suse.com/security/cve/CVE-2021-47367.html * https://www.suse.com/security/cve/CVE-2021-47368.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47370.html * https://www.suse.com/security/cve/CVE-2021-47371.html * https://www.suse.com/security/cve/CVE-2021-47372.html * https://www.suse.com/security/cve/CVE-2021-47373.html * https://www.suse.com/security/cve/CVE-2021-47374.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47376.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47379.html * https://www.suse.com/security/cve/CVE-2021-47380.html * https://www.suse.com/security/cve/CVE-2021-47381.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47384.html * https://www.suse.com/security/cve/CVE-2021-47385.html * https://www.suse.com/security/cve/CVE-2021-47386.html * https://www.suse.com/security/cve/CVE-2021-47387.html * https://www.suse.com/security/cve/CVE-2021-47388.html * https://www.suse.com/security/cve/CVE-2021-47389.html * https://www.suse.com/security/cve/CVE-2021-47390.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47392.html * https://www.suse.com/security/cve/CVE-2021-47393.html * https://www.suse.com/security/cve/CVE-2021-47394.html * https://www.suse.com/security/cve/CVE-2021-47395.html * https://www.suse.com/security/cve/CVE-2021-47396.html * https://www.suse.com/security/cve/CVE-2021-47397.html * https://www.suse.com/security/cve/CVE-2021-47398.html * https://www.suse.com/security/cve/CVE-2021-47399.html * https://www.suse.com/security/cve/CVE-2021-47400.html * https://www.suse.com/security/cve/CVE-2021-47401.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47403.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47405.html * https://www.suse.com/security/cve/CVE-2021-47406.html * https://www.suse.com/security/cve/CVE-2021-47407.html * https://www.suse.com/security/cve/CVE-2021-47408.html * https://www.suse.com/security/cve/CVE-2021-47409.html * https://www.suse.com/security/cve/CVE-2021-47410.html * https://www.suse.com/security/cve/CVE-2021-47412.html * https://www.suse.com/security/cve/CVE-2021-47413.html * https://www.suse.com/security/cve/CVE-2021-47414.html * https://www.suse.com/security/cve/CVE-2021-47415.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47417.html * https://www.suse.com/security/cve/CVE-2021-47418.html * https://www.suse.com/security/cve/CVE-2021-47419.html * https://www.suse.com/security/cve/CVE-2021-47420.html * https://www.suse.com/security/cve/CVE-2021-47421.html * https://www.suse.com/security/cve/CVE-2021-47422.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47425.html * https://www.suse.com/security/cve/CVE-2021-47426.html * https://www.suse.com/security/cve/CVE-2021-47427.html * https://www.suse.com/security/cve/CVE-2021-47428.html * https://www.suse.com/security/cve/CVE-2021-47429.html * https://www.suse.com/security/cve/CVE-2021-47430.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47433.html * https://www.suse.com/security/cve/CVE-2021-47434.html * https://www.suse.com/security/cve/CVE-2021-47435.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47437.html * https://www.suse.com/security/cve/CVE-2021-47438.html * https://www.suse.com/security/cve/CVE-2021-47439.html * https://www.suse.com/security/cve/CVE-2021-47440.html * https://www.suse.com/security/cve/CVE-2021-47441.html * https://www.suse.com/security/cve/CVE-2021-47442.html * https://www.suse.com/security/cve/CVE-2021-47443.html * https://www.suse.com/security/cve/CVE-2021-47444.html * https://www.suse.com/security/cve/CVE-2021-47445.html * https://www.suse.com/security/cve/CVE-2021-47446.html * https://www.suse.com/security/cve/CVE-2021-47447.html * https://www.suse.com/security/cve/CVE-2021-47448.html * https://www.suse.com/security/cve/CVE-2021-47449.html * https://www.suse.com/security/cve/CVE-2021-47450.html * https://www.suse.com/security/cve/CVE-2021-47451.html * https://www.suse.com/security/cve/CVE-2021-47452.html * https://www.suse.com/security/cve/CVE-2021-47453.html * https://www.suse.com/security/cve/CVE-2021-47454.html * https://www.suse.com/security/cve/CVE-2021-47455.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47457.html * https://www.suse.com/security/cve/CVE-2021-47458.html * https://www.suse.com/security/cve/CVE-2021-47459.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47461.html * https://www.suse.com/security/cve/CVE-2021-47462.html * https://www.suse.com/security/cve/CVE-2021-47463.html * https://www.suse.com/security/cve/CVE-2021-47464.html * https://www.suse.com/security/cve/CVE-2021-47465.html * https://www.suse.com/security/cve/CVE-2021-47466.html * https://www.suse.com/security/cve/CVE-2021-47467.html * https://www.suse.com/security/cve/CVE-2021-47468.html * https://www.suse.com/security/cve/CVE-2021-47469.html * https://www.suse.com/security/cve/CVE-2021-47470.html * https://www.suse.com/security/cve/CVE-2021-47471.html * https://www.suse.com/security/cve/CVE-2021-47472.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47474.html * https://www.suse.com/security/cve/CVE-2021-47475.html * https://www.suse.com/security/cve/CVE-2021-47476.html * https://www.suse.com/security/cve/CVE-2021-47477.html * https://www.suse.com/security/cve/CVE-2021-47478.html * https://www.suse.com/security/cve/CVE-2021-47479.html * https://www.suse.com/security/cve/CVE-2021-47480.html * https://www.suse.com/security/cve/CVE-2021-47481.html * https://www.suse.com/security/cve/CVE-2021-47482.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47484.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47486.html * https://www.suse.com/security/cve/CVE-2021-47488.html * https://www.suse.com/security/cve/CVE-2021-47489.html * https://www.suse.com/security/cve/CVE-2021-47490.html * https://www.suse.com/security/cve/CVE-2021-47491.html * https://www.suse.com/security/cve/CVE-2021-47492.html * https://www.suse.com/security/cve/CVE-2021-47493.html * https://www.suse.com/security/cve/CVE-2021-47494.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47498.html * https://www.suse.com/security/cve/CVE-2021-47499.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47501.html * https://www.suse.com/security/cve/CVE-2021-47502.html * https://www.suse.com/security/cve/CVE-2021-47503.html * https://www.suse.com/security/cve/CVE-2021-47504.html * https://www.suse.com/security/cve/CVE-2021-47505.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47507.html * https://www.suse.com/security/cve/CVE-2021-47508.html * https://www.suse.com/security/cve/CVE-2021-47509.html * https://www.suse.com/security/cve/CVE-2021-47510.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47512.html * https://www.suse.com/security/cve/CVE-2021-47513.html * https://www.suse.com/security/cve/CVE-2021-47514.html * https://www.suse.com/security/cve/CVE-2021-47516.html * https://www.suse.com/security/cve/CVE-2021-47518.html * https://www.suse.com/security/cve/CVE-2021-47520.html * https://www.suse.com/security/cve/CVE-2021-47521.html * https://www.suse.com/security/cve/CVE-2021-47522.html * https://www.suse.com/security/cve/CVE-2021-47523.html * https://www.suse.com/security/cve/CVE-2021-47524.html * https://www.suse.com/security/cve/CVE-2021-47525.html * https://www.suse.com/security/cve/CVE-2021-47526.html * https://www.suse.com/security/cve/CVE-2021-47527.html * https://www.suse.com/security/cve/CVE-2021-47528.html * https://www.suse.com/security/cve/CVE-2021-47529.html * https://www.suse.com/security/cve/CVE-2021-47530.html * https://www.suse.com/security/cve/CVE-2021-47531.html * https://www.suse.com/security/cve/CVE-2021-47532.html * https://www.suse.com/security/cve/CVE-2021-47533.html * https://www.suse.com/security/cve/CVE-2021-47534.html * https://www.suse.com/security/cve/CVE-2021-47535.html * https://www.suse.com/security/cve/CVE-2021-47536.html * https://www.suse.com/security/cve/CVE-2021-47537.html * https://www.suse.com/security/cve/CVE-2021-47540.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47542.html * https://www.suse.com/security/cve/CVE-2021-47544.html * https://www.suse.com/security/cve/CVE-2021-47548.html * https://www.suse.com/security/cve/CVE-2021-47549.html * https://www.suse.com/security/cve/CVE-2021-47550.html * https://www.suse.com/security/cve/CVE-2021-47551.html * https://www.suse.com/security/cve/CVE-2021-47552.html * https://www.suse.com/security/cve/CVE-2021-47553.html * https://www.suse.com/security/cve/CVE-2021-47554.html * https://www.suse.com/security/cve/CVE-2021-47555.html * https://www.suse.com/security/cve/CVE-2021-47556.html * https://www.suse.com/security/cve/CVE-2021-47557.html * https://www.suse.com/security/cve/CVE-2021-47558.html * https://www.suse.com/security/cve/CVE-2021-47559.html * https://www.suse.com/security/cve/CVE-2021-47560.html * https://www.suse.com/security/cve/CVE-2021-47562.html * https://www.suse.com/security/cve/CVE-2021-47563.html * https://www.suse.com/security/cve/CVE-2021-47564.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2021-47569.html * https://www.suse.com/security/cve/CVE-2022-48633.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2022-48669.html * https://www.suse.com/security/cve/CVE-2022-48689.html * https://www.suse.com/security/cve/CVE-2022-48691.html * https://www.suse.com/security/cve/CVE-2022-48699.html * https://www.suse.com/security/cve/CVE-2022-48705.html * https://www.suse.com/security/cve/CVE-2022-48708.html * https://www.suse.com/security/cve/CVE-2022-48709.html * https://www.suse.com/security/cve/CVE-2022-48710.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-42755.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52586.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52618.html * https://www.suse.com/security/cve/CVE-2023-52642.html * https://www.suse.com/security/cve/CVE-2023-52643.html * https://www.suse.com/security/cve/CVE-2023-52644.html * https://www.suse.com/security/cve/CVE-2023-52646.html * https://www.suse.com/security/cve/CVE-2023-52650.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52656.html * https://www.suse.com/security/cve/CVE-2023-52657.html * https://www.suse.com/security/cve/CVE-2023-52659.html * https://www.suse.com/security/cve/CVE-2023-52660.html * https://www.suse.com/security/cve/CVE-2023-52661.html * https://www.suse.com/security/cve/CVE-2023-52662.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52669.html * https://www.suse.com/security/cve/CVE-2023-52671.html * https://www.suse.com/security/cve/CVE-2023-52674.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52678.html * https://www.suse.com/security/cve/CVE-2023-52679.html * https://www.suse.com/security/cve/CVE-2023-52680.html * https://www.suse.com/security/cve/CVE-2023-52683.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52692.html * https://www.suse.com/security/cve/CVE-2023-52693.html * https://www.suse.com/security/cve/CVE-2023-52694.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52698.html * https://www.suse.com/security/cve/CVE-2023-52699.html * https://www.suse.com/security/cve/CVE-2023-52702.html * https://www.suse.com/security/cve/CVE-2023-52703.html * https://www.suse.com/security/cve/CVE-2023-52705.html * https://www.suse.com/security/cve/CVE-2023-52707.html * https://www.suse.com/security/cve/CVE-2023-52708.html * https://www.suse.com/security/cve/CVE-2023-52730.html * https://www.suse.com/security/cve/CVE-2023-52731.html * https://www.suse.com/security/cve/CVE-2023-52732.html * https://www.suse.com/security/cve/CVE-2023-52733.html * https://www.suse.com/security/cve/CVE-2023-52736.html * https://www.suse.com/security/cve/CVE-2023-52738.html * https://www.suse.com/security/cve/CVE-2023-52739.html * https://www.suse.com/security/cve/CVE-2023-52740.html * https://www.suse.com/security/cve/CVE-2023-52741.html * https://www.suse.com/security/cve/CVE-2023-52742.html * https://www.suse.com/security/cve/CVE-2023-52743.html * https://www.suse.com/security/cve/CVE-2023-52744.html * https://www.suse.com/security/cve/CVE-2023-52745.html * https://www.suse.com/security/cve/CVE-2023-52746.html * https://www.suse.com/security/cve/CVE-2023-52747.html * https://www.suse.com/security/cve/CVE-2023-52753.html * https://www.suse.com/security/cve/CVE-2023-52754.html * https://www.suse.com/security/cve/CVE-2023-52756.html * https://www.suse.com/security/cve/CVE-2023-52757.html * https://www.suse.com/security/cve/CVE-2023-52759.html * https://www.suse.com/security/cve/CVE-2023-52763.html * https://www.suse.com/security/cve/CVE-2023-52764.html * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52773.html * https://www.suse.com/security/cve/CVE-2023-52774.html * https://www.suse.com/security/cve/CVE-2023-52777.html * https://www.suse.com/security/cve/CVE-2023-52781.html * https://www.suse.com/security/cve/CVE-2023-52788.html * https://www.suse.com/security/cve/CVE-2023-52789.html * https://www.suse.com/security/cve/CVE-2023-52791.html * https://www.suse.com/security/cve/CVE-2023-52795.html * https://www.suse.com/security/cve/CVE-2023-52796.html * https://www.suse.com/security/cve/CVE-2023-52798.html * https://www.suse.com/security/cve/CVE-2023-52799.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52803.html * https://www.suse.com/security/cve/CVE-2023-52804.html * https://www.suse.com/security/cve/CVE-2023-52805.html * https://www.suse.com/security/cve/CVE-2023-52806.html * https://www.suse.com/security/cve/CVE-2023-52807.html * https://www.suse.com/security/cve/CVE-2023-52808.html * https://www.suse.com/security/cve/CVE-2023-52809.html * https://www.suse.com/security/cve/CVE-2023-52810.html * https://www.suse.com/security/cve/CVE-2023-52811.html * https://www.suse.com/security/cve/CVE-2023-52814.html * https://www.suse.com/security/cve/CVE-2023-52815.html * https://www.suse.com/security/cve/CVE-2023-52816.html * https://www.suse.com/security/cve/CVE-2023-52817.html * https://www.suse.com/security/cve/CVE-2023-52818.html * https://www.suse.com/security/cve/CVE-2023-52819.html * https://www.suse.com/security/cve/CVE-2023-52821.html * https://www.suse.com/security/cve/CVE-2023-52825.html * https://www.suse.com/security/cve/CVE-2023-52826.html * https://www.suse.com/security/cve/CVE-2023-52832.html * https://www.suse.com/security/cve/CVE-2023-52833.html * https://www.suse.com/security/cve/CVE-2023-52834.html * https://www.suse.com/security/cve/CVE-2023-52838.html * https://www.suse.com/security/cve/CVE-2023-52840.html * https://www.suse.com/security/cve/CVE-2023-52841.html * https://www.suse.com/security/cve/CVE-2023-52844.html * https://www.suse.com/security/cve/CVE-2023-52847.html * https://www.suse.com/security/cve/CVE-2023-52851.html * https://www.suse.com/security/cve/CVE-2023-52853.html * https://www.suse.com/security/cve/CVE-2023-52854.html * https://www.suse.com/security/cve/CVE-2023-52855.html * https://www.suse.com/security/cve/CVE-2023-52856.html * https://www.suse.com/security/cve/CVE-2023-52858.html * https://www.suse.com/security/cve/CVE-2023-52860.html * https://www.suse.com/security/cve/CVE-2023-52861.html * https://www.suse.com/security/cve/CVE-2023-52864.html * https://www.suse.com/security/cve/CVE-2023-52865.html * https://www.suse.com/security/cve/CVE-2023-52867.html * https://www.suse.com/security/cve/CVE-2023-52868.html * https://www.suse.com/security/cve/CVE-2023-52870.html * https://www.suse.com/security/cve/CVE-2023-52871.html * https://www.suse.com/security/cve/CVE-2023-52872.html * https://www.suse.com/security/cve/CVE-2023-52873.html * https://www.suse.com/security/cve/CVE-2023-52875.html * https://www.suse.com/security/cve/CVE-2023-52876.html * https://www.suse.com/security/cve/CVE-2023-52877.html * https://www.suse.com/security/cve/CVE-2023-52878.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2024-2201.html * https://www.suse.com/security/cve/CVE-2024-26597.html * https://www.suse.com/security/cve/CVE-2024-26643.html * https://www.suse.com/security/cve/CVE-2024-26679.html * https://www.suse.com/security/cve/CVE-2024-26692.html * https://www.suse.com/security/cve/CVE-2024-26698.html * https://www.suse.com/security/cve/CVE-2024-26700.html * https://www.suse.com/security/cve/CVE-2024-26715.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26742.html * https://www.suse.com/security/cve/CVE-2024-26748.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26775.html * https://www.suse.com/security/cve/CVE-2024-26777.html * https://www.suse.com/security/cve/CVE-2024-26778.html * https://www.suse.com/security/cve/CVE-2024-26788.html * https://www.suse.com/security/cve/CVE-2024-26791.html * https://www.suse.com/security/cve/CVE-2024-26801.html * https://www.suse.com/security/cve/CVE-2024-26822.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26829.html * https://www.suse.com/security/cve/CVE-2024-26838.html * https://www.suse.com/security/cve/CVE-2024-26839.html * https://www.suse.com/security/cve/CVE-2024-26840.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26859.html * https://www.suse.com/security/cve/CVE-2024-26870.html * https://www.suse.com/security/cve/CVE-2024-26874.html * https://www.suse.com/security/cve/CVE-2024-26876.html * https://www.suse.com/security/cve/CVE-2024-26877.html * https://www.suse.com/security/cve/CVE-2024-26880.html * https://www.suse.com/security/cve/CVE-2024-26889.html * https://www.suse.com/security/cve/CVE-2024-26894.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26907.html * https://www.suse.com/security/cve/CVE-2024-26915.html * https://www.suse.com/security/cve/CVE-2024-26916.html * https://www.suse.com/security/cve/CVE-2024-26919.html * https://www.suse.com/security/cve/CVE-2024-26920.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26922.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26928.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-26931.html * https://www.suse.com/security/cve/CVE-2024-26933.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26935.html * https://www.suse.com/security/cve/CVE-2024-26937.html * https://www.suse.com/security/cve/CVE-2024-26938.html * https://www.suse.com/security/cve/CVE-2024-26939.html * https://www.suse.com/security/cve/CVE-2024-26940.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26958.html * https://www.suse.com/security/cve/CVE-2024-26964.html * https://www.suse.com/security/cve/CVE-2024-26974.html * https://www.suse.com/security/cve/CVE-2024-26977.html * https://www.suse.com/security/cve/CVE-2024-26979.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26988.html * https://www.suse.com/security/cve/CVE-2024-26989.html * https://www.suse.com/security/cve/CVE-2024-26994.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-26997.html * https://www.suse.com/security/cve/CVE-2024-26999.html * https://www.suse.com/security/cve/CVE-2024-27000.html * https://www.suse.com/security/cve/CVE-2024-27001.html * https://www.suse.com/security/cve/CVE-2024-27004.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27028.html * https://www.suse.com/security/cve/CVE-2024-27037.html * https://www.suse.com/security/cve/CVE-2024-27042.html * https://www.suse.com/security/cve/CVE-2024-27045.html * https://www.suse.com/security/cve/CVE-2024-27047.html * https://www.suse.com/security/cve/CVE-2024-27051.html * https://www.suse.com/security/cve/CVE-2024-27052.html * https://www.suse.com/security/cve/CVE-2024-27053.html * https://www.suse.com/security/cve/CVE-2024-27054.html * https://www.suse.com/security/cve/CVE-2024-27059.html * https://www.suse.com/security/cve/CVE-2024-27072.html * https://www.suse.com/security/cve/CVE-2024-27073.html * https://www.suse.com/security/cve/CVE-2024-27074.html * https://www.suse.com/security/cve/CVE-2024-27075.html * https://www.suse.com/security/cve/CVE-2024-27076.html * https://www.suse.com/security/cve/CVE-2024-27077.html * https://www.suse.com/security/cve/CVE-2024-27078.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27393.html * https://www.suse.com/security/cve/CVE-2024-27395.html * https://www.suse.com/security/cve/CVE-2024-27396.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27399.html * https://www.suse.com/security/cve/CVE-2024-27400.html * https://www.suse.com/security/cve/CVE-2024-27401.html * https://www.suse.com/security/cve/CVE-2024-27405.html * https://www.suse.com/security/cve/CVE-2024-27410.html * https://www.suse.com/security/cve/CVE-2024-27412.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-27416.html * https://www.suse.com/security/cve/CVE-2024-27417.html * https://www.suse.com/security/cve/CVE-2024-27419.html * https://www.suse.com/security/cve/CVE-2024-27431.html * https://www.suse.com/security/cve/CVE-2024-27435.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35791.html * https://www.suse.com/security/cve/CVE-2024-35796.html * https://www.suse.com/security/cve/CVE-2024-35799.html * https://www.suse.com/security/cve/CVE-2024-35801.html * https://www.suse.com/security/cve/CVE-2024-35804.html * https://www.suse.com/security/cve/CVE-2024-35806.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35812.html * https://www.suse.com/security/cve/CVE-2024-35813.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35821.html * https://www.suse.com/security/cve/CVE-2024-35822.html * https://www.suse.com/security/cve/CVE-2024-35823.html * https://www.suse.com/security/cve/CVE-2024-35825.html * https://www.suse.com/security/cve/CVE-2024-35828.html * https://www.suse.com/security/cve/CVE-2024-35829.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35833.html * https://www.suse.com/security/cve/CVE-2024-35845.html * https://www.suse.com/security/cve/CVE-2024-35847.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35851.html * https://www.suse.com/security/cve/CVE-2024-35852.html * https://www.suse.com/security/cve/CVE-2024-35854.html * https://www.suse.com/security/cve/CVE-2024-35860.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35865.html * https://www.suse.com/security/cve/CVE-2024-35866.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35868.html * https://www.suse.com/security/cve/CVE-2024-35869.html * https://www.suse.com/security/cve/CVE-2024-35870.html * https://www.suse.com/security/cve/CVE-2024-35872.html * https://www.suse.com/security/cve/CVE-2024-35875.html * https://www.suse.com/security/cve/CVE-2024-35877.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35879.html * https://www.suse.com/security/cve/CVE-2024-35885.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35901.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35907.html * https://www.suse.com/security/cve/CVE-2024-35912.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35915.html * https://www.suse.com/security/cve/CVE-2024-35922.html * https://www.suse.com/security/cve/CVE-2024-35924.html * https://www.suse.com/security/cve/CVE-2024-35930.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35933.html * https://www.suse.com/security/cve/CVE-2024-35935.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35938.html * https://www.suse.com/security/cve/CVE-2024-35939.html * https://www.suse.com/security/cve/CVE-2024-35940.html * https://www.suse.com/security/cve/CVE-2024-35943.html * https://www.suse.com/security/cve/CVE-2024-35944.html * https://www.suse.com/security/cve/CVE-2024-35947.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-35951.html * https://www.suse.com/security/cve/CVE-2024-35952.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35959.html * https://www.suse.com/security/cve/CVE-2024-35963.html * https://www.suse.com/security/cve/CVE-2024-35964.html * https://www.suse.com/security/cve/CVE-2024-35965.html * https://www.suse.com/security/cve/CVE-2024-35966.html * https://www.suse.com/security/cve/CVE-2024-35967.html * https://www.suse.com/security/cve/CVE-2024-35969.html * https://www.suse.com/security/cve/CVE-2024-35973.html * https://www.suse.com/security/cve/CVE-2024-35976.html * https://www.suse.com/security/cve/CVE-2024-35978.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-35989.html * https://www.suse.com/security/cve/CVE-2024-35990.html * https://www.suse.com/security/cve/CVE-2024-35998.html * https://www.suse.com/security/cve/CVE-2024-35999.html * https://www.suse.com/security/cve/CVE-2024-36006.html * https://www.suse.com/security/cve/CVE-2024-36007.html * https://www.suse.com/security/cve/CVE-2024-36012.html * https://www.suse.com/security/cve/CVE-2024-36014.html * https://www.suse.com/security/cve/CVE-2024-36015.html * https://www.suse.com/security/cve/CVE-2024-36016.html * https://www.suse.com/security/cve/CVE-2024-36026.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36032.html * https://www.suse.com/security/cve/CVE-2024-36880.html * https://www.suse.com/security/cve/CVE-2024-36893.html * https://www.suse.com/security/cve/CVE-2024-36896.html * https://www.suse.com/security/cve/CVE-2024-36897.html * https://www.suse.com/security/cve/CVE-2024-36906.html * https://www.suse.com/security/cve/CVE-2024-36918.html * https://www.suse.com/security/cve/CVE-2024-36924.html * https://www.suse.com/security/cve/CVE-2024-36926.html * https://www.suse.com/security/cve/CVE-2024-36928.html * https://www.suse.com/security/cve/CVE-2024-36931.html * https://www.suse.com/security/cve/CVE-2024-36938.html * https://www.suse.com/security/cve/CVE-2024-36940.html * https://www.suse.com/security/cve/CVE-2024-36941.html * https://www.suse.com/security/cve/CVE-2024-36942.html * https://www.suse.com/security/cve/CVE-2024-36944.html * https://www.suse.com/security/cve/CVE-2024-36947.html * https://www.suse.com/security/cve/CVE-2024-36950.html * https://www.suse.com/security/cve/CVE-2024-36952.html * https://www.suse.com/security/cve/CVE-2024-36955.html * https://www.suse.com/security/cve/CVE-2024-36959.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1174585 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1187716 * https://bugzilla.suse.com/show_bug.cgi?id=1190569 * https://bugzilla.suse.com/show_bug.cgi?id=1191949 * https://bugzilla.suse.com/show_bug.cgi?id=1192107 * https://bugzilla.suse.com/show_bug.cgi?id=1193983 * https://bugzilla.suse.com/show_bug.cgi?id=1194288 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1196956 * https://bugzilla.suse.com/show_bug.cgi?id=1197915 * https://bugzilla.suse.com/show_bug.cgi?id=1200465 * https://bugzilla.suse.com/show_bug.cgi?id=1205205 * https://bugzilla.suse.com/show_bug.cgi?id=1207284 * https://bugzilla.suse.com/show_bug.cgi?id=1207361 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1208149 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1209799 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1209980 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1213863 * https://bugzilla.suse.com/show_bug.cgi?id=1214852 * https://bugzilla.suse.com/show_bug.cgi?id=1215322 * https://bugzilla.suse.com/show_bug.cgi?id=1215702 * https://bugzilla.suse.com/show_bug.cgi?id=1216358 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217339 * https://bugzilla.suse.com/show_bug.cgi?id=1217515 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1220021 * https://bugzilla.suse.com/show_bug.cgi?id=1220267 * https://bugzilla.suse.com/show_bug.cgi?id=1220363 * https://bugzilla.suse.com/show_bug.cgi?id=1220783 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221081 * https://bugzilla.suse.com/show_bug.cgi?id=1221615 * https://bugzilla.suse.com/show_bug.cgi?id=1221777 * https://bugzilla.suse.com/show_bug.cgi?id=1221816 * https://bugzilla.suse.com/show_bug.cgi?id=1221829 * https://bugzilla.suse.com/show_bug.cgi?id=1222011 * https://bugzilla.suse.com/show_bug.cgi?id=1222374 * https://bugzilla.suse.com/show_bug.cgi?id=1222385 * https://bugzilla.suse.com/show_bug.cgi?id=1222413 * https://bugzilla.suse.com/show_bug.cgi?id=1222464 * https://bugzilla.suse.com/show_bug.cgi?id=1222513 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222561 * https://bugzilla.suse.com/show_bug.cgi?id=1222608 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222627 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222765 * https://bugzilla.suse.com/show_bug.cgi?id=1222770 * https://bugzilla.suse.com/show_bug.cgi?id=1222783 * https://bugzilla.suse.com/show_bug.cgi?id=1222793 * https://bugzilla.suse.com/show_bug.cgi?id=1222870 * https://bugzilla.suse.com/show_bug.cgi?id=1222893 * https://bugzilla.suse.com/show_bug.cgi?id=1222960 * https://bugzilla.suse.com/show_bug.cgi?id=1222961 * https://bugzilla.suse.com/show_bug.cgi?id=1222974 * https://bugzilla.suse.com/show_bug.cgi?id=1222975 * https://bugzilla.suse.com/show_bug.cgi?id=1222976 * https://bugzilla.suse.com/show_bug.cgi?id=1223011 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223027 * https://bugzilla.suse.com/show_bug.cgi?id=1223031 * https://bugzilla.suse.com/show_bug.cgi?id=1223043 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223048 * https://bugzilla.suse.com/show_bug.cgi?id=1223049 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223113 * https://bugzilla.suse.com/show_bug.cgi?id=1223119 * https://bugzilla.suse.com/show_bug.cgi?id=1223137 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223140 * https://bugzilla.suse.com/show_bug.cgi?id=1223188 * https://bugzilla.suse.com/show_bug.cgi?id=1223203 * https://bugzilla.suse.com/show_bug.cgi?id=1223207 * https://bugzilla.suse.com/show_bug.cgi?id=1223315 * https://bugzilla.suse.com/show_bug.cgi?id=1223360 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223432 * https://bugzilla.suse.com/show_bug.cgi?id=1223489 * https://bugzilla.suse.com/show_bug.cgi?id=1223505 * https://bugzilla.suse.com/show_bug.cgi?id=1223532 * https://bugzilla.suse.com/show_bug.cgi?id=1223575 * https://bugzilla.suse.com/show_bug.cgi?id=1223595 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223627 * https://bugzilla.suse.com/show_bug.cgi?id=1223628 * https://bugzilla.suse.com/show_bug.cgi?id=1223631 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223638 * https://bugzilla.suse.com/show_bug.cgi?id=1223650 * https://bugzilla.suse.com/show_bug.cgi?id=1223653 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223670 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1223677 * https://bugzilla.suse.com/show_bug.cgi?id=1223678 * https://bugzilla.suse.com/show_bug.cgi?id=1223679 * https://bugzilla.suse.com/show_bug.cgi?id=1223698 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223717 * https://bugzilla.suse.com/show_bug.cgi?id=1223718 * https://bugzilla.suse.com/show_bug.cgi?id=1223737 * https://bugzilla.suse.com/show_bug.cgi?id=1223738 * https://bugzilla.suse.com/show_bug.cgi?id=1223741 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223747 * https://bugzilla.suse.com/show_bug.cgi?id=1223748 * https://bugzilla.suse.com/show_bug.cgi?id=1223750 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223754 * https://bugzilla.suse.com/show_bug.cgi?id=1223756 * https://bugzilla.suse.com/show_bug.cgi?id=1223757 * https://bugzilla.suse.com/show_bug.cgi?id=1223762 * https://bugzilla.suse.com/show_bug.cgi?id=1223769 * https://bugzilla.suse.com/show_bug.cgi?id=1223770 * https://bugzilla.suse.com/show_bug.cgi?id=1223779 * https://bugzilla.suse.com/show_bug.cgi?id=1223780 * https://bugzilla.suse.com/show_bug.cgi?id=1223781 * https://bugzilla.suse.com/show_bug.cgi?id=1223788 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223819 * https://bugzilla.suse.com/show_bug.cgi?id=1223823 * https://bugzilla.suse.com/show_bug.cgi?id=1223826 * https://bugzilla.suse.com/show_bug.cgi?id=1223828 * https://bugzilla.suse.com/show_bug.cgi?id=1223829 * https://bugzilla.suse.com/show_bug.cgi?id=1223837 * https://bugzilla.suse.com/show_bug.cgi?id=1223842 * https://bugzilla.suse.com/show_bug.cgi?id=1223843 * https://bugzilla.suse.com/show_bug.cgi?id=1223844 * https://bugzilla.suse.com/show_bug.cgi?id=1223847 * https://bugzilla.suse.com/show_bug.cgi?id=1223858 * https://bugzilla.suse.com/show_bug.cgi?id=1223875 * https://bugzilla.suse.com/show_bug.cgi?id=1223879 * https://bugzilla.suse.com/show_bug.cgi?id=1223895 * https://bugzilla.suse.com/show_bug.cgi?id=1223959 * https://bugzilla.suse.com/show_bug.cgi?id=1223961 * https://bugzilla.suse.com/show_bug.cgi?id=1223991 * https://bugzilla.suse.com/show_bug.cgi?id=1223996 * https://bugzilla.suse.com/show_bug.cgi?id=1224020 * https://bugzilla.suse.com/show_bug.cgi?id=1224076 * https://bugzilla.suse.com/show_bug.cgi?id=1224096 * https://bugzilla.suse.com/show_bug.cgi?id=1224098 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224137 * https://bugzilla.suse.com/show_bug.cgi?id=1224166 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224177 * https://bugzilla.suse.com/show_bug.cgi?id=1224180 * https://bugzilla.suse.com/show_bug.cgi?id=1224181 * https://bugzilla.suse.com/show_bug.cgi?id=1224187 * https://bugzilla.suse.com/show_bug.cgi?id=1224331 * https://bugzilla.suse.com/show_bug.cgi?id=1224346 * https://bugzilla.suse.com/show_bug.cgi?id=1224423 * https://bugzilla.suse.com/show_bug.cgi?id=1224432 * https://bugzilla.suse.com/show_bug.cgi?id=1224437 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224442 * https://bugzilla.suse.com/show_bug.cgi?id=1224443 * https://bugzilla.suse.com/show_bug.cgi?id=1224445 * https://bugzilla.suse.com/show_bug.cgi?id=1224449 * https://bugzilla.suse.com/show_bug.cgi?id=1224479 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224487 * https://bugzilla.suse.com/show_bug.cgi?id=1224488 * https://bugzilla.suse.com/show_bug.cgi?id=1224492 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224495 * https://bugzilla.suse.com/show_bug.cgi?id=1224502 * https://bugzilla.suse.com/show_bug.cgi?id=1224508 * https://bugzilla.suse.com/show_bug.cgi?id=1224509 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224519 * https://bugzilla.suse.com/show_bug.cgi?id=1224524 * https://bugzilla.suse.com/show_bug.cgi?id=1224525 * https://bugzilla.suse.com/show_bug.cgi?id=1224530 * https://bugzilla.suse.com/show_bug.cgi?id=1224531 * https://bugzilla.suse.com/show_bug.cgi?id=1224534 * https://bugzilla.suse.com/show_bug.cgi?id=1224535 * https://bugzilla.suse.com/show_bug.cgi?id=1224537 * https://bugzilla.suse.com/show_bug.cgi?id=1224541 * https://bugzilla.suse.com/show_bug.cgi?id=1224543 * https://bugzilla.suse.com/show_bug.cgi?id=1224549 * https://bugzilla.suse.com/show_bug.cgi?id=1224550 * https://bugzilla.suse.com/show_bug.cgi?id=1224558 * https://bugzilla.suse.com/show_bug.cgi?id=1224559 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224567 * https://bugzilla.suse.com/show_bug.cgi?id=1224571 * https://bugzilla.suse.com/show_bug.cgi?id=1224575 * https://bugzilla.suse.com/show_bug.cgi?id=1224576 * https://bugzilla.suse.com/show_bug.cgi?id=1224579 * https://bugzilla.suse.com/show_bug.cgi?id=1224580 * https://bugzilla.suse.com/show_bug.cgi?id=1224581 * https://bugzilla.suse.com/show_bug.cgi?id=1224582 * https://bugzilla.suse.com/show_bug.cgi?id=1224586 * https://bugzilla.suse.com/show_bug.cgi?id=1224587 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224598 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224608 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224615 * https://bugzilla.suse.com/show_bug.cgi?id=1224617 * https://bugzilla.suse.com/show_bug.cgi?id=1224618 * https://bugzilla.suse.com/show_bug.cgi?id=1224621 * https://bugzilla.suse.com/show_bug.cgi?id=1224622 * https://bugzilla.suse.com/show_bug.cgi?id=1224624 * https://bugzilla.suse.com/show_bug.cgi?id=1224627 * https://bugzilla.suse.com/show_bug.cgi?id=1224628 * https://bugzilla.suse.com/show_bug.cgi?id=1224629 * https://bugzilla.suse.com/show_bug.cgi?id=1224632 * https://bugzilla.suse.com/show_bug.cgi?id=1224636 * https://bugzilla.suse.com/show_bug.cgi?id=1224637 * https://bugzilla.suse.com/show_bug.cgi?id=1224638 * https://bugzilla.suse.com/show_bug.cgi?id=1224640 * https://bugzilla.suse.com/show_bug.cgi?id=1224643 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224645 * https://bugzilla.suse.com/show_bug.cgi?id=1224647 * https://bugzilla.suse.com/show_bug.cgi?id=1224648 * https://bugzilla.suse.com/show_bug.cgi?id=1224649 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224651 * https://bugzilla.suse.com/show_bug.cgi?id=1224657 * https://bugzilla.suse.com/show_bug.cgi?id=1224659 * https://bugzilla.suse.com/show_bug.cgi?id=1224660 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224664 * https://bugzilla.suse.com/show_bug.cgi?id=1224665 * https://bugzilla.suse.com/show_bug.cgi?id=1224666 * https://bugzilla.suse.com/show_bug.cgi?id=1224667 * https://bugzilla.suse.com/show_bug.cgi?id=1224668 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224672 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224678 * https://bugzilla.suse.com/show_bug.cgi?id=1224679 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224681 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224686 * https://bugzilla.suse.com/show_bug.cgi?id=1224692 * https://bugzilla.suse.com/show_bug.cgi?id=1224697 * https://bugzilla.suse.com/show_bug.cgi?id=1224699 * https://bugzilla.suse.com/show_bug.cgi?id=1224701 * https://bugzilla.suse.com/show_bug.cgi?id=1224703 * https://bugzilla.suse.com/show_bug.cgi?id=1224705 * https://bugzilla.suse.com/show_bug.cgi?id=1224707 * https://bugzilla.suse.com/show_bug.cgi?id=1224717 * https://bugzilla.suse.com/show_bug.cgi?id=1224718 * https://bugzilla.suse.com/show_bug.cgi?id=1224721 * https://bugzilla.suse.com/show_bug.cgi?id=1224722 * https://bugzilla.suse.com/show_bug.cgi?id=1224723 * https://bugzilla.suse.com/show_bug.cgi?id=1224725 * https://bugzilla.suse.com/show_bug.cgi?id=1224727 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224729 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224731 * https://bugzilla.suse.com/show_bug.cgi?id=1224732 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224739 * https://bugzilla.suse.com/show_bug.cgi?id=1224740 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224759 * https://bugzilla.suse.com/show_bug.cgi?id=1224763 * https://bugzilla.suse.com/show_bug.cgi?id=1224764 * https://bugzilla.suse.com/show_bug.cgi?id=1224765 * https://bugzilla.suse.com/show_bug.cgi?id=1224766 * https://bugzilla.suse.com/show_bug.cgi?id=1224794 * https://bugzilla.suse.com/show_bug.cgi?id=1224795 * https://bugzilla.suse.com/show_bug.cgi?id=1224796 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224816 * https://bugzilla.suse.com/show_bug.cgi?id=1224895 * https://bugzilla.suse.com/show_bug.cgi?id=1224898 * https://bugzilla.suse.com/show_bug.cgi?id=1224900 * https://bugzilla.suse.com/show_bug.cgi?id=1224901 * https://bugzilla.suse.com/show_bug.cgi?id=1224902 * https://bugzilla.suse.com/show_bug.cgi?id=1224903 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224905 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224909 * https://bugzilla.suse.com/show_bug.cgi?id=1224910 * https://bugzilla.suse.com/show_bug.cgi?id=1224911 * https://bugzilla.suse.com/show_bug.cgi?id=1224912 * https://bugzilla.suse.com/show_bug.cgi?id=1224913 * https://bugzilla.suse.com/show_bug.cgi?id=1224914 * https://bugzilla.suse.com/show_bug.cgi?id=1224915 * https://bugzilla.suse.com/show_bug.cgi?id=1224920 * https://bugzilla.suse.com/show_bug.cgi?id=1224928 * https://bugzilla.suse.com/show_bug.cgi?id=1224929 * https://bugzilla.suse.com/show_bug.cgi?id=1224930 * https://bugzilla.suse.com/show_bug.cgi?id=1224931 * https://bugzilla.suse.com/show_bug.cgi?id=1224932 * https://bugzilla.suse.com/show_bug.cgi?id=1224936 * https://bugzilla.suse.com/show_bug.cgi?id=1224937 * https://bugzilla.suse.com/show_bug.cgi?id=1224941 * https://bugzilla.suse.com/show_bug.cgi?id=1224942 * https://bugzilla.suse.com/show_bug.cgi?id=1224944 * https://bugzilla.suse.com/show_bug.cgi?id=1224945 * https://bugzilla.suse.com/show_bug.cgi?id=1224947 * https://bugzilla.suse.com/show_bug.cgi?id=1224956 * https://bugzilla.suse.com/show_bug.cgi?id=1224988 * https://bugzilla.suse.com/show_bug.cgi?id=1224992 * https://bugzilla.suse.com/show_bug.cgi?id=1225000 * https://bugzilla.suse.com/show_bug.cgi?id=1225003 * https://bugzilla.suse.com/show_bug.cgi?id=1225005 * https://bugzilla.suse.com/show_bug.cgi?id=1225008 * https://bugzilla.suse.com/show_bug.cgi?id=1225009 * https://bugzilla.suse.com/show_bug.cgi?id=1225022 * https://bugzilla.suse.com/show_bug.cgi?id=1225031 * https://bugzilla.suse.com/show_bug.cgi?id=1225032 * https://bugzilla.suse.com/show_bug.cgi?id=1225036 * https://bugzilla.suse.com/show_bug.cgi?id=1225041 * https://bugzilla.suse.com/show_bug.cgi?id=1225044 * https://bugzilla.suse.com/show_bug.cgi?id=1225053 * https://bugzilla.suse.com/show_bug.cgi?id=1225076 * https://bugzilla.suse.com/show_bug.cgi?id=1225077 * https://bugzilla.suse.com/show_bug.cgi?id=1225082 * https://bugzilla.suse.com/show_bug.cgi?id=1225085 * https://bugzilla.suse.com/show_bug.cgi?id=1225086 * https://bugzilla.suse.com/show_bug.cgi?id=1225092 * https://bugzilla.suse.com/show_bug.cgi?id=1225095 * https://bugzilla.suse.com/show_bug.cgi?id=1225096 * https://bugzilla.suse.com/show_bug.cgi?id=1225097 * https://bugzilla.suse.com/show_bug.cgi?id=1225106 * https://bugzilla.suse.com/show_bug.cgi?id=1225108 * https://bugzilla.suse.com/show_bug.cgi?id=1225109 * https://bugzilla.suse.com/show_bug.cgi?id=1225114 * https://bugzilla.suse.com/show_bug.cgi?id=1225118 * https://bugzilla.suse.com/show_bug.cgi?id=1225121 * https://bugzilla.suse.com/show_bug.cgi?id=1225122 * https://bugzilla.suse.com/show_bug.cgi?id=1225123 * https://bugzilla.suse.com/show_bug.cgi?id=1225125 * https://bugzilla.suse.com/show_bug.cgi?id=1225126 * https://bugzilla.suse.com/show_bug.cgi?id=1225127 * https://bugzilla.suse.com/show_bug.cgi?id=1225129 * https://bugzilla.suse.com/show_bug.cgi?id=1225131 * https://bugzilla.suse.com/show_bug.cgi?id=1225132 * https://bugzilla.suse.com/show_bug.cgi?id=1225138 * https://bugzilla.suse.com/show_bug.cgi?id=1225139 * https://bugzilla.suse.com/show_bug.cgi?id=1225145 * https://bugzilla.suse.com/show_bug.cgi?id=1225151 * https://bugzilla.suse.com/show_bug.cgi?id=1225153 * https://bugzilla.suse.com/show_bug.cgi?id=1225156 * https://bugzilla.suse.com/show_bug.cgi?id=1225158 * https://bugzilla.suse.com/show_bug.cgi?id=1225160 * https://bugzilla.suse.com/show_bug.cgi?id=1225161 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225167 * https://bugzilla.suse.com/show_bug.cgi?id=1225180 * https://bugzilla.suse.com/show_bug.cgi?id=1225183 * https://bugzilla.suse.com/show_bug.cgi?id=1225184 * https://bugzilla.suse.com/show_bug.cgi?id=1225186 * https://bugzilla.suse.com/show_bug.cgi?id=1225187 * https://bugzilla.suse.com/show_bug.cgi?id=1225189 * https://bugzilla.suse.com/show_bug.cgi?id=1225190 * https://bugzilla.suse.com/show_bug.cgi?id=1225191 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225195 * https://bugzilla.suse.com/show_bug.cgi?id=1225198 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225203 * https://bugzilla.suse.com/show_bug.cgi?id=1225205 * https://bugzilla.suse.com/show_bug.cgi?id=1225206 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225209 * https://bugzilla.suse.com/show_bug.cgi?id=1225210 * https://bugzilla.suse.com/show_bug.cgi?id=1225214 * https://bugzilla.suse.com/show_bug.cgi?id=1225222 * https://bugzilla.suse.com/show_bug.cgi?id=1225223 * https://bugzilla.suse.com/show_bug.cgi?id=1225224 * https://bugzilla.suse.com/show_bug.cgi?id=1225225 * https://bugzilla.suse.com/show_bug.cgi?id=1225227 * https://bugzilla.suse.com/show_bug.cgi?id=1225228 * https://bugzilla.suse.com/show_bug.cgi?id=1225229 * https://bugzilla.suse.com/show_bug.cgi?id=1225230 * https://bugzilla.suse.com/show_bug.cgi?id=1225232 * https://bugzilla.suse.com/show_bug.cgi?id=1225233 * https://bugzilla.suse.com/show_bug.cgi?id=1225235 * https://bugzilla.suse.com/show_bug.cgi?id=1225236 * https://bugzilla.suse.com/show_bug.cgi?id=1225237 * https://bugzilla.suse.com/show_bug.cgi?id=1225238 * https://bugzilla.suse.com/show_bug.cgi?id=1225239 * https://bugzilla.suse.com/show_bug.cgi?id=1225240 * https://bugzilla.suse.com/show_bug.cgi?id=1225241 * https://bugzilla.suse.com/show_bug.cgi?id=1225242 * https://bugzilla.suse.com/show_bug.cgi?id=1225243 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225245 * https://bugzilla.suse.com/show_bug.cgi?id=1225246 * https://bugzilla.suse.com/show_bug.cgi?id=1225247 * https://bugzilla.suse.com/show_bug.cgi?id=1225248 * https://bugzilla.suse.com/show_bug.cgi?id=1225249 * https://bugzilla.suse.com/show_bug.cgi?id=1225250 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225252 * https://bugzilla.suse.com/show_bug.cgi?id=1225253 * https://bugzilla.suse.com/show_bug.cgi?id=1225254 * https://bugzilla.suse.com/show_bug.cgi?id=1225255 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225257 * https://bugzilla.suse.com/show_bug.cgi?id=1225258 * https://bugzilla.suse.com/show_bug.cgi?id=1225259 * https://bugzilla.suse.com/show_bug.cgi?id=1225260 * https://bugzilla.suse.com/show_bug.cgi?id=1225261 * https://bugzilla.suse.com/show_bug.cgi?id=1225262 * https://bugzilla.suse.com/show_bug.cgi?id=1225263 * https://bugzilla.suse.com/show_bug.cgi?id=1225268 * https://bugzilla.suse.com/show_bug.cgi?id=1225301 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225304 * https://bugzilla.suse.com/show_bug.cgi?id=1225306 * https://bugzilla.suse.com/show_bug.cgi?id=1225316 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225320 * https://bugzilla.suse.com/show_bug.cgi?id=1225321 * https://bugzilla.suse.com/show_bug.cgi?id=1225322 * https://bugzilla.suse.com/show_bug.cgi?id=1225323 * https://bugzilla.suse.com/show_bug.cgi?id=1225326 * https://bugzilla.suse.com/show_bug.cgi?id=1225327 * https://bugzilla.suse.com/show_bug.cgi?id=1225328 * https://bugzilla.suse.com/show_bug.cgi?id=1225329 * https://bugzilla.suse.com/show_bug.cgi?id=1225330 * https://bugzilla.suse.com/show_bug.cgi?id=1225331 * https://bugzilla.suse.com/show_bug.cgi?id=1225332 * https://bugzilla.suse.com/show_bug.cgi?id=1225333 * https://bugzilla.suse.com/show_bug.cgi?id=1225334 * https://bugzilla.suse.com/show_bug.cgi?id=1225335 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225337 * https://bugzilla.suse.com/show_bug.cgi?id=1225338 * https://bugzilla.suse.com/show_bug.cgi?id=1225339 * https://bugzilla.suse.com/show_bug.cgi?id=1225341 * https://bugzilla.suse.com/show_bug.cgi?id=1225342 * https://bugzilla.suse.com/show_bug.cgi?id=1225344 * https://bugzilla.suse.com/show_bug.cgi?id=1225346 * https://bugzilla.suse.com/show_bug.cgi?id=1225347 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225353 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225357 * https://bugzilla.suse.com/show_bug.cgi?id=1225358 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225361 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225368 * https://bugzilla.suse.com/show_bug.cgi?id=1225369 * https://bugzilla.suse.com/show_bug.cgi?id=1225370 * https://bugzilla.suse.com/show_bug.cgi?id=1225372 * https://bugzilla.suse.com/show_bug.cgi?id=1225373 * https://bugzilla.suse.com/show_bug.cgi?id=1225374 * https://bugzilla.suse.com/show_bug.cgi?id=1225375 * https://bugzilla.suse.com/show_bug.cgi?id=1225376 * https://bugzilla.suse.com/show_bug.cgi?id=1225377 * https://bugzilla.suse.com/show_bug.cgi?id=1225379 * https://bugzilla.suse.com/show_bug.cgi?id=1225380 * https://bugzilla.suse.com/show_bug.cgi?id=1225382 * https://bugzilla.suse.com/show_bug.cgi?id=1225383 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225386 * https://bugzilla.suse.com/show_bug.cgi?id=1225387 * https://bugzilla.suse.com/show_bug.cgi?id=1225388 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225392 * https://bugzilla.suse.com/show_bug.cgi?id=1225393 * https://bugzilla.suse.com/show_bug.cgi?id=1225396 * https://bugzilla.suse.com/show_bug.cgi?id=1225400 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225405 * https://bugzilla.suse.com/show_bug.cgi?id=1225408 * https://bugzilla.suse.com/show_bug.cgi?id=1225409 * https://bugzilla.suse.com/show_bug.cgi?id=1225410 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225424 * https://bugzilla.suse.com/show_bug.cgi?id=1225425 * https://bugzilla.suse.com/show_bug.cgi?id=1225427 * https://bugzilla.suse.com/show_bug.cgi?id=1225431 * https://bugzilla.suse.com/show_bug.cgi?id=1225435 * https://bugzilla.suse.com/show_bug.cgi?id=1225436 * https://bugzilla.suse.com/show_bug.cgi?id=1225437 * https://bugzilla.suse.com/show_bug.cgi?id=1225438 * https://bugzilla.suse.com/show_bug.cgi?id=1225439 * https://bugzilla.suse.com/show_bug.cgi?id=1225441 * https://bugzilla.suse.com/show_bug.cgi?id=1225442 * https://bugzilla.suse.com/show_bug.cgi?id=1225443 * https://bugzilla.suse.com/show_bug.cgi?id=1225444 * https://bugzilla.suse.com/show_bug.cgi?id=1225445 * https://bugzilla.suse.com/show_bug.cgi?id=1225446 * https://bugzilla.suse.com/show_bug.cgi?id=1225447 * https://bugzilla.suse.com/show_bug.cgi?id=1225450 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225455 * https://bugzilla.suse.com/show_bug.cgi?id=1225461 * https://bugzilla.suse.com/show_bug.cgi?id=1225463 * https://bugzilla.suse.com/show_bug.cgi?id=1225464 * https://bugzilla.suse.com/show_bug.cgi?id=1225466 * https://bugzilla.suse.com/show_bug.cgi?id=1225467 * https://bugzilla.suse.com/show_bug.cgi?id=1225468 * https://bugzilla.suse.com/show_bug.cgi?id=1225471 * https://bugzilla.suse.com/show_bug.cgi?id=1225472 * https://bugzilla.suse.com/show_bug.cgi?id=1225478 * https://bugzilla.suse.com/show_bug.cgi?id=1225479 * https://bugzilla.suse.com/show_bug.cgi?id=1225480 * https://bugzilla.suse.com/show_bug.cgi?id=1225482 * https://bugzilla.suse.com/show_bug.cgi?id=1225483 * https://bugzilla.suse.com/show_bug.cgi?id=1225486 * https://bugzilla.suse.com/show_bug.cgi?id=1225488 * https://bugzilla.suse.com/show_bug.cgi?id=1225490 * https://bugzilla.suse.com/show_bug.cgi?id=1225492 * https://bugzilla.suse.com/show_bug.cgi?id=1225495 * https://bugzilla.suse.com/show_bug.cgi?id=1225499 * https://bugzilla.suse.com/show_bug.cgi?id=1225500 * https://bugzilla.suse.com/show_bug.cgi?id=1225501 * https://bugzilla.suse.com/show_bug.cgi?id=1225502 * https://bugzilla.suse.com/show_bug.cgi?id=1225506 * https://bugzilla.suse.com/show_bug.cgi?id=1225508 * https://bugzilla.suse.com/show_bug.cgi?id=1225510 * https://bugzilla.suse.com/show_bug.cgi?id=1225513 * https://bugzilla.suse.com/show_bug.cgi?id=1225515 * https://bugzilla.suse.com/show_bug.cgi?id=1225529 * https://bugzilla.suse.com/show_bug.cgi?id=1225530 * https://bugzilla.suse.com/show_bug.cgi?id=1225532 * https://bugzilla.suse.com/show_bug.cgi?id=1225534 * https://bugzilla.suse.com/show_bug.cgi?id=1225535 * https://bugzilla.suse.com/show_bug.cgi?id=1225548 * https://bugzilla.suse.com/show_bug.cgi?id=1225549 * https://bugzilla.suse.com/show_bug.cgi?id=1225550 * https://bugzilla.suse.com/show_bug.cgi?id=1225553 * https://bugzilla.suse.com/show_bug.cgi?id=1225554 * https://bugzilla.suse.com/show_bug.cgi?id=1225555 * https://bugzilla.suse.com/show_bug.cgi?id=1225556 * https://bugzilla.suse.com/show_bug.cgi?id=1225557 * https://bugzilla.suse.com/show_bug.cgi?id=1225559 * https://bugzilla.suse.com/show_bug.cgi?id=1225560 * https://bugzilla.suse.com/show_bug.cgi?id=1225565 * https://bugzilla.suse.com/show_bug.cgi?id=1225566 * https://bugzilla.suse.com/show_bug.cgi?id=1225568 * https://bugzilla.suse.com/show_bug.cgi?id=1225569 * https://bugzilla.suse.com/show_bug.cgi?id=1225570 * https://bugzilla.suse.com/show_bug.cgi?id=1225571 * https://bugzilla.suse.com/show_bug.cgi?id=1225572 * https://bugzilla.suse.com/show_bug.cgi?id=1225577 * https://bugzilla.suse.com/show_bug.cgi?id=1225583 * https://bugzilla.suse.com/show_bug.cgi?id=1225584 * https://bugzilla.suse.com/show_bug.cgi?id=1225587 * https://bugzilla.suse.com/show_bug.cgi?id=1225588 * https://bugzilla.suse.com/show_bug.cgi?id=1225589 * https://bugzilla.suse.com/show_bug.cgi?id=1225590 * https://bugzilla.suse.com/show_bug.cgi?id=1225591 * https://bugzilla.suse.com/show_bug.cgi?id=1225592 * https://bugzilla.suse.com/show_bug.cgi?id=1225593 * https://bugzilla.suse.com/show_bug.cgi?id=1225595 * https://bugzilla.suse.com/show_bug.cgi?id=1225599 * https://bugzilla.suse.com/show_bug.cgi?id=1225616 * https://bugzilla.suse.com/show_bug.cgi?id=1225640 * https://bugzilla.suse.com/show_bug.cgi?id=1225642 * https://bugzilla.suse.com/show_bug.cgi?id=1225705 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225715 * https://bugzilla.suse.com/show_bug.cgi?id=1225720 * https://bugzilla.suse.com/show_bug.cgi?id=1225722 * https://bugzilla.suse.com/show_bug.cgi?id=1225734 * https://bugzilla.suse.com/show_bug.cgi?id=1225735 * https://bugzilla.suse.com/show_bug.cgi?id=1225747 * https://bugzilla.suse.com/show_bug.cgi?id=1225748 * https://bugzilla.suse.com/show_bug.cgi?id=1225756 * https://bugzilla.suse.com/show_bug.cgi?id=1225761 * https://bugzilla.suse.com/show_bug.cgi?id=1225766 * https://bugzilla.suse.com/show_bug.cgi?id=1225775 * https://bugzilla.suse.com/show_bug.cgi?id=1225810 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225829 * https://bugzilla.suse.com/show_bug.cgi?id=1225835 * https://bugzilla.suse.com/show_bug.cgi?id=1225842 * https://jira.suse.com/browse/PED-3259 * https://jira.suse.com/browse/PED-7167 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 16:30:02 -0000 Subject: SUSE-SU-2024:2217-1: important: Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) Message-ID: <171933300253.19261.2279417288987359200@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2217-1 Rating: important References: * bsc#1222118 * bsc#1223059 Cross-References: * CVE-2023-52628 * CVE-2024-26852 CVSS scores: * CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_28 fixes several issues. The following security issues were fixed: * CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222118). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2220=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-2217=1 SUSE-SLE-Module-Live- Patching-15-SP5-2024-2218=1 SUSE-SLE-Module-Live-Patching-15-SP5-2024-2219=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2217=1 SUSE-2024-2218=1 SUSE-2024-2219=1 SUSE-2024-2220=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_3-debugsource-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_12-default-debuginfo-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_5-debugsource-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_19-default-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_7-default-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_1-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_19-default-debuginfo-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_7-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_12-default-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_2-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-debuginfo-10-150500.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_3-debugsource-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_12-default-debuginfo-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_5-debugsource-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_19-default-11-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_1-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_7-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_19-default-debuginfo-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_7-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_12-default-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_2-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-debuginfo-10-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52628.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1222118 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 16:30:04 -0000 Subject: SUSE-SU-2024:2216-1: important: Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) Message-ID: <171933300459.19261.18355857238078277792@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2216-1 Rating: important References: * bsc#1222118 * bsc#1223059 * bsc#1224043 Cross-References: * CVE-2022-48687 * CVE-2023-52628 * CVE-2024-26852 CVSS scores: * CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-48687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_53 fixes several issues. The following security issues were fixed: * CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222118). * CVE-2022-48687: Fixed fix out-of-bounds read when setting HMAC data (bsc#1224043). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2216=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2216=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_0-debugsource-13-150500.9.1 * kernel-livepatch-5_14_21-150500_53-default-debuginfo-13-150500.9.1 * kernel-livepatch-5_14_21-150500_53-default-13-150500.9.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_0-debugsource-13-150500.9.1 * kernel-livepatch-5_14_21-150500_53-default-debuginfo-13-150500.9.1 * kernel-livepatch-5_14_21-150500_53-default-13-150500.9.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48687.html * https://www.suse.com/security/cve/CVE-2023-52628.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1222118 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1224043 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 16:30:07 -0000 Subject: SUSE-SU-2024:2209-1: important: Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) Message-ID: <171933300772.19261.12834139980133087698@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2209-1 Rating: important References: * bsc#1221302 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2022-48651 * CVE-2024-26610 * CVE-2024-26852 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_59 fixes several issues. The following security issues were fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2209=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2209=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_59-default-debuginfo-3-150500.11.10.1 * kernel-livepatch-SLE15-SP5_Update_12-debugsource-3-150500.11.10.1 * kernel-livepatch-5_14_21-150500_55_59-default-3-150500.11.10.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_59-default-debuginfo-3-150500.11.10.1 * kernel-livepatch-SLE15-SP5_Update_12-debugsource-3-150500.11.10.1 * kernel-livepatch-5_14_21-150500_55_59-default-3-150500.11.10.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 16:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 16:30:10 -0000 Subject: SUSE-SU-2024:2208-1: important: Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5) Message-ID: <171933301019.19261.814540943169259184@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2208-1 Rating: important References: * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2022-48651 * CVE-2023-52502 * CVE-2023-6546 * CVE-2024-26610 * CVE-2024-26852 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_52 fixes several issues. The following security issues were fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2208=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2208=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_52-default-3-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_52-default-debuginfo-3-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_11-debugsource-3-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_52-default-3-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_52-default-debuginfo-3-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_11-debugsource-3-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 16:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 16:30:13 -0000 Subject: SUSE-SU-2024:2207-1: important: Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) Message-ID: <171933301365.19261.5170009351714044200@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2207-1 Rating: important References: * bsc#1219296 * bsc#1220211 * bsc#1220828 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1222882 * bsc#1223059 * bsc#1223514 Cross-References: * CVE-2022-48651 * CVE-2023-52340 * CVE-2023-52502 * CVE-2023-6546 * CVE-2024-26585 * CVE-2024-26610 * CVE-2024-26622 * CVE-2024-26766 * CVE-2024-26852 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves nine vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_49 fixes several issues. The following security issues were fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220211). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828). * CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big' packets (bsc#1219296). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2207=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2207=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-5-150500.11.8.1 * kernel-livepatch-SLE15-SP5_Update_10-debugsource-5-150500.11.8.1 * kernel-livepatch-5_14_21-150500_55_49-default-5-150500.11.8.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-5-150500.11.8.1 * kernel-livepatch-SLE15-SP5_Update_10-debugsource-5-150500.11.8.1 * kernel-livepatch-5_14_21-150500_55_49-default-5-150500.11.8.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-52340.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-26585.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26622.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1219296 * https://bugzilla.suse.com/show_bug.cgi?id=1220211 * https://bugzilla.suse.com/show_bug.cgi?id=1220828 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 16:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 16:30:15 -0000 Subject: SUSE-SU-2024:2205-1: important: Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) Message-ID: <171933301582.19261.8098786509127993532@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2205-1 Rating: important References: * bsc#1218259 * bsc#1223059 Cross-References: * CVE-2023-6931 * CVE-2024-26852 CVSS scores: * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_39 fixes several issues. The following security issues were fixed: * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218259). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2205=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2205=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-8-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_8-debugsource-8-150500.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-8-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_8-debugsource-8-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1218259 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 16:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 16:30:17 -0000 Subject: SUSE-SU-2024:2221-1: important: Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) Message-ID: <171933301757.19261.15440217853676771238@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:2221-1 Rating: important References: * bsc#1223059 Cross-References: * CVE-2024-26852 CVSS scores: * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_44 fixes one issue. The following security issue was fixed: * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2221=1 SUSE-2024-2204=1 SUSE-2024-2206=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2221=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-2204=1 SUSE-SLE-Module-Live- Patching-15-SP5-2024-2206=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_31-default-debuginfo-9-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_7-debugsource-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_31-default-9-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_6-debugsource-9-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-8-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_9-debugsource-7-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_31-default-debuginfo-9-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_7-debugsource-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_31-default-9-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_6-debugsource-9-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-8-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_9-debugsource-7-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 16:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 16:30:19 -0000 Subject: SUSE-SU-2024:2202-1: important: Security update for the Linux Kernel (Live Patch 51 for SLE 12 SP5) Message-ID: <171933301978.19261.5595019238733508412@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 51 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:2202-1 Rating: important References: * bsc#1218259 * bsc#1220537 * bsc#1223059 Cross-References: * CVE-2021-46955 * CVE-2023-6931 * CVE-2024-26852 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_186 fixes several issues. The following security issues were fixed: * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218259). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-2202=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_186-default-8-2.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://bugzilla.suse.com/show_bug.cgi?id=1218259 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 16:30:21 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 16:30:21 -0000 Subject: SUSE-RU-2024:2215-1: moderate: Recommended update for python-azure-agent Message-ID: <171933302121.19261.1868538711878031637@smelt2.prg2.suse.org> # Recommended update for python-azure-agent Announcement ID: SUSE-RU-2024:2215-1 Rating: moderate References: * bsc#1225946 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for python-azure-agent fixes the following issue: * Use the -Z option for mv and cp in the posttrans to properly handle SELinux context (bsc#1225946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2215=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2215=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-2215=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2215=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2215=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2215=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2215=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2215=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2215=1 ## Package List: * openSUSE Leap 15.5 (noarch) * python-azure-agent-test-2.9.1.1-150100.3.37.3 * python-azure-agent-2.9.1.1-150100.3.37.3 * openSUSE Leap 15.6 (noarch) * python-azure-agent-config-server-2.9.1.1-150100.3.37.3 * python-azure-agent-2.9.1.1-150100.3.37.3 * python-azure-agent-config-micro-2.9.1.1-150100.3.37.3 * python-azure-agent-config-hpc-2.9.1.1-150100.3.37.3 * python-azure-agent-config-default-2.9.1.1-150100.3.37.3 * python-azure-agent-test-2.9.1.1-150100.3.37.3 * Public Cloud Module 15-SP2 (noarch) * python-azure-agent-config-server-2.9.1.1-150100.3.37.3 * python-azure-agent-2.9.1.1-150100.3.37.3 * python-azure-agent-config-micro-2.9.1.1-150100.3.37.3 * python-azure-agent-config-hpc-2.9.1.1-150100.3.37.3 * python-azure-agent-config-default-2.9.1.1-150100.3.37.3 * Public Cloud Module 15-SP3 (noarch) * python-azure-agent-config-server-2.9.1.1-150100.3.37.3 * python-azure-agent-2.9.1.1-150100.3.37.3 * python-azure-agent-config-micro-2.9.1.1-150100.3.37.3 * python-azure-agent-config-hpc-2.9.1.1-150100.3.37.3 * python-azure-agent-config-default-2.9.1.1-150100.3.37.3 * Public Cloud Module 15-SP4 (noarch) * python-azure-agent-config-server-2.9.1.1-150100.3.37.3 * python-azure-agent-2.9.1.1-150100.3.37.3 * python-azure-agent-config-micro-2.9.1.1-150100.3.37.3 * python-azure-agent-config-hpc-2.9.1.1-150100.3.37.3 * python-azure-agent-config-default-2.9.1.1-150100.3.37.3 * Public Cloud Module 15-SP5 (noarch) * python-azure-agent-config-server-2.9.1.1-150100.3.37.3 * python-azure-agent-2.9.1.1-150100.3.37.3 * python-azure-agent-config-micro-2.9.1.1-150100.3.37.3 * python-azure-agent-config-hpc-2.9.1.1-150100.3.37.3 * python-azure-agent-config-default-2.9.1.1-150100.3.37.3 * Public Cloud Module 15-SP6 (noarch) * python-azure-agent-config-server-2.9.1.1-150100.3.37.3 * python-azure-agent-2.9.1.1-150100.3.37.3 * python-azure-agent-config-micro-2.9.1.1-150100.3.37.3 * python-azure-agent-config-hpc-2.9.1.1-150100.3.37.3 * python-azure-agent-config-default-2.9.1.1-150100.3.37.3 * SUSE Linux Enterprise Micro 5.2 (noarch) * python-azure-agent-2.9.1.1-150100.3.37.3 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * python-azure-agent-2.9.1.1-150100.3.37.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1225946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 16:30:23 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 16:30:23 -0000 Subject: SUSE-RU-2024:2214-1: moderate: Recommended update for util-linux Message-ID: <171933302351.19261.15143777474495034194@smelt2.prg2.suse.org> # Recommended update for util-linux Announcement ID: SUSE-RU-2024:2214-1 Rating: moderate References: * bsc#1225598 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for util-linux fixes the following issue: * Fix hang of lscpu -e (bsc#1225598) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2214=1 openSUSE-SLE-15.6-2024-2214=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2214=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2214=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * util-linux-systemd-debugsource-2.39.3-150600.4.6.2 * libmount1-debuginfo-2.39.3-150600.4.6.2 * libblkid1-debuginfo-2.39.3-150600.4.6.2 * util-linux-systemd-2.39.3-150600.4.6.2 * libmount1-2.39.3-150600.4.6.2 * libsmartcols-devel-2.39.3-150600.4.6.2 * libuuid1-debuginfo-2.39.3-150600.4.6.2 * libfdisk1-2.39.3-150600.4.6.2 * util-linux-2.39.3-150600.4.6.2 * libuuid-devel-2.39.3-150600.4.6.2 * libuuid1-2.39.3-150600.4.6.2 * libfdisk-devel-static-2.39.3-150600.4.6.2 * util-linux-tty-tools-2.39.3-150600.4.6.2 * libblkid-devel-2.39.3-150600.4.6.2 * util-linux-tty-tools-debuginfo-2.39.3-150600.4.6.2 * python3-libmount-debuginfo-2.39.3-150600.4.6.2 * libmount-devel-static-2.39.3-150600.4.6.2 * libsmartcols1-2.39.3-150600.4.6.2 * util-linux-systemd-debuginfo-2.39.3-150600.4.6.2 * libfdisk-devel-2.39.3-150600.4.6.2 * libsmartcols-devel-static-2.39.3-150600.4.6.2 * libblkid-devel-static-2.39.3-150600.4.6.2 * libmount-devel-2.39.3-150600.4.6.2 * python3-libmount-2.39.3-150600.4.6.2 * libsmartcols1-debuginfo-2.39.3-150600.4.6.2 * uuidd-debuginfo-2.39.3-150600.4.6.2 * libblkid1-2.39.3-150600.4.6.2 * uuidd-2.39.3-150600.4.6.2 * libuuid-devel-static-2.39.3-150600.4.6.2 * python-libmount-debugsource-2.39.3-150600.4.6.2 * libfdisk1-debuginfo-2.39.3-150600.4.6.2 * util-linux-debuginfo-2.39.3-150600.4.6.2 * util-linux-debugsource-2.39.3-150600.4.6.2 * openSUSE Leap 15.6 (x86_64) * libmount1-32bit-2.39.3-150600.4.6.2 * libuuid1-32bit-2.39.3-150600.4.6.2 * libuuid1-32bit-debuginfo-2.39.3-150600.4.6.2 * libsmartcols1-32bit-debuginfo-2.39.3-150600.4.6.2 * libfdisk1-32bit-debuginfo-2.39.3-150600.4.6.2 * libmount-devel-32bit-2.39.3-150600.4.6.2 * libmount1-32bit-debuginfo-2.39.3-150600.4.6.2 * libfdisk1-32bit-2.39.3-150600.4.6.2 * libblkid-devel-32bit-2.39.3-150600.4.6.2 * libsmartcols1-32bit-2.39.3-150600.4.6.2 * libuuid-devel-32bit-2.39.3-150600.4.6.2 * libblkid1-32bit-2.39.3-150600.4.6.2 * libfdisk-devel-32bit-2.39.3-150600.4.6.2 * libsmartcols-devel-32bit-2.39.3-150600.4.6.2 * libblkid1-32bit-debuginfo-2.39.3-150600.4.6.2 * openSUSE Leap 15.6 (noarch) * util-linux-lang-2.39.3-150600.4.6.2 * openSUSE Leap 15.6 (aarch64_ilp32) * libsmartcols-devel-64bit-2.39.3-150600.4.6.2 * libsmartcols1-64bit-2.39.3-150600.4.6.2 * libblkid1-64bit-debuginfo-2.39.3-150600.4.6.2 * libmount-devel-64bit-2.39.3-150600.4.6.2 * libmount1-64bit-2.39.3-150600.4.6.2 * libfdisk1-64bit-2.39.3-150600.4.6.2 * libsmartcols1-64bit-debuginfo-2.39.3-150600.4.6.2 * libfdisk1-64bit-debuginfo-2.39.3-150600.4.6.2 * libblkid1-64bit-2.39.3-150600.4.6.2 * libuuid1-64bit-2.39.3-150600.4.6.2 * libfdisk-devel-64bit-2.39.3-150600.4.6.2 * libblkid-devel-64bit-2.39.3-150600.4.6.2 * libmount1-64bit-debuginfo-2.39.3-150600.4.6.2 * libuuid-devel-64bit-2.39.3-150600.4.6.2 * libuuid1-64bit-debuginfo-2.39.3-150600.4.6.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * util-linux-systemd-debugsource-2.39.3-150600.4.6.2 * libmount1-debuginfo-2.39.3-150600.4.6.2 * libblkid1-debuginfo-2.39.3-150600.4.6.2 * util-linux-systemd-2.39.3-150600.4.6.2 * libmount1-2.39.3-150600.4.6.2 * libsmartcols-devel-2.39.3-150600.4.6.2 * libuuid1-debuginfo-2.39.3-150600.4.6.2 * libfdisk1-2.39.3-150600.4.6.2 * util-linux-2.39.3-150600.4.6.2 * libuuid-devel-2.39.3-150600.4.6.2 * libuuid1-2.39.3-150600.4.6.2 * util-linux-tty-tools-2.39.3-150600.4.6.2 * libblkid-devel-2.39.3-150600.4.6.2 * util-linux-tty-tools-debuginfo-2.39.3-150600.4.6.2 * libsmartcols1-2.39.3-150600.4.6.2 * util-linux-systemd-debuginfo-2.39.3-150600.4.6.2 * libfdisk-devel-2.39.3-150600.4.6.2 * libblkid-devel-static-2.39.3-150600.4.6.2 * libmount-devel-2.39.3-150600.4.6.2 * libsmartcols1-debuginfo-2.39.3-150600.4.6.2 * libblkid1-2.39.3-150600.4.6.2 * libuuid-devel-static-2.39.3-150600.4.6.2 * libfdisk1-debuginfo-2.39.3-150600.4.6.2 * util-linux-debuginfo-2.39.3-150600.4.6.2 * util-linux-debugsource-2.39.3-150600.4.6.2 * Basesystem Module 15-SP6 (noarch) * util-linux-lang-2.39.3-150600.4.6.2 * Basesystem Module 15-SP6 (x86_64) * libmount1-32bit-2.39.3-150600.4.6.2 * libuuid1-32bit-2.39.3-150600.4.6.2 * libuuid1-32bit-debuginfo-2.39.3-150600.4.6.2 * libmount1-32bit-debuginfo-2.39.3-150600.4.6.2 * libblkid1-32bit-2.39.3-150600.4.6.2 * libblkid1-32bit-debuginfo-2.39.3-150600.4.6.2 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * util-linux-systemd-debugsource-2.39.3-150600.4.6.2 * uuidd-2.39.3-150600.4.6.2 * util-linux-systemd-debuginfo-2.39.3-150600.4.6.2 * uuidd-debuginfo-2.39.3-150600.4.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1225598 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 16:30:24 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 16:30:24 -0000 Subject: SUSE-RU-2024:2213-1: important: Recommended update for util-linux Message-ID: <171933302489.19261.16976485023395475532@smelt2.prg2.suse.org> # Recommended update for util-linux Announcement ID: SUSE-RU-2024:2213-1 Rating: important References: * bsc#1215918 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that has one fix can now be installed. ## Description: This update for util-linux fixes the following issue: * fix Xen virtualization type misidentification (bsc#1215918) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2213=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2213=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2213=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2213=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-2213=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libsmartcols-devel-2.33.2-4.39.14 * libmount-devel-2.33.2-4.39.14 * libuuid-devel-2.33.2-4.39.14 * util-linux-debuginfo-2.33.2-4.39.14 * libblkid-devel-2.33.2-4.39.14 * util-linux-debugsource-2.33.2-4.39.14 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libsmartcols1-debuginfo-2.33.2-4.39.14 * util-linux-debuginfo-2.33.2-4.39.14 * libblkid1-2.33.2-4.39.14 * util-linux-systemd-debugsource-2.33.2-4.39.12 * uuidd-debuginfo-2.33.2-4.39.12 * python-libmount-debuginfo-2.33.2-4.39.12 * python-libmount-debugsource-2.33.2-4.39.12 * util-linux-systemd-2.33.2-4.39.12 * libblkid1-debuginfo-2.33.2-4.39.14 * libfdisk1-debuginfo-2.33.2-4.39.14 * util-linux-debugsource-2.33.2-4.39.14 * uuidd-2.33.2-4.39.12 * libfdisk1-2.33.2-4.39.14 * util-linux-systemd-debuginfo-2.33.2-4.39.12 * libuuid1-debuginfo-2.33.2-4.39.14 * util-linux-2.33.2-4.39.14 * libmount1-2.33.2-4.39.14 * libmount1-debuginfo-2.33.2-4.39.14 * libuuid1-2.33.2-4.39.14 * libsmartcols1-2.33.2-4.39.14 * python-libmount-2.33.2-4.39.12 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * util-linux-lang-2.33.2-4.39.14 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libmount1-debuginfo-32bit-2.33.2-4.39.14 * libmount1-32bit-2.33.2-4.39.14 * libuuid1-debuginfo-32bit-2.33.2-4.39.14 * libblkid1-32bit-2.33.2-4.39.14 * libblkid1-debuginfo-32bit-2.33.2-4.39.14 * libuuid1-32bit-2.33.2-4.39.14 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libsmartcols1-debuginfo-2.33.2-4.39.14 * util-linux-debuginfo-2.33.2-4.39.14 * libblkid1-2.33.2-4.39.14 * util-linux-systemd-debugsource-2.33.2-4.39.12 * uuidd-debuginfo-2.33.2-4.39.12 * python-libmount-debuginfo-2.33.2-4.39.12 * python-libmount-debugsource-2.33.2-4.39.12 * util-linux-systemd-2.33.2-4.39.12 * libblkid1-debuginfo-2.33.2-4.39.14 * libfdisk1-debuginfo-2.33.2-4.39.14 * util-linux-debugsource-2.33.2-4.39.14 * uuidd-2.33.2-4.39.12 * libfdisk1-2.33.2-4.39.14 * util-linux-systemd-debuginfo-2.33.2-4.39.12 * libuuid1-debuginfo-2.33.2-4.39.14 * util-linux-2.33.2-4.39.14 * libmount1-2.33.2-4.39.14 * libmount1-debuginfo-2.33.2-4.39.14 * libuuid1-2.33.2-4.39.14 * libsmartcols1-2.33.2-4.39.14 * python-libmount-2.33.2-4.39.12 * SUSE Linux Enterprise Server 12 SP5 (noarch) * util-linux-lang-2.33.2-4.39.14 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libmount1-debuginfo-32bit-2.33.2-4.39.14 * libuuid1-debuginfo-32bit-2.33.2-4.39.14 * libmount1-32bit-2.33.2-4.39.14 * libblkid1-32bit-2.33.2-4.39.14 * libblkid1-debuginfo-32bit-2.33.2-4.39.14 * libuuid1-32bit-2.33.2-4.39.14 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libsmartcols1-debuginfo-2.33.2-4.39.14 * util-linux-debuginfo-2.33.2-4.39.14 * libblkid1-2.33.2-4.39.14 * util-linux-systemd-debugsource-2.33.2-4.39.12 * uuidd-debuginfo-2.33.2-4.39.12 * python-libmount-debuginfo-2.33.2-4.39.12 * python-libmount-debugsource-2.33.2-4.39.12 * util-linux-systemd-2.33.2-4.39.12 * libblkid1-debuginfo-2.33.2-4.39.14 * libfdisk1-debuginfo-2.33.2-4.39.14 * util-linux-debugsource-2.33.2-4.39.14 * uuidd-2.33.2-4.39.12 * libfdisk1-2.33.2-4.39.14 * util-linux-systemd-debuginfo-2.33.2-4.39.12 * libuuid1-debuginfo-2.33.2-4.39.14 * util-linux-2.33.2-4.39.14 * libmount1-2.33.2-4.39.14 * libmount1-debuginfo-2.33.2-4.39.14 * libuuid1-2.33.2-4.39.14 * libsmartcols1-2.33.2-4.39.14 * python-libmount-2.33.2-4.39.12 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * util-linux-lang-2.33.2-4.39.14 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libmount1-debuginfo-32bit-2.33.2-4.39.14 * libmount1-32bit-2.33.2-4.39.14 * libuuid1-debuginfo-32bit-2.33.2-4.39.14 * libblkid1-32bit-2.33.2-4.39.14 * libblkid1-debuginfo-32bit-2.33.2-4.39.14 * libuuid1-32bit-2.33.2-4.39.14 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * libuuid-devel-2.33.2-4.39.14 * util-linux-debuginfo-2.33.2-4.39.14 * util-linux-debugsource-2.33.2-4.39.14 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215918 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 16:30:26 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 16:30:26 -0000 Subject: SUSE-RU-2024:2212-1: moderate: Recommended update for release-notes-sled Message-ID: <171933302617.19261.4856565106931144675@smelt2.prg2.suse.org> # Recommended update for release-notes-sled Announcement ID: SUSE-RU-2024:2212-1 Rating: moderate References: * bsc#933411 * jsc#PED-7339 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 An update that contains one feature and has one fix can now be installed. ## Description: This update for release-notes-sled fixes the following issues: * Version update (bsc#933411) * Added note about intel-gpu-tools removal (jsc#PED-7339) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Desktop 15 SP6 zypper in -t patch SUSE-SLE-Product-SLED-15-SP6-2024-2212=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2212=1 openSUSE-SLE-15.6-2024-2212=1 ## Package List: * SUSE Linux Enterprise Desktop 15 SP6 (noarch) * release-notes-sled-15.6.20240612-150600.3.3.3 * openSUSE Leap 15.6 (noarch) * release-notes-sled-15.6.20240612-150600.3.3.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=933411 * https://jira.suse.com/browse/PED-7339 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 25 20:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 25 Jun 2024 20:30:06 -0000 Subject: SUSE-RU-2024:2222-1: important: Recommended update for cloud-init Message-ID: <171934740600.24259.17763208895612854176@smelt2.prg2.suse.org> # Recommended update for cloud-init Announcement ID: SUSE-RU-2024:2222-1 Rating: important References: * bsc#1219680 * bsc#1223469 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for cloud-init fixes the following issues: * Brute force approach to skip renames if the device is already present (bsc#1219680) * Handle the existence of /usr/etc/sudoers to search for the expected include location (bsc#1223469) * Do not enable cloud-init on systems where there is no DMI just because no data source has been found. No data source means cloud-init will not run. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2222=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2222=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2222=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-2222=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2222=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2222=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2222=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2222=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.82.3 * cloud-init-config-suse-23.3-150100.8.82.3 * cloud-init-23.3-150100.8.82.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.82.3 * cloud-init-config-suse-23.3-150100.8.82.3 * cloud-init-23.3-150100.8.82.3 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * cloud-init-config-suse-23.3-150100.8.82.3 * cloud-init-23.3-150100.8.82.3 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.82.3 * cloud-init-23.3-150100.8.82.3 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.82.3 * cloud-init-23.3-150100.8.82.3 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.82.3 * cloud-init-23.3-150100.8.82.3 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.82.3 * cloud-init-23.3-150100.8.82.3 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.82.3 * cloud-init-23.3-150100.8.82.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219680 * https://bugzilla.suse.com/show_bug.cgi?id=1223469 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 08:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 08:30:01 -0000 Subject: SUSE-RU-2024:2232-1: moderate: Recommended update for iputils Message-ID: <171939060172.26505.10006467348455208588@smelt2.prg2.suse.org> # Recommended update for iputils Announcement ID: SUSE-RU-2024:2232-1 Rating: moderate References: * bsc#1225963 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for iputils fixes the following issues: * Fix exit code if receive more replies than sent (bsc#1225963) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2232=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2232=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2232=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2232=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2232=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2232=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2232=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-2232=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2232=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * iputils-debuginfo-20211215-150400.3.14.1 * rarpd-20211215-150400.3.14.1 * iputils-20211215-150400.3.14.1 * rarpd-debuginfo-20211215-150400.3.14.1 * iputils-debugsource-20211215-150400.3.14.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * iputils-debuginfo-20211215-150400.3.14.1 * iputils-debugsource-20211215-150400.3.14.1 * iputils-20211215-150400.3.14.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.14.1 * iputils-debugsource-20211215-150400.3.14.1 * iputils-20211215-150400.3.14.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.14.1 * iputils-debugsource-20211215-150400.3.14.1 * iputils-20211215-150400.3.14.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.14.1 * iputils-debugsource-20211215-150400.3.14.1 * iputils-20211215-150400.3.14.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.14.1 * iputils-debugsource-20211215-150400.3.14.1 * iputils-20211215-150400.3.14.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * iputils-debuginfo-20211215-150400.3.14.1 * iputils-debugsource-20211215-150400.3.14.1 * iputils-20211215-150400.3.14.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rarpd-debuginfo-20211215-150400.3.14.1 * iputils-debuginfo-20211215-150400.3.14.1 * iputils-debugsource-20211215-150400.3.14.1 * rarpd-20211215-150400.3.14.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * rarpd-debuginfo-20211215-150400.3.14.1 * iputils-debuginfo-20211215-150400.3.14.1 * iputils-debugsource-20211215-150400.3.14.1 * rarpd-20211215-150400.3.14.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1225963 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 08:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 08:30:06 -0000 Subject: SUSE-RU-2024:2231-1: moderate: Recommended update for autofs Message-ID: <171939060619.26505.2225392187457917127@smelt2.prg2.suse.org> # Recommended update for autofs Announcement ID: SUSE-RU-2024:2231-1 Rating: moderate References: * bsc#1225130 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for autofs fixes the following issues: * Don't use the intr option on NFS mounts by default, it's been ignored by the kernel for a long time now (bsc#1225130) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2231=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2231=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2231=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2231=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2231=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2231=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2231=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2231=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2231=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2231=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2231=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2231=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2231=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2231=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2231=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2231=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2231=1 ## Package List: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Manager Proxy 4.3 (x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * autofs-debugsource-5.1.3-150000.7.20.1 * autofs-debuginfo-5.1.3-150000.7.20.1 * autofs-5.1.3-150000.7.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1225130 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 08:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 08:30:09 -0000 Subject: SUSE-RU-2024:2229-1: important: Recommended update for apache2 Message-ID: <171939060994.26505.9973170996248727108@smelt2.prg2.suse.org> # Recommended update for apache2 Announcement ID: SUSE-RU-2024:2229-1 Rating: important References: * bsc#1226217 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for apache2 fixes the following issues: * Apache ignores headers sent by CGI scripts (bsc#1226217) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2229=1 openSUSE-SLE-15.6-2024-2229=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2229=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2229=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2229=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * apache2-prefork-2.4.58-150600.5.6.1 * apache2-event-debuginfo-2.4.58-150600.5.6.1 * apache2-utils-debuginfo-2.4.58-150600.5.6.1 * apache2-event-2.4.58-150600.5.6.1 * apache2-debugsource-2.4.58-150600.5.6.1 * apache2-utils-debugsource-2.4.58-150600.5.6.1 * apache2-worker-2.4.58-150600.5.6.1 * apache2-worker-debugsource-2.4.58-150600.5.6.1 * apache2-devel-2.4.58-150600.5.6.1 * apache2-prefork-debuginfo-2.4.58-150600.5.6.1 * apache2-debuginfo-2.4.58-150600.5.6.1 * apache2-utils-2.4.58-150600.5.6.1 * apache2-worker-debuginfo-2.4.58-150600.5.6.1 * apache2-event-debugsource-2.4.58-150600.5.6.1 * apache2-prefork-debugsource-2.4.58-150600.5.6.1 * apache2-2.4.58-150600.5.6.1 * openSUSE Leap 15.6 (noarch) * apache2-manual-2.4.58-150600.5.6.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-prefork-2.4.58-150600.5.6.1 * apache2-debugsource-2.4.58-150600.5.6.1 * apache2-prefork-debuginfo-2.4.58-150600.5.6.1 * apache2-debuginfo-2.4.58-150600.5.6.1 * apache2-prefork-debugsource-2.4.58-150600.5.6.1 * apache2-2.4.58-150600.5.6.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-event-debuginfo-2.4.58-150600.5.6.1 * apache2-event-2.4.58-150600.5.6.1 * apache2-debugsource-2.4.58-150600.5.6.1 * apache2-debuginfo-2.4.58-150600.5.6.1 * apache2-event-debugsource-2.4.58-150600.5.6.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-worker-2.4.58-150600.5.6.1 * apache2-utils-debuginfo-2.4.58-150600.5.6.1 * apache2-utils-debugsource-2.4.58-150600.5.6.1 * apache2-devel-2.4.58-150600.5.6.1 * apache2-utils-2.4.58-150600.5.6.1 * apache2-worker-debuginfo-2.4.58-150600.5.6.1 * apache2-worker-debugsource-2.4.58-150600.5.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226217 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 08:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 08:30:13 -0000 Subject: SUSE-RU-2024:2228-1: important: Recommended update for apache2 Message-ID: <171939061335.26505.4092188914927388839@smelt2.prg2.suse.org> # Recommended update for apache2 Announcement ID: SUSE-RU-2024:2228-1 Rating: important References: * bsc#1226217 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that has one fix can now be installed. ## Description: This update for apache2 fixes the following issues: * Apache ignores headers sent by CGI scripts (bsc#1226217) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2228=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2228=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2228=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2228=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * apache2-debuginfo-2.4.51-35.44.1 * apache2-tls13-devel-2.4.51-35.44.1 * apache2-devel-2.4.51-35.44.1 * apache2-tls13-debugsource-2.4.51-35.44.1 * apache2-debugsource-2.4.51-35.44.1 * apache2-tls13-debuginfo-2.4.51-35.44.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * apache2-tls13-utils-debuginfo-2.4.51-35.44.1 * apache2-utils-debuginfo-2.4.51-35.44.1 * apache2-debuginfo-2.4.51-35.44.1 * apache2-tls13-worker-debuginfo-2.4.51-35.44.1 * apache2-example-pages-2.4.51-35.44.1 * apache2-tls13-worker-2.4.51-35.44.1 * apache2-tls13-prefork-debuginfo-2.4.51-35.44.1 * apache2-tls13-debuginfo-2.4.51-35.44.1 * apache2-worker-2.4.51-35.44.1 * apache2-utils-2.4.51-35.44.1 * apache2-tls13-prefork-2.4.51-35.44.1 * apache2-tls13-debugsource-2.4.51-35.44.1 * apache2-tls13-utils-2.4.51-35.44.1 * apache2-worker-debuginfo-2.4.51-35.44.1 * apache2-2.4.51-35.44.1 * apache2-prefork-2.4.51-35.44.1 * apache2-tls13-example-pages-2.4.51-35.44.1 * apache2-tls13-2.4.51-35.44.1 * apache2-prefork-debuginfo-2.4.51-35.44.1 * apache2-debugsource-2.4.51-35.44.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * apache2-tls13-doc-2.4.51-35.44.1 * apache2-doc-2.4.51-35.44.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * apache2-tls13-utils-debuginfo-2.4.51-35.44.1 * apache2-utils-debuginfo-2.4.51-35.44.1 * apache2-debuginfo-2.4.51-35.44.1 * apache2-tls13-worker-debuginfo-2.4.51-35.44.1 * apache2-example-pages-2.4.51-35.44.1 * apache2-tls13-worker-2.4.51-35.44.1 * apache2-tls13-prefork-debuginfo-2.4.51-35.44.1 * apache2-tls13-debuginfo-2.4.51-35.44.1 * apache2-worker-2.4.51-35.44.1 * apache2-utils-2.4.51-35.44.1 * apache2-tls13-prefork-2.4.51-35.44.1 * apache2-tls13-debugsource-2.4.51-35.44.1 * apache2-tls13-utils-2.4.51-35.44.1 * apache2-worker-debuginfo-2.4.51-35.44.1 * apache2-2.4.51-35.44.1 * apache2-prefork-2.4.51-35.44.1 * apache2-tls13-example-pages-2.4.51-35.44.1 * apache2-tls13-2.4.51-35.44.1 * apache2-prefork-debuginfo-2.4.51-35.44.1 * apache2-debugsource-2.4.51-35.44.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * apache2-tls13-doc-2.4.51-35.44.1 * apache2-doc-2.4.51-35.44.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * apache2-tls13-utils-debuginfo-2.4.51-35.44.1 * apache2-utils-debuginfo-2.4.51-35.44.1 * apache2-debuginfo-2.4.51-35.44.1 * apache2-tls13-worker-debuginfo-2.4.51-35.44.1 * apache2-example-pages-2.4.51-35.44.1 * apache2-tls13-worker-2.4.51-35.44.1 * apache2-tls13-prefork-debuginfo-2.4.51-35.44.1 * apache2-tls13-debuginfo-2.4.51-35.44.1 * apache2-worker-2.4.51-35.44.1 * apache2-utils-2.4.51-35.44.1 * apache2-tls13-prefork-2.4.51-35.44.1 * apache2-tls13-debugsource-2.4.51-35.44.1 * apache2-tls13-utils-2.4.51-35.44.1 * apache2-worker-debuginfo-2.4.51-35.44.1 * apache2-2.4.51-35.44.1 * apache2-prefork-2.4.51-35.44.1 * apache2-tls13-example-pages-2.4.51-35.44.1 * apache2-tls13-2.4.51-35.44.1 * apache2-prefork-debuginfo-2.4.51-35.44.1 * apache2-debugsource-2.4.51-35.44.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * apache2-tls13-doc-2.4.51-35.44.1 * apache2-doc-2.4.51-35.44.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226217 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 08:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 08:30:14 -0000 Subject: SUSE-RU-2024:2227-1: important: Recommended update for apache2 Message-ID: <171939061450.26505.1978940211961337882@smelt2.prg2.suse.org> # Recommended update for apache2 Announcement ID: SUSE-RU-2024:2227-1 Rating: important References: * bsc#1226217 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has one fix can now be installed. ## Description: This update for apache2 fixes the following issues: * Apache ignores headers sent by CGI scripts (bsc#1226217) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2227=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2227=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2227=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2227=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2227=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2227=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2227=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * apache2-prefork-debuginfo-2.4.51-150200.3.65.1 * apache2-debugsource-2.4.51-150200.3.65.1 * apache2-2.4.51-150200.3.65.1 * apache2-worker-debuginfo-2.4.51-150200.3.65.1 * apache2-utils-debuginfo-2.4.51-150200.3.65.1 * apache2-debuginfo-2.4.51-150200.3.65.1 * apache2-devel-2.4.51-150200.3.65.1 * apache2-utils-2.4.51-150200.3.65.1 * apache2-prefork-2.4.51-150200.3.65.1 * apache2-worker-2.4.51-150200.3.65.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * apache2-doc-2.4.51-150200.3.65.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * apache2-prefork-debuginfo-2.4.51-150200.3.65.1 * apache2-debugsource-2.4.51-150200.3.65.1 * apache2-2.4.51-150200.3.65.1 * apache2-worker-debuginfo-2.4.51-150200.3.65.1 * apache2-utils-debuginfo-2.4.51-150200.3.65.1 * apache2-debuginfo-2.4.51-150200.3.65.1 * apache2-devel-2.4.51-150200.3.65.1 * apache2-utils-2.4.51-150200.3.65.1 * apache2-prefork-2.4.51-150200.3.65.1 * apache2-worker-2.4.51-150200.3.65.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * apache2-doc-2.4.51-150200.3.65.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * apache2-prefork-debuginfo-2.4.51-150200.3.65.1 * apache2-debugsource-2.4.51-150200.3.65.1 * apache2-2.4.51-150200.3.65.1 * apache2-worker-debuginfo-2.4.51-150200.3.65.1 * apache2-utils-debuginfo-2.4.51-150200.3.65.1 * apache2-debuginfo-2.4.51-150200.3.65.1 * apache2-devel-2.4.51-150200.3.65.1 * apache2-utils-2.4.51-150200.3.65.1 * apache2-prefork-2.4.51-150200.3.65.1 * apache2-worker-2.4.51-150200.3.65.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * apache2-doc-2.4.51-150200.3.65.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * apache2-prefork-debuginfo-2.4.51-150200.3.65.1 * apache2-debugsource-2.4.51-150200.3.65.1 * apache2-2.4.51-150200.3.65.1 * apache2-worker-debuginfo-2.4.51-150200.3.65.1 * apache2-utils-debuginfo-2.4.51-150200.3.65.1 * apache2-debuginfo-2.4.51-150200.3.65.1 * apache2-devel-2.4.51-150200.3.65.1 * apache2-utils-2.4.51-150200.3.65.1 * apache2-prefork-2.4.51-150200.3.65.1 * apache2-worker-2.4.51-150200.3.65.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * apache2-doc-2.4.51-150200.3.65.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * apache2-prefork-debuginfo-2.4.51-150200.3.65.1 * apache2-debugsource-2.4.51-150200.3.65.1 * apache2-2.4.51-150200.3.65.1 * apache2-worker-debuginfo-2.4.51-150200.3.65.1 * apache2-utils-debuginfo-2.4.51-150200.3.65.1 * apache2-debuginfo-2.4.51-150200.3.65.1 * apache2-devel-2.4.51-150200.3.65.1 * apache2-utils-2.4.51-150200.3.65.1 * apache2-prefork-2.4.51-150200.3.65.1 * apache2-worker-2.4.51-150200.3.65.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * apache2-doc-2.4.51-150200.3.65.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * apache2-prefork-debuginfo-2.4.51-150200.3.65.1 * apache2-debugsource-2.4.51-150200.3.65.1 * apache2-2.4.51-150200.3.65.1 * apache2-worker-debuginfo-2.4.51-150200.3.65.1 * apache2-utils-debuginfo-2.4.51-150200.3.65.1 * apache2-debuginfo-2.4.51-150200.3.65.1 * apache2-devel-2.4.51-150200.3.65.1 * apache2-utils-2.4.51-150200.3.65.1 * apache2-prefork-2.4.51-150200.3.65.1 * apache2-worker-2.4.51-150200.3.65.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * apache2-doc-2.4.51-150200.3.65.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * apache2-prefork-debuginfo-2.4.51-150200.3.65.1 * apache2-debugsource-2.4.51-150200.3.65.1 * apache2-2.4.51-150200.3.65.1 * apache2-worker-debuginfo-2.4.51-150200.3.65.1 * apache2-utils-debuginfo-2.4.51-150200.3.65.1 * apache2-debuginfo-2.4.51-150200.3.65.1 * apache2-devel-2.4.51-150200.3.65.1 * apache2-utils-2.4.51-150200.3.65.1 * apache2-prefork-2.4.51-150200.3.65.1 * apache2-worker-2.4.51-150200.3.65.1 * SUSE Enterprise Storage 7.1 (noarch) * apache2-doc-2.4.51-150200.3.65.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226217 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 08:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 08:30:15 -0000 Subject: SUSE-RU-2024:2226-1: important: Recommended update for apache2 Message-ID: <171939061586.26505.16616286582975742461@smelt2.prg2.suse.org> # Recommended update for apache2 Announcement ID: SUSE-RU-2024:2226-1 Rating: important References: * bsc#1226217 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that has one fix can now be installed. ## Description: This update for apache2 fixes the following issues: * Apache ignores headers sent by CGI scripts (bsc#1226217) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2226=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2226=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2226=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2226=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2226=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2226=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2226=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2226=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2226=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2226=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2226=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2226=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2226=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-2226=1 ## Package List: * Server Applications Module 15-SP6 (noarch) * apache2-doc-2.4.51-150400.6.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * apache2-devel-2.4.51-150400.6.20.1 * apache2-worker-debuginfo-2.4.51-150400.6.20.1 * apache2-utils-2.4.51-150400.6.20.1 * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-utils-debuginfo-2.4.51-150400.6.20.1 * apache2-worker-2.4.51-150400.6.20.1 * apache2-prefork-debuginfo-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * apache2-2.4.51-150400.6.20.1 * apache2-prefork-2.4.51-150400.6.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * apache2-doc-2.4.51-150400.6.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * apache2-devel-2.4.51-150400.6.20.1 * apache2-worker-debuginfo-2.4.51-150400.6.20.1 * apache2-utils-2.4.51-150400.6.20.1 * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-utils-debuginfo-2.4.51-150400.6.20.1 * apache2-worker-2.4.51-150400.6.20.1 * apache2-prefork-debuginfo-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * apache2-2.4.51-150400.6.20.1 * apache2-prefork-2.4.51-150400.6.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * apache2-doc-2.4.51-150400.6.20.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * apache2-utils-2.4.51-150400.6.20.1 * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-utils-debuginfo-2.4.51-150400.6.20.1 * apache2-prefork-debuginfo-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * apache2-2.4.51-150400.6.20.1 * apache2-prefork-2.4.51-150400.6.20.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * apache2-devel-2.4.51-150400.6.20.1 * apache2-worker-debuginfo-2.4.51-150400.6.20.1 * apache2-utils-2.4.51-150400.6.20.1 * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-utils-debuginfo-2.4.51-150400.6.20.1 * apache2-worker-2.4.51-150400.6.20.1 * apache2-prefork-debuginfo-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * apache2-2.4.51-150400.6.20.1 * apache2-prefork-2.4.51-150400.6.20.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * apache2-doc-2.4.51-150400.6.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * apache2-devel-2.4.51-150400.6.20.1 * apache2-worker-debuginfo-2.4.51-150400.6.20.1 * apache2-utils-2.4.51-150400.6.20.1 * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-utils-debuginfo-2.4.51-150400.6.20.1 * apache2-worker-2.4.51-150400.6.20.1 * apache2-prefork-debuginfo-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * apache2-2.4.51-150400.6.20.1 * apache2-prefork-2.4.51-150400.6.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * apache2-doc-2.4.51-150400.6.20.1 * SUSE Manager Proxy 4.3 (x86_64) * apache2-devel-2.4.51-150400.6.20.1 * apache2-worker-debuginfo-2.4.51-150400.6.20.1 * apache2-utils-2.4.51-150400.6.20.1 * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-utils-debuginfo-2.4.51-150400.6.20.1 * apache2-worker-2.4.51-150400.6.20.1 * apache2-prefork-debuginfo-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * apache2-2.4.51-150400.6.20.1 * apache2-prefork-2.4.51-150400.6.20.1 * SUSE Manager Proxy 4.3 (noarch) * apache2-doc-2.4.51-150400.6.20.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * apache2-devel-2.4.51-150400.6.20.1 * apache2-worker-debuginfo-2.4.51-150400.6.20.1 * apache2-utils-2.4.51-150400.6.20.1 * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-utils-debuginfo-2.4.51-150400.6.20.1 * apache2-worker-2.4.51-150400.6.20.1 * apache2-prefork-debuginfo-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * apache2-2.4.51-150400.6.20.1 * apache2-prefork-2.4.51-150400.6.20.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * apache2-doc-2.4.51-150400.6.20.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * apache2-devel-2.4.51-150400.6.20.1 * apache2-worker-debuginfo-2.4.51-150400.6.20.1 * apache2-utils-2.4.51-150400.6.20.1 * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-utils-debuginfo-2.4.51-150400.6.20.1 * apache2-worker-2.4.51-150400.6.20.1 * apache2-prefork-debuginfo-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * apache2-2.4.51-150400.6.20.1 * apache2-prefork-2.4.51-150400.6.20.1 * SUSE Manager Server 4.3 (noarch) * apache2-doc-2.4.51-150400.6.20.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * apache2-event-2.4.51-150400.6.20.1 * apache2-devel-2.4.51-150400.6.20.1 * apache2-worker-debuginfo-2.4.51-150400.6.20.1 * apache2-utils-2.4.51-150400.6.20.1 * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-event-debuginfo-2.4.51-150400.6.20.1 * apache2-utils-debuginfo-2.4.51-150400.6.20.1 * apache2-worker-2.4.51-150400.6.20.1 * apache2-prefork-debuginfo-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * apache2-2.4.51-150400.6.20.1 * apache2-prefork-2.4.51-150400.6.20.1 * apache2-example-pages-2.4.51-150400.6.20.1 * openSUSE Leap 15.4 (noarch) * apache2-doc-2.4.51-150400.6.20.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * apache2-event-2.4.51-150400.6.20.1 * apache2-devel-2.4.51-150400.6.20.1 * apache2-worker-debuginfo-2.4.51-150400.6.20.1 * apache2-utils-2.4.51-150400.6.20.1 * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-event-debuginfo-2.4.51-150400.6.20.1 * apache2-utils-debuginfo-2.4.51-150400.6.20.1 * apache2-worker-2.4.51-150400.6.20.1 * apache2-prefork-debuginfo-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * apache2-2.4.51-150400.6.20.1 * apache2-prefork-2.4.51-150400.6.20.1 * apache2-example-pages-2.4.51-150400.6.20.1 * openSUSE Leap 15.5 (noarch) * apache2-doc-2.4.51-150400.6.20.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * apache2-utils-2.4.51-150400.6.20.1 * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-utils-debuginfo-2.4.51-150400.6.20.1 * apache2-prefork-debuginfo-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * apache2-2.4.51-150400.6.20.1 * apache2-prefork-2.4.51-150400.6.20.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * apache2-event-2.4.51-150400.6.20.1 * apache2-event-debuginfo-2.4.51-150400.6.20.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * apache2-devel-2.4.51-150400.6.20.1 * apache2-worker-debuginfo-2.4.51-150400.6.20.1 * apache2-debugsource-2.4.51-150400.6.20.1 * apache2-worker-2.4.51-150400.6.20.1 * apache2-debuginfo-2.4.51-150400.6.20.1 * Server Applications Module 15-SP5 (noarch) * apache2-doc-2.4.51-150400.6.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226217 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 08:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 08:30:17 -0000 Subject: SUSE-RU-2024:2225-1: important: Recommended update for kdump Message-ID: <171939061778.26505.17589815632259767358@smelt2.prg2.suse.org> # Recommended update for kdump Announcement ID: SUSE-RU-2024:2225-1 Rating: important References: * bsc#1191410 * bsc#1222228 * bsc#1224214 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has three fixes can now be installed. ## Description: This update for kdump fixes the following issues: * Use fadump=nocma when user data not filtered out (bsc#1224214) * Differentiate between uninstall and upgrade in postun/preun (bsc#1191410) * Return success from pre, post, preun and postun scriplets (bsc#1222228) * Update calibrate values for SLE-15-SP6 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2225=1 openSUSE-SLE-15.6-2024-2225=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2225=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kdump-debugsource-2.0.6+git18.g6fc4531-150600.3.3.1 * kdump-2.0.6+git18.g6fc4531-150600.3.3.1 * kdump-debuginfo-2.0.6+git18.g6fc4531-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kdump-debugsource-2.0.6+git18.g6fc4531-150600.3.3.1 * kdump-2.0.6+git18.g6fc4531-150600.3.3.1 * kdump-debuginfo-2.0.6+git18.g6fc4531-150600.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1191410 * https://bugzilla.suse.com/show_bug.cgi?id=1222228 * https://bugzilla.suse.com/show_bug.cgi?id=1224214 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 08:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 08:30:19 -0000 Subject: SUSE-RU-2024:2224-1: important: Recommended update for java-1_8_0-openjdk Message-ID: <171939061932.26505.4168747191755835586@smelt2.prg2.suse.org> # Recommended update for java-1_8_0-openjdk Announcement ID: SUSE-RU-2024:2224-1 Rating: important References: * bsc#1226274 Affected Products: * Legacy Module 15-SP5 * Legacy Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for java-1_8_0-openjdk fixes the following issues: * Fix condition enabling shenandoah GC (bsc#1226274) * Disable shenandoah for all distributions, since the shenandoah hotspot tarball is rather out of sync ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2224=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2224=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-2224=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-2224=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2224=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2224=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2224=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2224=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2224=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2224=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2224=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2224=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2224=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2224=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-src-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-accessibility-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * openSUSE Leap 15.5 (noarch) * java-1_8_0-openjdk-javadoc-1.8.0.412-150000.3.94.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-src-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-accessibility-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * openSUSE Leap 15.6 (noarch) * java-1_8_0-openjdk-javadoc-1.8.0.412-150000.3.94.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * java-1_8_0-openjdk-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-150000.3.94.1 * java-1_8_0-openjdk-headless-1.8.0.412-150000.3.94.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226274 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 08:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 08:30:20 -0000 Subject: SUSE-RU-2024:2223-1: important: Recommended update for java-1_8_0-openjdk Message-ID: <171939062057.26505.3533915966883984500@smelt2.prg2.suse.org> # Recommended update for java-1_8_0-openjdk Announcement ID: SUSE-RU-2024:2223-1 Rating: important References: * bsc#1226274 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for java-1_8_0-openjdk fixes the following issues: * Fix condition enabling shenandoah GC (bsc#1226274) * Disable shenandoah for all distributions, since the shenandoah hotspot tarball is rather out of sync ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2223=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2223=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2223=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * java-1_8_0-openjdk-devel-1.8.0.412-27.102.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-27.102.1 * java-1_8_0-openjdk-1.8.0.412-27.102.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-27.102.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-27.102.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-27.102.1 * java-1_8_0-openjdk-demo-1.8.0.412-27.102.1 * java-1_8_0-openjdk-headless-1.8.0.412-27.102.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-27.102.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-devel-1.8.0.412-27.102.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-27.102.1 * java-1_8_0-openjdk-1.8.0.412-27.102.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-27.102.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-27.102.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-27.102.1 * java-1_8_0-openjdk-demo-1.8.0.412-27.102.1 * java-1_8_0-openjdk-headless-1.8.0.412-27.102.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-27.102.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * java-1_8_0-openjdk-devel-1.8.0.412-27.102.1 * java-1_8_0-openjdk-debuginfo-1.8.0.412-27.102.1 * java-1_8_0-openjdk-1.8.0.412-27.102.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-27.102.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-27.102.1 * java-1_8_0-openjdk-debugsource-1.8.0.412-27.102.1 * java-1_8_0-openjdk-demo-1.8.0.412-27.102.1 * java-1_8_0-openjdk-headless-1.8.0.412-27.102.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-27.102.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226274 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 12:30:05 -0000 Subject: SUSE-RU-2024:2239-1: critical: Recommended update for systemd Message-ID: <171940500569.5259.802071000074382599@smelt2.prg2.suse.org> # Recommended update for systemd Announcement ID: SUSE-RU-2024:2239-1 Rating: critical References: * bsc#1226415 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for systemd contains the following fixes: * testsuite: move a misplaced %endif * Do not remove existing configuration files in /etc. If these files were modified on the systemd, that may cause unwanted side effects (bsc#1226415). * Import upstream commit (merge of v254.13) Use the pty slave fd opened from the namespace when transient service is running in a container. This revert the backport of the broken commit until a fix is released in the v254-stable tree. * Import upstream commit (merge of v254.11) For a complete list of changes, visit: https://github.com/openSUSE/systemd/compare/e8d77af4240894da620de74fbc7823aaaa448fef...85db84ee440eac202c4b5507e96e1704269179bc ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2239=1 openSUSE-SLE-15.6-2024-2239=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2239=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2239=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * systemd-portable-254.13-150600.4.5.1 * systemd-testsuite-254.13-150600.4.5.1 * systemd-mini-debuginfo-254.13-150600.4.5.1 * systemd-mini-container-debuginfo-254.13-150600.4.5.1 * systemd-coredump-254.13-150600.4.5.1 * systemd-debuginfo-254.13-150600.4.5.1 * udev-debuginfo-254.13-150600.4.5.1 * systemd-sysvcompat-debuginfo-254.13-150600.4.5.1 * systemd-network-254.13-150600.4.5.1 * libsystemd0-254.13-150600.4.5.1 * systemd-devel-254.13-150600.4.5.1 * systemd-journal-remote-254.13-150600.4.5.1 * udev-mini-254.13-150600.4.5.1 * libudev1-254.13-150600.4.5.1 * systemd-homed-254.13-150600.4.5.1 * libsystemd0-debuginfo-254.13-150600.4.5.1 * systemd-mini-devel-254.13-150600.4.5.1 * udev-mini-debuginfo-254.13-150600.4.5.1 * systemd-debugsource-254.13-150600.4.5.1 * systemd-mini-container-254.13-150600.4.5.1 * systemd-testsuite-debuginfo-254.13-150600.4.5.1 * systemd-sysvcompat-254.13-150600.4.5.1 * systemd-container-debuginfo-254.13-150600.4.5.1 * systemd-container-254.13-150600.4.5.1 * systemd-254.13-150600.4.5.1 * systemd-portable-debuginfo-254.13-150600.4.5.1 * systemd-homed-debuginfo-254.13-150600.4.5.1 * libudev1-debuginfo-254.13-150600.4.5.1 * udev-254.13-150600.4.5.1 * libsystemd0-mini-254.13-150600.4.5.1 * systemd-mini-debugsource-254.13-150600.4.5.1 * libsystemd0-mini-debuginfo-254.13-150600.4.5.1 * systemd-experimental-254.13-150600.4.5.1 * systemd-mini-254.13-150600.4.5.1 * systemd-journal-remote-debuginfo-254.13-150600.4.5.1 * libudev-mini1-debuginfo-254.13-150600.4.5.1 * libudev-mini1-254.13-150600.4.5.1 * systemd-experimental-debuginfo-254.13-150600.4.5.1 * systemd-network-debuginfo-254.13-150600.4.5.1 * systemd-doc-254.13-150600.4.5.1 * systemd-coredump-debuginfo-254.13-150600.4.5.1 * openSUSE Leap 15.6 (x86_64) * libsystemd0-32bit-debuginfo-254.13-150600.4.5.1 * libudev1-32bit-debuginfo-254.13-150600.4.5.1 * libudev1-32bit-254.13-150600.4.5.1 * systemd-32bit-254.13-150600.4.5.1 * libsystemd0-32bit-254.13-150600.4.5.1 * systemd-32bit-debuginfo-254.13-150600.4.5.1 * openSUSE Leap 15.6 (aarch64 x86_64 i586) * systemd-boot-debuginfo-254.13-150600.4.5.1 * systemd-boot-254.13-150600.4.5.1 * openSUSE Leap 15.6 (noarch) * systemd-lang-254.13-150600.4.5.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libsystemd0-64bit-254.13-150600.4.5.1 * libudev1-64bit-254.13-150600.4.5.1 * libsystemd0-64bit-debuginfo-254.13-150600.4.5.1 * systemd-64bit-debuginfo-254.13-150600.4.5.1 * libudev1-64bit-debuginfo-254.13-150600.4.5.1 * systemd-64bit-254.13-150600.4.5.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * systemd-sysvcompat-254.13-150600.4.5.1 * systemd-container-debuginfo-254.13-150600.4.5.1 * systemd-container-254.13-150600.4.5.1 * systemd-254.13-150600.4.5.1 * systemd-coredump-254.13-150600.4.5.1 * systemd-debuginfo-254.13-150600.4.5.1 * systemd-debugsource-254.13-150600.4.5.1 * systemd-sysvcompat-debuginfo-254.13-150600.4.5.1 * udev-debuginfo-254.13-150600.4.5.1 * libudev1-debuginfo-254.13-150600.4.5.1 * libsystemd0-254.13-150600.4.5.1 * udev-254.13-150600.4.5.1 * systemd-devel-254.13-150600.4.5.1 * systemd-doc-254.13-150600.4.5.1 * systemd-coredump-debuginfo-254.13-150600.4.5.1 * libudev1-254.13-150600.4.5.1 * libsystemd0-debuginfo-254.13-150600.4.5.1 * Basesystem Module 15-SP6 (noarch) * systemd-lang-254.13-150600.4.5.1 * Basesystem Module 15-SP6 (x86_64) * libsystemd0-32bit-debuginfo-254.13-150600.4.5.1 * libudev1-32bit-debuginfo-254.13-150600.4.5.1 * libudev1-32bit-254.13-150600.4.5.1 * systemd-32bit-254.13-150600.4.5.1 * libsystemd0-32bit-254.13-150600.4.5.1 * systemd-32bit-debuginfo-254.13-150600.4.5.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * systemd-debuginfo-254.13-150600.4.5.1 * systemd-debugsource-254.13-150600.4.5.1 * systemd-network-254.13-150600.4.5.1 * systemd-network-debuginfo-254.13-150600.4.5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226415 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 12:30:06 -0000 Subject: SUSE-RU-2024:2238-1: low: Recommended update for libpanel Message-ID: <171940500667.5259.9129159424554164071@smelt2.prg2.suse.org> # Recommended update for libpanel Announcement ID: SUSE-RU-2024:2238-1 Rating: low References: Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for libpanel fixes the following issues: * Choose higher gcc version to build on SLE and Leap 15 * Update the name of libpanel-1-1 to be compliant with https://en.opensuse.org/openSUSE:Shared_library_packaging_policy ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2238=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2238=1 openSUSE-SLE-15.6-2024-2238=1 ## Package List: * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libpanel-1-1-debuginfo-1.4.0-150600.3.3.1 * libpanel-1-1-1.4.0-150600.3.3.1 * libpanel-debugsource-1.4.0-150600.3.3.1 * typelib-1_0-Panel-1-1.4.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libpanel-1-1-1.4.0-150600.3.3.1 * libpanel-1-1-debuginfo-1.4.0-150600.3.3.1 * libpanel-debugsource-1.4.0-150600.3.3.1 * libpanel-devel-1.4.0-150600.3.3.1 * typelib-1_0-Panel-1-1.4.0-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * libpanel-lang-1.4.0-150600.3.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 12:30:08 -0000 Subject: SUSE-RU-2024:2237-1: important: Recommended update for sysconfig Message-ID: <171940500827.5259.10840978671166996590@smelt2.prg2.suse.org> # Recommended update for sysconfig Announcement ID: SUSE-RU-2024:2237-1 Rating: important References: * bsc#1185882 * bsc#1194557 * bsc#1199093 Affected Products: * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that has three fixes can now be installed. ## Description: This update for sysconfig fixes the following issues: * Update to version 0.85.9 * Revert to recommend wicked-service on <= 15.4 * netconfig: remove sed dependency * netconfig/dns-resolver: remove search limit of 6 domains (bsc#1199093) * netconfig: cleanup /var/run leftovers (bsc#1194557) * netconfig: update ntp man page documentation, fix typos * spec: drop legacy migration (from sle11) and rpm-utils * netconfig: revert NM default policy change change (bsc#1185882) With the change to the default policy, netconfig with NetworkManager as network.service accepted settings from all services/programs directly instead only from NetworkManager, where plugins/services have to deliver their settings to apply them ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2237=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2237=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2237=1 ## Package List: * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * sysconfig-debugsource-0.85.9-150400.3.4.1 * sysconfig-netconfig-0.85.9-150400.3.4.1 * sysconfig-0.85.9-150400.3.4.1 * sysconfig-debuginfo-0.85.9-150400.3.4.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * sysconfig-debugsource-0.85.9-150400.3.4.1 * sysconfig-netconfig-0.85.9-150400.3.4.1 * sysconfig-0.85.9-150400.3.4.1 * sysconfig-debuginfo-0.85.9-150400.3.4.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * sysconfig-debugsource-0.85.9-150400.3.4.1 * sysconfig-netconfig-0.85.9-150400.3.4.1 * sysconfig-0.85.9-150400.3.4.1 * sysconfig-debuginfo-0.85.9-150400.3.4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1185882 * https://bugzilla.suse.com/show_bug.cgi?id=1194557 * https://bugzilla.suse.com/show_bug.cgi?id=1199093 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 12:30:10 -0000 Subject: SUSE-RU-2024:2236-1: important: Recommended update for sysconfig Message-ID: <171940501070.5259.7222741328288096381@smelt2.prg2.suse.org> # Recommended update for sysconfig Announcement ID: SUSE-RU-2024:2236-1 Rating: important References: * bsc#1185882 * bsc#1194557 * bsc#1199093 Affected Products: * SUSE Linux Enterprise Micro 5.5 An update that has three fixes can now be installed. ## Description: This update for sysconfig fixes the following issues: * Update to version 0.85.9 * Revert to recommend wicked-service on <= 15.4 * netconfig: remove sed dependency * netconfig/dns-resolver: remove search limit of 6 domains (bsc#1199093) * netconfig: cleanup /var/run leftovers (bsc#1194557) * netconfig: update ntp man page documentation, fix typos * spec: drop legacy migration (from sle11) and rpm-utils * netconfig: revert NM default policy change change (bsc#1185882) With the change to the default policy, netconfig with NetworkManager as network.service accepted settings from all services/programs directly instead only from NetworkManager, where plugins/services have to deliver their settings to apply them ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2236=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * sysconfig-netconfig-0.85.9-150500.3.4.1 * sysconfig-0.85.9-150500.3.4.1 * sysconfig-debugsource-0.85.9-150500.3.4.1 * sysconfig-debuginfo-0.85.9-150500.3.4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1185882 * https://bugzilla.suse.com/show_bug.cgi?id=1194557 * https://bugzilla.suse.com/show_bug.cgi?id=1199093 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 12:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 12:30:12 -0000 Subject: SUSE-RU-2024:2235-1: important: Recommended update for sysconfig Message-ID: <171940501216.5259.14680871205377542628@smelt2.prg2.suse.org> # Recommended update for sysconfig Announcement ID: SUSE-RU-2024:2235-1 Rating: important References: * bsc#1185882 * bsc#1194557 * bsc#1199093 Affected Products: * openSUSE Leap Micro 5.3 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro for Rancher 5.3 An update that has three fixes can now be installed. ## Description: This update for sysconfig fixes the following issues: * Update to version 0.85.9 * Revert to recommend wicked-service on <= 15.4 * netconfig: remove sed dependency * netconfig/dns-resolver: remove search limit of 6 domains (bsc#1199093) * netconfig: cleanup /var/run leftovers (bsc#1194557) * netconfig: update ntp man page documentation, fix typos * spec: drop legacy migration (from sle11) and rpm-utils * netconfig: revert NM default policy change change (bsc#1185882) With the change to the default policy, netconfig with NetworkManager as network.service accepted settings from all services/programs directly instead only from NetworkManager, where plugins/services have to deliver their settings to apply them ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2235=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2235=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2235=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * sysconfig-netconfig-0.85.9-150400.3.3.1 * sysconfig-debugsource-0.85.9-150400.3.3.1 * sysconfig-0.85.9-150400.3.3.1 * sysconfig-debuginfo-0.85.9-150400.3.3.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * sysconfig-netconfig-0.85.9-150400.3.3.1 * sysconfig-debugsource-0.85.9-150400.3.3.1 * sysconfig-0.85.9-150400.3.3.1 * sysconfig-debuginfo-0.85.9-150400.3.3.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * sysconfig-netconfig-0.85.9-150400.3.3.1 * sysconfig-debugsource-0.85.9-150400.3.3.1 * sysconfig-0.85.9-150400.3.3.1 * sysconfig-debuginfo-0.85.9-150400.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1185882 * https://bugzilla.suse.com/show_bug.cgi?id=1194557 * https://bugzilla.suse.com/show_bug.cgi?id=1199093 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 12:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 12:30:14 -0000 Subject: SUSE-RU-2024:2234-1: moderate: Recommended update for suse-module-tools Message-ID: <171940501463.5259.9741207603074192119@smelt2.prg2.suse.org> # Recommended update for suse-module-tools Announcement ID: SUSE-RU-2024:2234-1 Rating: moderate References: * bsc#1224400 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for suse-module-tools fixes the following issue: * Version update, udevrules: activate CPUs on hotplug for s390, too (bsc#1224400) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2234=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2234=1 openSUSE-SLE-15.6-2024-2234=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * suse-module-tools-15.6.10-150600.3.6.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * suse-module-tools-15.6.10-150600.3.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224400 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 12:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 12:30:16 -0000 Subject: SUSE-RU-2024:2233-1: important: Recommended update for util-linux Message-ID: <171940501613.5259.13622257219839517392@smelt2.prg2.suse.org> # Recommended update for util-linux Announcement ID: SUSE-RU-2024:2233-1 Rating: important References: * bsc#1215918 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has one fix can now be installed. ## Description: This update for util-linux fixes the following issue: * fix Xen virtualization type misidentification (bsc#1215918) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2233=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2233=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2233=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2233=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2233=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2233=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2233=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2233=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * util-linux-systemd-debugsource-2.36.2-150300.4.44.11 * util-linux-debugsource-2.36.2-150300.4.44.12 * util-linux-systemd-debuginfo-2.36.2-150300.4.44.11 * libfdisk1-2.36.2-150300.4.44.12 * libuuid1-debuginfo-2.36.2-150300.4.44.12 * libsmartcols1-2.36.2-150300.4.44.12 * libfdisk-devel-2.36.2-150300.4.44.12 * python3-libmount-debugsource-2.36.2-150300.4.44.11 * libblkid-devel-2.36.2-150300.4.44.12 * libsmartcols1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-2.36.2-150300.4.44.12 * python3-libmount-debuginfo-2.36.2-150300.4.44.11 * libuuid1-2.36.2-150300.4.44.12 * libmount-devel-static-2.36.2-150300.4.44.12 * libuuid-devel-2.36.2-150300.4.44.12 * util-linux-systemd-2.36.2-150300.4.44.11 * libfdisk-devel-static-2.36.2-150300.4.44.12 * libmount1-2.36.2-150300.4.44.12 * python3-libmount-2.36.2-150300.4.44.11 * libmount-devel-2.36.2-150300.4.44.12 * uuidd-debuginfo-2.36.2-150300.4.44.11 * libsmartcols-devel-2.36.2-150300.4.44.12 * libuuid-devel-static-2.36.2-150300.4.44.12 * libblkid-devel-static-2.36.2-150300.4.44.12 * util-linux-2.36.2-150300.4.44.12 * libsmartcols-devel-static-2.36.2-150300.4.44.12 * libfdisk1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-debuginfo-2.36.2-150300.4.44.12 * util-linux-debuginfo-2.36.2-150300.4.44.12 * uuidd-2.36.2-150300.4.44.11 * libmount1-debuginfo-2.36.2-150300.4.44.12 * openSUSE Leap 15.3 (x86_64) * libfdisk1-32bit-debuginfo-2.36.2-150300.4.44.12 * libblkid1-32bit-2.36.2-150300.4.44.12 * libmount-devel-32bit-2.36.2-150300.4.44.12 * libmount1-32bit-2.36.2-150300.4.44.12 * libsmartcols-devel-32bit-2.36.2-150300.4.44.12 * libuuid-devel-32bit-2.36.2-150300.4.44.12 * libblkid-devel-32bit-2.36.2-150300.4.44.12 * libmount1-32bit-debuginfo-2.36.2-150300.4.44.12 * libfdisk1-32bit-2.36.2-150300.4.44.12 * libuuid1-32bit-2.36.2-150300.4.44.12 * libfdisk-devel-32bit-2.36.2-150300.4.44.12 * libuuid1-32bit-debuginfo-2.36.2-150300.4.44.12 * libblkid1-32bit-debuginfo-2.36.2-150300.4.44.12 * libsmartcols1-32bit-2.36.2-150300.4.44.12 * libsmartcols1-32bit-debuginfo-2.36.2-150300.4.44.12 * openSUSE Leap 15.3 (noarch) * util-linux-lang-2.36.2-150300.4.44.12 * openSUSE Leap 15.3 (aarch64_ilp32) * libmount1-64bit-2.36.2-150300.4.44.12 * libmount-devel-64bit-2.36.2-150300.4.44.12 * libblkid1-64bit-2.36.2-150300.4.44.12 * libfdisk-devel-64bit-2.36.2-150300.4.44.12 * libfdisk1-64bit-2.36.2-150300.4.44.12 * libsmartcols-devel-64bit-2.36.2-150300.4.44.12 * libsmartcols1-64bit-2.36.2-150300.4.44.12 * libfdisk1-64bit-debuginfo-2.36.2-150300.4.44.12 * libblkid1-64bit-debuginfo-2.36.2-150300.4.44.12 * libuuid1-64bit-debuginfo-2.36.2-150300.4.44.12 * libsmartcols1-64bit-debuginfo-2.36.2-150300.4.44.12 * libuuid-devel-64bit-2.36.2-150300.4.44.12 * libuuid1-64bit-2.36.2-150300.4.44.12 * libmount1-64bit-debuginfo-2.36.2-150300.4.44.12 * libblkid-devel-64bit-2.36.2-150300.4.44.12 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * util-linux-systemd-debugsource-2.36.2-150300.4.44.11 * util-linux-debugsource-2.36.2-150300.4.44.12 * util-linux-systemd-debuginfo-2.36.2-150300.4.44.11 * libfdisk1-2.36.2-150300.4.44.12 * libuuid1-debuginfo-2.36.2-150300.4.44.12 * libsmartcols1-2.36.2-150300.4.44.12 * libfdisk-devel-2.36.2-150300.4.44.12 * libblkid-devel-2.36.2-150300.4.44.12 * libsmartcols1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-2.36.2-150300.4.44.12 * libuuid1-2.36.2-150300.4.44.12 * libuuid-devel-2.36.2-150300.4.44.12 * util-linux-systemd-2.36.2-150300.4.44.11 * libmount1-2.36.2-150300.4.44.12 * libmount-devel-2.36.2-150300.4.44.12 * uuidd-debuginfo-2.36.2-150300.4.44.11 * libsmartcols-devel-2.36.2-150300.4.44.12 * libuuid-devel-static-2.36.2-150300.4.44.12 * libblkid-devel-static-2.36.2-150300.4.44.12 * util-linux-2.36.2-150300.4.44.12 * libfdisk1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-debuginfo-2.36.2-150300.4.44.12 * util-linux-debuginfo-2.36.2-150300.4.44.12 * uuidd-2.36.2-150300.4.44.11 * libmount1-debuginfo-2.36.2-150300.4.44.12 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * util-linux-lang-2.36.2-150300.4.44.12 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libblkid1-32bit-2.36.2-150300.4.44.12 * libmount1-32bit-2.36.2-150300.4.44.12 * libmount1-32bit-debuginfo-2.36.2-150300.4.44.12 * libuuid1-32bit-2.36.2-150300.4.44.12 * libuuid1-32bit-debuginfo-2.36.2-150300.4.44.12 * libblkid1-32bit-debuginfo-2.36.2-150300.4.44.12 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * util-linux-systemd-debugsource-2.36.2-150300.4.44.11 * util-linux-debugsource-2.36.2-150300.4.44.12 * util-linux-systemd-debuginfo-2.36.2-150300.4.44.11 * libfdisk1-2.36.2-150300.4.44.12 * libuuid1-debuginfo-2.36.2-150300.4.44.12 * libsmartcols1-2.36.2-150300.4.44.12 * libfdisk-devel-2.36.2-150300.4.44.12 * libblkid-devel-2.36.2-150300.4.44.12 * libsmartcols1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-2.36.2-150300.4.44.12 * libuuid1-2.36.2-150300.4.44.12 * libuuid-devel-2.36.2-150300.4.44.12 * util-linux-systemd-2.36.2-150300.4.44.11 * libmount1-2.36.2-150300.4.44.12 * libmount-devel-2.36.2-150300.4.44.12 * uuidd-debuginfo-2.36.2-150300.4.44.11 * libsmartcols-devel-2.36.2-150300.4.44.12 * libuuid-devel-static-2.36.2-150300.4.44.12 * libblkid-devel-static-2.36.2-150300.4.44.12 * util-linux-2.36.2-150300.4.44.12 * libfdisk1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-debuginfo-2.36.2-150300.4.44.12 * util-linux-debuginfo-2.36.2-150300.4.44.12 * uuidd-2.36.2-150300.4.44.11 * libmount1-debuginfo-2.36.2-150300.4.44.12 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * util-linux-lang-2.36.2-150300.4.44.12 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libblkid1-32bit-2.36.2-150300.4.44.12 * libmount1-32bit-2.36.2-150300.4.44.12 * libmount1-32bit-debuginfo-2.36.2-150300.4.44.12 * libuuid1-32bit-2.36.2-150300.4.44.12 * libuuid1-32bit-debuginfo-2.36.2-150300.4.44.12 * libblkid1-32bit-debuginfo-2.36.2-150300.4.44.12 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * util-linux-systemd-debugsource-2.36.2-150300.4.44.11 * util-linux-debugsource-2.36.2-150300.4.44.12 * util-linux-systemd-debuginfo-2.36.2-150300.4.44.11 * libfdisk1-2.36.2-150300.4.44.12 * libuuid1-debuginfo-2.36.2-150300.4.44.12 * libsmartcols1-2.36.2-150300.4.44.12 * libfdisk-devel-2.36.2-150300.4.44.12 * libblkid-devel-2.36.2-150300.4.44.12 * libsmartcols1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-2.36.2-150300.4.44.12 * libuuid1-2.36.2-150300.4.44.12 * libuuid-devel-2.36.2-150300.4.44.12 * util-linux-systemd-2.36.2-150300.4.44.11 * libmount1-2.36.2-150300.4.44.12 * libmount-devel-2.36.2-150300.4.44.12 * uuidd-debuginfo-2.36.2-150300.4.44.11 * libsmartcols-devel-2.36.2-150300.4.44.12 * libuuid-devel-static-2.36.2-150300.4.44.12 * libblkid-devel-static-2.36.2-150300.4.44.12 * util-linux-2.36.2-150300.4.44.12 * libfdisk1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-debuginfo-2.36.2-150300.4.44.12 * util-linux-debuginfo-2.36.2-150300.4.44.12 * uuidd-2.36.2-150300.4.44.11 * libmount1-debuginfo-2.36.2-150300.4.44.12 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * util-linux-lang-2.36.2-150300.4.44.12 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libblkid1-32bit-2.36.2-150300.4.44.12 * libmount1-32bit-2.36.2-150300.4.44.12 * libmount1-32bit-debuginfo-2.36.2-150300.4.44.12 * libuuid1-32bit-2.36.2-150300.4.44.12 * libuuid1-32bit-debuginfo-2.36.2-150300.4.44.12 * libblkid1-32bit-debuginfo-2.36.2-150300.4.44.12 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * util-linux-systemd-debugsource-2.36.2-150300.4.44.11 * util-linux-debugsource-2.36.2-150300.4.44.12 * util-linux-systemd-debuginfo-2.36.2-150300.4.44.11 * libfdisk1-2.36.2-150300.4.44.12 * libuuid1-debuginfo-2.36.2-150300.4.44.12 * libsmartcols1-2.36.2-150300.4.44.12 * libfdisk-devel-2.36.2-150300.4.44.12 * libblkid-devel-2.36.2-150300.4.44.12 * libsmartcols1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-2.36.2-150300.4.44.12 * libuuid1-2.36.2-150300.4.44.12 * libuuid-devel-2.36.2-150300.4.44.12 * util-linux-systemd-2.36.2-150300.4.44.11 * libmount1-2.36.2-150300.4.44.12 * libmount-devel-2.36.2-150300.4.44.12 * uuidd-debuginfo-2.36.2-150300.4.44.11 * libsmartcols-devel-2.36.2-150300.4.44.12 * libuuid-devel-static-2.36.2-150300.4.44.12 * libblkid-devel-static-2.36.2-150300.4.44.12 * util-linux-2.36.2-150300.4.44.12 * libfdisk1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-debuginfo-2.36.2-150300.4.44.12 * util-linux-debuginfo-2.36.2-150300.4.44.12 * uuidd-2.36.2-150300.4.44.11 * libmount1-debuginfo-2.36.2-150300.4.44.12 * SUSE Enterprise Storage 7.1 (noarch) * util-linux-lang-2.36.2-150300.4.44.12 * SUSE Enterprise Storage 7.1 (x86_64) * libblkid1-32bit-2.36.2-150300.4.44.12 * libmount1-32bit-2.36.2-150300.4.44.12 * libmount1-32bit-debuginfo-2.36.2-150300.4.44.12 * libuuid1-32bit-2.36.2-150300.4.44.12 * libuuid1-32bit-debuginfo-2.36.2-150300.4.44.12 * libblkid1-32bit-debuginfo-2.36.2-150300.4.44.12 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libfdisk1-debuginfo-2.36.2-150300.4.44.12 * util-linux-systemd-2.36.2-150300.4.44.11 * libsmartcols1-debuginfo-2.36.2-150300.4.44.12 * util-linux-debugsource-2.36.2-150300.4.44.12 * util-linux-systemd-debugsource-2.36.2-150300.4.44.11 * libblkid1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-2.36.2-150300.4.44.12 * libmount1-2.36.2-150300.4.44.12 * libmount1-debuginfo-2.36.2-150300.4.44.12 * libuuid1-2.36.2-150300.4.44.12 * util-linux-debuginfo-2.36.2-150300.4.44.12 * util-linux-systemd-debuginfo-2.36.2-150300.4.44.11 * libuuid1-debuginfo-2.36.2-150300.4.44.12 * util-linux-2.36.2-150300.4.44.12 * libsmartcols1-2.36.2-150300.4.44.12 * libfdisk1-2.36.2-150300.4.44.12 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libfdisk1-debuginfo-2.36.2-150300.4.44.12 * util-linux-systemd-2.36.2-150300.4.44.11 * libsmartcols1-debuginfo-2.36.2-150300.4.44.12 * util-linux-debugsource-2.36.2-150300.4.44.12 * util-linux-systemd-debugsource-2.36.2-150300.4.44.11 * libblkid1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-2.36.2-150300.4.44.12 * libmount1-2.36.2-150300.4.44.12 * libmount1-debuginfo-2.36.2-150300.4.44.12 * libuuid1-2.36.2-150300.4.44.12 * util-linux-debuginfo-2.36.2-150300.4.44.12 * util-linux-systemd-debuginfo-2.36.2-150300.4.44.11 * libuuid1-debuginfo-2.36.2-150300.4.44.12 * util-linux-2.36.2-150300.4.44.12 * libsmartcols1-2.36.2-150300.4.44.12 * libfdisk1-2.36.2-150300.4.44.12 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libfdisk1-debuginfo-2.36.2-150300.4.44.12 * util-linux-systemd-2.36.2-150300.4.44.11 * libsmartcols1-debuginfo-2.36.2-150300.4.44.12 * util-linux-debugsource-2.36.2-150300.4.44.12 * util-linux-systemd-debugsource-2.36.2-150300.4.44.11 * libblkid1-debuginfo-2.36.2-150300.4.44.12 * libblkid1-2.36.2-150300.4.44.12 * libmount1-2.36.2-150300.4.44.12 * libmount1-debuginfo-2.36.2-150300.4.44.12 * libuuid1-2.36.2-150300.4.44.12 * util-linux-debuginfo-2.36.2-150300.4.44.12 * util-linux-systemd-debuginfo-2.36.2-150300.4.44.11 * libuuid1-debuginfo-2.36.2-150300.4.44.12 * util-linux-2.36.2-150300.4.44.12 * libsmartcols1-2.36.2-150300.4.44.12 * libfdisk1-2.36.2-150300.4.44.12 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215918 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 16:30:03 -0000 Subject: SUSE-RU-2024:2242-1: important: Recommended update for wicked Message-ID: <171941940394.875.18000641516739038575@smelt2.prg2.suse.org> # Recommended update for wicked Announcement ID: SUSE-RU-2024:2242-1 Rating: important References: * bsc#1218668 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for wicked fixes the following issues: * Fix VLANs/bonds randomly not coming up after reboot or wicked restart. [bsc#1218668] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2242=1 SUSE-2024-2242=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2242=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2242=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * wicked-0.6.75-150500.3.29.1 * wicked-service-0.6.75-150500.3.29.1 * wicked-nbft-0.6.75-150500.3.29.1 * wicked-debugsource-0.6.75-150500.3.29.1 * wicked-debuginfo-0.6.75-150500.3.29.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * wicked-service-0.6.75-150500.3.29.1 * wicked-0.6.75-150500.3.29.1 * wicked-debuginfo-0.6.75-150500.3.29.1 * wicked-debugsource-0.6.75-150500.3.29.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * wicked-0.6.75-150500.3.29.1 * wicked-service-0.6.75-150500.3.29.1 * wicked-nbft-0.6.75-150500.3.29.1 * wicked-debugsource-0.6.75-150500.3.29.1 * wicked-debuginfo-0.6.75-150500.3.29.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218668 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 16:30:07 -0000 Subject: SUSE-RU-2024:2241-1: important: Recommended update for wicked Message-ID: <171941940763.875.6395738820383949131@smelt2.prg2.suse.org> # Recommended update for wicked Announcement ID: SUSE-RU-2024:2241-1 Rating: important References: * bsc#1218668 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for wicked fixes the following issues: * Fix VLANs/bonds randomly not coming up after reboot or wicked restart. [bsc#1218668] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-2241=1 openSUSE-SLE-15.6-2024-2241=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2241=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * wicked-0.6.75-150600.11.6.1 * wicked-debuginfo-0.6.75-150600.11.6.1 * wicked-nbft-0.6.75-150600.11.6.1 * wicked-service-0.6.75-150600.11.6.1 * wicked-debugsource-0.6.75-150600.11.6.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * wicked-0.6.75-150600.11.6.1 * wicked-debuginfo-0.6.75-150600.11.6.1 * wicked-nbft-0.6.75-150600.11.6.1 * wicked-service-0.6.75-150600.11.6.1 * wicked-debugsource-0.6.75-150600.11.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218668 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 26 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 26 Jun 2024 16:30:09 -0000 Subject: SUSE-RU-2024:2240-1: important: Recommended update for wicked Message-ID: <171941940917.875.17895120019423257654@smelt2.prg2.suse.org> # Recommended update for wicked Announcement ID: SUSE-RU-2024:2240-1 Rating: important References: * bsc#1218668 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has one fix can now be installed. ## Description: This update for wicked fixes the following issues: * Fix VLANs/bonds randomly not coming up after reboot or wicked restart. [bsc#1218668] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2240=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2240=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2240=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2240=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2240=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2240=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2240=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2240=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * wicked-0.6.75-150300.4.32.1 * wicked-debugsource-0.6.75-150300.4.32.1 * wicked-debuginfo-0.6.75-150300.4.32.1 * wicked-service-0.6.75-150300.4.32.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * wicked-0.6.75-150300.4.32.1 * wicked-debugsource-0.6.75-150300.4.32.1 * wicked-debuginfo-0.6.75-150300.4.32.1 * wicked-service-0.6.75-150300.4.32.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * wicked-0.6.75-150300.4.32.1 * wicked-debugsource-0.6.75-150300.4.32.1 * wicked-debuginfo-0.6.75-150300.4.32.1 * wicked-service-0.6.75-150300.4.32.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * wicked-0.6.75-150300.4.32.1 * wicked-debugsource-0.6.75-150300.4.32.1 * wicked-debuginfo-0.6.75-150300.4.32.1 * wicked-service-0.6.75-150300.4.32.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * wicked-0.6.75-150300.4.32.1 * wicked-debugsource-0.6.75-150300.4.32.1 * wicked-debuginfo-0.6.75-150300.4.32.1 * wicked-service-0.6.75-150300.4.32.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * wicked-0.6.75-150300.4.32.1 * wicked-debugsource-0.6.75-150300.4.32.1 * wicked-debuginfo-0.6.75-150300.4.32.1 * wicked-service-0.6.75-150300.4.32.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * wicked-0.6.75-150300.4.32.1 * wicked-debugsource-0.6.75-150300.4.32.1 * wicked-debuginfo-0.6.75-150300.4.32.1 * wicked-service-0.6.75-150300.4.32.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * wicked-0.6.75-150300.4.32.1 * wicked-debugsource-0.6.75-150300.4.32.1 * wicked-debuginfo-0.6.75-150300.4.32.1 * wicked-service-0.6.75-150300.4.32.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218668 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 28 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 28 Jun 2024 12:30:02 -0000 Subject: SUSE-SU-2024:2245-1: important: Security update for frr Message-ID: <171957780289.17371.64184811112265230@smelt2.prg2.suse.org> # Security update for frr Announcement ID: SUSE-SU-2024:2245-1 Rating: important References: * bsc#1216896 * bsc#1216897 * bsc#1216899 * bsc#1216900 Cross-References: * CVE-2023-38406 * CVE-2023-38407 * CVE-2023-47234 * CVE-2023-47235 CVSS scores: * CVE-2023-38406 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38406 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-38407 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38407 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47234 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47234 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47235 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47235 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves four vulnerabilities can now be installed. ## Description: This update for frr fixes the following issues: * CVE-2023-38406: Fixed nlri length of zero mishandling, aka "flowspec overflow". (bsc#1216900) * CVE-2023-47235: Fixed a crash on malformed BGP UPDATE message with an EOR, because the presence of EOR does not lead to a treat-as-withdraw outcome. (bsc#1216896) * CVE-2023-47234: Fixed a crash on crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data. (bsc#1216897) * CVE-2023-38407: Fixed attempts to read beyond the end of the stream during labeled unicast parsing. (bsc#1216899) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2245=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2245=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2245=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2245=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2245=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2245=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2245=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2245=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2245=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2245=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2245=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2245=1 ## Package List: * SUSE Manager Proxy 4.3 (x86_64) * libfrrcares0-debuginfo-7.4-150300.4.26.1 * frr-7.4-150300.4.26.1 * frr-debugsource-7.4-150300.4.26.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1 * libfrrfpm_pb0-7.4-150300.4.26.1 * libfrrsnmp0-7.4-150300.4.26.1 * libfrr0-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-7.4-150300.4.26.1 * frr-devel-7.4-150300.4.26.1 * libmlag_pb0-7.4-150300.4.26.1 * libfrrgrpc_pb0-7.4-150300.4.26.1 * libfrrcares0-7.4-150300.4.26.1 * libfrrzmq0-debuginfo-7.4-150300.4.26.1 * libfrr0-7.4-150300.4.26.1 * libmlag_pb0-debuginfo-7.4-150300.4.26.1 * frr-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-debuginfo-7.4-150300.4.26.1 * libfrrsnmp0-debuginfo-7.4-150300.4.26.1 * libfrrospfapiclient0-7.4-150300.4.26.1 * libfrrzmq0-7.4-150300.4.26.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libfrrcares0-debuginfo-7.4-150300.4.26.1 * frr-7.4-150300.4.26.1 * frr-debugsource-7.4-150300.4.26.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1 * libfrrfpm_pb0-7.4-150300.4.26.1 * libfrrsnmp0-7.4-150300.4.26.1 * libfrr0-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-7.4-150300.4.26.1 * frr-devel-7.4-150300.4.26.1 * libmlag_pb0-7.4-150300.4.26.1 * libfrrgrpc_pb0-7.4-150300.4.26.1 * libfrrcares0-7.4-150300.4.26.1 * libfrrzmq0-debuginfo-7.4-150300.4.26.1 * libfrr0-7.4-150300.4.26.1 * libmlag_pb0-debuginfo-7.4-150300.4.26.1 * frr-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-debuginfo-7.4-150300.4.26.1 * libfrrsnmp0-debuginfo-7.4-150300.4.26.1 * libfrrospfapiclient0-7.4-150300.4.26.1 * libfrrzmq0-7.4-150300.4.26.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libfrrcares0-debuginfo-7.4-150300.4.26.1 * frr-7.4-150300.4.26.1 * frr-debugsource-7.4-150300.4.26.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1 * libfrrfpm_pb0-7.4-150300.4.26.1 * libfrrsnmp0-7.4-150300.4.26.1 * libfrr0-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-7.4-150300.4.26.1 * frr-devel-7.4-150300.4.26.1 * libmlag_pb0-7.4-150300.4.26.1 * libfrrgrpc_pb0-7.4-150300.4.26.1 * libfrrcares0-7.4-150300.4.26.1 * libfrrzmq0-debuginfo-7.4-150300.4.26.1 * libfrr0-7.4-150300.4.26.1 * libmlag_pb0-debuginfo-7.4-150300.4.26.1 * frr-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-debuginfo-7.4-150300.4.26.1 * libfrrsnmp0-debuginfo-7.4-150300.4.26.1 * libfrrospfapiclient0-7.4-150300.4.26.1 * libfrrzmq0-7.4-150300.4.26.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libfrrcares0-debuginfo-7.4-150300.4.26.1 * frr-7.4-150300.4.26.1 * frr-debugsource-7.4-150300.4.26.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1 * libfrrfpm_pb0-7.4-150300.4.26.1 * libfrrsnmp0-7.4-150300.4.26.1 * libfrr0-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-7.4-150300.4.26.1 * frr-devel-7.4-150300.4.26.1 * libmlag_pb0-7.4-150300.4.26.1 * libfrrgrpc_pb0-7.4-150300.4.26.1 * libfrrcares0-7.4-150300.4.26.1 * libfrrzmq0-debuginfo-7.4-150300.4.26.1 * libfrr0-7.4-150300.4.26.1 * libmlag_pb0-debuginfo-7.4-150300.4.26.1 * frr-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-debuginfo-7.4-150300.4.26.1 * libfrrsnmp0-debuginfo-7.4-150300.4.26.1 * libfrrospfapiclient0-7.4-150300.4.26.1 * libfrrzmq0-7.4-150300.4.26.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libfrrcares0-debuginfo-7.4-150300.4.26.1 * frr-7.4-150300.4.26.1 * frr-debugsource-7.4-150300.4.26.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1 * libfrrfpm_pb0-7.4-150300.4.26.1 * libfrrsnmp0-7.4-150300.4.26.1 * libfrr0-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-7.4-150300.4.26.1 * frr-devel-7.4-150300.4.26.1 * libmlag_pb0-7.4-150300.4.26.1 * libfrrgrpc_pb0-7.4-150300.4.26.1 * libfrrcares0-7.4-150300.4.26.1 * libfrrzmq0-debuginfo-7.4-150300.4.26.1 * libfrr0-7.4-150300.4.26.1 * libmlag_pb0-debuginfo-7.4-150300.4.26.1 * frr-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-debuginfo-7.4-150300.4.26.1 * libfrrsnmp0-debuginfo-7.4-150300.4.26.1 * libfrrospfapiclient0-7.4-150300.4.26.1 * libfrrzmq0-7.4-150300.4.26.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libfrrcares0-debuginfo-7.4-150300.4.26.1 * frr-7.4-150300.4.26.1 * frr-debugsource-7.4-150300.4.26.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1 * libfrrfpm_pb0-7.4-150300.4.26.1 * libfrrsnmp0-7.4-150300.4.26.1 * libfrr0-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-7.4-150300.4.26.1 * frr-devel-7.4-150300.4.26.1 * libmlag_pb0-7.4-150300.4.26.1 * libfrrgrpc_pb0-7.4-150300.4.26.1 * libfrrcares0-7.4-150300.4.26.1 * libfrrzmq0-debuginfo-7.4-150300.4.26.1 * libfrr0-7.4-150300.4.26.1 * libmlag_pb0-debuginfo-7.4-150300.4.26.1 * frr-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-debuginfo-7.4-150300.4.26.1 * libfrrsnmp0-debuginfo-7.4-150300.4.26.1 * libfrrospfapiclient0-7.4-150300.4.26.1 * libfrrzmq0-7.4-150300.4.26.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libfrrcares0-debuginfo-7.4-150300.4.26.1 * frr-7.4-150300.4.26.1 * frr-debugsource-7.4-150300.4.26.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1 * libfrrfpm_pb0-7.4-150300.4.26.1 * libfrrsnmp0-7.4-150300.4.26.1 * libfrr0-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-7.4-150300.4.26.1 * frr-devel-7.4-150300.4.26.1 * libmlag_pb0-7.4-150300.4.26.1 * libfrrgrpc_pb0-7.4-150300.4.26.1 * libfrrcares0-7.4-150300.4.26.1 * libfrrzmq0-debuginfo-7.4-150300.4.26.1 * libfrr0-7.4-150300.4.26.1 * libmlag_pb0-debuginfo-7.4-150300.4.26.1 * frr-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-debuginfo-7.4-150300.4.26.1 * libfrrsnmp0-debuginfo-7.4-150300.4.26.1 * libfrrospfapiclient0-7.4-150300.4.26.1 * libfrrzmq0-7.4-150300.4.26.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libfrrcares0-debuginfo-7.4-150300.4.26.1 * frr-7.4-150300.4.26.1 * frr-debugsource-7.4-150300.4.26.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1 * libfrrfpm_pb0-7.4-150300.4.26.1 * libfrrsnmp0-7.4-150300.4.26.1 * libfrr0-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-7.4-150300.4.26.1 * frr-devel-7.4-150300.4.26.1 * libmlag_pb0-7.4-150300.4.26.1 * libfrrgrpc_pb0-7.4-150300.4.26.1 * libfrrcares0-7.4-150300.4.26.1 * libfrrzmq0-debuginfo-7.4-150300.4.26.1 * libfrr0-7.4-150300.4.26.1 * libmlag_pb0-debuginfo-7.4-150300.4.26.1 * frr-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-debuginfo-7.4-150300.4.26.1 * libfrrsnmp0-debuginfo-7.4-150300.4.26.1 * libfrrospfapiclient0-7.4-150300.4.26.1 * libfrrzmq0-7.4-150300.4.26.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libfrrcares0-debuginfo-7.4-150300.4.26.1 * frr-7.4-150300.4.26.1 * frr-debugsource-7.4-150300.4.26.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1 * libfrrfpm_pb0-7.4-150300.4.26.1 * libfrrsnmp0-7.4-150300.4.26.1 * libfrr0-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-7.4-150300.4.26.1 * frr-devel-7.4-150300.4.26.1 * libmlag_pb0-7.4-150300.4.26.1 * libfrrgrpc_pb0-7.4-150300.4.26.1 * libfrrcares0-7.4-150300.4.26.1 * libfrrzmq0-debuginfo-7.4-150300.4.26.1 * libfrr0-7.4-150300.4.26.1 * libmlag_pb0-debuginfo-7.4-150300.4.26.1 * frr-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-debuginfo-7.4-150300.4.26.1 * libfrrsnmp0-debuginfo-7.4-150300.4.26.1 * libfrrospfapiclient0-7.4-150300.4.26.1 * libfrrzmq0-7.4-150300.4.26.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libfrrcares0-debuginfo-7.4-150300.4.26.1 * frr-7.4-150300.4.26.1 * frr-debugsource-7.4-150300.4.26.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1 * libfrrfpm_pb0-7.4-150300.4.26.1 * libfrrsnmp0-7.4-150300.4.26.1 * libfrr0-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-7.4-150300.4.26.1 * frr-devel-7.4-150300.4.26.1 * libmlag_pb0-7.4-150300.4.26.1 * libfrrgrpc_pb0-7.4-150300.4.26.1 * libfrrcares0-7.4-150300.4.26.1 * libfrrzmq0-debuginfo-7.4-150300.4.26.1 * libfrr0-7.4-150300.4.26.1 * libmlag_pb0-debuginfo-7.4-150300.4.26.1 * frr-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-debuginfo-7.4-150300.4.26.1 * libfrrsnmp0-debuginfo-7.4-150300.4.26.1 * libfrrospfapiclient0-7.4-150300.4.26.1 * libfrrzmq0-7.4-150300.4.26.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libfrrcares0-debuginfo-7.4-150300.4.26.1 * frr-7.4-150300.4.26.1 * frr-debugsource-7.4-150300.4.26.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1 * libfrrfpm_pb0-7.4-150300.4.26.1 * libfrrsnmp0-7.4-150300.4.26.1 * libfrr0-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-7.4-150300.4.26.1 * frr-devel-7.4-150300.4.26.1 * libmlag_pb0-7.4-150300.4.26.1 * libfrrgrpc_pb0-7.4-150300.4.26.1 * libfrrcares0-7.4-150300.4.26.1 * libfrrzmq0-debuginfo-7.4-150300.4.26.1 * libfrr0-7.4-150300.4.26.1 * libmlag_pb0-debuginfo-7.4-150300.4.26.1 * frr-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-debuginfo-7.4-150300.4.26.1 * libfrrsnmp0-debuginfo-7.4-150300.4.26.1 * libfrrospfapiclient0-7.4-150300.4.26.1 * libfrrzmq0-7.4-150300.4.26.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libfrrcares0-debuginfo-7.4-150300.4.26.1 * frr-7.4-150300.4.26.1 * frr-debugsource-7.4-150300.4.26.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1 * libfrrfpm_pb0-7.4-150300.4.26.1 * libfrrsnmp0-7.4-150300.4.26.1 * libfrr0-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-7.4-150300.4.26.1 * frr-devel-7.4-150300.4.26.1 * libmlag_pb0-7.4-150300.4.26.1 * libfrrgrpc_pb0-7.4-150300.4.26.1 * libfrrcares0-7.4-150300.4.26.1 * libfrrzmq0-debuginfo-7.4-150300.4.26.1 * libfrr0-7.4-150300.4.26.1 * libmlag_pb0-debuginfo-7.4-150300.4.26.1 * frr-debuginfo-7.4-150300.4.26.1 * libfrr_pb0-debuginfo-7.4-150300.4.26.1 * libfrrsnmp0-debuginfo-7.4-150300.4.26.1 * libfrrospfapiclient0-7.4-150300.4.26.1 * libfrrzmq0-7.4-150300.4.26.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1 ## References: * https://www.suse.com/security/cve/CVE-2023-38406.html * https://www.suse.com/security/cve/CVE-2023-38407.html * https://www.suse.com/security/cve/CVE-2023-47234.html * https://www.suse.com/security/cve/CVE-2023-47235.html * https://bugzilla.suse.com/show_bug.cgi?id=1216896 * https://bugzilla.suse.com/show_bug.cgi?id=1216897 * https://bugzilla.suse.com/show_bug.cgi?id=1216899 * https://bugzilla.suse.com/show_bug.cgi?id=1216900 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 28 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 28 Jun 2024 12:30:05 -0000 Subject: SUSE-FU-2024:2244-1: moderate: Feature update for SAPHanaSR-angi Message-ID: <171957780512.17371.9854582008940267537@smelt2.prg2.suse.org> # Feature update for SAPHanaSR-angi Announcement ID: SUSE-FU-2024:2244-1 Rating: moderate References: * jsc#PED-7359 Affected Products: * openSUSE Leap 15.4 * SAP Applications Module 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that contains one feature can now be installed. ## Description: This update for SAPHanaSR-angi fixes the following issues: * Add SAPHanaSR-angi to SLE-15-SP4:Update (PED-7359) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2244=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-2244=1 ## Package List: * openSUSE Leap 15.4 (noarch) * SAPHanaSR-angi-1.2.7-150400.9.3.1 * SAP Applications Module 15-SP4 (noarch) * SAPHanaSR-angi-1.2.7-150400.9.3.1 ## References: * https://jira.suse.com/browse/PED-7359 -------------- next part -------------- An HTML attachment was scrubbed... URL: