From null at suse.de Tue Oct 1 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Oct 2024 16:30:14 -0000 Subject: SUSE-SU-2024:3507-1: important: Security update for MozillaThunderbird Message-ID: <172780021424.18960.2353761064964612358@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2024:3507-1 Release Date: 2024-10-01T15:02:22Z Rating: important References: * bsc#1184272 * bsc#1226316 * bsc#1228648 * bsc#1229821 Cross-References: * CVE-2024-6600 * CVE-2024-6601 * CVE-2024-6602 * CVE-2024-6603 * CVE-2024-6604 * CVE-2024-6606 * CVE-2024-6607 * CVE-2024-6608 * CVE-2024-6609 * CVE-2024-6610 * CVE-2024-6611 * CVE-2024-6612 * CVE-2024-6613 * CVE-2024-6614 * CVE-2024-6615 * CVE-2024-7518 * CVE-2024-7519 * CVE-2024-7520 * CVE-2024-7521 * CVE-2024-7522 * CVE-2024-7525 * CVE-2024-7526 * CVE-2024-7527 * CVE-2024-7528 * CVE-2024-7529 * CVE-2024-8381 * CVE-2024-8382 * CVE-2024-8384 * CVE-2024-8385 * CVE-2024-8386 * CVE-2024-8387 * CVE-2024-8394 CVSS scores: * CVE-2024-6600 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-6601 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-6602 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L * CVE-2024-6603 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-6604 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-6606 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L * CVE-2024-6607 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-6608 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-6608 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-6609 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L * CVE-2024-6609 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-6610 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L * CVE-2024-6610 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-6611 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-6612 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-6614 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-6615 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-7518 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2024-7518 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-7519 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-7519 ( NVD ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-7520 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-7520 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-7521 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-7521 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-7522 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L * CVE-2024-7522 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-7525 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-7525 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2024-7526 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L * CVE-2024-7526 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-7526 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-7527 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-7527 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-7528 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-7528 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-7529 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2024-7529 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-8381 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-8381 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8382 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-8382 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-8384 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-8384 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8385 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-8385 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8386 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-8386 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-8387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-8387 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8394 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves 32 vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: * Mozilla Thunderbird 128.2.3 MFSA 2024-43 (bsc#1229821) * CVE-2024-8394: Crash when aborting verification of OTR chat. * CVE-2024-8385: WASM type confusion involving ArrayTypes. * CVE-2024-8381: Type confusion when looking up a property name in a "with" block. * CVE-2024-8382: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran. * CVE-2024-8384: Garbage collection could mis-color cross-compartment objects in OOM conditions. * CVE-2024-8386: SelectElements could be shown over another site if popups are allowed. * CVE-2024-8387: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2. MFSA 2024-37 (bsc#1228648) * CVE-2024-7518: Fullscreen notification dialog can be obscured by document content. * CVE-2024-7519: Out of bounds memory access in graphics shared memory handling. * CVE-2024-7520: Type confusion in WebAssembly. * CVE-2024-7521: Incomplete WebAssembly exception handing. * CVE-2024-7522: Out of bounds read in editor component. * CVE-2024-7525: Missing permission check when creating a StreamFilter. * CVE-2024-7526: Uninitialized memory used by WebGL. * CVE-2024-7527: Use-after-free in JavaScript garbage collection. * CVE-2024-7528: Use-after-free in IndexedDB. * CVE-2024-7529: Document content could partially obscure security prompts. MFSA 2024-32 (bsc#1226316) * CVE-2024-6606: Out-of-bounds read in clipboard component. * CVE-2024-6607: Leaving pointerlock by pressing the escape key could be prevented. * CVE-2024-6608: Cursor could be moved out of the viewport using pointerlock. * CVE-2024-6609: Memory corruption in NSS. * CVE-2024-6610: Form validation popups could block exiting full-screen mode. * CVE-2024-6600: Memory corruption in WebGL API. * CVE-2024-6601: Race condition in permission assignment. * CVE-2024-6602: Memory corruption in NSS. * CVE-2024-6603: Memory corruption in thread creation. * CVE-2024-6611: Incorrect handling of SameSite cookies. * CVE-2024-6612: CSP violation leakage when using devtools. * CVE-2024-6613: Incorrect listing of stack frames. * CVE-2024-6614: Incorrect listing of stack frames. * CVE-2024-6604: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, Thunderbird 128, and Thunderbird 115.13. * CVE-2024-6615: Memory safety bugs fixed in Firefox 128 and Thunderbird 128. Bug fixes: \- Recommend libfido2-udev in order to try to get security keys (e.g. Yubikeys) working out of the box. (bsc#1184272) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3507=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3507=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3507=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3507=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3507=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3507=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3507=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-debugsource-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-other-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-common-128.2.3-150200.8.177.1 * MozillaThunderbird-128.2.3-150200.8.177.1 * MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-debugsource-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-other-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-common-128.2.3-150200.8.177.1 * MozillaThunderbird-128.2.3-150200.8.177.1 * MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * MozillaThunderbird-debugsource-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-other-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-common-128.2.3-150200.8.177.1 * MozillaThunderbird-128.2.3-150200.8.177.1 * MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-debugsource-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-other-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-common-128.2.3-150200.8.177.1 * MozillaThunderbird-128.2.3-150200.8.177.1 * MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * MozillaThunderbird-debugsource-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-other-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-common-128.2.3-150200.8.177.1 * MozillaThunderbird-128.2.3-150200.8.177.1 * MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * MozillaThunderbird-debugsource-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-other-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-common-128.2.3-150200.8.177.1 * MozillaThunderbird-128.2.3-150200.8.177.1 * MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-debugsource-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-other-128.2.3-150200.8.177.1 * MozillaThunderbird-translations-common-128.2.3-150200.8.177.1 * MozillaThunderbird-128.2.3-150200.8.177.1 * MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6600.html * https://www.suse.com/security/cve/CVE-2024-6601.html * https://www.suse.com/security/cve/CVE-2024-6602.html * https://www.suse.com/security/cve/CVE-2024-6603.html * https://www.suse.com/security/cve/CVE-2024-6604.html * https://www.suse.com/security/cve/CVE-2024-6606.html * https://www.suse.com/security/cve/CVE-2024-6607.html * https://www.suse.com/security/cve/CVE-2024-6608.html * https://www.suse.com/security/cve/CVE-2024-6609.html * https://www.suse.com/security/cve/CVE-2024-6610.html * https://www.suse.com/security/cve/CVE-2024-6611.html * https://www.suse.com/security/cve/CVE-2024-6612.html * https://www.suse.com/security/cve/CVE-2024-6613.html * https://www.suse.com/security/cve/CVE-2024-6614.html * https://www.suse.com/security/cve/CVE-2024-6615.html * https://www.suse.com/security/cve/CVE-2024-7518.html * https://www.suse.com/security/cve/CVE-2024-7519.html * https://www.suse.com/security/cve/CVE-2024-7520.html * https://www.suse.com/security/cve/CVE-2024-7521.html * https://www.suse.com/security/cve/CVE-2024-7522.html * https://www.suse.com/security/cve/CVE-2024-7525.html * https://www.suse.com/security/cve/CVE-2024-7526.html * https://www.suse.com/security/cve/CVE-2024-7527.html * https://www.suse.com/security/cve/CVE-2024-7528.html * https://www.suse.com/security/cve/CVE-2024-7529.html * https://www.suse.com/security/cve/CVE-2024-8381.html * https://www.suse.com/security/cve/CVE-2024-8382.html * https://www.suse.com/security/cve/CVE-2024-8384.html * https://www.suse.com/security/cve/CVE-2024-8385.html * https://www.suse.com/security/cve/CVE-2024-8386.html * https://www.suse.com/security/cve/CVE-2024-8387.html * https://www.suse.com/security/cve/CVE-2024-8394.html * https://bugzilla.suse.com/show_bug.cgi?id=1184272 * https://bugzilla.suse.com/show_bug.cgi?id=1226316 * https://bugzilla.suse.com/show_bug.cgi?id=1228648 * https://bugzilla.suse.com/show_bug.cgi?id=1229821 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 1 16:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Oct 2024 16:30:17 -0000 Subject: SUSE-SU-2024:3505-1: moderate: Security update for OpenIPMI Message-ID: <172780021701.18960.946595140878571774@smelt2.prg2.suse.org> # Security update for OpenIPMI Announcement ID: SUSE-SU-2024:3505-1 Release Date: 2024-10-01T14:43:37Z Rating: moderate References: * bsc#1229910 Cross-References: * CVE-2024-42934 CVSS scores: * CVE-2024-42934 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-42934 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for OpenIPMI fixes the following issues: * CVE-2024-42934: crash or message authentication bypass on IPMI simulator due to missing bounds check. (bsc#1229910) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3505=1 openSUSE-SLE-15.6-2024-3505=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3505=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * OpenIPMI-debugsource-2.0.31-150600.10.3.1 * OpenIPMI-python3-debuginfo-2.0.31-150600.10.3.1 * OpenIPMI-debuginfo-2.0.31-150600.10.3.1 * OpenIPMI-python3-2.0.31-150600.10.3.1 * libOpenIPMI0-debuginfo-2.0.31-150600.10.3.1 * OpenIPMI-2.0.31-150600.10.3.1 * OpenIPMI-devel-2.0.31-150600.10.3.1 * libOpenIPMI0-2.0.31-150600.10.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * OpenIPMI-debugsource-2.0.31-150600.10.3.1 * OpenIPMI-debuginfo-2.0.31-150600.10.3.1 * libOpenIPMI0-debuginfo-2.0.31-150600.10.3.1 * OpenIPMI-2.0.31-150600.10.3.1 * OpenIPMI-devel-2.0.31-150600.10.3.1 * libOpenIPMI0-2.0.31-150600.10.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-42934.html * https://bugzilla.suse.com/show_bug.cgi?id=1229910 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 1 16:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Oct 2024 16:30:20 -0000 Subject: SUSE-RU-2024:3504-1: moderate: Recommended update for glibc Message-ID: <172780022054.18960.15263211987966526937@smelt2.prg2.suse.org> # Recommended update for glibc Announcement ID: SUSE-RU-2024:3504-1 Release Date: 2024-10-01T14:22:36Z Rating: moderate References: * bsc#1230638 Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for glibc fixes the following issue: * Use nss-systemd by default also in SLE (bsc#1230638). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3504=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3504=1 openSUSE-SLE-15.6-2024-3504=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3504=1 ## Package List: * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * glibc-utils-2.38-150600.14.11.2 * glibc-devel-static-2.38-150600.14.11.2 * glibc-utils-src-debugsource-2.38-150600.14.11.2 * glibc-debuginfo-2.38-150600.14.11.2 * glibc-debugsource-2.38-150600.14.11.2 * glibc-utils-debuginfo-2.38-150600.14.11.2 * Development Tools Module 15-SP6 (x86_64) * glibc-devel-32bit-debuginfo-2.38-150600.14.11.2 * glibc-devel-32bit-2.38-150600.14.11.2 * glibc-32bit-debuginfo-2.38-150600.14.11.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586 i686) * glibc-locale-base-debuginfo-2.38-150600.14.11.2 * glibc-devel-2.38-150600.14.11.2 * glibc-devel-static-2.38-150600.14.11.2 * glibc-devel-debuginfo-2.38-150600.14.11.2 * libnsl1-2.38-150600.14.11.2 * glibc-profile-2.38-150600.14.11.2 * glibc-debuginfo-2.38-150600.14.11.2 * glibc-locale-2.38-150600.14.11.2 * glibc-locale-base-2.38-150600.14.11.2 * glibc-debugsource-2.38-150600.14.11.2 * glibc-2.38-150600.14.11.2 * libnsl1-debuginfo-2.38-150600.14.11.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * glibc-extra-2.38-150600.14.11.2 * glibc-utils-2.38-150600.14.11.2 * glibc-utils-src-debugsource-2.38-150600.14.11.2 * glibc-extra-debuginfo-2.38-150600.14.11.2 * nscd-debuginfo-2.38-150600.14.11.2 * glibc-utils-debuginfo-2.38-150600.14.11.2 * nscd-2.38-150600.14.11.2 * openSUSE Leap 15.6 (noarch) * glibc-lang-2.38-150600.14.11.2 * glibc-html-2.38-150600.14.11.2 * glibc-info-2.38-150600.14.11.2 * glibc-i18ndata-2.38-150600.14.11.2 * openSUSE Leap 15.6 (x86_64) * glibc-locale-base-32bit-debuginfo-2.38-150600.14.11.2 * glibc-profile-32bit-2.38-150600.14.11.2 * libnsl1-32bit-2.38-150600.14.11.2 * glibc-utils-32bit-debuginfo-2.38-150600.14.11.2 * glibc-32bit-2.38-150600.14.11.2 * glibc-devel-static-32bit-2.38-150600.14.11.2 * libnsl1-32bit-debuginfo-2.38-150600.14.11.2 * glibc-devel-32bit-2.38-150600.14.11.2 * glibc-32bit-debuginfo-2.38-150600.14.11.2 * glibc-locale-base-32bit-2.38-150600.14.11.2 * glibc-devel-32bit-debuginfo-2.38-150600.14.11.2 * glibc-utils-32bit-2.38-150600.14.11.2 * openSUSE Leap 15.6 (aarch64_ilp32) * glibc-devel-64bit-debuginfo-2.38-150600.14.11.2 * glibc-utils-64bit-debuginfo-2.38-150600.14.11.2 * glibc-devel-static-64bit-2.38-150600.14.11.2 * libnsl1-64bit-2.38-150600.14.11.2 * libnsl1-64bit-debuginfo-2.38-150600.14.11.2 * glibc-locale-base-64bit-2.38-150600.14.11.2 * glibc-64bit-2.38-150600.14.11.2 * glibc-profile-64bit-2.38-150600.14.11.2 * glibc-locale-base-64bit-debuginfo-2.38-150600.14.11.2 * glibc-devel-64bit-2.38-150600.14.11.2 * glibc-64bit-debuginfo-2.38-150600.14.11.2 * glibc-utils-64bit-2.38-150600.14.11.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * glibc-locale-base-debuginfo-2.38-150600.14.11.2 * glibc-extra-2.38-150600.14.11.2 * glibc-devel-2.38-150600.14.11.2 * glibc-devel-debuginfo-2.38-150600.14.11.2 * libnsl1-2.38-150600.14.11.2 * glibc-profile-2.38-150600.14.11.2 * glibc-debuginfo-2.38-150600.14.11.2 * glibc-locale-2.38-150600.14.11.2 * glibc-extra-debuginfo-2.38-150600.14.11.2 * glibc-debugsource-2.38-150600.14.11.2 * glibc-locale-base-2.38-150600.14.11.2 * nscd-debuginfo-2.38-150600.14.11.2 * glibc-2.38-150600.14.11.2 * nscd-2.38-150600.14.11.2 * libnsl1-debuginfo-2.38-150600.14.11.2 * Basesystem Module 15-SP6 (noarch) * glibc-lang-2.38-150600.14.11.2 * glibc-i18ndata-2.38-150600.14.11.2 * glibc-info-2.38-150600.14.11.2 * Basesystem Module 15-SP6 (x86_64) * glibc-locale-base-32bit-debuginfo-2.38-150600.14.11.2 * libnsl1-32bit-2.38-150600.14.11.2 * glibc-32bit-2.38-150600.14.11.2 * libnsl1-32bit-debuginfo-2.38-150600.14.11.2 * glibc-32bit-debuginfo-2.38-150600.14.11.2 * glibc-locale-base-32bit-2.38-150600.14.11.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230638 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 1 16:30:23 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Oct 2024 16:30:23 -0000 Subject: SUSE-RU-2024:3503-1: moderate: Recommended update for glibc Message-ID: <172780022344.18960.12230308061327149708@smelt2.prg2.suse.org> # Recommended update for glibc Announcement ID: SUSE-RU-2024:3503-1 Release Date: 2024-10-01T14:14:15Z Rating: moderate References: * bsc#1228661 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for glibc fixes the following issue: * fix memory malloc problem: Initiate tcache shutdown even without allocations (bsc#1228661). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3503=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3503=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3503=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3503=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3503=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3503=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3503=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3503=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3503=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3503=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3503=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3503=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3503=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3503=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3503=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3503=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3503=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3503=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3503=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3503=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3503=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3503=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3503=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3503=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3503=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * glibc-utils-2.31-150300.89.2 * glibc-extra-2.31-150300.89.2 * glibc-devel-static-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-utils-src-debugsource-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-utils-debuginfo-2.31-150300.89.2 * nscd-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * openSUSE Leap 15.3 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-html-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * openSUSE Leap 15.3 (i686) * glibc-2.31-150300.89.1 * glibc-devel-static-2.31-150300.89.1 * glibc-locale-2.31-150300.89.1 * glibc-devel-debuginfo-2.31-150300.89.1 * glibc-profile-2.31-150300.89.1 * glibc-locale-base-2.31-150300.89.1 * glibc-debuginfo-2.31-150300.89.1 * glibc-debugsource-2.31-150300.89.1 * glibc-locale-base-debuginfo-2.31-150300.89.1 * glibc-devel-2.31-150300.89.1 * openSUSE Leap 15.3 (x86_64) * glibc-utils-32bit-debuginfo-2.31-150300.89.2 * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-2.31-150300.89.1 * glibc-utils-32bit-2.31-150300.89.2 * glibc-profile-32bit-2.31-150300.89.1 * glibc-32bit-2.31-150300.89.1 * glibc-devel-static-32bit-2.31-150300.89.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-debuginfo-2.31-150300.89.1 * openSUSE Leap 15.3 (aarch64_ilp32) * glibc-utils-64bit-2.31-150300.89.2 * glibc-devel-64bit-2.31-150300.89.2 * glibc-devel-static-64bit-2.31-150300.89.2 * glibc-profile-64bit-2.31-150300.89.2 * glibc-64bit-debuginfo-2.31-150300.89.2 * glibc-utils-64bit-debuginfo-2.31-150300.89.2 * glibc-locale-base-64bit-debuginfo-2.31-150300.89.2 * glibc-devel-64bit-debuginfo-2.31-150300.89.2 * glibc-64bit-2.31-150300.89.2 * glibc-locale-base-64bit-2.31-150300.89.2 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * glibc-utils-2.31-150300.89.2 * glibc-extra-2.31-150300.89.2 * glibc-devel-static-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-utils-src-debugsource-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-utils-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * nscd-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * openSUSE Leap 15.5 (x86_64) * glibc-utils-32bit-debuginfo-2.31-150300.89.2 * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-2.31-150300.89.1 * glibc-utils-32bit-2.31-150300.89.2 * glibc-profile-32bit-2.31-150300.89.1 * glibc-32bit-2.31-150300.89.1 * glibc-devel-static-32bit-2.31-150300.89.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-debuginfo-2.31-150300.89.1 * openSUSE Leap 15.5 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-html-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * glibc-extra-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * nscd-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * Basesystem Module 15-SP5 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * Basesystem Module 15-SP5 (x86_64) * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-32bit-2.31-150300.89.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * glibc-devel-static-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-utils-src-debugsource-2.31-150300.89.2 * glibc-utils-debuginfo-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-utils-2.31-150300.89.2 * Development Tools Module 15-SP5 (x86_64) * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-2.31-150300.89.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * glibc-utils-2.31-150300.89.2 * glibc-extra-2.31-150300.89.2 * glibc-devel-static-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-utils-src-debugsource-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-utils-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * nscd-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-2.31-150300.89.1 * glibc-32bit-2.31-150300.89.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-debuginfo-2.31-150300.89.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * glibc-utils-2.31-150300.89.2 * glibc-extra-2.31-150300.89.2 * glibc-devel-static-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-utils-src-debugsource-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-utils-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * nscd-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-2.31-150300.89.1 * glibc-32bit-2.31-150300.89.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-debuginfo-2.31-150300.89.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * glibc-utils-2.31-150300.89.2 * glibc-extra-2.31-150300.89.2 * glibc-devel-static-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-utils-src-debugsource-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-utils-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * nscd-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-2.31-150300.89.1 * glibc-32bit-2.31-150300.89.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-debuginfo-2.31-150300.89.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * glibc-extra-2.31-150300.89.2 * glibc-devel-static-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-devel-32bit-2.31-150300.89.1 * glibc-debuginfo-2.31-150300.89.2 * glibc-utils-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-utils-debuginfo-2.31-150300.89.2 * glibc-32bit-2.31-150300.89.1 * glibc-devel-debuginfo-2.31-150300.89.2 * glibc-devel-32bit-debuginfo-2.31-150300.89.1 * glibc-profile-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-utils-src-debugsource-2.31-150300.89.2 * nscd-2.31-150300.89.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * glibc-utils-2.31-150300.89.2 * glibc-extra-2.31-150300.89.2 * glibc-devel-static-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-utils-src-debugsource-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-utils-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * nscd-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-2.31-150300.89.1 * glibc-32bit-2.31-150300.89.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-debuginfo-2.31-150300.89.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * glibc-utils-2.31-150300.89.2 * glibc-extra-2.31-150300.89.2 * glibc-devel-static-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-utils-src-debugsource-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-utils-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * nscd-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-2.31-150300.89.1 * glibc-32bit-2.31-150300.89.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-debuginfo-2.31-150300.89.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * glibc-utils-2.31-150300.89.2 * glibc-extra-2.31-150300.89.2 * glibc-devel-static-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-utils-src-debugsource-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-utils-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * nscd-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-2.31-150300.89.1 * glibc-32bit-2.31-150300.89.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-debuginfo-2.31-150300.89.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * glibc-utils-2.31-150300.89.2 * glibc-extra-2.31-150300.89.2 * glibc-devel-static-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-utils-src-debugsource-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-utils-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * nscd-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-2.31-150300.89.1 * glibc-32bit-2.31-150300.89.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-debuginfo-2.31-150300.89.1 * SUSE Manager Proxy 4.3 (x86_64) * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-extra-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-32bit-2.31-150300.89.1 * nscd-2.31-150300.89.2 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Manager Proxy 4.3 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-extra-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-32bit-2.31-150300.89.1 * nscd-2.31-150300.89.2 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * glibc-extra-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * nscd-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Manager Server 4.3 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Manager Server 4.3 (x86_64) * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-32bit-2.31-150300.89.1 * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * glibc-utils-2.31-150300.89.2 * glibc-extra-2.31-150300.89.2 * glibc-devel-static-2.31-150300.89.2 * glibc-debugsource-2.31-150300.89.2 * glibc-profile-2.31-150300.89.2 * glibc-utils-src-debugsource-2.31-150300.89.2 * glibc-extra-debuginfo-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-utils-debuginfo-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * nscd-debuginfo-2.31-150300.89.2 * nscd-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * glibc-devel-debuginfo-2.31-150300.89.2 * SUSE Enterprise Storage 7.1 (noarch) * glibc-info-2.31-150300.89.2 * glibc-lang-2.31-150300.89.2 * glibc-i18ndata-2.31-150300.89.2 * SUSE Enterprise Storage 7.1 (x86_64) * glibc-locale-base-32bit-2.31-150300.89.1 * glibc-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-2.31-150300.89.1 * glibc-32bit-2.31-150300.89.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.89.1 * glibc-devel-32bit-debuginfo-2.31-150300.89.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.89.2 * glibc-locale-base-2.31-150300.89.2 * glibc-locale-2.31-150300.89.2 * glibc-2.31-150300.89.2 * glibc-debuginfo-2.31-150300.89.2 * glibc-locale-base-debuginfo-2.31-150300.89.2 * glibc-devel-2.31-150300.89.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228661 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 1 16:30:25 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Oct 2024 16:30:25 -0000 Subject: SUSE-SU-2024:3502-1: moderate: Security update for openvpn Message-ID: <172780022579.18960.12812511332341389840@smelt2.prg2.suse.org> # Security update for openvpn Announcement ID: SUSE-SU-2024:3502-1 Release Date: 2024-10-01T14:03:57Z Rating: moderate References: * bsc#1227546 Cross-References: * CVE-2024-28882 CVSS scores: * CVE-2024-28882 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for openvpn fixes the following issues: * CVE-2024-28882: Fix multiple exit notifications from authenticated clients will extend the validity of a closing session (bsc#1227546) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3502=1 openSUSE-SLE-15.6-2024-3502=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3502=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * openvpn-down-root-plugin-debuginfo-2.6.8-150600.3.3.1 * openvpn-2.6.8-150600.3.3.1 * openvpn-auth-pam-plugin-2.6.8-150600.3.3.1 * openvpn-devel-2.6.8-150600.3.3.1 * openvpn-down-root-plugin-2.6.8-150600.3.3.1 * openvpn-debuginfo-2.6.8-150600.3.3.1 * openvpn-debugsource-2.6.8-150600.3.3.1 * openvpn-auth-pam-plugin-debuginfo-2.6.8-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * openvpn-2.6.8-150600.3.3.1 * openvpn-auth-pam-plugin-2.6.8-150600.3.3.1 * openvpn-devel-2.6.8-150600.3.3.1 * openvpn-debuginfo-2.6.8-150600.3.3.1 * openvpn-debugsource-2.6.8-150600.3.3.1 * openvpn-auth-pam-plugin-debuginfo-2.6.8-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28882.html * https://bugzilla.suse.com/show_bug.cgi?id=1227546 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 1 16:30:28 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Oct 2024 16:30:28 -0000 Subject: SUSE-SU-2024:3501-1: important: Security update for openssl-3 Message-ID: <172780022833.18960.8152411850676549245@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2024:3501-1 Release Date: 2024-10-01T14:03:42Z Rating: important References: * bsc#1230698 Cross-References: * CVE-2024-41996 CVSS scores: * CVE-2024-41996 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41996 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2024-41996: Validating the order of the public keys in the Diffie- Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers to trigger expensive server-side DHE (bsc#1230698) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3501=1 openSUSE-SLE-15.6-2024-3501=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3501=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * openssl-3-3.1.4-150600.5.18.1 * libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.18.1 * openssl-3-debuginfo-3.1.4-150600.5.18.1 * libopenssl3-debuginfo-3.1.4-150600.5.18.1 * libopenssl-3-fips-provider-3.1.4-150600.5.18.1 * libopenssl3-3.1.4-150600.5.18.1 * openssl-3-debugsource-3.1.4-150600.5.18.1 * libopenssl-3-devel-3.1.4-150600.5.18.1 * openSUSE Leap 15.6 (x86_64) * libopenssl3-32bit-debuginfo-3.1.4-150600.5.18.1 * libopenssl-3-devel-32bit-3.1.4-150600.5.18.1 * libopenssl-3-fips-provider-32bit-3.1.4-150600.5.18.1 * libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.18.1 * libopenssl3-32bit-3.1.4-150600.5.18.1 * openSUSE Leap 15.6 (noarch) * openssl-3-doc-3.1.4-150600.5.18.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libopenssl-3-devel-64bit-3.1.4-150600.5.18.1 * libopenssl3-64bit-debuginfo-3.1.4-150600.5.18.1 * libopenssl-3-fips-provider-64bit-debuginfo-3.1.4-150600.5.18.1 * libopenssl-3-fips-provider-64bit-3.1.4-150600.5.18.1 * libopenssl3-64bit-3.1.4-150600.5.18.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * openssl-3-3.1.4-150600.5.18.1 * libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.18.1 * openssl-3-debuginfo-3.1.4-150600.5.18.1 * libopenssl3-debuginfo-3.1.4-150600.5.18.1 * libopenssl-3-fips-provider-3.1.4-150600.5.18.1 * libopenssl3-3.1.4-150600.5.18.1 * openssl-3-debugsource-3.1.4-150600.5.18.1 * libopenssl-3-devel-3.1.4-150600.5.18.1 * Basesystem Module 15-SP6 (x86_64) * libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.18.1 * libopenssl3-32bit-3.1.4-150600.5.18.1 * libopenssl3-32bit-debuginfo-3.1.4-150600.5.18.1 * libopenssl-3-fips-provider-32bit-3.1.4-150600.5.18.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41996.html * https://bugzilla.suse.com/show_bug.cgi?id=1230698 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 1 20:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Oct 2024 20:30:01 -0000 Subject: SUSE-RU-2024:3509-1: moderate: Optional update for python-django-cffi Message-ID: <172781460130.21943.11386774016718691849@smelt2.prg2.suse.org> # Optional update for python-django-cffi Announcement ID: SUSE-RU-2024:3509-1 Release Date: 2024-10-01T18:56:47Z Rating: moderate References: Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that can now be installed. ## Description: This update for python-django-cffi ships the missing python3-django-cffi to openSUSE Leap 15.6 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3509=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3509=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3509=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3509=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-argon2-cffi-debuginfo-19.2.0-150200.3.2.1 * python3-argon2-cffi-19.2.0-150200.3.2.1 * python-argon2-cffi-debugsource-19.2.0-150200.3.2.1 * python3-argon2-cffi-debuginfo-19.2.0-150200.3.2.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python-argon2-cffi-debuginfo-19.2.0-150200.3.2.1 * python3-argon2-cffi-19.2.0-150200.3.2.1 * python-argon2-cffi-debugsource-19.2.0-150200.3.2.1 * python3-argon2-cffi-debuginfo-19.2.0-150200.3.2.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * python-argon2-cffi-debuginfo-19.2.0-150200.3.2.1 * python3-argon2-cffi-19.2.0-150200.3.2.1 * python-argon2-cffi-debugsource-19.2.0-150200.3.2.1 * python3-argon2-cffi-debuginfo-19.2.0-150200.3.2.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * python-argon2-cffi-debuginfo-19.2.0-150200.3.2.1 * python3-argon2-cffi-19.2.0-150200.3.2.1 * python-argon2-cffi-debugsource-19.2.0-150200.3.2.1 * python3-argon2-cffi-debuginfo-19.2.0-150200.3.2.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 1 20:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Oct 2024 20:30:02 -0000 Subject: SUSE-RU-2024:3508-1: moderate: Recommended update for rt-tests Message-ID: <172781460274.21943.15145515134727784287@smelt2.prg2.suse.org> # Recommended update for rt-tests Announcement ID: SUSE-RU-2024:3508-1 Release Date: 2024-10-01T16:34:42Z Rating: moderate References: * jsc#PED-10335 * jsc#PED-8941 Affected Products: * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Real Time Module 15-SP6 An update that contains two features can now be installed. ## Description: This update for rt-tests fixes the following issues: * Version update for SLERT15 SP6 (jsc#PED-8941, jsc#PED-10335). * Fix archive URL * Start using xz tarball (instead of gz) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Real Time Module 15-SP6 zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2024-3508=1 ## Package List: * SUSE Real Time Module 15-SP6 (x86_64) * rt-tests-debugsource-2.7-150600.3.3.2 * rt-tests-2.7-150600.3.3.2 * rt-tests-debuginfo-2.7-150600.3.3.2 ## References: * https://jira.suse.com/browse/PED-10335 * https://jira.suse.com/browse/PED-8941 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 2 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Oct 2024 12:30:04 -0000 Subject: SUSE-SU-2024:3510-1: important: Security update for tomcat Message-ID: <172787220466.21943.10148239885113457323@smelt2.prg2.suse.org> # Security update for tomcat Announcement ID: SUSE-SU-2024:3510-1 Release Date: 2024-10-02T11:03:35Z Rating: important References: * bsc#1230986 Cross-References: * CVE-2024-38286 CVSS scores: * CVE-2024-38286 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-38286 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for tomcat fixes the following issues: * CVE-2024-38286: OutOfMemory exception triggered through abuse of the TLS handshake process. (bsc#1230986) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3510=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3510=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3510=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * tomcat-el-3_0-api-9.0.36-3.130.1 * tomcat-javadoc-9.0.36-3.130.1 * tomcat-jsp-2_3-api-9.0.36-3.130.1 * tomcat-admin-webapps-9.0.36-3.130.1 * tomcat-webapps-9.0.36-3.130.1 * tomcat-lib-9.0.36-3.130.1 * tomcat-9.0.36-3.130.1 * tomcat-docs-webapp-9.0.36-3.130.1 * tomcat-servlet-4_0-api-9.0.36-3.130.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * tomcat-el-3_0-api-9.0.36-3.130.1 * tomcat-javadoc-9.0.36-3.130.1 * tomcat-jsp-2_3-api-9.0.36-3.130.1 * tomcat-admin-webapps-9.0.36-3.130.1 * tomcat-webapps-9.0.36-3.130.1 * tomcat-lib-9.0.36-3.130.1 * tomcat-9.0.36-3.130.1 * tomcat-docs-webapp-9.0.36-3.130.1 * tomcat-servlet-4_0-api-9.0.36-3.130.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * tomcat-el-3_0-api-9.0.36-3.130.1 * tomcat-javadoc-9.0.36-3.130.1 * tomcat-jsp-2_3-api-9.0.36-3.130.1 * tomcat-admin-webapps-9.0.36-3.130.1 * tomcat-webapps-9.0.36-3.130.1 * tomcat-lib-9.0.36-3.130.1 * tomcat-9.0.36-3.130.1 * tomcat-docs-webapp-9.0.36-3.130.1 * tomcat-servlet-4_0-api-9.0.36-3.130.1 ## References: * https://www.suse.com/security/cve/CVE-2024-38286.html * https://bugzilla.suse.com/show_bug.cgi?id=1230986 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 2 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Oct 2024 16:30:03 -0000 Subject: SUSE-SU-2024:3158-3: important: Security update for postgresql16 Message-ID: <172788660321.30274.11857878646232134755@smelt2.prg2.suse.org> # Security update for postgresql16 Announcement ID: SUSE-SU-2024:3158-3 Release Date: 2024-10-02T15:11:48Z Rating: important References: * bsc#1229013 Cross-References: * CVE-2024-7348 CVSS scores: * CVE-2024-7348 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-7348 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Legacy Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql16 fixes the following issues: * Upgrade to 15.8 (bsc#1229013) * CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes arbitrary SQL. (bsc#1229013) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3158=1 ## Package List: * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * postgresql15-server-devel-15.8-150600.16.6.1 * postgresql15-contrib-15.8-150600.16.6.1 * postgresql15-pltcl-debuginfo-15.8-150600.16.6.1 * postgresql15-pltcl-15.8-150600.16.6.1 * postgresql15-server-devel-debuginfo-15.8-150600.16.6.1 * postgresql15-devel-debuginfo-15.8-150600.16.6.1 * postgresql15-debuginfo-15.8-150600.16.6.1 * postgresql15-plpython-debuginfo-15.8-150600.16.6.1 * postgresql15-server-debuginfo-15.8-150600.16.6.1 * postgresql15-plpython-15.8-150600.16.6.1 * postgresql15-devel-15.8-150600.16.6.1 * postgresql15-15.8-150600.16.6.1 * postgresql15-server-15.8-150600.16.6.1 * postgresql15-contrib-debuginfo-15.8-150600.16.6.1 * postgresql15-plperl-debuginfo-15.8-150600.16.6.1 * postgresql15-debugsource-15.8-150600.16.6.1 * postgresql15-plperl-15.8-150600.16.6.1 * Legacy Module 15-SP6 (noarch) * postgresql15-docs-15.8-150600.16.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-7348.html * https://bugzilla.suse.com/show_bug.cgi?id=1229013 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 2 20:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Oct 2024 20:30:09 -0000 Subject: SUSE-RU-2024:3512-1: important: Recommended update for systemd Message-ID: <172790100981.1329.3465556589397744994@smelt2.prg2.suse.org> # Recommended update for systemd Announcement ID: SUSE-RU-2024:3512-1 Release Date: 2024-10-02T16:15:09Z Rating: important References: * bsc#1226414 * bsc#1228091 * bsc#1228223 * bsc#1228809 * bsc#1229518 * jsc#PED-5659 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that contains one feature and has five fixes can now be installed. ## Description: This update for systemd fixes the following issues: * Determine the effective user limits in a systemd setup (jsc#PED-5659) * Don't try to restart the udev socket units anymore. (bsc#1228809). * Add systemd.rules rework (bsc#1229518). * Don't mention any rpm macros inside comments, even if escaped (bsc#1228091). * upstream commit (bsc#1226414). * Make the 32bit version of libudev.so available again (bsc#1228223). * policykit-1 renamed to polkitd ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3512=1 openSUSE-SLE-15.6-2024-3512=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3512=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3512=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * systemd-journal-remote-debuginfo-254.18-150600.4.15.10 * libsystemd0-mini-254.18-150600.4.15.4 * systemd-portable-debuginfo-254.18-150600.4.15.10 * systemd-doc-254.18-150600.4.15.10 * systemd-network-debuginfo-254.18-150600.4.15.10 * systemd-mini-container-debuginfo-254.18-150600.4.15.4 * systemd-homed-254.18-150600.4.15.10 * libudev1-debuginfo-254.18-150600.4.15.10 * systemd-mini-devel-254.18-150600.4.15.4 * systemd-homed-debuginfo-254.18-150600.4.15.10 * systemd-mini-debuginfo-254.18-150600.4.15.4 * udev-debuginfo-254.18-150600.4.15.10 * systemd-portable-254.18-150600.4.15.10 * udev-254.18-150600.4.15.10 * systemd-debuginfo-254.18-150600.4.15.10 * systemd-journal-remote-254.18-150600.4.15.10 * systemd-testsuite-debuginfo-254.18-150600.4.15.10 * systemd-debugsource-254.18-150600.4.15.10 * systemd-254.18-150600.4.15.10 * systemd-mini-254.18-150600.4.15.4 * libudev1-254.18-150600.4.15.10 * libudev-mini1-debuginfo-254.18-150600.4.15.4 * libudev-mini1-254.18-150600.4.15.4 * systemd-devel-254.18-150600.4.15.10 * systemd-sysvcompat-debuginfo-254.18-150600.4.15.10 * libsystemd0-debuginfo-254.18-150600.4.15.10 * libsystemd0-mini-debuginfo-254.18-150600.4.15.4 * systemd-network-254.18-150600.4.15.10 * systemd-experimental-debuginfo-254.18-150600.4.15.10 * udev-mini-debuginfo-254.18-150600.4.15.4 * systemd-container-254.18-150600.4.15.10 * systemd-testsuite-254.18-150600.4.15.10 * systemd-container-debuginfo-254.18-150600.4.15.10 * udev-mini-254.18-150600.4.15.4 * systemd-coredump-debuginfo-254.18-150600.4.15.10 * systemd-mini-container-254.18-150600.4.15.4 * systemd-experimental-254.18-150600.4.15.10 * systemd-coredump-254.18-150600.4.15.10 * systemd-sysvcompat-254.18-150600.4.15.10 * libsystemd0-254.18-150600.4.15.10 * systemd-mini-debugsource-254.18-150600.4.15.4 * openSUSE Leap 15.6 (x86_64) * libsystemd0-32bit-debuginfo-254.18-150600.4.15.10 * systemd-32bit-254.18-150600.4.15.10 * libsystemd0-32bit-254.18-150600.4.15.10 * systemd-32bit-debuginfo-254.18-150600.4.15.10 * libudev1-32bit-debuginfo-254.18-150600.4.15.10 * systemd-devel-32bit-254.18-150600.4.15.10 * libudev1-32bit-254.18-150600.4.15.10 * openSUSE Leap 15.6 (aarch64 x86_64 i586) * systemd-boot-254.18-150600.4.15.10 * systemd-boot-debuginfo-254.18-150600.4.15.10 * openSUSE Leap 15.6 (noarch) * systemd-lang-254.18-150600.4.15.10 * openSUSE Leap 15.6 (aarch64_ilp32) * systemd-devel-64bit-254.18-150600.4.15.10 * libsystemd0-64bit-254.18-150600.4.15.10 * libsystemd0-64bit-debuginfo-254.18-150600.4.15.10 * systemd-64bit-254.18-150600.4.15.10 * systemd-64bit-debuginfo-254.18-150600.4.15.10 * libudev1-64bit-debuginfo-254.18-150600.4.15.10 * libudev1-64bit-254.18-150600.4.15.10 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libudev1-254.18-150600.4.15.10 * udev-debuginfo-254.18-150600.4.15.10 * systemd-container-254.18-150600.4.15.10 * udev-254.18-150600.4.15.10 * systemd-container-debuginfo-254.18-150600.4.15.10 * systemd-debuginfo-254.18-150600.4.15.10 * systemd-doc-254.18-150600.4.15.10 * systemd-journal-remote-254.18-150600.4.15.10 * systemd-devel-254.18-150600.4.15.10 * systemd-coredump-debuginfo-254.18-150600.4.15.10 * systemd-debugsource-254.18-150600.4.15.10 * systemd-254.18-150600.4.15.10 * systemd-coredump-254.18-150600.4.15.10 * systemd-sysvcompat-254.18-150600.4.15.10 * libudev1-debuginfo-254.18-150600.4.15.10 * systemd-sysvcompat-debuginfo-254.18-150600.4.15.10 * libsystemd0-254.18-150600.4.15.10 * libsystemd0-debuginfo-254.18-150600.4.15.10 * Basesystem Module 15-SP6 (noarch) * systemd-lang-254.18-150600.4.15.10 * Basesystem Module 15-SP6 (x86_64) * libsystemd0-32bit-debuginfo-254.18-150600.4.15.10 * systemd-32bit-254.18-150600.4.15.10 * libsystemd0-32bit-254.18-150600.4.15.10 * systemd-32bit-debuginfo-254.18-150600.4.15.10 * libudev1-32bit-debuginfo-254.18-150600.4.15.10 * libudev1-32bit-254.18-150600.4.15.10 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * systemd-network-254.18-150600.4.15.10 * systemd-debuginfo-254.18-150600.4.15.10 * systemd-debugsource-254.18-150600.4.15.10 * systemd-network-debuginfo-254.18-150600.4.15.10 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226414 * https://bugzilla.suse.com/show_bug.cgi?id=1228091 * https://bugzilla.suse.com/show_bug.cgi?id=1228223 * https://bugzilla.suse.com/show_bug.cgi?id=1228809 * https://bugzilla.suse.com/show_bug.cgi?id=1229518 * https://jira.suse.com/browse/PED-5659 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 2 20:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Oct 2024 20:30:16 -0000 Subject: SUSE-RU-2024:3511-1: important: Recommended update for crmsh Message-ID: <172790101659.1329.694857348223453074@smelt2.prg2.suse.org> # Recommended update for crmsh Announcement ID: SUSE-RU-2024:3511-1 Release Date: 2024-10-02T16:07:20Z Rating: important References: * bsc#1228251 * bsc#1228271 * bsc#1228899 * bsc#1229093 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has four fixes can now be installed. ## Description: This update for crmsh fixes the following issues: * Update to version 4.5.1+20240920.16b5eae: * Fix: bootstrap: check is_nologin more robustly (bsc#1228251). * Dev: report: add a reminder to use `crm cluster health` (bsc#1228899). * Dev: ui_cluster: add a reminder to use "crm cluster init/join ssh" to initialize ssh (bsc#1228899). * Dev: scripts: add a reminder to use `crm cluster health` to fix hacluster passwordless ssh authentication (bsc#1228899). * Dev: ui_cluster: add subcommand 'crm cluster health hawk2 [--fix]' (bsc#1228899). * Dev: scripts: generate readable messages when ssh authentication fails (bsc#1228899). * Fix: report: should not try interactive authentication when stdin is no a tty (bsc#1228899). * Fix: report: should not try to su if effective uid != 0 (bsc#1228899). * Dev: main: remove upgradeutil (bsc#1228899). * Fix: utils: Stop providing the detailed and precise sudoers rules to "hack" the privilege (bsc#1229093). * Version update: * Fix: utils: allow haclient group to use cluster level commands (bsc#1228271). * Fix: scripts: call commands as current user when running as hacluster (bsc#1228271). * Fix: prun: allow pcopy_to_remote to use intercept (bsc#1228271). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3511=1 openSUSE-SLE-15.5-2024-3511=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3511=1 ## Package List: * openSUSE Leap 15.5 (noarch) * crmsh-4.5.1+20240920.16b5eae-150500.3.39.3 * crmsh-scripts-4.5.1+20240920.16b5eae-150500.3.39.3 * crmsh-test-4.5.1+20240920.16b5eae-150500.3.39.3 * SUSE Linux Enterprise High Availability Extension 15 SP5 (noarch) * crmsh-4.5.1+20240920.16b5eae-150500.3.39.3 * crmsh-scripts-4.5.1+20240920.16b5eae-150500.3.39.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228251 * https://bugzilla.suse.com/show_bug.cgi?id=1228271 * https://bugzilla.suse.com/show_bug.cgi?id=1228899 * https://bugzilla.suse.com/show_bug.cgi?id=1229093 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 3 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Oct 2024 12:30:10 -0000 Subject: SUSE-SU-2024:3516-1: moderate: Security update for libpcap Message-ID: <172795861077.22224.9341172991374990975@smelt2.prg2.suse.org> # Security update for libpcap Announcement ID: SUSE-SU-2024:3516-1 Release Date: 2024-10-03T11:33:46Z Rating: moderate References: * bsc#1230020 * bsc#1230034 Cross-References: * CVE-2023-7256 * CVE-2024-8006 CVSS scores: * CVE-2023-7256 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-7256 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7256 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8006 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2024-8006 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8006 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves two vulnerabilities can now be installed. ## Description: This update for libpcap fixes the following issues: * CVE-2024-8006: NULL pointer dereference in function pcap_findalldevs_ex(). (bsc#1230034) * CVE-2023-7256: double free via struct addrinfo in function sock_initaddress(). (bsc#1230020) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3516=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3516=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3516=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3516=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libpcap-devel-static-1.9.1-150300.3.3.1 * libpcap1-debuginfo-1.9.1-150300.3.3.1 * libpcap-debugsource-1.9.1-150300.3.3.1 * libpcap1-1.9.1-150300.3.3.1 * libpcap-devel-1.9.1-150300.3.3.1 * openSUSE Leap 15.3 (x86_64) * libpcap-devel-32bit-1.9.1-150300.3.3.1 * libpcap1-32bit-debuginfo-1.9.1-150300.3.3.1 * libpcap1-32bit-1.9.1-150300.3.3.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libpcap-devel-64bit-1.9.1-150300.3.3.1 * libpcap1-64bit-debuginfo-1.9.1-150300.3.3.1 * libpcap1-64bit-1.9.1-150300.3.3.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libpcap1-debuginfo-1.9.1-150300.3.3.1 * libpcap-debugsource-1.9.1-150300.3.3.1 * libpcap1-1.9.1-150300.3.3.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libpcap1-debuginfo-1.9.1-150300.3.3.1 * libpcap-debugsource-1.9.1-150300.3.3.1 * libpcap1-1.9.1-150300.3.3.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libpcap1-debuginfo-1.9.1-150300.3.3.1 * libpcap-debugsource-1.9.1-150300.3.3.1 * libpcap1-1.9.1-150300.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-7256.html * https://www.suse.com/security/cve/CVE-2024-8006.html * https://bugzilla.suse.com/show_bug.cgi?id=1230020 * https://bugzilla.suse.com/show_bug.cgi?id=1230034 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 3 12:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Oct 2024 12:30:16 -0000 Subject: SUSE-SU-2024:3515-1: moderate: Security update for expat Message-ID: <172795861659.22224.11228051243250699795@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2024:3515-1 Release Date: 2024-10-03T11:33:36Z Rating: moderate References: * bsc#1229930 * bsc#1229931 * bsc#1229932 Cross-References: * CVE-2024-45490 * CVE-2024-45491 * CVE-2024-45492 CVSS scores: * CVE-2024-45490 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45491 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45492 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves three vulnerabilities can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2024-45492: integer overflow in function nextScaffoldPart. (bsc#1229932) * CVE-2024-45491: integer overflow in dtdCopy. (bsc#1229931) * CVE-2024-45490: negative length for XML_ParseBuffer not rejected. (bsc#1229930) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3515=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3515=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3515=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libexpat1-2.2.5-150000.3.30.1 * expat-debugsource-2.2.5-150000.3.30.1 * libexpat1-debuginfo-2.2.5-150000.3.30.1 * expat-debuginfo-2.2.5-150000.3.30.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libexpat1-2.2.5-150000.3.30.1 * expat-debugsource-2.2.5-150000.3.30.1 * libexpat1-debuginfo-2.2.5-150000.3.30.1 * expat-debuginfo-2.2.5-150000.3.30.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libexpat1-2.2.5-150000.3.30.1 * expat-debugsource-2.2.5-150000.3.30.1 * libexpat1-debuginfo-2.2.5-150000.3.30.1 * expat-debuginfo-2.2.5-150000.3.30.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45490.html * https://www.suse.com/security/cve/CVE-2024-45491.html * https://www.suse.com/security/cve/CVE-2024-45492.html * https://bugzilla.suse.com/show_bug.cgi?id=1229930 * https://bugzilla.suse.com/show_bug.cgi?id=1229931 * https://bugzilla.suse.com/show_bug.cgi?id=1229932 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 3 12:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Oct 2024 12:30:18 -0000 Subject: SUSE-RU-2024:3514-1: moderate: Recommended update for ipvsadm Message-ID: <172795861874.22224.15080549437767859900@smelt2.prg2.suse.org> # Recommended update for ipvsadm Announcement ID: SUSE-RU-2024:3514-1 Release Date: 2024-10-03T11:31:20Z Rating: moderate References: * bsc#1013581 Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for ipvsadm fixes the following issue: * fixed systemd service file to restore correct config file at start (/etc/ipvsadm.rules) and do not break boot-time config at stop (bsc#1013581). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-3514=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-3514=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * ipvsadm-debugsource-1.26-21.4.1 * ipvsadm-debuginfo-1.26-21.4.1 * ipvsadm-1.26-21.4.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64) * ipvsadm-debugsource-1.26-21.4.1 * ipvsadm-debuginfo-1.26-21.4.1 * ipvsadm-1.26-21.4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1013581 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 3 12:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Oct 2024 12:30:20 -0000 Subject: SUSE-RU-2024:3513-1: moderate: Recommended update for hawk2 Message-ID: <172795862016.22224.9330079661731965485@smelt2.prg2.suse.org> # Recommended update for hawk2 Announcement ID: SUSE-RU-2024:3513-1 Release Date: 2024-10-03T08:15:53Z Rating: moderate References: Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that can now be installed. ## Description: This update for hawk2 fixes the following issues: * Added docstring to functions in hawk_test * Added test_check_cluster_configuration for 15aee3b2 * Bumped js-routes version * Check rsc stonith is in maintenance by either of 2 keywords * Dev: rename 'Score' to 'Kind' * Extend the test_check_cluster_configuration * Fixed cibtools: adjust to the new cibadmin format * Increase the test delays back, as they were before * Update copyright year from 2018 to 2024 * Updated sanity check for passwd existance * Updated validation for the newer versions of rails * Updateed the drop-down boxes in the Cluster Configuration * Use crm_attribute --list-options ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3513=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3513=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-3513=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-3513=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-3513=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3513=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3513=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1 * hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 3 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Oct 2024 16:30:04 -0000 Subject: SUSE-SU-2024:3519-1: important: Security update for MozillaFirefox Message-ID: <172797300416.22224.7902509504077376718@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2024:3519-1 Release Date: 2024-10-03T13:06:48Z Rating: important References: * bsc#1230979 Affected Products: * Desktop Applications Module 15-SP5 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one security fix can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 128.3.0 ESR (MFSA-2024-47, bsc#1230979): * CVE-2024-8900: Clipboard write permission bypass * CVE-2024-9392: Compromised content process can bypass site isolation * CVE-2024-9393: Cross-origin access to PDF contents through multipart responses * CVE-2024-9394: Cross-origin access to JSON contents through multipart responses * CVE-2024-9396: Potential memory corruption may occur when cloning certain objects * CVE-2024-9397: Potential directory upload bypass via clickjacking * CVE-2024-9398: External protocol handlers could be enumerated via popups * CVE-2024-9399: Specially crafted WebTransport requests could lead to denial of service * CVE-2024-9400: Potential memory corruption during JIT compilation * CVE-2024-9401: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 * CVE-2024-9402: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3519=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3519=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3519=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3519=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3519=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3519=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3519=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3519=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3519=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3519=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3519=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3519=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3519=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3519=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3519=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3519=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * SUSE Enterprise Storage 7.1 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-branding-upstream-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * openSUSE Leap 15.5 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-branding-upstream-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * openSUSE Leap 15.6 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * Desktop Applications Module 15-SP5 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * Desktop Applications Module 15-SP6 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * MozillaFirefox-debuginfo-128.3.0-150200.152.152.1 * MozillaFirefox-debugsource-128.3.0-150200.152.152.1 * MozillaFirefox-translations-other-128.3.0-150200.152.152.1 * MozillaFirefox-translations-common-128.3.0-150200.152.152.1 * MozillaFirefox-128.3.0-150200.152.152.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * MozillaFirefox-devel-128.3.0-150200.152.152.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230979 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 3 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Oct 2024 16:30:07 -0000 Subject: SUSE-SU-2024:3518-1: important: Security update for MozillaFirefox Message-ID: <172797300784.22224.14818023323071742652@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2024:3518-1 Release Date: 2024-10-03T13:04:34Z Rating: important References: * bsc#1230979 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that has one security fix can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 128.3.0 ESR (MFSA-2024-47, bsc#1230979): * CVE-2024-8900: Clipboard write permission bypass * CVE-2024-9392: Compromised content process can bypass site isolation * CVE-2024-9393: Cross-origin access to PDF contents through multipart responses * CVE-2024-9394: Cross-origin access to JSON contents through multipart responses * CVE-2024-9396: Potential memory corruption may occur when cloning certain objects * CVE-2024-9397: Potential directory upload bypass via clickjacking * CVE-2024-9398: External protocol handlers could be enumerated via popups * CVE-2024-9399: Specially crafted WebTransport requests could lead to denial of service * CVE-2024-9400: Potential memory corruption during JIT compilation * CVE-2024-9401: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 * CVE-2024-9402: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3518=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3518=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3518=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3518=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * MozillaFirefox-128.3.0-112.228.1 * MozillaFirefox-debugsource-128.3.0-112.228.1 * MozillaFirefox-debuginfo-128.3.0-112.228.1 * MozillaFirefox-translations-common-128.3.0-112.228.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * MozillaFirefox-devel-128.3.0-112.228.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.3.0-112.228.1 * MozillaFirefox-debugsource-128.3.0-112.228.1 * MozillaFirefox-debuginfo-128.3.0-112.228.1 * MozillaFirefox-translations-common-128.3.0-112.228.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * MozillaFirefox-devel-128.3.0-112.228.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * MozillaFirefox-128.3.0-112.228.1 * MozillaFirefox-debugsource-128.3.0-112.228.1 * MozillaFirefox-debuginfo-128.3.0-112.228.1 * MozillaFirefox-translations-common-128.3.0-112.228.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * MozillaFirefox-devel-128.3.0-112.228.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debugsource-128.3.0-112.228.1 * MozillaFirefox-debuginfo-128.3.0-112.228.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch) * MozillaFirefox-devel-128.3.0-112.228.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230979 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 3 16:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Oct 2024 16:30:16 -0000 Subject: SUSE-SU-2024:3517-1: low: Security update for opensc Message-ID: <172797301648.22224.7987962081636531433@smelt2.prg2.suse.org> # Security update for opensc Announcement ID: SUSE-SU-2024:3517-1 Release Date: 2024-10-03T12:03:40Z Rating: low References: * bsc#1217722 * bsc#1230071 * bsc#1230072 * bsc#1230073 * bsc#1230074 * bsc#1230075 * bsc#1230076 * bsc#1230364 Cross-References: * CVE-2024-45615 * CVE-2024-45616 * CVE-2024-45617 * CVE-2024-45618 * CVE-2024-45619 * CVE-2024-45620 * CVE-2024-8443 CVSS scores: * CVE-2024-45615 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45615 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45615 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45615 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45616 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45616 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45616 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45616 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45617 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45617 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45617 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45617 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45618 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45618 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45618 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45618 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45619 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45619 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45619 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45619 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45620 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45620 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45620 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45620 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-8443 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8443 ( SUSE ): 3.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-8443 ( NVD ): 2.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-8443 ( NVD ): 2.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves seven vulnerabilities and has one security fix can now be installed. ## Description: This update for opensc fixes the following issues: * CVE-2024-45620: Incorrect handling of the length of buffers or files in pkcs15init. (bsc#1230076) * CVE-2024-45619: Incorrect handling length of buffers or files in libopensc. (bsc#1230075) * CVE-2024-45618: Uninitialized values after incorrect or missing checking return values of functions in pkcs15init. (bsc#1230074) * CVE-2024-45617: Uninitialized values after incorrect or missing checking return values of functions in libopensc. (bsc#1230073) * CVE-2024-45616: Uninitialized values after incorrect check or usage of APDU response values in libopensc. (bsc#1230072) * CVE-2024-45615: Usage of uninitialized values in libopensc and pkcs15init. (bsc#1230071) * CVE-2024-8443: Heap buffer overflow in OpenPGP driver when generating key. (bsc#1230364) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3517=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3517=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3517=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * opensc-debuginfo-0.19.0-150100.3.31.1 * opensc-debugsource-0.19.0-150100.3.31.1 * opensc-0.19.0-150100.3.31.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * opensc-debuginfo-0.19.0-150100.3.31.1 * opensc-debugsource-0.19.0-150100.3.31.1 * opensc-0.19.0-150100.3.31.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * opensc-debuginfo-0.19.0-150100.3.31.1 * opensc-debugsource-0.19.0-150100.3.31.1 * opensc-0.19.0-150100.3.31.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45615.html * https://www.suse.com/security/cve/CVE-2024-45616.html * https://www.suse.com/security/cve/CVE-2024-45617.html * https://www.suse.com/security/cve/CVE-2024-45618.html * https://www.suse.com/security/cve/CVE-2024-45619.html * https://www.suse.com/security/cve/CVE-2024-45620.html * https://www.suse.com/security/cve/CVE-2024-8443.html * https://bugzilla.suse.com/show_bug.cgi?id=1217722 * https://bugzilla.suse.com/show_bug.cgi?id=1230071 * https://bugzilla.suse.com/show_bug.cgi?id=1230072 * https://bugzilla.suse.com/show_bug.cgi?id=1230073 * https://bugzilla.suse.com/show_bug.cgi?id=1230074 * https://bugzilla.suse.com/show_bug.cgi?id=1230075 * https://bugzilla.suse.com/show_bug.cgi?id=1230076 * https://bugzilla.suse.com/show_bug.cgi?id=1230364 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 08:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 08:30:06 -0000 Subject: SUSE-RU-2024:3521-1: moderate: Recommended update for dracut Message-ID: <172803060659.22224.5707615461263129385@smelt2.prg2.suse.org> # Recommended update for dracut Announcement ID: SUSE-RU-2024:3521-1 Release Date: 2024-10-04T07:29:55Z Rating: moderate References: * bsc#1230110 * bsc#1230330 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for dracut fixes the following issue: * Version update, check for presence of legacy rules (bsc#1230330). * Version update, handle all possible options in `rd.dasd` (bsc#1230110). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3521=1 openSUSE-SLE-15.5-2024-3521=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3521=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3521=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3521=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * dracut-fips-055+suse.396.g701c6212-150500.3.29.2 * dracut-extra-055+suse.396.g701c6212-150500.3.29.2 * dracut-ima-055+suse.396.g701c6212-150500.3.29.2 * dracut-mkinitrd-deprecated-055+suse.396.g701c6212-150500.3.29.2 * dracut-debuginfo-055+suse.396.g701c6212-150500.3.29.2 * dracut-debugsource-055+suse.396.g701c6212-150500.3.29.2 * dracut-tools-055+suse.396.g701c6212-150500.3.29.2 * dracut-055+suse.396.g701c6212-150500.3.29.2 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * dracut-055+suse.396.g701c6212-150500.3.29.2 * dracut-fips-055+suse.396.g701c6212-150500.3.29.2 * dracut-debuginfo-055+suse.396.g701c6212-150500.3.29.2 * dracut-debugsource-055+suse.396.g701c6212-150500.3.29.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * dracut-055+suse.396.g701c6212-150500.3.29.2 * dracut-fips-055+suse.396.g701c6212-150500.3.29.2 * dracut-debuginfo-055+suse.396.g701c6212-150500.3.29.2 * dracut-debugsource-055+suse.396.g701c6212-150500.3.29.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * dracut-fips-055+suse.396.g701c6212-150500.3.29.2 * dracut-ima-055+suse.396.g701c6212-150500.3.29.2 * dracut-mkinitrd-deprecated-055+suse.396.g701c6212-150500.3.29.2 * dracut-debuginfo-055+suse.396.g701c6212-150500.3.29.2 * dracut-debugsource-055+suse.396.g701c6212-150500.3.29.2 * dracut-055+suse.396.g701c6212-150500.3.29.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230110 * https://bugzilla.suse.com/show_bug.cgi?id=1230330 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 08:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 08:30:10 -0000 Subject: SUSE-RU-2024:3520-1: moderate: Recommended update for yast2-iscsi-client Message-ID: <172803061079.22224.7883082167121279007@smelt2.prg2.suse.org> # Recommended update for yast2-iscsi-client Announcement ID: SUSE-RU-2024:3520-1 Release Date: 2024-10-04T07:25:12Z Rating: moderate References: * bsc#1228084 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for yast2-iscsi-client fixes the following issues: * Bug fixing (bsc#1228084): * Inst client: Read sessions just after auto login in order to enable services at the end of the installation if needed. * Finish client: enable iscsiuio.service instead of the socket. * Use ip command for reading the ip address of a given device instead of the deprecated ifconfig command. * Version update to 4.6.3 . ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3520=1 openSUSE-SLE-15.6-2024-3520=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3520=1 ## Package List: * openSUSE Leap 15.6 (noarch) * yast2-iscsi-client-4.6.3-150600.3.6.2 * Basesystem Module 15-SP6 (noarch) * yast2-iscsi-client-4.6.3-150600.3.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228084 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 12:30:08 -0000 Subject: SUSE-RU-2024:3522-1: moderate: Recommended update for dracut Message-ID: <172804500870.22224.12555054506610736194@smelt2.prg2.suse.org> # Recommended update for dracut Announcement ID: SUSE-RU-2024:3522-1 Release Date: 2024-10-04T08:02:44Z Rating: moderate References: * bsc#1230110 * bsc#1230330 * bsc#1230468 * bsc#1230639 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has four fixes can now be installed. ## Description: This update for dracut fixes the following issues: * Version update 059+suse.541.g3c2df232: * fix(dasd-rules): handle all possible options in `rd.dasd` (bsc#1230110). * fix(dracut.spec): add Builddeps for initrd posttrans macros (bsc#1230639). * fix(zfcp_rules): check for presence of legacy rules (bsc#1230330). * Fixes for NVMeoF boot (bsc#1230468) * fix(nvmf): install (only) required nvmf modules * fix(nvmf): require NVMeoF modules * fix(nvmf): move /etc/nvme/host{nqn,id} requirement to hostonly ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3522=1 openSUSE-SLE-15.6-2024-3522=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3522=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3522=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * dracut-fips-059+suse.541.g3c2df232-150600.3.11.2 * dracut-tools-059+suse.541.g3c2df232-150600.3.11.2 * dracut-debugsource-059+suse.541.g3c2df232-150600.3.11.2 * dracut-059+suse.541.g3c2df232-150600.3.11.2 * dracut-mkinitrd-deprecated-059+suse.541.g3c2df232-150600.3.11.2 * dracut-debuginfo-059+suse.541.g3c2df232-150600.3.11.2 * dracut-extra-059+suse.541.g3c2df232-150600.3.11.2 * dracut-ima-059+suse.541.g3c2df232-150600.3.11.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * dracut-fips-059+suse.541.g3c2df232-150600.3.11.2 * dracut-debugsource-059+suse.541.g3c2df232-150600.3.11.2 * dracut-059+suse.541.g3c2df232-150600.3.11.2 * dracut-debuginfo-059+suse.541.g3c2df232-150600.3.11.2 * dracut-ima-059+suse.541.g3c2df232-150600.3.11.2 * SUSE Linux Enterprise High Availability Extension 15 SP6 (ppc64le x86_64) * dracut-debugsource-059+suse.541.g3c2df232-150600.3.11.2 * dracut-mkinitrd-deprecated-059+suse.541.g3c2df232-150600.3.11.2 * dracut-debuginfo-059+suse.541.g3c2df232-150600.3.11.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230110 * https://bugzilla.suse.com/show_bug.cgi?id=1230330 * https://bugzilla.suse.com/show_bug.cgi?id=1230468 * https://bugzilla.suse.com/show_bug.cgi?id=1230639 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 16:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 16:30:08 -0000 Subject: SUSE-SU-2024:3533-1: important: Security update for pcp Message-ID: <172805940856.21943.16885418822067616919@smelt2.prg2.suse.org> # Security update for pcp Announcement ID: SUSE-SU-2024:3533-1 Release Date: 2024-10-04T14:40:38Z Rating: important References: * bsc#1217826 * bsc#1222121 * bsc#1222815 * bsc#1230551 * bsc#1230552 * jsc#PED-8192 * jsc#PED-8389 Cross-References: * CVE-2023-6917 * CVE-2024-3019 * CVE-2024-45769 * CVE-2024-45770 CVSS scores: * CVE-2023-6917 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-3019 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45770 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2024-45770 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-45770 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities, contains two features and has one security fix can now be installed. ## Description: This update for pcp fixes the following issues: pcp was updated from version 5.3.7 to version 6.2.0 (jsc#PED-8192, jsc#PED-8389): * Security issues fixed: * CVE-2024-45770: Fixed a symlink attack that allows escalating from the pcp to the root user (bsc#1230552) * CVE-2024-45769: Fixed a heap corruption through metric pmstore operations (bsc#1230551) * CVE-2023-6917: Fixed local privilege escalation from pcp user to root in /usr/libexec/pcp/lib/pmproxy (bsc#1217826) * CVE-2024-3019: Disabled redis proxy by default (bsc#1222121) * Major changes: * Add version 3 PCP archive support: instance domain change-deltas, Y2038-safe timestamps, nanosecond-precision timestamps, arbitrary timezones support, 64-bit file offsets used throughout for larger (beyond 2GB) individual volumes. * Opt-in using the /etc/pcp.conf PCP_ARCHIVE_VERSION setting * Version 2 archives remain the default (for next few years). * Switch to using OpenSSL only throughout PCP (dropped NSS/NSPR); this impacts on libpcp, PMAPI clients and PMCD use of encryption; these are now configured and used consistently with pmproxy HTTPS support and redis- server, which were both already using OpenSSL. * New nanosecond precision timestamp PMAPI calls for PCP library interfaces that make use of timestamps. These are all optional, and full backward compatibility is preserved for existing tools. * For the full list of changes please consult the packaged CHANGELOG file * Other packaging changes: * Moved pmlogger_daily into main package (bsc#1222815) * Change dependency from openssl-devel >= 1.1.1 to openssl-devel >= 1.0.2p. Required for SLE-12. * Introduce 'pmda-resctrl' package, disabled for architectures other than x86_64. * Change the architecture for various subpackages to 'noarch' as they contain no binaries. * Disable 'pmda-mssql', as it fails to build. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3533=1 SUSE-2024-3533=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3533=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * pcp-pmda-dm-6.2.0-150600.3.6.1 * libpcp_web1-debuginfo-6.2.0-150600.3.6.1 * libpcp_gui2-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-nvidia-gpu-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-hacluster-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-lustrecomm-6.2.0-150600.3.6.1 * pcp-pmda-gfs2-6.2.0-150600.3.6.1 * pcp-pmda-mounts-debuginfo-6.2.0-150600.3.6.1 * pcp-devel-debuginfo-6.2.0-150600.3.6.1 * pcp-system-tools-6.2.0-150600.3.6.1 * python3-pcp-6.2.0-150600.3.6.1 * pcp-pmda-systemd-debuginfo-6.2.0-150600.3.6.1 * libpcp3-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-apache-6.2.0-150600.3.6.1 * pcp-pmda-sockets-debuginfo-6.2.0-150600.3.6.1 * perl-PCP-MMV-6.2.0-150600.3.6.1 * pcp-pmda-summary-6.2.0-150600.3.6.1 * pcp-pmda-bash-6.2.0-150600.3.6.1 * pcp-pmda-mailq-6.2.0-150600.3.6.1 * pcp-pmda-sendmail-6.2.0-150600.3.6.1 * libpcp_web1-6.2.0-150600.3.6.1 * pcp-pmda-apache-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-logger-6.2.0-150600.3.6.1 * pcp-testsuite-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-trace-debuginfo-6.2.0-150600.3.6.1 * pcp-devel-6.2.0-150600.3.6.1 * pcp-pmda-summary-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-logger-debuginfo-6.2.0-150600.3.6.1 * perl-PCP-PMDA-6.2.0-150600.3.6.1 * pcp-pmda-sockets-6.2.0-150600.3.6.1 * pcp-pmda-weblog-6.2.0-150600.3.6.1 * perl-PCP-MMV-debuginfo-6.2.0-150600.3.6.1 * pcp-debugsource-6.2.0-150600.3.6.1 * pcp-6.2.0-150600.3.6.1 * pcp-pmda-smart-6.2.0-150600.3.6.1 * pcp-pmda-roomtemp-6.2.0-150600.3.6.1 * pcp-pmda-docker-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-shping-6.2.0-150600.3.6.1 * pcp-pmda-shping-debuginfo-6.2.0-150600.3.6.1 * perl-PCP-LogSummary-6.2.0-150600.3.6.1 * libpcp_gui2-6.2.0-150600.3.6.1 * pcp-pmda-smart-debuginfo-6.2.0-150600.3.6.1 * perl-PCP-LogImport-6.2.0-150600.3.6.1 * libpcp3-6.2.0-150600.3.6.1 * pcp-pmda-cifs-debuginfo-6.2.0-150600.3.6.1 * python3-pcp-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-cifs-6.2.0-150600.3.6.1 * pcp-pmda-cisco-6.2.0-150600.3.6.1 * pcp-pmda-hacluster-6.2.0-150600.3.6.1 * pcp-pmda-mailq-debuginfo-6.2.0-150600.3.6.1 * pcp-import-collectl2pcp-6.2.0-150600.3.6.1 * pcp-pmda-gfs2-debuginfo-6.2.0-150600.3.6.1 * libpcp_import1-debuginfo-6.2.0-150600.3.6.1 * libpcp-devel-6.2.0-150600.3.6.1 * pcp-pmda-roomtemp-debuginfo-6.2.0-150600.3.6.1 * libpcp_trace2-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-trace-6.2.0-150600.3.6.1 * perl-PCP-PMDA-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-zimbra-debuginfo-6.2.0-150600.3.6.1 * libpcp_mmv1-6.2.0-150600.3.6.1 * pcp-pmda-nvidia-gpu-6.2.0-150600.3.6.1 * pcp-pmda-bash-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-cisco-debuginfo-6.2.0-150600.3.6.1 * libpcp_import1-6.2.0-150600.3.6.1 * pcp-gui-debuginfo-6.2.0-150600.3.6.1 * libpcp_trace2-6.2.0-150600.3.6.1 * pcp-testsuite-6.2.0-150600.3.6.1 * libpcp_mmv1-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-systemd-6.2.0-150600.3.6.1 * pcp-pmda-lustrecomm-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-sendmail-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-weblog-debuginfo-6.2.0-150600.3.6.1 * pcp-system-tools-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-mounts-6.2.0-150600.3.6.1 * pcp-import-collectl2pcp-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-zimbra-6.2.0-150600.3.6.1 * pcp-gui-6.2.0-150600.3.6.1 * pcp-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-docker-6.2.0-150600.3.6.1 * pcp-pmda-dm-debuginfo-6.2.0-150600.3.6.1 * perl-PCP-LogImport-debuginfo-6.2.0-150600.3.6.1 * openSUSE Leap 15.6 (noarch) * pcp-pmda-redis-6.2.0-150600.3.6.1 * pcp-pmda-snmp-6.2.0-150600.3.6.1 * pcp-pmda-postfix-6.2.0-150600.3.6.1 * pcp-pmda-memcache-6.2.0-150600.3.6.1 * pcp-pmda-mysql-6.2.0-150600.3.6.1 * pcp-pmda-news-6.2.0-150600.3.6.1 * pcp-pmda-samba-6.2.0-150600.3.6.1 * pcp-export-pcp2influxdb-6.2.0-150600.3.6.1 * pcp-pmda-nfsclient-6.2.0-150600.3.6.1 * pcp-pmda-openmetrics-6.2.0-150600.3.6.1 * pcp-export-pcp2elasticsearch-6.2.0-150600.3.6.1 * pcp-conf-6.2.0-150600.3.6.1 * pcp-pmda-nutcracker-6.2.0-150600.3.6.1 * pcp-pmda-lmsensors-6.2.0-150600.3.6.1 * pcp-pmda-unbound-6.2.0-150600.3.6.1 * pcp-pmda-gluster-6.2.0-150600.3.6.1 * pcp-pmda-mic-6.2.0-150600.3.6.1 * pcp-pmda-named-6.2.0-150600.3.6.1 * pcp-pmda-netfilter-6.2.0-150600.3.6.1 * pcp-pmda-zswap-6.2.0-150600.3.6.1 * pcp-pmda-ds389-6.2.0-150600.3.6.1 * pcp-pmda-slurm-6.2.0-150600.3.6.1 * pcp-import-mrtg2pcp-6.2.0-150600.3.6.1 * pcp-pmda-dbping-6.2.0-150600.3.6.1 * pcp-pmda-netcheck-6.2.0-150600.3.6.1 * pcp-pmda-openvswitch-6.2.0-150600.3.6.1 * pcp-pmda-json-6.2.0-150600.3.6.1 * pcp-pmda-elasticsearch-6.2.0-150600.3.6.1 * pcp-import-sar2pcp-6.2.0-150600.3.6.1 * pcp-doc-6.2.0-150600.3.6.1 * pcp-pmda-haproxy-6.2.0-150600.3.6.1 * pcp-pmda-gpsd-6.2.0-150600.3.6.1 * pcp-pmda-ds389log-6.2.0-150600.3.6.1 * pcp-export-pcp2json-6.2.0-150600.3.6.1 * pcp-pmda-gpfs-6.2.0-150600.3.6.1 * pcp-pmda-oracle-6.2.0-150600.3.6.1 * pcp-pmda-rsyslog-6.2.0-150600.3.6.1 * pcp-export-pcp2zabbix-6.2.0-150600.3.6.1 * pcp-pmda-lustre-6.2.0-150600.3.6.1 * pcp-import-iostat2pcp-6.2.0-150600.3.6.1 * pcp-pmda-activemq-6.2.0-150600.3.6.1 * pcp-import-ganglia2pcp-6.2.0-150600.3.6.1 * pcp-pmda-bonding-6.2.0-150600.3.6.1 * pcp-pmda-pdns-6.2.0-150600.3.6.1 * pcp-zeroconf-6.2.0-150600.3.6.1 * pcp-export-pcp2spark-6.2.0-150600.3.6.1 * pcp-pmda-rabbitmq-6.2.0-150600.3.6.1 * pcp-pmda-nginx-6.2.0-150600.3.6.1 * pcp-export-pcp2graphite-6.2.0-150600.3.6.1 * pcp-export-pcp2xml-6.2.0-150600.3.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64 i586) * pcp-pmda-infiniband-6.2.0-150600.3.6.1 * pcp-pmda-perfevent-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-infiniband-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-perfevent-6.2.0-150600.3.6.1 * openSUSE Leap 15.6 (x86_64) * pcp-pmda-resctrl-6.2.0-150600.3.6.1 * pcp-pmda-resctrl-debuginfo-6.2.0-150600.3.6.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libpcp_web1-debuginfo-6.2.0-150600.3.6.1 * libpcp_gui2-debuginfo-6.2.0-150600.3.6.1 * pcp-system-tools-6.2.0-150600.3.6.1 * python3-pcp-6.2.0-150600.3.6.1 * pcp-devel-debuginfo-6.2.0-150600.3.6.1 * libpcp3-debuginfo-6.2.0-150600.3.6.1 * perl-PCP-MMV-6.2.0-150600.3.6.1 * libpcp_web1-6.2.0-150600.3.6.1 * pcp-devel-6.2.0-150600.3.6.1 * perl-PCP-MMV-debuginfo-6.2.0-150600.3.6.1 * pcp-debugsource-6.2.0-150600.3.6.1 * pcp-6.2.0-150600.3.6.1 * perl-PCP-LogSummary-6.2.0-150600.3.6.1 * libpcp_gui2-6.2.0-150600.3.6.1 * perl-PCP-LogImport-6.2.0-150600.3.6.1 * libpcp3-6.2.0-150600.3.6.1 * python3-pcp-debuginfo-6.2.0-150600.3.6.1 * perl-PCP-PMDA-6.2.0-150600.3.6.1 * libpcp_import1-debuginfo-6.2.0-150600.3.6.1 * libpcp-devel-6.2.0-150600.3.6.1 * libpcp_trace2-debuginfo-6.2.0-150600.3.6.1 * libpcp_mmv1-6.2.0-150600.3.6.1 * libpcp_import1-6.2.0-150600.3.6.1 * libpcp_trace2-6.2.0-150600.3.6.1 * libpcp_mmv1-debuginfo-6.2.0-150600.3.6.1 * pcp-system-tools-debuginfo-6.2.0-150600.3.6.1 * perl-PCP-PMDA-debuginfo-6.2.0-150600.3.6.1 * pcp-debuginfo-6.2.0-150600.3.6.1 * perl-PCP-LogImport-debuginfo-6.2.0-150600.3.6.1 * Development Tools Module 15-SP6 (noarch) * pcp-import-sar2pcp-6.2.0-150600.3.6.1 * pcp-conf-6.2.0-150600.3.6.1 * pcp-import-iostat2pcp-6.2.0-150600.3.6.1 * pcp-import-mrtg2pcp-6.2.0-150600.3.6.1 * pcp-doc-6.2.0-150600.3.6.1 * Development Tools Module 15-SP6 (ppc64le) * pcp-pmda-perfevent-debuginfo-6.2.0-150600.3.6.1 * pcp-pmda-perfevent-6.2.0-150600.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6917.html * https://www.suse.com/security/cve/CVE-2024-3019.html * https://www.suse.com/security/cve/CVE-2024-45769.html * https://www.suse.com/security/cve/CVE-2024-45770.html * https://bugzilla.suse.com/show_bug.cgi?id=1217826 * https://bugzilla.suse.com/show_bug.cgi?id=1222121 * https://bugzilla.suse.com/show_bug.cgi?id=1222815 * https://bugzilla.suse.com/show_bug.cgi?id=1230551 * https://bugzilla.suse.com/show_bug.cgi?id=1230552 * https://jira.suse.com/browse/PED-8192 * https://jira.suse.com/browse/PED-8389 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 16:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 16:30:11 -0000 Subject: SUSE-SU-2024:3532-1: moderate: Security update for openvpn Message-ID: <172805941150.21943.4737090742839470140@smelt2.prg2.suse.org> # Security update for openvpn Announcement ID: SUSE-SU-2024:3532-1 Release Date: 2024-10-04T14:29:54Z Rating: moderate References: * bsc#1227546 Cross-References: * CVE-2024-28882 CVSS scores: * CVE-2024-28882 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openvpn fixes the following issues: * CVE-2024-28882: Fix multiple exit notifications from authenticated clients will extend the validity of a closing session (bsc#1227546) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3532=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3532=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3532=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * openvpn-2.3.8-16.32.1 * openvpn-auth-pam-plugin-debuginfo-2.3.8-16.32.1 * openvpn-debuginfo-2.3.8-16.32.1 * openvpn-auth-pam-plugin-2.3.8-16.32.1 * openvpn-debugsource-2.3.8-16.32.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * openvpn-2.3.8-16.32.1 * openvpn-auth-pam-plugin-debuginfo-2.3.8-16.32.1 * openvpn-debuginfo-2.3.8-16.32.1 * openvpn-auth-pam-plugin-2.3.8-16.32.1 * openvpn-debugsource-2.3.8-16.32.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * openvpn-2.3.8-16.32.1 * openvpn-auth-pam-plugin-debuginfo-2.3.8-16.32.1 * openvpn-debuginfo-2.3.8-16.32.1 * openvpn-auth-pam-plugin-2.3.8-16.32.1 * openvpn-debugsource-2.3.8-16.32.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28882.html * https://bugzilla.suse.com/show_bug.cgi?id=1227546 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 16:30:14 -0000 Subject: SUSE-RU-2024:3531-1: moderate: Recommended update for collectd Message-ID: <172805941447.21943.6897491842461146672@smelt2.prg2.suse.org> # Recommended update for collectd Announcement ID: SUSE-RU-2024:3531-1 Release Date: 2024-10-04T13:48:49Z Rating: moderate References: * bsc#1230895 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for collectd fixes the following issue: * Fixing collectd syntax errors (bsc#1230895) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3531=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3531=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3531=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3531=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3531=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3531=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3531=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3531=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3531=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3531=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3531=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3531=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3531=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 * SUSE Manager Proxy 4.3 (x86_64) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * collectd-plugin-nut-5.12.0-150400.3.5.2 * collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-5.12.0-150400.3.5.2 * collectd-plugin-pcie-5.12.0-150400.3.5.2 * collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2 * collectd-web-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2 * collectd-5.12.0-150400.3.5.2 * collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-uptime-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2 * libcollectdclient1-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2 * collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-pinba-5.12.0-150400.3.5.2 * collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2 * collectd-debugsource-5.12.0-150400.3.5.2 * collectd-plugin-procevent-5.12.0-150400.3.5.2 * collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-virt-5.12.0-150400.3.5.2 * libcollectdclient-devel-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-connectivity-5.12.0-150400.3.5.2 * collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2 * collectd-plugins-all-5.12.0-150400.3.5.2 * collectd-plugin-mcelog-5.12.0-150400.3.5.2 * collectd-plugin-smart-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-memcachec-5.12.0-150400.3.5.2 * collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-dbi-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-5.12.0-150400.3.5.2 * collectd-plugin-synproxy-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2 * collectd-spamassassin-5.12.0-150400.3.5.2 * collectd-plugin-logparser-5.12.0-150400.3.5.2 * collectd-web-js-5.12.0-150400.3.5.2 * collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2 * collectd-plugin-mysql-5.12.0-150400.3.5.2 * collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-sysevent-5.12.0-150400.3.5.2 * collectd-plugin-notify-desktop-5.12.0-150400.3.5.2 * collectd-plugin-postgresql-5.12.0-150400.3.5.2 * collectd-plugin-ubi-5.12.0-150400.3.5.2 * collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-write_syslog-5.12.0-150400.3.5.2 * collectd-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2 * collectd-plugin-python3-5.12.0-150400.3.5.2 * collectd-plugin-ovs-5.12.0-150400.3.5.2 * collectd-plugin-openldap-5.12.0-150400.3.5.2 * collectd-plugin-ipmi-5.12.0-150400.3.5.2 * collectd-plugin-lua-5.12.0-150400.3.5.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230895 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 16:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 16:30:17 -0000 Subject: SUSE-RU-2024:3530-1: moderate: Recommended update for libpcap Message-ID: <172805941732.21943.4459518380934321002@smelt2.prg2.suse.org> # Recommended update for libpcap Announcement ID: SUSE-RU-2024:3530-1 Release Date: 2024-10-04T13:44:11Z Rating: moderate References: * bsc#1230894 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that has one fix can now be installed. ## Description: This update for libpcap fixes the following issue: * enable rdma support (bsc#1230894). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3530=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3530=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3530=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3530=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3530=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3530=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3530=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3530=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3530=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3530=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3530=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3530=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3530=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3530=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3530=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3530=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3530=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3530=1 ## Package List: * SUSE Package Hub 15 15-SP5 (x86_64) * libpcap1-32bit-1.10.1-150400.3.6.2 * libpcap1-32bit-debuginfo-1.10.1-150400.3.6.2 * libpcap-debugsource-1.10.1-150400.3.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap-devel-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap-devel-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap-devel-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap-devel-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap-devel-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * SUSE Manager Proxy 4.3 (x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap-devel-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap-devel-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap-devel-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap-devel-static-1.10.1-150400.3.6.2 * libpcap-devel-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * openSUSE Leap 15.4 (x86_64) * libpcap-devel-32bit-1.10.1-150400.3.6.2 * libpcap1-32bit-debuginfo-1.10.1-150400.3.6.2 * libpcap1-32bit-1.10.1-150400.3.6.2 * openSUSE Leap 15.4 (aarch64_ilp32) * libpcap-devel-64bit-1.10.1-150400.3.6.2 * libpcap1-64bit-debuginfo-1.10.1-150400.3.6.2 * libpcap1-64bit-1.10.1-150400.3.6.2 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap-devel-static-1.10.1-150400.3.6.2 * libpcap-devel-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * openSUSE Leap 15.5 (x86_64) * libpcap-devel-32bit-1.10.1-150400.3.6.2 * libpcap1-32bit-debuginfo-1.10.1-150400.3.6.2 * libpcap1-32bit-1.10.1-150400.3.6.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libpcap-debugsource-1.10.1-150400.3.6.2 * libpcap1-debuginfo-1.10.1-150400.3.6.2 * libpcap-devel-1.10.1-150400.3.6.2 * libpcap1-1.10.1-150400.3.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230894 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 16:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 16:30:19 -0000 Subject: SUSE-RU-2024:3529-1: moderate: Recommended update for libpcap Message-ID: <172805941966.21943.15530146087016503139@smelt2.prg2.suse.org> # Recommended update for libpcap Announcement ID: SUSE-RU-2024:3529-1 Release Date: 2024-10-04T13:37:55Z Rating: moderate References: * bsc#1230894 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for libpcap fixes the following issue: * enable rdma support (bsc#1230894). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3529=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3529=1 openSUSE-SLE-15.6-2024-3529=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3529=1 ## Package List: * SUSE Package Hub 15 15-SP6 (x86_64) * libpcap1-32bit-1.10.4-150600.3.6.2 * libpcap-debugsource-1.10.4-150600.3.6.2 * libpcap1-32bit-debuginfo-1.10.4-150600.3.6.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libpcap-debugsource-1.10.4-150600.3.6.2 * libpcap-devel-static-1.10.4-150600.3.6.2 * libpcap1-debuginfo-1.10.4-150600.3.6.2 * libpcap-devel-1.10.4-150600.3.6.2 * libpcap1-1.10.4-150600.3.6.2 * openSUSE Leap 15.6 (x86_64) * libpcap1-32bit-1.10.4-150600.3.6.2 * libpcap1-32bit-debuginfo-1.10.4-150600.3.6.2 * libpcap-devel-32bit-1.10.4-150600.3.6.2 * openSUSE Leap 15.6 (aarch64_ilp32) * libpcap1-64bit-1.10.4-150600.3.6.2 * libpcap1-64bit-debuginfo-1.10.4-150600.3.6.2 * libpcap-devel-64bit-1.10.4-150600.3.6.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libpcap-debugsource-1.10.4-150600.3.6.2 * libpcap1-1.10.4-150600.3.6.2 * libpcap1-debuginfo-1.10.4-150600.3.6.2 * libpcap-devel-1.10.4-150600.3.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230894 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 16:30:21 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 16:30:21 -0000 Subject: SUSE-RU-2024:3528-1: moderate: Recommended update for e2fsprogs Message-ID: <172805942169.21943.3979134486552295676@smelt2.prg2.suse.org> # Recommended update for e2fsprogs Announcement ID: SUSE-RU-2024:3528-1 Release Date: 2024-10-04T13:31:58Z Rating: moderate References: * bsc#1230145 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for e2fsprogs fixes the following issue: * resize2fs: Check number of group descriptors only if meta_bg is disabled (bsc#1230145). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3528=1 openSUSE-SLE-15.6-2024-3528=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3528=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3528=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libext2fs-devel-static-1.47.0-150600.4.6.2 * e2fsprogs-1.47.0-150600.4.6.2 * libext2fs-devel-1.47.0-150600.4.6.2 * libext2fs2-debuginfo-1.47.0-150600.4.6.2 * libcom_err2-debuginfo-1.47.0-150600.4.6.2 * e2fsprogs-scrub-1.47.0-150600.4.6.2 * e2fsprogs-debuginfo-1.47.0-150600.4.6.2 * libcom_err-devel-1.47.0-150600.4.6.2 * libcom_err-devel-static-1.47.0-150600.4.6.2 * e2fsprogs-devel-1.47.0-150600.4.6.2 * fuse2fs-debugsource-1.47.0-150600.4.6.2 * fuse2fs-debuginfo-1.47.0-150600.4.6.2 * libcom_err2-1.47.0-150600.4.6.2 * fuse2fs-1.47.0-150600.4.6.2 * e2fsprogs-debugsource-1.47.0-150600.4.6.2 * libext2fs2-1.47.0-150600.4.6.2 * openSUSE Leap 15.6 (x86_64) * libcom_err2-32bit-debuginfo-1.47.0-150600.4.6.2 * e2fsprogs-32bit-debuginfo-1.47.0-150600.4.6.2 * libext2fs2-32bit-1.47.0-150600.4.6.2 * libext2fs2-32bit-debuginfo-1.47.0-150600.4.6.2 * libcom_err-devel-32bit-1.47.0-150600.4.6.2 * libcom_err2-32bit-1.47.0-150600.4.6.2 * libext2fs-devel-32bit-1.47.0-150600.4.6.2 * openSUSE Leap 15.6 (aarch64_ilp32) * libext2fs-devel-64bit-1.47.0-150600.4.6.2 * libext2fs2-64bit-1.47.0-150600.4.6.2 * e2fsprogs-64bit-debuginfo-1.47.0-150600.4.6.2 * libcom_err2-64bit-debuginfo-1.47.0-150600.4.6.2 * libcom_err-devel-64bit-1.47.0-150600.4.6.2 * libext2fs2-64bit-debuginfo-1.47.0-150600.4.6.2 * libcom_err2-64bit-1.47.0-150600.4.6.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libext2fs-devel-static-1.47.0-150600.4.6.2 * e2fsprogs-1.47.0-150600.4.6.2 * libext2fs-devel-1.47.0-150600.4.6.2 * libext2fs2-debuginfo-1.47.0-150600.4.6.2 * libcom_err2-debuginfo-1.47.0-150600.4.6.2 * e2fsprogs-debuginfo-1.47.0-150600.4.6.2 * libcom_err-devel-1.47.0-150600.4.6.2 * libcom_err-devel-static-1.47.0-150600.4.6.2 * e2fsprogs-devel-1.47.0-150600.4.6.2 * libcom_err2-1.47.0-150600.4.6.2 * e2fsprogs-debugsource-1.47.0-150600.4.6.2 * libext2fs2-1.47.0-150600.4.6.2 * Basesystem Module 15-SP6 (x86_64) * libcom_err2-32bit-debuginfo-1.47.0-150600.4.6.2 * e2fsprogs-32bit-debuginfo-1.47.0-150600.4.6.2 * libcom_err2-32bit-1.47.0-150600.4.6.2 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * fuse2fs-1.47.0-150600.4.6.2 * fuse2fs-debugsource-1.47.0-150600.4.6.2 * fuse2fs-debuginfo-1.47.0-150600.4.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230145 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 16:30:24 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 16:30:24 -0000 Subject: SUSE-RU-2024:3527-1: moderate: Recommended update for e2fsprogs Message-ID: <172805942465.21943.7647546666615071649@smelt2.prg2.suse.org> # Recommended update for e2fsprogs Announcement ID: SUSE-RU-2024:3527-1 Release Date: 2024-10-04T13:27:44Z Rating: moderate References: * bsc#1230145 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for e2fsprogs fixes the following issue: * resize2fs: Check number of group descriptors only if meta_bg is disabled (bsc#1230145). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3527=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3527=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3527=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3527=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3527=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3527=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3527=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3527=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3527=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3527=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3527=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3527=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3527=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3527=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3527=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3527=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3527=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libext2fs-devel-1.46.4-150400.3.9.2 * libext2fs2-1.46.4-150400.3.9.2 * libcom_err-devel-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * e2fsprogs-scrub-1.46.4-150400.3.9.2 * e2fsprogs-devel-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * libcom_err-devel-static-1.46.4-150400.3.9.2 * libext2fs-devel-static-1.46.4-150400.3.9.2 * openSUSE Leap 15.4 (x86_64) * libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2 * libcom_err2-32bit-1.46.4-150400.3.9.2 * libext2fs2-32bit-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-32bit-1.46.4-150400.3.9.2 * libcom_err-devel-32bit-1.46.4-150400.3.9.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2 * libext2fs-devel-32bit-1.46.4-150400.3.9.2 * openSUSE Leap 15.4 (aarch64_ilp32) * libcom_err-devel-64bit-1.46.4-150400.3.9.2 * libcom_err2-64bit-1.46.4-150400.3.9.2 * libext2fs2-64bit-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-64bit-1.46.4-150400.3.9.2 * e2fsprogs-64bit-debuginfo-1.46.4-150400.3.9.2 * libext2fs-devel-64bit-1.46.4-150400.3.9.2 * libcom_err2-64bit-debuginfo-1.46.4-150400.3.9.2 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * libext2fs2-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libext2fs-devel-1.46.4-150400.3.9.2 * libext2fs2-1.46.4-150400.3.9.2 * libcom_err-devel-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * e2fsprogs-scrub-1.46.4-150400.3.9.2 * e2fsprogs-devel-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * libcom_err-devel-static-1.46.4-150400.3.9.2 * libext2fs-devel-static-1.46.4-150400.3.9.2 * openSUSE Leap 15.5 (x86_64) * libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2 * libcom_err2-32bit-1.46.4-150400.3.9.2 * libext2fs2-32bit-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-32bit-1.46.4-150400.3.9.2 * libcom_err-devel-32bit-1.46.4-150400.3.9.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2 * libext2fs-devel-32bit-1.46.4-150400.3.9.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libext2fs2-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libext2fs2-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libext2fs2-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libext2fs2-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libext2fs2-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libext2fs-devel-1.46.4-150400.3.9.2 * libext2fs2-1.46.4-150400.3.9.2 * libcom_err-devel-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * e2fsprogs-devel-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * libcom_err-devel-static-1.46.4-150400.3.9.2 * libext2fs-devel-static-1.46.4-150400.3.9.2 * Basesystem Module 15-SP5 (x86_64) * libcom_err2-32bit-1.46.4-150400.3.9.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libext2fs-devel-1.46.4-150400.3.9.2 * libext2fs2-1.46.4-150400.3.9.2 * libcom_err-devel-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * e2fsprogs-devel-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * libcom_err-devel-static-1.46.4-150400.3.9.2 * libext2fs-devel-static-1.46.4-150400.3.9.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libcom_err2-32bit-1.46.4-150400.3.9.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libext2fs-devel-1.46.4-150400.3.9.2 * libext2fs2-1.46.4-150400.3.9.2 * libcom_err-devel-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * e2fsprogs-devel-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * libcom_err-devel-static-1.46.4-150400.3.9.2 * libext2fs-devel-static-1.46.4-150400.3.9.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libcom_err2-32bit-1.46.4-150400.3.9.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2 * libext2fs-devel-1.46.4-150400.3.9.2 * libext2fs2-1.46.4-150400.3.9.2 * libcom_err-devel-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-32bit-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * e2fsprogs-devel-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2 * libcom_err-devel-static-1.46.4-150400.3.9.2 * libext2fs-devel-static-1.46.4-150400.3.9.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libext2fs-devel-1.46.4-150400.3.9.2 * libext2fs2-1.46.4-150400.3.9.2 * libcom_err-devel-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * e2fsprogs-devel-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * libcom_err-devel-static-1.46.4-150400.3.9.2 * libext2fs-devel-static-1.46.4-150400.3.9.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libcom_err2-32bit-1.46.4-150400.3.9.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libext2fs-devel-1.46.4-150400.3.9.2 * libext2fs2-1.46.4-150400.3.9.2 * libcom_err-devel-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * e2fsprogs-devel-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * libcom_err-devel-static-1.46.4-150400.3.9.2 * libext2fs-devel-static-1.46.4-150400.3.9.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libcom_err2-32bit-1.46.4-150400.3.9.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2 * SUSE Manager Proxy 4.3 (x86_64) * libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2 * libext2fs-devel-1.46.4-150400.3.9.2 * libext2fs2-1.46.4-150400.3.9.2 * libcom_err-devel-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-32bit-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * e2fsprogs-devel-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2 * libcom_err-devel-static-1.46.4-150400.3.9.2 * libext2fs-devel-static-1.46.4-150400.3.9.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2 * libext2fs-devel-1.46.4-150400.3.9.2 * libext2fs2-1.46.4-150400.3.9.2 * libcom_err-devel-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-32bit-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * e2fsprogs-devel-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2 * libcom_err-devel-static-1.46.4-150400.3.9.2 * libext2fs-devel-static-1.46.4-150400.3.9.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libext2fs-devel-1.46.4-150400.3.9.2 * libext2fs2-1.46.4-150400.3.9.2 * libcom_err-devel-1.46.4-150400.3.9.2 * e2fsprogs-1.46.4-150400.3.9.2 * libcom_err2-1.46.4-150400.3.9.2 * e2fsprogs-devel-1.46.4-150400.3.9.2 * libcom_err2-debuginfo-1.46.4-150400.3.9.2 * libext2fs2-debuginfo-1.46.4-150400.3.9.2 * e2fsprogs-debugsource-1.46.4-150400.3.9.2 * e2fsprogs-debuginfo-1.46.4-150400.3.9.2 * libcom_err-devel-static-1.46.4-150400.3.9.2 * libext2fs-devel-static-1.46.4-150400.3.9.2 * SUSE Manager Server 4.3 (x86_64) * libcom_err2-32bit-1.46.4-150400.3.9.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230145 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 16:30:29 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 16:30:29 -0000 Subject: SUSE-SU-2024:3526-1: moderate: Security update for Mesa Message-ID: <172805942901.21943.11276709531370204421@smelt2.prg2.suse.org> # Security update for Mesa Announcement ID: SUSE-SU-2024:3526-1 Release Date: 2024-10-04T13:25:21Z Rating: moderate References: * bsc#1222040 * bsc#1222041 * bsc#1222042 Cross-References: * CVE-2023-45913 * CVE-2023-45919 * CVE-2023-45922 CVSS scores: * CVE-2023-45913 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-45919 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H * CVE-2023-45922 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for Mesa fixes the following issues: * CVE-2023-45919: Fixed buffer over-read in glXQueryServerString() (bsc#1222041). * CVE-2023-45913: Fixed NULL pointer dereference via dri2GetGlxDrawableFromXDrawableId() (bsc#1222040). * CVE-2023-45922: Fixed segmentation violation in __glXGetDrawableAttribute() (bsc#CVE-2023-45922). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3526=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3526=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3526=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-3526=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3526=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * Mesa-dri-18.3.2-14.9.1 * Mesa-dri-debuginfo-18.3.2-14.9.1 * Mesa-libGL1-debuginfo-18.3.2-14.9.1 * Mesa-libglapi0-debuginfo-18.3.2-14.9.1 * Mesa-debugsource-18.3.2-14.9.1 * Mesa-libEGL1-debuginfo-18.3.2-14.9.1 * Mesa-libGLESv2-2-18.3.2-14.9.1 * Mesa-libGLESv2-2-debuginfo-18.3.2-14.9.1 * Mesa-18.3.2-14.9.1 * libgbm1-18.3.2-14.9.1 * Mesa-libglapi0-18.3.2-14.9.1 * Mesa-libGL1-18.3.2-14.9.1 * libgbm1-debuginfo-18.3.2-14.9.1 * Mesa-drivers-debugsource-18.3.2-14.9.1 * libxatracker2-debuginfo-1.0.0-14.9.1 * Mesa-libEGL1-18.3.2-14.9.1 * libxatracker2-1.0.0-14.9.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * Mesa-libGL1-debuginfo-32bit-18.3.2-14.9.1 * Mesa-libGL1-32bit-18.3.2-14.9.1 * libgbm1-32bit-18.3.2-14.9.1 * Mesa-libEGL1-debuginfo-32bit-18.3.2-14.9.1 * Mesa-dri-32bit-18.3.2-14.9.1 * libgbm1-debuginfo-32bit-18.3.2-14.9.1 * Mesa-libEGL1-32bit-18.3.2-14.9.1 * Mesa-libglapi0-debuginfo-32bit-18.3.2-14.9.1 * Mesa-32bit-18.3.2-14.9.1 * Mesa-dri-debuginfo-32bit-18.3.2-14.9.1 * Mesa-libglapi0-32bit-18.3.2-14.9.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * Mesa-dri-18.3.2-14.9.1 * Mesa-dri-debuginfo-18.3.2-14.9.1 * Mesa-libGL1-debuginfo-18.3.2-14.9.1 * Mesa-libglapi0-debuginfo-18.3.2-14.9.1 * Mesa-debugsource-18.3.2-14.9.1 * Mesa-libEGL1-debuginfo-18.3.2-14.9.1 * Mesa-libGLESv2-2-18.3.2-14.9.1 * Mesa-libGLESv2-2-debuginfo-18.3.2-14.9.1 * Mesa-18.3.2-14.9.1 * libgbm1-18.3.2-14.9.1 * Mesa-libglapi0-18.3.2-14.9.1 * Mesa-libGL1-18.3.2-14.9.1 * libgbm1-debuginfo-18.3.2-14.9.1 * Mesa-drivers-debugsource-18.3.2-14.9.1 * Mesa-libEGL1-18.3.2-14.9.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le x86_64) * libxatracker2-1.0.0-14.9.1 * libxatracker2-debuginfo-1.0.0-14.9.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * Mesa-libGL1-debuginfo-32bit-18.3.2-14.9.1 * Mesa-libGL1-32bit-18.3.2-14.9.1 * libgbm1-32bit-18.3.2-14.9.1 * Mesa-libEGL1-debuginfo-32bit-18.3.2-14.9.1 * Mesa-dri-32bit-18.3.2-14.9.1 * libgbm1-debuginfo-32bit-18.3.2-14.9.1 * Mesa-libEGL1-32bit-18.3.2-14.9.1 * Mesa-32bit-18.3.2-14.9.1 * Mesa-libglapi0-debuginfo-32bit-18.3.2-14.9.1 * Mesa-dri-debuginfo-32bit-18.3.2-14.9.1 * Mesa-libglapi0-32bit-18.3.2-14.9.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * Mesa-dri-18.3.2-14.9.1 * Mesa-dri-debuginfo-18.3.2-14.9.1 * Mesa-libGL1-debuginfo-18.3.2-14.9.1 * Mesa-libglapi0-debuginfo-18.3.2-14.9.1 * Mesa-debugsource-18.3.2-14.9.1 * Mesa-libEGL1-debuginfo-18.3.2-14.9.1 * Mesa-libGLESv2-2-18.3.2-14.9.1 * Mesa-libGLESv2-2-debuginfo-18.3.2-14.9.1 * Mesa-18.3.2-14.9.1 * libgbm1-18.3.2-14.9.1 * Mesa-libglapi0-18.3.2-14.9.1 * Mesa-libGL1-18.3.2-14.9.1 * libgbm1-debuginfo-18.3.2-14.9.1 * Mesa-drivers-debugsource-18.3.2-14.9.1 * libxatracker2-debuginfo-1.0.0-14.9.1 * Mesa-libEGL1-18.3.2-14.9.1 * libxatracker2-1.0.0-14.9.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * Mesa-libGL1-debuginfo-32bit-18.3.2-14.9.1 * Mesa-libGL1-32bit-18.3.2-14.9.1 * libgbm1-32bit-18.3.2-14.9.1 * Mesa-libEGL1-debuginfo-32bit-18.3.2-14.9.1 * Mesa-dri-32bit-18.3.2-14.9.1 * libgbm1-debuginfo-32bit-18.3.2-14.9.1 * Mesa-libEGL1-32bit-18.3.2-14.9.1 * Mesa-libglapi0-debuginfo-32bit-18.3.2-14.9.1 * Mesa-32bit-18.3.2-14.9.1 * Mesa-dri-debuginfo-32bit-18.3.2-14.9.1 * Mesa-libglapi0-32bit-18.3.2-14.9.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * Mesa-libGLESv1_CM1-debuginfo-18.3.2-14.9.1 * libXvMC_r600-debuginfo-18.3.2-14.9.1 * Mesa-debugsource-18.3.2-14.9.1 * libXvMC_r600-18.3.2-14.9.1 * libvdpau_nouveau-18.3.2-14.9.1 * libvulkan_intel-18.3.2-14.9.1 * libvulkan_radeon-debuginfo-18.3.2-14.9.1 * Mesa-libGLESv2-2-debuginfo-32bit-18.3.2-14.9.1 * libvdpau_nouveau-debuginfo-18.3.2-14.9.1 * Mesa-libGLESv1_CM1-18.3.2-14.9.1 * Mesa-drivers-debugsource-18.3.2-14.9.1 * libvdpau_radeonsi-18.3.2-14.9.1 * libvulkan_radeon-18.3.2-14.9.1 * libvdpau_r600-18.3.2-14.9.1 * libXvMC_nouveau-18.3.2-14.9.1 * libvdpau_radeonsi-debuginfo-18.3.2-14.9.1 * Mesa-libva-18.3.2-14.9.1 * Mesa-libva-debuginfo-18.3.2-14.9.1 * libvdpau_r600-debuginfo-18.3.2-14.9.1 * libXvMC_nouveau-debuginfo-18.3.2-14.9.1 * Mesa-libGLESv2-2-32bit-18.3.2-14.9.1 * Mesa-libd3d-18.3.2-14.9.1 * libvulkan_intel-debuginfo-18.3.2-14.9.1 * Mesa-libd3d-debuginfo-18.3.2-14.9.1 * libvdpau_r300-18.3.2-14.9.1 * libvdpau_r300-debuginfo-18.3.2-14.9.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libOSMesa8-debuginfo-18.3.2-14.9.1 * Mesa-devel-18.3.2-14.9.1 * Mesa-libGLESv1_CM1-debuginfo-18.3.2-14.9.1 * Mesa-debugsource-18.3.2-14.9.1 * libOSMesa-devel-18.3.2-14.9.1 * Mesa-libGLESv3-devel-18.3.2-14.9.1 * Mesa-KHR-devel-18.3.2-14.9.1 * Mesa-libGLESv2-devel-18.3.2-14.9.1 * libOSMesa8-18.3.2-14.9.1 * Mesa-libglapi-devel-18.3.2-14.9.1 * Mesa-dri-devel-18.3.2-14.9.1 * Mesa-libGL-devel-18.3.2-14.9.1 * libgbm-devel-18.3.2-14.9.1 * Mesa-libGLESv1_CM1-18.3.2-14.9.1 * Mesa-libEGL-devel-18.3.2-14.9.1 * Mesa-libGLESv1_CM-devel-18.3.2-14.9.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 x86_64) * Mesa-libd3d-devel-18.3.2-14.9.1 * Mesa-drivers-debugsource-18.3.2-14.9.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le x86_64) * libxatracker-devel-1.0.0-14.9.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (s390x x86_64) * libOSMesa8-debuginfo-32bit-18.3.2-14.9.1 * libOSMesa8-32bit-18.3.2-14.9.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (x86_64) * Mesa-libVulkan-devel-18.3.2-14.9.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45913.html * https://www.suse.com/security/cve/CVE-2023-45919.html * https://www.suse.com/security/cve/CVE-2023-45922.html * https://bugzilla.suse.com/show_bug.cgi?id=1222040 * https://bugzilla.suse.com/show_bug.cgi?id=1222041 * https://bugzilla.suse.com/show_bug.cgi?id=1222042 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 16:30:31 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 16:30:31 -0000 Subject: SUSE-SU-2024:3525-1: important: Security update for openssl-3 Message-ID: <172805943188.21943.11669921970969875869@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2024:3525-1 Release Date: 2024-10-04T13:21:09Z Rating: important References: * bsc#1230698 Cross-References: * CVE-2024-41996 CVSS scores: * CVE-2024-41996 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41996 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2024-41996: Validating the order of the public keys in the Diffie- Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers to trigger expensive server-side DHE (bsc#1230698) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3525=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3525=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3525=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3525=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3525=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3525=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3525=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3525=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3525=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3525=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3525=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3525=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3525=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * openssl-3-3.0.8-150400.4.66.1 * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl-3-devel-3.0.8-150400.4.66.1 * openssl-3-debuginfo-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 * openSUSE Leap 15.4 (x86_64) * libopenssl3-32bit-3.0.8-150400.4.66.1 * libopenssl-3-devel-32bit-3.0.8-150400.4.66.1 * libopenssl3-32bit-debuginfo-3.0.8-150400.4.66.1 * openSUSE Leap 15.4 (noarch) * openssl-3-doc-3.0.8-150400.4.66.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libopenssl3-64bit-3.0.8-150400.4.66.1 * libopenssl-3-devel-64bit-3.0.8-150400.4.66.1 * libopenssl3-64bit-debuginfo-3.0.8-150400.4.66.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * openssl-3-3.0.8-150400.4.66.1 * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl-3-devel-3.0.8-150400.4.66.1 * openssl-3-debuginfo-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * openssl-3-3.0.8-150400.4.66.1 * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl-3-devel-3.0.8-150400.4.66.1 * openssl-3-debuginfo-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * openssl-3-3.0.8-150400.4.66.1 * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl-3-devel-3.0.8-150400.4.66.1 * openssl-3-debuginfo-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * openssl-3-3.0.8-150400.4.66.1 * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl-3-devel-3.0.8-150400.4.66.1 * openssl-3-debuginfo-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openssl-3-3.0.8-150400.4.66.1 * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl-3-devel-3.0.8-150400.4.66.1 * openssl-3-debuginfo-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 * SUSE Manager Proxy 4.3 (x86_64) * openssl-3-3.0.8-150400.4.66.1 * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl-3-devel-3.0.8-150400.4.66.1 * openssl-3-debuginfo-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * openssl-3-3.0.8-150400.4.66.1 * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl-3-devel-3.0.8-150400.4.66.1 * openssl-3-debuginfo-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * openssl-3-3.0.8-150400.4.66.1 * openssl-3-debugsource-3.0.8-150400.4.66.1 * libopenssl-3-devel-3.0.8-150400.4.66.1 * openssl-3-debuginfo-3.0.8-150400.4.66.1 * libopenssl3-3.0.8-150400.4.66.1 * libopenssl3-debuginfo-3.0.8-150400.4.66.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41996.html * https://bugzilla.suse.com/show_bug.cgi?id=1230698 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 16:30:35 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 16:30:35 -0000 Subject: SUSE-SU-2024:3524-1: important: Security update for frr Message-ID: <172805943522.21943.14535890092928483187@smelt2.prg2.suse.org> # Security update for frr Announcement ID: SUSE-SU-2024:3524-1 Release Date: 2024-10-04T13:18:52Z Rating: important References: * bsc#1230866 Cross-References: * CVE-2017-15865 CVSS scores: * CVE-2017-15865 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2017-15865 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2017-15865 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for frr fixes the following issue: * Arithmetic overflow when parsing attribute of update packet due to regression introduced by the fix for CVE-2017-15865. (bsc#1230866) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3524=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3524=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3524=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3524=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3524=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3524=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3524=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3524=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3524=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3524=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3524=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3524=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libfrrospfapiclient0-7.4-150300.4.32.1 * libfrrgrpc_pb0-7.4-150300.4.32.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1 * libfrrzmq0-7.4-150300.4.32.1 * libfrr_pb0-7.4-150300.4.32.1 * libmlag_pb0-debuginfo-7.4-150300.4.32.1 * libfrr_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-debuginfo-7.4-150300.4.32.1 * libfrrfpm_pb0-7.4-150300.4.32.1 * libfrrsnmp0-debuginfo-7.4-150300.4.32.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1 * frr-debugsource-7.4-150300.4.32.1 * libfrrzmq0-debuginfo-7.4-150300.4.32.1 * libfrr0-7.4-150300.4.32.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-7.4-150300.4.32.1 * libfrr0-debuginfo-7.4-150300.4.32.1 * libmlag_pb0-7.4-150300.4.32.1 * frr-devel-7.4-150300.4.32.1 * frr-debuginfo-7.4-150300.4.32.1 * libfrrsnmp0-7.4-150300.4.32.1 * frr-7.4-150300.4.32.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libfrrospfapiclient0-7.4-150300.4.32.1 * libfrrgrpc_pb0-7.4-150300.4.32.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1 * libfrrzmq0-7.4-150300.4.32.1 * libfrr_pb0-7.4-150300.4.32.1 * libmlag_pb0-debuginfo-7.4-150300.4.32.1 * libfrr_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-debuginfo-7.4-150300.4.32.1 * libfrrfpm_pb0-7.4-150300.4.32.1 * libfrrsnmp0-debuginfo-7.4-150300.4.32.1 * frr-7.4-150300.4.32.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1 * frr-debugsource-7.4-150300.4.32.1 * libfrrzmq0-debuginfo-7.4-150300.4.32.1 * libfrr0-7.4-150300.4.32.1 * libfrrcares0-7.4-150300.4.32.1 * libfrr0-debuginfo-7.4-150300.4.32.1 * libmlag_pb0-7.4-150300.4.32.1 * frr-devel-7.4-150300.4.32.1 * frr-debuginfo-7.4-150300.4.32.1 * libfrrsnmp0-7.4-150300.4.32.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libfrrospfapiclient0-7.4-150300.4.32.1 * libfrrgrpc_pb0-7.4-150300.4.32.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1 * libfrrzmq0-7.4-150300.4.32.1 * libfrr_pb0-7.4-150300.4.32.1 * libmlag_pb0-debuginfo-7.4-150300.4.32.1 * libfrr_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-debuginfo-7.4-150300.4.32.1 * libfrrfpm_pb0-7.4-150300.4.32.1 * libfrrsnmp0-debuginfo-7.4-150300.4.32.1 * frr-7.4-150300.4.32.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1 * frr-debugsource-7.4-150300.4.32.1 * libfrrzmq0-debuginfo-7.4-150300.4.32.1 * libfrr0-7.4-150300.4.32.1 * libfrrcares0-7.4-150300.4.32.1 * libfrr0-debuginfo-7.4-150300.4.32.1 * libmlag_pb0-7.4-150300.4.32.1 * frr-devel-7.4-150300.4.32.1 * frr-debuginfo-7.4-150300.4.32.1 * libfrrsnmp0-7.4-150300.4.32.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libfrrospfapiclient0-7.4-150300.4.32.1 * libfrrgrpc_pb0-7.4-150300.4.32.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1 * libfrrzmq0-7.4-150300.4.32.1 * libfrr_pb0-7.4-150300.4.32.1 * libmlag_pb0-debuginfo-7.4-150300.4.32.1 * libfrr_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-debuginfo-7.4-150300.4.32.1 * libfrrfpm_pb0-7.4-150300.4.32.1 * libfrrsnmp0-debuginfo-7.4-150300.4.32.1 * frr-7.4-150300.4.32.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1 * frr-debugsource-7.4-150300.4.32.1 * libfrrzmq0-debuginfo-7.4-150300.4.32.1 * libfrr0-7.4-150300.4.32.1 * libfrrcares0-7.4-150300.4.32.1 * libfrr0-debuginfo-7.4-150300.4.32.1 * libmlag_pb0-7.4-150300.4.32.1 * frr-devel-7.4-150300.4.32.1 * frr-debuginfo-7.4-150300.4.32.1 * libfrrsnmp0-7.4-150300.4.32.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libfrrospfapiclient0-7.4-150300.4.32.1 * libfrrgrpc_pb0-7.4-150300.4.32.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1 * libfrrzmq0-7.4-150300.4.32.1 * libfrr_pb0-7.4-150300.4.32.1 * libmlag_pb0-debuginfo-7.4-150300.4.32.1 * libfrr_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-debuginfo-7.4-150300.4.32.1 * libfrrfpm_pb0-7.4-150300.4.32.1 * libfrrsnmp0-debuginfo-7.4-150300.4.32.1 * frr-7.4-150300.4.32.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1 * frr-debugsource-7.4-150300.4.32.1 * libfrrzmq0-debuginfo-7.4-150300.4.32.1 * libfrr0-7.4-150300.4.32.1 * libfrrcares0-7.4-150300.4.32.1 * libfrr0-debuginfo-7.4-150300.4.32.1 * libmlag_pb0-7.4-150300.4.32.1 * frr-devel-7.4-150300.4.32.1 * frr-debuginfo-7.4-150300.4.32.1 * libfrrsnmp0-7.4-150300.4.32.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libfrrospfapiclient0-7.4-150300.4.32.1 * libfrrgrpc_pb0-7.4-150300.4.32.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1 * libfrrzmq0-7.4-150300.4.32.1 * libfrr_pb0-7.4-150300.4.32.1 * libmlag_pb0-debuginfo-7.4-150300.4.32.1 * libfrr_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-debuginfo-7.4-150300.4.32.1 * libfrrfpm_pb0-7.4-150300.4.32.1 * libfrrsnmp0-debuginfo-7.4-150300.4.32.1 * frr-7.4-150300.4.32.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1 * frr-debugsource-7.4-150300.4.32.1 * libfrrzmq0-debuginfo-7.4-150300.4.32.1 * libfrr0-7.4-150300.4.32.1 * libfrrcares0-7.4-150300.4.32.1 * libfrr0-debuginfo-7.4-150300.4.32.1 * libmlag_pb0-7.4-150300.4.32.1 * frr-devel-7.4-150300.4.32.1 * frr-debuginfo-7.4-150300.4.32.1 * libfrrsnmp0-7.4-150300.4.32.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libfrrospfapiclient0-7.4-150300.4.32.1 * libfrrgrpc_pb0-7.4-150300.4.32.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1 * libfrrzmq0-7.4-150300.4.32.1 * libfrr_pb0-7.4-150300.4.32.1 * libmlag_pb0-debuginfo-7.4-150300.4.32.1 * libfrr_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-debuginfo-7.4-150300.4.32.1 * libfrrfpm_pb0-7.4-150300.4.32.1 * libfrrsnmp0-debuginfo-7.4-150300.4.32.1 * frr-7.4-150300.4.32.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1 * frr-debugsource-7.4-150300.4.32.1 * libfrrzmq0-debuginfo-7.4-150300.4.32.1 * libfrr0-7.4-150300.4.32.1 * libfrrcares0-7.4-150300.4.32.1 * libfrr0-debuginfo-7.4-150300.4.32.1 * libmlag_pb0-7.4-150300.4.32.1 * frr-devel-7.4-150300.4.32.1 * frr-debuginfo-7.4-150300.4.32.1 * libfrrsnmp0-7.4-150300.4.32.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libfrrospfapiclient0-7.4-150300.4.32.1 * libfrrgrpc_pb0-7.4-150300.4.32.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1 * libfrrzmq0-7.4-150300.4.32.1 * libfrr_pb0-7.4-150300.4.32.1 * libmlag_pb0-debuginfo-7.4-150300.4.32.1 * libfrr_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-debuginfo-7.4-150300.4.32.1 * libfrrfpm_pb0-7.4-150300.4.32.1 * libfrrsnmp0-debuginfo-7.4-150300.4.32.1 * frr-7.4-150300.4.32.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1 * frr-debugsource-7.4-150300.4.32.1 * libfrrzmq0-debuginfo-7.4-150300.4.32.1 * libfrr0-7.4-150300.4.32.1 * libfrrcares0-7.4-150300.4.32.1 * libfrr0-debuginfo-7.4-150300.4.32.1 * libmlag_pb0-7.4-150300.4.32.1 * frr-devel-7.4-150300.4.32.1 * frr-debuginfo-7.4-150300.4.32.1 * libfrrsnmp0-7.4-150300.4.32.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1 * SUSE Manager Proxy 4.3 (x86_64) * libfrrospfapiclient0-7.4-150300.4.32.1 * libfrrgrpc_pb0-7.4-150300.4.32.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1 * libfrrzmq0-7.4-150300.4.32.1 * libfrr_pb0-7.4-150300.4.32.1 * libmlag_pb0-debuginfo-7.4-150300.4.32.1 * libfrr_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-debuginfo-7.4-150300.4.32.1 * libfrrfpm_pb0-7.4-150300.4.32.1 * libfrrsnmp0-debuginfo-7.4-150300.4.32.1 * frr-7.4-150300.4.32.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1 * frr-debugsource-7.4-150300.4.32.1 * libfrrzmq0-debuginfo-7.4-150300.4.32.1 * libfrr0-7.4-150300.4.32.1 * libfrrcares0-7.4-150300.4.32.1 * libfrr0-debuginfo-7.4-150300.4.32.1 * libmlag_pb0-7.4-150300.4.32.1 * frr-devel-7.4-150300.4.32.1 * frr-debuginfo-7.4-150300.4.32.1 * libfrrsnmp0-7.4-150300.4.32.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libfrrospfapiclient0-7.4-150300.4.32.1 * libfrrgrpc_pb0-7.4-150300.4.32.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1 * libfrrzmq0-7.4-150300.4.32.1 * libfrr_pb0-7.4-150300.4.32.1 * libmlag_pb0-debuginfo-7.4-150300.4.32.1 * libfrr_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-debuginfo-7.4-150300.4.32.1 * libfrrfpm_pb0-7.4-150300.4.32.1 * libfrrsnmp0-debuginfo-7.4-150300.4.32.1 * frr-7.4-150300.4.32.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1 * frr-debugsource-7.4-150300.4.32.1 * libfrrzmq0-debuginfo-7.4-150300.4.32.1 * libfrr0-7.4-150300.4.32.1 * libfrrcares0-7.4-150300.4.32.1 * libfrr0-debuginfo-7.4-150300.4.32.1 * libmlag_pb0-7.4-150300.4.32.1 * frr-devel-7.4-150300.4.32.1 * frr-debuginfo-7.4-150300.4.32.1 * libfrrsnmp0-7.4-150300.4.32.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libfrrospfapiclient0-7.4-150300.4.32.1 * libfrrgrpc_pb0-7.4-150300.4.32.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1 * libfrrzmq0-7.4-150300.4.32.1 * libfrr_pb0-7.4-150300.4.32.1 * libmlag_pb0-debuginfo-7.4-150300.4.32.1 * libfrr_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-debuginfo-7.4-150300.4.32.1 * libfrrfpm_pb0-7.4-150300.4.32.1 * libfrrsnmp0-debuginfo-7.4-150300.4.32.1 * frr-7.4-150300.4.32.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1 * frr-debugsource-7.4-150300.4.32.1 * libfrrzmq0-debuginfo-7.4-150300.4.32.1 * libfrr0-7.4-150300.4.32.1 * libfrrcares0-7.4-150300.4.32.1 * libfrr0-debuginfo-7.4-150300.4.32.1 * libmlag_pb0-7.4-150300.4.32.1 * frr-devel-7.4-150300.4.32.1 * frr-debuginfo-7.4-150300.4.32.1 * libfrrsnmp0-7.4-150300.4.32.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libfrrospfapiclient0-7.4-150300.4.32.1 * libfrrgrpc_pb0-7.4-150300.4.32.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1 * libfrrzmq0-7.4-150300.4.32.1 * libfrr_pb0-7.4-150300.4.32.1 * libmlag_pb0-debuginfo-7.4-150300.4.32.1 * libfrr_pb0-debuginfo-7.4-150300.4.32.1 * libfrrcares0-debuginfo-7.4-150300.4.32.1 * libfrrfpm_pb0-7.4-150300.4.32.1 * libfrrsnmp0-debuginfo-7.4-150300.4.32.1 * frr-7.4-150300.4.32.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1 * frr-debugsource-7.4-150300.4.32.1 * libfrrzmq0-debuginfo-7.4-150300.4.32.1 * libfrr0-7.4-150300.4.32.1 * libfrrcares0-7.4-150300.4.32.1 * libfrr0-debuginfo-7.4-150300.4.32.1 * libmlag_pb0-7.4-150300.4.32.1 * frr-devel-7.4-150300.4.32.1 * frr-debuginfo-7.4-150300.4.32.1 * libfrrsnmp0-7.4-150300.4.32.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1 ## References: * https://www.suse.com/security/cve/CVE-2017-15865.html * https://bugzilla.suse.com/show_bug.cgi?id=1230866 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 4 16:30:40 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Oct 2024 16:30:40 -0000 Subject: SUSE-SU-2024:3523-1: critical: Security update for cups-filters Message-ID: <172805944097.21943.8267114608331130202@smelt2.prg2.suse.org> # Security update for cups-filters Announcement ID: SUSE-SU-2024:3523-1 Release Date: 2024-10-04T13:17:53Z Rating: critical References: * bsc#1230939 Cross-References: * CVE-2024-47176 CVSS scores: * CVE-2024-47176 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H * CVE-2024-47176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47176 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for cups-filters fixes the following issues: * cups-browsed would bind on UDP INADDR_ANY:631 and trust any packet from any source to trigger a Get-Printer-Attributes IPP request to an attacker controlled URL. This patch removes support for the legacy CUPS and LDAP protocols(bsc#1230939, CVE-2024-47176) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3523=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3523=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3523=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3523=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3523=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3523=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3523=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3523=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3523=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3523=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3523=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3523=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3523=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3523=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3523=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3523=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3523=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3523=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3523=1 ## Package List: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Manager Proxy 4.3 (x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * cups-filters-1.25.0-150200.3.16.1 * cups-filters-debugsource-1.25.0-150200.3.16.1 * cups-filters-devel-1.25.0-150200.3.16.1 * cups-filters-debuginfo-1.25.0-150200.3.16.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47176.html * https://bugzilla.suse.com/show_bug.cgi?id=1230939 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 7 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 07 Oct 2024 08:30:03 -0000 Subject: SUSE-RU-2024:3534-1: moderate: Recommended update for dehydrated Message-ID: <172828980398.21943.6779291807378403298@smelt2.prg2.suse.org> # Recommended update for dehydrated Announcement ID: SUSE-RU-2024:3534-1 Release Date: 2024-10-07T05:21:38Z Rating: moderate References: * bsc#1184165 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for dehydrated fixes the following issues: * Update to 0.7.1 * See https://github.com/dehydrated-io/dehydrated/releases/tag/v0.7.1 * Switch to sysuser for user/group setup * Add user/group provides for rpm 4.19 * Add instance name to unit description * Check instance specific configuration * Add postrun hook scripts for apache+nginx * Target should not PartOf on itself * Copy the changes entry into README.postrun-hooks to make it easier for users to find the information how to restore the postrun-hooks after the split. * Enable instantiated services (bsc#1184165) * Prepare instantiated service/timer support but not enable it: This seems to fail due to missing systemd support right now. So the only option at the moment is to copy the timer and unit file for a 2nd instance. Mark all files as part of dehydrated.target * Rework support for /etc/dehydrated/postrun-hooks.d/: dehydrated.service no longer starts them directly, the support was moved to a separate unit file. Please run: systemctl enable dehydrated-postrun-hooks.service to restore this functionality * Run dehydrated as dehydrated user again * Do not use the full path for config.d in the config files, which will simplify implementing multi instance support. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3534=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3534=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3534=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3534=1 ## Package List: * openSUSE Leap 15.5 (noarch) * dehydrated-apache2-0.7.1-150200.11.9.1 * dehydrated-nginx-0.7.1-150200.11.9.1 * dehydrated-0.7.1-150200.11.9.1 * openSUSE Leap 15.6 (noarch) * dehydrated-apache2-0.7.1-150200.11.9.1 * dehydrated-nginx-0.7.1-150200.11.9.1 * dehydrated-0.7.1-150200.11.9.1 * Server Applications Module 15-SP5 (noarch) * dehydrated-apache2-0.7.1-150200.11.9.1 * dehydrated-nginx-0.7.1-150200.11.9.1 * dehydrated-0.7.1-150200.11.9.1 * Server Applications Module 15-SP6 (noarch) * dehydrated-apache2-0.7.1-150200.11.9.1 * dehydrated-nginx-0.7.1-150200.11.9.1 * dehydrated-0.7.1-150200.11.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1184165 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 7 08:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 07 Oct 2024 08:30:10 -0000 Subject: SUSE-RU-2024:35851-1: important: Recommended update for SLES12-SP4-SLES15-Migration Message-ID: <172828981064.21943.11816464246610560767@smelt2.prg2.suse.org> # Recommended update for SLES12-SP4-SLES15-Migration Announcement ID: SUSE-RU-2024:35851-1 Release Date: 2024-10-07T04:59:57Z Rating: important References: * bsc#1219004 * bsc#1222258 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has two fixes can now be installed. ## Description: This update for SLES12-SP4-SLES15-Migration fixes the following issues: * Update to v2.0.40 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2024-35851=1 ## Package List: * Public Cloud Module 12 (x86_64) * SLES15-Migration-2.0.40-6 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219004 * https://bugzilla.suse.com/show_bug.cgi?id=1222258 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 7 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 07 Oct 2024 12:30:05 -0000 Subject: SUSE-RU-2024:3536-1: moderate: Recommended update for libzypp, zypper Message-ID: <172830420546.6932.7308438297033549112@smelt2.prg2.suse.org> # Recommended update for libzypp, zypper Announcement ID: SUSE-RU-2024:3536-1 Release Date: 2024-10-07T10:18:07Z Rating: moderate References: * bsc#1228647 * bsc#1230267 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has two fixes can now be installed. ## Description: This update for libzypp, zypper fixes the following issues: * API refactoring. Prevent zypper from using now private libzypp symbols (bsc#1230267) * single_rpmtrans: fix installation of .src.rpms (bsc#1228647) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3536=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3536=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3536=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3536=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3536=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3536=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3536=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3536=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3536=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3536=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libzypp-debugsource-17.35.11-150200.126.2 * libzypp-17.35.11-150200.126.2 * zypper-1.14.77-150200.93.2 * zypper-debugsource-1.14.77-150200.93.2 * libzypp-devel-17.35.11-150200.126.2 * zypper-debuginfo-1.14.77-150200.93.2 * libzypp-debuginfo-17.35.11-150200.126.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * zypper-needs-restarting-1.14.77-150200.93.2 * zypper-log-1.14.77-150200.93.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libzypp-debugsource-17.35.11-150200.126.2 * libzypp-17.35.11-150200.126.2 * zypper-1.14.77-150200.93.2 * zypper-debugsource-1.14.77-150200.93.2 * libzypp-devel-17.35.11-150200.126.2 * zypper-debuginfo-1.14.77-150200.93.2 * libzypp-debuginfo-17.35.11-150200.126.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * zypper-needs-restarting-1.14.77-150200.93.2 * zypper-log-1.14.77-150200.93.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libzypp-debugsource-17.35.11-150200.126.2 * libzypp-17.35.11-150200.126.2 * zypper-1.14.77-150200.93.2 * zypper-debugsource-1.14.77-150200.93.2 * libzypp-devel-17.35.11-150200.126.2 * zypper-debuginfo-1.14.77-150200.93.2 * libzypp-debuginfo-17.35.11-150200.126.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * zypper-needs-restarting-1.14.77-150200.93.2 * zypper-log-1.14.77-150200.93.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libzypp-debugsource-17.35.11-150200.126.2 * libzypp-17.35.11-150200.126.2 * zypper-1.14.77-150200.93.2 * zypper-debugsource-1.14.77-150200.93.2 * libzypp-devel-17.35.11-150200.126.2 * zypper-debuginfo-1.14.77-150200.93.2 * libzypp-debuginfo-17.35.11-150200.126.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * zypper-needs-restarting-1.14.77-150200.93.2 * zypper-log-1.14.77-150200.93.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libzypp-debugsource-17.35.11-150200.126.2 * libzypp-17.35.11-150200.126.2 * zypper-1.14.77-150200.93.2 * zypper-debugsource-1.14.77-150200.93.2 * libzypp-devel-17.35.11-150200.126.2 * zypper-debuginfo-1.14.77-150200.93.2 * libzypp-debuginfo-17.35.11-150200.126.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * zypper-needs-restarting-1.14.77-150200.93.2 * zypper-log-1.14.77-150200.93.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libzypp-debugsource-17.35.11-150200.126.2 * libzypp-17.35.11-150200.126.2 * zypper-1.14.77-150200.93.2 * zypper-debugsource-1.14.77-150200.93.2 * libzypp-devel-17.35.11-150200.126.2 * zypper-debuginfo-1.14.77-150200.93.2 * libzypp-debuginfo-17.35.11-150200.126.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * zypper-needs-restarting-1.14.77-150200.93.2 * zypper-log-1.14.77-150200.93.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libzypp-debugsource-17.35.11-150200.126.2 * libzypp-17.35.11-150200.126.2 * zypper-1.14.77-150200.93.2 * zypper-debugsource-1.14.77-150200.93.2 * libzypp-devel-17.35.11-150200.126.2 * zypper-debuginfo-1.14.77-150200.93.2 * libzypp-debuginfo-17.35.11-150200.126.2 * SUSE Enterprise Storage 7.1 (noarch) * zypper-needs-restarting-1.14.77-150200.93.2 * zypper-log-1.14.77-150200.93.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libzypp-debugsource-17.35.11-150200.126.2 * libzypp-17.35.11-150200.126.2 * zypper-1.14.77-150200.93.2 * zypper-debugsource-1.14.77-150200.93.2 * zypper-debuginfo-1.14.77-150200.93.2 * libzypp-debuginfo-17.35.11-150200.126.2 * SUSE Linux Enterprise Micro 5.1 (noarch) * zypper-needs-restarting-1.14.77-150200.93.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libzypp-debugsource-17.35.11-150200.126.2 * libzypp-17.35.11-150200.126.2 * zypper-1.14.77-150200.93.2 * zypper-debugsource-1.14.77-150200.93.2 * zypper-debuginfo-1.14.77-150200.93.2 * libzypp-debuginfo-17.35.11-150200.126.2 * SUSE Linux Enterprise Micro 5.2 (noarch) * zypper-needs-restarting-1.14.77-150200.93.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libzypp-debugsource-17.35.11-150200.126.2 * libzypp-17.35.11-150200.126.2 * zypper-1.14.77-150200.93.2 * zypper-debugsource-1.14.77-150200.93.2 * zypper-debuginfo-1.14.77-150200.93.2 * libzypp-debuginfo-17.35.11-150200.126.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * zypper-needs-restarting-1.14.77-150200.93.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228647 * https://bugzilla.suse.com/show_bug.cgi?id=1230267 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 7 12:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 07 Oct 2024 12:30:09 -0000 Subject: SUSE-SU-2024:3535-1: important: Security update for redis Message-ID: <172830420980.6932.7328188577053039220@smelt2.prg2.suse.org> # Security update for redis Announcement ID: SUSE-SU-2024:3535-1 Release Date: 2024-10-07T08:53:19Z Rating: important References: * bsc#1231264 * bsc#1231265 * bsc#1231266 Cross-References: * CVE-2024-31227 * CVE-2024-31228 * CVE-2024-31449 CVSS scores: * CVE-2024-31227 ( SUSE ): 4.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2024-31228 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31449 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for redis fixes the following issues: * CVE-2024-31227: Fixed parsing issue leading to denail of service (bsc#1231266) * CVE-2024-31228: Fixed unbounded recursive pattern matching (bsc#1231265) * CVE-2024-31449: Fixed integer overflow bug in Lua bit_tohex (bsc#1231264) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3535=1 SUSE-2024-3535=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3535=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * redis-7.2.4-150600.3.3.1 * redis-debuginfo-7.2.4-150600.3.3.1 * redis-debugsource-7.2.4-150600.3.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * redis-7.2.4-150600.3.3.1 * redis-debuginfo-7.2.4-150600.3.3.1 * redis-debugsource-7.2.4-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-31227.html * https://www.suse.com/security/cve/CVE-2024-31228.html * https://www.suse.com/security/cve/CVE-2024-31449.html * https://bugzilla.suse.com/show_bug.cgi?id=1231264 * https://bugzilla.suse.com/show_bug.cgi?id=1231265 * https://bugzilla.suse.com/show_bug.cgi?id=1231266 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 7 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 07 Oct 2024 16:30:07 -0000 Subject: SUSE-SU-2024:3538-1: moderate: Security update for mozjs115 Message-ID: <172831860754.7152.7269875265527846468@smelt2.prg2.suse.org> # Security update for mozjs115 Announcement ID: SUSE-SU-2024:3538-1 Release Date: 2024-10-07T12:16:42Z Rating: moderate References: * bsc#1230036 * bsc#1230037 * bsc#1230038 Cross-References: * CVE-2024-45490 * CVE-2024-45491 * CVE-2024-45492 CVSS scores: * CVE-2024-45490 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45491 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45492 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for mozjs115 fixes the following issues: * CVE-2024-45490: Fixed negative len for XML_ParseBuffer in embedded expat (bnc#1230036) * CVE-2024-45491: Fixed integer overflow in dtdCopy in embedded expat (bnc#1230037) * CVE-2024-45492: Fixed integer overflow in function nextScaffoldPart in embedded expat (bnc#1230038) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3538=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3538=1 openSUSE-SLE-15.6-2024-3538=1 ## Package List: * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * mozjs115-debugsource-115.4.0-150600.3.3.1 * libmozjs-115-0-115.4.0-150600.3.3.1 * mozjs115-debuginfo-115.4.0-150600.3.3.1 * mozjs115-devel-115.4.0-150600.3.3.1 * libmozjs-115-0-debuginfo-115.4.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i686) * mozjs115-debugsource-115.4.0-150600.3.3.1 * libmozjs-115-0-115.4.0-150600.3.3.1 * mozjs115-debuginfo-115.4.0-150600.3.3.1 * mozjs115-115.4.0-150600.3.3.1 * mozjs115-devel-115.4.0-150600.3.3.1 * libmozjs-115-0-debuginfo-115.4.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45490.html * https://www.suse.com/security/cve/CVE-2024-45491.html * https://www.suse.com/security/cve/CVE-2024-45492.html * https://bugzilla.suse.com/show_bug.cgi?id=1230036 * https://bugzilla.suse.com/show_bug.cgi?id=1230037 * https://bugzilla.suse.com/show_bug.cgi?id=1230038 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 7 16:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 07 Oct 2024 16:30:12 -0000 Subject: SUSE-SU-2024:3537-1: important: Security update for redis7 Message-ID: <172831861248.7152.1397714783546204611@smelt2.prg2.suse.org> # Security update for redis7 Announcement ID: SUSE-SU-2024:3537-1 Release Date: 2024-10-07T12:16:21Z Rating: important References: * bsc#1231264 * bsc#1231265 * bsc#1231266 Cross-References: * CVE-2024-31227 * CVE-2024-31228 * CVE-2024-31449 CVSS scores: * CVE-2024-31227 ( SUSE ): 4.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2024-31228 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31449 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for redis7 fixes the following issues: * CVE-2024-31227: Fixed parsing issue leading to denail of service (bsc#1231266) * CVE-2024-31228: Fixed unbounded recursive pattern matching (bsc#1231265) * CVE-2024-31449: Fixed integer overflow bug in Lua bit_tohex (bsc#1231264) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3537=1 openSUSE-SLE-15.6-2024-3537=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3537=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * redis7-7.0.8-150600.8.3.1 * redis7-debuginfo-7.0.8-150600.8.3.1 * redis7-debugsource-7.0.8-150600.8.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * redis7-7.0.8-150600.8.3.1 * redis7-debuginfo-7.0.8-150600.8.3.1 * redis7-debugsource-7.0.8-150600.8.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-31227.html * https://www.suse.com/security/cve/CVE-2024-31228.html * https://www.suse.com/security/cve/CVE-2024-31449.html * https://bugzilla.suse.com/show_bug.cgi?id=1231264 * https://bugzilla.suse.com/show_bug.cgi?id=1231265 * https://bugzilla.suse.com/show_bug.cgi?id=1231266 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 08:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 08:30:12 -0000 Subject: SUSE-RU-2024:3539-1: moderate: Recommended update for obs-service-docker_label_helper Message-ID: <172837621289.6932.9241309698029110844@smelt2.prg2.suse.org> # Recommended update for obs-service-docker_label_helper Announcement ID: SUSE-RU-2024:3539-1 Release Date: 2024-10-08T06:06:58Z Rating: moderate References: * bsc#1225985 Affected Products: * Containers Module 15-SP5 * Containers Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for obs-service-docker_label_helper fixes the following issues: * Support Docker.FLAVOR in _multibuild (bsc#1225985). * Handle LABEL statements with any whitespace and LABEL values containing "=" properly. * Do not ever use "%setup -n ." and use "%setup -c" instead, which creates the appropriate %{name}-%{version} directory expected. * Avoid mangling whitespace by using gsub instead of assigning to fields ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3539=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3539=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3539=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3539=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3539=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3539=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3539=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3539=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3539=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3539=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3539=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3539=1 ## Package List: * openSUSE Leap 15.5 (noarch) * obs-service-docker_label_helper-0.0-150200.5.9.2 * openSUSE Leap 15.6 (noarch) * obs-service-docker_label_helper-0.0-150200.5.9.2 * Containers Module 15-SP5 (noarch) * obs-service-docker_label_helper-0.0-150200.5.9.2 * Containers Module 15-SP6 (noarch) * obs-service-docker_label_helper-0.0-150200.5.9.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * obs-service-docker_label_helper-0.0-150200.5.9.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * obs-service-docker_label_helper-0.0-150200.5.9.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * obs-service-docker_label_helper-0.0-150200.5.9.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * obs-service-docker_label_helper-0.0-150200.5.9.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * obs-service-docker_label_helper-0.0-150200.5.9.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * obs-service-docker_label_helper-0.0-150200.5.9.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * obs-service-docker_label_helper-0.0-150200.5.9.2 * SUSE Enterprise Storage 7.1 (noarch) * obs-service-docker_label_helper-0.0-150200.5.9.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1225985 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 12:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 12:30:14 -0000 Subject: SUSE-SU-2024:3541-1: moderate: Security update for podofo Message-ID: <172839061497.6932.6912823803954949448@smelt2.prg2.suse.org> # Security update for podofo Announcement ID: SUSE-SU-2024:3541-1 Release Date: 2024-10-08T08:33:37Z Rating: moderate References: * bsc#1023072 * bsc#1023190 * bsc#1027776 * bsc#1027779 * bsc#1027785 * bsc#1027786 * bsc#1027787 * bsc#1037000 * bsc#1075772 * bsc#1127855 * bsc#1131544 Cross-References: * CVE-2015-8981 * CVE-2017-5854 * CVE-2017-6840 * CVE-2017-6841 * CVE-2017-6842 * CVE-2017-6845 * CVE-2017-6849 * CVE-2017-8378 * CVE-2018-5308 * CVE-2019-10723 * CVE-2019-9199 CVSS scores: * CVE-2017-5854 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2017-6840 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2017-6841 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2017-6842 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2017-6845 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2017-6849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2017-6849 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2017-8378 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2017-8378 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-5308 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2018-5308 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2019-10723 ( SUSE ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-10723 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-9199 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2019-9199 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves 11 vulnerabilities can now be installed. ## Description: This update for podofo fixes the following issues: * CVE-2015-8981: Fixed heap overflow in the function ReadXRefSubsection (bsc#1023190) * CVE-2017-6840: Fixed invalid memory read in ColorChanger::GetColorFromStack (colorchanger.cpp) (bsc#1027787) * CVE-2017-6841: Fixed NULL pointer dereference in GraphicsStack::TGraphicsStackElement::~TGraphicsStackElement (graphicsstack.h) (bsc#1027786) * CVE-2017-6842: Fixed NULL pointer dereference in ColorChanger::GetColorFromStack (colorchanger.cpp) (bsc#1027785) * CVE-2017-6845: Fixed NULL pointer dereference in GraphicsStack::TGraphicsStackElement::SetNonStrokingColorSpace (graphicsstack.h) (bsc#1027779) * CVE-2017-6849: Fixed NULL pointer dereference in PoDoFo::PdfColorGray::~PdfColorGray (PdfColor.cpp) (bsc#1027776) * CVE-2017-8378: Fixed denial of service (application crash) vectors related to m_offsets.size (PdfParser::ReadObjects func in base/PdfParser.cpp) (bsc#1037000) * CVE-2018-5308: Fixed Undefined behavior (memcpy with NULL pointer) in PdfMemoryOutputStream::Write (src/base/PdfOutputStream.cpp) (bsc#1075772) * CVE-2019-10723: Fixed Memory leak in PdfPagesTreeCache class in doc/PdfPagesTreeCache.cpp (bsc#1131544) * CVE-2019-9199: Fixed NULL pointer dereference in function PoDoFo:Impose:PdfTranslator:setSource() in pdftranslator.cpp (bsc#1127855) * Fixed NULL pointer dereference in PdfInfo::GuessFormat (pdfinfo.cpp) (bsc#1023072) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3541=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-3541=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * podofo-debugsource-0.9.2-3.21.1 * podofo-debuginfo-0.9.2-3.21.1 * libpodofo-devel-0.9.2-3.21.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * podofo-debugsource-0.9.2-3.21.1 * podofo-debuginfo-0.9.2-3.21.1 * libpodofo0_9_2-debuginfo-0.9.2-3.21.1 * libpodofo0_9_2-0.9.2-3.21.1 ## References: * https://www.suse.com/security/cve/CVE-2015-8981.html * https://www.suse.com/security/cve/CVE-2017-5854.html * https://www.suse.com/security/cve/CVE-2017-6840.html * https://www.suse.com/security/cve/CVE-2017-6841.html * https://www.suse.com/security/cve/CVE-2017-6842.html * https://www.suse.com/security/cve/CVE-2017-6845.html * https://www.suse.com/security/cve/CVE-2017-6849.html * https://www.suse.com/security/cve/CVE-2017-8378.html * https://www.suse.com/security/cve/CVE-2018-5308.html * https://www.suse.com/security/cve/CVE-2019-10723.html * https://www.suse.com/security/cve/CVE-2019-9199.html * https://bugzilla.suse.com/show_bug.cgi?id=1023072 * https://bugzilla.suse.com/show_bug.cgi?id=1023190 * https://bugzilla.suse.com/show_bug.cgi?id=1027776 * https://bugzilla.suse.com/show_bug.cgi?id=1027779 * https://bugzilla.suse.com/show_bug.cgi?id=1027785 * https://bugzilla.suse.com/show_bug.cgi?id=1027786 * https://bugzilla.suse.com/show_bug.cgi?id=1027787 * https://bugzilla.suse.com/show_bug.cgi?id=1037000 * https://bugzilla.suse.com/show_bug.cgi?id=1075772 * https://bugzilla.suse.com/show_bug.cgi?id=1127855 * https://bugzilla.suse.com/show_bug.cgi?id=1131544 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 12:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 12:30:20 -0000 Subject: SUSE-SU-2024:3540-1: moderate: Security update for Mesa Message-ID: <172839062059.6932.12937242900358643702@smelt2.prg2.suse.org> # Security update for Mesa Announcement ID: SUSE-SU-2024:3540-1 Release Date: 2024-10-08T08:30:31Z Rating: moderate References: * bsc#1222040 * bsc#1222041 * bsc#1222042 Cross-References: * CVE-2023-45913 * CVE-2023-45919 * CVE-2023-45922 CVSS scores: * CVE-2023-45913 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-45919 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H * CVE-2023-45922 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for Mesa fixes the following issues: * CVE-2023-45913: Fixed NULL pointer dereference via dri2GetGlxDrawableFromXDrawableId() (bsc#1222040) * CVE-2023-45919: Fixed buffer over-read in glXQueryServerString() (bsc#1222041) * CVE-2023-45922: Fixed segmentation violation in __glXGetDrawableAttribute() (bsc#1222042) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3540=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3540=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3540=1 openSUSE-SLE-15.6-2024-3540=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3540=1 ## Package List: * SUSE Package Hub 15 15-SP6 (x86_64) * libOSMesa8-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-debugsource-23.3.4-150600.83.3.1 * libOSMesa8-32bit-23.3.4-150600.83.3.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * Mesa-dri-nouveau-23.3.4-150600.83.3.1 * Mesa-dri-nouveau-debuginfo-23.3.4-150600.83.3.1 * libvdpau_nouveau-debuginfo-23.3.4-150600.83.3.1 * Mesa-drivers-debugsource-23.3.4-150600.83.3.1 * libvdpau_nouveau-23.3.4-150600.83.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libgbm-devel-23.3.4-150600.83.3.1 * Mesa-libglapi0-23.3.4-150600.83.3.1 * libOSMesa8-23.3.4-150600.83.3.1 * Mesa-libglapi-devel-23.3.4-150600.83.3.1 * Mesa-drivers-debugsource-23.3.4-150600.83.3.1 * libOSMesa8-debuginfo-23.3.4-150600.83.3.1 * Mesa-libGL1-23.3.4-150600.83.3.1 * Mesa-libGL-devel-23.3.4-150600.83.3.1 * Mesa-devel-23.3.4-150600.83.3.1 * Mesa-KHR-devel-23.3.4-150600.83.3.1 * Mesa-debugsource-23.3.4-150600.83.3.1 * Mesa-libGLESv1_CM-devel-23.3.4-150600.83.3.1 * Mesa-dri-23.3.4-150600.83.3.1 * libgbm1-23.3.4-150600.83.3.1 * Mesa-dri-devel-23.3.4-150600.83.3.1 * Mesa-libGLESv3-devel-23.3.4-150600.83.3.1 * Mesa-libEGL-devel-23.3.4-150600.83.3.1 * Mesa-23.3.4-150600.83.3.1 * Mesa-dri-debuginfo-23.3.4-150600.83.3.1 * Mesa-libglapi0-debuginfo-23.3.4-150600.83.3.1 * libOSMesa-devel-23.3.4-150600.83.3.1 * Mesa-libGLESv2-devel-23.3.4-150600.83.3.1 * libgbm1-debuginfo-23.3.4-150600.83.3.1 * Mesa-libGL1-debuginfo-23.3.4-150600.83.3.1 * Mesa-libEGL1-23.3.4-150600.83.3.1 * Mesa-libEGL1-debuginfo-23.3.4-150600.83.3.1 * openSUSE Leap 15.6 (x86_64) * Mesa-libEGL-devel-32bit-23.3.4-150600.83.3.1 * Mesa-libGL1-32bit-debuginfo-23.3.4-150600.83.3.1 * libOSMesa8-32bit-23.3.4-150600.83.3.1 * Mesa-vulkan-overlay-32bit-debuginfo-23.3.4-150600.83.3.1 * libvulkan_radeon-32bit-23.3.4-150600.83.3.1 * Mesa-libd3d-32bit-debuginfo-23.3.4-150600.83.3.1 * libvdpau_radeonsi-32bit-23.3.4-150600.83.3.1 * Mesa-dri-32bit-23.3.4-150600.83.3.1 * Mesa-libglapi0-32bit-23.3.4-150600.83.3.1 * libvulkan_radeon-32bit-debuginfo-23.3.4-150600.83.3.1 * libvdpau_r600-32bit-23.3.4-150600.83.3.1 * libgbm1-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-libd3d-devel-32bit-23.3.4-150600.83.3.1 * Mesa-vulkan-device-select-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-libGLESv1_CM-devel-32bit-23.3.4-150600.83.3.1 * Mesa-dri-32bit-debuginfo-23.3.4-150600.83.3.1 * libvulkan_intel-32bit-23.3.4-150600.83.3.1 * Mesa-dri-nouveau-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-32bit-23.3.4-150600.83.3.1 * libvdpau_nouveau-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-libEGL1-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-libGL1-32bit-23.3.4-150600.83.3.1 * Mesa-libGLESv2-devel-32bit-23.3.4-150600.83.3.1 * Mesa-vulkan-overlay-32bit-23.3.4-150600.83.3.1 * Mesa-gallium-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-libEGL1-32bit-23.3.4-150600.83.3.1 * Mesa-libglapi0-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-gallium-32bit-23.3.4-150600.83.3.1 * libvdpau_virtio_gpu-32bit-23.3.4-150600.83.3.1 * Mesa-libglapi-devel-32bit-23.3.4-150600.83.3.1 * libOSMesa8-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-libd3d-32bit-23.3.4-150600.83.3.1 * Mesa-dri-nouveau-32bit-23.3.4-150600.83.3.1 * Mesa-libGL-devel-32bit-23.3.4-150600.83.3.1 * libvdpau_nouveau-32bit-23.3.4-150600.83.3.1 * libvdpau_virtio_gpu-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-vulkan-device-select-32bit-23.3.4-150600.83.3.1 * libvdpau_radeonsi-32bit-debuginfo-23.3.4-150600.83.3.1 * libgbm-devel-32bit-23.3.4-150600.83.3.1 * libvdpau_r600-32bit-debuginfo-23.3.4-150600.83.3.1 * libvulkan_intel-32bit-debuginfo-23.3.4-150600.83.3.1 * libOSMesa-devel-32bit-23.3.4-150600.83.3.1 * libgbm1-32bit-23.3.4-150600.83.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64 i586) * Mesa-dri-nouveau-23.3.4-150600.83.3.1 * libvdpau_r600-debuginfo-23.3.4-150600.83.3.1 * libvdpau_virtio_gpu-debuginfo-23.3.4-150600.83.3.1 * Mesa-gallium-debuginfo-23.3.4-150600.83.3.1 * libxatracker2-1.0.0-150600.83.3.1 * libvdpau_radeonsi-23.3.4-150600.83.3.1 * Mesa-gallium-23.3.4-150600.83.3.1 * Mesa-dri-nouveau-debuginfo-23.3.4-150600.83.3.1 * libvdpau_nouveau-debuginfo-23.3.4-150600.83.3.1 * libxatracker2-debuginfo-1.0.0-150600.83.3.1 * Mesa-libOpenCL-debuginfo-23.3.4-150600.83.3.1 * libvdpau_r600-23.3.4-150600.83.3.1 * Mesa-libva-debuginfo-23.3.4-150600.83.3.1 * Mesa-libva-23.3.4-150600.83.3.1 * libvdpau_radeonsi-debuginfo-23.3.4-150600.83.3.1 * libvdpau_nouveau-23.3.4-150600.83.3.1 * libvdpau_virtio_gpu-23.3.4-150600.83.3.1 * Mesa-libOpenCL-23.3.4-150600.83.3.1 * libxatracker-devel-1.0.0-150600.83.3.1 * openSUSE Leap 15.6 (x86_64 i586) * Mesa-libd3d-23.3.4-150600.83.3.1 * libvulkan_intel-debuginfo-23.3.4-150600.83.3.1 * Mesa-libd3d-debuginfo-23.3.4-150600.83.3.1 * Mesa-libd3d-devel-23.3.4-150600.83.3.1 * libvulkan_intel-23.3.4-150600.83.3.1 * openSUSE Leap 15.6 (aarch64 x86_64 i586) * Mesa-vulkan-overlay-23.3.4-150600.83.3.1 * libvulkan_radeon-23.3.4-150600.83.3.1 * Mesa-vulkan-device-select-23.3.4-150600.83.3.1 * Mesa-vulkan-overlay-debuginfo-23.3.4-150600.83.3.1 * Mesa-vulkan-device-select-debuginfo-23.3.4-150600.83.3.1 * libvulkan_lvp-23.3.4-150600.83.3.1 * libvulkan_lvp-debuginfo-23.3.4-150600.83.3.1 * libvulkan_radeon-debuginfo-23.3.4-150600.83.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * Mesa-vulkan-device-select-64bit-23.3.4-150600.83.3.1 * Mesa-libEGL1-64bit-23.3.4-150600.83.3.1 * libvdpau_radeonsi-64bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-64bit-23.3.4-150600.83.3.1 * Mesa-libglapi0-64bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-libGL1-64bit-23.3.4-150600.83.3.1 * Mesa-dri-nouveau-64bit-debuginfo-23.3.4-150600.83.3.1 * libvdpau_virtio_gpu-64bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-libGLESv1_CM-devel-64bit-23.3.4-150600.83.3.1 * Mesa-libglapi-devel-64bit-23.3.4-150600.83.3.1 * Mesa-vulkan-device-select-64bit-debuginfo-23.3.4-150600.83.3.1 * libOSMesa-devel-64bit-23.3.4-150600.83.3.1 * Mesa-libGL1-64bit-debuginfo-23.3.4-150600.83.3.1 * libvdpau_r600-64bit-23.3.4-150600.83.3.1 * libgbm1-64bit-23.3.4-150600.83.3.1 * Mesa-libGL-devel-64bit-23.3.4-150600.83.3.1 * libvulkan_radeon-64bit-23.3.4-150600.83.3.1 * libvdpau_r600-64bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-dri-64bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-dri-vc4-64bit-23.3.4-150600.83.3.1 * libOSMesa8-64bit-debuginfo-23.3.4-150600.83.3.1 * libgbm-devel-64bit-23.3.4-150600.83.3.1 * Mesa-libEGL1-64bit-debuginfo-23.3.4-150600.83.3.1 * libvdpau_virtio_gpu-64bit-23.3.4-150600.83.3.1 * Mesa-vulkan-overlay-64bit-debuginfo-23.3.4-150600.83.3.1 * libvdpau_radeonsi-64bit-23.3.4-150600.83.3.1 * Mesa-dri-nouveau-64bit-23.3.4-150600.83.3.1 * libgbm1-64bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-vulkan-overlay-64bit-23.3.4-150600.83.3.1 * libvulkan_radeon-64bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-dri-vc4-64bit-debuginfo-23.3.4-150600.83.3.1 * libvdpau_nouveau-64bit-debuginfo-23.3.4-150600.83.3.1 * libvdpau_nouveau-64bit-23.3.4-150600.83.3.1 * Mesa-gallium-64bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-libGLESv2-devel-64bit-23.3.4-150600.83.3.1 * Mesa-libEGL-devel-64bit-23.3.4-150600.83.3.1 * Mesa-dri-64bit-23.3.4-150600.83.3.1 * Mesa-gallium-64bit-23.3.4-150600.83.3.1 * libOSMesa8-64bit-23.3.4-150600.83.3.1 * Mesa-libglapi0-64bit-23.3.4-150600.83.3.1 * openSUSE Leap 15.6 (aarch64) * libvulkan_freedreno-debuginfo-23.3.4-150600.83.3.1 * libvulkan_broadcom-23.3.4-150600.83.3.1 * libvulkan_broadcom-debuginfo-23.3.4-150600.83.3.1 * Mesa-dri-vc4-debuginfo-23.3.4-150600.83.3.1 * libvulkan_freedreno-23.3.4-150600.83.3.1 * Mesa-dri-vc4-23.3.4-150600.83.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libgbm-devel-23.3.4-150600.83.3.1 * Mesa-libglapi0-23.3.4-150600.83.3.1 * libOSMesa8-23.3.4-150600.83.3.1 * Mesa-libglapi-devel-23.3.4-150600.83.3.1 * Mesa-drivers-debugsource-23.3.4-150600.83.3.1 * libOSMesa8-debuginfo-23.3.4-150600.83.3.1 * Mesa-libGL1-23.3.4-150600.83.3.1 * Mesa-libGL-devel-23.3.4-150600.83.3.1 * Mesa-devel-23.3.4-150600.83.3.1 * Mesa-KHR-devel-23.3.4-150600.83.3.1 * Mesa-debugsource-23.3.4-150600.83.3.1 * Mesa-libGLESv1_CM-devel-23.3.4-150600.83.3.1 * Mesa-dri-23.3.4-150600.83.3.1 * libgbm1-23.3.4-150600.83.3.1 * Mesa-dri-devel-23.3.4-150600.83.3.1 * Mesa-libGLESv3-devel-23.3.4-150600.83.3.1 * Mesa-libEGL-devel-23.3.4-150600.83.3.1 * Mesa-23.3.4-150600.83.3.1 * Mesa-dri-debuginfo-23.3.4-150600.83.3.1 * Mesa-libglapi0-debuginfo-23.3.4-150600.83.3.1 * libOSMesa-devel-23.3.4-150600.83.3.1 * Mesa-libGLESv2-devel-23.3.4-150600.83.3.1 * libgbm1-debuginfo-23.3.4-150600.83.3.1 * Mesa-libGL1-debuginfo-23.3.4-150600.83.3.1 * Mesa-libEGL1-23.3.4-150600.83.3.1 * Mesa-libEGL1-debuginfo-23.3.4-150600.83.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64) * libvdpau_r600-debuginfo-23.3.4-150600.83.3.1 * libvdpau_virtio_gpu-debuginfo-23.3.4-150600.83.3.1 * Mesa-gallium-debuginfo-23.3.4-150600.83.3.1 * Mesa-gallium-23.3.4-150600.83.3.1 * libxatracker2-debuginfo-1.0.0-150600.83.3.1 * libvdpau_r600-23.3.4-150600.83.3.1 * Mesa-libva-debuginfo-23.3.4-150600.83.3.1 * Mesa-libva-23.3.4-150600.83.3.1 * libvdpau_virtio_gpu-23.3.4-150600.83.3.1 * libxatracker2-1.0.0-150600.83.3.1 * libxatracker-devel-1.0.0-150600.83.3.1 * Basesystem Module 15-SP6 (aarch64 x86_64) * Mesa-vulkan-overlay-23.3.4-150600.83.3.1 * libvulkan_radeon-23.3.4-150600.83.3.1 * Mesa-vulkan-device-select-23.3.4-150600.83.3.1 * Mesa-vulkan-overlay-debuginfo-23.3.4-150600.83.3.1 * Mesa-vulkan-device-select-debuginfo-23.3.4-150600.83.3.1 * libvulkan_lvp-23.3.4-150600.83.3.1 * libvulkan_lvp-debuginfo-23.3.4-150600.83.3.1 * libvulkan_radeon-debuginfo-23.3.4-150600.83.3.1 * Basesystem Module 15-SP6 (x86_64) * Mesa-libd3d-23.3.4-150600.83.3.1 * libvulkan_intel-debuginfo-23.3.4-150600.83.3.1 * Mesa-libd3d-debuginfo-23.3.4-150600.83.3.1 * Mesa-gallium-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-libGL1-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-libEGL1-32bit-23.3.4-150600.83.3.1 * Mesa-libglapi0-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-gallium-32bit-23.3.4-150600.83.3.1 * Mesa-libd3d-devel-23.3.4-150600.83.3.1 * Mesa-dri-32bit-debuginfo-23.3.4-150600.83.3.1 * libvulkan_intel-23.3.4-150600.83.3.1 * libgbm1-32bit-debuginfo-23.3.4-150600.83.3.1 * libvdpau_radeonsi-debuginfo-23.3.4-150600.83.3.1 * Mesa-dri-32bit-23.3.4-150600.83.3.1 * Mesa-32bit-23.3.4-150600.83.3.1 * libvdpau_radeonsi-23.3.4-150600.83.3.1 * Mesa-libEGL1-32bit-debuginfo-23.3.4-150600.83.3.1 * Mesa-libglapi0-32bit-23.3.4-150600.83.3.1 * Mesa-libGL1-32bit-23.3.4-150600.83.3.1 * libgbm1-32bit-23.3.4-150600.83.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45913.html * https://www.suse.com/security/cve/CVE-2023-45919.html * https://www.suse.com/security/cve/CVE-2023-45922.html * https://bugzilla.suse.com/show_bug.cgi?id=1222040 * https://bugzilla.suse.com/show_bug.cgi?id=1222041 * https://bugzilla.suse.com/show_bug.cgi?id=1222042 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 16:32:24 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 16:32:24 -0000 Subject: SUSE-SU-2024:3553-1: important: Security update for the Linux Kernel Message-ID: <172840514473.4252.5169859737927441055@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3553-1 Release Date: 2024-10-08T15:10:24Z Rating: important References: * bsc#1012628 * bsc#1215199 * bsc#1216223 * bsc#1220382 * bsc#1222629 * bsc#1223600 * bsc#1223848 * bsc#1225487 * bsc#1225812 * bsc#1225903 * bsc#1226003 * bsc#1226507 * bsc#1226606 * bsc#1226666 * bsc#1226860 * bsc#1227487 * bsc#1227694 * bsc#1227819 * bsc#1227885 * bsc#1227890 * bsc#1227962 * bsc#1228090 * bsc#1228140 * bsc#1228244 * bsc#1228507 * bsc#1228771 * bsc#1229004 * bsc#1229019 * bsc#1229086 * bsc#1229167 * bsc#1229169 * bsc#1229289 * bsc#1229380 * bsc#1229429 * bsc#1229443 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229494 * bsc#1229585 * bsc#1229748 * bsc#1229764 * bsc#1229768 * bsc#1229790 * bsc#1229928 * bsc#1230015 * bsc#1230119 * bsc#1230169 * bsc#1230170 * bsc#1230173 * bsc#1230174 * bsc#1230175 * bsc#1230176 * bsc#1230178 * bsc#1230185 * bsc#1230191 * bsc#1230192 * bsc#1230193 * bsc#1230194 * bsc#1230195 * bsc#1230200 * bsc#1230204 * bsc#1230206 * bsc#1230207 * bsc#1230209 * bsc#1230211 * bsc#1230212 * bsc#1230213 * bsc#1230217 * bsc#1230221 * bsc#1230224 * bsc#1230230 * bsc#1230232 * bsc#1230233 * bsc#1230240 * bsc#1230244 * bsc#1230247 * bsc#1230248 * bsc#1230269 * bsc#1230270 * bsc#1230295 * bsc#1230340 * bsc#1230350 * bsc#1230413 * bsc#1230426 * bsc#1230430 * bsc#1230431 * bsc#1230432 * bsc#1230433 * bsc#1230434 * bsc#1230435 * bsc#1230440 * bsc#1230441 * bsc#1230442 * bsc#1230444 * bsc#1230450 * bsc#1230451 * bsc#1230454 * bsc#1230455 * bsc#1230457 * bsc#1230459 * bsc#1230506 * bsc#1230507 * bsc#1230511 * bsc#1230515 * bsc#1230517 * bsc#1230518 * bsc#1230519 * bsc#1230520 * bsc#1230521 * bsc#1230524 * bsc#1230526 * bsc#1230533 * bsc#1230535 * bsc#1230539 * bsc#1230540 * bsc#1230542 * bsc#1230549 * bsc#1230556 * bsc#1230562 * bsc#1230563 * bsc#1230564 * bsc#1230580 * bsc#1230582 * bsc#1230589 * bsc#1230602 * bsc#1230699 * bsc#1230700 * bsc#1230701 * bsc#1230702 * bsc#1230703 * bsc#1230704 * bsc#1230705 * bsc#1230706 * bsc#1230707 * bsc#1230709 * bsc#1230711 * bsc#1230712 * bsc#1230715 * bsc#1230719 * bsc#1230722 * bsc#1230724 * bsc#1230725 * bsc#1230726 * bsc#1230727 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230747 * bsc#1230748 * bsc#1230749 * bsc#1230751 * bsc#1230752 * bsc#1230753 * bsc#1230756 * bsc#1230761 * bsc#1230766 * bsc#1230767 * bsc#1230768 * bsc#1230771 * bsc#1230772 * bsc#1230775 * bsc#1230776 * bsc#1230780 * bsc#1230783 * bsc#1230786 * bsc#1230787 * bsc#1230791 * bsc#1230794 * bsc#1230796 * bsc#1230802 * bsc#1230806 * bsc#1230808 * bsc#1230809 * bsc#1230810 * bsc#1230812 * bsc#1230813 * bsc#1230814 * bsc#1230815 * bsc#1230821 * bsc#1230825 * bsc#1230830 * bsc#1230831 * bsc#1230854 * bsc#1230948 * bsc#1231008 * bsc#1231035 * bsc#1231120 * bsc#1231146 * jsc#PED-10954 * jsc#PED-9899 Cross-References: * CVE-2023-52752 * CVE-2023-52915 * CVE-2023-52916 * CVE-2024-26759 * CVE-2024-26804 * CVE-2024-36953 * CVE-2024-38538 * CVE-2024-38632 * CVE-2024-40965 * CVE-2024-40973 * CVE-2024-40983 * CVE-2024-42154 * CVE-2024-42252 * CVE-2024-43832 * CVE-2024-43835 * CVE-2024-43870 * CVE-2024-43886 * CVE-2024-43890 * CVE-2024-43904 * CVE-2024-43914 * CVE-2024-44946 * CVE-2024-44947 * CVE-2024-44948 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44960 * CVE-2024-44961 * CVE-2024-44962 * CVE-2024-44965 * CVE-2024-44967 * CVE-2024-44969 * CVE-2024-44970 * CVE-2024-44971 * CVE-2024-44972 * CVE-2024-44977 * CVE-2024-44982 * CVE-2024-44984 * CVE-2024-44986 * CVE-2024-44987 * CVE-2024-44988 * CVE-2024-44989 * CVE-2024-44990 * CVE-2024-44991 * CVE-2024-44997 * CVE-2024-44999 * CVE-2024-45000 * CVE-2024-45001 * CVE-2024-45002 * CVE-2024-45005 * CVE-2024-45006 * CVE-2024-45007 * CVE-2024-45008 * CVE-2024-45011 * CVE-2024-45012 * CVE-2024-45013 * CVE-2024-45015 * CVE-2024-45017 * CVE-2024-45018 * CVE-2024-45019 * CVE-2024-45020 * CVE-2024-45021 * CVE-2024-45022 * CVE-2024-45023 * CVE-2024-45026 * CVE-2024-45028 * CVE-2024-45029 * CVE-2024-45030 * CVE-2024-46672 * CVE-2024-46673 * CVE-2024-46674 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46687 * CVE-2024-46689 * CVE-2024-46691 * CVE-2024-46692 * CVE-2024-46693 * CVE-2024-46694 * CVE-2024-46695 * CVE-2024-46702 * CVE-2024-46706 * CVE-2024-46707 * CVE-2024-46709 * CVE-2024-46710 * CVE-2024-46711 * CVE-2024-46714 * CVE-2024-46715 * CVE-2024-46716 * CVE-2024-46717 * CVE-2024-46719 * CVE-2024-46720 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46724 * CVE-2024-46725 * CVE-2024-46726 * CVE-2024-46727 * CVE-2024-46728 * CVE-2024-46729 * CVE-2024-46730 * CVE-2024-46731 * CVE-2024-46732 * CVE-2024-46734 * CVE-2024-46735 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46741 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46746 * CVE-2024-46747 * CVE-2024-46749 * CVE-2024-46750 * CVE-2024-46751 * CVE-2024-46752 * CVE-2024-46753 * CVE-2024-46755 * CVE-2024-46756 * CVE-2024-46757 * CVE-2024-46758 * CVE-2024-46759 * CVE-2024-46760 * CVE-2024-46761 * CVE-2024-46767 * CVE-2024-46771 * CVE-2024-46772 * CVE-2024-46773 * CVE-2024-46774 * CVE-2024-46776 * CVE-2024-46778 * CVE-2024-46780 * CVE-2024-46781 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46786 * CVE-2024-46787 * CVE-2024-46791 * CVE-2024-46794 * CVE-2024-46797 * CVE-2024-46798 * CVE-2024-46822 CVSS scores: * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42252 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44960 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44960 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-44960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44961 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44962 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44984 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45012 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46711 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46724 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46734 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46734 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46735 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46741 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46741 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46741 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46747 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46749 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46749 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46752 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46756 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46756 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46757 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46757 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46758 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46758 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46786 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46794 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Confidential Computing Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 An update that solves 147 vulnerabilities, contains two features and has 42 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 CoCo kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487). * CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269). * CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340). * CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629). * CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606). * CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004). * CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio reference (bsc#1229380). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209). * CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211). * CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (bsc#1230240). * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192). * CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193). * CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194). * CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch (bsc#1230195). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling (bsc#1230169). * CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442). * CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430). * CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431). * CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter (bsc#1230432). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 (bsc#1230435). * CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow disk (bsc#1230455). * CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451). * CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() (bsc#1230518). * CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section (bsc#1230526). * CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call (bsc#1230520). * CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes (bsc#1230521). * CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers (bsc#1230540). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-46727: Fixed NULL pointer dereference in resource_log_pipe_topology_update (bsc#1230707). * CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop (bsc#1230704). * CVE-2024-46735: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() (bsc#1230727). * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786). * CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). The following non-security bugs were fixed: * ABI: testing: fix admv8818 attr description (git-fixes). * ACPI: CPPC: Add helper to get the highest performance value (stable-fixes). * ACPI: CPPC: Fix MASK_VAL() usage (git-fixes). * ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git- fixes). * ACPI: processor: Fix memory leaks in error paths of processor_add() (stable- fixes). * ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes). * ACPI: sysfs: validate return type of _STR method (git-fixes). * afs: Do not cross .backup mountpoint from backup volume (git-fixes). * afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes). * ALSA: control: Apply sanity check of input values for user elements (stable- fixes). * ALSA: hda: add HDMI codec ID for Intel PTL (stable-fixes). * ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes). * ALSA: hda: cs35l41: fix module autoloading (git-fixes). * arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes). * arm64: dts: allwinner: h616: Add r_i2c pinctrl nodes (git-fixes). * arm64: dts: exynos: exynos7885-jackpotlte: Correct RAM amount to 4GB (git- fixes). * arm64: dts: imx8-ss-dma: Fix adc0 closing brace location (git-fixes). * arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git- fixes). * arm64: dts: rockchip: Correct vendor prefix for Hardkernel ODROID-M1 (git- fixes). * arm64: dts: rockchip: fix eMMC/SPI corruption when audio has been used on RK3399 Puma (git-fixes). * arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git- fixes). * arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes). * arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes). * arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585) * arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585) * arm64: signal: Fix some under-bracketed UAPI macros (git-fixes). * arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585) * arm64: tlb: Fix TLBI RANGE operand (bsc#1229585) * arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585) * ARM: 9406/1: Fix callchain_trace() return value (git-fixes). * ASoC: amd: yc: Add a quirk for MSI Bravo 17 (D7VEK) (stable-fixes). * ASoC: codecs: avoid possible garbage value in peb2466_reg_read() (git- fixes). * ASoC: cs42l42: Convert comma to semicolon (git-fixes). * ASoC: intel: fix module autoloading (stable-fixes). * ASoC: Intel: soc-acpi-cht: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * ASoC: meson: axg-card: fix 'use-after-free' (git-fixes). * ASoC: meson: Remove unused declartion in header file (git-fixes). * ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git- fixes). * ASoC: rt5682s: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes). * ASoC: soc-ac97: Fix the incorrect description (git-fixes). * ASoC: tas2781-i2c: Get the right GPIO line (git-fixes). * ASoc: TAS2781: replace beXX_to_cpup with get_unaligned_beXX for potentially broken alignment (stable-fixes). * ASoC: tda7419: fix module autoloading (stable-fixes). * ASoC: topology: Properly initialize soc_enum values (stable-fixes). * ata: libata: Clear DID_TIME_OUT for ATA PT commands with sense data (git- fixes). * ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes). * ata: libata-scsi: Fix ata_msense_control() CDL page reporting (git-fixes). * ata: pata_macio: Use WARN instead of BUG (stable-fixes). * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush() (stable-fixes). * Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes). * Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes). * Bluetooth: hci_event: Use HCI error defines instead of magic values (stable- fixes). * Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue (stable-fixes). * Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git- fixes). * bpf, events: Use prog to emit ksymbol event for main program (git-fixes). * bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (git-fixes). * btrfs: fix race between direct IO write and fsync when using same fd (git- fixes). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1230854). * bus: integrator-lm: fix OF node leak in probe() (git-fixes). * cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231008). * can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes). * can: j1939: use correct function name in comment (git-fixes). * can: kvaser_pciefd: Skip redundant NULL pointer check in ISR (stable-fixes). * can: m_can: enable NAPI before enabling interrupts (git-fixes). * can: m_can: m_can_close(): stop clocks after device has been shut down (git- fixes). * can: mcp251xfd: clarify the meaning of timestamp (stable-fixes). * can: mcp251xfd: mcp251xfd_handle_rxif_ring_uinc(): factor out in separate function (stable-fixes). * can: mcp251xfd: mcp251xfd_ring_init(): check TX-coalescing configuration (stable-fixes). * can: mcp251xfd: move mcp251xfd_timestamp_start()/stop() into mcp251xfd_chip_start/stop() (stable-fixes). * can: mcp251xfd: properly indent labels (stable-fixes). * can: mcp251xfd: rx: add workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * can: mcp251xfd: rx: prepare to workaround broken RX FIFO head index erratum (stable-fixes). * clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885). * clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885). * clk: ti: dra7-atl: Fix leak of of_nodes (git-fixes). * clocksource/drivers/qcom: Add missing iounmap() on errors in msm_dt_timer_init() (git-fixes). * cpufreq: amd-pstate: Enable amd-pstate preferred core support (stable- fixes). * cpufreq: amd-pstate: fix the highest frequency issue which limits performance (git-fixes). * cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes). * crypto: ccp - do not request interrupt on cmd completion when irqs disabled (git-fixes). * crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes). * crypto: iaa - Fix potential use after free bug (git-fixes). * crypto: qat - fix unintentional re-enabling of error interrupts (stable- fixes). * crypto: xor - fix template benchmarking (git-fixes). * cxl/core: Fix incorrect vendor debug UUID define (git-fixes). * cxl/pci: Fix to record only non-zero ranges (git-fixes). * Detect memory allocation failure in annotated_source__alloc_histograms (bsc#1227962). * devres: Initialize an uninitialized struct member (stable-fixes). * dma-buf: heaps: Fix off-by-one in CMA heap fault handler (git-fixes). * Documentation: ioctl: document 0x07 ioctl code (git-fixes). * driver core: Fix a potential null-ptr-deref in module_add_driver() (git- fixes). * driver core: Fix error handling in driver API device_rename() (git-fixes). * drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes). * Drivers: hv: vmbus: Fix the misplaced function description (git-fixes). * drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes). * drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes). * drm/amd: Add gfx12 swizzle mode defs (stable-fixes). * drm/amd/amdgpu: Properly tune the size of struct (git-fixes). * drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (git-fixes). * drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct() (git-fixes). * drm/amd/display: Check denominator pbn_div before used (stable-fixes). * drm/amd/display: Check HDCP returned status (stable-fixes). * drm/amd/display: Check UnboundedRequestEnabled's value (stable-fixes). * drm/amd/display: Defer handling mst up request in resume (stable-fixes). * drm/amd/display: Disable error correction if it's not supported (stable- fixes). * drm/amd/display: Fix FEC_READY write on DP LT (stable-fixes). * drm/amd/display: handle nulled pipe context in DCE110's set_drr() (git- fixes). * drm/amd/display: Run DC_LOG_DC after checking link->link_enc (stable-fixes). * drm/amd/display: Solve mst monitors blank out problem after resume (git- fixes). * drm/amdgpu: add missing error handling in function amdgpu_gmc_flush_gpu_tlb_pasid (stable-fixes). * drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes). * drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes). * drm/amdgpu/display: handle gfx12 in amdgpu_dm_plane_format_mod_supported (stable-fixes). * drm/amdgpu: fix a possible null pointer dereference (git-fixes). * drm/amdgpu: Fix get each xcp macro (git-fixes). * drm/amdgpu: Fix smatch static checker warning (stable-fixes). * drm/amdgpu: handle gfx12 in amdgpu_display_verify_sizes (stable-fixes). * drm/amdgpu: properly handle vbios fake edid sizing (git-fixes). * drm/amdgpu: reject gang submit on reserved VMIDs (stable-fixes). * drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes). * drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes). * drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes). * drm: komeda: Fix an issue related to normalized zpos (stable-fixes). * drm/mediatek: ovl_adaptor: Add missing of_node_put() (git-fixes). * drm/mediatek: Set sensible cursor width/height values to fix crash (stable- fixes). * drm/msm/a5xx: disable preemption in submits by default (git-fixes). * drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes). * drm/msm/a5xx: properly clear preemption records on resume (git-fixes). * drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes). * drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes). * drm/msm/dsi: correct programming sequence for SM8350 / SM8450 (git-fixes). * drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes). * drm/msm: fix %s null argument error (git-fixes). * drm/nouveau/fb: restore init() for ramgp102 (git-fixes). * drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Max (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Zero (stable-fixes). * drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git- fixes). * drm/radeon: fix null pointer dereference in radeon_add_common_modes (git- fixes). * drm/radeon: properly handle vbios fake edid sizing (git-fixes). * drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git- fixes). * drm/rockchip: vop: Allow 4096px width scaling (git-fixes). * drm/rockchip: vop: clear DMA stop bit on RK3066 (git-fixes). * drm/rockchip: vop: enable VOP_FEATURE_INTERNAL_RGB on RK3066 (git-fixes). * drm/stm: Fix an error handling path in stm_drm_platform_probe() (git-fixes). * drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes). * drm/syncobj: Fix syncobj leak in drm_syncobj_eventfd_ioctl (git-fixes). * drm/vc4: hdmi: Handle error case of pm_runtime_resume_and_get (git-fixes). * Drop soundwire patch that caused a regression (bsc#1230350) * ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() (git-fixes). * erofs: fix incorrect symlink detection in fast symlink (git-fixes). * exfat: fix memory leak in exfat_load_bitmap() (git-fixes). * fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes). * firmware: arm_scmi: Fix double free in OPTEE transport (git-fixes). * firmware_loader: Block path traversal (git-fixes). * firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes). * fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230602). * HID: amd_sfh: free driver_data after destroying hid device (stable-fixes). * HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable- fixes). * HID: multitouch: Add support for GT7868Q (stable-fixes). * HID: wacom: Do not warn about dropped packets for first packet (git-fixes). * HID: wacom: Support sequence numbers smaller than 16-bit (git-fixes). * hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (asus-ec-sensors) remove VRM temp X570-E GAMING (stable-fixes). * hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable- fixes). * hwmon: (max16065) Fix overflows seen when writing limits (git-fixes). * hwmon: (nct6775-core) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (ntc_thermistor) fix module autoloading (git-fixes). * hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >= 1.2 (git-fixes). * hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes). * hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git- fixes). * hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git- fixes). * hwrng: mtk - Use devm_pm_runtime_enable (git-fixes). * i2c: designware: fix controller is holding SCL low while ENABLE bit is disabled (git-fixes). * i2c: isch: Add missed 'else' (git-fixes). * i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes). * i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition (git-fixes). * i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable- fixes). * IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes) * iio: adc: ad7606: fix oversampling gpio array (git-fixes). * iio: adc: ad7606: fix standby gpio state to match the documentation (git- fixes). * iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git- fixes). * iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes). * Input: adp5588-keys - fix check on return code (git-fixes). * Input: ads7846 - ratelimit the spi_sync error message (stable-fixes). * Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes). * Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes). * Input: tsc2004/5 - do not hard code interrupt trigger (git-fixes). * Input: tsc2004/5 - fix reset handling on probe (git-fixes). * Input: tsc2004/5 - use device core to create driver-specific device attributes (git-fixes). * Input: uinput - reject requests with unreasonable number of slots (stable- fixes). * ipmi: docs: do not advertise deprecated sysfs entries (git-fixes). * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipmi:ssif: Improve detecting during probing (bsc#1228771) * jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes). * kABI workaround for cros_ec stuff (git-fixes). * KEYS: prevent NULL pointer dereference in find_asymmetric_key() (git-fixes). * kselftests: dmabuf-heaps: Ensure the driver name is null-terminated (stable- fixes). * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * KVM: arm64: Block unsafe FF-A calls from the host (git-fixes). * KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging (git-fixes). * KVM: arm64: Do not pass a TLBI level hint when zapping table entries (git- fixes). * KVM: arm64: Do not re-initialize the KVM lock (git-fixes). * KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init (git-fixes). * KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (git- fixes). * KVM: arm64: nvhe: Ignore SVE hint in SMCCC function ID (git-fixes). * KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes). * KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git- fixes). * KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes). * KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes). * KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (git-fixes). * leds: spi-byte: Call of_node_put() on error path (stable-fixes). * lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (stable- fixes). * lirc: rc_dev_get_from_fd(): fix file leak (git-fixes). * mailbox: bcm2835: Fix timeout during suspend mode (git-fixes). * mailbox: rockchip: fix a typo in module autoloading (git-fixes). * media: i2c: ar0521: Use cansleep version of gpiod_set_value() (git-fixes). * media: ov5675: Fix power on/off delay timings (git-fixes). * media: platform: rzg2l-cru: rzg2l-csi2: Add missing MODULE_DEVICE_TABLE (git-fixes). * media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes). * media: qcom: camss: Remove use_count guard in stop_streaming (git-fixes). * media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes). * media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes). * media: venus: fix use after free bug in venus_remove due to race condition (git-fixes). * media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes). * media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes). * media: vivid: fix wrong sizeimage value for mplane (stable-fixes). * memory: mtk-smi: Use devm_clk_get_enabled() (git-fixes). * memory: tegra186-emc: drop unused to_tegra186_emc() (git-fixes). * minmax: reduce min/max macro expansion in atomisp driver (git-fixes). * module: Fix KCOV-ignored file name (git-fixes). * Move fixes into sorted section (bsc#1230119) * mtd: powernv: Add check devm_kasprintf() returned value (git-fixes). * mtd: slram: insert break after errors in parsing the map (git-fixes). * net: phy: vitesse: repair vsc73xx autonegotiation (stable-fixes). * net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes). * nfsd: Do not leave work of closing files to a work queue (bsc#1228140). * NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes). * nilfs2: determine empty node blocks as corrupted (git-fixes). * nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes). * nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes). * nvme: clear caller pointer on identify failure (git-fixes). * nvme: fix namespace removal list (git-fixes). * nvme-multipath: avoid hang on inaccessible namespaces (bsc#1228244). * nvme-multipath: system fails to create generic nvme device (bsc#1228244). * nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes). * nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes). * nvme-pci: allocate tagset on reset if necessary (git-fixes). * nvme-tcp: fix link failure for TCP auth (git-fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes). * nvmet-tcp: do not continue for invalid icreq (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet-trace: avoid dereferencing pointer too early (git-fixes). * ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes). * PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes). * PCI: dra7xx: Fix threaded IRQ request for "dra7xx-pcie-main" IRQ (git- fixes). * PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes). * pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes). * PCI: imx6: Fix missing call to phy_power_off() in error handling (git- fixes). * PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable- fixes). * PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes). * PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() (git-fixes). * PCI: qcom-ep: Enable controller resources like PHY only after refclk is available (git-fixes). * PCI: Wait for Link before restoring Downstream Buses (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes). * pcmcia: Use resource_size function on resource object (stable-fixes). * perf annotate: Introduce global annotation_options (git-fixes). * perf annotate: Split branch stack cycles information out of 'struct annotation_line' (git-fixes). * perf annotate: Use global annotation_options (git-fixes). * perf arch events: Fix duplicate RISC-V SBI firmware event name (git-fixes). * perf/core: Fix missing wakeup when waiting for context reference (git- fixes). * perf: Fix default aux_watermark calculation (git-fixes). * perf: Fix event leak upon exit (git-fixes). * perf: Fix perf_aux_size() for greater-than 32-bit size (git-fixes). * perf intel-pt: Fix aux_watermark calculation for 64-bit size (git-fixes). * perf intel-pt: Fix exclude_guest setting (git-fixes). * perf machine thread: Remove exited threads by default (git-fixes). * perf maps: Move symbol maps functions to maps.c (git-fixes). * perf pmu: Assume sysfs events are always the same case (git-fixes). * perf pmus: Fixes always false when compare duplicates aliases (git-fixes). * perf: Prevent passing zero nr_pages to rb_alloc_aux() (git-fixes). * perf record: Lazy load kernel symbols (git-fixes). * perf report: Convert to the global annotation_options (git-fixes). * perf report: Fix condition in sort__sym_cmp() (git-fixes). * perf: script: add raw|disasm arguments to --insn-trace option (git-fixes). * perf stat: Fix the hard-coded metrics calculation on the hybrid (git-fixes). * perf test: Make test_arm_callgraph_fp.sh more robust (git-fixes). * perf tool: fix dereferencing NULL al->maps (git-fixes). * perf tools: Add/use PMU reverse lookup from config to name (git-fixes). * perf tools: Use pmus to describe type from attribute (git-fixes). * perf top: Convert to the global annotation_options (git-fixes). * perf/x86: Fix smp_processor_id()-in-preemptible warnings (git-fixes). * perf/x86/intel: Add a distinct name for Granite Rapids (git-fixes). * perf/x86/intel/cstate: Add pkg C2 residency counter for Sierra Forest (git- fixes). * perf/x86/intel/cstate: Fix Alderlake/Raptorlake/Meteorlake (git-fixes). * perf/x86/intel/ds: Fix non 0 retire latency on Raptorlake (git-fixes). * perf/x86/intel: Factor out the initialization code for SPR (git fixes). * perf/x86/intel: Limit the period on Haswell (git-fixes). * perf/x86/intel/pt: Fix a topa_entry base address calculation (git-fixes). * perf/x86/intel/pt: Fix pt_topa_entry_for_page() address calculation (git- fixes). * perf/x86/intel/pt: Fix topa_entry base length (git-fixes). * perf/x86/intel/uncore: Fix the bits of the CHA extended umask for SPR (git- fixes). * perf/x86/intel/uncore: Support HBM and CXL PMON counters (bsc#1230119). * perf/x86/intel: Use the common uarch name for the shared functions (git fixes). * perf/x86: Serialize set_attr_rdpmc() (git-fixes). * perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to MSR uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to PCI uncore units (bsc#1230119). * perf/x86/uncore: Cleanup unused unit structure (bsc#1230119). * perf/x86/uncore: Retrieve the unit ID from the unit control RB tree (bsc#1230119). * perf/x86/uncore: Save the unit control address of all units (bsc#1230119). * perf/x86/uncore: Support per PMU cpumask (bsc#1230119). * phy: zynqmp: Take the phy mutex in xlate (stable-fixes). * pinctrl: at91: make it work with current gpiolib (stable-fixes). * pinctrl: meteorlake: Add Arrow Lake-H/U ACPI ID (stable-fixes). * pinctrl: single: fix missing error code in pcs_probe() (git-fixes). * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * platform/chrome: cros_ec_lpc: MEC access can use an AML mutex (stable- fixes). * platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes). * platform/surface: aggregator_registry: Add Support for Surface Pro 10 (stable-fixes). * platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes). * platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git- fixes). * platform/x86: x86-android-tablets: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * powercap/intel_rapl: Add support for AMD family 1Ah (stable-fixes). * power: supply: axp20x_battery: Remove design from min and max voltage (git- fixes). * power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes). * power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes). * power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes). * r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/erdma: Return QP state in erdma_query_qp (git-fixes) * RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes) * RDMA/hns: Fix 1bit-ECC recovery address in non-4K OS (git-fixes) * RDMA/hns: Fix ah error counter in sw stat not increasing (git-fixes) * RDMA/hns: Fix restricted __le16 degrades to integer issue (git-fixes) * RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes) * RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes) * RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 (git-fixes) * RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git- fixes) * RDMA/hns: Optimize hem allocation performance (git-fixes) * RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * RDMA/mlx5: Drop redundant work canceling from clean_keys() (git-fixes) * RDMA/mlx5: Fix counter update on MR cache mkey creation (git-fixes) * RDMA/mlx5: Fix MR cache temp entries cleanup (git-fixes) * RDMA/mlx5: Limit usage of over-sized mkeys from the MR cache (git-fixes) * RDMA/mlx5: Obtain upper net device only when needed (git-fixes) * RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes) * RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git- fixes) * regmap: maple: work around gcc-14.1 false-positive warning (stable-fixes). * regulator: core: Fix regulator_is_supported_voltage() kerneldoc return value (git-fixes). * regulator: core: Fix short description for _regulator_check_status_enabled() (git-fixes). * regulator: Return actual error in of_regulator_bulk_get_all() (git-fixes). * regulator: rt5120: Convert comma to semicolon (git-fixes). * regulator: wm831x-isink: Convert comma to semicolon (git-fixes). * remoteproc: imx_rproc: Correct ddr alias for i.MX8M (git-fixes). * remoteproc: imx_rproc: Initialize workqueue earlier (git-fixes). * remoteproc: k3-r5: Fix error handling when power-up failed (git-fixes). * reset: berlin: fix OF node leak in probe() error path (git-fixes). * reset: k210: fix OF node leak in probe() error path (git-fixes). * resource: fix region_intersects() vs add_memory_driver_managed() (git- fixes). * Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (git-fixes). * Revert "mm, kmsan: fix infinite recursion due to RCU critical section" * Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" * Revert "mm/sparsemem: fix race in accessing memory_section->usage" * Revert "mm/sparsemem: fix race in accessing memory_section->usage" * Revert "PCI: Extend ACS configurability (bsc#1228090)." (bsc#1229019) * rtc: at91sam9: fix OF node leak in probe() error path (git-fixes). * s390: allow pte_offset_map_lock() to fail (git-fixes bsc#1230564). * s390/dasd: Fix redundant /proc/dasd* entries removal (bsc#1227694). * s390/dasd: Remove DMA alignment (LTC#208933 bsc#1230426 git-fixes). * s390/mm: Convert gmap_make_secure to use a folio (git-fixes bsc#1230562). * s390/mm: Convert make_page_secure to use a folio (git-fixes bsc#1230563). * scripts: kconfig: merge_config: config files: add a trailing newline (stable-fixes). * scripts: sphinx-pre-install: remove unnecessary double check for $cur_version (git-fixes). * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Copyright updates for 14.4.0.4 patches (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix overflow build issue (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429 jsc#PED-9899). * scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848). * selftests: lib: remove strscpy test (git-fixes). * soc: fsl: cpm1: tsa: Fix tsa_write8() (git-fixes). * soc: versatile: integrator: fix OF node leak in probe() error path (git- fixes). * spi: atmel-quadspi: Avoid overwriting delay register settings (git-fixes). * spi: atmel-quadspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: bcm63xx: Enable module autoloading (stable-fixes). * spi: bcm63xx: Fix module autoloading (git-fixes). * spi: meson-spicc: convert comma to semicolon (git-fixes). * spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes). * spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes). * spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes). * spi: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * spi: spidev: Add an entry for elgin,jg10309-01 (stable-fixes). * spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes). * spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes). * Squashfs: sanity check symbolic link size (git-fixes). * supported.conf: mark adiantum and xctr crypto modules as supported (bsc#1231035) * thunderbolt: Fix calculation of consumed USB3 bandwidth on a path (git- fixes). * thunderbolt: Fix rollback in tb_port_lane_bonding_enable() for lane 1 (git- fixes). * thunderbolt: Fix XDomain rx_lanes_show and tx_lanes_show (git-fixes). * thunderbolt: There are only 5 basic router registers in pre-USB4 routers (git-fixes). * tomoyo: fallback to realpath if symlink's pathname does not exist (git- fixes). * tools/perf: Fix the string match for "/tmp/perf-$PID.map" files in dso__load (git-fixes). * tpm: Clean up TPM space after command failure (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes). * usb: cdnsp: Fix incorrect usb_request status (git-fixes). * USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes). * usb: dwc2: drd: fix clock gating on USB role switch (git-fixes). * usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes). * usb: gadget: aspeed_udc: validate endpoint index for ast udc (stable-fixes). * usbnet: ipheth: add CDC NCM support (git-fixes). * usbnet: ipheth: do not stop RX on failing RX callback (git-fixes). * usbnet: ipheth: drop RX URBs with no payload (git-fixes). * usbnet: ipheth: fix carrier detection in modes 1 and 4 (git-fixes). * usbnet: ipheth: fix risk of NULL pointer deallocation (git-fixes). * usbnet: ipheth: race between ipheth_close and error handling (stable-fixes). * usbnet: ipheth: remove extraneous rx URB length check (git-fixes). * usbnet: ipheth: transmit URBs without trailing padding (git-fixes). * USB: serial: kobil_sct: restore initial terminal settings (git-fixes). * USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes). * usb: uas: set host status byte on data completion error (stable-fixes). * USB: usbtmc: prevent kernel-usb-infoleak (git-fixes). * virtio_net: fixing XDP for fully checksummed packets handling (git-fixes). * virtio_net: Fix napi_skb_cache_put warning (git-fixes). * virtio-net: synchronize probe with ndo_set_features (git-fixes). * watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes). * wifi: ath12k: fix BSS chan info request WMI command (git-fixes). * wifi: ath12k: fix firmware crash due to invalid peer nss (stable-fixes). * wifi: ath12k: fix invalid AMPDU factor calculation in ath12k_peer_assoc_h_he() (git-fixes). * wifi: ath12k: fix uninitialize symbol error on ath12k_peer_assoc_h_he() (stable-fixes). * wifi: ath12k: match WMI BSS chan info structure with firmware definition (git-fixes). * wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes). * wifi: brcmfmac: introducing fwil query functions (git-fixes). * wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes). * wifi: cfg80211: fix bug of mapping AF3x to incorrect User Priority (git- fixes). * wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git- fixes). * wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes). * wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes). * wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes). * wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (stable- fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_max_scan_ie_fw_cmd_room() (stable-fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes). * wifi: iwlwifi: mvm: increase the time between ranging measurements (git- fixes). * wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (stable-fixes). * wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check (stable-fixes). * wifi: mac80211: do not use rate mask for offchannel TX either (git-fixes). * wifi: mac80211: fix the comeback long retry times (git-fixes). * wifi: mac80211: free skb on error path in ieee80211_beacon_get_ap() (stable- fixes). * wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git- fixes). * wifi: mt76: connac: fix checksum offload fields of connac3 RXD (git-fixes). * wifi: mt76: mt7603: fix mixed declarations and code (git-fixes). * wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: fix oops on non-dbdc mt7986 (git-fixes). * wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7921: Check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change (stable-fixes). * wifi: mt76: mt7921: fix wrong UNII-4 freq range check for the channel usage (git-fixes). * wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc (git-fixes). * wifi: mt76: mt7996: fix EHT beamforming capability check (git-fixes). * wifi: mt76: mt7996: fix HE and EHT beamforming capabilities (git-fixes). * wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he (git-fixes). * wifi: mt76: mt7996: fix traffic delay when switching back to working channel (git-fixes). * wifi: mt76: mt7996: fix uninitialized TLV data (git-fixes). * wifi: mt76: mt7996: fix wmm set of station interface to 3 (git-fixes). * wifi: mt76: mt7996: use hweight16 to get correct tx antenna (git-fixes). * wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes). * wifi: rtw88: 8822c: Fix reported RX band width (git-fixes). * wifi: rtw88: always wait for both firmware loading attempts (git-fixes). * wifi: rtw88: remove CPT execution branch never used (git-fixes). * wifi: rtw88: usb: schedule rx work after everything is set up (stable- fixes). * wifi: rtw89: wow: prevent to send unexpected H2C during download Firmware (stable-fixes). * wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes). * x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes). * x86/kaslr: Expose and use the end of the physical memory address space (bsc#1229443). * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). * xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003). * xen: allow mapping ACPI data using a different physical address (bsc#1226003). * xen: introduce generic helper checking for memory map conflicts (bsc#1226003). * xen: move checks for e820 conflicts further up (bsc#1226003). * xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003). * xen/swiotlb: add alignment check for dma buffers (bsc#1229928). * xen/swiotlb: fix allocated size (git-fixes). * xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003). * xen: use correct end address of kernel for conflict checking (bsc#1226003). * xfs: restrict when we try to align cow fork delalloc to cowextsz hints (git- fixes). * xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git- fixes). * xz: cleanup CRC32 edits from 2018 (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Confidential Computing Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Confidential-Computing-15-SP6-2024-3553=1 ## Package List: * Confidential Computing Module 15-SP6 (nosrc x86_64) * kernel-coco-6.4.0-15061.6.coco15sp6.1 * kernel-coco_debug-6.4.0-15061.6.coco15sp6.1 * Confidential Computing Module 15-SP6 (x86_64) * kernel-coco-debugsource-6.4.0-15061.6.coco15sp6.1 * kernel-coco_debug-debuginfo-6.4.0-15061.6.coco15sp6.1 * kernel-coco_debug-devel-6.4.0-15061.6.coco15sp6.1 * kernel-coco_debug-debugsource-6.4.0-15061.6.coco15sp6.1 * kernel-coco-devel-6.4.0-15061.6.coco15sp6.1 * kernel-coco-vdso-debuginfo-6.4.0-15061.6.coco15sp6.1 * reiserfs-kmp-coco-6.4.0-15061.6.coco15sp6.1 * kernel-coco-debuginfo-6.4.0-15061.6.coco15sp6.1 * kernel-coco_debug-devel-debuginfo-6.4.0-15061.6.coco15sp6.1 * reiserfs-kmp-coco-debuginfo-6.4.0-15061.6.coco15sp6.1 * kernel-syms-coco-6.4.0-15061.6.coco15sp6.1 * Confidential Computing Module 15-SP6 (noarch) * kernel-source-coco-6.4.0-15061.6.coco15sp6.1 * kernel-devel-coco-6.4.0-15061.6.coco15sp6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2023-52916.html * https://www.suse.com/security/cve/CVE-2024-26759.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-36953.html * https://www.suse.com/security/cve/CVE-2024-38538.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-40965.html * https://www.suse.com/security/cve/CVE-2024-40973.html * https://www.suse.com/security/cve/CVE-2024-40983.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42252.html * https://www.suse.com/security/cve/CVE-2024-43832.html * https://www.suse.com/security/cve/CVE-2024-43835.html * https://www.suse.com/security/cve/CVE-2024-43870.html * https://www.suse.com/security/cve/CVE-2024-43886.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43904.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44960.html * https://www.suse.com/security/cve/CVE-2024-44961.html * https://www.suse.com/security/cve/CVE-2024-44962.html * https://www.suse.com/security/cve/CVE-2024-44965.html * https://www.suse.com/security/cve/CVE-2024-44967.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44970.html * https://www.suse.com/security/cve/CVE-2024-44971.html * https://www.suse.com/security/cve/CVE-2024-44972.html * https://www.suse.com/security/cve/CVE-2024-44977.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44984.html * https://www.suse.com/security/cve/CVE-2024-44986.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44988.html * https://www.suse.com/security/cve/CVE-2024-44989.html * https://www.suse.com/security/cve/CVE-2024-44990.html * https://www.suse.com/security/cve/CVE-2024-44991.html * https://www.suse.com/security/cve/CVE-2024-44997.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45000.html * https://www.suse.com/security/cve/CVE-2024-45001.html * https://www.suse.com/security/cve/CVE-2024-45002.html * https://www.suse.com/security/cve/CVE-2024-45005.html * https://www.suse.com/security/cve/CVE-2024-45006.html * https://www.suse.com/security/cve/CVE-2024-45007.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-45011.html * https://www.suse.com/security/cve/CVE-2024-45012.html * https://www.suse.com/security/cve/CVE-2024-45013.html * https://www.suse.com/security/cve/CVE-2024-45015.html * https://www.suse.com/security/cve/CVE-2024-45017.html * https://www.suse.com/security/cve/CVE-2024-45018.html * https://www.suse.com/security/cve/CVE-2024-45019.html * https://www.suse.com/security/cve/CVE-2024-45020.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-45022.html * https://www.suse.com/security/cve/CVE-2024-45023.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-45028.html * https://www.suse.com/security/cve/CVE-2024-45029.html * https://www.suse.com/security/cve/CVE-2024-45030.html * https://www.suse.com/security/cve/CVE-2024-46672.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46687.html * https://www.suse.com/security/cve/CVE-2024-46689.html * https://www.suse.com/security/cve/CVE-2024-46691.html * https://www.suse.com/security/cve/CVE-2024-46692.html * https://www.suse.com/security/cve/CVE-2024-46693.html * https://www.suse.com/security/cve/CVE-2024-46694.html * https://www.suse.com/security/cve/CVE-2024-46695.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46706.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46709.html * https://www.suse.com/security/cve/CVE-2024-46710.html * https://www.suse.com/security/cve/CVE-2024-46711.html * https://www.suse.com/security/cve/CVE-2024-46714.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46716.html * https://www.suse.com/security/cve/CVE-2024-46717.html * https://www.suse.com/security/cve/CVE-2024-46719.html * https://www.suse.com/security/cve/CVE-2024-46720.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46724.html * https://www.suse.com/security/cve/CVE-2024-46725.html * https://www.suse.com/security/cve/CVE-2024-46726.html * https://www.suse.com/security/cve/CVE-2024-46727.html * https://www.suse.com/security/cve/CVE-2024-46728.html * https://www.suse.com/security/cve/CVE-2024-46729.html * https://www.suse.com/security/cve/CVE-2024-46730.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46732.html * https://www.suse.com/security/cve/CVE-2024-46734.html * https://www.suse.com/security/cve/CVE-2024-46735.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46741.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46746.html * https://www.suse.com/security/cve/CVE-2024-46747.html * https://www.suse.com/security/cve/CVE-2024-46749.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46751.html * https://www.suse.com/security/cve/CVE-2024-46752.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46755.html * https://www.suse.com/security/cve/CVE-2024-46756.html * https://www.suse.com/security/cve/CVE-2024-46757.html * https://www.suse.com/security/cve/CVE-2024-46758.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46760.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46767.html * https://www.suse.com/security/cve/CVE-2024-46771.html * https://www.suse.com/security/cve/CVE-2024-46772.html * https://www.suse.com/security/cve/CVE-2024-46773.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46776.html * https://www.suse.com/security/cve/CVE-2024-46778.html * https://www.suse.com/security/cve/CVE-2024-46780.html * https://www.suse.com/security/cve/CVE-2024-46781.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46786.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46791.html * https://www.suse.com/security/cve/CVE-2024-46794.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46798.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1225487 * https://bugzilla.suse.com/show_bug.cgi?id=1225812 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226507 * https://bugzilla.suse.com/show_bug.cgi?id=1226606 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227694 * https://bugzilla.suse.com/show_bug.cgi?id=1227819 * https://bugzilla.suse.com/show_bug.cgi?id=1227885 * https://bugzilla.suse.com/show_bug.cgi?id=1227890 * https://bugzilla.suse.com/show_bug.cgi?id=1227962 * https://bugzilla.suse.com/show_bug.cgi?id=1228090 * https://bugzilla.suse.com/show_bug.cgi?id=1228140 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228771 * https://bugzilla.suse.com/show_bug.cgi?id=1229004 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229289 * https://bugzilla.suse.com/show_bug.cgi?id=1229380 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229443 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229494 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229748 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229768 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229928 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230119 * https://bugzilla.suse.com/show_bug.cgi?id=1230169 * https://bugzilla.suse.com/show_bug.cgi?id=1230170 * https://bugzilla.suse.com/show_bug.cgi?id=1230173 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230175 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230191 * https://bugzilla.suse.com/show_bug.cgi?id=1230192 * https://bugzilla.suse.com/show_bug.cgi?id=1230193 * https://bugzilla.suse.com/show_bug.cgi?id=1230194 * https://bugzilla.suse.com/show_bug.cgi?id=1230195 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230206 * https://bugzilla.suse.com/show_bug.cgi?id=1230207 * https://bugzilla.suse.com/show_bug.cgi?id=1230209 * https://bugzilla.suse.com/show_bug.cgi?id=1230211 * https://bugzilla.suse.com/show_bug.cgi?id=1230212 * https://bugzilla.suse.com/show_bug.cgi?id=1230213 * https://bugzilla.suse.com/show_bug.cgi?id=1230217 * https://bugzilla.suse.com/show_bug.cgi?id=1230221 * https://bugzilla.suse.com/show_bug.cgi?id=1230224 * https://bugzilla.suse.com/show_bug.cgi?id=1230230 * https://bugzilla.suse.com/show_bug.cgi?id=1230232 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230240 * https://bugzilla.suse.com/show_bug.cgi?id=1230244 * https://bugzilla.suse.com/show_bug.cgi?id=1230247 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230269 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230340 * https://bugzilla.suse.com/show_bug.cgi?id=1230350 * https://bugzilla.suse.com/show_bug.cgi?id=1230413 * https://bugzilla.suse.com/show_bug.cgi?id=1230426 * https://bugzilla.suse.com/show_bug.cgi?id=1230430 * https://bugzilla.suse.com/show_bug.cgi?id=1230431 * https://bugzilla.suse.com/show_bug.cgi?id=1230432 * https://bugzilla.suse.com/show_bug.cgi?id=1230433 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230435 * https://bugzilla.suse.com/show_bug.cgi?id=1230440 * https://bugzilla.suse.com/show_bug.cgi?id=1230441 * https://bugzilla.suse.com/show_bug.cgi?id=1230442 * https://bugzilla.suse.com/show_bug.cgi?id=1230444 * https://bugzilla.suse.com/show_bug.cgi?id=1230450 * https://bugzilla.suse.com/show_bug.cgi?id=1230451 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1230455 * https://bugzilla.suse.com/show_bug.cgi?id=1230457 * https://bugzilla.suse.com/show_bug.cgi?id=1230459 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230511 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230518 * https://bugzilla.suse.com/show_bug.cgi?id=1230519 * https://bugzilla.suse.com/show_bug.cgi?id=1230520 * https://bugzilla.suse.com/show_bug.cgi?id=1230521 * https://bugzilla.suse.com/show_bug.cgi?id=1230524 * https://bugzilla.suse.com/show_bug.cgi?id=1230526 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230539 * https://bugzilla.suse.com/show_bug.cgi?id=1230540 * https://bugzilla.suse.com/show_bug.cgi?id=1230542 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230562 * https://bugzilla.suse.com/show_bug.cgi?id=1230563 * https://bugzilla.suse.com/show_bug.cgi?id=1230564 * https://bugzilla.suse.com/show_bug.cgi?id=1230580 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230602 * https://bugzilla.suse.com/show_bug.cgi?id=1230699 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230701 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230703 * https://bugzilla.suse.com/show_bug.cgi?id=1230704 * https://bugzilla.suse.com/show_bug.cgi?id=1230705 * https://bugzilla.suse.com/show_bug.cgi?id=1230706 * https://bugzilla.suse.com/show_bug.cgi?id=1230707 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230711 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230715 * https://bugzilla.suse.com/show_bug.cgi?id=1230719 * https://bugzilla.suse.com/show_bug.cgi?id=1230722 * https://bugzilla.suse.com/show_bug.cgi?id=1230724 * https://bugzilla.suse.com/show_bug.cgi?id=1230725 * https://bugzilla.suse.com/show_bug.cgi?id=1230726 * https://bugzilla.suse.com/show_bug.cgi?id=1230727 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230749 * https://bugzilla.suse.com/show_bug.cgi?id=1230751 * https://bugzilla.suse.com/show_bug.cgi?id=1230752 * https://bugzilla.suse.com/show_bug.cgi?id=1230753 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230766 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230768 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230772 * https://bugzilla.suse.com/show_bug.cgi?id=1230775 * https://bugzilla.suse.com/show_bug.cgi?id=1230776 * https://bugzilla.suse.com/show_bug.cgi?id=1230780 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230786 * https://bugzilla.suse.com/show_bug.cgi?id=1230787 * https://bugzilla.suse.com/show_bug.cgi?id=1230791 * https://bugzilla.suse.com/show_bug.cgi?id=1230794 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230802 * https://bugzilla.suse.com/show_bug.cgi?id=1230806 * https://bugzilla.suse.com/show_bug.cgi?id=1230808 * https://bugzilla.suse.com/show_bug.cgi?id=1230809 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230812 * https://bugzilla.suse.com/show_bug.cgi?id=1230813 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230821 * https://bugzilla.suse.com/show_bug.cgi?id=1230825 * https://bugzilla.suse.com/show_bug.cgi?id=1230830 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230854 * https://bugzilla.suse.com/show_bug.cgi?id=1230948 * https://bugzilla.suse.com/show_bug.cgi?id=1231008 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://jira.suse.com/browse/PED-10954 * https://jira.suse.com/browse/PED-9899 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 16:32:28 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 16:32:28 -0000 Subject: SUSE-SU-2024:3552-1: moderate: Security update for pgadmin4 Message-ID: <172840514802.4252.1751565426128591413@smelt2.prg2.suse.org> # Security update for pgadmin4 Announcement ID: SUSE-SU-2024:3552-1 Release Date: 2024-10-08T15:04:35Z Rating: moderate References: * bsc#1223868 Cross-References: * CVE-2024-4216 CVSS scores: * CVE-2024-4216 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.5 * Python 3 Module 15-SP6 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for pgadmin4 fixes the following issues: * CVE-2024-4216: Fixed XSS in /settings/store endpoint (bsc#1223868) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3552=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3552=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-3552=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3552=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * pgadmin4-debuginfo-4.30-150300.3.15.1 * pgadmin4-4.30-150300.3.15.1 * openSUSE Leap 15.3 (noarch) * pgadmin4-doc-4.30-150300.3.15.1 * pgadmin4-web-4.30-150300.3.15.1 * pgadmin4-web-uwsgi-4.30-150300.3.15.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * pgadmin4-debuginfo-4.30-150300.3.15.1 * pgadmin4-4.30-150300.3.15.1 * openSUSE Leap 15.5 (noarch) * pgadmin4-doc-4.30-150300.3.15.1 * pgadmin4-web-4.30-150300.3.15.1 * pgadmin4-web-uwsgi-4.30-150300.3.15.1 * Python 3 Module 15-SP6 (noarch) * pgadmin4-doc-4.30-150300.3.15.1 * pgadmin4-web-4.30-150300.3.15.1 * Python 3 Module 15-SP6 (s390x) * pgadmin4-debuginfo-4.30-150300.3.15.1 * pgadmin4-4.30-150300.3.15.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * pgadmin4-debuginfo-4.30-150300.3.15.1 * pgadmin4-4.30-150300.3.15.1 * Server Applications Module 15-SP5 (noarch) * pgadmin4-doc-4.30-150300.3.15.1 * pgadmin4-web-4.30-150300.3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4216.html * https://bugzilla.suse.com/show_bug.cgi?id=1223868 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 16:34:58 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 16:34:58 -0000 Subject: SUSE-SU-2024:3551-1: important: Security update for the Linux Kernel Message-ID: <172840529886.4252.15512246846108232114@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3551-1 Release Date: 2024-10-08T15:03:18Z Rating: important References: * bsc#1012628 * bsc#1183045 * bsc#1215199 * bsc#1216223 * bsc#1216776 * bsc#1220382 * bsc#1221527 * bsc#1221610 * bsc#1221650 * bsc#1222629 * bsc#1223600 * bsc#1223848 * bsc#1225487 * bsc#1225812 * bsc#1225903 * bsc#1226003 * bsc#1226507 * bsc#1226606 * bsc#1226666 * bsc#1226846 * bsc#1226860 * bsc#1227487 * bsc#1227694 * bsc#1227726 * bsc#1227819 * bsc#1227885 * bsc#1227890 * bsc#1227962 * bsc#1228090 * bsc#1228140 * bsc#1228244 * bsc#1228507 * bsc#1228771 * bsc#1229001 * bsc#1229004 * bsc#1229019 * bsc#1229086 * bsc#1229167 * bsc#1229169 * bsc#1229289 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229364 * bsc#1229371 * bsc#1229380 * bsc#1229389 * bsc#1229394 * bsc#1229429 * bsc#1229443 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229494 * bsc#1229585 * bsc#1229753 * bsc#1229764 * bsc#1229768 * bsc#1229790 * bsc#1229810 * bsc#1229899 * bsc#1229928 * bsc#1230015 * bsc#1230119 * bsc#1230123 * bsc#1230124 * bsc#1230125 * bsc#1230169 * bsc#1230170 * bsc#1230171 * bsc#1230173 * bsc#1230174 * bsc#1230175 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230181 * bsc#1230185 * bsc#1230191 * bsc#1230192 * bsc#1230193 * bsc#1230194 * bsc#1230195 * bsc#1230200 * bsc#1230204 * bsc#1230206 * bsc#1230207 * bsc#1230209 * bsc#1230211 * bsc#1230213 * bsc#1230217 * bsc#1230221 * bsc#1230224 * bsc#1230230 * bsc#1230232 * bsc#1230233 * bsc#1230240 * bsc#1230244 * bsc#1230245 * bsc#1230247 * bsc#1230248 * bsc#1230269 * bsc#1230270 * bsc#1230295 * bsc#1230340 * bsc#1230350 * bsc#1230413 * bsc#1230426 * bsc#1230430 * bsc#1230431 * bsc#1230432 * bsc#1230433 * bsc#1230434 * bsc#1230435 * bsc#1230440 * bsc#1230441 * bsc#1230442 * bsc#1230444 * bsc#1230450 * bsc#1230451 * bsc#1230454 * bsc#1230455 * bsc#1230457 * bsc#1230459 * bsc#1230506 * bsc#1230507 * bsc#1230511 * bsc#1230515 * bsc#1230517 * bsc#1230518 * bsc#1230519 * bsc#1230520 * bsc#1230521 * bsc#1230524 * bsc#1230526 * bsc#1230533 * bsc#1230535 * bsc#1230539 * bsc#1230540 * bsc#1230549 * bsc#1230556 * bsc#1230562 * bsc#1230563 * bsc#1230564 * bsc#1230580 * bsc#1230582 * bsc#1230589 * bsc#1230602 * bsc#1230699 * bsc#1230700 * bsc#1230701 * bsc#1230702 * bsc#1230703 * bsc#1230704 * bsc#1230705 * bsc#1230706 * bsc#1230709 * bsc#1230711 * bsc#1230712 * bsc#1230715 * bsc#1230719 * bsc#1230722 * bsc#1230724 * bsc#1230725 * bsc#1230726 * bsc#1230727 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230747 * bsc#1230748 * bsc#1230749 * bsc#1230751 * bsc#1230752 * bsc#1230753 * bsc#1230756 * bsc#1230761 * bsc#1230766 * bsc#1230767 * bsc#1230768 * bsc#1230771 * bsc#1230772 * bsc#1230775 * bsc#1230776 * bsc#1230780 * bsc#1230783 * bsc#1230786 * bsc#1230787 * bsc#1230791 * bsc#1230794 * bsc#1230796 * bsc#1230802 * bsc#1230806 * bsc#1230808 * bsc#1230809 * bsc#1230810 * bsc#1230812 * bsc#1230813 * bsc#1230814 * bsc#1230815 * bsc#1230821 * bsc#1230825 * bsc#1230830 * bsc#1230831 * bsc#1230854 * bsc#1230948 * bsc#1231008 * bsc#1231035 * bsc#1231120 * bsc#1231146 * bsc#1231182 * bsc#1231183 * jsc#PED-10954 * jsc#PED-9899 Cross-References: * CVE-2023-52610 * CVE-2023-52752 * CVE-2023-52915 * CVE-2023-52916 * CVE-2024-26640 * CVE-2024-26759 * CVE-2024-26804 * CVE-2024-36953 * CVE-2024-38538 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-40965 * CVE-2024-40973 * CVE-2024-40983 * CVE-2024-42154 * CVE-2024-42243 * CVE-2024-42252 * CVE-2024-42265 * CVE-2024-42294 * CVE-2024-42304 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43828 * CVE-2024-43832 * CVE-2024-43835 * CVE-2024-43845 * CVE-2024-43870 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43904 * CVE-2024-43914 * CVE-2024-44935 * CVE-2024-44944 * CVE-2024-44946 * CVE-2024-44947 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44951 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44960 * CVE-2024-44961 * CVE-2024-44962 * CVE-2024-44965 * CVE-2024-44967 * CVE-2024-44969 * CVE-2024-44970 * CVE-2024-44971 * CVE-2024-44977 * CVE-2024-44982 * CVE-2024-44984 * CVE-2024-44985 * CVE-2024-44986 * CVE-2024-44987 * CVE-2024-44988 * CVE-2024-44989 * CVE-2024-44990 * CVE-2024-44991 * CVE-2024-44997 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45000 * CVE-2024-45001 * CVE-2024-45002 * CVE-2024-45003 * CVE-2024-45005 * CVE-2024-45006 * CVE-2024-45007 * CVE-2024-45008 * CVE-2024-45011 * CVE-2024-45012 * CVE-2024-45013 * CVE-2024-45015 * CVE-2024-45017 * CVE-2024-45018 * CVE-2024-45019 * CVE-2024-45020 * CVE-2024-45021 * CVE-2024-45022 * CVE-2024-45023 * CVE-2024-45026 * CVE-2024-45028 * CVE-2024-45029 * CVE-2024-45030 * CVE-2024-46672 * CVE-2024-46673 * CVE-2024-46674 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46687 * CVE-2024-46689 * CVE-2024-46691 * CVE-2024-46692 * CVE-2024-46693 * CVE-2024-46694 * CVE-2024-46695 * CVE-2024-46702 * CVE-2024-46706 * CVE-2024-46707 * CVE-2024-46709 * CVE-2024-46710 * CVE-2024-46714 * CVE-2024-46715 * CVE-2024-46716 * CVE-2024-46717 * CVE-2024-46719 * CVE-2024-46720 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46724 * CVE-2024-46725 * CVE-2024-46726 * CVE-2024-46728 * CVE-2024-46729 * CVE-2024-46730 * CVE-2024-46731 * CVE-2024-46732 * CVE-2024-46734 * CVE-2024-46735 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46741 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46746 * CVE-2024-46747 * CVE-2024-46749 * CVE-2024-46750 * CVE-2024-46751 * CVE-2024-46752 * CVE-2024-46753 * CVE-2024-46755 * CVE-2024-46756 * CVE-2024-46757 * CVE-2024-46758 * CVE-2024-46759 * CVE-2024-46760 * CVE-2024-46761 * CVE-2024-46767 * CVE-2024-46771 * CVE-2024-46772 * CVE-2024-46773 * CVE-2024-46774 * CVE-2024-46776 * CVE-2024-46778 * CVE-2024-46780 * CVE-2024-46781 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46786 * CVE-2024-46787 * CVE-2024-46791 * CVE-2024-46794 * CVE-2024-46797 * CVE-2024-46798 * CVE-2024-46822 CVSS scores: * CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42294 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44960 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44960 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-44960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44961 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44962 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44984 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-44985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44985 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45012 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46724 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46734 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46734 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46735 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46741 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46741 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46741 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46747 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46749 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46749 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46752 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46756 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46756 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46757 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46757 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46758 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46758 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46786 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46794 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 162 vulnerabilities, contains two features and has 50 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487). * CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269). * CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650). * CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340). * CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629). * CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606). * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42243: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray (bsc#1229001). * CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004). * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-42294: block: fix deadlock between sd_remove & sd_release (bsc#1229371). * CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394). * CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio reference (bsc#1229380). * CVE-2024-43845: udf: Fix bogus checksum computation in udf_rename() (bsc#1229389). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810). * CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption (bsc#1230181). * CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209). * CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211). * CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (bsc#1230240). * CVE-2024-44985: ipv6: prevent possible UAF in ip6_xmit() (bsc#1230206). * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192). * CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193). * CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194). * CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch (bsc#1230195). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling (bsc#1230169). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). * CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442). * CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430). * CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431). * CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter (bsc#1230432). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 (bsc#1230435). * CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow disk (bsc#1230455). * CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451). * CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() (bsc#1230518). * CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section (bsc#1230526). * CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call (bsc#1230520). * CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes (bsc#1230521). * CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers (bsc#1230540). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop (bsc#1230704). * CVE-2024-46735: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() (bsc#1230727). * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786). * CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). The following non-security bugs were fixed: * ABI: testing: fix admv8818 attr description (git-fixes). * ACPI: CPPC: Add helper to get the highest performance value (stable-fixes). * ACPI: CPPC: Fix MASK_VAL() usage (git-fixes). * ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git- fixes). * ACPI: processor: Fix memory leaks in error paths of processor_add() (stable- fixes). * ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes). * ACPI: sysfs: validate return type of _STR method (git-fixes). * ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes). * ACPICA: executer/exsystem: Do not nag user about every Stall() violating the spec (git-fixes). * ALSA: control: Apply sanity check of input values for user elements (stable- fixes). * ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes). * ALSA: hda/realtek - Fix inactive headset mic jack for ASUS Vivobook 15 X1504VAP (stable-fixes). * ALSA: hda/realtek: Enable Mute Led for HP Victus 15-fb1xxx (stable-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes). * ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes). * ALSA: hda/realtek: extend quirks for Clevo V5[46]0 (stable-fixes). * ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes). * ALSA: hda: add HDMI codec ID for Intel PTL (stable-fixes). * ALSA: hda: cs35l41: fix module autoloading (git-fixes). * ARM: 9406/1: Fix callchain_trace() return value (git-fixes). * ASoC: Intel: soc-acpi-cht: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * ASoC: amd: yc: Add a quirk for MSI Bravo 17 (D7VEK) (stable-fixes). * ASoC: codecs: avoid possible garbage value in peb2466_reg_read() (git- fixes). * ASoC: cs42l42: Convert comma to semicolon (git-fixes). * ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes). * ASoC: intel: fix module autoloading (stable-fixes). * ASoC: meson: Remove unused declartion in header file (git-fixes). * ASoC: meson: axg-card: fix 'use-after-free' (git-fixes). * ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git- fixes). * ASoC: rt5682s: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes). * ASoC: soc-ac97: Fix the incorrect description (git-fixes). * ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes). * ASoC: tas2781-i2c: Get the right GPIO line (git-fixes). * ASoC: tda7419: fix module autoloading (stable-fixes). * ASoC: tegra: Fix CBB error during probe() (git-fixes). * ASoC: topology: Properly initialize soc_enum values (stable-fixes). * ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes). * ASoc: TAS2781: replace beXX_to_cpup with get_unaligned_beXX for potentially broken alignment (stable-fixes). * Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes). * Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush() (stable-fixes). * Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes). * Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes). * Bluetooth: hci_event: Use HCI error defines instead of magic values (stable- fixes). * Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue (stable-fixes). * Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git- fixes). * Detect memory allocation failure in annotated_source__alloc_histograms (bsc#1227962). * Documentation: ioctl: document 0x07 ioctl code (git-fixes). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Drivers: hv: vmbus: Fix the misplaced function description (git-fixes). * Drop soundwire patch that caused a regression (bsc#1230350) * HID: amd_sfh: free driver_data after destroying hid device (stable-fixes). * HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable- fixes). * HID: multitouch: Add support for GT7868Q (stable-fixes). * HID: wacom: Do not warn about dropped packets for first packet (git-fixes). * HID: wacom: Support sequence numbers smaller than 16-bit (git-fixes). * IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes) * Input: adp5588-keys - fix check on return code (git-fixes). * Input: ads7846 - ratelimit the spi_sync error message (stable-fixes). * Input: ili210x - use kvmalloc() to allocate buffer for firmware update (stable-fixes). * Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes). * Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes). * Input: tsc2004/5 - do not hard code interrupt trigger (git-fixes). * Input: tsc2004/5 - fix reset handling on probe (git-fixes). * Input: tsc2004/5 - use device core to create driver-specific device attributes (git-fixes). * Input: uinput - reject requests with unreasonable number of slots (stable- fixes). * KEYS: prevent NULL pointer dereference in find_asymmetric_key() (git-fixes). * KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes). * KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes). * KVM: arm64: Block unsafe FF-A calls from the host (git-fixes). * KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging (git-fixes). * KVM: arm64: Do not pass a TLBI level hint when zapping table entries (git- fixes). * KVM: arm64: Do not re-initialize the KVM lock (git-fixes). * KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init (git-fixes). * KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (git- fixes). * KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes). * KVM: arm64: nvhe: Ignore SVE hint in SMCCC function ID (git-fixes). * KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git- fixes). * KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (git-fixes). * Move fixes into sorted section (bsc#1230119) * Move s390 kabi patch into the kabi section * NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726). * NFSD: Fix frame size warning in svc_export_parse() (git-fixes). * NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes). * NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes). * PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes). * PCI: Wait for Link before restoring Downstream Buses (git-fixes). * PCI: al: Check IORESOURCE_BUS existence during probe (stable-fixes). * PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes). * PCI: dra7xx: Fix threaded IRQ request for "dra7xx-pcie-main" IRQ (git- fixes). * PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes). * PCI: imx6: Fix missing call to phy_power_off() in error handling (git- fixes). * PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable- fixes). * PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes). * PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() (git-fixes). * PCI: qcom-ep: Enable controller resources like PHY only after refclk is available (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes). * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/efa: Properly handle unexpected AQ completions (git-fixes) * RDMA/erdma: Return QP state in erdma_query_qp (git-fixes) * RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes) * RDMA/hns: Fix 1bit-ECC recovery address in non-4K OS (git-fixes) * RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 (git-fixes) * RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git- fixes) * RDMA/hns: Fix ah error counter in sw stat not increasing (git-fixes) * RDMA/hns: Fix restricted __le16 degrades to integer issue (git-fixes) * RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes) * RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes) * RDMA/hns: Optimize hem allocation performance (git-fixes) * RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * RDMA/mlx5: Drop redundant work canceling from clean_keys() (git-fixes) * RDMA/mlx5: Fix MR cache temp entries cleanup (git-fixes) * RDMA/mlx5: Fix counter update on MR cache mkey creation (git-fixes) * RDMA/mlx5: Limit usage of over-sized mkeys from the MR cache (git-fixes) * RDMA/mlx5: Obtain upper net device only when needed (git-fixes) * RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes) * RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git- fixes) * Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes). * Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE" (git-fixes). * Revert "PCI: Extend ACS configurability (bsc#1228090)." (bsc#1229019) * Revert "drm/amdgpu: align pp_power_profile_mode with kernel docs" (stable- fixes). * Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (git-fixes). * Revert "mm, kmsan: fix infinite recursion due to RCU critical section" (bsc#1230413) * Revert "mm/sparsemem: fix race in accessing memory_section->usage" (bsc#1230413) * Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" (bsc#1230413) * Split kabi part of dm_blk_ioctl-implement-path-failover-for-SG_IO.patch * Squashfs: sanity check symbolic link size (git-fixes). * USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes). * USB: serial: kobil_sct: restore initial terminal settings (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (stable-fixes). * USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes). * USB: usbtmc: prevent kernel-usb-infoleak (git-fixes). * VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes). * afs: Do not cross .backup mountpoint from backup volume (git-fixes). * afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes). * arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585) * arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585) * arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes). * arm64: dts: allwinner: h616: Add r_i2c pinctrl nodes (git-fixes). * arm64: dts: exynos: exynos7885-jackpotlte: Correct RAM amount to 4GB (git- fixes). * arm64: dts: imx8-ss-dma: Fix adc0 closing brace location (git-fixes). * arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git- fixes). * arm64: dts: rockchip: Correct vendor prefix for Hardkernel ODROID-M1 (git- fixes). * arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes). * arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git- fixes). * arm64: dts: rockchip: fix eMMC/SPI corruption when audio has been used on RK3399 Puma (git-fixes). * arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes). * arm64: signal: Fix some under-bracketed UAPI macros (git-fixes). * arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585) * arm64: tlb: Fix TLBI RANGE operand (bsc#1229585) * arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585) * ata: libata-scsi: Fix ata_msense_control() CDL page reporting (git-fixes). * ata: libata: Clear DID_TIME_OUT for ATA PT commands with sense data (git- fixes). * ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes). * ata: pata_macio: Use WARN instead of BUG (stable-fixes). * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * bpf, events: Use prog to emit ksymbol event for main program (git-fixes). * bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (git-fixes). * btrfs: fix race between direct IO write and fsync when using same fd (git- fixes). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1230854). * bus: integrator-lm: fix OF node leak in probe() (git-fixes). * cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231008). * cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183). * can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes). * can: bcm: Remove proc entry when dev is unregistered (git-fixes). * can: j1939: use correct function name in comment (git-fixes). * can: kvaser_pciefd: Skip redundant NULL pointer check in ISR (stable-fixes). * can: m_can: Release irq on error in m_can_open (git-fixes). * can: m_can: enable NAPI before enabling interrupts (git-fixes). * can: m_can: m_can_close(): stop clocks after device has been shut down (git- fixes). * can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git- fixes). * can: mcp251xfd: clarify the meaning of timestamp (stable-fixes). * can: mcp251xfd: fix ring configuration when switching from CAN-CC to CAN-FD mode (git-fixes). * can: mcp251xfd: mcp251xfd_handle_rxif_ring_uinc(): factor out in separate function (stable-fixes). * can: mcp251xfd: mcp251xfd_ring_init(): check TX-coalescing configuration (stable-fixes). * can: mcp251xfd: move mcp251xfd_timestamp_start()/stop() into mcp251xfd_chip_start/stop() (stable-fixes). * can: mcp251xfd: properly indent labels (stable-fixes). * can: mcp251xfd: rx: add workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * can: mcp251xfd: rx: prepare to workaround broken RX FIFO head index erratum (stable-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (stable- fixes). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231182). * clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885). * clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885). * clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes). * clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git- fixes). * clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes). * clk: qcom: gcc-sc8280xp: do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: gcc-sm8550: Do not park the USB RCG at registration time (git- fixes). * clk: qcom: gcc-sm8550: Do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: ipq9574: Update the alpha PLL type for GPLLs (git-fixes). * clk: ti: dra7-atl: Fix leak of of_nodes (git-fixes). * clocksource/drivers/imx-tpm: Fix next event not taking effect sometime (git- fixes). * clocksource/drivers/imx-tpm: Fix return -ETIME when delta exceeds INT_MAX (git-fixes). * clocksource/drivers/qcom: Add missing iounmap() on errors in msm_dt_timer_init() (git-fixes). * cpufreq: amd-pstate: Enable amd-pstate preferred core support (stable- fixes). * cpufreq: amd-pstate: fix the highest frequency issue which limits performance (git-fixes). * cpufreq: scmi: Avoid overflow of target_freq in fast switch (stable-fixes). * cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes). * crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes). * crypto: ccp - do not request interrupt on cmd completion when irqs disabled (git-fixes). * crypto: iaa - Fix potential use after free bug (git-fixes). * crypto: qat - fix unintentional re-enabling of error interrupts (stable- fixes). * crypto: xor - fix template benchmarking (git-fixes). * cxl/core: Fix incorrect vendor debug UUID define (git-fixes). * cxl/pci: Fix to record only non-zero ranges (git-fixes). * devres: Initialize an uninitialized struct member (stable-fixes). * dma-buf: heaps: Fix off-by-one in CMA heap fault handler (git-fixes). * dma-debug: avoid deadlock between dma debug vs printk and netconsole (stable-fixes). * dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (stable-fixes). * dmaengine: altera-msgdma: use irq variant of spin_lock/unlock while invoking callbacks (stable-fixes). * driver core: Fix a potential null-ptr-deref in module_add_driver() (git- fixes). * driver core: Fix error handling in driver API device_rename() (git-fixes). * driver: iio: add missing checks on iio_info's callback access (stable- fixes). * drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes). * drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes). * drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes). * drm/amd/amdgpu: Check tbo resource pointer (stable-fixes). * drm/amd/amdgpu: Properly tune the size of struct (git-fixes). * drm/amd/display: Add array index check for hdcp ddc access (stable-fixes). * drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (git-fixes). * drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing (stable-fixes). * drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes). * drm/amd/display: Avoid overflow from uint32_t to uint8_t (stable-fixes). * drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct() (git-fixes). * drm/amd/display: Check BIOS images before it is used (stable-fixes). * drm/amd/display: Check HDCP returned status (stable-fixes). * drm/amd/display: Check UnboundedRequestEnabled's value (stable-fixes). * drm/amd/display: Check denominator pbn_div before used (stable-fixes). * drm/amd/display: Check gpio_id before used as array index (stable-fixes). * drm/amd/display: Check index for aux_rd_interval before using (stable- fixes). * drm/amd/display: Check msg_id before processing transcation (stable-fixes). * drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes). * drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes). * drm/amd/display: Defer handling mst up request in resume (stable-fixes). * drm/amd/display: Disable error correction if it's not supported (stable- fixes). * drm/amd/display: Do not use fsleep for PSR exit waits on dmub replay (stable-fixes). * drm/amd/display: Ensure array index tg_inst won't be -1 (stable-fixes). * drm/amd/display: Ensure index calculation will not overflow (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within decide_fallback_link_setting_max_bw_policy (stable-fixes). * drm/amd/display: Fix Coverity INTERGER_OVERFLOW within construct_integrated_info (stable-fixes). * drm/amd/display: Fix FEC_READY write on DP LT (stable-fixes). * drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (stable-fixes). * drm/amd/display: Fix pipe addition logic in calc_blocks_to_ungate DCN35 (stable-fixes). * drm/amd/display: Handle the case which quad_part is equal 0 (stable-fixes). * drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection (stable-fixes). * drm/amd/display: Replace dm_execute_dmub_cmd with dc_wake_and_execute_dmub_cmd (git-fixes). * drm/amd/display: Run DC_LOG_DC after checking link->link_enc (stable-fixes). * drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes). * drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable- fixes). * drm/amd/display: Solve mst monitors blank out problem after resume (git- fixes). * drm/amd/display: Spinlock before reading event (stable-fixes). * drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes). * drm/amd/display: Wake DMCUB before sending a command for replay feature (stable-fixes). * drm/amd/display: added NULL check at start of dc_validate_stream (stable- fixes). * drm/amd/display: handle nulled pipe context in DCE110's set_drr() (git- fixes). * drm/amd/display: use preferred link settings for dp signal only (stable- fixes). * drm/amd/pm: Fix negative array index read (stable-fixes). * drm/amd/pm: check negtive return for table entries (stable-fixes). * drm/amd/pm: check specific index for aldebaran (stable-fixes). * drm/amd/pm: check specific index for smu13 (stable-fixes). * drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable- fixes). * drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable- fixes). * drm/amd: Add gfx12 swizzle mode defs (stable-fixes). * drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes). * drm/amdgpu/display: handle gfx12 in amdgpu_dm_plane_format_mod_supported (stable-fixes). * drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes). * drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable- fixes). * drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes). * drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes). * drm/amdgpu/swsmu: always force a state reprogram on init (stable-fixes). * drm/amdgpu: Fix get each xcp macro (git-fixes). * drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes). * drm/amdgpu: Fix out-of-bounds write warning (stable-fixes). * drm/amdgpu: Fix smatch static checker warning (stable-fixes). * drm/amdgpu: Fix the uninitialized variable warning (stable-fixes). * drm/amdgpu: Fix the warning division or modulo by zero (stable-fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable- fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_info_ioctl (stable- fixes). * drm/amdgpu: Handle sg size limit for contiguous allocation (stable-fixes). * drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes). * drm/amdgpu: add lock in amdgpu_gart_invalidate_tlb (stable-fixes). * drm/amdgpu: add lock in kfd_process_dequeue_from_device (stable-fixes). * drm/amdgpu: add missing error handling in function amdgpu_gmc_flush_gpu_tlb_pasid (stable-fixes). * drm/amdgpu: add skip_hw_access checks for sriov (stable-fixes). * drm/amdgpu: align pp_power_profile_mode with kernel docs (stable-fixes). * drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes). * drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes). * drm/amdgpu: fix a possible null pointer dereference (git-fixes). * drm/amdgpu: fix contiguous handling for IB parsing v2 (git-fixes). * drm/amdgpu: fix dereference after null check (stable-fixes). * drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix overflowed array index read warning (stable-fixes). * drm/amdgpu: fix overflowed constant warning in mmhub_set_clockgating() (stable-fixes). * drm/amdgpu: fix the waring dereferencing hive (stable-fixes). * drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes). * drm/amdgpu: handle gfx12 in amdgpu_display_verify_sizes (stable-fixes). * drm/amdgpu: properly handle vbios fake edid sizing (git-fixes). * drm/amdgpu: reject gang submit on reserved VMIDs (stable-fixes). * drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes). * drm/amdgpu: update type of buf size to u32 for eeprom functions (stable- fixes). * drm/amdgu: fix Unintentional integer overflow for mall size (stable-fixes). * drm/amdkfd: Check debug trap enable before write dbg_ev_file (stable-fixes). * drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes). * drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes). * drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes). * drm/drm-bridge: Drop conditionals around of_node pointers (stable-fixes). * drm/fb-helper: Do not schedule_work() to flush frame buffer during panic() (stable-fixes). * drm/gpuvm: fix missing dependency to DRM_EXEC (git-fixes). * drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes). * drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git- fixes). * drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes). * drm/i915: Do not attempt to load the GSC multiple times (git-fixes). * drm/kfd: Correct pinned buffer handling at kfd restore and validate process (stable-fixes). * drm/mediatek: Set sensible cursor width/height values to fix crash (stable- fixes). * drm/mediatek: ovl_adaptor: Add missing of_node_put() (git-fixes). * drm/meson: plane: Add error handling (stable-fixes). * drm/msm/a5xx: disable preemption in submits by default (git-fixes). * drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes). * drm/msm/a5xx: properly clear preemption records on resume (git-fixes). * drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes). * drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes). * drm/msm/dsi: correct programming sequence for SM8350 / SM8450 (git-fixes). * drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes). * drm/msm: fix %s null argument error (git-fixes). * drm/nouveau/fb: restore init() for ramgp102 (git-fixes). * drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git- fixes). * drm/radeon: fix null pointer dereference in radeon_add_common_modes (git- fixes). * drm/radeon: properly handle vbios fake edid sizing (git-fixes). * drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git- fixes). * drm/rockchip: vop: Allow 4096px width scaling (git-fixes). * drm/rockchip: vop: clear DMA stop bit on RK3066 (git-fixes). * drm/rockchip: vop: enable VOP_FEATURE_INTERNAL_RGB on RK3066 (git-fixes). * drm/stm: Fix an error handling path in stm_drm_platform_probe() (git-fixes). * drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes). * drm/syncobj: Fix syncobj leak in drm_syncobj_eventfd_ioctl (git-fixes). * drm/vc4: hdmi: Handle error case of pm_runtime_resume_and_get (git-fixes). * drm: komeda: Fix an issue related to normalized zpos (stable-fixes). * drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Max (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Zero (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes). * ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() (git-fixes). * erofs: fix incorrect symlink detection in fast symlink (git-fixes). * exfat: fix memory leak in exfat_load_bitmap() (git-fixes). * fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes). * firmware: arm_scmi: Fix double free in OPTEE transport (git-fixes). * firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes). * firmware_loader: Block path traversal (git-fixes). * fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230602). * fuse: fix memory leak in fuse_create_open (bsc#1230124). * fuse: update stats for pages in dropped aux writeback list (bsc#1230125). * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230123). * gpio: modepin: Enable module autoloading (git-fixes). * gpio: rockchip: fix OF node leak in probe() (git-fixes). * hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (asus-ec-sensors) remove VRM temp X570-E GAMING (stable-fixes). * hwmon: (k10temp) Check return value of amd_smn_read() (stable-fixes). * hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable- fixes). * hwmon: (max16065) Fix overflows seen when writing limits (git-fixes). * hwmon: (nct6775-core) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (ntc_thermistor) fix module autoloading (git-fixes). * hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >= 1.2 (git-fixes). * hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes). * hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git- fixes). * hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git- fixes). * hwrng: mtk - Use devm_pm_runtime_enable (git-fixes). * i2c: aspeed: Update the stop sw state when the bus recovery occurs (git- fixes). * i2c: designware: fix controller is holding SCL low while ENABLE bit is disabled (git-fixes). * i2c: isch: Add missed 'else' (git-fixes). * i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes). * i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition (git-fixes). * i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable- fixes). * iio: adc: ad7124: fix chip ID mismatch (git-fixes). * iio: adc: ad7124: fix config comparison (git-fixes). * iio: adc: ad7606: fix oversampling gpio array (git-fixes). * iio: adc: ad7606: fix standby gpio state to match the documentation (git- fixes). * iio: adc: ad7606: remove frstdata check for serial mode (git-fixes). * iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes). * iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git- fixes). * iio: fix scale application in iio_convert_raw_to_processed_unlocked (git- fixes). * iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes). * ipmi: docs: do not advertise deprecated sysfs entries (git-fixes). * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipmi:ssif: Improve detecting during probing (bsc#1228771) Move patch into the sorted section. * ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230206) * jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes). * kABI workaround for cros_ec stuff (git-fixes). * kABI: Split kABI out of 'io_uring/kbuf: get rid of bl->is_ready' * kABI: Split kABI out of 'io_uring: Re-add dummy_ubuf for kABI purposes' * kABI: Split kABI out of io_uring/kbuf: protect io_buffer_list teardown with a reference * kabi: dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * kselftests: dmabuf-heaps: Ensure the driver name is null-terminated (stable- fixes). * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * leds: spi-byte: Call of_node_put() on error path (stable-fixes). * lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (stable- fixes). * lirc: rc_dev_get_from_fd(): fix file leak (git-fixes). * mailbox: bcm2835: Fix timeout during suspend mode (git-fixes). * mailbox: rockchip: fix a typo in module autoloading (git-fixes). * media: i2c: ar0521: Use cansleep version of gpiod_set_value() (git-fixes). * media: ov5675: Fix power on/off delay timings (git-fixes). * media: platform: rzg2l-cru: rzg2l-csi2: Add missing MODULE_DEVICE_TABLE (git-fixes). * media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes). * media: qcom: camss: Remove use_count guard in stop_streaming (git-fixes). * media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes). * media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes). * media: uvcvideo: Enforce alignment of frame and interval (stable-fixes). * media: venus: fix use after free bug in venus_remove due to race condition (git-fixes). * media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes). * media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes). * media: vivid: fix wrong sizeimage value for mplane (stable-fixes). * memory: mtk-smi: Use devm_clk_get_enabled() (git-fixes). * memory: tegra186-emc: drop unused to_tegra186_emc() (git-fixes). * minmax: reduce min/max macro expansion in atomisp driver (git-fixes). * misc: fastrpc: Fix double free of 'buf' in error path (git-fixes). * mmc: core: apply SD quirks earlier during probe (git-fixes). * mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes). * mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes). * mmc: sdhci-of-aspeed: fix module autoloading (git-fixes). * module: Fix KCOV-ignored file name (git-fixes). * mtd: powernv: Add check devm_kasprintf() returned value (git-fixes). * mtd: slram: insert break after errors in parsing the map (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: phy: Fix missing of_node_put() for leds (git-fixes). * net: phy: vitesse: repair vsc73xx autonegotiation (stable-fixes). * net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes). * net: usb: qmi_wwan: add MeiG Smart SRM825L (stable-fixes). * nfsd: Do not leave work of closing files to a work queue (bsc#1228140). * nilfs2: determine empty node blocks as corrupted (git-fixes). * nilfs2: fix missing cleanup on rollforward recovery error (git-fixes). * nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes). * nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes). * nilfs2: fix state management in error path of log writing function (git- fixes). * nilfs2: protect references to superblock parameters exposed in sysfs (git- fixes). * nouveau: fix the fwsec sb verification register (git-fixes). * nvme-multipath: avoid hang on inaccessible namespaces (bsc#1228244). * nvme-multipath: system fails to create generic nvme device (bsc#1228244). * nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes). * nvme-pci: allocate tagset on reset if necessary (git-fixes). * nvme-tcp: fix link failure for TCP auth (git-fixes). * nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes). * nvme: clear caller pointer on identify failure (git-fixes). * nvme: fix namespace removal list (git-fixes). * nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes). * nvmet-tcp: do not continue for invalid icreq (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet-trace: avoid dereferencing pointer too early (git-fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes). * pcmcia: Use resource_size function on resource object (stable-fixes). * perf annotate: Introduce global annotation_options (git-fixes). * perf annotate: Split branch stack cycles information out of 'struct annotation_line' (git-fixes). * perf annotate: Use global annotation_options (git-fixes). * perf arch events: Fix duplicate RISC-V SBI firmware event name (git-fixes). * perf intel-pt: Fix aux_watermark calculation for 64-bit size (git-fixes). * perf intel-pt: Fix exclude_guest setting (git-fixes). * perf machine thread: Remove exited threads by default (git-fixes). * perf maps: Move symbol maps functions to maps.c (git-fixes). * perf pmu: Assume sysfs events are always the same case (git-fixes). * perf pmus: Fixes always false when compare duplicates aliases (git-fixes). * perf record: Lazy load kernel symbols (git-fixes). * perf report: Convert to the global annotation_options (git-fixes). * perf report: Fix condition in sort__sym_cmp() (git-fixes). * perf stat: Fix the hard-coded metrics calculation on the hybrid (git-fixes). * perf test: Make test_arm_callgraph_fp.sh more robust (git-fixes). * perf tool: fix dereferencing NULL al->maps (git-fixes). * perf tools: Add/use PMU reverse lookup from config to name (git-fixes). * perf tools: Use pmus to describe type from attribute (git-fixes). * perf top: Convert to the global annotation_options (git-fixes). * perf/core: Fix missing wakeup when waiting for context reference (git- fixes). * perf/x86/intel/cstate: Add pkg C2 residency counter for Sierra Forest (git- fixes). * perf/x86/intel/cstate: Fix Alderlake/Raptorlake/Meteorlake (git-fixes). * perf/x86/intel/ds: Fix non 0 retire latency on Raptorlake (git-fixes). * perf/x86/intel/pt: Fix a topa_entry base address calculation (git-fixes). * perf/x86/intel/pt: Fix pt_topa_entry_for_page() address calculation (git- fixes). * perf/x86/intel/pt: Fix topa_entry base length (git-fixes). * perf/x86/intel/uncore: Fix the bits of the CHA extended umask for SPR (git- fixes). * perf/x86/intel/uncore: Support HBM and CXL PMON counters (bsc#1230119). * perf/x86/intel: Add a distinct name for Granite Rapids (git-fixes). * perf/x86/intel: Factor out the initialization code for SPR (git fixes). * perf/x86/intel: Limit the period on Haswell (git-fixes). * perf/x86/intel: Use the common uarch name for the shared functions (git fixes). * perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to MSR uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to PCI uncore units (bsc#1230119). * perf/x86/uncore: Cleanup unused unit structure (bsc#1230119). * perf/x86/uncore: Retrieve the unit ID from the unit control RB tree (bsc#1230119). * perf/x86/uncore: Save the unit control address of all units (bsc#1230119). * perf/x86/uncore: Support per PMU cpumask (bsc#1230119). * perf/x86: Fix smp_processor_id()-in-preemptible warnings (git-fixes). * perf/x86: Serialize set_attr_rdpmc() (git-fixes). * perf: Fix default aux_watermark calculation (git-fixes). * perf: Fix event leak upon exit (git-fixes). * perf: Fix perf_aux_size() for greater-than 32-bit size (git-fixes). * perf: Prevent passing zero nr_pages to rb_alloc_aux() (git-fixes). * perf: script: add raw|disasm arguments to --insn-trace option (git-fixes). * phy: zynqmp: Take the phy mutex in xlate (stable-fixes). * pinctrl: at91: make it work with current gpiolib (stable-fixes). * pinctrl: meteorlake: Add Arrow Lake-H/U ACPI ID (stable-fixes). * pinctrl: single: fix missing error code in pcs_probe() (git-fixes). * platform/chrome: cros_ec_lpc: MEC access can use an AML mutex (stable- fixes). * platform/surface: aggregator_registry: Add Support for Surface Pro 10 (stable-fixes). * platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes). * platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes). * platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes). * platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git- fixes). * platform/x86: x86-android-tablets: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes). * power: supply: axp20x_battery: Remove design from min and max voltage (git- fixes). * power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes). * power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes). * powercap/intel_rapl: Add support for AMD family 1Ah (stable-fixes). * powerpc/qspinlock: Fix deadlock in MCS queue (bac#1230295 ltc#206656). * pwm: xilinx: Fix u32 overflow issue in 32-bit width PWM mode (stable-fixes). * r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes). * regmap: maple: work around gcc-14.1 false-positive warning (stable-fixes). * regmap: spi: Fix potential off-by-one when calculating reserved size (stable-fixes). * regulator: Return actual error in of_regulator_bulk_get_all() (git-fixes). * regulator: core: Fix regulator_is_supported_voltage() kerneldoc return value (git-fixes). * regulator: core: Fix short description for _regulator_check_status_enabled() (git-fixes). * regulator: core: Stub devm_regulator_bulk_get_const() if !CONFIG_REGULATOR (git-fixes). * regulator: rt5120: Convert comma to semicolon (git-fixes). * regulator: wm831x-isink: Convert comma to semicolon (git-fixes). * remoteproc: imx_rproc: Correct ddr alias for i.MX8M (git-fixes). * remoteproc: imx_rproc: Initialize workqueue earlier (git-fixes). * remoteproc: k3-r5: Fix error handling when power-up failed (git-fixes). * reset: berlin: fix OF node leak in probe() error path (git-fixes). * reset: k210: fix OF node leak in probe() error path (git-fixes). * resource: fix region_intersects() vs add_memory_driver_managed() (git- fixes). * rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY gcc version dependent, at least on ppc * rtc: at91sam9: fix OF node leak in probe() error path (git-fixes). * s390/dasd: Fix redundant /proc/dasd* entries removal (bsc#1227694). * s390/dasd: Remove DMA alignment (LTC#208933 bsc#1230426 git-fixes). * s390/mm: Convert gmap_make_secure to use a folio (git-fixes bsc#1230562). * s390/mm: Convert make_page_secure to use a folio (git-fixes bsc#1230563). * s390: allow pte_offset_map_lock() to fail (git-fixes bsc#1230564). * scripts: kconfig: merge_config: config files: add a trailing newline (stable-fixes). * scripts: sphinx-pre-install: remove unnecessary double check for $cur_version (git-fixes). * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix overflow build issue (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429 jsc#PED-9899). * scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848). * selftests: lib: remove strscpy test (git-fixes). * selinux,smack: do not bypass permissions check in inode_setsecctx hook (stable-fixes). * soc: fsl: cpm1: tsa: Fix tsa_write8() (git-fixes). * soc: versatile: integrator: fix OF node leak in probe() error path (git- fixes). * spi: atmel-quadspi: Avoid overwriting delay register settings (git-fixes). * spi: atmel-quadspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: bcm63xx: Enable module autoloading (stable-fixes). * spi: bcm63xx: Fix module autoloading (git-fixes). * spi: meson-spicc: convert comma to semicolon (git-fixes). * spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes). * spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes). * spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes). * spi: rockchip: Resolve unbalanced runtime PM / system PM handling (git- fixes). * spi: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: spidev: Add an entry for elgin,jg10309-01 (stable-fixes). * spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes). * staging: iio: frequency: ad9834: Validate frequency parameter value (git- fixes). * supported.conf: mark adiantum and xctr crypto modules as supported (bsc#1231035) * thunderbolt: Fix XDomain rx_lanes_show and tx_lanes_show (git-fixes). * thunderbolt: Fix calculation of consumed USB3 bandwidth on a path (git- fixes). * thunderbolt: Fix rollback in tb_port_lane_bonding_enable() for lane 1 (git- fixes). * thunderbolt: There are only 5 basic router registers in pre-USB4 routers (git-fixes). * tomoyo: fallback to realpath if symlink's pathname does not exist (git- fixes). * tools/perf: Fix the string match for "/tmp/perf-$PID.map" files in dso__load (git-fixes). * tpm: Clean up TPM space after command failure (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usb: cdnsp: Fix incorrect usb_request status (git-fixes). * usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes). * usb: dwc2: drd: fix clock gating on USB role switch (git-fixes). * usb: dwc3: Avoid waking up gadget during startxfer (git-fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (git- fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (stable-fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes). * usb: gadget: aspeed_udc: validate endpoint index for ast udc (stable-fixes). * usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes). * usb: typec: ucsi: Wait 20ms before reading CCI after a reset (git-fixes). * usb: uas: set host status byte on data completion error (stable-fixes). * usbip: Do not submit special requests twice (stable-fixes). * usbnet: ipheth: add CDC NCM support (git-fixes). * usbnet: ipheth: do not stop RX on failing RX callback (git-fixes). * usbnet: ipheth: drop RX URBs with no payload (git-fixes). * usbnet: ipheth: fix carrier detection in modes 1 and 4 (git-fixes). * usbnet: ipheth: fix risk of NULL pointer deallocation (git-fixes). * usbnet: ipheth: race between ipheth_close and error handling (stable-fixes). * usbnet: ipheth: remove extraneous rx URB length check (git-fixes). * usbnet: ipheth: transmit URBs without trailing padding (git-fixes). * usbnet: modern method to get random MAC (git-fixes). * virtio-net: synchronize probe with ndo_set_features (git-fixes). * virtio_net: Fix napi_skb_cache_put warning (git-fixes). * virtio_net: fixing XDP for fully checksummed packets handling (git-fixes). * watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes). * wifi: ath11k: initialize 'ret' in ath11k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: fix BSS chan info request WMI command (git-fixes). * wifi: ath12k: fix firmware crash due to invalid peer nss (stable-fixes). * wifi: ath12k: fix invalid AMPDU factor calculation in ath12k_peer_assoc_h_he() (git-fixes). * wifi: ath12k: fix uninitialize symbol error on ath12k_peer_assoc_h_he() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_dp_rxdma_ring_sel_config_wcn7850() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: match WMI BSS chan info structure with firmware definition (git-fixes). * wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes). * wifi: brcmfmac: introducing fwil query functions (git-fixes). * wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes). * wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes). * wifi: cfg80211: fix bug of mapping AF3x to incorrect User Priority (git- fixes). * wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git- fixes). * wifi: cfg80211: make hash table duplicates more survivable (stable-fixes). * wifi: cfg80211: restrict operation during radar detection (stable-fixes). * wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes). * wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes). * wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (stable- fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_max_scan_ie_fw_cmd_room() (stable-fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes). * wifi: iwlwifi: mvm: increase the time between ranging measurements (git- fixes). * wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (stable-fixes). * wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check (stable-fixes). * wifi: mac80211: check ieee80211_bss_info_change_notify() against MLD (stable-fixes). * wifi: mac80211: do not use rate mask for offchannel TX either (git-fixes). * wifi: mac80211: fix the comeback long retry times (git-fixes). * wifi: mac80211: free skb on error path in ieee80211_beacon_get_ap() (stable- fixes). * wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git- fixes). * wifi: mt76: connac: fix checksum offload fields of connac3 RXD (git-fixes). * wifi: mt76: mt7603: fix mixed declarations and code (git-fixes). * wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: fix oops on non-dbdc mt7986 (git-fixes). * wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7921: Check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change (stable-fixes). * wifi: mt76: mt7921: fix wrong UNII-4 freq range check for the channel usage (git-fixes). * wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc (git-fixes). * wifi: mt76: mt7996: fix EHT beamforming capability check (git-fixes). * wifi: mt76: mt7996: fix HE and EHT beamforming capabilities (git-fixes). * wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he (git-fixes). * wifi: mt76: mt7996: fix traffic delay when switching back to working channel (git-fixes). * wifi: mt76: mt7996: fix uninitialized TLV data (git-fixes). * wifi: mt76: mt7996: fix wmm set of station interface to 3 (git-fixes). * wifi: mt76: mt7996: use hweight16 to get correct tx antenna (git-fixes). * wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes). * wifi: rtw88: 8822c: Fix reported RX band width (git-fixes). * wifi: rtw88: always wait for both firmware loading attempts (git-fixes). * wifi: rtw88: remove CPT execution branch never used (git-fixes). * wifi: rtw88: usb: schedule rx work after everything is set up (stable- fixes). * wifi: rtw89: ser: avoid multiple deinit on same CAM (stable-fixes). * wifi: rtw89: wow: prevent to send unexpected H2C during download Firmware (stable-fixes). * wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes). * x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes). * x86/kaslr: Expose and use the end of the physical memory address space (bsc#1229443). * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). * x86/mm: Use lookup_address_in_pgd_attr() in show_fault_oops() (bsc#1221527). * x86/pat: Fix W^X violation false-positives when running as Xen PV guest (bsc#1221527). * x86/pat: Introduce lookup_address_in_pgd_attr() (bsc#1221527). * x86/pat: Restructure _lookup_address_cpa() (bsc#1221527). * xen/swiotlb: add alignment check for dma buffers (bsc#1229928). * xen/swiotlb: fix allocated size (git-fixes). * xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003). * xen: allow mapping ACPI data using a different physical address (bsc#1226003). * xen: introduce generic helper checking for memory map conflicts (bsc#1226003). * xen: move checks for e820 conflicts further up (bsc#1226003). * xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003). * xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003). * xen: use correct end address of kernel for conflict checking (bsc#1226003). * xfs: restrict when we try to align cow fork delalloc to cowextsz hints (git- fixes). * xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git- fixes). * xz: cleanup CRC32 edits from 2018 (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3551=1 SUSE-2024-3551=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-3551=1 ## Package List: * openSUSE Leap 15.6 (aarch64 x86_64) * cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.14.1 * kernel-azure-debuginfo-6.4.0-150600.8.14.1 * kernel-syms-azure-6.4.0-150600.8.14.1 * ocfs2-kmp-azure-6.4.0-150600.8.14.1 * reiserfs-kmp-azure-6.4.0-150600.8.14.1 * dlm-kmp-azure-debuginfo-6.4.0-150600.8.14.1 * ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.14.1 * kernel-azure-optional-debuginfo-6.4.0-150600.8.14.1 * cluster-md-kmp-azure-6.4.0-150600.8.14.1 * kernel-azure-extra-debuginfo-6.4.0-150600.8.14.1 * kernel-azure-optional-6.4.0-150600.8.14.1 * kernel-azure-extra-6.4.0-150600.8.14.1 * gfs2-kmp-azure-debuginfo-6.4.0-150600.8.14.1 * dlm-kmp-azure-6.4.0-150600.8.14.1 * kernel-azure-livepatch-devel-6.4.0-150600.8.14.1 * kselftests-kmp-azure-6.4.0-150600.8.14.1 * kselftests-kmp-azure-debuginfo-6.4.0-150600.8.14.1 * kernel-azure-devel-6.4.0-150600.8.14.1 * kernel-azure-devel-debuginfo-6.4.0-150600.8.14.1 * gfs2-kmp-azure-6.4.0-150600.8.14.1 * kernel-azure-debugsource-6.4.0-150600.8.14.1 * reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.14.1 * openSUSE Leap 15.6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.14.1 * openSUSE Leap 15.6 (x86_64) * kernel-azure-vdso-debuginfo-6.4.0-150600.8.14.1 * kernel-azure-vdso-6.4.0-150600.8.14.1 * openSUSE Leap 15.6 (noarch) * kernel-devel-azure-6.4.0-150600.8.14.1 * kernel-source-azure-6.4.0-150600.8.14.1 * Public Cloud Module 15-SP6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.14.1 * Public Cloud Module 15-SP6 (aarch64 x86_64) * kernel-azure-devel-6.4.0-150600.8.14.1 * kernel-azure-debuginfo-6.4.0-150600.8.14.1 * kernel-azure-devel-debuginfo-6.4.0-150600.8.14.1 * kernel-azure-debugsource-6.4.0-150600.8.14.1 * kernel-syms-azure-6.4.0-150600.8.14.1 * Public Cloud Module 15-SP6 (noarch) * kernel-devel-azure-6.4.0-150600.8.14.1 * kernel-source-azure-6.4.0-150600.8.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52610.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2023-52916.html * https://www.suse.com/security/cve/CVE-2024-26640.html * https://www.suse.com/security/cve/CVE-2024-26759.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-36953.html * https://www.suse.com/security/cve/CVE-2024-38538.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-40965.html * https://www.suse.com/security/cve/CVE-2024-40973.html * https://www.suse.com/security/cve/CVE-2024-40983.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42243.html * https://www.suse.com/security/cve/CVE-2024-42252.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42294.html * https://www.suse.com/security/cve/CVE-2024-42304.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43828.html * https://www.suse.com/security/cve/CVE-2024-43832.html * https://www.suse.com/security/cve/CVE-2024-43835.html * https://www.suse.com/security/cve/CVE-2024-43845.html * https://www.suse.com/security/cve/CVE-2024-43870.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43904.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44935.html * https://www.suse.com/security/cve/CVE-2024-44944.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44951.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44960.html * https://www.suse.com/security/cve/CVE-2024-44961.html * https://www.suse.com/security/cve/CVE-2024-44962.html * https://www.suse.com/security/cve/CVE-2024-44965.html * https://www.suse.com/security/cve/CVE-2024-44967.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44970.html * https://www.suse.com/security/cve/CVE-2024-44971.html * https://www.suse.com/security/cve/CVE-2024-44977.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44984.html * https://www.suse.com/security/cve/CVE-2024-44985.html * https://www.suse.com/security/cve/CVE-2024-44986.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44988.html * https://www.suse.com/security/cve/CVE-2024-44989.html * https://www.suse.com/security/cve/CVE-2024-44990.html * https://www.suse.com/security/cve/CVE-2024-44991.html * https://www.suse.com/security/cve/CVE-2024-44997.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45000.html * https://www.suse.com/security/cve/CVE-2024-45001.html * https://www.suse.com/security/cve/CVE-2024-45002.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45005.html * https://www.suse.com/security/cve/CVE-2024-45006.html * https://www.suse.com/security/cve/CVE-2024-45007.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-45011.html * https://www.suse.com/security/cve/CVE-2024-45012.html * https://www.suse.com/security/cve/CVE-2024-45013.html * https://www.suse.com/security/cve/CVE-2024-45015.html * https://www.suse.com/security/cve/CVE-2024-45017.html * https://www.suse.com/security/cve/CVE-2024-45018.html * https://www.suse.com/security/cve/CVE-2024-45019.html * https://www.suse.com/security/cve/CVE-2024-45020.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-45022.html * https://www.suse.com/security/cve/CVE-2024-45023.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-45028.html * https://www.suse.com/security/cve/CVE-2024-45029.html * https://www.suse.com/security/cve/CVE-2024-45030.html * https://www.suse.com/security/cve/CVE-2024-46672.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46687.html * https://www.suse.com/security/cve/CVE-2024-46689.html * https://www.suse.com/security/cve/CVE-2024-46691.html * https://www.suse.com/security/cve/CVE-2024-46692.html * https://www.suse.com/security/cve/CVE-2024-46693.html * https://www.suse.com/security/cve/CVE-2024-46694.html * https://www.suse.com/security/cve/CVE-2024-46695.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46706.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46709.html * https://www.suse.com/security/cve/CVE-2024-46710.html * https://www.suse.com/security/cve/CVE-2024-46714.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46716.html * https://www.suse.com/security/cve/CVE-2024-46717.html * https://www.suse.com/security/cve/CVE-2024-46719.html * https://www.suse.com/security/cve/CVE-2024-46720.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46724.html * https://www.suse.com/security/cve/CVE-2024-46725.html * https://www.suse.com/security/cve/CVE-2024-46726.html * https://www.suse.com/security/cve/CVE-2024-46728.html * https://www.suse.com/security/cve/CVE-2024-46729.html * https://www.suse.com/security/cve/CVE-2024-46730.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46732.html * https://www.suse.com/security/cve/CVE-2024-46734.html * https://www.suse.com/security/cve/CVE-2024-46735.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46741.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46746.html * https://www.suse.com/security/cve/CVE-2024-46747.html * https://www.suse.com/security/cve/CVE-2024-46749.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46751.html * https://www.suse.com/security/cve/CVE-2024-46752.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46755.html * https://www.suse.com/security/cve/CVE-2024-46756.html * https://www.suse.com/security/cve/CVE-2024-46757.html * https://www.suse.com/security/cve/CVE-2024-46758.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46760.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46767.html * https://www.suse.com/security/cve/CVE-2024-46771.html * https://www.suse.com/security/cve/CVE-2024-46772.html * https://www.suse.com/security/cve/CVE-2024-46773.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46776.html * https://www.suse.com/security/cve/CVE-2024-46778.html * https://www.suse.com/security/cve/CVE-2024-46780.html * https://www.suse.com/security/cve/CVE-2024-46781.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46786.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46791.html * https://www.suse.com/security/cve/CVE-2024-46794.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46798.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221527 * https://bugzilla.suse.com/show_bug.cgi?id=1221610 * https://bugzilla.suse.com/show_bug.cgi?id=1221650 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1225487 * https://bugzilla.suse.com/show_bug.cgi?id=1225812 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226507 * https://bugzilla.suse.com/show_bug.cgi?id=1226606 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227694 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227819 * https://bugzilla.suse.com/show_bug.cgi?id=1227885 * https://bugzilla.suse.com/show_bug.cgi?id=1227890 * https://bugzilla.suse.com/show_bug.cgi?id=1227962 * https://bugzilla.suse.com/show_bug.cgi?id=1228090 * https://bugzilla.suse.com/show_bug.cgi?id=1228140 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228771 * https://bugzilla.suse.com/show_bug.cgi?id=1229001 * https://bugzilla.suse.com/show_bug.cgi?id=1229004 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229289 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229364 * https://bugzilla.suse.com/show_bug.cgi?id=1229371 * https://bugzilla.suse.com/show_bug.cgi?id=1229380 * https://bugzilla.suse.com/show_bug.cgi?id=1229389 * https://bugzilla.suse.com/show_bug.cgi?id=1229394 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229443 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229494 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229768 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229810 * https://bugzilla.suse.com/show_bug.cgi?id=1229899 * https://bugzilla.suse.com/show_bug.cgi?id=1229928 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230119 * https://bugzilla.suse.com/show_bug.cgi?id=1230123 * https://bugzilla.suse.com/show_bug.cgi?id=1230124 * https://bugzilla.suse.com/show_bug.cgi?id=1230125 * https://bugzilla.suse.com/show_bug.cgi?id=1230169 * https://bugzilla.suse.com/show_bug.cgi?id=1230170 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230173 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230175 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230181 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230191 * https://bugzilla.suse.com/show_bug.cgi?id=1230192 * https://bugzilla.suse.com/show_bug.cgi?id=1230193 * https://bugzilla.suse.com/show_bug.cgi?id=1230194 * https://bugzilla.suse.com/show_bug.cgi?id=1230195 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230206 * https://bugzilla.suse.com/show_bug.cgi?id=1230207 * https://bugzilla.suse.com/show_bug.cgi?id=1230209 * https://bugzilla.suse.com/show_bug.cgi?id=1230211 * https://bugzilla.suse.com/show_bug.cgi?id=1230213 * https://bugzilla.suse.com/show_bug.cgi?id=1230217 * https://bugzilla.suse.com/show_bug.cgi?id=1230221 * https://bugzilla.suse.com/show_bug.cgi?id=1230224 * https://bugzilla.suse.com/show_bug.cgi?id=1230230 * https://bugzilla.suse.com/show_bug.cgi?id=1230232 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230240 * https://bugzilla.suse.com/show_bug.cgi?id=1230244 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230247 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230269 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230340 * https://bugzilla.suse.com/show_bug.cgi?id=1230350 * https://bugzilla.suse.com/show_bug.cgi?id=1230413 * https://bugzilla.suse.com/show_bug.cgi?id=1230426 * https://bugzilla.suse.com/show_bug.cgi?id=1230430 * https://bugzilla.suse.com/show_bug.cgi?id=1230431 * https://bugzilla.suse.com/show_bug.cgi?id=1230432 * https://bugzilla.suse.com/show_bug.cgi?id=1230433 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230435 * https://bugzilla.suse.com/show_bug.cgi?id=1230440 * https://bugzilla.suse.com/show_bug.cgi?id=1230441 * https://bugzilla.suse.com/show_bug.cgi?id=1230442 * https://bugzilla.suse.com/show_bug.cgi?id=1230444 * https://bugzilla.suse.com/show_bug.cgi?id=1230450 * https://bugzilla.suse.com/show_bug.cgi?id=1230451 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1230455 * https://bugzilla.suse.com/show_bug.cgi?id=1230457 * https://bugzilla.suse.com/show_bug.cgi?id=1230459 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230511 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230518 * https://bugzilla.suse.com/show_bug.cgi?id=1230519 * https://bugzilla.suse.com/show_bug.cgi?id=1230520 * https://bugzilla.suse.com/show_bug.cgi?id=1230521 * https://bugzilla.suse.com/show_bug.cgi?id=1230524 * https://bugzilla.suse.com/show_bug.cgi?id=1230526 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230539 * https://bugzilla.suse.com/show_bug.cgi?id=1230540 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230562 * https://bugzilla.suse.com/show_bug.cgi?id=1230563 * https://bugzilla.suse.com/show_bug.cgi?id=1230564 * https://bugzilla.suse.com/show_bug.cgi?id=1230580 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230602 * https://bugzilla.suse.com/show_bug.cgi?id=1230699 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230701 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230703 * https://bugzilla.suse.com/show_bug.cgi?id=1230704 * https://bugzilla.suse.com/show_bug.cgi?id=1230705 * https://bugzilla.suse.com/show_bug.cgi?id=1230706 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230711 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230715 * https://bugzilla.suse.com/show_bug.cgi?id=1230719 * https://bugzilla.suse.com/show_bug.cgi?id=1230722 * https://bugzilla.suse.com/show_bug.cgi?id=1230724 * https://bugzilla.suse.com/show_bug.cgi?id=1230725 * https://bugzilla.suse.com/show_bug.cgi?id=1230726 * https://bugzilla.suse.com/show_bug.cgi?id=1230727 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230749 * https://bugzilla.suse.com/show_bug.cgi?id=1230751 * https://bugzilla.suse.com/show_bug.cgi?id=1230752 * https://bugzilla.suse.com/show_bug.cgi?id=1230753 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230766 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230768 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230772 * https://bugzilla.suse.com/show_bug.cgi?id=1230775 * https://bugzilla.suse.com/show_bug.cgi?id=1230776 * https://bugzilla.suse.com/show_bug.cgi?id=1230780 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230786 * https://bugzilla.suse.com/show_bug.cgi?id=1230787 * https://bugzilla.suse.com/show_bug.cgi?id=1230791 * https://bugzilla.suse.com/show_bug.cgi?id=1230794 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230802 * https://bugzilla.suse.com/show_bug.cgi?id=1230806 * https://bugzilla.suse.com/show_bug.cgi?id=1230808 * https://bugzilla.suse.com/show_bug.cgi?id=1230809 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230812 * https://bugzilla.suse.com/show_bug.cgi?id=1230813 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230821 * https://bugzilla.suse.com/show_bug.cgi?id=1230825 * https://bugzilla.suse.com/show_bug.cgi?id=1230830 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230854 * https://bugzilla.suse.com/show_bug.cgi?id=1230948 * https://bugzilla.suse.com/show_bug.cgi?id=1231008 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://jira.suse.com/browse/PED-10954 * https://jira.suse.com/browse/PED-9899 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 16:35:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 16:35:10 -0000 Subject: SUSE-SU-2024:3550-1: moderate: Security update for podofo Message-ID: <172840531002.4252.17877231205005267103@smelt2.prg2.suse.org> # Security update for podofo Announcement ID: SUSE-SU-2024:3550-1 Release Date: 2024-10-08T14:08:01Z Rating: moderate References: * bsc#1023072 * bsc#1023190 * bsc#1027776 * bsc#1027779 * bsc#1027785 * bsc#1027786 * bsc#1027787 * bsc#1037000 * bsc#1075322 * bsc#1084894 Cross-References: * CVE-2015-8981 * CVE-2017-6840 * CVE-2017-6841 * CVE-2017-6842 * CVE-2017-6845 * CVE-2017-6849 * CVE-2017-8378 * CVE-2018-5309 * CVE-2018-8001 CVSS scores: * CVE-2017-6840 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2017-6841 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2017-6842 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2017-6845 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2017-6849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2017-6849 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2017-8378 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2017-8378 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-5309 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2018-5309 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2018-8001 ( SUSE ): 5.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2018-8001 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves nine vulnerabilities and has one security fix can now be installed. ## Description: This update for podofo fixes the following issues: * CVE-2015-8981: Fixed heap overflow in the function ReadXRefSubsection (bsc#1023190) * CVE-2017-6840: Fixed invalid memory read in ColorChanger::GetColorFromStack (colorchanger.cpp) (bsc#1027787) * CVE-2017-6841: Fixed NULL pointer dereference in GraphicsStack::TGraphicsStackElement::~TGraphicsStackElement (graphicsstack.h) (bsc#1027786) * CVE-2017-6842: Fixed NULL pointer dereference in ColorChanger::GetColorFromStack (colorchanger.cpp) (bsc#1027785) * CVE-2017-6845: Fixed NULL pointer dereference in GraphicsStack::TGraphicsStackElement::SetNonStrokingColorSpace (graphicsstack.h) (bsc#1027779) * CVE-2017-6849: Fixed NULL pointer dereference in PoDoFo::PdfColorGray::~PdfColorGray (PdfColor.cpp) (bsc#1027776) * CVE-2017-8378: Fixed denial of service (application crash) vectors related to m_offsets.size (PdfParser::ReadObjects func in base/PdfParser.cpp) (bsc#1037000) * Fixed NULL pointer dereference in PdfInfo::GuessFormat (pdfinfo.cpp) (bsc#1023072) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3550=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3550=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3550=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3550=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3550=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * podofo-debugsource-0.9.6-150300.3.15.1 * libpodofo0_9_6-0.9.6-150300.3.15.1 * podofo-debuginfo-0.9.6-150300.3.15.1 * libpodofo0_9_6-debuginfo-0.9.6-150300.3.15.1 * podofo-0.9.6-150300.3.15.1 * libpodofo-devel-0.9.6-150300.3.15.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * podofo-debugsource-0.9.6-150300.3.15.1 * libpodofo0_9_6-0.9.6-150300.3.15.1 * podofo-debuginfo-0.9.6-150300.3.15.1 * libpodofo0_9_6-debuginfo-0.9.6-150300.3.15.1 * podofo-0.9.6-150300.3.15.1 * libpodofo-devel-0.9.6-150300.3.15.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * podofo-debugsource-0.9.6-150300.3.15.1 * libpodofo0_9_6-0.9.6-150300.3.15.1 * podofo-debuginfo-0.9.6-150300.3.15.1 * libpodofo0_9_6-debuginfo-0.9.6-150300.3.15.1 * podofo-0.9.6-150300.3.15.1 * libpodofo-devel-0.9.6-150300.3.15.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * podofo-debugsource-0.9.6-150300.3.15.1 * libpodofo0_9_6-0.9.6-150300.3.15.1 * podofo-debuginfo-0.9.6-150300.3.15.1 * libpodofo0_9_6-debuginfo-0.9.6-150300.3.15.1 * podofo-0.9.6-150300.3.15.1 * libpodofo-devel-0.9.6-150300.3.15.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * podofo-debugsource-0.9.6-150300.3.15.1 * libpodofo0_9_6-0.9.6-150300.3.15.1 * podofo-debuginfo-0.9.6-150300.3.15.1 * libpodofo0_9_6-debuginfo-0.9.6-150300.3.15.1 * podofo-0.9.6-150300.3.15.1 * libpodofo-devel-0.9.6-150300.3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2015-8981.html * https://www.suse.com/security/cve/CVE-2017-6840.html * https://www.suse.com/security/cve/CVE-2017-6841.html * https://www.suse.com/security/cve/CVE-2017-6842.html * https://www.suse.com/security/cve/CVE-2017-6845.html * https://www.suse.com/security/cve/CVE-2017-6849.html * https://www.suse.com/security/cve/CVE-2017-8378.html * https://www.suse.com/security/cve/CVE-2018-5309.html * https://www.suse.com/security/cve/CVE-2018-8001.html * https://bugzilla.suse.com/show_bug.cgi?id=1023072 * https://bugzilla.suse.com/show_bug.cgi?id=1023190 * https://bugzilla.suse.com/show_bug.cgi?id=1027776 * https://bugzilla.suse.com/show_bug.cgi?id=1027779 * https://bugzilla.suse.com/show_bug.cgi?id=1027785 * https://bugzilla.suse.com/show_bug.cgi?id=1027786 * https://bugzilla.suse.com/show_bug.cgi?id=1027787 * https://bugzilla.suse.com/show_bug.cgi?id=1037000 * https://bugzilla.suse.com/show_bug.cgi?id=1075322 * https://bugzilla.suse.com/show_bug.cgi?id=1084894 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 16:35:15 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 16:35:15 -0000 Subject: SUSE-SU-2024:3549-1: important: Security update for redis7 Message-ID: <172840531512.4252.17099594581716798270@smelt2.prg2.suse.org> # Security update for redis7 Announcement ID: SUSE-SU-2024:3549-1 Release Date: 2024-10-08T14:07:24Z Rating: important References: * bsc#1231264 * bsc#1231265 * bsc#1231266 Cross-References: * CVE-2024-31227 * CVE-2024-31228 * CVE-2024-31449 CVSS scores: * CVE-2024-31227 ( SUSE ): 4.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2024-31227 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31228 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31228 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31449 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-31449 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for redis7 fixes the following issues: * CVE-2024-31227: Fixed parsing issue leading to denail of service (bsc#1231266) * CVE-2024-31228: Fixed unbounded recursive pattern matching (bsc#1231265) * CVE-2024-31449: Fixed integer overflow bug in Lua bit_tohex (bsc#1231264) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3549=1 SUSE-2024-3549=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3549=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * redis7-7.0.8-150500.3.12.1 * redis7-debugsource-7.0.8-150500.3.12.1 * redis7-debuginfo-7.0.8-150500.3.12.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * redis7-7.0.8-150500.3.12.1 * redis7-debugsource-7.0.8-150500.3.12.1 * redis7-debuginfo-7.0.8-150500.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2024-31227.html * https://www.suse.com/security/cve/CVE-2024-31228.html * https://www.suse.com/security/cve/CVE-2024-31449.html * https://bugzilla.suse.com/show_bug.cgi?id=1231264 * https://bugzilla.suse.com/show_bug.cgi?id=1231265 * https://bugzilla.suse.com/show_bug.cgi?id=1231266 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 16:35:22 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 16:35:22 -0000 Subject: SUSE-SU-2024:3548-1: moderate: Security update for Mesa Message-ID: <172840532258.4252.10215143108350672505@smelt2.prg2.suse.org> # Security update for Mesa Announcement ID: SUSE-SU-2024:3548-1 Release Date: 2024-10-08T14:07:13Z Rating: moderate References: * bsc#1222040 * bsc#1222041 * bsc#1222042 Cross-References: * CVE-2023-45913 * CVE-2023-45919 * CVE-2023-45922 CVSS scores: * CVE-2023-45913 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-45919 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H * CVE-2023-45922 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for Mesa fixes the following issues: * CVE-2023-45913: Fixed NULL pointer dereference via dri2GetGlxDrawableFromXDrawableId() (bsc#1222040) * CVE-2023-45919: Fixed buffer over-read in glXQueryServerString() (bsc#1222041) * CVE-2023-45922: Fixed segmentation violation in __glXGetDrawableAttribute() (bsc#1222042) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3548=1 SUSE-2024-3548=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3548=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3548=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3548=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3548=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3548=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3548=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3548=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * Mesa-libglapi-devel-22.3.5-150500.77.5.1 * libOSMesa8-debuginfo-22.3.5-150500.77.5.1 * libgbm1-22.3.5-150500.77.5.1 * Mesa-debugsource-22.3.5-150500.77.5.1 * Mesa-libEGL1-22.3.5-150500.77.5.1 * libOSMesa-devel-22.3.5-150500.77.5.1 * Mesa-libGL-devel-22.3.5-150500.77.5.1 * Mesa-22.3.5-150500.77.5.1 * Mesa-libGLESv3-devel-22.3.5-150500.77.5.1 * Mesa-drivers-debugsource-22.3.5-150500.77.5.1 * libgbm-devel-22.3.5-150500.77.5.1 * libgbm1-debuginfo-22.3.5-150500.77.5.1 * Mesa-devel-22.3.5-150500.77.5.1 * Mesa-libGL1-22.3.5-150500.77.5.1 * Mesa-libGL1-debuginfo-22.3.5-150500.77.5.1 * Mesa-libGLESv1_CM-devel-22.3.5-150500.77.5.1 * Mesa-libglapi0-debuginfo-22.3.5-150500.77.5.1 * Mesa-libEGL1-debuginfo-22.3.5-150500.77.5.1 * Mesa-KHR-devel-22.3.5-150500.77.5.1 * Mesa-libglapi0-22.3.5-150500.77.5.1 * Mesa-libGLESv2-devel-22.3.5-150500.77.5.1 * Mesa-dri-devel-22.3.5-150500.77.5.1 * Mesa-dri-debuginfo-22.3.5-150500.77.5.1 * Mesa-dri-22.3.5-150500.77.5.1 * libOSMesa8-22.3.5-150500.77.5.1 * Mesa-libEGL-devel-22.3.5-150500.77.5.1 * openSUSE Leap 15.5 (x86_64) * Mesa-dri-32bit-22.3.5-150500.77.5.1 * libOSMesa8-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-dri-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-vulkan-overlay-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libd3d-32bit-22.3.5-150500.77.5.1 * Mesa-libEGL1-32bit-22.3.5-150500.77.5.1 * libgbm-devel-32bit-22.3.5-150500.77.5.1 * libvulkan_intel-32bit-22.3.5-150500.77.5.1 * Mesa-libGLESv2-devel-32bit-22.3.5-150500.77.5.1 * Mesa-libd3d-32bit-debuginfo-22.3.5-150500.77.5.1 * libvulkan_radeon-32bit-22.3.5-150500.77.5.1 * Mesa-libglapi-devel-32bit-22.3.5-150500.77.5.1 * libvulkan_intel-32bit-debuginfo-22.3.5-150500.77.5.1 * libvdpau_r300-32bit-22.3.5-150500.77.5.1 * Mesa-vulkan-device-select-32bit-debuginfo-22.3.5-150500.77.5.1 * libOSMesa8-32bit-22.3.5-150500.77.5.1 * Mesa-32bit-22.3.5-150500.77.5.1 * libgbm1-32bit-22.3.5-150500.77.5.1 * libvdpau_r600-32bit-debuginfo-22.3.5-150500.77.5.1 * libvdpau_virtio_gpu-32bit-22.3.5-150500.77.5.1 * libvdpau_virtio_gpu-32bit-debuginfo-22.3.5-150500.77.5.1 * libOSMesa-devel-32bit-22.3.5-150500.77.5.1 * libvulkan_radeon-32bit-debuginfo-22.3.5-150500.77.5.1 * libvdpau_radeonsi-32bit-22.3.5-150500.77.5.1 * Mesa-libglapi0-32bit-22.3.5-150500.77.5.1 * libgbm1-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libd3d-devel-32bit-22.3.5-150500.77.5.1 * Mesa-libEGL-devel-32bit-22.3.5-150500.77.5.1 * libvdpau_radeonsi-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-vulkan-overlay-32bit-22.3.5-150500.77.5.1 * libvdpau_r600-32bit-22.3.5-150500.77.5.1 * Mesa-libEGL1-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libGL1-32bit-22.3.5-150500.77.5.1 * libvdpau_r300-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-gallium-32bit-22.3.5-150500.77.5.1 * Mesa-dri-nouveau-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-gallium-32bit-debuginfo-22.3.5-150500.77.5.1 * libvdpau_nouveau-32bit-22.3.5-150500.77.5.1 * Mesa-libGLESv1_CM-devel-32bit-22.3.5-150500.77.5.1 * Mesa-vulkan-device-select-32bit-22.3.5-150500.77.5.1 * Mesa-dri-nouveau-32bit-22.3.5-150500.77.5.1 * Mesa-libGL1-32bit-debuginfo-22.3.5-150500.77.5.1 * libvdpau_nouveau-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libglapi0-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libGL-devel-32bit-22.3.5-150500.77.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64 i586) * libvdpau_r300-22.3.5-150500.77.5.1 * libvdpau_nouveau-22.3.5-150500.77.5.1 * libxatracker2-1.0.0-150500.77.5.1 * Mesa-gallium-22.3.5-150500.77.5.1 * Mesa-dri-nouveau-22.3.5-150500.77.5.1 * libvdpau_radeonsi-22.3.5-150500.77.5.1 * libvdpau_virtio_gpu-22.3.5-150500.77.5.1 * libvdpau_radeonsi-debuginfo-22.3.5-150500.77.5.1 * Mesa-gallium-debuginfo-22.3.5-150500.77.5.1 * Mesa-libva-debuginfo-22.3.5-150500.77.5.1 * libxatracker2-debuginfo-1.0.0-150500.77.5.1 * libvdpau_r600-debuginfo-22.3.5-150500.77.5.1 * libvdpau_nouveau-debuginfo-22.3.5-150500.77.5.1 * libvdpau_r600-22.3.5-150500.77.5.1 * libxatracker-devel-1.0.0-150500.77.5.1 * Mesa-libva-22.3.5-150500.77.5.1 * Mesa-libOpenCL-22.3.5-150500.77.5.1 * Mesa-dri-nouveau-debuginfo-22.3.5-150500.77.5.1 * Mesa-libOpenCL-debuginfo-22.3.5-150500.77.5.1 * libvdpau_virtio_gpu-debuginfo-22.3.5-150500.77.5.1 * libvdpau_r300-debuginfo-22.3.5-150500.77.5.1 * openSUSE Leap 15.5 (aarch64 x86_64 i586) * Mesa-vulkan-device-select-debuginfo-22.3.5-150500.77.5.1 * Mesa-vulkan-overlay-22.3.5-150500.77.5.1 * libvulkan_lvp-22.3.5-150500.77.5.1 * libvulkan_radeon-22.3.5-150500.77.5.1 * libvulkan_radeon-debuginfo-22.3.5-150500.77.5.1 * Mesa-libd3d-debuginfo-22.3.5-150500.77.5.1 * Mesa-libd3d-devel-22.3.5-150500.77.5.1 * libvulkan_lvp-debuginfo-22.3.5-150500.77.5.1 * Mesa-libd3d-22.3.5-150500.77.5.1 * Mesa-vulkan-overlay-debuginfo-22.3.5-150500.77.5.1 * Mesa-vulkan-device-select-22.3.5-150500.77.5.1 * openSUSE Leap 15.5 (x86_64 i586) * libvulkan_intel-debuginfo-22.3.5-150500.77.5.1 * libvulkan_intel-22.3.5-150500.77.5.1 * openSUSE Leap 15.5 (aarch64_ilp32) * Mesa-libglapi0-64bit-debuginfo-22.3.5-150500.77.5.1 * libvdpau_virtio_gpu-64bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libEGL1-64bit-debuginfo-22.3.5-150500.77.5.1 * libgbm-devel-64bit-22.3.5-150500.77.5.1 * Mesa-libGL-devel-64bit-22.3.5-150500.77.5.1 * libgbm1-64bit-22.3.5-150500.77.5.1 * libvdpau_r300-64bit-22.3.5-150500.77.5.1 * libvdpau_radeonsi-64bit-debuginfo-22.3.5-150500.77.5.1 * libOSMesa8-64bit-22.3.5-150500.77.5.1 * libOSMesa8-64bit-debuginfo-22.3.5-150500.77.5.1 * libgbm1-64bit-debuginfo-22.3.5-150500.77.5.1 * libvdpau_r300-64bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libGLESv1_CM-devel-64bit-22.3.5-150500.77.5.1 * Mesa-libGL1-64bit-22.3.5-150500.77.5.1 * Mesa-gallium-64bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-vulkan-overlay-64bit-22.3.5-150500.77.5.1 * libvdpau_nouveau-64bit-22.3.5-150500.77.5.1 * Mesa-gallium-64bit-22.3.5-150500.77.5.1 * Mesa-libd3d-devel-64bit-22.3.5-150500.77.5.1 * Mesa-vulkan-device-select-64bit-22.3.5-150500.77.5.1 * Mesa-vulkan-device-select-64bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libd3d-64bit-22.3.5-150500.77.5.1 * libvdpau_nouveau-64bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-dri-vc4-64bit-debuginfo-22.3.5-150500.77.5.1 * libOSMesa-devel-64bit-22.3.5-150500.77.5.1 * Mesa-libGL1-64bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-dri-vc4-64bit-22.3.5-150500.77.5.1 * Mesa-libEGL-devel-64bit-22.3.5-150500.77.5.1 * Mesa-libd3d-64bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-dri-64bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-dri-nouveau-64bit-22.3.5-150500.77.5.1 * Mesa-64bit-22.3.5-150500.77.5.1 * Mesa-libEGL1-64bit-22.3.5-150500.77.5.1 * Mesa-libglapi-devel-64bit-22.3.5-150500.77.5.1 * Mesa-dri-nouveau-64bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libGLESv2-devel-64bit-22.3.5-150500.77.5.1 * Mesa-libglapi0-64bit-22.3.5-150500.77.5.1 * Mesa-vulkan-overlay-64bit-debuginfo-22.3.5-150500.77.5.1 * libvdpau_r600-64bit-22.3.5-150500.77.5.1 * libvdpau_r600-64bit-debuginfo-22.3.5-150500.77.5.1 * libvdpau_radeonsi-64bit-22.3.5-150500.77.5.1 * libvulkan_radeon-64bit-debuginfo-22.3.5-150500.77.5.1 * libvulkan_radeon-64bit-22.3.5-150500.77.5.1 * libvdpau_virtio_gpu-64bit-22.3.5-150500.77.5.1 * Mesa-dri-64bit-22.3.5-150500.77.5.1 * openSUSE Leap 15.5 (aarch64) * libvulkan_broadcom-debuginfo-22.3.5-150500.77.5.1 * libvulkan_freedreno-22.3.5-150500.77.5.1 * Mesa-dri-vc4-22.3.5-150500.77.5.1 * libvulkan_broadcom-22.3.5-150500.77.5.1 * libvulkan_freedreno-debuginfo-22.3.5-150500.77.5.1 * Mesa-dri-vc4-debuginfo-22.3.5-150500.77.5.1 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * Mesa-22.3.5-150500.77.5.1 * Mesa-libGL1-22.3.5-150500.77.5.1 * Mesa-libGL1-debuginfo-22.3.5-150500.77.5.1 * Mesa-libglapi0-22.3.5-150500.77.5.1 * Mesa-drivers-debugsource-22.3.5-150500.77.5.1 * libgbm1-debuginfo-22.3.5-150500.77.5.1 * libgbm1-22.3.5-150500.77.5.1 * Mesa-debugsource-22.3.5-150500.77.5.1 * Mesa-libEGL1-22.3.5-150500.77.5.1 * Mesa-dri-debuginfo-22.3.5-150500.77.5.1 * Mesa-libglapi0-debuginfo-22.3.5-150500.77.5.1 * Mesa-libEGL1-debuginfo-22.3.5-150500.77.5.1 * Mesa-dri-22.3.5-150500.77.5.1 * openSUSE Leap Micro 5.5 (aarch64 x86_64) * Mesa-gallium-22.3.5-150500.77.5.1 * Mesa-gallium-debuginfo-22.3.5-150500.77.5.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * Mesa-22.3.5-150500.77.5.1 * Mesa-libGL1-22.3.5-150500.77.5.1 * Mesa-libGL1-debuginfo-22.3.5-150500.77.5.1 * Mesa-libglapi0-22.3.5-150500.77.5.1 * Mesa-drivers-debugsource-22.3.5-150500.77.5.1 * libgbm1-debuginfo-22.3.5-150500.77.5.1 * libgbm1-22.3.5-150500.77.5.1 * Mesa-debugsource-22.3.5-150500.77.5.1 * Mesa-libEGL1-22.3.5-150500.77.5.1 * Mesa-dri-debuginfo-22.3.5-150500.77.5.1 * Mesa-libglapi0-debuginfo-22.3.5-150500.77.5.1 * Mesa-libEGL1-debuginfo-22.3.5-150500.77.5.1 * Mesa-dri-22.3.5-150500.77.5.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le x86_64) * Mesa-gallium-22.3.5-150500.77.5.1 * Mesa-gallium-debuginfo-22.3.5-150500.77.5.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * Mesa-libglapi-devel-22.3.5-150500.77.5.1 * libOSMesa8-debuginfo-22.3.5-150500.77.5.1 * libgbm1-22.3.5-150500.77.5.1 * Mesa-debugsource-22.3.5-150500.77.5.1 * Mesa-libEGL1-22.3.5-150500.77.5.1 * libOSMesa-devel-22.3.5-150500.77.5.1 * Mesa-libGL-devel-22.3.5-150500.77.5.1 * Mesa-22.3.5-150500.77.5.1 * Mesa-libGLESv3-devel-22.3.5-150500.77.5.1 * Mesa-drivers-debugsource-22.3.5-150500.77.5.1 * libgbm-devel-22.3.5-150500.77.5.1 * libgbm1-debuginfo-22.3.5-150500.77.5.1 * libOSMesa8-22.3.5-150500.77.5.1 * Mesa-devel-22.3.5-150500.77.5.1 * Mesa-libGL1-22.3.5-150500.77.5.1 * Mesa-libGL1-debuginfo-22.3.5-150500.77.5.1 * Mesa-libGLESv1_CM-devel-22.3.5-150500.77.5.1 * Mesa-libglapi0-debuginfo-22.3.5-150500.77.5.1 * Mesa-libEGL1-debuginfo-22.3.5-150500.77.5.1 * Mesa-KHR-devel-22.3.5-150500.77.5.1 * Mesa-libglapi0-22.3.5-150500.77.5.1 * Mesa-libGLESv2-devel-22.3.5-150500.77.5.1 * Mesa-dri-devel-22.3.5-150500.77.5.1 * Mesa-dri-debuginfo-22.3.5-150500.77.5.1 * Mesa-dri-22.3.5-150500.77.5.1 * Mesa-libEGL-devel-22.3.5-150500.77.5.1 * Basesystem Module 15-SP5 (aarch64 ppc64le x86_64) * libvdpau_r600-22.3.5-150500.77.5.1 * Mesa-libva-22.3.5-150500.77.5.1 * libvdpau_r300-22.3.5-150500.77.5.1 * libvdpau_virtio_gpu-22.3.5-150500.77.5.1 * libxatracker2-1.0.0-150500.77.5.1 * Mesa-gallium-debuginfo-22.3.5-150500.77.5.1 * Mesa-gallium-22.3.5-150500.77.5.1 * Mesa-libva-debuginfo-22.3.5-150500.77.5.1 * libvdpau_virtio_gpu-debuginfo-22.3.5-150500.77.5.1 * libxatracker2-debuginfo-1.0.0-150500.77.5.1 * libxatracker-devel-1.0.0-150500.77.5.1 * libvdpau_r300-debuginfo-22.3.5-150500.77.5.1 * libvdpau_r600-debuginfo-22.3.5-150500.77.5.1 * Basesystem Module 15-SP5 (aarch64 x86_64) * Mesa-vulkan-device-select-debuginfo-22.3.5-150500.77.5.1 * Mesa-vulkan-overlay-22.3.5-150500.77.5.1 * libvulkan_lvp-22.3.5-150500.77.5.1 * libvulkan_radeon-22.3.5-150500.77.5.1 * libvulkan_radeon-debuginfo-22.3.5-150500.77.5.1 * libvulkan_lvp-debuginfo-22.3.5-150500.77.5.1 * Mesa-vulkan-overlay-debuginfo-22.3.5-150500.77.5.1 * Mesa-vulkan-device-select-22.3.5-150500.77.5.1 * Basesystem Module 15-SP5 (x86_64) * libgbm1-32bit-22.3.5-150500.77.5.1 * Mesa-dri-32bit-22.3.5-150500.77.5.1 * libvdpau_radeonsi-22.3.5-150500.77.5.1 * Mesa-dri-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libEGL1-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libGL1-32bit-22.3.5-150500.77.5.1 * Mesa-libEGL1-32bit-22.3.5-150500.77.5.1 * Mesa-gallium-32bit-22.3.5-150500.77.5.1 * libvulkan_intel-22.3.5-150500.77.5.1 * libvdpau_radeonsi-debuginfo-22.3.5-150500.77.5.1 * Mesa-gallium-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libGL1-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-libd3d-debuginfo-22.3.5-150500.77.5.1 * Mesa-libd3d-devel-22.3.5-150500.77.5.1 * Mesa-libglapi0-32bit-22.3.5-150500.77.5.1 * Mesa-libd3d-22.3.5-150500.77.5.1 * Mesa-libglapi0-32bit-debuginfo-22.3.5-150500.77.5.1 * libgbm1-32bit-debuginfo-22.3.5-150500.77.5.1 * libvulkan_intel-debuginfo-22.3.5-150500.77.5.1 * Mesa-32bit-22.3.5-150500.77.5.1 * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64) * libvdpau_r300-debuginfo-22.3.5-150500.77.5.1 * libvdpau_r300-22.3.5-150500.77.5.1 * Mesa-drivers-debugsource-22.3.5-150500.77.5.1 * SUSE Package Hub 15 15-SP5 (x86_64) * libOSMesa8-32bit-debuginfo-22.3.5-150500.77.5.1 * libOSMesa8-32bit-22.3.5-150500.77.5.1 * Mesa-debugsource-22.3.5-150500.77.5.1 * SUSE Package Hub 15 15-SP6 (x86_64) * Mesa-vulkan-device-select-32bit-22.3.5-150500.77.5.1 * libvulkan_radeon-32bit-22.3.5-150500.77.5.1 * libvulkan_intel-32bit-22.3.5-150500.77.5.1 * libvulkan_radeon-32bit-debuginfo-22.3.5-150500.77.5.1 * libvulkan_intel-32bit-debuginfo-22.3.5-150500.77.5.1 * Mesa-vulkan-device-select-32bit-debuginfo-22.3.5-150500.77.5.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * Mesa-drivers-debugsource-22.3.5-150500.77.5.1 * Mesa-dri-nouveau-debuginfo-22.3.5-150500.77.5.1 * libvdpau_nouveau-22.3.5-150500.77.5.1 * Mesa-dri-nouveau-22.3.5-150500.77.5.1 * libvdpau_nouveau-debuginfo-22.3.5-150500.77.5.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45913.html * https://www.suse.com/security/cve/CVE-2023-45919.html * https://www.suse.com/security/cve/CVE-2023-45922.html * https://bugzilla.suse.com/show_bug.cgi?id=1222040 * https://bugzilla.suse.com/show_bug.cgi?id=1222041 * https://bugzilla.suse.com/show_bug.cgi?id=1222042 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 16:35:39 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 16:35:39 -0000 Subject: SUSE-SU-2024:3547-1: important: Security update for the Linux Kernel Message-ID: <172840533941.4252.80684842985714280@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3547-1 Release Date: 2024-10-08T14:06:34Z Rating: important References: * bsc#1216223 * bsc#1223600 * bsc#1223958 * bsc#1225272 * bsc#1227487 * bsc#1228466 * bsc#1229407 * bsc#1229633 * bsc#1229662 * bsc#1229947 * bsc#1230015 * bsc#1230398 * bsc#1230434 * bsc#1230507 * bsc#1230767 * bsc#1231016 Cross-References: * CVE-2022-48911 * CVE-2022-48923 * CVE-2022-48944 * CVE-2022-48945 * CVE-2024-41087 * CVE-2024-42301 * CVE-2024-44946 * CVE-2024-45021 * CVE-2024-46674 * CVE-2024-46774 CVSS scores: * CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48923 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48944 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48944 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 10 vulnerabilities and has six security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). * CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662) * CVE-2024-41087: Fix double free on error (bsc#1228466). * CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe error path (bsc#1230507). The following non-security bugs were fixed: * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * kabi: add __nf_queue_get_refs() for kabi compliance. * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: smartpqi: Expose SAS address for SATA drives (bsc#1223958). * SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272 bsc#1231016). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3547=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3547=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3547=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3547=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3547=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3547=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3547=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3547=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3547=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3547=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3547=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3547=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-3547=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3547=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3547=1 ## Package List: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64) * kernel-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * kernel-default-debugsource-5.14.21-150400.24.136.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.136.1 * kernel-obs-build-5.14.21-150400.24.136.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.136.1 * kernel-syms-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * kernel-obs-build-debugsource-5.14.21-150400.24.136.1 * kernel-default-devel-5.14.21-150400.24.136.1 * kernel-default-extra-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * kernel-source-5.14.21-150400.24.136.1 * kernel-macros-5.14.21-150400.24.136.1 * kernel-devel-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.136.1 * kernel-64kb-devel-5.14.21-150400.24.136.1 * kernel-64kb-debuginfo-5.14.21-150400.24.136.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * kernel-obs-build-5.14.21-150400.24.136.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.136.1 * kernel-syms-5.14.21-150400.24.136.1 * kernel-default-debugsource-5.14.21-150400.24.136.1 * kernel-obs-build-debugsource-5.14.21-150400.24.136.1 * kernel-default-devel-5.14.21-150400.24.136.1 * reiserfs-kmp-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * kernel-source-5.14.21-150400.24.136.1 * kernel-macros-5.14.21-150400.24.136.1 * kernel-devel-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.136.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * kernel-default-debugsource-5.14.21-150400.24.136.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.136.1 * kernel-obs-build-5.14.21-150400.24.136.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.136.1 * kernel-syms-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * kernel-obs-build-debugsource-5.14.21-150400.24.136.1 * kernel-default-devel-5.14.21-150400.24.136.1 * reiserfs-kmp-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.136.1 * kernel-macros-5.14.21-150400.24.136.1 * kernel-devel-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.136.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.136.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * kernel-default-debugsource-5.14.21-150400.24.136.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.136.1 * kernel-syms-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * kernel-default-devel-5.14.21-150400.24.136.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-source-5.14.21-150400.24.136.1 * kernel-macros-5.14.21-150400.24.136.1 * kernel-devel-5.14.21-150400.24.136.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.136.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * kernel-default-debugsource-5.14.21-150400.24.136.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * kernel-default-devel-5.14.21-150400.24.136.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-macros-5.14.21-150400.24.136.1 * kernel-devel-5.14.21-150400.24.136.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.136.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.136.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.136.1 * kernel-syms-5.14.21-150400.24.136.1 * kernel-default-debugsource-5.14.21-150400.24.136.1 * kernel-default-devel-5.14.21-150400.24.136.1 * SUSE Manager Server 4.3 (noarch) * kernel-source-5.14.21-150400.24.136.1 * kernel-macros-5.14.21-150400.24.136.1 * kernel-devel-5.14.21-150400.24.136.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.136.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.136.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (noarch) * kernel-docs-html-5.14.21-150400.24.136.1 * kernel-source-5.14.21-150400.24.136.1 * kernel-macros-5.14.21-150400.24.136.1 * kernel-devel-5.14.21-150400.24.136.1 * kernel-source-vanilla-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-debugsource-5.14.21-150400.24.136.1 * kernel-debug-livepatch-devel-5.14.21-150400.24.136.1 * kernel-debug-devel-5.14.21-150400.24.136.1 * kernel-debug-debuginfo-5.14.21-150400.24.136.1 * kernel-debug-devel-debuginfo-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * kernel-kvmsmall-debugsource-5.14.21-150400.24.136.1 * kernel-kvmsmall-debuginfo-5.14.21-150400.24.136.1 * kernel-kvmsmall-devel-5.14.21-150400.24.136.1 * kernel-default-base-rebuild-5.14.21-150400.24.136.1.150400.24.66.1 * kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.136.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * kselftests-kmp-default-5.14.21-150400.24.136.1 * kernel-obs-qa-5.14.21-150400.24.136.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.136.1 * kernel-syms-5.14.21-150400.24.136.1 * reiserfs-kmp-default-5.14.21-150400.24.136.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.136.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.136.1 * dlm-kmp-default-5.14.21-150400.24.136.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.136.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.136.1 * kernel-obs-build-debugsource-5.14.21-150400.24.136.1 * kernel-default-livepatch-devel-5.14.21-150400.24.136.1 * ocfs2-kmp-default-5.14.21-150400.24.136.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.136.1 * kernel-default-livepatch-5.14.21-150400.24.136.1 * kernel-obs-build-5.14.21-150400.24.136.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.136.1 * kernel-default-debugsource-5.14.21-150400.24.136.1 * kernel-default-devel-5.14.21-150400.24.136.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.136.1 * cluster-md-kmp-default-5.14.21-150400.24.136.1 * kernel-default-extra-5.14.21-150400.24.136.1 * gfs2-kmp-default-5.14.21-150400.24.136.1 * kernel-default-optional-5.14.21-150400.24.136.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_32-debugsource-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_136-default-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-1-150400.9.3.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.136.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (aarch64) * dtb-mediatek-5.14.21-150400.24.136.1 * dtb-sprd-5.14.21-150400.24.136.1 * dtb-qcom-5.14.21-150400.24.136.1 * dtb-broadcom-5.14.21-150400.24.136.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.136.1 * dtb-allwinner-5.14.21-150400.24.136.1 * cluster-md-kmp-64kb-5.14.21-150400.24.136.1 * dtb-altera-5.14.21-150400.24.136.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.136.1 * dtb-arm-5.14.21-150400.24.136.1 * ocfs2-kmp-64kb-5.14.21-150400.24.136.1 * dtb-rockchip-5.14.21-150400.24.136.1 * dtb-apm-5.14.21-150400.24.136.1 * kernel-64kb-debugsource-5.14.21-150400.24.136.1 * dtb-hisilicon-5.14.21-150400.24.136.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.136.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.136.1 * dtb-amlogic-5.14.21-150400.24.136.1 * kernel-64kb-livepatch-devel-5.14.21-150400.24.136.1 * dtb-freescale-5.14.21-150400.24.136.1 * dtb-exynos-5.14.21-150400.24.136.1 * dtb-lg-5.14.21-150400.24.136.1 * kernel-64kb-extra-5.14.21-150400.24.136.1 * dtb-amazon-5.14.21-150400.24.136.1 * kernel-64kb-devel-5.14.21-150400.24.136.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.136.1 * kselftests-kmp-64kb-5.14.21-150400.24.136.1 * dtb-xilinx-5.14.21-150400.24.136.1 * reiserfs-kmp-64kb-5.14.21-150400.24.136.1 * dtb-cavium-5.14.21-150400.24.136.1 * dtb-marvell-5.14.21-150400.24.136.1 * dlm-kmp-64kb-5.14.21-150400.24.136.1 * gfs2-kmp-64kb-5.14.21-150400.24.136.1 * dtb-apple-5.14.21-150400.24.136.1 * dtb-amd-5.14.21-150400.24.136.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.136.1 * dtb-socionext-5.14.21-150400.24.136.1 * dtb-renesas-5.14.21-150400.24.136.1 * kernel-64kb-debuginfo-5.14.21-150400.24.136.1 * dtb-nvidia-5.14.21-150400.24.136.1 * kernel-64kb-optional-5.14.21-150400.24.136.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.136.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.136.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.136.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_136-default-1-150400.9.3.1 * kernel-default-livepatch-5.14.21-150400.24.136.1 * kernel-livepatch-SLE15-SP4_Update_32-debugsource-1-150400.9.3.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * kernel-default-debugsource-5.14.21-150400.24.136.1 * kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-1-150400.9.3.1 * kernel-default-livepatch-devel-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-5.14.21-150400.24.136.1 * kernel-default-debugsource-5.14.21-150400.24.136.1 * ocfs2-kmp-default-5.14.21-150400.24.136.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.136.1 * dlm-kmp-default-5.14.21-150400.24.136.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.136.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.136.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * gfs2-kmp-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.136.1 * kernel-64kb-devel-5.14.21-150400.24.136.1 * kernel-64kb-debuginfo-5.14.21-150400.24.136.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * kernel-default-debugsource-5.14.21-150400.24.136.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.136.1 * kernel-obs-build-5.14.21-150400.24.136.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.136.1 * kernel-syms-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * kernel-obs-build-debugsource-5.14.21-150400.24.136.1 * kernel-default-devel-5.14.21-150400.24.136.1 * reiserfs-kmp-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.136.1 * kernel-macros-5.14.21-150400.24.136.1 * kernel-devel-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.136.1 * kernel-64kb-devel-5.14.21-150400.24.136.1 * kernel-64kb-debuginfo-5.14.21-150400.24.136.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 * kernel-default-debugsource-5.14.21-150400.24.136.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.136.1 * kernel-obs-build-5.14.21-150400.24.136.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.136.1 * kernel-syms-5.14.21-150400.24.136.1 * kernel-default-debuginfo-5.14.21-150400.24.136.1 * kernel-obs-build-debugsource-5.14.21-150400.24.136.1 * kernel-default-devel-5.14.21-150400.24.136.1 * reiserfs-kmp-default-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.136.1 * kernel-macros-5.14.21-150400.24.136.1 * kernel-devel-5.14.21-150400.24.136.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.136.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48911.html * https://www.suse.com/security/cve/CVE-2022-48923.html * https://www.suse.com/security/cve/CVE-2022-48944.html * https://www.suse.com/security/cve/CVE-2022-48945.html * https://www.suse.com/security/cve/CVE-2024-41087.html * https://www.suse.com/security/cve/CVE-2024-42301.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223958 * https://bugzilla.suse.com/show_bug.cgi?id=1225272 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1228466 * https://bugzilla.suse.com/show_bug.cgi?id=1229407 * https://bugzilla.suse.com/show_bug.cgi?id=1229633 * https://bugzilla.suse.com/show_bug.cgi?id=1229662 * https://bugzilla.suse.com/show_bug.cgi?id=1229947 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230398 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 16:35:43 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 16:35:43 -0000 Subject: SUSE-SU-2024:3546-1: moderate: Security update for podman Message-ID: <172840534358.4252.4950788802159184486@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2024:3546-1 Release Date: 2024-10-08T14:04:55Z Rating: moderate References: * bsc#1231230 Cross-References: * CVE-2024-6104 * CVE-2024-9341 CVSS scores: * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9341 ( SUSE ): 5.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9341 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9341 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N Affected Products: * Containers Module 15-SP5 * Containers Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2024-9341: Fixed FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (bsc#1231230) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3546=1 openSUSE-SLE-15.5-2024-3546=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3546=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3546=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3546=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3546=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3546=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * podman-remote-4.9.5-150500.3.18.1 * podman-debuginfo-4.9.5-150500.3.18.1 * podmansh-4.9.5-150500.3.18.1 * podman-4.9.5-150500.3.18.1 * podman-remote-debuginfo-4.9.5-150500.3.18.1 * openSUSE Leap 15.5 (noarch) * podman-docker-4.9.5-150500.3.18.1 * openSUSE Leap Micro 5.5 (aarch64 ppc64le s390x x86_64) * podman-remote-4.9.5-150500.3.18.1 * podman-debuginfo-4.9.5-150500.3.18.1 * podmansh-4.9.5-150500.3.18.1 * podman-4.9.5-150500.3.18.1 * podman-remote-debuginfo-4.9.5-150500.3.18.1 * openSUSE Leap Micro 5.5 (noarch) * podman-docker-4.9.5-150500.3.18.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * podman-remote-4.9.5-150500.3.18.1 * podman-debuginfo-4.9.5-150500.3.18.1 * podmansh-4.9.5-150500.3.18.1 * podman-4.9.5-150500.3.18.1 * podman-remote-debuginfo-4.9.5-150500.3.18.1 * openSUSE Leap 15.6 (noarch) * podman-docker-4.9.5-150500.3.18.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * podman-remote-4.9.5-150500.3.18.1 * podman-debuginfo-4.9.5-150500.3.18.1 * podmansh-4.9.5-150500.3.18.1 * podman-4.9.5-150500.3.18.1 * podman-remote-debuginfo-4.9.5-150500.3.18.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * podman-docker-4.9.5-150500.3.18.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * podman-remote-4.9.5-150500.3.18.1 * podman-debuginfo-4.9.5-150500.3.18.1 * podmansh-4.9.5-150500.3.18.1 * podman-4.9.5-150500.3.18.1 * podman-remote-debuginfo-4.9.5-150500.3.18.1 * Containers Module 15-SP5 (noarch) * podman-docker-4.9.5-150500.3.18.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * podman-remote-4.9.5-150500.3.18.1 * podman-debuginfo-4.9.5-150500.3.18.1 * podmansh-4.9.5-150500.3.18.1 * podman-4.9.5-150500.3.18.1 * podman-remote-debuginfo-4.9.5-150500.3.18.1 * Containers Module 15-SP6 (noarch) * podman-docker-4.9.5-150500.3.18.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2024-9341.html * https://bugzilla.suse.com/show_bug.cgi?id=1231230 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 16:35:46 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 16:35:46 -0000 Subject: SUSE-SU-2024:3545-1: moderate: Security update for buildah Message-ID: <172840534669.4252.2126128640654249062@smelt2.prg2.suse.org> # Security update for buildah Announcement ID: SUSE-SU-2024:3545-1 Release Date: 2024-10-08T14:04:24Z Rating: moderate References: * bsc#1231208 * bsc#1231230 Cross-References: * CVE-2024-9341 * CVE-2024-9407 CVSS scores: * CVE-2024-9341 ( SUSE ): 5.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9341 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9341 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9407 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N Affected Products: * Containers Module 15-SP5 * Containers Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for buildah fixes the following issues: * CVE-2024-9407: Fixed Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (bsc#1231208). * CVE-2024-9341: Fixed FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library in cri-o (nsc#1231230). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3545=1 openSUSE-SLE-15.5-2024-3545=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3545=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3545=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3545=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * buildah-1.35.4-150500.3.13.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * buildah-1.35.4-150500.3.13.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * buildah-1.35.4-150500.3.13.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * buildah-1.35.4-150500.3.13.1 ## References: * https://www.suse.com/security/cve/CVE-2024-9341.html * https://www.suse.com/security/cve/CVE-2024-9407.html * https://bugzilla.suse.com/show_bug.cgi?id=1231208 * https://bugzilla.suse.com/show_bug.cgi?id=1231230 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 16:35:50 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 16:35:50 -0000 Subject: SUSE-SU-2024:3544-1: moderate: Security update for Mesa Message-ID: <172840535093.4252.2557906011448194330@smelt2.prg2.suse.org> # Security update for Mesa Announcement ID: SUSE-SU-2024:3544-1 Release Date: 2024-10-08T14:04:06Z Rating: moderate References: * bsc#1222040 * bsc#1222041 * bsc#1222042 Cross-References: * CVE-2023-45913 * CVE-2023-45919 * CVE-2023-45922 CVSS scores: * CVE-2023-45913 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-45919 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H * CVE-2023-45922 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for Mesa fixes the following issues: * CVE-2023-45919: Fixed buffer over-read in glXQueryServerString() (bsc#1222041). * CVE-2023-45913: Fixed NULL pointer dereference via dri2GetGlxDrawableFromXDrawableId() (bsc#1222040). * CVE-2023-45922: Fixed segmentation violation in __glXGetDrawableAttribute() (bsc#CVE-2023-45922). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3544=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3544=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3544=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3544=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3544=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3544=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3544=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3544=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3544=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * Mesa-libGLESv1_CM-devel-21.2.4-150400.68.15.1 * Mesa-KHR-devel-21.2.4-150400.68.15.1 * libOSMesa8-debuginfo-21.2.4-150400.68.15.1 * Mesa-libEGL1-21.2.4-150400.68.15.1 * libgbm-devel-21.2.4-150400.68.15.1 * Mesa-libglapi0-21.2.4-150400.68.15.1 * Mesa-libGLESv3-devel-21.2.4-150400.68.15.1 * Mesa-libGL1-21.2.4-150400.68.15.1 * Mesa-devel-21.2.4-150400.68.15.1 * Mesa-dri-debuginfo-21.2.4-150400.68.15.1 * libgbm1-debuginfo-21.2.4-150400.68.15.1 * Mesa-libEGL1-debuginfo-21.2.4-150400.68.15.1 * Mesa-libGL1-debuginfo-21.2.4-150400.68.15.1 * libOSMesa8-21.2.4-150400.68.15.1 * Mesa-libglapi0-debuginfo-21.2.4-150400.68.15.1 * Mesa-libGLESv2-devel-21.2.4-150400.68.15.1 * Mesa-21.2.4-150400.68.15.1 * Mesa-libGL-devel-21.2.4-150400.68.15.1 * Mesa-dri-devel-21.2.4-150400.68.15.1 * libOSMesa-devel-21.2.4-150400.68.15.1 * Mesa-dri-21.2.4-150400.68.15.1 * Mesa-libglapi-devel-21.2.4-150400.68.15.1 * Mesa-drivers-debugsource-21.2.4-150400.68.15.1 * Mesa-libEGL-devel-21.2.4-150400.68.15.1 * libgbm1-21.2.4-150400.68.15.1 * Mesa-debugsource-21.2.4-150400.68.15.1 * openSUSE Leap 15.4 (x86_64) * libvulkan_intel-32bit-21.2.4-150400.68.15.1 * Mesa-vulkan-overlay-32bit-21.2.4-150400.68.15.1 * libgbm-devel-32bit-21.2.4-150400.68.15.1 * libgbm1-32bit-debuginfo-21.2.4-150400.68.15.1 * libvulkan_radeon-32bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-dri-32bit-21.2.4-150400.68.15.1 * libvdpau_radeonsi-32bit-21.2.4-150400.68.15.1 * libgbm1-32bit-21.2.4-150400.68.15.1 * libXvMC_nouveau-32bit-21.2.4-150400.68.15.1 * Mesa-libGL-devel-32bit-21.2.4-150400.68.15.1 * Mesa-libd3d-devel-32bit-21.2.4-150400.68.15.1 * Mesa-libglapi-devel-32bit-21.2.4-150400.68.15.1 * Mesa-libGLESv2-devel-32bit-21.2.4-150400.68.15.1 * Mesa-dri-32bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-libGLESv1_CM-devel-32bit-21.2.4-150400.68.15.1 * libXvMC_nouveau-32bit-debuginfo-21.2.4-150400.68.15.1 * libvulkan_radeon-32bit-21.2.4-150400.68.15.1 * Mesa-libd3d-32bit-21.2.4-150400.68.15.1 * Mesa-libGL1-32bit-21.2.4-150400.68.15.1 * Mesa-libglapi0-32bit-debuginfo-21.2.4-150400.68.15.1 * libvdpau_r600-32bit-debuginfo-21.2.4-150400.68.15.1 * libvdpau_radeonsi-32bit-debuginfo-21.2.4-150400.68.15.1 * libvdpau_r600-32bit-21.2.4-150400.68.15.1 * Mesa-vulkan-overlay-32bit-debuginfo-21.2.4-150400.68.15.1 * libvdpau_nouveau-32bit-debuginfo-21.2.4-150400.68.15.1 * libOSMesa-devel-32bit-21.2.4-150400.68.15.1 * libOSMesa8-32bit-21.2.4-150400.68.15.1 * Mesa-dri-nouveau-32bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-32bit-21.2.4-150400.68.15.1 * libvdpau_r300-32bit-debuginfo-21.2.4-150400.68.15.1 * libvdpau_r300-32bit-21.2.4-150400.68.15.1 * Mesa-libEGL1-32bit-21.2.4-150400.68.15.1 * Mesa-libGL1-32bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-libglapi0-32bit-21.2.4-150400.68.15.1 * Mesa-gallium-32bit-21.2.4-150400.68.15.1 * Mesa-libEGL-devel-32bit-21.2.4-150400.68.15.1 * Mesa-dri-nouveau-32bit-21.2.4-150400.68.15.1 * Mesa-vulkan-device-select-32bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-vulkan-device-select-32bit-21.2.4-150400.68.15.1 * libvdpau_nouveau-32bit-21.2.4-150400.68.15.1 * Mesa-gallium-32bit-debuginfo-21.2.4-150400.68.15.1 * libXvMC_r600-32bit-21.2.4-150400.68.15.1 * libvulkan_intel-32bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-libEGL1-32bit-debuginfo-21.2.4-150400.68.15.1 * libOSMesa8-32bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-libd3d-32bit-debuginfo-21.2.4-150400.68.15.1 * libXvMC_r600-32bit-debuginfo-21.2.4-150400.68.15.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64 i586) * libvdpau_nouveau-debuginfo-21.2.4-150400.68.15.1 * libvdpau_r300-21.2.4-150400.68.15.1 * libvdpau_radeonsi-21.2.4-150400.68.15.1 * Mesa-libva-debuginfo-21.2.4-150400.68.15.1 * libvdpau_r600-debuginfo-21.2.4-150400.68.15.1 * libXvMC_nouveau-debuginfo-21.2.4-150400.68.15.1 * libvdpau_r600-21.2.4-150400.68.15.1 * libvdpau_r300-debuginfo-21.2.4-150400.68.15.1 * libXvMC_r600-21.2.4-150400.68.15.1 * libvdpau_radeonsi-debuginfo-21.2.4-150400.68.15.1 * libXvMC_nouveau-21.2.4-150400.68.15.1 * Mesa-libOpenCL-21.2.4-150400.68.15.1 * libxatracker2-debuginfo-1.0.0-150400.68.15.1 * libXvMC_r600-debuginfo-21.2.4-150400.68.15.1 * Mesa-libva-21.2.4-150400.68.15.1 * Mesa-dri-nouveau-21.2.4-150400.68.15.1 * Mesa-libOpenCL-debuginfo-21.2.4-150400.68.15.1 * libxatracker2-1.0.0-150400.68.15.1 * Mesa-gallium-debuginfo-21.2.4-150400.68.15.1 * libxatracker-devel-1.0.0-150400.68.15.1 * Mesa-gallium-21.2.4-150400.68.15.1 * Mesa-dri-nouveau-debuginfo-21.2.4-150400.68.15.1 * libvdpau_nouveau-21.2.4-150400.68.15.1 * openSUSE Leap 15.4 (aarch64 x86_64 i586) * libvulkan_lvp-21.2.4-150400.68.15.1 * Mesa-libVulkan-devel-21.2.4-150400.68.15.1 * Mesa-vulkan-overlay-21.2.4-150400.68.15.1 * Mesa-libd3d-devel-21.2.4-150400.68.15.1 * Mesa-vulkan-overlay-debuginfo-21.2.4-150400.68.15.1 * libvulkan_lvp-debuginfo-21.2.4-150400.68.15.1 * Mesa-libd3d-debuginfo-21.2.4-150400.68.15.1 * libvulkan_radeon-debuginfo-21.2.4-150400.68.15.1 * Mesa-vulkan-device-select-21.2.4-150400.68.15.1 * Mesa-libd3d-21.2.4-150400.68.15.1 * libvulkan_radeon-21.2.4-150400.68.15.1 * Mesa-vulkan-device-select-debuginfo-21.2.4-150400.68.15.1 * openSUSE Leap 15.4 (x86_64 i586) * libvulkan_intel-21.2.4-150400.68.15.1 * libvulkan_intel-debuginfo-21.2.4-150400.68.15.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libXvMC_nouveau-64bit-21.2.4-150400.68.15.1 * libvdpau_radeonsi-64bit-21.2.4-150400.68.15.1 * libvdpau_r600-64bit-21.2.4-150400.68.15.1 * libOSMesa8-64bit-21.2.4-150400.68.15.1 * Mesa-libEGL-devel-64bit-21.2.4-150400.68.15.1 * Mesa-64bit-21.2.4-150400.68.15.1 * Mesa-libglapi0-64bit-debuginfo-21.2.4-150400.68.15.1 * libXvMC_r600-64bit-21.2.4-150400.68.15.1 * libvdpau_r300-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-libGLESv1_CM-devel-64bit-21.2.4-150400.68.15.1 * libvdpau_nouveau-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-libGL-devel-64bit-21.2.4-150400.68.15.1 * libvdpau_radeonsi-64bit-debuginfo-21.2.4-150400.68.15.1 * libvulkan_radeon-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-libd3d-devel-64bit-21.2.4-150400.68.15.1 * libXvMC_r600-64bit-debuginfo-21.2.4-150400.68.15.1 * libgbm-devel-64bit-21.2.4-150400.68.15.1 * libgbm1-64bit-21.2.4-150400.68.15.1 * Mesa-dri-vc4-64bit-21.2.4-150400.68.15.1 * Mesa-dri-vc4-64bit-debuginfo-21.2.4-150400.68.15.1 * libvdpau_r600-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-libGL1-64bit-21.2.4-150400.68.15.1 * libOSMesa-devel-64bit-21.2.4-150400.68.15.1 * Mesa-libGLESv2-devel-64bit-21.2.4-150400.68.15.1 * libOSMesa8-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-libGL1-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-libglapi-devel-64bit-21.2.4-150400.68.15.1 * Mesa-libEGL1-64bit-21.2.4-150400.68.15.1 * Mesa-libglapi0-64bit-21.2.4-150400.68.15.1 * libvulkan_radeon-64bit-21.2.4-150400.68.15.1 * Mesa-dri-64bit-21.2.4-150400.68.15.1 * libvdpau_r300-64bit-21.2.4-150400.68.15.1 * Mesa-dri-nouveau-64bit-21.2.4-150400.68.15.1 * Mesa-libEGL1-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-vulkan-overlay-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-dri-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-vulkan-device-select-64bit-21.2.4-150400.68.15.1 * Mesa-dri-nouveau-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-gallium-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-vulkan-device-select-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-libd3d-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-vulkan-overlay-64bit-21.2.4-150400.68.15.1 * libgbm1-64bit-debuginfo-21.2.4-150400.68.15.1 * Mesa-libd3d-64bit-21.2.4-150400.68.15.1 * libvdpau_nouveau-64bit-21.2.4-150400.68.15.1 * Mesa-gallium-64bit-21.2.4-150400.68.15.1 * libXvMC_nouveau-64bit-debuginfo-21.2.4-150400.68.15.1 * openSUSE Leap 15.4 (aarch64) * libvulkan_freedreno-21.2.4-150400.68.15.1 * libvulkan_broadcom-21.2.4-150400.68.15.1 * Mesa-dri-vc4-21.2.4-150400.68.15.1 * Mesa-dri-vc4-debuginfo-21.2.4-150400.68.15.1 * libvulkan_freedreno-debuginfo-21.2.4-150400.68.15.1 * libvulkan_broadcom-debuginfo-21.2.4-150400.68.15.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libgbm1-debuginfo-21.2.4-150400.68.15.1 * libgbm1-21.2.4-150400.68.15.1 * Mesa-debugsource-21.2.4-150400.68.15.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libgbm1-debuginfo-21.2.4-150400.68.15.1 * libgbm1-21.2.4-150400.68.15.1 * Mesa-debugsource-21.2.4-150400.68.15.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libgbm1-debuginfo-21.2.4-150400.68.15.1 * libgbm1-21.2.4-150400.68.15.1 * Mesa-debugsource-21.2.4-150400.68.15.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libgbm1-debuginfo-21.2.4-150400.68.15.1 * libgbm1-21.2.4-150400.68.15.1 * Mesa-debugsource-21.2.4-150400.68.15.1 * Basesystem Module 15-SP5 (x86_64) * Mesa-drivers-debugsource-21.2.4-150400.68.15.1 * Mesa-libVulkan-devel-21.2.4-150400.68.15.1 * Basesystem Module 15-SP6 (x86_64) * Mesa-drivers-debugsource-21.2.4-150400.68.15.1 * Mesa-libVulkan-devel-21.2.4-150400.68.15.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * Mesa-drivers-debugsource-21.2.4-150400.68.15.1 * libXvMC_nouveau-debuginfo-21.2.4-150400.68.15.1 * libXvMC_nouveau-21.2.4-150400.68.15.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * Mesa-drivers-debugsource-21.2.4-150400.68.15.1 * libXvMC_nouveau-debuginfo-21.2.4-150400.68.15.1 * libXvMC_nouveau-21.2.4-150400.68.15.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45913.html * https://www.suse.com/security/cve/CVE-2023-45919.html * https://www.suse.com/security/cve/CVE-2023-45922.html * https://bugzilla.suse.com/show_bug.cgi?id=1222040 * https://bugzilla.suse.com/show_bug.cgi?id=1222041 * https://bugzilla.suse.com/show_bug.cgi?id=1222042 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 8 16:35:53 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 08 Oct 2024 16:35:53 -0000 Subject: SUSE-SU-2024:3543-1: moderate: Security update for json-lib Message-ID: <172840535352.4252.8650985350269401138@smelt2.prg2.suse.org> # Security update for json-lib Announcement ID: SUSE-SU-2024:3543-1 Release Date: 2024-10-08T13:33:40Z Rating: moderate References: * bsc#1231295 Cross-References: * CVE-2024-47855 CVSS scores: * CVE-2024-47855 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47855 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for json-lib fixes the following issues: * CVE-2024-47855: Fixed mishandled unbalanced comment string (bsc#1231295) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3543=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3543=1 ## Package List: * openSUSE Leap 15.5 (noarch) * jenkins-json-lib-2.4-150200.3.7.1 * json-lib-2.4-150200.3.7.1 * json-lib-javadoc-2.4-150200.3.7.1 * openSUSE Leap 15.6 (noarch) * jenkins-json-lib-2.4-150200.3.7.1 * json-lib-2.4-150200.3.7.1 * json-lib-javadoc-2.4-150200.3.7.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47855.html * https://bugzilla.suse.com/show_bug.cgi?id=1231295 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 08:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 08:30:07 -0000 Subject: SUSE-SU-2024:3558-1: low: Security update for qatlib Message-ID: <172846260738.12150.11674783971348429049@smelt2.prg2.suse.org> # Security update for qatlib Announcement ID: SUSE-SU-2024:3558-1 Release Date: 2024-10-09T07:26:05Z Rating: low References: * bsc#1217158 Cross-References: * CVE-2023-22313 CVSS scores: * CVE-2023-22313 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2023-22313 ( NVD ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.4 An update that solves one vulnerability can now be installed. ## Description: This update for qatlib fixes the following issues: * CVE-2023-22313: Fixed a local information disclosure due to improper buffer restrictions (bsc#1217158). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3558=1 ## Package List: * openSUSE Leap 15.4 (x86_64) * qatlib-debugsource-21.08.0-150400.3.3.3 * qatlib-debuginfo-21.08.0-150400.3.3.3 * qatlib-devel-21.08.0-150400.3.3.3 * qatlib-21.08.0-150400.3.3.3 ## References: * https://www.suse.com/security/cve/CVE-2023-22313.html * https://bugzilla.suse.com/show_bug.cgi?id=1217158 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 08:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 08:30:10 -0000 Subject: SUSE-RU-2024:3557-1: moderate: Recommended update for s390-tools Message-ID: <172846261090.12150.2897829475142874863@smelt2.prg2.suse.org> # Recommended update for s390-tools Announcement ID: SUSE-RU-2024:3557-1 Release Date: 2024-10-09T06:50:06Z Rating: moderate References: * bsc#1231003 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for s390-tools fixes the following issue: * ziomon/ziorep_config: fix warning when multipath device is not there (bsc#1231003). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3557=1 openSUSE-SLE-15.5-2024-3557=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3557=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3557=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3557=1 ## Package List: * openSUSE Leap 15.5 (s390x x86_64) * s390-tools-2.31.0-150500.9.25.2 * s390-tools-debuginfo-2.31.0-150500.9.25.2 * s390-tools-debugsource-2.31.0-150500.9.25.2 * openSUSE Leap 15.5 (s390x) * libkmipclient1-2.31.0-150500.9.25.2 * libekmfweb1-debuginfo-2.31.0-150500.9.25.2 * s390-tools-hmcdrvfs-debuginfo-2.31.0-150500.9.25.2 * libkmipclient1-debuginfo-2.31.0-150500.9.25.2 * s390-tools-hmcdrvfs-2.31.0-150500.9.25.2 * s390-tools-chreipl-fcp-mpath-2.31.0-150500.9.25.2 * s390-tools-zdsfs-2.31.0-150500.9.25.2 * libekmfweb1-2.31.0-150500.9.25.2 * s390-tools-zdsfs-debuginfo-2.31.0-150500.9.25.2 * osasnmpd-2.31.0-150500.9.25.2 * libkmipclient1-devel-2.31.0-150500.9.25.2 * libekmfweb1-devel-2.31.0-150500.9.25.2 * osasnmpd-debuginfo-2.31.0-150500.9.25.2 * openSUSE Leap 15.5 (noarch) * s390-tools-genprotimg-data-2.31.0-150500.9.25.2 * openSUSE Leap Micro 5.5 (s390x x86_64) * s390-tools-2.31.0-150500.9.25.2 * s390-tools-debuginfo-2.31.0-150500.9.25.2 * s390-tools-debugsource-2.31.0-150500.9.25.2 * openSUSE Leap Micro 5.5 (s390x) * libekmfweb1-2.31.0-150500.9.25.2 * libekmfweb1-debuginfo-2.31.0-150500.9.25.2 * libkmipclient1-debuginfo-2.31.0-150500.9.25.2 * libkmipclient1-2.31.0-150500.9.25.2 * openSUSE Leap Micro 5.5 (noarch) * s390-tools-genprotimg-data-2.31.0-150500.9.25.2 * SUSE Linux Enterprise Micro 5.5 (s390x) * libekmfweb1-2.31.0-150500.9.25.2 * libekmfweb1-debuginfo-2.31.0-150500.9.25.2 * libkmipclient1-debuginfo-2.31.0-150500.9.25.2 * libkmipclient1-2.31.0-150500.9.25.2 * SUSE Linux Enterprise Micro 5.5 (s390x x86_64) * s390-tools-2.31.0-150500.9.25.2 * s390-tools-debuginfo-2.31.0-150500.9.25.2 * s390-tools-debugsource-2.31.0-150500.9.25.2 * SUSE Linux Enterprise Micro 5.5 (noarch) * s390-tools-genprotimg-data-2.31.0-150500.9.25.2 * Basesystem Module 15-SP5 (s390x) * libkmipclient1-2.31.0-150500.9.25.2 * libekmfweb1-debuginfo-2.31.0-150500.9.25.2 * s390-tools-hmcdrvfs-debuginfo-2.31.0-150500.9.25.2 * libkmipclient1-debuginfo-2.31.0-150500.9.25.2 * s390-tools-hmcdrvfs-2.31.0-150500.9.25.2 * s390-tools-chreipl-fcp-mpath-2.31.0-150500.9.25.2 * s390-tools-zdsfs-2.31.0-150500.9.25.2 * libekmfweb1-2.31.0-150500.9.25.2 * s390-tools-zdsfs-debuginfo-2.31.0-150500.9.25.2 * osasnmpd-2.31.0-150500.9.25.2 * osasnmpd-debuginfo-2.31.0-150500.9.25.2 * libekmfweb1-devel-2.31.0-150500.9.25.2 * Basesystem Module 15-SP5 (s390x x86_64) * s390-tools-2.31.0-150500.9.25.2 * s390-tools-debuginfo-2.31.0-150500.9.25.2 * s390-tools-debugsource-2.31.0-150500.9.25.2 * Basesystem Module 15-SP5 (noarch) * s390-tools-genprotimg-data-2.31.0-150500.9.25.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231003 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 08:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 08:30:12 -0000 Subject: SUSE-RU-2024:3556-1: moderate: Recommended update for s390-tools Message-ID: <172846261291.12150.15915080290722006744@smelt2.prg2.suse.org> # Recommended update for s390-tools Announcement ID: SUSE-RU-2024:3556-1 Release Date: 2024-10-09T06:42:40Z Rating: moderate References: * bsc#1231004 Affected Products: * SUSE Linux Enterprise Server 12 SP5 An update that has one fix can now be installed. ## Description: This update for s390-tools fixes the following issues: Problem fixes (bsc#1231004). \- ziomon/ziorep_config: fix warning when multipath device is not there \- osasnmpd/ibmOSAMib.h: Fix missing semicolon ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3556=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 (s390x) * s390-tools-2.1.0-18.50.2 * osasnmpd-debuginfo-2.1.0-18.50.2 * s390-tools-zdsfs-2.1.0-18.50.2 * s390-tools-zdsfs-debuginfo-2.1.0-18.50.2 * s390-tools-hmcdrvfs-2.1.0-18.50.2 * s390-tools-debuginfo-2.1.0-18.50.2 * s390-tools-hmcdrvfs-debuginfo-2.1.0-18.50.2 * osasnmpd-2.1.0-18.50.2 * s390-tools-debugsource-2.1.0-18.50.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231004 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 08:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 08:30:16 -0000 Subject: SUSE-RU-2024:3555-1: moderate: Recommended update for s390-tools Message-ID: <172846261635.12150.8722834303952787971@smelt2.prg2.suse.org> # Recommended update for s390-tools Announcement ID: SUSE-RU-2024:3555-1 Release Date: 2024-10-09T06:33:36Z Rating: moderate References: * bsc#1231002 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for s390-tools fixes the following issue: * ziomon/ziorep_config: fix warning when multipath device is not there (bsc#1231002). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3555=1 openSUSE-SLE-15.6-2024-3555=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3555=1 ## Package List: * openSUSE Leap 15.6 (s390x x86_64) * s390-tools-debugsource-2.31.0-150600.8.9.3 * s390-tools-debuginfo-2.31.0-150600.8.9.3 * s390-tools-2.31.0-150600.8.9.3 * openSUSE Leap 15.6 (s390x) * s390-tools-hmcdrvfs-2.31.0-150600.8.9.3 * s390-tools-zdsfs-debuginfo-2.31.0-150600.8.9.3 * libkmipclient1-2.31.0-150600.8.9.3 * osasnmpd-2.31.0-150600.8.9.3 * osasnmpd-debuginfo-2.31.0-150600.8.9.3 * libekmfweb1-devel-2.31.0-150600.8.9.3 * libkmipclient1-devel-2.31.0-150600.8.9.3 * s390-tools-chreipl-fcp-mpath-2.31.0-150600.8.9.3 * s390-tools-zdsfs-2.31.0-150600.8.9.3 * libkmipclient1-debuginfo-2.31.0-150600.8.9.3 * libekmfweb1-debuginfo-2.31.0-150600.8.9.3 * libekmfweb1-2.31.0-150600.8.9.3 * s390-tools-hmcdrvfs-debuginfo-2.31.0-150600.8.9.3 * openSUSE Leap 15.6 (noarch) * s390-tools-genprotimg-data-2.31.0-150600.8.9.3 * Basesystem Module 15-SP6 (s390x) * s390-tools-hmcdrvfs-2.31.0-150600.8.9.3 * s390-tools-zdsfs-debuginfo-2.31.0-150600.8.9.3 * libkmipclient1-2.31.0-150600.8.9.3 * osasnmpd-2.31.0-150600.8.9.3 * osasnmpd-debuginfo-2.31.0-150600.8.9.3 * libekmfweb1-devel-2.31.0-150600.8.9.3 * s390-tools-chreipl-fcp-mpath-2.31.0-150600.8.9.3 * s390-tools-zdsfs-2.31.0-150600.8.9.3 * libkmipclient1-debuginfo-2.31.0-150600.8.9.3 * libekmfweb1-debuginfo-2.31.0-150600.8.9.3 * libekmfweb1-2.31.0-150600.8.9.3 * s390-tools-hmcdrvfs-debuginfo-2.31.0-150600.8.9.3 * Basesystem Module 15-SP6 (s390x x86_64) * s390-tools-debugsource-2.31.0-150600.8.9.3 * s390-tools-debuginfo-2.31.0-150600.8.9.3 * s390-tools-2.31.0-150600.8.9.3 * Basesystem Module 15-SP6 (noarch) * s390-tools-genprotimg-data-2.31.0-150600.8.9.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231002 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 08:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 08:30:20 -0000 Subject: SUSE-SU-2024:3554-1: moderate: Security update for mozjs78 Message-ID: <172846262013.12150.7641267571800808919@smelt2.prg2.suse.org> # Security update for mozjs78 Announcement ID: SUSE-SU-2024:3554-1 Release Date: 2024-10-09T06:17:18Z Rating: moderate References: * bsc#1230036 * bsc#1230037 * bsc#1230038 Cross-References: * CVE-2024-45490 * CVE-2024-45491 * CVE-2024-45492 CVSS scores: * CVE-2024-45490 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45491 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45492 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for mozjs78 fixes the following issues: * CVE-2024-45490: Fixed negative len for XML_ParseBuffer in embedded expat (bnc#1230036) * CVE-2024-45491: Fixed integer overflow in dtdCopy in embedded expat (bnc#1230037) * CVE-2024-45492: Fixed integer overflow in function nextScaffoldPart in embedded expat (bnc#1230038) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3554=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3554=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3554=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3554=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3554=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3554=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libmozjs-78-0-debuginfo-78.15.0-150400.3.6.2 * libmozjs-78-0-78.15.0-150400.3.6.2 * mozjs78-debuginfo-78.15.0-150400.3.6.2 * mozjs78-78.15.0-150400.3.6.2 * mozjs78-debugsource-78.15.0-150400.3.6.2 * mozjs78-devel-78.15.0-150400.3.6.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libmozjs-78-0-debuginfo-78.15.0-150400.3.6.2 * libmozjs-78-0-78.15.0-150400.3.6.2 * mozjs78-debuginfo-78.15.0-150400.3.6.2 * mozjs78-78.15.0-150400.3.6.2 * mozjs78-debugsource-78.15.0-150400.3.6.2 * mozjs78-devel-78.15.0-150400.3.6.2 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libmozjs-78-0-debuginfo-78.15.0-150400.3.6.2 * libmozjs-78-0-78.15.0-150400.3.6.2 * mozjs78-debuginfo-78.15.0-150400.3.6.2 * mozjs78-debugsource-78.15.0-150400.3.6.2 * mozjs78-devel-78.15.0-150400.3.6.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * libmozjs-78-0-78.15.0-150400.3.6.2 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * mozjs78-debugsource-78.15.0-150400.3.6.2 * libmozjs-78-0-debuginfo-78.15.0-150400.3.6.2 * mozjs78-debuginfo-78.15.0-150400.3.6.2 * libmozjs-78-0-78.15.0-150400.3.6.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i686) * libmozjs-78-0-debuginfo-78.15.0-150400.3.6.2 * libmozjs-78-0-78.15.0-150400.3.6.2 * mozjs78-debuginfo-78.15.0-150400.3.6.2 * mozjs78-78.15.0-150400.3.6.2 * mozjs78-debugsource-78.15.0-150400.3.6.2 * mozjs78-devel-78.15.0-150400.3.6.2 ## References: * https://www.suse.com/security/cve/CVE-2024-45490.html * https://www.suse.com/security/cve/CVE-2024-45491.html * https://www.suse.com/security/cve/CVE-2024-45492.html * https://bugzilla.suse.com/show_bug.cgi?id=1230036 * https://bugzilla.suse.com/show_bug.cgi?id=1230037 * https://bugzilla.suse.com/show_bug.cgi?id=1230038 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 12:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 12:30:19 -0000 Subject: SUSE-SU-2024:3565-1: important: Security update for the Linux Kernel Message-ID: <172847701916.6932.10864064283193373043@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3565-1 Release Date: 2024-10-09T09:40:49Z Rating: important References: * bsc#1185988 * bsc#1220826 * bsc#1226145 * bsc#1227487 * bsc#1228466 * bsc#1229633 * bsc#1230015 * bsc#1230245 * bsc#1230326 * bsc#1230398 * bsc#1230434 * bsc#1230519 * bsc#1230767 Cross-References: * CVE-2021-47069 * CVE-2022-48911 * CVE-2022-48945 * CVE-2024-36971 * CVE-2024-41087 * CVE-2024-44946 * CVE-2024-45003 * CVE-2024-45021 * CVE-2024-46695 * CVE-2024-46774 CVSS scores: * CVE-2021-47069 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36971 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36971 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Proxy 4.1 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Server 4.1 An update that solves 10 vulnerabilities and has three security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). * CVE-2022-48945: media: vivid: fix compose size exceed boundary (bsc#1230398). * CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145). * CVE-2024-41087: Fix double free on error (bsc#1228466). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-46695: selinux,smack: do not bypass permissions check in inode_setsecctx hook (bsc#1230519). The following non-security bugs were fixed: * Revert "ext4: consolidate checks for resize of bigalloc into ext4_resize_begin" (bsc#1230326). * ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1230326). * ext4: add reserved GDT blocks check (bsc#1230326). * ext4: consolidate checks for resize of bigalloc into ext4_resize_begin (bsc#1230326). * ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1230326). * kabi: add __nf_queue_get_refs() for kabi compliance. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-3565=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-3565=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3565=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3565=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3565=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (nosrc) * kernel-default-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_206-default-debuginfo-1-150200.5.3.1 * kernel-livepatch-SLE15-SP2_Update_53-debugsource-1-150200.5.3.1 * kernel-livepatch-5_3_18-150200_24_206-default-1-150200.5.3.1 * kernel-default-livepatch-5.3.18-150200.24.206.1 * kernel-default-debuginfo-5.3.18-150200.24.206.1 * kernel-default-livepatch-devel-5.3.18-150200.24.206.1 * kernel-default-debugsource-5.3.18-150200.24.206.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-debuginfo-5.3.18-150200.24.206.1 * ocfs2-kmp-default-debuginfo-5.3.18-150200.24.206.1 * gfs2-kmp-default-5.3.18-150200.24.206.1 * ocfs2-kmp-default-5.3.18-150200.24.206.1 * cluster-md-kmp-default-5.3.18-150200.24.206.1 * kernel-default-debuginfo-5.3.18-150200.24.206.1 * cluster-md-kmp-default-debuginfo-5.3.18-150200.24.206.1 * dlm-kmp-default-5.3.18-150200.24.206.1 * dlm-kmp-default-debuginfo-5.3.18-150200.24.206.1 * kernel-default-debugsource-5.3.18-150200.24.206.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (nosrc) * kernel-default-5.3.18-150200.24.206.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150200.24.206.1 * kernel-default-5.3.18-150200.24.206.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * kernel-obs-build-debugsource-5.3.18-150200.24.206.1 * kernel-default-base-5.3.18-150200.24.206.1.150200.9.107.1 * kernel-preempt-debugsource-5.3.18-150200.24.206.1 * kernel-preempt-debuginfo-5.3.18-150200.24.206.1 * kernel-obs-build-5.3.18-150200.24.206.1 * kernel-default-devel-5.3.18-150200.24.206.1 * kernel-default-devel-debuginfo-5.3.18-150200.24.206.1 * kernel-preempt-devel-5.3.18-150200.24.206.1 * kernel-default-debuginfo-5.3.18-150200.24.206.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.206.1 * kernel-syms-5.3.18-150200.24.206.1 * kernel-default-debugsource-5.3.18-150200.24.206.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * kernel-devel-5.3.18-150200.24.206.1 * kernel-source-5.3.18-150200.24.206.1 * kernel-macros-5.3.18-150200.24.206.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-5.3.18-150200.24.206.1 * kernel-default-base-5.3.18-150200.24.206.1.150200.9.107.1 * kernel-obs-build-5.3.18-150200.24.206.1 * kernel-default-devel-5.3.18-150200.24.206.1 * kernel-default-devel-debuginfo-5.3.18-150200.24.206.1 * reiserfs-kmp-default-debuginfo-5.3.18-150200.24.206.1 * kernel-default-debuginfo-5.3.18-150200.24.206.1 * reiserfs-kmp-default-5.3.18-150200.24.206.1 * kernel-syms-5.3.18-150200.24.206.1 * kernel-default-debugsource-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * kernel-devel-5.3.18-150200.24.206.1 * kernel-source-5.3.18-150200.24.206.1 * kernel-macros-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * kernel-preempt-debugsource-5.3.18-150200.24.206.1 * kernel-preempt-devel-5.3.18-150200.24.206.1 * kernel-preempt-debuginfo-5.3.18-150200.24.206.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * kernel-obs-build-debugsource-5.3.18-150200.24.206.1 * kernel-default-base-5.3.18-150200.24.206.1.150200.9.107.1 * kernel-obs-build-5.3.18-150200.24.206.1 * kernel-default-devel-5.3.18-150200.24.206.1 * kernel-default-devel-debuginfo-5.3.18-150200.24.206.1 * reiserfs-kmp-default-debuginfo-5.3.18-150200.24.206.1 * kernel-default-debuginfo-5.3.18-150200.24.206.1 * reiserfs-kmp-default-5.3.18-150200.24.206.1 * kernel-syms-5.3.18-150200.24.206.1 * kernel-default-debugsource-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * kernel-devel-5.3.18-150200.24.206.1 * kernel-source-5.3.18-150200.24.206.1 * kernel-macros-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc x86_64) * kernel-preempt-5.3.18-150200.24.206.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * kernel-preempt-debugsource-5.3.18-150200.24.206.1 * kernel-preempt-devel-5.3.18-150200.24.206.1 * kernel-preempt-debuginfo-5.3.18-150200.24.206.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.206.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47069.html * https://www.suse.com/security/cve/CVE-2022-48911.html * https://www.suse.com/security/cve/CVE-2022-48945.html * https://www.suse.com/security/cve/CVE-2024-36971.html * https://www.suse.com/security/cve/CVE-2024-41087.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-46695.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://bugzilla.suse.com/show_bug.cgi?id=1185988 * https://bugzilla.suse.com/show_bug.cgi?id=1220826 * https://bugzilla.suse.com/show_bug.cgi?id=1226145 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1228466 * https://bugzilla.suse.com/show_bug.cgi?id=1229633 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230326 * https://bugzilla.suse.com/show_bug.cgi?id=1230398 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230519 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 12:33:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 12:33:07 -0000 Subject: SUSE-SU-2024:3564-1: important: Security update for the Linux Kernel Message-ID: <172847718722.6932.3807003225269613380@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3564-1 Release Date: 2024-10-09T09:09:07Z Rating: important References: * bsc#1012628 * bsc#1183045 * bsc#1215199 * bsc#1216223 * bsc#1216776 * bsc#1220382 * bsc#1221527 * bsc#1221610 * bsc#1221650 * bsc#1222629 * bsc#1223600 * bsc#1223848 * bsc#1225487 * bsc#1225812 * bsc#1225903 * bsc#1226003 * bsc#1226507 * bsc#1226606 * bsc#1226666 * bsc#1226846 * bsc#1226860 * bsc#1227487 * bsc#1227694 * bsc#1227726 * bsc#1227819 * bsc#1227885 * bsc#1227890 * bsc#1227962 * bsc#1228090 * bsc#1228140 * bsc#1228244 * bsc#1228507 * bsc#1228771 * bsc#1229001 * bsc#1229004 * bsc#1229019 * bsc#1229086 * bsc#1229167 * bsc#1229169 * bsc#1229289 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229364 * bsc#1229371 * bsc#1229380 * bsc#1229389 * bsc#1229394 * bsc#1229429 * bsc#1229443 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229494 * bsc#1229585 * bsc#1229753 * bsc#1229764 * bsc#1229768 * bsc#1229790 * bsc#1229810 * bsc#1229899 * bsc#1229928 * bsc#1230015 * bsc#1230119 * bsc#1230123 * bsc#1230124 * bsc#1230125 * bsc#1230169 * bsc#1230170 * bsc#1230171 * bsc#1230173 * bsc#1230174 * bsc#1230175 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230181 * bsc#1230185 * bsc#1230191 * bsc#1230192 * bsc#1230193 * bsc#1230194 * bsc#1230195 * bsc#1230200 * bsc#1230204 * bsc#1230206 * bsc#1230207 * bsc#1230209 * bsc#1230211 * bsc#1230213 * bsc#1230217 * bsc#1230221 * bsc#1230224 * bsc#1230230 * bsc#1230232 * bsc#1230233 * bsc#1230240 * bsc#1230244 * bsc#1230245 * bsc#1230247 * bsc#1230248 * bsc#1230269 * bsc#1230270 * bsc#1230295 * bsc#1230340 * bsc#1230426 * bsc#1230430 * bsc#1230431 * bsc#1230432 * bsc#1230433 * bsc#1230434 * bsc#1230435 * bsc#1230440 * bsc#1230441 * bsc#1230442 * bsc#1230444 * bsc#1230450 * bsc#1230451 * bsc#1230454 * bsc#1230455 * bsc#1230457 * bsc#1230459 * bsc#1230506 * bsc#1230507 * bsc#1230511 * bsc#1230515 * bsc#1230517 * bsc#1230518 * bsc#1230519 * bsc#1230520 * bsc#1230521 * bsc#1230524 * bsc#1230526 * bsc#1230533 * bsc#1230535 * bsc#1230539 * bsc#1230540 * bsc#1230549 * bsc#1230556 * bsc#1230562 * bsc#1230563 * bsc#1230564 * bsc#1230580 * bsc#1230582 * bsc#1230589 * bsc#1230602 * bsc#1230699 * bsc#1230700 * bsc#1230701 * bsc#1230702 * bsc#1230703 * bsc#1230704 * bsc#1230705 * bsc#1230706 * bsc#1230709 * bsc#1230711 * bsc#1230712 * bsc#1230715 * bsc#1230719 * bsc#1230722 * bsc#1230724 * bsc#1230725 * bsc#1230726 * bsc#1230727 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230747 * bsc#1230748 * bsc#1230749 * bsc#1230751 * bsc#1230752 * bsc#1230753 * bsc#1230756 * bsc#1230761 * bsc#1230766 * bsc#1230767 * bsc#1230768 * bsc#1230771 * bsc#1230772 * bsc#1230775 * bsc#1230776 * bsc#1230780 * bsc#1230783 * bsc#1230786 * bsc#1230787 * bsc#1230791 * bsc#1230794 * bsc#1230796 * bsc#1230802 * bsc#1230806 * bsc#1230808 * bsc#1230809 * bsc#1230810 * bsc#1230812 * bsc#1230813 * bsc#1230814 * bsc#1230815 * bsc#1230821 * bsc#1230825 * bsc#1230830 * bsc#1230831 * bsc#1230854 * bsc#1230948 * bsc#1231008 * bsc#1231035 * bsc#1231120 * bsc#1231146 * bsc#1231182 * bsc#1231183 * jsc#PED-10954 * jsc#PED-9899 Cross-References: * CVE-2023-52610 * CVE-2023-52752 * CVE-2023-52915 * CVE-2023-52916 * CVE-2024-26640 * CVE-2024-26759 * CVE-2024-26804 * CVE-2024-36953 * CVE-2024-38538 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-40965 * CVE-2024-40973 * CVE-2024-40983 * CVE-2024-42154 * CVE-2024-42243 * CVE-2024-42252 * CVE-2024-42265 * CVE-2024-42294 * CVE-2024-42304 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43828 * CVE-2024-43832 * CVE-2024-43835 * CVE-2024-43845 * CVE-2024-43870 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43904 * CVE-2024-43914 * CVE-2024-44935 * CVE-2024-44944 * CVE-2024-44946 * CVE-2024-44947 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44951 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44960 * CVE-2024-44961 * CVE-2024-44962 * CVE-2024-44965 * CVE-2024-44967 * CVE-2024-44969 * CVE-2024-44970 * CVE-2024-44971 * CVE-2024-44977 * CVE-2024-44982 * CVE-2024-44984 * CVE-2024-44985 * CVE-2024-44986 * CVE-2024-44987 * CVE-2024-44988 * CVE-2024-44989 * CVE-2024-44990 * CVE-2024-44991 * CVE-2024-44997 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45000 * CVE-2024-45001 * CVE-2024-45002 * CVE-2024-45003 * CVE-2024-45005 * CVE-2024-45006 * CVE-2024-45007 * CVE-2024-45008 * CVE-2024-45011 * CVE-2024-45012 * CVE-2024-45013 * CVE-2024-45015 * CVE-2024-45017 * CVE-2024-45018 * CVE-2024-45019 * CVE-2024-45020 * CVE-2024-45021 * CVE-2024-45022 * CVE-2024-45023 * CVE-2024-45026 * CVE-2024-45028 * CVE-2024-45029 * CVE-2024-45030 * CVE-2024-46672 * CVE-2024-46673 * CVE-2024-46674 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46687 * CVE-2024-46689 * CVE-2024-46691 * CVE-2024-46692 * CVE-2024-46693 * CVE-2024-46694 * CVE-2024-46695 * CVE-2024-46702 * CVE-2024-46706 * CVE-2024-46707 * CVE-2024-46709 * CVE-2024-46710 * CVE-2024-46714 * CVE-2024-46715 * CVE-2024-46716 * CVE-2024-46717 * CVE-2024-46719 * CVE-2024-46720 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46724 * CVE-2024-46725 * CVE-2024-46726 * CVE-2024-46728 * CVE-2024-46729 * CVE-2024-46730 * CVE-2024-46731 * CVE-2024-46732 * CVE-2024-46734 * CVE-2024-46735 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46741 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46746 * CVE-2024-46747 * CVE-2024-46749 * CVE-2024-46750 * CVE-2024-46751 * CVE-2024-46752 * CVE-2024-46753 * CVE-2024-46755 * CVE-2024-46756 * CVE-2024-46757 * CVE-2024-46758 * CVE-2024-46759 * CVE-2024-46760 * CVE-2024-46761 * CVE-2024-46767 * CVE-2024-46771 * CVE-2024-46772 * CVE-2024-46773 * CVE-2024-46774 * CVE-2024-46776 * CVE-2024-46778 * CVE-2024-46780 * CVE-2024-46781 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46786 * CVE-2024-46787 * CVE-2024-46791 * CVE-2024-46794 * CVE-2024-46797 * CVE-2024-46798 * CVE-2024-46822 CVSS scores: * CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42294 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44960 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44960 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-44960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44961 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44962 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44984 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-44985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44985 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45012 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46724 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46734 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46734 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46735 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46741 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46741 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46741 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46747 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46749 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46749 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46752 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46756 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46756 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46757 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46757 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46758 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46758 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46786 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46794 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Real Time Module 15-SP6 An update that solves 162 vulnerabilities, contains two features and has 48 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487). * CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269). * CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650). * CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340). * CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629). * CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606). * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42243: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray (bsc#1229001). * CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004). * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-42294: block: fix deadlock between sd_remove & sd_release (bsc#1229371). * CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394). * CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio reference (bsc#1229380). * CVE-2024-43845: udf: Fix bogus checksum computation in udf_rename() (bsc#1229389). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810). * CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption (bsc#1230181). * CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209). * CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211). * CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (bsc#1230240). * CVE-2024-44985: ipv6: prevent possible UAF in ip6_xmit() (bsc#1230206). * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192). * CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193). * CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194). * CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch (bsc#1230195). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling (bsc#1230169). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). * CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442). * CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430). * CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431). * CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter (bsc#1230432). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 (bsc#1230435). * CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow disk (bsc#1230455). * CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451). * CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() (bsc#1230518). * CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section (bsc#1230526). * CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call (bsc#1230520). * CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes (bsc#1230521). * CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers (bsc#1230540). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop (bsc#1230704). * CVE-2024-46735: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() (bsc#1230727). * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786). * CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). The following non-security bugs were fixed: * ABI: testing: fix admv8818 attr description (git-fixes). * ACPI: CPPC: Add helper to get the highest performance value (stable-fixes). * ACPI: CPPC: Fix MASK_VAL() usage (git-fixes). * ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git- fixes). * ACPI: processor: Fix memory leaks in error paths of processor_add() (stable- fixes). * ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes). * ACPI: sysfs: validate return type of _STR method (git-fixes). * ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes). * ACPICA: executer/exsystem: Do not nag user about every Stall() violating the spec (git-fixes). * ALSA: control: Apply sanity check of input values for user elements (stable- fixes). * ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes). * ALSA: hda/realtek - Fix inactive headset mic jack for ASUS Vivobook 15 X1504VAP (stable-fixes). * ALSA: hda/realtek: Enable Mute Led for HP Victus 15-fb1xxx (stable-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes). * ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes). * ALSA: hda/realtek: extend quirks for Clevo V5[46]0 (stable-fixes). * ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes). * ALSA: hda: add HDMI codec ID for Intel PTL (stable-fixes). * ALSA: hda: cs35l41: fix module autoloading (git-fixes). * ARM: 9406/1: Fix callchain_trace() return value (git-fixes). * ASoC: Intel: soc-acpi-cht: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * ASoC: amd: yc: Add a quirk for MSI Bravo 17 (D7VEK) (stable-fixes). * ASoC: codecs: avoid possible garbage value in peb2466_reg_read() (git- fixes). * ASoC: cs42l42: Convert comma to semicolon (git-fixes). * ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes). * ASoC: intel: fix module autoloading (stable-fixes). * ASoC: meson: Remove unused declartion in header file (git-fixes). * ASoC: meson: axg-card: fix 'use-after-free' (git-fixes). * ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git- fixes). * ASoC: rt5682s: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes). * ASoC: soc-ac97: Fix the incorrect description (git-fixes). * ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes). * ASoC: tas2781-i2c: Get the right GPIO line (git-fixes). * ASoC: tda7419: fix module autoloading (stable-fixes). * ASoC: tegra: Fix CBB error during probe() (git-fixes). * ASoC: topology: Properly initialize soc_enum values (stable-fixes). * ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes). * ASoc: TAS2781: replace beXX_to_cpup with get_unaligned_beXX for potentially broken alignment (stable-fixes). * Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes). * Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush() (stable-fixes). * Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes). * Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes). * Bluetooth: hci_event: Use HCI error defines instead of magic values (stable- fixes). * Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue (stable-fixes). * Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git- fixes). * Detect memory allocation failure in annotated_source__alloc_histograms (bsc#1227962). * Documentation: ioctl: document 0x07 ioctl code (git-fixes). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Drivers: hv: vmbus: Fix the misplaced function description (git-fixes). * HID: amd_sfh: free driver_data after destroying hid device (stable-fixes). * HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable- fixes). * HID: multitouch: Add support for GT7868Q (stable-fixes). * HID: wacom: Do not warn about dropped packets for first packet (git-fixes). * HID: wacom: Support sequence numbers smaller than 16-bit (git-fixes). * IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes) * Input: adp5588-keys - fix check on return code (git-fixes). * Input: ads7846 - ratelimit the spi_sync error message (stable-fixes). * Input: ili210x - use kvmalloc() to allocate buffer for firmware update (stable-fixes). * Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes). * Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes). * Input: tsc2004/5 - do not hard code interrupt trigger (git-fixes). * Input: tsc2004/5 - fix reset handling on probe (git-fixes). * Input: tsc2004/5 - use device core to create driver-specific device attributes (git-fixes). * Input: uinput - reject requests with unreasonable number of slots (stable- fixes). * KEYS: prevent NULL pointer dereference in find_asymmetric_key() (git-fixes). * KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes). * KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes). * KVM: arm64: Block unsafe FF-A calls from the host (git-fixes). * KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging (git-fixes). * KVM: arm64: Do not pass a TLBI level hint when zapping table entries (git- fixes). * KVM: arm64: Do not re-initialize the KVM lock (git-fixes). * KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init (git-fixes). * KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (git- fixes). * KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes). * KVM: arm64: nvhe: Ignore SVE hint in SMCCC function ID (git-fixes). * KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git- fixes). * KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (git-fixes). * Merge branch 'SLE15-SP6' (ea7c56db3e5d) into 'SLE15-SP6-RT' * NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726). * NFSD: Fix frame size warning in svc_export_parse() (git-fixes). * NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes). * NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes). * No -rt specific changes this merge. * PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes). * PCI: Wait for Link before restoring Downstream Buses (git-fixes). * PCI: al: Check IORESOURCE_BUS existence during probe (stable-fixes). * PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes). * PCI: dra7xx: Fix threaded IRQ request for "dra7xx-pcie-main" IRQ (git- fixes). * PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes). * PCI: imx6: Fix missing call to phy_power_off() in error handling (git- fixes). * PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable- fixes). * PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes). * PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() (git-fixes). * PCI: qcom-ep: Enable controller resources like PHY only after refclk is available (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes). * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/efa: Properly handle unexpected AQ completions (git-fixes) * RDMA/erdma: Return QP state in erdma_query_qp (git-fixes) * RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes) * RDMA/hns: Fix 1bit-ECC recovery address in non-4K OS (git-fixes) * RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 (git-fixes) * RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git- fixes) * RDMA/hns: Fix ah error counter in sw stat not increasing (git-fixes) * RDMA/hns: Fix restricted __le16 degrades to integer issue (git-fixes) * RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes) * RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes) * RDMA/hns: Optimize hem allocation performance (git-fixes) * RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * RDMA/mlx5: Drop redundant work canceling from clean_keys() (git-fixes) * RDMA/mlx5: Fix MR cache temp entries cleanup (git-fixes) * RDMA/mlx5: Fix counter update on MR cache mkey creation (git-fixes) * RDMA/mlx5: Limit usage of over-sized mkeys from the MR cache (git-fixes) * RDMA/mlx5: Obtain upper net device only when needed (git-fixes) * RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes) * RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git- fixes) * Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes). * Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE" (git-fixes). * Revert "PCI: Extend ACS configurability (bsc#1228090)." (bsc#1229019) * Revert "drm/amdgpu: align pp_power_profile_mode with kernel docs" (stable- fixes). * Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (git-fixes). * Revert "mm, kmsan: fix infinite recursion due to RCU critical section" * Revert "mm/sparsemem: fix race in accessing memory_section->usage" * Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" * Squashfs: sanity check symbolic link size (git-fixes). * USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes). * USB: serial: kobil_sct: restore initial terminal settings (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (stable-fixes). * USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes). * USB: usbtmc: prevent kernel-usb-infoleak (git-fixes). * VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes). * afs: Do not cross .backup mountpoint from backup volume (git-fixes). * afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes). * arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585) * arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585) * arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes). * arm64: dts: allwinner: h616: Add r_i2c pinctrl nodes (git-fixes). * arm64: dts: exynos: exynos7885-jackpotlte: Correct RAM amount to 4GB (git- fixes). * arm64: dts: imx8-ss-dma: Fix adc0 closing brace location (git-fixes). * arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git- fixes). * arm64: dts: rockchip: Correct vendor prefix for Hardkernel ODROID-M1 (git- fixes). * arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes). * arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git- fixes). * arm64: dts: rockchip: fix eMMC/SPI corruption when audio has been used on RK3399 Puma (git-fixes). * arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes). * arm64: signal: Fix some under-bracketed UAPI macros (git-fixes). * arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585) * arm64: tlb: Fix TLBI RANGE operand (bsc#1229585) * arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585) * ata: libata-scsi: Fix ata_msense_control() CDL page reporting (git-fixes). * ata: libata: Clear DID_TIME_OUT for ATA PT commands with sense data (git- fixes). * ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes). * ata: pata_macio: Use WARN instead of BUG (stable-fixes). * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * bpf, events: Use prog to emit ksymbol event for main program (git-fixes). * bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (git-fixes). * btrfs: fix race between direct IO write and fsync when using same fd (git- fixes). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1230854). * bus: integrator-lm: fix OF node leak in probe() (git-fixes). * cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231008). * cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183). * can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes). * can: bcm: Remove proc entry when dev is unregistered (git-fixes). * can: j1939: use correct function name in comment (git-fixes). * can: kvaser_pciefd: Skip redundant NULL pointer check in ISR (stable-fixes). * can: m_can: Release irq on error in m_can_open (git-fixes). * can: m_can: enable NAPI before enabling interrupts (git-fixes). * can: m_can: m_can_close(): stop clocks after device has been shut down (git- fixes). * can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git- fixes). * can: mcp251xfd: clarify the meaning of timestamp (stable-fixes). * can: mcp251xfd: fix ring configuration when switching from CAN-CC to CAN-FD mode (git-fixes). * can: mcp251xfd: mcp251xfd_handle_rxif_ring_uinc(): factor out in separate function (stable-fixes). * can: mcp251xfd: mcp251xfd_ring_init(): check TX-coalescing configuration (stable-fixes). * can: mcp251xfd: move mcp251xfd_timestamp_start()/stop() into mcp251xfd_chip_start/stop() (stable-fixes). * can: mcp251xfd: properly indent labels (stable-fixes). * can: mcp251xfd: rx: add workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * can: mcp251xfd: rx: prepare to workaround broken RX FIFO head index erratum (stable-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (stable- fixes). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231182). * clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885). * clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885). * clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes). * clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git- fixes). * clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes). * clk: qcom: gcc-sc8280xp: do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: gcc-sm8550: Do not park the USB RCG at registration time (git- fixes). * clk: qcom: gcc-sm8550: Do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: ipq9574: Update the alpha PLL type for GPLLs (git-fixes). * clk: ti: dra7-atl: Fix leak of of_nodes (git-fixes). * clocksource/drivers/imx-tpm: Fix next event not taking effect sometime (git- fixes). * clocksource/drivers/imx-tpm: Fix return -ETIME when delta exceeds INT_MAX (git-fixes). * clocksource/drivers/qcom: Add missing iounmap() on errors in msm_dt_timer_init() (git-fixes). * cpufreq: amd-pstate: Enable amd-pstate preferred core support (stable- fixes). * cpufreq: amd-pstate: fix the highest frequency issue which limits performance (git-fixes). * cpufreq: scmi: Avoid overflow of target_freq in fast switch (stable-fixes). * cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes). * crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes). * crypto: ccp - do not request interrupt on cmd completion when irqs disabled (git-fixes). * crypto: iaa - Fix potential use after free bug (git-fixes). * crypto: qat - fix unintentional re-enabling of error interrupts (stable- fixes). * crypto: xor - fix template benchmarking (git-fixes). * cxl/core: Fix incorrect vendor debug UUID define (git-fixes). * cxl/pci: Fix to record only non-zero ranges (git-fixes). * devres: Initialize an uninitialized struct member (stable-fixes). * dma-buf: heaps: Fix off-by-one in CMA heap fault handler (git-fixes). * dma-debug: avoid deadlock between dma debug vs printk and netconsole (stable-fixes). * dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (stable-fixes). * dmaengine: altera-msgdma: use irq variant of spin_lock/unlock while invoking callbacks (stable-fixes). * driver core: Fix a potential null-ptr-deref in module_add_driver() (git- fixes). * driver core: Fix error handling in driver API device_rename() (git-fixes). * driver: iio: add missing checks on iio_info's callback access (stable- fixes). * drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes). * drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes). * drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes). * drm/amd/amdgpu: Check tbo resource pointer (stable-fixes). * drm/amd/amdgpu: Properly tune the size of struct (git-fixes). * drm/amd/display: Add array index check for hdcp ddc access (stable-fixes). * drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (git-fixes). * drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing (stable-fixes). * drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes). * drm/amd/display: Avoid overflow from uint32_t to uint8_t (stable-fixes). * drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct() (git-fixes). * drm/amd/display: Check BIOS images before it is used (stable-fixes). * drm/amd/display: Check HDCP returned status (stable-fixes). * drm/amd/display: Check UnboundedRequestEnabled's value (stable-fixes). * drm/amd/display: Check denominator pbn_div before used (stable-fixes). * drm/amd/display: Check gpio_id before used as array index (stable-fixes). * drm/amd/display: Check index for aux_rd_interval before using (stable- fixes). * drm/amd/display: Check msg_id before processing transcation (stable-fixes). * drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes). * drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes). * drm/amd/display: Defer handling mst up request in resume (stable-fixes). * drm/amd/display: Disable error correction if it's not supported (stable- fixes). * drm/amd/display: Do not use fsleep for PSR exit waits on dmub replay (stable-fixes). * drm/amd/display: Ensure array index tg_inst won't be -1 (stable-fixes). * drm/amd/display: Ensure index calculation will not overflow (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within decide_fallback_link_setting_max_bw_policy (stable-fixes). * drm/amd/display: Fix Coverity INTERGER_OVERFLOW within construct_integrated_info (stable-fixes). * drm/amd/display: Fix FEC_READY write on DP LT (stable-fixes). * drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (stable-fixes). * drm/amd/display: Fix pipe addition logic in calc_blocks_to_ungate DCN35 (stable-fixes). * drm/amd/display: Handle the case which quad_part is equal 0 (stable-fixes). * drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection (stable-fixes). * drm/amd/display: Replace dm_execute_dmub_cmd with dc_wake_and_execute_dmub_cmd (git-fixes). * drm/amd/display: Run DC_LOG_DC after checking link->link_enc (stable-fixes). * drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes). * drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable- fixes). * drm/amd/display: Solve mst monitors blank out problem after resume (git- fixes). * drm/amd/display: Spinlock before reading event (stable-fixes). * drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes). * drm/amd/display: Wake DMCUB before sending a command for replay feature (stable-fixes). * drm/amd/display: added NULL check at start of dc_validate_stream (stable- fixes). * drm/amd/display: handle nulled pipe context in DCE110's set_drr() (git- fixes). * drm/amd/display: use preferred link settings for dp signal only (stable- fixes). * drm/amd/pm: Fix negative array index read (stable-fixes). * drm/amd/pm: check negtive return for table entries (stable-fixes). * drm/amd/pm: check specific index for aldebaran (stable-fixes). * drm/amd/pm: check specific index for smu13 (stable-fixes). * drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable- fixes). * drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable- fixes). * drm/amd: Add gfx12 swizzle mode defs (stable-fixes). * drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes). * drm/amdgpu/display: handle gfx12 in amdgpu_dm_plane_format_mod_supported (stable-fixes). * drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes). * drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable- fixes). * drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes). * drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes). * drm/amdgpu/swsmu: always force a state reprogram on init (stable-fixes). * drm/amdgpu: Fix get each xcp macro (git-fixes). * drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes). * drm/amdgpu: Fix out-of-bounds write warning (stable-fixes). * drm/amdgpu: Fix smatch static checker warning (stable-fixes). * drm/amdgpu: Fix the uninitialized variable warning (stable-fixes). * drm/amdgpu: Fix the warning division or modulo by zero (stable-fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable- fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_info_ioctl (stable- fixes). * drm/amdgpu: Handle sg size limit for contiguous allocation (stable-fixes). * drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes). * drm/amdgpu: add lock in amdgpu_gart_invalidate_tlb (stable-fixes). * drm/amdgpu: add lock in kfd_process_dequeue_from_device (stable-fixes). * drm/amdgpu: add missing error handling in function amdgpu_gmc_flush_gpu_tlb_pasid (stable-fixes). * drm/amdgpu: add skip_hw_access checks for sriov (stable-fixes). * drm/amdgpu: align pp_power_profile_mode with kernel docs (stable-fixes). * drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes). * drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes). * drm/amdgpu: fix a possible null pointer dereference (git-fixes). * drm/amdgpu: fix contiguous handling for IB parsing v2 (git-fixes). * drm/amdgpu: fix dereference after null check (stable-fixes). * drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix overflowed array index read warning (stable-fixes). * drm/amdgpu: fix overflowed constant warning in mmhub_set_clockgating() (stable-fixes). * drm/amdgpu: fix the waring dereferencing hive (stable-fixes). * drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes). * drm/amdgpu: handle gfx12 in amdgpu_display_verify_sizes (stable-fixes). * drm/amdgpu: properly handle vbios fake edid sizing (git-fixes). * drm/amdgpu: reject gang submit on reserved VMIDs (stable-fixes). * drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes). * drm/amdgpu: update type of buf size to u32 for eeprom functions (stable- fixes). * drm/amdgu: fix Unintentional integer overflow for mall size (stable-fixes). * drm/amdkfd: Check debug trap enable before write dbg_ev_file (stable-fixes). * drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes). * drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes). * drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes). * drm/drm-bridge: Drop conditionals around of_node pointers (stable-fixes). * drm/fb-helper: Do not schedule_work() to flush frame buffer during panic() (stable-fixes). * drm/gpuvm: fix missing dependency to DRM_EXEC (git-fixes). * drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes). * drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git- fixes). * drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes). * drm/i915: Do not attempt to load the GSC multiple times (git-fixes). * drm/kfd: Correct pinned buffer handling at kfd restore and validate process (stable-fixes). * drm/mediatek: Set sensible cursor width/height values to fix crash (stable- fixes). * drm/mediatek: ovl_adaptor: Add missing of_node_put() (git-fixes). * drm/meson: plane: Add error handling (stable-fixes). * drm/msm/a5xx: disable preemption in submits by default (git-fixes). * drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes). * drm/msm/a5xx: properly clear preemption records on resume (git-fixes). * drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes). * drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes). * drm/msm/dsi: correct programming sequence for SM8350 / SM8450 (git-fixes). * drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes). * drm/msm: fix %s null argument error (git-fixes). * drm/nouveau/fb: restore init() for ramgp102 (git-fixes). * drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git- fixes). * drm/radeon: fix null pointer dereference in radeon_add_common_modes (git- fixes). * drm/radeon: properly handle vbios fake edid sizing (git-fixes). * drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git- fixes). * drm/rockchip: vop: Allow 4096px width scaling (git-fixes). * drm/rockchip: vop: clear DMA stop bit on RK3066 (git-fixes). * drm/rockchip: vop: enable VOP_FEATURE_INTERNAL_RGB on RK3066 (git-fixes). * drm/stm: Fix an error handling path in stm_drm_platform_probe() (git-fixes). * drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes). * drm/syncobj: Fix syncobj leak in drm_syncobj_eventfd_ioctl (git-fixes). * drm/vc4: hdmi: Handle error case of pm_runtime_resume_and_get (git-fixes). * drm: komeda: Fix an issue related to normalized zpos (stable-fixes). * drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Max (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Zero (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes). * ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() (git-fixes). * erofs: fix incorrect symlink detection in fast symlink (git-fixes). * exfat: fix memory leak in exfat_load_bitmap() (git-fixes). * fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes). * firmware: arm_scmi: Fix double free in OPTEE transport (git-fixes). * firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes). * firmware_loader: Block path traversal (git-fixes). * fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230602). * fuse: fix memory leak in fuse_create_open (bsc#1230124). * fuse: update stats for pages in dropped aux writeback list (bsc#1230125). * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230123). * gpio: modepin: Enable module autoloading (git-fixes). * gpio: rockchip: fix OF node leak in probe() (git-fixes). * hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (asus-ec-sensors) remove VRM temp X570-E GAMING (stable-fixes). * hwmon: (k10temp) Check return value of amd_smn_read() (stable-fixes). * hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable- fixes). * hwmon: (max16065) Fix overflows seen when writing limits (git-fixes). * hwmon: (nct6775-core) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (ntc_thermistor) fix module autoloading (git-fixes). * hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >= 1.2 (git-fixes). * hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes). * hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git- fixes). * hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git- fixes). * hwrng: mtk - Use devm_pm_runtime_enable (git-fixes). * i2c: aspeed: Update the stop sw state when the bus recovery occurs (git- fixes). * i2c: designware: fix controller is holding SCL low while ENABLE bit is disabled (git-fixes). * i2c: isch: Add missed 'else' (git-fixes). * i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes). * i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition (git-fixes). * i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable- fixes). * iio: adc: ad7124: fix chip ID mismatch (git-fixes). * iio: adc: ad7124: fix config comparison (git-fixes). * iio: adc: ad7606: fix oversampling gpio array (git-fixes). * iio: adc: ad7606: fix standby gpio state to match the documentation (git- fixes). * iio: adc: ad7606: remove frstdata check for serial mode (git-fixes). * iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes). * iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git- fixes). * iio: fix scale application in iio_convert_raw_to_processed_unlocked (git- fixes). * iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes). * ipmi: docs: do not advertise deprecated sysfs entries (git-fixes). * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230206) * jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes). * kABI workaround for cros_ec stuff (git-fixes). * kABI: Split kABI out of 'io_uring/kbuf: get rid of bl->is_ready' * kABI: Split kABI out of 'io_uring: Re-add dummy_ubuf for kABI purposes' * kABI: Split kABI out of io_uring/kbuf: protect io_buffer_list teardown with a reference * kabi: dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * kselftests: dmabuf-heaps: Ensure the driver name is null-terminated (stable- fixes). * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * leds: spi-byte: Call of_node_put() on error path (stable-fixes). * lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (stable- fixes). * lirc: rc_dev_get_from_fd(): fix file leak (git-fixes). * mailbox: bcm2835: Fix timeout during suspend mode (git-fixes). * mailbox: rockchip: fix a typo in module autoloading (git-fixes). * media: i2c: ar0521: Use cansleep version of gpiod_set_value() (git-fixes). * media: ov5675: Fix power on/off delay timings (git-fixes). * media: platform: rzg2l-cru: rzg2l-csi2: Add missing MODULE_DEVICE_TABLE (git-fixes). * media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes). * media: qcom: camss: Remove use_count guard in stop_streaming (git-fixes). * media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes). * media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes). * media: uvcvideo: Enforce alignment of frame and interval (stable-fixes). * media: venus: fix use after free bug in venus_remove due to race condition (git-fixes). * media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes). * media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes). * media: vivid: fix wrong sizeimage value for mplane (stable-fixes). * memory: mtk-smi: Use devm_clk_get_enabled() (git-fixes). * memory: tegra186-emc: drop unused to_tegra186_emc() (git-fixes). * minmax: reduce min/max macro expansion in atomisp driver (git-fixes). * misc: fastrpc: Fix double free of 'buf' in error path (git-fixes). * mmc: core: apply SD quirks earlier during probe (git-fixes). * mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes). * mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes). * mmc: sdhci-of-aspeed: fix module autoloading (git-fixes). * module: Fix KCOV-ignored file name (git-fixes). * mtd: powernv: Add check devm_kasprintf() returned value (git-fixes). * mtd: slram: insert break after errors in parsing the map (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: phy: Fix missing of_node_put() for leds (git-fixes). * net: phy: vitesse: repair vsc73xx autonegotiation (stable-fixes). * net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes). * net: usb: qmi_wwan: add MeiG Smart SRM825L (stable-fixes). * nfsd: Do not leave work of closing files to a work queue (bsc#1228140). * nilfs2: determine empty node blocks as corrupted (git-fixes). * nilfs2: fix missing cleanup on rollforward recovery error (git-fixes). * nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes). * nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes). * nilfs2: fix state management in error path of log writing function (git- fixes). * nilfs2: protect references to superblock parameters exposed in sysfs (git- fixes). * nouveau: fix the fwsec sb verification register (git-fixes). * nvme-multipath: avoid hang on inaccessible namespaces (bsc#1228244). * nvme-multipath: system fails to create generic nvme device (bsc#1228244). * nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes). * nvme-pci: allocate tagset on reset if necessary (git-fixes). * nvme-tcp: fix link failure for TCP auth (git-fixes). * nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes). * nvme: clear caller pointer on identify failure (git-fixes). * nvme: fix namespace removal list (git-fixes). * nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes). * nvmet-tcp: do not continue for invalid icreq (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet-trace: avoid dereferencing pointer too early (git-fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes). * pcmcia: Use resource_size function on resource object (stable-fixes). * perf annotate: Introduce global annotation_options (git-fixes). * perf annotate: Split branch stack cycles information out of 'struct annotation_line' (git-fixes). * perf annotate: Use global annotation_options (git-fixes). * perf arch events: Fix duplicate RISC-V SBI firmware event name (git-fixes). * perf intel-pt: Fix aux_watermark calculation for 64-bit size (git-fixes). * perf intel-pt: Fix exclude_guest setting (git-fixes). * perf machine thread: Remove exited threads by default (git-fixes). * perf maps: Move symbol maps functions to maps.c (git-fixes). * perf pmu: Assume sysfs events are always the same case (git-fixes). * perf pmus: Fixes always false when compare duplicates aliases (git-fixes). * perf record: Lazy load kernel symbols (git-fixes). * perf report: Convert to the global annotation_options (git-fixes). * perf report: Fix condition in sort__sym_cmp() (git-fixes). * perf stat: Fix the hard-coded metrics calculation on the hybrid (git-fixes). * perf test: Make test_arm_callgraph_fp.sh more robust (git-fixes). * perf tool: fix dereferencing NULL al->maps (git-fixes). * perf tools: Add/use PMU reverse lookup from config to name (git-fixes). * perf tools: Use pmus to describe type from attribute (git-fixes). * perf top: Convert to the global annotation_options (git-fixes). * perf/core: Fix missing wakeup when waiting for context reference (git- fixes). * perf/x86/intel/cstate: Add pkg C2 residency counter for Sierra Forest (git- fixes). * perf/x86/intel/cstate: Fix Alderlake/Raptorlake/Meteorlake (git-fixes). * perf/x86/intel/ds: Fix non 0 retire latency on Raptorlake (git-fixes). * perf/x86/intel/pt: Fix a topa_entry base address calculation (git-fixes). * perf/x86/intel/pt: Fix pt_topa_entry_for_page() address calculation (git- fixes). * perf/x86/intel/pt: Fix topa_entry base length (git-fixes). * perf/x86/intel/uncore: Fix the bits of the CHA extended umask for SPR (git- fixes). * perf/x86/intel/uncore: Support HBM and CXL PMON counters (bsc#1230119). * perf/x86/intel: Add a distinct name for Granite Rapids (git-fixes). * perf/x86/intel: Factor out the initialization code for SPR (git fixes). * perf/x86/intel: Limit the period on Haswell (git-fixes). * perf/x86/intel: Use the common uarch name for the shared functions (git fixes). * perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to MSR uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to PCI uncore units (bsc#1230119). * perf/x86/uncore: Cleanup unused unit structure (bsc#1230119). * perf/x86/uncore: Retrieve the unit ID from the unit control RB tree (bsc#1230119). * perf/x86/uncore: Save the unit control address of all units (bsc#1230119). * perf/x86/uncore: Support per PMU cpumask (bsc#1230119). * perf/x86: Fix smp_processor_id()-in-preemptible warnings (git-fixes). * perf/x86: Serialize set_attr_rdpmc() (git-fixes). * perf: Fix default aux_watermark calculation (git-fixes). * perf: Fix event leak upon exit (git-fixes). * perf: Fix perf_aux_size() for greater-than 32-bit size (git-fixes). * perf: Prevent passing zero nr_pages to rb_alloc_aux() (git-fixes). * perf: script: add raw|disasm arguments to --insn-trace option (git-fixes). * phy: zynqmp: Take the phy mutex in xlate (stable-fixes). * pinctrl: at91: make it work with current gpiolib (stable-fixes). * pinctrl: meteorlake: Add Arrow Lake-H/U ACPI ID (stable-fixes). * pinctrl: single: fix missing error code in pcs_probe() (git-fixes). * platform/chrome: cros_ec_lpc: MEC access can use an AML mutex (stable- fixes). * platform/surface: aggregator_registry: Add Support for Surface Pro 10 (stable-fixes). * platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes). * platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes). * platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes). * platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git- fixes). * platform/x86: x86-android-tablets: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes). * power: supply: axp20x_battery: Remove design from min and max voltage (git- fixes). * power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes). * power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes). * powercap/intel_rapl: Add support for AMD family 1Ah (stable-fixes). * powerpc/qspinlock: Fix deadlock in MCS queue (bac#1230295 ltc#206656). * pwm: xilinx: Fix u32 overflow issue in 32-bit width PWM mode (stable-fixes). * r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes). * regmap: maple: work around gcc-14.1 false-positive warning (stable-fixes). * regmap: spi: Fix potential off-by-one when calculating reserved size (stable-fixes). * regulator: Return actual error in of_regulator_bulk_get_all() (git-fixes). * regulator: core: Fix regulator_is_supported_voltage() kerneldoc return value (git-fixes). * regulator: core: Fix short description for _regulator_check_status_enabled() (git-fixes). * regulator: core: Stub devm_regulator_bulk_get_const() if !CONFIG_REGULATOR (git-fixes). * regulator: rt5120: Convert comma to semicolon (git-fixes). * regulator: wm831x-isink: Convert comma to semicolon (git-fixes). * remoteproc: imx_rproc: Correct ddr alias for i.MX8M (git-fixes). * remoteproc: imx_rproc: Initialize workqueue earlier (git-fixes). * remoteproc: k3-r5: Fix error handling when power-up failed (git-fixes). * reset: berlin: fix OF node leak in probe() error path (git-fixes). * reset: k210: fix OF node leak in probe() error path (git-fixes). * resource: fix region_intersects() vs add_memory_driver_managed() (git- fixes). * rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY gcc version dependent, at least on ppc * rtc: at91sam9: fix OF node leak in probe() error path (git-fixes). * s390/dasd: Fix redundant /proc/dasd* entries removal (bsc#1227694). * s390/dasd: Remove DMA alignment (LTC#208933 bsc#1230426 git-fixes). * s390/mm: Convert gmap_make_secure to use a folio (git-fixes bsc#1230562). * s390/mm: Convert make_page_secure to use a folio (git-fixes bsc#1230563). * s390: allow pte_offset_map_lock() to fail (git-fixes bsc#1230564). * scripts: kconfig: merge_config: config files: add a trailing newline (stable-fixes). * scripts: sphinx-pre-install: remove unnecessary double check for $cur_version (git-fixes). * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix overflow build issue (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429 jsc#PED-9899). * scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848). * selftests: lib: remove strscpy test (git-fixes). * selinux,smack: do not bypass permissions check in inode_setsecctx hook (stable-fixes). * soc: fsl: cpm1: tsa: Fix tsa_write8() (git-fixes). * soc: versatile: integrator: fix OF node leak in probe() error path (git- fixes). * spi: atmel-quadspi: Avoid overwriting delay register settings (git-fixes). * spi: atmel-quadspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: bcm63xx: Enable module autoloading (stable-fixes). * spi: bcm63xx: Fix module autoloading (git-fixes). * spi: meson-spicc: convert comma to semicolon (git-fixes). * spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes). * spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes). * spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes). * spi: rockchip: Resolve unbalanced runtime PM / system PM handling (git- fixes). * spi: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: spidev: Add an entry for elgin,jg10309-01 (stable-fixes). * spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes). * staging: iio: frequency: ad9834: Validate frequency parameter value (git- fixes). * supported.conf: mark adiantum and xctr crypto modules as supported (bsc#1231035) * thunderbolt: Fix XDomain rx_lanes_show and tx_lanes_show (git-fixes). * thunderbolt: Fix calculation of consumed USB3 bandwidth on a path (git- fixes). * thunderbolt: Fix rollback in tb_port_lane_bonding_enable() for lane 1 (git- fixes). * thunderbolt: There are only 5 basic router registers in pre-USB4 routers (git-fixes). * tomoyo: fallback to realpath if symlink's pathname does not exist (git- fixes). * tools/perf: Fix the string match for "/tmp/perf-$PID.map" files in dso__load (git-fixes). * tpm: Clean up TPM space after command failure (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usb: cdnsp: Fix incorrect usb_request status (git-fixes). * usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes). * usb: dwc2: drd: fix clock gating on USB role switch (git-fixes). * usb: dwc3: Avoid waking up gadget during startxfer (git-fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (git- fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (stable-fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes). * usb: gadget: aspeed_udc: validate endpoint index for ast udc (stable-fixes). * usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes). * usb: typec: ucsi: Wait 20ms before reading CCI after a reset (git-fixes). * usb: uas: set host status byte on data completion error (stable-fixes). * usbip: Do not submit special requests twice (stable-fixes). * usbnet: ipheth: add CDC NCM support (git-fixes). * usbnet: ipheth: do not stop RX on failing RX callback (git-fixes). * usbnet: ipheth: drop RX URBs with no payload (git-fixes). * usbnet: ipheth: fix carrier detection in modes 1 and 4 (git-fixes). * usbnet: ipheth: fix risk of NULL pointer deallocation (git-fixes). * usbnet: ipheth: race between ipheth_close and error handling (stable-fixes). * usbnet: ipheth: remove extraneous rx URB length check (git-fixes). * usbnet: ipheth: transmit URBs without trailing padding (git-fixes). * usbnet: modern method to get random MAC (git-fixes). * virtio-net: synchronize probe with ndo_set_features (git-fixes). * virtio_net: Fix napi_skb_cache_put warning (git-fixes). * virtio_net: fixing XDP for fully checksummed packets handling (git-fixes). * watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes). * wifi: ath11k: initialize 'ret' in ath11k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: fix BSS chan info request WMI command (git-fixes). * wifi: ath12k: fix firmware crash due to invalid peer nss (stable-fixes). * wifi: ath12k: fix invalid AMPDU factor calculation in ath12k_peer_assoc_h_he() (git-fixes). * wifi: ath12k: fix uninitialize symbol error on ath12k_peer_assoc_h_he() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_dp_rxdma_ring_sel_config_wcn7850() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: match WMI BSS chan info structure with firmware definition (git-fixes). * wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes). * wifi: brcmfmac: introducing fwil query functions (git-fixes). * wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes). * wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes). * wifi: cfg80211: fix bug of mapping AF3x to incorrect User Priority (git- fixes). * wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git- fixes). * wifi: cfg80211: make hash table duplicates more survivable (stable-fixes). * wifi: cfg80211: restrict operation during radar detection (stable-fixes). * wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes). * wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes). * wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (stable- fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_max_scan_ie_fw_cmd_room() (stable-fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes). * wifi: iwlwifi: mvm: increase the time between ranging measurements (git- fixes). * wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (stable-fixes). * wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check (stable-fixes). * wifi: mac80211: check ieee80211_bss_info_change_notify() against MLD (stable-fixes). * wifi: mac80211: do not use rate mask for offchannel TX either (git-fixes). * wifi: mac80211: fix the comeback long retry times (git-fixes). * wifi: mac80211: free skb on error path in ieee80211_beacon_get_ap() (stable- fixes). * wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git- fixes). * wifi: mt76: connac: fix checksum offload fields of connac3 RXD (git-fixes). * wifi: mt76: mt7603: fix mixed declarations and code (git-fixes). * wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: fix oops on non-dbdc mt7986 (git-fixes). * wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7921: Check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change (stable-fixes). * wifi: mt76: mt7921: fix wrong UNII-4 freq range check for the channel usage (git-fixes). * wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc (git-fixes). * wifi: mt76: mt7996: fix EHT beamforming capability check (git-fixes). * wifi: mt76: mt7996: fix HE and EHT beamforming capabilities (git-fixes). * wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he (git-fixes). * wifi: mt76: mt7996: fix traffic delay when switching back to working channel (git-fixes). * wifi: mt76: mt7996: fix uninitialized TLV data (git-fixes). * wifi: mt76: mt7996: fix wmm set of station interface to 3 (git-fixes). * wifi: mt76: mt7996: use hweight16 to get correct tx antenna (git-fixes). * wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes). * wifi: rtw88: 8822c: Fix reported RX band width (git-fixes). * wifi: rtw88: always wait for both firmware loading attempts (git-fixes). * wifi: rtw88: remove CPT execution branch never used (git-fixes). * wifi: rtw88: usb: schedule rx work after everything is set up (stable- fixes). * wifi: rtw89: ser: avoid multiple deinit on same CAM (stable-fixes). * wifi: rtw89: wow: prevent to send unexpected H2C during download Firmware (stable-fixes). * wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes). * x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes). * x86/kaslr: Expose and use the end of the physical memory address space (bsc#1229443). * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). * x86/mm: Use lookup_address_in_pgd_attr() in show_fault_oops() (bsc#1221527). * x86/pat: Fix W^X violation false-positives when running as Xen PV guest (bsc#1221527). * x86/pat: Introduce lookup_address_in_pgd_attr() (bsc#1221527). * x86/pat: Restructure _lookup_address_cpa() (bsc#1221527). * xen/swiotlb: add alignment check for dma buffers (bsc#1229928). * xen/swiotlb: fix allocated size (git-fixes). * xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003). * xen: allow mapping ACPI data using a different physical address (bsc#1226003). * xen: introduce generic helper checking for memory map conflicts (bsc#1226003). * xen: move checks for e820 conflicts further up (bsc#1226003). * xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003). * xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003). * xen: use correct end address of kernel for conflict checking (bsc#1226003). * xfs: restrict when we try to align cow fork delalloc to cowextsz hints (git- fixes). * xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git- fixes). * xz: cleanup CRC32 edits from 2018 (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3564=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3564=1 * SUSE Real Time Module 15-SP6 zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2024-3564=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.14.1 * ocfs2-kmp-rt-6.4.0-150600.10.14.1 * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.14.1 * reiserfs-kmp-rt-6.4.0-150600.10.14.1 * kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.14.1 * kernel-syms-rt-6.4.0-150600.10.14.1 * reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.14.1 * kernel-rt-optional-6.4.0-150600.10.14.1 * kernel-rt-optional-debuginfo-6.4.0-150600.10.14.1 * kernel-rt-extra-debuginfo-6.4.0-150600.10.14.1 * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.14.1 * kernel-rt-devel-debuginfo-6.4.0-150600.10.14.1 * dlm-kmp-rt-6.4.0-150600.10.14.1 * dlm-kmp-rt-debuginfo-6.4.0-150600.10.14.1 * kselftests-kmp-rt-debuginfo-6.4.0-150600.10.14.1 * kernel-rt-devel-6.4.0-150600.10.14.1 * kernel-rt_debug-livepatch-devel-6.4.0-150600.10.14.1 * kernel-rt-extra-6.4.0-150600.10.14.1 * kernel-rt-vdso-6.4.0-150600.10.14.1 * kernel-rt-livepatch-devel-6.4.0-150600.10.14.1 * gfs2-kmp-rt-6.4.0-150600.10.14.1 * kernel-rt-vdso-debuginfo-6.4.0-150600.10.14.1 * kernel-rt_debug-debugsource-6.4.0-150600.10.14.1 * cluster-md-kmp-rt-6.4.0-150600.10.14.1 * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.14.1 * kselftests-kmp-rt-6.4.0-150600.10.14.1 * kernel-rt-debuginfo-6.4.0-150600.10.14.1 * kernel-rt-debugsource-6.4.0-150600.10.14.1 * kernel-rt_debug-vdso-6.4.0-150600.10.14.1 * kernel-rt_debug-devel-6.4.0-150600.10.14.1 * kernel-rt_debug-debuginfo-6.4.0-150600.10.14.1 * openSUSE Leap 15.6 (noarch) * kernel-devel-rt-6.4.0-150600.10.14.1 * kernel-source-rt-6.4.0-150600.10.14.1 * openSUSE Leap 15.6 (nosrc x86_64) * kernel-rt_debug-6.4.0-150600.10.14.1 * kernel-rt-6.4.0-150600.10.14.1 * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_14-rt-debuginfo-1-150600.1.3.1 * kernel-livepatch-6_4_0-150600_10_14-rt-1-150600.1.3.1 * kernel-livepatch-SLE15-SP6-RT_Update_4-debugsource-1-150600.1.3.1 * SUSE Real Time Module 15-SP6 (x86_64) * dlm-kmp-rt-6.4.0-150600.10.14.1 * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.14.1 * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.14.1 * ocfs2-kmp-rt-6.4.0-150600.10.14.1 * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.14.1 * gfs2-kmp-rt-6.4.0-150600.10.14.1 * dlm-kmp-rt-debuginfo-6.4.0-150600.10.14.1 * kernel-syms-rt-6.4.0-150600.10.14.1 * kernel-rt-debuginfo-6.4.0-150600.10.14.1 * kernel-rt-debugsource-6.4.0-150600.10.14.1 * kernel-rt-devel-6.4.0-150600.10.14.1 * kernel-rt_debug-debugsource-6.4.0-150600.10.14.1 * cluster-md-kmp-rt-6.4.0-150600.10.14.1 * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.14.1 * kernel-rt_debug-devel-6.4.0-150600.10.14.1 * kernel-rt_debug-debuginfo-6.4.0-150600.10.14.1 * kernel-rt-devel-debuginfo-6.4.0-150600.10.14.1 * SUSE Real Time Module 15-SP6 (noarch) * kernel-devel-rt-6.4.0-150600.10.14.1 * kernel-source-rt-6.4.0-150600.10.14.1 * SUSE Real Time Module 15-SP6 (nosrc x86_64) * kernel-rt_debug-6.4.0-150600.10.14.1 * kernel-rt-6.4.0-150600.10.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52610.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2023-52916.html * https://www.suse.com/security/cve/CVE-2024-26640.html * https://www.suse.com/security/cve/CVE-2024-26759.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-36953.html * https://www.suse.com/security/cve/CVE-2024-38538.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-40965.html * https://www.suse.com/security/cve/CVE-2024-40973.html * https://www.suse.com/security/cve/CVE-2024-40983.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42243.html * https://www.suse.com/security/cve/CVE-2024-42252.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42294.html * https://www.suse.com/security/cve/CVE-2024-42304.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43828.html * https://www.suse.com/security/cve/CVE-2024-43832.html * https://www.suse.com/security/cve/CVE-2024-43835.html * https://www.suse.com/security/cve/CVE-2024-43845.html * https://www.suse.com/security/cve/CVE-2024-43870.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43904.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44935.html * https://www.suse.com/security/cve/CVE-2024-44944.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44951.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44960.html * https://www.suse.com/security/cve/CVE-2024-44961.html * https://www.suse.com/security/cve/CVE-2024-44962.html * https://www.suse.com/security/cve/CVE-2024-44965.html * https://www.suse.com/security/cve/CVE-2024-44967.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44970.html * https://www.suse.com/security/cve/CVE-2024-44971.html * https://www.suse.com/security/cve/CVE-2024-44977.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44984.html * https://www.suse.com/security/cve/CVE-2024-44985.html * https://www.suse.com/security/cve/CVE-2024-44986.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44988.html * https://www.suse.com/security/cve/CVE-2024-44989.html * https://www.suse.com/security/cve/CVE-2024-44990.html * https://www.suse.com/security/cve/CVE-2024-44991.html * https://www.suse.com/security/cve/CVE-2024-44997.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45000.html * https://www.suse.com/security/cve/CVE-2024-45001.html * https://www.suse.com/security/cve/CVE-2024-45002.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45005.html * https://www.suse.com/security/cve/CVE-2024-45006.html * https://www.suse.com/security/cve/CVE-2024-45007.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-45011.html * https://www.suse.com/security/cve/CVE-2024-45012.html * https://www.suse.com/security/cve/CVE-2024-45013.html * https://www.suse.com/security/cve/CVE-2024-45015.html * https://www.suse.com/security/cve/CVE-2024-45017.html * https://www.suse.com/security/cve/CVE-2024-45018.html * https://www.suse.com/security/cve/CVE-2024-45019.html * https://www.suse.com/security/cve/CVE-2024-45020.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-45022.html * https://www.suse.com/security/cve/CVE-2024-45023.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-45028.html * https://www.suse.com/security/cve/CVE-2024-45029.html * https://www.suse.com/security/cve/CVE-2024-45030.html * https://www.suse.com/security/cve/CVE-2024-46672.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46687.html * https://www.suse.com/security/cve/CVE-2024-46689.html * https://www.suse.com/security/cve/CVE-2024-46691.html * https://www.suse.com/security/cve/CVE-2024-46692.html * https://www.suse.com/security/cve/CVE-2024-46693.html * https://www.suse.com/security/cve/CVE-2024-46694.html * https://www.suse.com/security/cve/CVE-2024-46695.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46706.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46709.html * https://www.suse.com/security/cve/CVE-2024-46710.html * https://www.suse.com/security/cve/CVE-2024-46714.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46716.html * https://www.suse.com/security/cve/CVE-2024-46717.html * https://www.suse.com/security/cve/CVE-2024-46719.html * https://www.suse.com/security/cve/CVE-2024-46720.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46724.html * https://www.suse.com/security/cve/CVE-2024-46725.html * https://www.suse.com/security/cve/CVE-2024-46726.html * https://www.suse.com/security/cve/CVE-2024-46728.html * https://www.suse.com/security/cve/CVE-2024-46729.html * https://www.suse.com/security/cve/CVE-2024-46730.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46732.html * https://www.suse.com/security/cve/CVE-2024-46734.html * https://www.suse.com/security/cve/CVE-2024-46735.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46741.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46746.html * https://www.suse.com/security/cve/CVE-2024-46747.html * https://www.suse.com/security/cve/CVE-2024-46749.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46751.html * https://www.suse.com/security/cve/CVE-2024-46752.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46755.html * https://www.suse.com/security/cve/CVE-2024-46756.html * https://www.suse.com/security/cve/CVE-2024-46757.html * https://www.suse.com/security/cve/CVE-2024-46758.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46760.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46767.html * https://www.suse.com/security/cve/CVE-2024-46771.html * https://www.suse.com/security/cve/CVE-2024-46772.html * https://www.suse.com/security/cve/CVE-2024-46773.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46776.html * https://www.suse.com/security/cve/CVE-2024-46778.html * https://www.suse.com/security/cve/CVE-2024-46780.html * https://www.suse.com/security/cve/CVE-2024-46781.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46786.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46791.html * https://www.suse.com/security/cve/CVE-2024-46794.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46798.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221527 * https://bugzilla.suse.com/show_bug.cgi?id=1221610 * https://bugzilla.suse.com/show_bug.cgi?id=1221650 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1225487 * https://bugzilla.suse.com/show_bug.cgi?id=1225812 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226507 * https://bugzilla.suse.com/show_bug.cgi?id=1226606 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227694 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227819 * https://bugzilla.suse.com/show_bug.cgi?id=1227885 * https://bugzilla.suse.com/show_bug.cgi?id=1227890 * https://bugzilla.suse.com/show_bug.cgi?id=1227962 * https://bugzilla.suse.com/show_bug.cgi?id=1228090 * https://bugzilla.suse.com/show_bug.cgi?id=1228140 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228771 * https://bugzilla.suse.com/show_bug.cgi?id=1229001 * https://bugzilla.suse.com/show_bug.cgi?id=1229004 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229289 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229364 * https://bugzilla.suse.com/show_bug.cgi?id=1229371 * https://bugzilla.suse.com/show_bug.cgi?id=1229380 * https://bugzilla.suse.com/show_bug.cgi?id=1229389 * https://bugzilla.suse.com/show_bug.cgi?id=1229394 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229443 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229494 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229768 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229810 * https://bugzilla.suse.com/show_bug.cgi?id=1229899 * https://bugzilla.suse.com/show_bug.cgi?id=1229928 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230119 * https://bugzilla.suse.com/show_bug.cgi?id=1230123 * https://bugzilla.suse.com/show_bug.cgi?id=1230124 * https://bugzilla.suse.com/show_bug.cgi?id=1230125 * https://bugzilla.suse.com/show_bug.cgi?id=1230169 * https://bugzilla.suse.com/show_bug.cgi?id=1230170 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230173 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230175 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230181 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230191 * https://bugzilla.suse.com/show_bug.cgi?id=1230192 * https://bugzilla.suse.com/show_bug.cgi?id=1230193 * https://bugzilla.suse.com/show_bug.cgi?id=1230194 * https://bugzilla.suse.com/show_bug.cgi?id=1230195 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230206 * https://bugzilla.suse.com/show_bug.cgi?id=1230207 * https://bugzilla.suse.com/show_bug.cgi?id=1230209 * https://bugzilla.suse.com/show_bug.cgi?id=1230211 * https://bugzilla.suse.com/show_bug.cgi?id=1230213 * https://bugzilla.suse.com/show_bug.cgi?id=1230217 * https://bugzilla.suse.com/show_bug.cgi?id=1230221 * https://bugzilla.suse.com/show_bug.cgi?id=1230224 * https://bugzilla.suse.com/show_bug.cgi?id=1230230 * https://bugzilla.suse.com/show_bug.cgi?id=1230232 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230240 * https://bugzilla.suse.com/show_bug.cgi?id=1230244 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230247 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230269 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230340 * https://bugzilla.suse.com/show_bug.cgi?id=1230426 * https://bugzilla.suse.com/show_bug.cgi?id=1230430 * https://bugzilla.suse.com/show_bug.cgi?id=1230431 * https://bugzilla.suse.com/show_bug.cgi?id=1230432 * https://bugzilla.suse.com/show_bug.cgi?id=1230433 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230435 * https://bugzilla.suse.com/show_bug.cgi?id=1230440 * https://bugzilla.suse.com/show_bug.cgi?id=1230441 * https://bugzilla.suse.com/show_bug.cgi?id=1230442 * https://bugzilla.suse.com/show_bug.cgi?id=1230444 * https://bugzilla.suse.com/show_bug.cgi?id=1230450 * https://bugzilla.suse.com/show_bug.cgi?id=1230451 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1230455 * https://bugzilla.suse.com/show_bug.cgi?id=1230457 * https://bugzilla.suse.com/show_bug.cgi?id=1230459 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230511 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230518 * https://bugzilla.suse.com/show_bug.cgi?id=1230519 * https://bugzilla.suse.com/show_bug.cgi?id=1230520 * https://bugzilla.suse.com/show_bug.cgi?id=1230521 * https://bugzilla.suse.com/show_bug.cgi?id=1230524 * https://bugzilla.suse.com/show_bug.cgi?id=1230526 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230539 * https://bugzilla.suse.com/show_bug.cgi?id=1230540 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230562 * https://bugzilla.suse.com/show_bug.cgi?id=1230563 * https://bugzilla.suse.com/show_bug.cgi?id=1230564 * https://bugzilla.suse.com/show_bug.cgi?id=1230580 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230602 * https://bugzilla.suse.com/show_bug.cgi?id=1230699 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230701 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230703 * https://bugzilla.suse.com/show_bug.cgi?id=1230704 * https://bugzilla.suse.com/show_bug.cgi?id=1230705 * https://bugzilla.suse.com/show_bug.cgi?id=1230706 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230711 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230715 * https://bugzilla.suse.com/show_bug.cgi?id=1230719 * https://bugzilla.suse.com/show_bug.cgi?id=1230722 * https://bugzilla.suse.com/show_bug.cgi?id=1230724 * https://bugzilla.suse.com/show_bug.cgi?id=1230725 * https://bugzilla.suse.com/show_bug.cgi?id=1230726 * https://bugzilla.suse.com/show_bug.cgi?id=1230727 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230749 * https://bugzilla.suse.com/show_bug.cgi?id=1230751 * https://bugzilla.suse.com/show_bug.cgi?id=1230752 * https://bugzilla.suse.com/show_bug.cgi?id=1230753 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230766 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230768 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230772 * https://bugzilla.suse.com/show_bug.cgi?id=1230775 * https://bugzilla.suse.com/show_bug.cgi?id=1230776 * https://bugzilla.suse.com/show_bug.cgi?id=1230780 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230786 * https://bugzilla.suse.com/show_bug.cgi?id=1230787 * https://bugzilla.suse.com/show_bug.cgi?id=1230791 * https://bugzilla.suse.com/show_bug.cgi?id=1230794 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230802 * https://bugzilla.suse.com/show_bug.cgi?id=1230806 * https://bugzilla.suse.com/show_bug.cgi?id=1230808 * https://bugzilla.suse.com/show_bug.cgi?id=1230809 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230812 * https://bugzilla.suse.com/show_bug.cgi?id=1230813 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230821 * https://bugzilla.suse.com/show_bug.cgi?id=1230825 * https://bugzilla.suse.com/show_bug.cgi?id=1230830 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230854 * https://bugzilla.suse.com/show_bug.cgi?id=1230948 * https://bugzilla.suse.com/show_bug.cgi?id=1231008 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://jira.suse.com/browse/PED-10954 * https://jira.suse.com/browse/PED-9899 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 12:34:19 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 12:34:19 -0000 Subject: SUSE-SU-2024:3559-1: important: Security update for the Linux Kernel Message-ID: <172847725959.6932.14926250444156696036@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3559-1 Release Date: 2024-10-09T08:19:22Z Rating: important References: * bsc#1054914 * bsc#1065729 * bsc#1207341 * bsc#1225316 * bsc#1226846 * bsc#1226860 * bsc#1226878 * bsc#1227487 * bsc#1227941 * bsc#1227952 * bsc#1227953 * bsc#1228000 * bsc#1228002 * bsc#1228068 * bsc#1228507 * bsc#1228615 * bsc#1228620 * bsc#1228635 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229456 * bsc#1229457 * bsc#1229633 * bsc#1229645 * bsc#1229739 * bsc#1229753 * bsc#1229764 * bsc#1229790 * bsc#1229830 * bsc#1230015 * bsc#1230151 * bsc#1230171 * bsc#1230174 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230185 * bsc#1230200 * bsc#1230204 * bsc#1230233 * bsc#1230248 * bsc#1230270 * bsc#1230398 * bsc#1230506 * bsc#1230515 * bsc#1230517 * bsc#1230533 * bsc#1230535 * bsc#1230549 * bsc#1230556 * bsc#1230582 * bsc#1230589 * bsc#1230700 * bsc#1230702 * bsc#1230709 * bsc#1230710 * bsc#1230712 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230747 * bsc#1230748 * bsc#1230756 * bsc#1230761 * bsc#1230763 * bsc#1230767 * bsc#1230771 * bsc#1230783 * bsc#1230796 * bsc#1230810 * bsc#1230814 * bsc#1230815 * bsc#1230826 * bsc#1231083 * bsc#1231084 * bsc#1231089 * bsc#1231120 * bsc#1231146 * bsc#1231184 Cross-References: * CVE-2021-47387 * CVE-2022-48788 * CVE-2022-48789 * CVE-2022-48790 * CVE-2022-48791 * CVE-2022-48799 * CVE-2022-48844 * CVE-2022-48911 * CVE-2022-48943 * CVE-2022-48945 * CVE-2023-52915 * CVE-2024-38381 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-41073 * CVE-2024-41079 * CVE-2024-41082 * CVE-2024-42154 * CVE-2024-42265 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43884 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43912 * CVE-2024-43914 * CVE-2024-44946 * CVE-2024-44947 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44969 * CVE-2024-44982 * CVE-2024-44987 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45008 * CVE-2024-46673 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46702 * CVE-2024-46707 * CVE-2024-46715 * CVE-2024-46721 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46731 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46750 * CVE-2024-46753 * CVE-2024-46759 * CVE-2024-46761 * CVE-2024-46770 * CVE-2024-46774 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46787 * CVE-2024-46822 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46859 CVSS scores: * CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48799 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48844 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38381 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38381 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43884 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43912 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves 71 vulnerabilities and has nine security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47387: cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory (bsc#1225316). * CVE-2022-48788: nvme-rdma: fix possible use-after-free in transport error_recovery work (bsc#1227952). * CVE-2022-48789: nvme-tcp: fix possible use-after-free in transport error_recovery work (bsc#1228000). * CVE-2022-48790: nvme: fix a possible use-after-free in controller reset during load (bsc#1227941). * CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002) * CVE-2022-48799: perf: Fix list corruption in perf_cgroup_switch() (bsc#1227953). * CVE-2022-48844: Bluetooth: hci_core: Fix leaking sent_cmd skb (bsc#1228068). * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). * CVE-2022-48943: KVM: x86/mmu: make apf token non-zero to fix bug (bsc#1229645). * CVE-2022-48945: media: vivid: fix compose size exceed boundary (bsc#1230398). * CVE-2023-52915: media: dvb-usb-v2: af9035: fix missing unlock (bsc#1230270). * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-41073: nvme: avoid double free special payload (bsc#1228635). * CVE-2024-41079: nvmet: always initialize cqe.result (bsc#1228615). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620 CVE-2024-41082). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-43884: Add error handling to pair_device() (bsc#1229739) * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830) * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44948: x86/mtrr: Check if fixed MTRRs exist before saving them (bsc#1230174). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race (bsc#1230178). * CVE-2024-44954: ALSA: line6: Fix racy access to midibuf (bsc#1230176). * CVE-2024-44969: s390/sclp: Prevent release of buffer in I/O (bsc#1230200). * CVE-2024-44982: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (bsc#1230204). * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45008: Input: MT - limit max slots (bsc#1230248). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46675: usb: dwc3: core: Prevent USB core invalid event buffer address access (bsc#1230533). * CVE-2024-46676: nfc: pn533: Add poll mod list filling check (bsc#1230535). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515) * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589) * CVE-2024-46707: KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (bsc#1230582). * CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access (bsc#1230700). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46722: drm/amdgpu: fix mc_data out-of-bounds read warning (bsc#1230712). * CVE-2024-46723: drm/amdgpu: fix ucode out-of-bounds read warning (bsc#1230702). * CVE-2024-46731: drm/amd/pm: fix the Out-of-bounds read warning (bsc#1230709). * CVE-2024-46738: VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (bsc#1230731). * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46744: Squashfs: sanity check symbolic link size (bsc#1230747). * CVE-2024-46745: Input: uinput - reject requests with unreasonable number of slots (bsc#1230748). * CVE-2024-46750: PCI: Add missing bridge lock to pci_bus_lock() (bsc#1230783). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46759: hwmon: (adc128d818) Fix underflows seen when writing limit attributes (bsc#1230814). * CVE-2024-46761: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (bsc#1230761). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). * CVE-2024-46853: spi: nxp-fspi: fix the KASAN report out-of-bounds bug (bsc#1231083). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46859: platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (bsc#1231089). The following non-security bugs were fixed: * ACPI / EC: Clean up EC GPE mask flag (git-fixes). * ACPI: EC: Avoid printing confusing messages in acpi_ec_setup() (git-fixes). * ACPI: EC: Fix an EC event IRQ storming issue (git-fixes). * ACPI: EC: tweak naming in preparation for GpioInt support (git-fixes). * ACPI: SPCR: Consider baud rate 0 as preconfigured state (git-fixes). * ACPI: SPCR: Workaround for APM X-Gene 8250 UART 32-alignment errata (git- fixes). * ACPI: SPCR: work around clock issue on xgene UART (git-fixes). * ACPI: blacklist: fix clang warning for unused DMI table (git-fixes). * ACPI: video: Add new hw_changes_brightness quirk, set it on PB Easynote MZ35 (git-fixes). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Fix bsc#1054914 reference. * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * Revert "ACPI / EC: Remove old CLEAR_ON_RESUME quirk" (git-fixes). * af_unix: Fix data races around sk->sk_shutdown (bsc#1226846). * af_unix: Fix data-races around sk->sk_shutdown (git-fixes). * af_unix: annotate lockless accesses to sk->sk_err (bsc#1226846). * autofs4: use wait_event_killable (bsc#1207341). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231184). * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230151). * kabi fix for proc/mounts: add cursor (bsc#1207341). * kabi/severities: Ignore ppc instruction emulation (bsc#1230826 ltc#205848) These are lowlevel functions not used outside of exception handling and kernel debugging facilities. * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * media: vivid: avoid integer overflow (git-fixes). * media: vivid: dev->bitmap_cap wasn't freed in all cases (git-fixes). * media: vivid: fix assignment of dev->fbuf_out_flags (git-fixes). * media: vivid: s_fbuf: add more sanity checks (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git- fixes). * net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git- fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * powerpc sstep: Add support for cnttzw, cnttzd instructions (bsc#1230826 ltc#205848). * powerpc sstep: Add support for extswsli instruction (bsc#1230826 ltc#205848). * powerpc sstep: Add support for modsd, modud instructions (bsc#1230826 ltc#205848). * powerpc sstep: Add support for modsw, moduw instructions (bsc#1230826 ltc#205848). * powerpc/32: Move the inline keyword at the beginning of function declaration (bsc#1230826 ltc#205848). * powerpc/64: Fix update forms of loads and stores to write 64-bit EA (bsc#1230826 ltc#205848). * powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1230826 ltc#205848). * powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git- fixes). * powerpc/imc-pmu: Revert nest_init_lock to being a mutex (bsc#1065729). * powerpc/iommu: Annotate nested lock for lockdep (bsc#1065729). * powerpc/kprobes: Blacklist emulate_update_regs() from kprobes (bsc#1230826 ltc#205848). * powerpc/kprobes: Update optprobes to use emulate_update_regs() (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add XER bits introduced in POWER ISA v3.0 (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add bpermd instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add cmpb instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add isel instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add popcnt instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add prty instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix count leading zeros instructions (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix fixed-point arithmetic instructions that set CA32 (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix fixed-point shift instructions that set CA32 (bsc#1230826 ltc#205848). * powerpc/lib/sstep: fix 'ptesync' build error (bsc#1230826 ltc#205848). * powerpc/lib: Fix "integer constant is too large" build failure (bsc#1230826 ltc#205848). * powerpc/lib: fix redundant inclusion of quad.o (bsc#1230826 ltc#205848). * powerpc/ppc-opcode: Add divde and divdeu opcodes (bsc#1230826 ltc#205848). * powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1065729). * powerpc/sstep: Add support for divde[.] and divdeu[.] instructions (bsc#1230826 ltc#205848). * powerpc/sstep: Avoid used uninitialized error (bsc#1230826 ltc#205848). * powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1230826 ltc#205848). * powerpc/sstep: Fix darn emulation (bsc#1230826 ltc#205848). * powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1230826 ltc#205848). * powerpc/sstep: Fix issues with mcrf (bsc#1230826 ltc#205848). * powerpc/sstep: Fix issues with set_cr0() (bsc#1230826 ltc#205848). * powerpc/sstep: Fix kernel crash if VSX is not present (bsc#1230826 ltc#205848). * powerpc/sstep: Introduce GETTYPE macro (bsc#1230826 ltc#205848). * powerpc/sstep: mullw should calculate a 64 bit signed result (bsc#1230826 ltc#205848). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * powerpc: Add emulation for the addpcis instruction (bsc#1230826 ltc#205848). * powerpc: Change analyse_instr so it does not modify *regs (bsc#1230826 ltc#205848). * powerpc: Do not check MSR FP/VMX/VSX enable bits in analyse_instr() (bsc#1230826 ltc#205848). * powerpc: Do not update CR0 in emulation of popcnt, prty, bpermd instructions (bsc#1230826 ltc#205848). * powerpc: Emulate FP/vector/VSX loads/stores correctly when regs not live (bsc#1230826 ltc#205848). * powerpc: Emulate load/store floating double pair instructions (bsc#1230826 ltc#205848). * powerpc: Emulate load/store floating point as integer word instructions (bsc#1230826 ltc#205848). * powerpc: Emulate the dcbz instruction (bsc#1230826 ltc#205848). * powerpc: Emulate vector element load/store instructions (bsc#1230826 ltc#205848). * powerpc: Fix emulation of the isel instruction (bsc#1230826 ltc#205848). * powerpc: Fix handling of alignment interrupt on dcbz instruction (bsc#1230826 ltc#205848). * powerpc: Fix kernel crash in emulation of vector loads and stores (bsc#1230826 ltc#205848). * powerpc: Handle most loads and stores in instruction emulation code (bsc#1230826 ltc#205848). * powerpc: Handle opposite-endian processes in emulation code (bsc#1230826 ltc#205848). * powerpc: Make load/store emulation use larger memory accesses (bsc#1230826 ltc#205848). * powerpc: Remove support for PowerPC 601 (Remove unused and malformed assembly causing build error). * powerpc: Separate out load/store emulation into its own function (bsc#1230826 ltc#205848). * powerpc: Set regs->dar if memory access fails in emulate_step() (bsc#1230826 ltc#205848). * powerpc: Use instruction emulation infrastructure to handle alignment faults (bsc#1230826 ltc#205848). * powerpc: Wrap register number correctly for string load/store instructions (bsc#1230826 ltc#205848). * powerpc: sstep: Add support for darn instruction (bsc#1230826 ltc#205848). * powerpc: sstep: Add support for maddhd, maddhdu, maddld instructions (bsc#1230826 ltc#205848). * proc/mounts: add cursor (bsc#1207341). * profiling: fix shift too large makes kernel panic (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * usbnet: modern method to get random MAC (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3559=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3559=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3559=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3559=1 SUSE-SLE- HA-12-SP5-2024-3559=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-3559=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-3559=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-3559=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch nosrc) * kernel-docs-4.12.14-122.231.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-4.12.14-122.231.1 * kernel-obs-build-4.12.14-122.231.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 nosrc x86_64) * kernel-default-4.12.14-122.231.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * kernel-default-debuginfo-4.12.14-122.231.1 * kernel-default-base-4.12.14-122.231.1 * kernel-default-debugsource-4.12.14-122.231.1 * kernel-default-base-debuginfo-4.12.14-122.231.1 * kernel-default-devel-4.12.14-122.231.1 * kernel-syms-4.12.14-122.231.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-source-4.12.14-122.231.1 * kernel-devel-4.12.14-122.231.1 * kernel-macros-4.12.14-122.231.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.231.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-122.231.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-4.12.14-122.231.1 * kernel-default-base-4.12.14-122.231.1 * kernel-default-debugsource-4.12.14-122.231.1 * kernel-default-base-debuginfo-4.12.14-122.231.1 * kernel-default-devel-4.12.14-122.231.1 * kernel-syms-4.12.14-122.231.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-source-4.12.14-122.231.1 * kernel-devel-4.12.14-122.231.1 * kernel-macros-4.12.14-122.231.1 * SUSE Linux Enterprise Server 12 SP5 (s390x) * kernel-default-man-4.12.14-122.231.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.231.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le x86_64) * kernel-default-4.12.14-122.231.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * kernel-default-debuginfo-4.12.14-122.231.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.231.1 * kernel-default-base-4.12.14-122.231.1 * gfs2-kmp-default-4.12.14-122.231.1 * dlm-kmp-default-debuginfo-4.12.14-122.231.1 * kernel-default-debugsource-4.12.14-122.231.1 * gfs2-kmp-default-debuginfo-4.12.14-122.231.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.231.1 * ocfs2-kmp-default-4.12.14-122.231.1 * kernel-default-base-debuginfo-4.12.14-122.231.1 * cluster-md-kmp-default-4.12.14-122.231.1 * kernel-default-devel-4.12.14-122.231.1 * dlm-kmp-default-4.12.14-122.231.1 * kernel-syms-4.12.14-122.231.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-source-4.12.14-122.231.1 * kernel-devel-4.12.14-122.231.1 * kernel-macros-4.12.14-122.231.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.231.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (nosrc) * kernel-default-4.12.14-122.231.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * kernel-default-debuginfo-4.12.14-122.231.1 * kernel-default-extra-4.12.14-122.231.1 * kernel-default-extra-debuginfo-4.12.14-122.231.1 * kernel-default-debugsource-4.12.14-122.231.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64) * kernel-default-debuginfo-4.12.14-122.231.1 * gfs2-kmp-default-4.12.14-122.231.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.231.1 * dlm-kmp-default-debuginfo-4.12.14-122.231.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.231.1 * ocfs2-kmp-default-4.12.14-122.231.1 * cluster-md-kmp-default-4.12.14-122.231.1 * kernel-default-debugsource-4.12.14-122.231.1 * dlm-kmp-default-4.12.14-122.231.1 * gfs2-kmp-default-debuginfo-4.12.14-122.231.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc) * kernel-default-4.12.14-122.231.1 * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc) * kernel-default-4.12.14-122.231.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kernel-default-debuginfo-4.12.14-122.231.1 * kernel-default-debugsource-4.12.14-122.231.1 * kernel-default-kgraft-devel-4.12.14-122.231.1 * kgraft-patch-4_12_14-122_231-default-1-8.3.1 * kernel-default-kgraft-4.12.14-122.231.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47387.html * https://www.suse.com/security/cve/CVE-2022-48788.html * https://www.suse.com/security/cve/CVE-2022-48789.html * https://www.suse.com/security/cve/CVE-2022-48790.html * https://www.suse.com/security/cve/CVE-2022-48791.html * https://www.suse.com/security/cve/CVE-2022-48799.html * https://www.suse.com/security/cve/CVE-2022-48844.html * https://www.suse.com/security/cve/CVE-2022-48911.html * https://www.suse.com/security/cve/CVE-2022-48943.html * https://www.suse.com/security/cve/CVE-2022-48945.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2024-38381.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-41073.html * https://www.suse.com/security/cve/CVE-2024-41079.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43884.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43912.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://bugzilla.suse.com/show_bug.cgi?id=1054914 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1207341 * https://bugzilla.suse.com/show_bug.cgi?id=1225316 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1226878 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227941 * https://bugzilla.suse.com/show_bug.cgi?id=1227952 * https://bugzilla.suse.com/show_bug.cgi?id=1227953 * https://bugzilla.suse.com/show_bug.cgi?id=1228000 * https://bugzilla.suse.com/show_bug.cgi?id=1228002 * https://bugzilla.suse.com/show_bug.cgi?id=1228068 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228615 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228635 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229457 * https://bugzilla.suse.com/show_bug.cgi?id=1229633 * https://bugzilla.suse.com/show_bug.cgi?id=1229645 * https://bugzilla.suse.com/show_bug.cgi?id=1229739 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229830 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230151 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230398 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230826 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231184 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 12:36:20 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 12:36:20 -0000 Subject: SUSE-SU-2024:3569-1: important: Security update for the Linux Kernel Message-ID: <172847738052.6932.10777105832288548906@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3569-1 Release Date: 2024-10-09T11:52:14Z Rating: important References: * bsc#1199769 * bsc#1216223 * bsc#1220382 * bsc#1221610 * bsc#1221650 * bsc#1222629 * bsc#1222973 * bsc#1223600 * bsc#1223848 * bsc#1224085 * bsc#1225903 * bsc#1226003 * bsc#1226606 * bsc#1226662 * bsc#1226666 * bsc#1226846 * bsc#1226860 * bsc#1226875 * bsc#1226915 * bsc#1227487 * bsc#1227726 * bsc#1227819 * bsc#1227832 * bsc#1227890 * bsc#1228507 * bsc#1228576 * bsc#1228620 * bsc#1228771 * bsc#1229031 * bsc#1229034 * bsc#1229086 * bsc#1229156 * bsc#1229289 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229364 * bsc#1229394 * bsc#1229429 * bsc#1229453 * bsc#1229572 * bsc#1229573 * bsc#1229585 * bsc#1229607 * bsc#1229619 * bsc#1229633 * bsc#1229662 * bsc#1229753 * bsc#1229764 * bsc#1229790 * bsc#1229810 * bsc#1229830 * bsc#1229899 * bsc#1229928 * bsc#1229947 * bsc#1230015 * bsc#1230129 * bsc#1230130 * bsc#1230170 * bsc#1230171 * bsc#1230174 * bsc#1230175 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230185 * bsc#1230192 * bsc#1230193 * bsc#1230194 * bsc#1230200 * bsc#1230204 * bsc#1230209 * bsc#1230211 * bsc#1230212 * bsc#1230217 * bsc#1230224 * bsc#1230230 * bsc#1230233 * bsc#1230244 * bsc#1230245 * bsc#1230247 * bsc#1230248 * bsc#1230269 * bsc#1230339 * bsc#1230340 * bsc#1230392 * bsc#1230398 * bsc#1230431 * bsc#1230433 * bsc#1230434 * bsc#1230440 * bsc#1230442 * bsc#1230444 * bsc#1230450 * bsc#1230451 * bsc#1230454 * bsc#1230506 * bsc#1230507 * bsc#1230511 * bsc#1230515 * bsc#1230517 * bsc#1230524 * bsc#1230533 * bsc#1230535 * bsc#1230549 * bsc#1230556 * bsc#1230582 * bsc#1230589 * bsc#1230591 * bsc#1230592 * bsc#1230699 * bsc#1230700 * bsc#1230701 * bsc#1230702 * bsc#1230703 * bsc#1230705 * bsc#1230706 * bsc#1230707 * bsc#1230709 * bsc#1230710 * bsc#1230711 * bsc#1230712 * bsc#1230719 * bsc#1230724 * bsc#1230725 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230733 * bsc#1230747 * bsc#1230748 * bsc#1230751 * bsc#1230752 * bsc#1230756 * bsc#1230761 * bsc#1230766 * bsc#1230767 * bsc#1230768 * bsc#1230771 * bsc#1230772 * bsc#1230776 * bsc#1230783 * bsc#1230786 * bsc#1230791 * bsc#1230794 * bsc#1230796 * bsc#1230802 * bsc#1230806 * bsc#1230808 * bsc#1230810 * bsc#1230812 * bsc#1230813 * bsc#1230814 * bsc#1230815 * bsc#1230821 * bsc#1230825 * bsc#1230830 * bsc#1231013 * bsc#1231017 * bsc#1231116 * bsc#1231120 * bsc#1231146 * bsc#1231180 * bsc#1231181 Cross-References: * CVE-2022-48901 * CVE-2022-48911 * CVE-2022-48923 * CVE-2022-48935 * CVE-2022-48944 * CVE-2022-48945 * CVE-2023-52610 * CVE-2023-52916 * CVE-2024-26640 * CVE-2024-26759 * CVE-2024-26767 * CVE-2024-26804 * CVE-2024-26837 * CVE-2024-37353 * CVE-2024-38538 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-40910 * CVE-2024-40973 * CVE-2024-40983 * CVE-2024-41062 * CVE-2024-41082 * CVE-2024-42154 * CVE-2024-42259 * CVE-2024-42265 * CVE-2024-42304 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43828 * CVE-2024-43835 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43912 * CVE-2024-43914 * CVE-2024-44935 * CVE-2024-44944 * CVE-2024-44946 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44967 * CVE-2024-44969 * CVE-2024-44970 * CVE-2024-44971 * CVE-2024-44972 * CVE-2024-44977 * CVE-2024-44982 * CVE-2024-44986 * CVE-2024-44987 * CVE-2024-44988 * CVE-2024-44989 * CVE-2024-44990 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45000 * CVE-2024-45001 * CVE-2024-45003 * CVE-2024-45006 * CVE-2024-45007 * CVE-2024-45008 * CVE-2024-45011 * CVE-2024-45013 * CVE-2024-45015 * CVE-2024-45018 * CVE-2024-45020 * CVE-2024-45021 * CVE-2024-45026 * CVE-2024-45028 * CVE-2024-45029 * CVE-2024-46673 * CVE-2024-46674 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46689 * CVE-2024-46694 * CVE-2024-46702 * CVE-2024-46707 * CVE-2024-46714 * CVE-2024-46715 * CVE-2024-46717 * CVE-2024-46720 * CVE-2024-46721 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46724 * CVE-2024-46725 * CVE-2024-46726 * CVE-2024-46727 * CVE-2024-46728 * CVE-2024-46730 * CVE-2024-46731 * CVE-2024-46732 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46746 * CVE-2024-46747 * CVE-2024-46750 * CVE-2024-46751 * CVE-2024-46752 * CVE-2024-46753 * CVE-2024-46755 * CVE-2024-46756 * CVE-2024-46758 * CVE-2024-46759 * CVE-2024-46761 * CVE-2024-46771 * CVE-2024-46772 * CVE-2024-46773 * CVE-2024-46774 * CVE-2024-46778 * CVE-2024-46780 * CVE-2024-46781 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46786 * CVE-2024-46787 * CVE-2024-46791 * CVE-2024-46794 * CVE-2024-46798 * CVE-2024-46822 * CVE-2024-46830 CVSS scores: * CVE-2022-48901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48923 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48944 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48944 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-37353 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42259 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42259 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43912 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46724 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46747 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46752 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46756 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46756 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46758 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46758 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46786 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46794 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46798 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * Legacy Module 15-SP5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves 130 vulnerabilities and has 34 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-48901: btrfs: do not start relocation until in progress drops are done (bsc#1229607). * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). * CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662) * CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619) * CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610). * CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269). * CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650). * CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340). * CVE-2024-26767: drm/amd/display: fixed integer types and null check locations (bsc#1230339). * CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629). * CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973). * CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875). * CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606). * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819). * CVE-2024-41062: Sync sock recv cb and release (bsc#1228576). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620 CVE-2024-41082). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42259: Fix Virtual Memory mapping boundaries calculation (bsc#1229156) * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830) * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810). * CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race (bsc#1230178). * CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209). * CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211). * CVE-2024-44986: ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230230) * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192). * CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193). * CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). * CVE-2024-45007: char: xillybus: Refine workqueue handling (bsc#1230175). * CVE-2024-45008: Input: MT - limit max slots (bsc#1230248). * CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442). * CVE-2024-45015: drm/msm/dpu: move dpu_encoder's connector assignment to (bsc#1230444) * CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe error path (bsc#1230507). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515) * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46689: soc: qcom: cmd-db: Map shared memory as WC, not WB (bsc#1230524) * CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589) * CVE-2024-46707: KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (bsc#1230582). * CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access (bsc#1230700). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46728: drm/amd/display: Check index for aux_rd_interval before using (bsc#1230703) * CVE-2024-46730: drm/amd/display: Ensure array index tg_inst won't be -1 (bsc#1230701) * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786). * CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). * CVE-2024-46830: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (bsc#1231116). The following non-security bugs were fixed: * ACPI: battery: create alarm sysfs attribute atomically (git-fixes). * ACPI: CPPC: Fix MASK_VAL() usage (git-fixes). * ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git- fixes). * ACPI: processor: Fix memory leaks in error paths of processor_add() (stable- fixes). * ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes). * ACPI: SBS: manage alarm sysfs attribute through psy core (git-fixes). * ACPI: sysfs: validate return type of _STR method (git-fixes). * af_unix: annotate lockless accesses to sk->sk_err (bsc#1226846). * af_unix: Fix data races around sk->sk_shutdown (bsc#1226846). * af_unix: Fix data-races around sk->sk_shutdown (git-fixes). * ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes). * ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes). * ALSA: hda/conexant: Mute speakers at suspend / shutdown (stable-fixes). * ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown (stable-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes). * apparmor: fix possible NULL pointer dereference (stable-fixes). * arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes). * arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git- fixes). * arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git- fixes). * arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes). * arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585) * arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585) * arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585) * arm64: tlb: Fix TLBI RANGE operand (bsc#1229585) * arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585) * ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes). * ASoC: meson: axg-card: fix 'use-after-free' (git-fixes). * ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes). * ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes). * ASoC: tegra: Fix CBB error during probe() (git-fixes). * ASoC: topology: Properly initialize soc_enum values (stable-fixes). * ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes). * ata: pata_macio: Use WARN instead of BUG (stable-fixes). * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: add number of queue calc helper (bsc#1229034). * blk-mq: Build default queue map via group_cpus_evenly() (bsc#1229031). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * blk-mq: introduce blk_mq_dev_map_queues (bsc#1229034). * blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1229034). * blk-mq: use hk cpus only when isolcpus=io_queue is enabled (bsc#1229034). * Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes). * Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes). * Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git- fixes). * Bluetooth: L2CAP: Fix deadlock (git-fixes). * Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes). * cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231181). * cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231013). * can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes). * can: bcm: Remove proc entry when dev is unregistered (git-fixes). * can: j1939: use correct function name in comment (git-fixes). * can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git- fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231180). * char: xillybus: Check USB endpoints when probing device (git-fixes). * clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes). * clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git- fixes). * clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes). * cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes). * crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes). * crypto: virtio - Handle dataq logic with tasklet (git-fixes). * crypto: virtio - Wait for tasklet to complete on device remove (git-fixes). * crypto: xor - fix template benchmarking (git-fixes). * devres: Initialize an uninitialized struct member (stable-fixes). * driver core: Add debug logs when fwnode links are added/deleted (git-fixes). * driver core: Add missing parameter description to __fwnode_link_add() (git- fixes). * driver core: Create __fwnode_link_del() helper function (git-fixes). * driver core: fw_devlink: Allow marking a fwnode link as being part of a cycle (git-fixes). * driver core: fw_devlink: Consolidate device link flag computation (git- fixes). * driver core: Set deferred probe reason when deferred by driver core (git- fixes). * drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Drivers: hv: vmbus: Fix the misplaced function description (git-fixes). * drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes). * drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes). * drm/amd/amdgpu: Check tbo resource pointer (stable-fixes). * drm/amd/amdgpu: Properly tune the size of struct (git-fixes). * drm/amd/display: Add array index check for hdcp ddc access (stable-fixes). * drm/amd/display: added NULL check at start of dc_validate_stream (stable- fixes). * drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes). * drm/amd/display: Check denominator pbn_div before used (stable-fixes). * drm/amd/display: Check gpio_id before used as array index (stable-fixes). * drm/amd/display: Check HDCP returned status (stable-fixes). * drm/amd/display: Check msg_id before processing transcation (stable-fixes). * drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes). * drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes). * drm/amd/display: Ensure index calculation will not overflow (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes). * drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes). * drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable- fixes). * drm/amd/display: Spinlock before reading event (stable-fixes). * drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes). * drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes). * drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes). * drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes). * drm/amdgpu: fix a possible null pointer dereference (git-fixes). * drm/amdgpu: fix dereference after null check (stable-fixes). * drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes). * drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes). * drm/amdgpu: Fix out-of-bounds write warning (stable-fixes). * drm/amdgpu: fix overflowed array index read warning (stable-fixes). * drm/amdgpu: Fix smatch static checker warning (stable-fixes). * drm/amdgpu: fix the waring dereferencing hive (stable-fixes). * drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable- fixes). * drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes). * drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable- fixes). * drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes). * drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes). * drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes). * drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes). * drm/amdgpu: update type of buf size to u32 for eeprom functions (stable- fixes). * drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes). * drm/amd/pm: check negtive return for table entries (stable-fixes). * drm/amd/pm: check specific index for aldebaran (stable-fixes). * drm/amd/pm: Fix negative array index read (stable-fixes). * drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable- fixes). * drm/amd/pm: fix uninitialized variable warning (stable-fixes). * drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable- fixes). * drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes). * drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes). * drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes). * drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git- fixes). * drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes). * drm/meson: plane: Add error handling (stable-fixes). * drm/msm/a5xx: disable preemption in submits by default (git-fixes). * drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes). * drm/msm/a5xx: properly clear preemption records on resume (git-fixes). * drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes). * drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes). * drm/msm/disp/dpu: use atomic enable/disable callbacks for encoder (bsc#1230444) * drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes). * drm/msm: fix %s null argument error (git-fixes). * drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes). * drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git- fixes). * drm/radeon: fix null pointer dereference in radeon_add_common_modes (git- fixes). * drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git- fixes). * drm/rockchip: vop: Allow 4096px width scaling (git-fixes). * drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes). * exfat: fix memory leak in exfat_load_bitmap() (git-fixes). * fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes). * filemap: remove use of wait bookmarks (bsc#1224085). * firmware_loader: Block path traversal (git-fixes). * fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230592). * fuse: update stats for pages in dropped aux writeback list (bsc#1230130). * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230129). * genirq/affinity: Do not pass irq_affinity_desc array to irq_build_affinity_masks (bsc#1229031). * genirq/affinity: Move group_cpus_evenly() into lib/ (bsc#1229031). * genirq/affinity: Only build SMP-only helper functions on SMP kernels (bsc#1229031). * genirq/affinity: Pass affinity managed mask array to irq_build_affinity_masks (bsc#1229031). * genirq/affinity: Remove the 'firstvec' parameter from irq_build_affinity_masks (bsc#1229031). * genirq/affinity: Rename irq_build_affinity_masks as group_cpus_evenly (bsc#1229031). * genirq/affinity: Replace cpumask_weight() with cpumask_empty() where appropriate (bsc#1229031). * gfs2: setattr_chown: Add missing initialization (git-fixes). * HID: amd_sfh: free driver_data after destroying hid device (stable-fixes). * HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable- fixes). * hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable- fixes). * hwmon: (max16065) Fix overflows seen when writing limits (git-fixes). * hwmon: (ntc_thermistor) fix module autoloading (git-fixes). * hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes). * hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git- fixes). * hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git- fixes). * hwrng: mtk - Use devm_pm_runtime_enable (git-fixes). * i2c: aspeed: Update the stop sw state when the bus recovery occurs (git- fixes). * i2c: Fix conditional for substituting empty ACPI functions (stable-fixes). * i2c: isch: Add missed 'else' (git-fixes). * i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes). * i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes). * i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable- fixes). * IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes) * IB/hfi1: Fix potential deadlock on &irq_src_lock and &dd->uctxt_lock (git- fixes) * iio: adc: ad7124: fix chip ID mismatch (git-fixes). * iio: adc: ad7124: fix config comparison (git-fixes). * iio: adc: ad7606: fix oversampling gpio array (git-fixes). * iio: adc: ad7606: fix standby gpio state to match the documentation (git- fixes). * iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes). * iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git- fixes). * iio: fix scale application in iio_convert_raw_to_processed_unlocked (git- fixes). * iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes). * Input: ilitek_ts_i2c - add report id message validation (git-fixes). * Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes). * Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Input: uinput - reject requests with unreasonable number of slots (stable- fixes). * ipmi: docs: do not advertise deprecated sysfs entries (git-fixes). * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipmi:ssif: Improve detecting during probing (bsc#1228771) * jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes). * kabi: add __nf_queue_get_refs() for kabi compliance. * kABI, crypto: virtio - Handle dataq logic with tasklet (git-fixes). * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * lib/group_cpus.c: avoid acquiring cpu hotplug lock in group_cpus_evenly (bsc#1229031). * lib/group_cpus.c: honor housekeeping config when grouping CPUs (bsc#1229034). * lib/group_cpus: Export group_cpus_evenly() (bsc#1229031). * lirc: rc_dev_get_from_fd(): fix file leak (git-fixes). * mailbox: bcm2835: Fix timeout during suspend mode (git-fixes). * mailbox: rockchip: fix a typo in module autoloading (git-fixes). * media: aspeed: Fix no complete irq for non-64-aligned width (bsc#1230269) * media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes). * media: qcom: camss: Fix ordering of pm_runtime_enable (git-fixes). * media: Revert "media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()" (git-fixes). * media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes). * media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes). * media: uvcvideo: Enforce alignment of frame and interval (stable-fixes). * media: venus: fix use after free bug in venus_remove due to race condition (git-fixes). * media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes). * media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes). * media: vivid: fix wrong sizeimage value for mplane (stable-fixes). * mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes). * mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes). * mmc: sdhci-of-aspeed: fix module autoloading (git-fixes). * mtd: powernv: Add check devm_kasprintf() returned value (git-fixes). * mtd: slram: insert break after errors in parsing the map (git-fixes). * net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: missing check virtio (git-fixes). * net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes). * nf_conntrack_proto_udp: do not accept packets with IPS_NAT_CLASH (bsc#1199769). * NFSD: Fix frame size warning in svc_export_parse() (git-fixes). * NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662). * NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes). * NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726). * NFS: Reduce use of uncached readdir (bsc#1226662). * NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes). * nilfs2: Constify struct kobj_type (git-fixes). * nilfs2: determine empty node blocks as corrupted (git-fixes). * nilfs2: fix missing cleanup on rollforward recovery error (git-fixes). * nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes). * nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes). * nilfs2: fix state management in error path of log writing function (git- fixes). * nilfs2: protect references to superblock parameters exposed in sysfs (git- fixes). * nilfs2: replace snprintf in show functions with sysfs_emit (git-fixes). * nilfs2: use default_groups in kobj_type (git-fixes). * nvme: move stopping keep-alive into nvme_uninit_ctrl() (git-fixes). * nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes). * nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes). * nvme-pci: use block layer helpers to calculate num of queues (bsc#1229034). * nvme: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes). * nvmet-tcp: do not continue for invalid icreq (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet-trace: avoid dereferencing pointer too early (git-fixes). * ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes). * PCI: al: Check IORESOURCE_BUS existence during probe (git-fixes). * PCI/ASPM: Move pci_function_0() upward (bsc#1226915) * PCI/ASPM: Remove struct aspm_latency (bsc#1226915) * PCI/ASPM: Stop caching device L0s, L1 acceptable exit latencies (bsc#1226915) * PCI/ASPM: Stop caching link L0s, L1 exit latencies (bsc#1226915) * PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes). * PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes). * PCI: dwc: Restore MSI Receiver mask during resume (git-fixes). * pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes). * PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable- fixes). * PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes). * PCI: Support BAR sizes up to 8TB (bsc#1231017) * PCI: Wait for Link before restoring Downstream Buses (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes). * PCI: xilinx-nwl: Fix register misspelling (git-fixes). * pcmcia: Use resource_size function on resource object (stable-fixes). * pinctrl: single: fix missing error code in pcs_probe() (git-fixes). * pinctrl: single: fix potential NULL dereference in pcs_get_function() (git- fixes). * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes). * platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes). * platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git- fixes). * power: supply: axp20x_battery: Remove design from min and max voltage (git- fixes). * power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes). * power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes). * power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/efa: Properly handle unexpected AQ completions (git-fixes) * RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes) * RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes) * RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes) * RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git- fixes) * RDMA/hns: Optimize hem allocation performance (git-fixes) * RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes) * RDMA/rtrs: Fix the problem of variable not initialized fully (git-fixes) * RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git- fixes) * Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes). * Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE" (git-fixes). * Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (git-fixes). * Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (stable-fixes). * rtc: at91sam9: fix OF node leak in probe() error path (git-fixes). * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429). * scsi: lpfc: Copyright updates for 14.4.0.4 patches (bsc#1229429). * scsi: lpfc: Fix overflow build issue (bsc#1229429). * scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429). * scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429). * scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429). * scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429). * scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429). * scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429). * scsi: pm8001: do not overwrite PCI queue mapping (bsc#1229034). * scsi: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034). * scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848). * scsi: use block layer helpers to calculate num of queues (bsc#1229034). * spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes). * Squashfs: sanity check symbolic link size (git-fixes). * staging: iio: frequency: ad9834: Validate frequency parameter value (git- fixes). * thunderbolt: Mark XDomain as unplugged when router is removed (stable- fixes). * tomoyo: fallback to realpath if symlink's pathname does not exist (git- fixes). * tools/virtio: fix build (git-fixes). * tpm: Clean up TPM space after command failure (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes). * udp: fix receiving fraglist GSO packets (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usb: cdnsp: Fix incorrect usb_request status (git-fixes). * USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes). * usb: dwc2: drd: fix clock gating on USB role switch (git-fixes). * usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (git- fixes). * usb: dwc3: core: Skip setting event buffers for host only controllers (git- fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (git-fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes). * usb: dwc3: omap: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes). * usbip: Do not submit special requests twice (stable-fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * usbnet: ipheth: race between ipheth_close and error handling (git-fixes). * usbnet: modern method to get random MAC (git-fixes). * USB: serial: kobil_sct: restore initial terminal settings (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (git-fixes). * usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes). * usb: uas: set host status byte on data completion error (git-fixes). * usb: uas: set host status byte on data completion error (stable-fixes). * USB: usbtmc: prevent kernel-usb-infoleak (git-fixes). * usb: xhci: fix loss of data on Cadence xHC (git-fixes). * vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes). * vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes). * virito: add APIs for retrieving vq affinity (bsc#1229034). * virtio-blk: Ensure no requests in virtqueues before deleting vqs (git- fixes). * virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1229034). * virtio: blk/scs: replace blk_mq_virtio_map_queues with blk_mq_dev_map_queues (bsc#1229034). * virtiofs: forbid newlines in tags (bsc#1230591). * virtio_net: checksum offloading handling fix (git-fixes). * virtio_net: Fix "'%d' directive writing between 1 and 11 bytes into a region of size 10" warnings (git-fixes). * virtio_net: use u64_stats_t infra to avoid data-races (git-fixes). * virtio: reenable config if freezing device failed (git-fixes). * virtio/vsock: fix logic which reduces credit update messages (git-fixes). * VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes). * vsock/virtio: add support for device suspend/resume (git-fixes). * vsock/virtio: factor our the code to initialize and delete VQs (git-fixes). * vsock/virtio: initialize the_virtio_vsock before using VQs (git-fixes). * vsock/virtio: remove socket from connected/bound list on shutdown (git- fixes). * watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes). * wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes). * wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git- fixes). * wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes). * wifi: iwlwifi: mvm: increase the time between ranging measurements (git- fixes). * wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git- fixes). * wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git- fixes). * wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes). * wifi: rtw88: 8822c: Fix reported RX band width (git-fixes). * wifi: rtw88: always wait for both firmware loading attempts (git-fixes). * wifi: rtw88: remove CPT execution branch never used (git-fixes). * wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes). * x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes). * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). * x86/xen: Convert comma to semicolon (git-fixes). * xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003). * xen: allow mapping ACPI data using a different physical address (bsc#1226003). * xen: introduce generic helper checking for memory map conflicts (bsc#1226003). * xen: move checks for e820 conflicts further up (bsc#1226003). * xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003). * xen/swiotlb: add alignment check for dma buffers (bsc#1229928). * xen/swiotlb: fix allocated size (git-fixes). * xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003). * xen: use correct end address of kernel for conflict checking (bsc#1226003). * xfs: do not include bnobt blocks when reserving free block pool (git-fixes). * xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git- fixes). * xz: cleanup CRC32 edits from 2018 (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3569=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3569=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3569=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3569=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3569=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3569=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3569=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3569=1 ## Package List: * openSUSE Leap Micro 5.5 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150500.55.83.1 * openSUSE Leap Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.83.1 * kernel-default-debuginfo-5.14.21-150500.55.83.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.83.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.83.1 * kernel-default-debuginfo-5.14.21-150500.55.83.1 * Basesystem Module 15-SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.83.1 * Basesystem Module 15-SP5 (aarch64) * kernel-64kb-debuginfo-5.14.21-150500.55.83.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.83.1 * kernel-64kb-devel-5.14.21-150500.55.83.1 * kernel-64kb-debugsource-5.14.21-150500.55.83.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.83.1 * Basesystem Module 15-SP5 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.83.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.83.1 * kernel-default-debuginfo-5.14.21-150500.55.83.1 * kernel-default-devel-5.14.21-150500.55.83.1 * Basesystem Module 15-SP5 (noarch) * kernel-devel-5.14.21-150500.55.83.1 * kernel-macros-5.14.21-150500.55.83.1 * Basesystem Module 15-SP5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.83.1 * Basesystem Module 15-SP5 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150500.55.83.1 * kernel-zfcpdump-debuginfo-5.14.21-150500.55.83.1 * Development Tools Module 15-SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.83.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-5.14.21-150500.55.83.1 * kernel-obs-build-5.14.21-150500.55.83.1 * kernel-syms-5.14.21-150500.55.83.1 * Development Tools Module 15-SP5 (noarch) * kernel-source-5.14.21-150500.55.83.1 * Legacy Module 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.83.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.83.1 * kernel-default-debugsource-5.14.21-150500.55.83.1 * reiserfs-kmp-default-5.14.21-150500.55.83.1 * kernel-default-debuginfo-5.14.21-150500.55.83.1 * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.83.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.83.1 * kernel-default-debuginfo-5.14.21-150500.55.83.1 * kernel-default-livepatch-5.14.21-150500.55.83.1 * kernel-livepatch-5_14_21-150500_55_83-default-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_55_83-default-debuginfo-1-150500.11.3.1 * kernel-livepatch-SLE15-SP5_Update_20-debugsource-1-150500.11.3.1 * kernel-default-livepatch-devel-5.14.21-150500.55.83.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-5.14.21-150500.55.83.1 * ocfs2-kmp-default-5.14.21-150500.55.83.1 * dlm-kmp-default-5.14.21-150500.55.83.1 * kernel-default-debugsource-5.14.21-150500.55.83.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.83.1 * kernel-default-debuginfo-5.14.21-150500.55.83.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.83.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.83.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.83.1 * cluster-md-kmp-default-5.14.21-150500.55.83.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.83.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.83.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * kernel-default-extra-debuginfo-5.14.21-150500.55.83.1 * kernel-default-debugsource-5.14.21-150500.55.83.1 * kernel-default-debuginfo-5.14.21-150500.55.83.1 * kernel-default-extra-5.14.21-150500.55.83.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48901.html * https://www.suse.com/security/cve/CVE-2022-48911.html * https://www.suse.com/security/cve/CVE-2022-48923.html * https://www.suse.com/security/cve/CVE-2022-48935.html * https://www.suse.com/security/cve/CVE-2022-48944.html * https://www.suse.com/security/cve/CVE-2022-48945.html * https://www.suse.com/security/cve/CVE-2023-52610.html * https://www.suse.com/security/cve/CVE-2023-52916.html * https://www.suse.com/security/cve/CVE-2024-26640.html * https://www.suse.com/security/cve/CVE-2024-26759.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-26837.html * https://www.suse.com/security/cve/CVE-2024-37353.html * https://www.suse.com/security/cve/CVE-2024-38538.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-40910.html * https://www.suse.com/security/cve/CVE-2024-40973.html * https://www.suse.com/security/cve/CVE-2024-40983.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42259.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42304.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43828.html * https://www.suse.com/security/cve/CVE-2024-43835.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43912.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44935.html * https://www.suse.com/security/cve/CVE-2024-44944.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44967.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44970.html * https://www.suse.com/security/cve/CVE-2024-44971.html * https://www.suse.com/security/cve/CVE-2024-44972.html * https://www.suse.com/security/cve/CVE-2024-44977.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44986.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44988.html * https://www.suse.com/security/cve/CVE-2024-44989.html * https://www.suse.com/security/cve/CVE-2024-44990.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45000.html * https://www.suse.com/security/cve/CVE-2024-45001.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45006.html * https://www.suse.com/security/cve/CVE-2024-45007.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-45011.html * https://www.suse.com/security/cve/CVE-2024-45013.html * https://www.suse.com/security/cve/CVE-2024-45015.html * https://www.suse.com/security/cve/CVE-2024-45018.html * https://www.suse.com/security/cve/CVE-2024-45020.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-45028.html * https://www.suse.com/security/cve/CVE-2024-45029.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46689.html * https://www.suse.com/security/cve/CVE-2024-46694.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46714.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46717.html * https://www.suse.com/security/cve/CVE-2024-46720.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46724.html * https://www.suse.com/security/cve/CVE-2024-46725.html * https://www.suse.com/security/cve/CVE-2024-46726.html * https://www.suse.com/security/cve/CVE-2024-46727.html * https://www.suse.com/security/cve/CVE-2024-46728.html * https://www.suse.com/security/cve/CVE-2024-46730.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46732.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46746.html * https://www.suse.com/security/cve/CVE-2024-46747.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46751.html * https://www.suse.com/security/cve/CVE-2024-46752.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46755.html * https://www.suse.com/security/cve/CVE-2024-46756.html * https://www.suse.com/security/cve/CVE-2024-46758.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46771.html * https://www.suse.com/security/cve/CVE-2024-46772.html * https://www.suse.com/security/cve/CVE-2024-46773.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46778.html * https://www.suse.com/security/cve/CVE-2024-46780.html * https://www.suse.com/security/cve/CVE-2024-46781.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46786.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46791.html * https://www.suse.com/security/cve/CVE-2024-46794.html * https://www.suse.com/security/cve/CVE-2024-46798.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://www.suse.com/security/cve/CVE-2024-46830.html * https://bugzilla.suse.com/show_bug.cgi?id=1199769 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221610 * https://bugzilla.suse.com/show_bug.cgi?id=1221650 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1222973 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1224085 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226606 * https://bugzilla.suse.com/show_bug.cgi?id=1226662 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1226875 * https://bugzilla.suse.com/show_bug.cgi?id=1226915 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227819 * https://bugzilla.suse.com/show_bug.cgi?id=1227832 * https://bugzilla.suse.com/show_bug.cgi?id=1227890 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228576 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228771 * https://bugzilla.suse.com/show_bug.cgi?id=1229031 * https://bugzilla.suse.com/show_bug.cgi?id=1229034 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229156 * https://bugzilla.suse.com/show_bug.cgi?id=1229289 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229364 * https://bugzilla.suse.com/show_bug.cgi?id=1229394 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229453 * https://bugzilla.suse.com/show_bug.cgi?id=1229572 * https://bugzilla.suse.com/show_bug.cgi?id=1229573 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229607 * https://bugzilla.suse.com/show_bug.cgi?id=1229619 * https://bugzilla.suse.com/show_bug.cgi?id=1229633 * https://bugzilla.suse.com/show_bug.cgi?id=1229662 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229810 * https://bugzilla.suse.com/show_bug.cgi?id=1229830 * https://bugzilla.suse.com/show_bug.cgi?id=1229899 * https://bugzilla.suse.com/show_bug.cgi?id=1229928 * https://bugzilla.suse.com/show_bug.cgi?id=1229947 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230129 * https://bugzilla.suse.com/show_bug.cgi?id=1230130 * https://bugzilla.suse.com/show_bug.cgi?id=1230170 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230175 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230192 * https://bugzilla.suse.com/show_bug.cgi?id=1230193 * https://bugzilla.suse.com/show_bug.cgi?id=1230194 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230209 * https://bugzilla.suse.com/show_bug.cgi?id=1230211 * https://bugzilla.suse.com/show_bug.cgi?id=1230212 * https://bugzilla.suse.com/show_bug.cgi?id=1230217 * https://bugzilla.suse.com/show_bug.cgi?id=1230224 * https://bugzilla.suse.com/show_bug.cgi?id=1230230 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230244 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230247 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230269 * https://bugzilla.suse.com/show_bug.cgi?id=1230339 * https://bugzilla.suse.com/show_bug.cgi?id=1230340 * https://bugzilla.suse.com/show_bug.cgi?id=1230392 * https://bugzilla.suse.com/show_bug.cgi?id=1230398 * https://bugzilla.suse.com/show_bug.cgi?id=1230431 * https://bugzilla.suse.com/show_bug.cgi?id=1230433 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230440 * https://bugzilla.suse.com/show_bug.cgi?id=1230442 * https://bugzilla.suse.com/show_bug.cgi?id=1230444 * https://bugzilla.suse.com/show_bug.cgi?id=1230450 * https://bugzilla.suse.com/show_bug.cgi?id=1230451 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230511 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230524 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230591 * https://bugzilla.suse.com/show_bug.cgi?id=1230592 * https://bugzilla.suse.com/show_bug.cgi?id=1230699 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230701 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230703 * https://bugzilla.suse.com/show_bug.cgi?id=1230705 * https://bugzilla.suse.com/show_bug.cgi?id=1230706 * https://bugzilla.suse.com/show_bug.cgi?id=1230707 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230711 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230719 * https://bugzilla.suse.com/show_bug.cgi?id=1230724 * https://bugzilla.suse.com/show_bug.cgi?id=1230725 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230751 * https://bugzilla.suse.com/show_bug.cgi?id=1230752 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230766 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230768 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230772 * https://bugzilla.suse.com/show_bug.cgi?id=1230776 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230786 * https://bugzilla.suse.com/show_bug.cgi?id=1230791 * https://bugzilla.suse.com/show_bug.cgi?id=1230794 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230802 * https://bugzilla.suse.com/show_bug.cgi?id=1230806 * https://bugzilla.suse.com/show_bug.cgi?id=1230808 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230812 * https://bugzilla.suse.com/show_bug.cgi?id=1230813 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230821 * https://bugzilla.suse.com/show_bug.cgi?id=1230825 * https://bugzilla.suse.com/show_bug.cgi?id=1230830 * https://bugzilla.suse.com/show_bug.cgi?id=1231013 * https://bugzilla.suse.com/show_bug.cgi?id=1231017 * https://bugzilla.suse.com/show_bug.cgi?id=1231116 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231180 * https://bugzilla.suse.com/show_bug.cgi?id=1231181 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 12:36:24 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 12:36:24 -0000 Subject: SUSE-RU-2024:3568-1: important: Recommended update for lttng-tools Message-ID: <172847738471.6932.3535569440219906548@smelt2.prg2.suse.org> # Recommended update for lttng-tools Announcement ID: SUSE-RU-2024:3568-1 Release Date: 2024-10-09T10:42:18Z Rating: important References: * bsc#1230128 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for lttng-tools fixes the following issues: * Fix crash when unregistering UST apps during shutdown (bsc#1230128) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3568=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3568=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3568=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3568=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3568=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3568=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3568=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3568=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3568=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3568=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3568=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3568=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3568=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3568=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3568=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3568=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3568=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3568=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3568=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3568=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3568=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le x86_64 i586) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * openSUSE Leap Micro 5.5 (aarch64 x86_64) * lttng-tools-2.12.2-150300.3.6.1 * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * lttng-tools-2.12.2-150300.3.6.1 * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * Basesystem Module 15-SP5 (aarch64 ppc64le x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * Development Tools Module 15-SP5 (x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * Development Tools Module 15-SP6 (x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 * SUSE Manager Proxy 4.3 (x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * liblttng-ctl0-2.12.2-150300.3.6.1 * lttng-tools-debugsource-2.12.2-150300.3.6.1 * liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1 * lttng-tools-debuginfo-2.12.2-150300.3.6.1 * SUSE Enterprise Storage 7.1 (x86_64) * lttng-tools-devel-2.12.2-150300.3.6.1 * lttng-tools-2.12.2-150300.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230128 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 12:36:34 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 12:36:34 -0000 Subject: SUSE-SU-2024:3567-1: important: Security update for the Linux Kernel Message-ID: <172847739406.6932.6024969322254941226@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3567-1 Release Date: 2024-10-09T09:46:04Z Rating: important References: * bsc#1226666 * bsc#1227487 * bsc#1229633 * bsc#1230015 * bsc#1230245 * bsc#1230326 * bsc#1230398 * bsc#1230434 * bsc#1230519 * bsc#1230767 Cross-References: * CVE-2022-48911 * CVE-2022-48945 * CVE-2024-44946 * CVE-2024-45003 * CVE-2024-45021 * CVE-2024-46695 * CVE-2024-46774 CVSS scores: * CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves seven vulnerabilities and has three security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-48945: media: vivid: fix compose size exceed boundary (bsc#1230398). * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-46695: selinux,smack: do not bypass permissions check in inode_setsecctx hook (bsc#1230519). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). The following non-security bugs were fixed: * ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1230326). * ext4: add reserved GDT blocks check (bsc#1230326). * ext4: consolidate checks for resize of bigalloc into ext4_resize_begin (bsc#1230326). * ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1230326). * kabi: add __nf_queue_get_refs() for kabi compliance. * No -rt specific changes this merge. * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * Revert "ext4: consolidate checks for resize of bigalloc into ext4_resize_begin" (bsc#1230326). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3567=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3567=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3567=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.187.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.187.1 * kernel-rt-debugsource-5.3.18-150300.187.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * kernel-source-rt-5.3.18-150300.187.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.187.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.187.1 * kernel-rt-debugsource-5.3.18-150300.187.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * kernel-source-rt-5.3.18-150300.187.1 * SUSE Linux Enterprise Micro 5.1 (nosrc x86_64) * kernel-rt-5.3.18-150300.187.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.187.1 * kernel-rt-debugsource-5.3.18-150300.187.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * kernel-source-rt-5.3.18-150300.187.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48911.html * https://www.suse.com/security/cve/CVE-2022-48945.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-46695.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1229633 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230326 * https://bugzilla.suse.com/show_bug.cgi?id=1230398 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230519 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 12:37:50 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 12:37:50 -0000 Subject: SUSE-SU-2024:3566-1: important: Security update for the Linux Kernel Message-ID: <172847747030.6932.3084609370307264530@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3566-1 Release Date: 2024-10-09T09:43:40Z Rating: important References: * bsc#1054914 * bsc#1065729 * bsc#1207341 * bsc#1223777 * bsc#1225316 * bsc#1226669 * bsc#1226846 * bsc#1226860 * bsc#1226878 * bsc#1227487 * bsc#1227867 * bsc#1227890 * bsc#1227917 * bsc#1227941 * bsc#1227952 * bsc#1227953 * bsc#1228000 * bsc#1228002 * bsc#1228068 * bsc#1228507 * bsc#1228615 * bsc#1228620 * bsc#1228635 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229456 * bsc#1229457 * bsc#1229633 * bsc#1229645 * bsc#1229739 * bsc#1229753 * bsc#1229764 * bsc#1229768 * bsc#1229790 * bsc#1229830 * bsc#1229912 * bsc#1230015 * bsc#1230151 * bsc#1230171 * bsc#1230174 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230185 * bsc#1230200 * bsc#1230204 * bsc#1230212 * bsc#1230233 * bsc#1230248 * bsc#1230270 * bsc#1230398 * bsc#1230506 * bsc#1230515 * bsc#1230517 * bsc#1230533 * bsc#1230535 * bsc#1230549 * bsc#1230556 * bsc#1230582 * bsc#1230589 * bsc#1230620 * bsc#1230699 * bsc#1230700 * bsc#1230702 * bsc#1230707 * bsc#1230709 * bsc#1230710 * bsc#1230712 * bsc#1230719 * bsc#1230724 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230747 * bsc#1230748 * bsc#1230751 * bsc#1230752 * bsc#1230756 * bsc#1230761 * bsc#1230763 * bsc#1230767 * bsc#1230771 * bsc#1230772 * bsc#1230776 * bsc#1230783 * bsc#1230791 * bsc#1230796 * bsc#1230810 * bsc#1230814 * bsc#1230815 * bsc#1230826 * bsc#1231083 * bsc#1231084 * bsc#1231089 * bsc#1231120 * bsc#1231146 * bsc#1231184 Cross-References: * CVE-2021-4442 * CVE-2021-47387 * CVE-2021-47408 * CVE-2021-47620 * CVE-2021-47622 * CVE-2022-48788 * CVE-2022-48789 * CVE-2022-48790 * CVE-2022-48791 * CVE-2022-48799 * CVE-2022-48844 * CVE-2022-48911 * CVE-2022-48943 * CVE-2022-48945 * CVE-2023-52766 * CVE-2023-52915 * CVE-2024-27024 * CVE-2024-38381 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-40973 * CVE-2024-41000 * CVE-2024-41073 * CVE-2024-41079 * CVE-2024-41082 * CVE-2024-42154 * CVE-2024-42265 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43884 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43904 * CVE-2024-43912 * CVE-2024-43914 * CVE-2024-44946 * CVE-2024-44947 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44969 * CVE-2024-44972 * CVE-2024-44982 * CVE-2024-44987 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45008 * CVE-2024-46673 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46702 * CVE-2024-46707 * CVE-2024-46714 * CVE-2024-46715 * CVE-2024-46717 * CVE-2024-46720 * CVE-2024-46721 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46727 * CVE-2024-46731 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46746 * CVE-2024-46747 * CVE-2024-46750 * CVE-2024-46753 * CVE-2024-46759 * CVE-2024-46761 * CVE-2024-46770 * CVE-2024-46772 * CVE-2024-46773 * CVE-2024-46774 * CVE-2024-46778 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46787 * CVE-2024-46822 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46859 CVSS scores: * CVE-2021-4442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-4442 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47620 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47622 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48799 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48844 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38381 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38381 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43884 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43912 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46747 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Real Time 12 SP5 * SUSE Linux Enterprise Server 12 SP5 An update that solves 90 vulnerabilities and has eight security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-41073: nvme: avoid double free special payload (bsc#1228635). * CVE-2024-41079: nvmet: always initialize cqe.result (bsc#1228615). * CVE-2024-46859: platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (bsc#1231089). * CVE-2024-46853: spi: nxp-fspi: fix the KASAN report out-of-bounds bug (bsc#1231083). * CVE-2022-48945: media: vivid: fix compose size exceed boundary (bsc#1230398). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620 CVE-2024-41082). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-46731: drm/amd/pm: fix the Out-of-bounds read warning (bsc#1230709). * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772). * CVE-2024-46722: drm/amdgpu: fix mc_data out-of-bounds read warning (bsc#1230712). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46761: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (bsc#1230761). * CVE-2024-46759: hwmon: (adc128d818) Fix underflows seen when writing limit attributes (bsc#1230814). * CVE-2024-46745: Input: uinput - reject requests with unreasonable number of slots (bsc#1230748). * CVE-2024-46738: VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (bsc#1230731). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-44982: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (bsc#1230204). * CVE-2024-46723: drm/amdgpu: fix ucode out-of-bounds read warning (bsc#1230702). * CVE-2024-46750: PCI: Add missing bridge lock to pci_bus_lock() (bsc#1230783). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-46744: Squashfs: sanity check symbolic link size (bsc#1230747). * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access (bsc#1230700). * CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515) * CVE-2024-46675: usb: dwc3: core: Prevent USB core invalid event buffer address access (bsc#1230533). * CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589) * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46676: nfc: pn533: Add poll mod list filling check (bsc#1230535). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-46707: KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (bsc#1230582). * CVE-2022-48799: perf: Fix list corruption in perf_cgroup_switch() (bsc#1227953). * CVE-2022-48789: nvme-tcp: fix possible use-after-free in transport error_recovery work (bsc#1228000). * CVE-2022-48790: nvme: fix a possible use-after-free in controller reset during load (bsc#1227941). * CVE-2024-41000: block/ioctl: prefer different overflow check (bsc#1227867). * CVE-2024-44948: x86/mtrr: Check if fixed MTRRs exist before saving them (bsc#1230174). * CVE-2022-48788: nvme-rdma: fix possible use-after-free in transport error_recovery work (bsc#1227952). * CVE-2024-45008: Input: MT - limit max slots (bsc#1230248). * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2022-48943: KVM: x86/mmu: make apf token non-zero to fix bug (bsc#1229645). * CVE-2023-52915: media: dvb-usb-v2: af9035: fix missing unlock (bsc#1230270). * CVE-2022-48844: Bluetooth: hci_core: Fix leaking sent_cmd skb (bsc#1228068). * CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830) * CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002) * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down (bsc#1223777). * CVE-2024-44954: ALSA: line6: Fix racy access to midibuf (bsc#1230176). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race (bsc#1230178). * CVE-2021-47387: cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory (bsc#1225316). * CVE-2024-44969: s390/sclp: Prevent release of buffer in I/O (bsc#1230200). * CVE-2024-43904: Add null checks for 'stream' and 'plane' before dereferencing (bsc#1229768) * CVE-2024-43884: Add error handling to pair_device() (bsc#1229739) * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). The following non-security bugs were fixed: * ACPI: EC: Avoid printing confusing messages in acpi_ec_setup() (git-fixes). * ACPI / EC: Clean up EC GPE mask flag (git-fixes). * ACPI: EC: Fix an EC event IRQ storming issue (git-fixes). * ACPI: EC: tweak naming in preparation for GpioInt support (git-fixes). * ACPI: SPCR: Consider baud rate 0 as preconfigured state (git-fixes). * ACPI: SPCR: work around clock issue on xgene UART (git-fixes). * ACPI: SPCR: Workaround for APM X-Gene 8250 UART 32-alignment errata (git- fixes). * ACPI: video: Add new hw_changes_brightness quirk, set it on PB Easynote MZ35 (git-fixes). * af_unix: annotate lockless accesses to sk->sk_err (bsc#1226846). * af_unix: Fix data races around sk->sk_shutdown (bsc#1226846). * af_unix: Fix data-races around sk->sk_shutdown (git-fixes). * autofs4: use wait_event_killable (bsc#1207341). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231184). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Fix bsc#1054914 reference. * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230151). * kabi fix for proc/mounts: add cursor (bsc#1207341). * kabi/severities: Ignore ppc instruction emulation (bsc#1230826 ltc#205848) These are lowlevel functions not used outside of exception handling and kernel debugging facilities. * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * media: vivid: avoid integer overflow (git-fixes). * media: vivid: dev->bitmap_cap wasn't freed in all cases (git-fixes). * media: vivid: fix assignment of dev->fbuf_out_flags (git-fixes). * media: vivid: s_fbuf: add more sanity checks (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git- fixes). * net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git- fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * powerpc/32: Move the inline keyword at the beginning of function declaration (bsc#1230826 ltc#205848). * powerpc/64: Fix update forms of loads and stores to write 64-bit EA (bsc#1230826 ltc#205848). * powerpc: Add emulation for the addpcis instruction (bsc#1230826 ltc#205848). * powerpc: Change analyse_instr so it does not modify *regs (bsc#1230826 ltc#205848). * powerpc: Do not check MSR FP/VMX/VSX enable bits in analyse_instr() (bsc#1230826 ltc#205848). * powerpc: Do not update CR0 in emulation of popcnt, prty, bpermd instructions (bsc#1230826 ltc#205848). * powerpc: Emulate FP/vector/VSX loads/stores correctly when regs not live (bsc#1230826 ltc#205848). * powerpc: Emulate load/store floating double pair instructions (bsc#1230826 ltc#205848). * powerpc: Emulate load/store floating point as integer word instructions (bsc#1230826 ltc#205848). * powerpc: Emulate the dcbz instruction (bsc#1230826 ltc#205848). * powerpc: Emulate vector element load/store instructions (bsc#1230826 ltc#205848). * powerpc: Fix emulation of the isel instruction (bsc#1230826 ltc#205848). * powerpc: Fix handling of alignment interrupt on dcbz instruction (bsc#1230826 ltc#205848). * powerpc: Fix kernel crash in emulation of vector loads and stores (bsc#1230826 ltc#205848). * powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1230826 ltc#205848). * powerpc: Handle most loads and stores in instruction emulation code (bsc#1230826 ltc#205848). * powerpc: Handle opposite-endian processes in emulation code (bsc#1230826 ltc#205848). * powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git- fixes). * powerpc/imc-pmu: Revert nest_init_lock to being a mutex (bsc#1065729). * powerpc/iommu: Annotate nested lock for lockdep (bsc#1065729). * powerpc/kprobes: Update optprobes to use emulate_update_regs() (bsc#1230826 ltc#205848). * powerpc/lib: Fix "integer constant is too large" build failure (bsc#1230826 ltc#205848). * powerpc/lib: fix redundant inclusion of quad.o (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add bpermd instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add cmpb instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add isel instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add popcnt instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add prty instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add XER bits introduced in POWER ISA v3.0 (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix count leading zeros instructions (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix fixed-point arithmetic instructions that set CA32 (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix fixed-point shift instructions that set CA32 (bsc#1230826 ltc#205848). * powerpc/lib/sstep: fix 'ptesync' build error (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1230826 ltc#205848). * powerpc: Make load/store emulation use larger memory accesses (bsc#1230826 ltc#205848). * powerpc/ppc-opcode: Add divde and divdeu opcodes (bsc#1230826 ltc#205848). * powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1065729). * powerpc: Remove support for PowerPC 601 (Remove unused and malformed assembly causing build error). * powerpc: Separate out load/store emulation into its own function (bsc#1230826 ltc#205848). * powerpc: Set regs->dar if memory access fails in emulate_step() (bsc#1230826 ltc#205848). * powerpc sstep: Add support for cnttzw, cnttzd instructions (bsc#1230826 ltc#205848). * powerpc: sstep: Add support for darn instruction (bsc#1230826 ltc#205848). * powerpc/sstep: Add support for divde[.] and divdeu[.] instructions (bsc#1230826 ltc#205848). * powerpc sstep: Add support for extswsli instruction (bsc#1230826 ltc#205848). * powerpc: sstep: Add support for maddhd, maddhdu, maddld instructions (bsc#1230826 ltc#205848). * powerpc sstep: Add support for modsd, modud instructions (bsc#1230826 ltc#205848). * powerpc sstep: Add support for modsw, moduw instructions (bsc#1230826 ltc#205848). * powerpc/sstep: Avoid used uninitialized error (bsc#1230826 ltc#205848). * powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1230826 ltc#205848). * powerpc/sstep: Fix darn emulation (bsc#1230826 ltc#205848). * powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1230826 ltc#205848). * powerpc/sstep: Fix issues with mcrf (bsc#1230826 ltc#205848). * powerpc/sstep: Fix issues with set_cr0() (bsc#1230826 ltc#205848). * powerpc/sstep: Fix kernel crash if VSX is not present (bsc#1230826 ltc#205848). * powerpc/sstep: Introduce GETTYPE macro (bsc#1230826 ltc#205848). * powerpc/sstep: mullw should calculate a 64 bit signed result (bsc#1230826 ltc#205848). * powerpc: Use instruction emulation infrastructure to handle alignment faults (bsc#1230826 ltc#205848). * powerpc: Wrap register number correctly for string load/store instructions (bsc#1230826 ltc#205848). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * proc/mounts: add cursor (bsc#1207341). * profiling: fix shift too large makes kernel panic (git-fixes). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * Revert "ACPI / EC: Remove old CLEAR_ON_RESUME quirk" (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * usbnet: modern method to get random MAC (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Real Time 12 SP5 zypper in -t patch SUSE-SLE-RT-12-SP5-2024-3566=1 ## Package List: * SUSE Linux Enterprise Real Time 12 SP5 (x86_64) * ocfs2-kmp-rt-4.12.14-10.203.1 * kernel-rt_debug-devel-4.12.14-10.203.1 * cluster-md-kmp-rt-debuginfo-4.12.14-10.203.1 * kernel-rt-debugsource-4.12.14-10.203.1 * kernel-rt_debug-devel-debuginfo-4.12.14-10.203.1 * kernel-rt_debug-debuginfo-4.12.14-10.203.1 * kernel-syms-rt-4.12.14-10.203.1 * cluster-md-kmp-rt-4.12.14-10.203.1 * kernel-rt_debug-debugsource-4.12.14-10.203.1 * kernel-rt-devel-4.12.14-10.203.1 * dlm-kmp-rt-4.12.14-10.203.1 * gfs2-kmp-rt-debuginfo-4.12.14-10.203.1 * gfs2-kmp-rt-4.12.14-10.203.1 * kernel-rt-devel-debuginfo-4.12.14-10.203.1 * kernel-rt-base-4.12.14-10.203.1 * kernel-rt-debuginfo-4.12.14-10.203.1 * kernel-rt-base-debuginfo-4.12.14-10.203.1 * dlm-kmp-rt-debuginfo-4.12.14-10.203.1 * ocfs2-kmp-rt-debuginfo-4.12.14-10.203.1 * SUSE Linux Enterprise Real Time 12 SP5 (noarch) * kernel-source-rt-4.12.14-10.203.1 * kernel-devel-rt-4.12.14-10.203.1 * SUSE Linux Enterprise Real Time 12 SP5 (nosrc x86_64) * kernel-rt_debug-4.12.14-10.203.1 * kernel-rt-4.12.14-10.203.1 ## References: * https://www.suse.com/security/cve/CVE-2021-4442.html * https://www.suse.com/security/cve/CVE-2021-47387.html * https://www.suse.com/security/cve/CVE-2021-47408.html * https://www.suse.com/security/cve/CVE-2021-47620.html * https://www.suse.com/security/cve/CVE-2021-47622.html * https://www.suse.com/security/cve/CVE-2022-48788.html * https://www.suse.com/security/cve/CVE-2022-48789.html * https://www.suse.com/security/cve/CVE-2022-48790.html * https://www.suse.com/security/cve/CVE-2022-48791.html * https://www.suse.com/security/cve/CVE-2022-48799.html * https://www.suse.com/security/cve/CVE-2022-48844.html * https://www.suse.com/security/cve/CVE-2022-48911.html * https://www.suse.com/security/cve/CVE-2022-48943.html * https://www.suse.com/security/cve/CVE-2022-48945.html * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2024-27024.html * https://www.suse.com/security/cve/CVE-2024-38381.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-40973.html * https://www.suse.com/security/cve/CVE-2024-41000.html * https://www.suse.com/security/cve/CVE-2024-41073.html * https://www.suse.com/security/cve/CVE-2024-41079.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43884.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43904.html * https://www.suse.com/security/cve/CVE-2024-43912.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44972.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46714.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46717.html * https://www.suse.com/security/cve/CVE-2024-46720.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46727.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46746.html * https://www.suse.com/security/cve/CVE-2024-46747.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46772.html * https://www.suse.com/security/cve/CVE-2024-46773.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46778.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://bugzilla.suse.com/show_bug.cgi?id=1054914 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1207341 * https://bugzilla.suse.com/show_bug.cgi?id=1223777 * https://bugzilla.suse.com/show_bug.cgi?id=1225316 * https://bugzilla.suse.com/show_bug.cgi?id=1226669 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1226878 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227867 * https://bugzilla.suse.com/show_bug.cgi?id=1227890 * https://bugzilla.suse.com/show_bug.cgi?id=1227917 * https://bugzilla.suse.com/show_bug.cgi?id=1227941 * https://bugzilla.suse.com/show_bug.cgi?id=1227952 * https://bugzilla.suse.com/show_bug.cgi?id=1227953 * https://bugzilla.suse.com/show_bug.cgi?id=1228000 * https://bugzilla.suse.com/show_bug.cgi?id=1228002 * https://bugzilla.suse.com/show_bug.cgi?id=1228068 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228615 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228635 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229457 * https://bugzilla.suse.com/show_bug.cgi?id=1229633 * https://bugzilla.suse.com/show_bug.cgi?id=1229645 * https://bugzilla.suse.com/show_bug.cgi?id=1229739 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229768 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229830 * https://bugzilla.suse.com/show_bug.cgi?id=1229912 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230151 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230212 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230398 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230620 * https://bugzilla.suse.com/show_bug.cgi?id=1230699 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230707 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230719 * https://bugzilla.suse.com/show_bug.cgi?id=1230724 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230751 * https://bugzilla.suse.com/show_bug.cgi?id=1230752 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230772 * https://bugzilla.suse.com/show_bug.cgi?id=1230776 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230791 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230826 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231184 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 12:38:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 12:38:05 -0000 Subject: SUSE-SU-2024:3563-1: important: Security update for the Linux Kernel Message-ID: <172847748532.6932.6369975950861667268@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3563-1 Release Date: 2024-10-09T09:04:26Z Rating: important References: * bsc#1216223 * bsc#1223600 * bsc#1223958 * bsc#1225272 * bsc#1227487 * bsc#1229407 * bsc#1229633 * bsc#1229662 * bsc#1229947 * bsc#1230015 * bsc#1230398 * bsc#1230434 * bsc#1230507 * bsc#1230767 * bsc#1231016 Cross-References: * CVE-2022-48911 * CVE-2022-48923 * CVE-2022-48944 * CVE-2022-48945 * CVE-2024-42301 * CVE-2024-44946 * CVE-2024-45021 * CVE-2024-46674 * CVE-2024-46774 CVSS scores: * CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48923 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48944 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48944 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves nine vulnerabilities and has six security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). * CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662) * CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe error path (bsc#1230507). The following non-security bugs were fixed: * SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272 bsc#1231016). * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * kabi: add __nf_queue_get_refs() for kabi compliance. * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: smartpqi: Expose SAS address for SATA drives (bsc#1223958). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3563=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3563=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3563=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3563=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.97.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.97.1 * kernel-rt-debuginfo-5.14.21-150400.15.97.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * kernel-source-rt-5.14.21-150400.15.97.1 * SUSE Linux Enterprise Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.97.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.97.1 * kernel-rt-debuginfo-5.14.21-150400.15.97.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * kernel-source-rt-5.14.21-150400.15.97.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.97.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.97.1 * kernel-rt-debuginfo-5.14.21-150400.15.97.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * kernel-source-rt-5.14.21-150400.15.97.1 * SUSE Linux Enterprise Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.97.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.97.1 * kernel-rt-debuginfo-5.14.21-150400.15.97.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * kernel-source-rt-5.14.21-150400.15.97.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48911.html * https://www.suse.com/security/cve/CVE-2022-48923.html * https://www.suse.com/security/cve/CVE-2022-48944.html * https://www.suse.com/security/cve/CVE-2022-48945.html * https://www.suse.com/security/cve/CVE-2024-42301.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223958 * https://bugzilla.suse.com/show_bug.cgi?id=1225272 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1229407 * https://bugzilla.suse.com/show_bug.cgi?id=1229633 * https://bugzilla.suse.com/show_bug.cgi?id=1229662 * https://bugzilla.suse.com/show_bug.cgi?id=1229947 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230398 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 12:38:09 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 12:38:09 -0000 Subject: SUSE-RU-2024:3562-1: moderate: Recommended update for ibus-libpinyin Message-ID: <172847748910.6932.10801301216656915777@smelt2.prg2.suse.org> # Recommended update for ibus-libpinyin Announcement ID: SUSE-RU-2024:3562-1 Release Date: 2024-10-09T08:53:59Z Rating: moderate References: * bsc#1218160 * bsc#1228652 Affected Products: * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has two fixes can now be installed. ## Description: This update for ibus-libpinyin fixes the following issues: * Change python depending version, Since tumbleweed and SLE already totally switch to python3, no longer coexist with python2. (bsc#1228652). * Backporting patch from upstream, Revert python3 version checking to 3.2 to enable lower python version building (bsc#1228652). * The command 'zypper se python3' in 15-SP6 is listing python310, which should not be present in 15-SP6 (bsc#1218160). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3562=1 openSUSE-SLE-15.6-2024-3562=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3562=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * ibus-libpinyin-1.15.3-150600.4.3.3 * ibus-libpinyin-debuginfo-1.15.3-150600.4.3.3 * ibus-libpinyin-debugsource-1.15.3-150600.4.3.3 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ibus-libpinyin-1.15.3-150600.4.3.3 * ibus-libpinyin-debuginfo-1.15.3-150600.4.3.3 * ibus-libpinyin-debugsource-1.15.3-150600.4.3.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218160 * https://bugzilla.suse.com/show_bug.cgi?id=1228652 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 12:41:00 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 12:41:00 -0000 Subject: SUSE-SU-2024:3561-1: important: Security update for the Linux Kernel Message-ID: <172847766063.6932.15533067536569211063@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3561-1 Release Date: 2024-10-09T08:45:37Z Rating: important References: * bsc#1012628 * bsc#1183045 * bsc#1215199 * bsc#1216223 * bsc#1216776 * bsc#1220382 * bsc#1221527 * bsc#1221610 * bsc#1221650 * bsc#1222629 * bsc#1223600 * bsc#1223848 * bsc#1225487 * bsc#1225812 * bsc#1225903 * bsc#1226003 * bsc#1226507 * bsc#1226606 * bsc#1226666 * bsc#1226846 * bsc#1226860 * bsc#1227487 * bsc#1227694 * bsc#1227726 * bsc#1227819 * bsc#1227885 * bsc#1227890 * bsc#1227962 * bsc#1228090 * bsc#1228140 * bsc#1228244 * bsc#1228507 * bsc#1228771 * bsc#1229001 * bsc#1229004 * bsc#1229019 * bsc#1229086 * bsc#1229167 * bsc#1229169 * bsc#1229289 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229364 * bsc#1229371 * bsc#1229380 * bsc#1229389 * bsc#1229394 * bsc#1229429 * bsc#1229443 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229494 * bsc#1229585 * bsc#1229753 * bsc#1229764 * bsc#1229768 * bsc#1229790 * bsc#1229810 * bsc#1229899 * bsc#1229928 * bsc#1230015 * bsc#1230119 * bsc#1230123 * bsc#1230124 * bsc#1230125 * bsc#1230169 * bsc#1230170 * bsc#1230171 * bsc#1230173 * bsc#1230174 * bsc#1230175 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230181 * bsc#1230185 * bsc#1230191 * bsc#1230192 * bsc#1230193 * bsc#1230194 * bsc#1230195 * bsc#1230200 * bsc#1230204 * bsc#1230206 * bsc#1230207 * bsc#1230209 * bsc#1230211 * bsc#1230213 * bsc#1230217 * bsc#1230221 * bsc#1230224 * bsc#1230230 * bsc#1230232 * bsc#1230233 * bsc#1230240 * bsc#1230244 * bsc#1230245 * bsc#1230247 * bsc#1230248 * bsc#1230269 * bsc#1230270 * bsc#1230295 * bsc#1230340 * bsc#1230426 * bsc#1230430 * bsc#1230431 * bsc#1230432 * bsc#1230433 * bsc#1230434 * bsc#1230435 * bsc#1230440 * bsc#1230441 * bsc#1230442 * bsc#1230444 * bsc#1230450 * bsc#1230451 * bsc#1230454 * bsc#1230455 * bsc#1230457 * bsc#1230459 * bsc#1230506 * bsc#1230507 * bsc#1230511 * bsc#1230515 * bsc#1230517 * bsc#1230518 * bsc#1230519 * bsc#1230520 * bsc#1230521 * bsc#1230524 * bsc#1230526 * bsc#1230533 * bsc#1230535 * bsc#1230539 * bsc#1230540 * bsc#1230549 * bsc#1230556 * bsc#1230562 * bsc#1230563 * bsc#1230564 * bsc#1230580 * bsc#1230582 * bsc#1230589 * bsc#1230602 * bsc#1230699 * bsc#1230700 * bsc#1230701 * bsc#1230702 * bsc#1230703 * bsc#1230704 * bsc#1230705 * bsc#1230706 * bsc#1230709 * bsc#1230711 * bsc#1230712 * bsc#1230715 * bsc#1230719 * bsc#1230722 * bsc#1230724 * bsc#1230725 * bsc#1230726 * bsc#1230727 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230747 * bsc#1230748 * bsc#1230749 * bsc#1230751 * bsc#1230752 * bsc#1230753 * bsc#1230756 * bsc#1230761 * bsc#1230766 * bsc#1230767 * bsc#1230768 * bsc#1230771 * bsc#1230772 * bsc#1230775 * bsc#1230776 * bsc#1230780 * bsc#1230783 * bsc#1230786 * bsc#1230787 * bsc#1230791 * bsc#1230794 * bsc#1230796 * bsc#1230802 * bsc#1230806 * bsc#1230808 * bsc#1230809 * bsc#1230810 * bsc#1230812 * bsc#1230813 * bsc#1230814 * bsc#1230815 * bsc#1230821 * bsc#1230825 * bsc#1230830 * bsc#1230831 * bsc#1230854 * bsc#1230948 * bsc#1231008 * bsc#1231035 * bsc#1231120 * bsc#1231146 * bsc#1231182 * bsc#1231183 * jsc#PED-10954 * jsc#PED-9899 Cross-References: * CVE-2023-52610 * CVE-2023-52752 * CVE-2023-52915 * CVE-2023-52916 * CVE-2024-26640 * CVE-2024-26759 * CVE-2024-26804 * CVE-2024-36953 * CVE-2024-38538 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-40965 * CVE-2024-40973 * CVE-2024-40983 * CVE-2024-42154 * CVE-2024-42243 * CVE-2024-42252 * CVE-2024-42265 * CVE-2024-42294 * CVE-2024-42304 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43828 * CVE-2024-43832 * CVE-2024-43835 * CVE-2024-43845 * CVE-2024-43870 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43904 * CVE-2024-43914 * CVE-2024-44935 * CVE-2024-44944 * CVE-2024-44946 * CVE-2024-44947 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44951 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44960 * CVE-2024-44961 * CVE-2024-44962 * CVE-2024-44965 * CVE-2024-44967 * CVE-2024-44969 * CVE-2024-44970 * CVE-2024-44971 * CVE-2024-44977 * CVE-2024-44982 * CVE-2024-44984 * CVE-2024-44985 * CVE-2024-44986 * CVE-2024-44987 * CVE-2024-44988 * CVE-2024-44989 * CVE-2024-44990 * CVE-2024-44991 * CVE-2024-44997 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45000 * CVE-2024-45001 * CVE-2024-45002 * CVE-2024-45003 * CVE-2024-45005 * CVE-2024-45006 * CVE-2024-45007 * CVE-2024-45008 * CVE-2024-45011 * CVE-2024-45012 * CVE-2024-45013 * CVE-2024-45015 * CVE-2024-45017 * CVE-2024-45018 * CVE-2024-45019 * CVE-2024-45020 * CVE-2024-45021 * CVE-2024-45022 * CVE-2024-45023 * CVE-2024-45026 * CVE-2024-45028 * CVE-2024-45029 * CVE-2024-45030 * CVE-2024-46672 * CVE-2024-46673 * CVE-2024-46674 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46687 * CVE-2024-46689 * CVE-2024-46691 * CVE-2024-46692 * CVE-2024-46693 * CVE-2024-46694 * CVE-2024-46695 * CVE-2024-46702 * CVE-2024-46706 * CVE-2024-46707 * CVE-2024-46709 * CVE-2024-46710 * CVE-2024-46714 * CVE-2024-46715 * CVE-2024-46716 * CVE-2024-46717 * CVE-2024-46719 * CVE-2024-46720 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46724 * CVE-2024-46725 * CVE-2024-46726 * CVE-2024-46728 * CVE-2024-46729 * CVE-2024-46730 * CVE-2024-46731 * CVE-2024-46732 * CVE-2024-46734 * CVE-2024-46735 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46741 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46746 * CVE-2024-46747 * CVE-2024-46749 * CVE-2024-46750 * CVE-2024-46751 * CVE-2024-46752 * CVE-2024-46753 * CVE-2024-46755 * CVE-2024-46756 * CVE-2024-46757 * CVE-2024-46758 * CVE-2024-46759 * CVE-2024-46760 * CVE-2024-46761 * CVE-2024-46767 * CVE-2024-46771 * CVE-2024-46772 * CVE-2024-46773 * CVE-2024-46774 * CVE-2024-46776 * CVE-2024-46778 * CVE-2024-46780 * CVE-2024-46781 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46786 * CVE-2024-46787 * CVE-2024-46791 * CVE-2024-46794 * CVE-2024-46797 * CVE-2024-46798 * CVE-2024-46822 CVSS scores: * CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42294 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44960 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44960 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-44960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44961 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44962 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44984 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-44985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44985 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45012 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46724 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46734 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46734 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46735 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46741 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46741 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46741 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46747 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46749 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46749 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46752 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46756 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46756 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46757 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46757 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46758 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46758 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46786 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46794 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * Legacy Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 An update that solves 162 vulnerabilities, contains two features and has 48 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487). * CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269). * CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650). * CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340). * CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629). * CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606). * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42243: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray (bsc#1229001). * CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004). * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-42294: block: fix deadlock between sd_remove & sd_release (bsc#1229371). * CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394). * CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio reference (bsc#1229380). * CVE-2024-43845: udf: Fix bogus checksum computation in udf_rename() (bsc#1229389). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810). * CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption (bsc#1230181). * CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209). * CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211). * CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (bsc#1230240). * CVE-2024-44985: ipv6: prevent possible UAF in ip6_xmit() (bsc#1230206). * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192). * CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193). * CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194). * CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch (bsc#1230195). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling (bsc#1230169). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). * CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442). * CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430). * CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431). * CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter (bsc#1230432). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 (bsc#1230435). * CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow disk (bsc#1230455). * CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451). * CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() (bsc#1230518). * CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section (bsc#1230526). * CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call (bsc#1230520). * CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes (bsc#1230521). * CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers (bsc#1230540). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop (bsc#1230704). * CVE-2024-46735: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() (bsc#1230727). * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786). * CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). The following non-security bugs were fixed: * ABI: testing: fix admv8818 attr description (git-fixes). * ACPI: CPPC: Add helper to get the highest performance value (stable-fixes). * ACPI: CPPC: Fix MASK_VAL() usage (git-fixes). * ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git- fixes). * ACPI: processor: Fix memory leaks in error paths of processor_add() (stable- fixes). * ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes). * ACPI: sysfs: validate return type of _STR method (git-fixes). * ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes). * ACPICA: executer/exsystem: Do not nag user about every Stall() violating the spec (git-fixes). * ALSA: control: Apply sanity check of input values for user elements (stable- fixes). * ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes). * ALSA: hda/realtek - Fix inactive headset mic jack for ASUS Vivobook 15 X1504VAP (stable-fixes). * ALSA: hda/realtek: Enable Mute Led for HP Victus 15-fb1xxx (stable-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes). * ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes). * ALSA: hda/realtek: extend quirks for Clevo V5[46]0 (stable-fixes). * ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes). * ALSA: hda: add HDMI codec ID for Intel PTL (stable-fixes). * ALSA: hda: cs35l41: fix module autoloading (git-fixes). * ARM: 9406/1: Fix callchain_trace() return value (git-fixes). * ASoC: Intel: soc-acpi-cht: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * ASoC: amd: yc: Add a quirk for MSI Bravo 17 (D7VEK) (stable-fixes). * ASoC: codecs: avoid possible garbage value in peb2466_reg_read() (git- fixes). * ASoC: cs42l42: Convert comma to semicolon (git-fixes). * ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes). * ASoC: intel: fix module autoloading (stable-fixes). * ASoC: meson: Remove unused declartion in header file (git-fixes). * ASoC: meson: axg-card: fix 'use-after-free' (git-fixes). * ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git- fixes). * ASoC: rt5682s: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes). * ASoC: soc-ac97: Fix the incorrect description (git-fixes). * ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes). * ASoC: tas2781-i2c: Get the right GPIO line (git-fixes). * ASoC: tda7419: fix module autoloading (stable-fixes). * ASoC: tegra: Fix CBB error during probe() (git-fixes). * ASoC: topology: Properly initialize soc_enum values (stable-fixes). * ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes). * ASoc: TAS2781: replace beXX_to_cpup with get_unaligned_beXX for potentially broken alignment (stable-fixes). * Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes). * Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush() (stable-fixes). * Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes). * Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes). * Bluetooth: hci_event: Use HCI error defines instead of magic values (stable- fixes). * Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue (stable-fixes). * Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git- fixes). * Detect memory allocation failure in annotated_source__alloc_histograms (bsc#1227962). * Documentation: ioctl: document 0x07 ioctl code (git-fixes). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Drivers: hv: vmbus: Fix the misplaced function description (git-fixes). * HID: amd_sfh: free driver_data after destroying hid device (stable-fixes). * HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable- fixes). * HID: multitouch: Add support for GT7868Q (stable-fixes). * HID: wacom: Do not warn about dropped packets for first packet (git-fixes). * HID: wacom: Support sequence numbers smaller than 16-bit (git-fixes). * IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes) * Input: adp5588-keys - fix check on return code (git-fixes). * Input: ads7846 - ratelimit the spi_sync error message (stable-fixes). * Input: ili210x - use kvmalloc() to allocate buffer for firmware update (stable-fixes). * Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes). * Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes). * Input: tsc2004/5 - do not hard code interrupt trigger (git-fixes). * Input: tsc2004/5 - fix reset handling on probe (git-fixes). * Input: tsc2004/5 - use device core to create driver-specific device attributes (git-fixes). * Input: uinput - reject requests with unreasonable number of slots (stable- fixes). * KEYS: prevent NULL pointer dereference in find_asymmetric_key() (git-fixes). * KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes). * KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes). * KVM: arm64: Block unsafe FF-A calls from the host (git-fixes). * KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging (git-fixes). * KVM: arm64: Do not pass a TLBI level hint when zapping table entries (git- fixes). * KVM: arm64: Do not re-initialize the KVM lock (git-fixes). * KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init (git-fixes). * KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (git- fixes). * KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes). * KVM: arm64: nvhe: Ignore SVE hint in SMCCC function ID (git-fixes). * KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git- fixes). * KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (git-fixes). * Move fixes into sorted section (bsc#1230119) * NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726). * NFSD: Fix frame size warning in svc_export_parse() (git-fixes). * NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes). * NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes). * PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes). * PCI: Wait for Link before restoring Downstream Buses (git-fixes). * PCI: al: Check IORESOURCE_BUS existence during probe (stable-fixes). * PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes). * PCI: dra7xx: Fix threaded IRQ request for "dra7xx-pcie-main" IRQ (git- fixes). * PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes). * PCI: imx6: Fix missing call to phy_power_off() in error handling (git- fixes). * PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable- fixes). * PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes). * PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() (git-fixes). * PCI: qcom-ep: Enable controller resources like PHY only after refclk is available (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes). * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/efa: Properly handle unexpected AQ completions (git-fixes) * RDMA/erdma: Return QP state in erdma_query_qp (git-fixes) * RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes) * RDMA/hns: Fix 1bit-ECC recovery address in non-4K OS (git-fixes) * RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 (git-fixes) * RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git- fixes) * RDMA/hns: Fix ah error counter in sw stat not increasing (git-fixes) * RDMA/hns: Fix restricted __le16 degrades to integer issue (git-fixes) * RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes) * RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes) * RDMA/hns: Optimize hem allocation performance (git-fixes) * RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * RDMA/mlx5: Drop redundant work canceling from clean_keys() (git-fixes) * RDMA/mlx5: Fix MR cache temp entries cleanup (git-fixes) * RDMA/mlx5: Fix counter update on MR cache mkey creation (git-fixes) * RDMA/mlx5: Limit usage of over-sized mkeys from the MR cache (git-fixes) * RDMA/mlx5: Obtain upper net device only when needed (git-fixes) * RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes) * RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git- fixes) * Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes). * Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE" (git-fixes). * Revert "PCI: Extend ACS configurability (bsc#1228090)." (bsc#1229019) * Revert "drm/amdgpu: align pp_power_profile_mode with kernel docs" (stable- fixes). * Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (git-fixes). * Revert "mm, kmsan: fix infinite recursion due to RCU critical section" * Revert "mm/sparsemem: fix race in accessing memory_section->usage" * Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" * Squashfs: sanity check symbolic link size (git-fixes). * USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes). * USB: serial: kobil_sct: restore initial terminal settings (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (git-fixes). * USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes). * USB: usbtmc: prevent kernel-usb-infoleak (git-fixes). * VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes). * afs: Do not cross .backup mountpoint from backup volume (git-fixes). * afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes). * arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585) * arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585) * arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes). * arm64: dts: allwinner: h616: Add r_i2c pinctrl nodes (git-fixes). * arm64: dts: exynos: exynos7885-jackpotlte: Correct RAM amount to 4GB (git- fixes). * arm64: dts: imx8-ss-dma: Fix adc0 closing brace location (git-fixes). * arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git- fixes). * arm64: dts: rockchip: Correct vendor prefix for Hardkernel ODROID-M1 (git- fixes). * arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes). * arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git- fixes). * arm64: dts: rockchip: fix eMMC/SPI corruption when audio has been used on RK3399 Puma (git-fixes). * arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes). * arm64: signal: Fix some under-bracketed UAPI macros (git-fixes). * arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585) * arm64: tlb: Fix TLBI RANGE operand (bsc#1229585) * arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585) * ata: libata-scsi: Fix ata_msense_control() CDL page reporting (git-fixes). * ata: libata: Clear DID_TIME_OUT for ATA PT commands with sense data (git- fixes). * ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes). * ata: pata_macio: Use WARN instead of BUG (stable-fixes). * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * bpf, events: Use prog to emit ksymbol event for main program (git-fixes). * bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (git-fixes). * btrfs: fix race between direct IO write and fsync when using same fd (git- fixes). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1230854). * bus: integrator-lm: fix OF node leak in probe() (git-fixes). * cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231008). * cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183). * can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes). * can: bcm: Remove proc entry when dev is unregistered (git-fixes). * can: j1939: use correct function name in comment (git-fixes). * can: kvaser_pciefd: Skip redundant NULL pointer check in ISR (stable-fixes). * can: m_can: Release irq on error in m_can_open (git-fixes). * can: m_can: enable NAPI before enabling interrupts (git-fixes). * can: m_can: m_can_close(): stop clocks after device has been shut down (git- fixes). * can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git- fixes). * can: mcp251xfd: clarify the meaning of timestamp (stable-fixes). * can: mcp251xfd: fix ring configuration when switching from CAN-CC to CAN-FD mode (git-fixes). * can: mcp251xfd: mcp251xfd_handle_rxif_ring_uinc(): factor out in separate function (stable-fixes). * can: mcp251xfd: mcp251xfd_ring_init(): check TX-coalescing configuration (stable-fixes). * can: mcp251xfd: move mcp251xfd_timestamp_start()/stop() into mcp251xfd_chip_start/stop() (stable-fixes). * can: mcp251xfd: properly indent labels (stable-fixes). * can: mcp251xfd: rx: add workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * can: mcp251xfd: rx: prepare to workaround broken RX FIFO head index erratum (stable-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (stable- fixes). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231182). * clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885). * clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885). * clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes). * clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git- fixes). * clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes). * clk: qcom: gcc-sc8280xp: do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: gcc-sm8550: Do not park the USB RCG at registration time (git- fixes). * clk: qcom: gcc-sm8550: Do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: ipq9574: Update the alpha PLL type for GPLLs (git-fixes). * clk: ti: dra7-atl: Fix leak of of_nodes (git-fixes). * clocksource/drivers/imx-tpm: Fix next event not taking effect sometime (git- fixes). * clocksource/drivers/imx-tpm: Fix return -ETIME when delta exceeds INT_MAX (git-fixes). * clocksource/drivers/qcom: Add missing iounmap() on errors in msm_dt_timer_init() (git-fixes). * cpufreq: amd-pstate: Enable amd-pstate preferred core support (stable- fixes). * cpufreq: amd-pstate: fix the highest frequency issue which limits performance (git-fixes). * cpufreq: scmi: Avoid overflow of target_freq in fast switch (stable-fixes). * cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes). * crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes). * crypto: ccp - do not request interrupt on cmd completion when irqs disabled (git-fixes). * crypto: iaa - Fix potential use after free bug (git-fixes). * crypto: qat - fix unintentional re-enabling of error interrupts (stable- fixes). * crypto: xor - fix template benchmarking (git-fixes). * cxl/core: Fix incorrect vendor debug UUID define (git-fixes). * cxl/pci: Fix to record only non-zero ranges (git-fixes). * devres: Initialize an uninitialized struct member (stable-fixes). * dma-buf: heaps: Fix off-by-one in CMA heap fault handler (git-fixes). * dma-debug: avoid deadlock between dma debug vs printk and netconsole (stable-fixes). * dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (stable-fixes). * dmaengine: altera-msgdma: use irq variant of spin_lock/unlock while invoking callbacks (stable-fixes). * driver core: Fix a potential null-ptr-deref in module_add_driver() (git- fixes). * driver core: Fix error handling in driver API device_rename() (git-fixes). * driver: iio: add missing checks on iio_info's callback access (stable- fixes). * drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes). * drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes). * drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes). * drm/amd/amdgpu: Check tbo resource pointer (stable-fixes). * drm/amd/amdgpu: Properly tune the size of struct (git-fixes). * drm/amd/display: Add array index check for hdcp ddc access (stable-fixes). * drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (git-fixes). * drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing (stable-fixes). * drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes). * drm/amd/display: Avoid overflow from uint32_t to uint8_t (stable-fixes). * drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct() (git-fixes). * drm/amd/display: Check BIOS images before it is used (stable-fixes). * drm/amd/display: Check HDCP returned status (stable-fixes). * drm/amd/display: Check UnboundedRequestEnabled's value (stable-fixes). * drm/amd/display: Check denominator pbn_div before used (stable-fixes). * drm/amd/display: Check gpio_id before used as array index (stable-fixes). * drm/amd/display: Check index for aux_rd_interval before using (stable- fixes). * drm/amd/display: Check msg_id before processing transcation (stable-fixes). * drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes). * drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes). * drm/amd/display: Defer handling mst up request in resume (stable-fixes). * drm/amd/display: Disable error correction if it's not supported (stable- fixes). * drm/amd/display: Do not use fsleep for PSR exit waits on dmub replay (stable-fixes). * drm/amd/display: Ensure array index tg_inst won't be -1 (stable-fixes). * drm/amd/display: Ensure index calculation will not overflow (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within decide_fallback_link_setting_max_bw_policy (stable-fixes). * drm/amd/display: Fix Coverity INTERGER_OVERFLOW within construct_integrated_info (stable-fixes). * drm/amd/display: Fix FEC_READY write on DP LT (stable-fixes). * drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (stable-fixes). * drm/amd/display: Fix pipe addition logic in calc_blocks_to_ungate DCN35 (stable-fixes). * drm/amd/display: Handle the case which quad_part is equal 0 (stable-fixes). * drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection (stable-fixes). * drm/amd/display: Replace dm_execute_dmub_cmd with dc_wake_and_execute_dmub_cmd (git-fixes). * drm/amd/display: Run DC_LOG_DC after checking link->link_enc (stable-fixes). * drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes). * drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable- fixes). * drm/amd/display: Solve mst monitors blank out problem after resume (git- fixes). * drm/amd/display: Spinlock before reading event (stable-fixes). * drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes). * drm/amd/display: Wake DMCUB before sending a command for replay feature (stable-fixes). * drm/amd/display: added NULL check at start of dc_validate_stream (stable- fixes). * drm/amd/display: handle nulled pipe context in DCE110's set_drr() (git- fixes). * drm/amd/display: use preferred link settings for dp signal only (stable- fixes). * drm/amd/pm: Fix negative array index read (stable-fixes). * drm/amd/pm: check negtive return for table entries (stable-fixes). * drm/amd/pm: check specific index for aldebaran (stable-fixes). * drm/amd/pm: check specific index for smu13 (stable-fixes). * drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable- fixes). * drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable- fixes). * drm/amd: Add gfx12 swizzle mode defs (stable-fixes). * drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes). * drm/amdgpu/display: handle gfx12 in amdgpu_dm_plane_format_mod_supported (stable-fixes). * drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes). * drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable- fixes). * drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes). * drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes). * drm/amdgpu/swsmu: always force a state reprogram on init (stable-fixes). * drm/amdgpu: Fix get each xcp macro (git-fixes). * drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes). * drm/amdgpu: Fix out-of-bounds write warning (stable-fixes). * drm/amdgpu: Fix smatch static checker warning (stable-fixes). * drm/amdgpu: Fix the uninitialized variable warning (stable-fixes). * drm/amdgpu: Fix the warning division or modulo by zero (stable-fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable- fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_info_ioctl (stable- fixes). * drm/amdgpu: Handle sg size limit for contiguous allocation (stable-fixes). * drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes). * drm/amdgpu: add lock in amdgpu_gart_invalidate_tlb (stable-fixes). * drm/amdgpu: add lock in kfd_process_dequeue_from_device (stable-fixes). * drm/amdgpu: add missing error handling in function amdgpu_gmc_flush_gpu_tlb_pasid (stable-fixes). * drm/amdgpu: add skip_hw_access checks for sriov (stable-fixes). * drm/amdgpu: align pp_power_profile_mode with kernel docs (stable-fixes). * drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes). * drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes). * drm/amdgpu: fix a possible null pointer dereference (git-fixes). * drm/amdgpu: fix contiguous handling for IB parsing v2 (git-fixes). * drm/amdgpu: fix dereference after null check (stable-fixes). * drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix overflowed array index read warning (stable-fixes). * drm/amdgpu: fix overflowed constant warning in mmhub_set_clockgating() (stable-fixes). * drm/amdgpu: fix the waring dereferencing hive (stable-fixes). * drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes). * drm/amdgpu: handle gfx12 in amdgpu_display_verify_sizes (stable-fixes). * drm/amdgpu: properly handle vbios fake edid sizing (git-fixes). * drm/amdgpu: reject gang submit on reserved VMIDs (stable-fixes). * drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes). * drm/amdgpu: update type of buf size to u32 for eeprom functions (stable- fixes). * drm/amdgu: fix Unintentional integer overflow for mall size (stable-fixes). * drm/amdkfd: Check debug trap enable before write dbg_ev_file (stable-fixes). * drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes). * drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes). * drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes). * drm/drm-bridge: Drop conditionals around of_node pointers (stable-fixes). * drm/fb-helper: Do not schedule_work() to flush frame buffer during panic() (stable-fixes). * drm/gpuvm: fix missing dependency to DRM_EXEC (git-fixes). * drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes). * drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git- fixes). * drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes). * drm/i915: Do not attempt to load the GSC multiple times (git-fixes). * drm/kfd: Correct pinned buffer handling at kfd restore and validate process (stable-fixes). * drm/mediatek: Set sensible cursor width/height values to fix crash (stable- fixes). * drm/mediatek: ovl_adaptor: Add missing of_node_put() (git-fixes). * drm/meson: plane: Add error handling (stable-fixes). * drm/msm/a5xx: disable preemption in submits by default (git-fixes). * drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes). * drm/msm/a5xx: properly clear preemption records on resume (git-fixes). * drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes). * drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes). * drm/msm/dsi: correct programming sequence for SM8350 / SM8450 (git-fixes). * drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes). * drm/msm: fix %s null argument error (git-fixes). * drm/nouveau/fb: restore init() for ramgp102 (git-fixes). * drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git- fixes). * drm/radeon: fix null pointer dereference in radeon_add_common_modes (git- fixes). * drm/radeon: properly handle vbios fake edid sizing (git-fixes). * drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git- fixes). * drm/rockchip: vop: Allow 4096px width scaling (git-fixes). * drm/rockchip: vop: clear DMA stop bit on RK3066 (git-fixes). * drm/rockchip: vop: enable VOP_FEATURE_INTERNAL_RGB on RK3066 (git-fixes). * drm/stm: Fix an error handling path in stm_drm_platform_probe() (git-fixes). * drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes). * drm/syncobj: Fix syncobj leak in drm_syncobj_eventfd_ioctl (git-fixes). * drm/vc4: hdmi: Handle error case of pm_runtime_resume_and_get (git-fixes). * drm: komeda: Fix an issue related to normalized zpos (stable-fixes). * drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Max (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Zero (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes). * ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() (git-fixes). * erofs: fix incorrect symlink detection in fast symlink (git-fixes). * exfat: fix memory leak in exfat_load_bitmap() (git-fixes). * fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes). * firmware: arm_scmi: Fix double free in OPTEE transport (git-fixes). * firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes). * firmware_loader: Block path traversal (git-fixes). * fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230602). * fuse: fix memory leak in fuse_create_open (bsc#1230124). * fuse: update stats for pages in dropped aux writeback list (bsc#1230125). * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230123). * gpio: modepin: Enable module autoloading (git-fixes). * gpio: rockchip: fix OF node leak in probe() (git-fixes). * hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (asus-ec-sensors) remove VRM temp X570-E GAMING (stable-fixes). * hwmon: (k10temp) Check return value of amd_smn_read() (stable-fixes). * hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable- fixes). * hwmon: (max16065) Fix overflows seen when writing limits (git-fixes). * hwmon: (nct6775-core) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (ntc_thermistor) fix module autoloading (git-fixes). * hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >= 1.2 (git-fixes). * hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes). * hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git- fixes). * hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git- fixes). * hwrng: mtk - Use devm_pm_runtime_enable (git-fixes). * i2c: aspeed: Update the stop sw state when the bus recovery occurs (git- fixes). * i2c: designware: fix controller is holding SCL low while ENABLE bit is disabled (git-fixes). * i2c: isch: Add missed 'else' (git-fixes). * i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes). * i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition (git-fixes). * i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable- fixes). * iio: adc: ad7124: fix chip ID mismatch (git-fixes). * iio: adc: ad7124: fix config comparison (git-fixes). * iio: adc: ad7606: fix oversampling gpio array (git-fixes). * iio: adc: ad7606: fix standby gpio state to match the documentation (git- fixes). * iio: adc: ad7606: remove frstdata check for serial mode (git-fixes). * iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes). * iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git- fixes). * iio: fix scale application in iio_convert_raw_to_processed_unlocked (git- fixes). * iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes). * ipmi: docs: do not advertise deprecated sysfs entries (git-fixes). * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230206) * jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes). * kABI workaround for cros_ec stuff (git-fixes). * kabi: dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * kselftests: dmabuf-heaps: Ensure the driver name is null-terminated (stable- fixes). * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * leds: spi-byte: Call of_node_put() on error path (stable-fixes). * lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (stable- fixes). * lirc: rc_dev_get_from_fd(): fix file leak (git-fixes). * mailbox: bcm2835: Fix timeout during suspend mode (git-fixes). * mailbox: rockchip: fix a typo in module autoloading (git-fixes). * media: i2c: ar0521: Use cansleep version of gpiod_set_value() (git-fixes). * media: ov5675: Fix power on/off delay timings (git-fixes). * media: platform: rzg2l-cru: rzg2l-csi2: Add missing MODULE_DEVICE_TABLE (git-fixes). * media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes). * media: qcom: camss: Remove use_count guard in stop_streaming (git-fixes). * media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes). * media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes). * media: uvcvideo: Enforce alignment of frame and interval (stable-fixes). * media: venus: fix use after free bug in venus_remove due to race condition (git-fixes). * media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes). * media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes). * media: vivid: fix wrong sizeimage value for mplane (stable-fixes). * memory: mtk-smi: Use devm_clk_get_enabled() (git-fixes). * memory: tegra186-emc: drop unused to_tegra186_emc() (git-fixes). * minmax: reduce min/max macro expansion in atomisp driver (git-fixes). * misc: fastrpc: Fix double free of 'buf' in error path (git-fixes). * mmc: core: apply SD quirks earlier during probe (git-fixes). * mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes). * mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes). * mmc: sdhci-of-aspeed: fix module autoloading (git-fixes). * module: Fix KCOV-ignored file name (git-fixes). * mtd: powernv: Add check devm_kasprintf() returned value (git-fixes). * mtd: slram: insert break after errors in parsing the map (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: phy: Fix missing of_node_put() for leds (git-fixes). * net: phy: vitesse: repair vsc73xx autonegotiation (stable-fixes). * net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes). * net: usb: qmi_wwan: add MeiG Smart SRM825L (stable-fixes). * nfsd: Do not leave work of closing files to a work queue (bsc#1228140). * nilfs2: determine empty node blocks as corrupted (git-fixes). * nilfs2: fix missing cleanup on rollforward recovery error (git-fixes). * nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes). * nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes). * nilfs2: fix state management in error path of log writing function (git- fixes). * nilfs2: protect references to superblock parameters exposed in sysfs (git- fixes). * nouveau: fix the fwsec sb verification register (git-fixes). * nvme-multipath: avoid hang on inaccessible namespaces (bsc#1228244). * nvme-multipath: system fails to create generic nvme device (bsc#1228244). * nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes). * nvme-pci: allocate tagset on reset if necessary (git-fixes). * nvme-tcp: fix link failure for TCP auth (git-fixes). * nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes). * nvme: clear caller pointer on identify failure (git-fixes). * nvme: fix namespace removal list (git-fixes). * nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes). * nvmet-tcp: do not continue for invalid icreq (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet-trace: avoid dereferencing pointer too early (git-fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes). * pcmcia: Use resource_size function on resource object (stable-fixes). * perf annotate: Introduce global annotation_options (git-fixes). * perf annotate: Split branch stack cycles information out of 'struct annotation_line' (git-fixes). * perf annotate: Use global annotation_options (git-fixes). * perf arch events: Fix duplicate RISC-V SBI firmware event name (git-fixes). * perf intel-pt: Fix aux_watermark calculation for 64-bit size (git-fixes). * perf intel-pt: Fix exclude_guest setting (git-fixes). * perf machine thread: Remove exited threads by default (git-fixes). * perf maps: Move symbol maps functions to maps.c (git-fixes). * perf pmu: Assume sysfs events are always the same case (git-fixes). * perf pmus: Fixes always false when compare duplicates aliases (git-fixes). * perf record: Lazy load kernel symbols (git-fixes). * perf report: Convert to the global annotation_options (git-fixes). * perf report: Fix condition in sort__sym_cmp() (git-fixes). * perf stat: Fix the hard-coded metrics calculation on the hybrid (git-fixes). * perf test: Make test_arm_callgraph_fp.sh more robust (git-fixes). * perf tool: fix dereferencing NULL al->maps (git-fixes). * perf tools: Add/use PMU reverse lookup from config to name (git-fixes). * perf tools: Use pmus to describe type from attribute (git-fixes). * perf top: Convert to the global annotation_options (git-fixes). * perf/core: Fix missing wakeup when waiting for context reference (git- fixes). * perf/x86/intel/cstate: Add pkg C2 residency counter for Sierra Forest (git- fixes). * perf/x86/intel/cstate: Fix Alderlake/Raptorlake/Meteorlake (git-fixes). * perf/x86/intel/ds: Fix non 0 retire latency on Raptorlake (git-fixes). * perf/x86/intel/pt: Fix a topa_entry base address calculation (git-fixes). * perf/x86/intel/pt: Fix pt_topa_entry_for_page() address calculation (git- fixes). * perf/x86/intel/pt: Fix topa_entry base length (git-fixes). * perf/x86/intel/uncore: Fix the bits of the CHA extended umask for SPR (git- fixes). * perf/x86/intel/uncore: Support HBM and CXL PMON counters (bsc#1230119). * perf/x86/intel: Add a distinct name for Granite Rapids (git-fixes). * perf/x86/intel: Factor out the initialization code for SPR (git fixes). * perf/x86/intel: Limit the period on Haswell (git-fixes). * perf/x86/intel: Use the common uarch name for the shared functions (git fixes). * perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to MSR uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to PCI uncore units (bsc#1230119). * perf/x86/uncore: Cleanup unused unit structure (bsc#1230119). * perf/x86/uncore: Retrieve the unit ID from the unit control RB tree (bsc#1230119). * perf/x86/uncore: Save the unit control address of all units (bsc#1230119). * perf/x86/uncore: Support per PMU cpumask (bsc#1230119). * perf/x86: Fix smp_processor_id()-in-preemptible warnings (git-fixes). * perf/x86: Serialize set_attr_rdpmc() (git-fixes). * perf: Fix default aux_watermark calculation (git-fixes). * perf: Fix event leak upon exit (git-fixes). * perf: Fix perf_aux_size() for greater-than 32-bit size (git-fixes). * perf: Prevent passing zero nr_pages to rb_alloc_aux() (git-fixes). * perf: script: add raw|disasm arguments to --insn-trace option (git-fixes). * phy: zynqmp: Take the phy mutex in xlate (stable-fixes). * pinctrl: at91: make it work with current gpiolib (stable-fixes). * pinctrl: meteorlake: Add Arrow Lake-H/U ACPI ID (stable-fixes). * pinctrl: single: fix missing error code in pcs_probe() (git-fixes). * platform/chrome: cros_ec_lpc: MEC access can use an AML mutex (stable- fixes). * platform/surface: aggregator_registry: Add Support for Surface Pro 10 (stable-fixes). * platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes). * platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes). * platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes). * platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git- fixes). * platform/x86: x86-android-tablets: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes). * power: supply: axp20x_battery: Remove design from min and max voltage (git- fixes). * power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes). * power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes). * powercap/intel_rapl: Add support for AMD family 1Ah (stable-fixes). * powerpc/qspinlock: Fix deadlock in MCS queue (bac#1230295 ltc#206656). * pwm: xilinx: Fix u32 overflow issue in 32-bit width PWM mode (stable-fixes). * r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes). * regmap: maple: work around gcc-14.1 false-positive warning (stable-fixes). * regmap: spi: Fix potential off-by-one when calculating reserved size (stable-fixes). * regulator: Return actual error in of_regulator_bulk_get_all() (git-fixes). * regulator: core: Fix regulator_is_supported_voltage() kerneldoc return value (git-fixes). * regulator: core: Fix short description for _regulator_check_status_enabled() (git-fixes). * regulator: core: Stub devm_regulator_bulk_get_const() if !CONFIG_REGULATOR (git-fixes). * regulator: rt5120: Convert comma to semicolon (git-fixes). * regulator: wm831x-isink: Convert comma to semicolon (git-fixes). * remoteproc: imx_rproc: Correct ddr alias for i.MX8M (git-fixes). * remoteproc: imx_rproc: Initialize workqueue earlier (git-fixes). * remoteproc: k3-r5: Fix error handling when power-up failed (git-fixes). * reset: berlin: fix OF node leak in probe() error path (git-fixes). * reset: k210: fix OF node leak in probe() error path (git-fixes). * resource: fix region_intersects() vs add_memory_driver_managed() (git- fixes). * rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY gcc version dependent, at least on ppc * rtc: at91sam9: fix OF node leak in probe() error path (git-fixes). * s390/dasd: Fix redundant /proc/dasd* entries removal (bsc#1227694). * s390/dasd: Remove DMA alignment (LTC#208933 bsc#1230426 git-fixes). * s390/mm: Convert gmap_make_secure to use a folio (git-fixes bsc#1230562). * s390/mm: Convert make_page_secure to use a folio (git-fixes bsc#1230563). * s390: allow pte_offset_map_lock() to fail (git-fixes bsc#1230564). * scripts: kconfig: merge_config: config files: add a trailing newline (stable-fixes). * scripts: sphinx-pre-install: remove unnecessary double check for $cur_version (git-fixes). * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix overflow build issue (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429 jsc#PED-9899). * scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848). * selftests: lib: remove strscpy test (git-fixes). * selinux,smack: do not bypass permissions check in inode_setsecctx hook (stable-fixes). * soc: fsl: cpm1: tsa: Fix tsa_write8() (git-fixes). * soc: versatile: integrator: fix OF node leak in probe() error path (git- fixes). * spi: atmel-quadspi: Avoid overwriting delay register settings (git-fixes). * spi: atmel-quadspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: bcm63xx: Enable module autoloading (stable-fixes). * spi: bcm63xx: Fix module autoloading (git-fixes). * spi: meson-spicc: convert comma to semicolon (git-fixes). * spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes). * spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes). * spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes). * spi: rockchip: Resolve unbalanced runtime PM / system PM handling (git- fixes). * spi: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: spidev: Add an entry for elgin,jg10309-01 (stable-fixes). * spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes). * staging: iio: frequency: ad9834: Validate frequency parameter value (git- fixes). * supported.conf: mark adiantum and xctr crypto modules as supported (bsc#1231035) * thunderbolt: Fix XDomain rx_lanes_show and tx_lanes_show (git-fixes). * thunderbolt: Fix calculation of consumed USB3 bandwidth on a path (git- fixes). * thunderbolt: Fix rollback in tb_port_lane_bonding_enable() for lane 1 (git- fixes). * thunderbolt: There are only 5 basic router registers in pre-USB4 routers (git-fixes). * tomoyo: fallback to realpath if symlink's pathname does not exist (git- fixes). * tools/perf: Fix the string match for "/tmp/perf-$PID.map" files in dso__load (git-fixes). * tpm: Clean up TPM space after command failure (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usb: cdnsp: Fix incorrect usb_request status (git-fixes). * usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes). * usb: dwc2: drd: fix clock gating on USB role switch (git-fixes). * usb: dwc3: Avoid waking up gadget during startxfer (git-fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (git- fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (stable-fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes). * usb: gadget: aspeed_udc: validate endpoint index for ast udc (stable-fixes). * usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes). * usb: typec: ucsi: Wait 20ms before reading CCI after a reset (git-fixes). * usb: uas: set host status byte on data completion error (stable-fixes). * usbip: Do not submit special requests twice (stable-fixes). * usbnet: ipheth: add CDC NCM support (git-fixes). * usbnet: ipheth: do not stop RX on failing RX callback (git-fixes). * usbnet: ipheth: drop RX URBs with no payload (git-fixes). * usbnet: ipheth: fix carrier detection in modes 1 and 4 (git-fixes). * usbnet: ipheth: fix risk of NULL pointer deallocation (git-fixes). * usbnet: ipheth: race between ipheth_close and error handling (stable-fixes). * usbnet: ipheth: remove extraneous rx URB length check (git-fixes). * usbnet: ipheth: transmit URBs without trailing padding (git-fixes). * usbnet: modern method to get random MAC (git-fixes). * virtio-net: synchronize probe with ndo_set_features (git-fixes). * virtio_net: Fix napi_skb_cache_put warning (git-fixes). * virtio_net: fixing XDP for fully checksummed packets handling (git-fixes). * watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes). * wifi: ath11k: initialize 'ret' in ath11k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: fix BSS chan info request WMI command (git-fixes). * wifi: ath12k: fix firmware crash due to invalid peer nss (stable-fixes). * wifi: ath12k: fix invalid AMPDU factor calculation in ath12k_peer_assoc_h_he() (git-fixes). * wifi: ath12k: fix uninitialize symbol error on ath12k_peer_assoc_h_he() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_dp_rxdma_ring_sel_config_wcn7850() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: match WMI BSS chan info structure with firmware definition (git-fixes). * wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes). * wifi: brcmfmac: introducing fwil query functions (git-fixes). * wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes). * wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes). * wifi: cfg80211: fix bug of mapping AF3x to incorrect User Priority (git- fixes). * wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git- fixes). * wifi: cfg80211: make hash table duplicates more survivable (stable-fixes). * wifi: cfg80211: restrict operation during radar detection (stable-fixes). * wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes). * wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes). * wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (stable- fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_max_scan_ie_fw_cmd_room() (stable-fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes). * wifi: iwlwifi: mvm: increase the time between ranging measurements (git- fixes). * wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (stable-fixes). * wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check (stable-fixes). * wifi: mac80211: check ieee80211_bss_info_change_notify() against MLD (stable-fixes). * wifi: mac80211: do not use rate mask for offchannel TX either (git-fixes). * wifi: mac80211: fix the comeback long retry times (git-fixes). * wifi: mac80211: free skb on error path in ieee80211_beacon_get_ap() (stable- fixes). * wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git- fixes). * wifi: mt76: connac: fix checksum offload fields of connac3 RXD (git-fixes). * wifi: mt76: mt7603: fix mixed declarations and code (git-fixes). * wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: fix oops on non-dbdc mt7986 (git-fixes). * wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7921: Check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change (stable-fixes). * wifi: mt76: mt7921: fix wrong UNII-4 freq range check for the channel usage (git-fixes). * wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc (git-fixes). * wifi: mt76: mt7996: fix EHT beamforming capability check (git-fixes). * wifi: mt76: mt7996: fix HE and EHT beamforming capabilities (git-fixes). * wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he (git-fixes). * wifi: mt76: mt7996: fix traffic delay when switching back to working channel (git-fixes). * wifi: mt76: mt7996: fix uninitialized TLV data (git-fixes). * wifi: mt76: mt7996: fix wmm set of station interface to 3 (git-fixes). * wifi: mt76: mt7996: use hweight16 to get correct tx antenna (git-fixes). * wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes). * wifi: rtw88: 8822c: Fix reported RX band width (git-fixes). * wifi: rtw88: always wait for both firmware loading attempts (git-fixes). * wifi: rtw88: remove CPT execution branch never used (git-fixes). * wifi: rtw88: usb: schedule rx work after everything is set up (stable- fixes). * wifi: rtw89: ser: avoid multiple deinit on same CAM (stable-fixes). * wifi: rtw89: wow: prevent to send unexpected H2C during download Firmware (stable-fixes). * wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes). * x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes). * x86/kaslr: Expose and use the end of the physical memory address space (bsc#1229443). * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). * x86/mm: Use lookup_address_in_pgd_attr() in show_fault_oops() (bsc#1221527). * x86/pat: Fix W^X violation false-positives when running as Xen PV guest (bsc#1221527). * x86/pat: Introduce lookup_address_in_pgd_attr() (bsc#1221527). * x86/pat: Restructure _lookup_address_cpa() (bsc#1221527). * xen/swiotlb: add alignment check for dma buffers (bsc#1229928). * xen/swiotlb: fix allocated size (git-fixes). * xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003). * xen: allow mapping ACPI data using a different physical address (bsc#1226003). * xen: introduce generic helper checking for memory map conflicts (bsc#1226003). * xen: move checks for e820 conflicts further up (bsc#1226003). * xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003). * xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003). * xen: use correct end address of kernel for conflict checking (bsc#1226003). * xfs: restrict when we try to align cow fork delalloc to cowextsz hints (git- fixes). * xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git- fixes). * xz: cleanup CRC32 edits from 2018 (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3561=1 openSUSE-SLE-15.6-2024-3561=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3561=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3561=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3561=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3561=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3561=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3561=1 ## Package List: * openSUSE Leap 15.6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.25.2 * openSUSE Leap 15.6 (noarch) * kernel-docs-html-6.4.0-150600.23.25.2 * kernel-source-vanilla-6.4.0-150600.23.25.1 * kernel-devel-6.4.0-150600.23.25.1 * kernel-source-6.4.0-150600.23.25.1 * kernel-macros-6.4.0-150600.23.25.1 * openSUSE Leap 15.6 (nosrc ppc64le x86_64) * kernel-debug-6.4.0-150600.23.25.1 * openSUSE Leap 15.6 (ppc64le x86_64) * kernel-debug-debugsource-6.4.0-150600.23.25.1 * kernel-debug-devel-6.4.0-150600.23.25.1 * kernel-debug-debuginfo-6.4.0-150600.23.25.1 * kernel-debug-livepatch-devel-6.4.0-150600.23.25.1 * kernel-debug-devel-debuginfo-6.4.0-150600.23.25.1 * openSUSE Leap 15.6 (x86_64) * kernel-debug-vdso-6.4.0-150600.23.25.1 * kernel-default-vdso-debuginfo-6.4.0-150600.23.25.1 * kernel-kvmsmall-vdso-6.4.0-150600.23.25.1 * kernel-default-vdso-6.4.0-150600.23.25.1 * kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.25.1 * kernel-debug-vdso-debuginfo-6.4.0-150600.23.25.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * kernel-kvmsmall-devel-6.4.0-150600.23.25.1 * kernel-kvmsmall-debugsource-6.4.0-150600.23.25.1 * kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.25.1 * kernel-kvmsmall-debuginfo-6.4.0-150600.23.25.1 * kernel-default-base-rebuild-6.4.0-150600.23.25.1.150600.12.10.2 * kernel-default-base-6.4.0-150600.23.25.1.150600.12.10.2 * kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.25.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-6.4.0-150600.23.25.2 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.25.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.25.1 * kernel-default-debugsource-6.4.0-150600.23.25.1 * kernel-default-livepatch-devel-6.4.0-150600.23.25.1 * gfs2-kmp-default-6.4.0-150600.23.25.1 * kernel-obs-build-6.4.0-150600.23.25.2 * kernel-default-devel-6.4.0-150600.23.25.1 * dlm-kmp-default-6.4.0-150600.23.25.1 * kernel-default-optional-6.4.0-150600.23.25.1 * cluster-md-kmp-default-6.4.0-150600.23.25.1 * kernel-default-debuginfo-6.4.0-150600.23.25.1 * kernel-default-optional-debuginfo-6.4.0-150600.23.25.1 * kernel-default-extra-debuginfo-6.4.0-150600.23.25.1 * kernel-default-devel-debuginfo-6.4.0-150600.23.25.1 * kselftests-kmp-default-6.4.0-150600.23.25.1 * reiserfs-kmp-default-6.4.0-150600.23.25.1 * kernel-syms-6.4.0-150600.23.25.1 * kselftests-kmp-default-debuginfo-6.4.0-150600.23.25.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.25.1 * ocfs2-kmp-default-6.4.0-150600.23.25.1 * kernel-default-extra-6.4.0-150600.23.25.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.25.1 * kernel-obs-qa-6.4.0-150600.23.25.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.25.1 * kernel-default-livepatch-6.4.0-150600.23.25.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.25.1 * openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.4.0-150600.23.25.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_5-debugsource-1-150600.13.3.1 * kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-1-150600.13.3.1 * kernel-livepatch-6_4_0-150600_23_25-default-1-150600.13.3.1 * openSUSE Leap 15.6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.25.1 * openSUSE Leap 15.6 (s390x) * kernel-zfcpdump-debugsource-6.4.0-150600.23.25.1 * kernel-zfcpdump-debuginfo-6.4.0-150600.23.25.1 * openSUSE Leap 15.6 (nosrc) * dtb-aarch64-6.4.0-150600.23.25.1 * openSUSE Leap 15.6 (aarch64) * gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.25.1 * dtb-cavium-6.4.0-150600.23.25.1 * kernel-64kb-optional-debuginfo-6.4.0-150600.23.25.1 * dtb-broadcom-6.4.0-150600.23.25.1 * dtb-renesas-6.4.0-150600.23.25.1 * dlm-kmp-64kb-6.4.0-150600.23.25.1 * dtb-nvidia-6.4.0-150600.23.25.1 * dlm-kmp-64kb-debuginfo-6.4.0-150600.23.25.1 * kernel-64kb-livepatch-devel-6.4.0-150600.23.25.1 * dtb-allwinner-6.4.0-150600.23.25.1 * kernel-64kb-extra-6.4.0-150600.23.25.1 * reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.25.1 * dtb-altera-6.4.0-150600.23.25.1 * ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.25.1 * reiserfs-kmp-64kb-6.4.0-150600.23.25.1 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.25.1 * kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.25.1 * dtb-apple-6.4.0-150600.23.25.1 * dtb-mediatek-6.4.0-150600.23.25.1 * dtb-socionext-6.4.0-150600.23.25.1 * dtb-hisilicon-6.4.0-150600.23.25.1 * kernel-64kb-extra-debuginfo-6.4.0-150600.23.25.1 * cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.25.1 * dtb-qcom-6.4.0-150600.23.25.1 * kselftests-kmp-64kb-6.4.0-150600.23.25.1 * kernel-64kb-debuginfo-6.4.0-150600.23.25.1 * dtb-amazon-6.4.0-150600.23.25.1 * dtb-lg-6.4.0-150600.23.25.1 * dtb-rockchip-6.4.0-150600.23.25.1 * dtb-freescale-6.4.0-150600.23.25.1 * ocfs2-kmp-64kb-6.4.0-150600.23.25.1 * dtb-apm-6.4.0-150600.23.25.1 * dtb-xilinx-6.4.0-150600.23.25.1 * kernel-64kb-optional-6.4.0-150600.23.25.1 * kernel-64kb-debugsource-6.4.0-150600.23.25.1 * cluster-md-kmp-64kb-6.4.0-150600.23.25.1 * dtb-sprd-6.4.0-150600.23.25.1 * dtb-amlogic-6.4.0-150600.23.25.1 * gfs2-kmp-64kb-6.4.0-150600.23.25.1 * dtb-amd-6.4.0-150600.23.25.1 * dtb-exynos-6.4.0-150600.23.25.1 * kernel-64kb-devel-6.4.0-150600.23.25.1 * dtb-arm-6.4.0-150600.23.25.1 * dtb-marvell-6.4.0-150600.23.25.1 * openSUSE Leap 15.6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.25.1 * Basesystem Module 15-SP6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.25.1 * Basesystem Module 15-SP6 (aarch64) * kernel-64kb-debugsource-6.4.0-150600.23.25.1 * kernel-64kb-debuginfo-6.4.0-150600.23.25.1 * kernel-64kb-devel-6.4.0-150600.23.25.1 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.25.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.25.1 * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150600.23.25.1.150600.12.10.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-6.4.0-150600.23.25.1 * kernel-default-devel-debuginfo-6.4.0-150600.23.25.1 * kernel-default-devel-6.4.0-150600.23.25.1 * kernel-default-debugsource-6.4.0-150600.23.25.1 * Basesystem Module 15-SP6 (noarch) * kernel-devel-6.4.0-150600.23.25.1 * kernel-macros-6.4.0-150600.23.25.1 * Basesystem Module 15-SP6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.25.1 * Basesystem Module 15-SP6 (s390x) * kernel-zfcpdump-debugsource-6.4.0-150600.23.25.1 * kernel-zfcpdump-debuginfo-6.4.0-150600.23.25.1 * Development Tools Module 15-SP6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.25.2 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-6.4.0-150600.23.25.2 * kernel-obs-build-debugsource-6.4.0-150600.23.25.2 * kernel-syms-6.4.0-150600.23.25.1 * Development Tools Module 15-SP6 (noarch) * kernel-source-6.4.0-150600.23.25.1 * Legacy Module 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.25.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-6.4.0-150600.23.25.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.25.1 * reiserfs-kmp-default-6.4.0-150600.23.25.1 * kernel-default-debugsource-6.4.0-150600.23.25.1 * SUSE Linux Enterprise Live Patching 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.25.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_5-debugsource-1-150600.13.3.1 * kernel-livepatch-6_4_0-150600_23_25-default-1-150600.13.3.1 * kernel-default-debuginfo-6.4.0-150600.23.25.1 * kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-1-150600.13.3.1 * kernel-default-debugsource-6.4.0-150600.23.25.1 * kernel-default-livepatch-devel-6.4.0-150600.23.25.1 * kernel-default-livepatch-6.4.0-150600.23.25.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-6.4.0-150600.23.25.1 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.25.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.25.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.25.1 * cluster-md-kmp-default-6.4.0-150600.23.25.1 * kernel-default-debuginfo-6.4.0-150600.23.25.1 * kernel-default-debugsource-6.4.0-150600.23.25.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.25.1 * gfs2-kmp-default-6.4.0-150600.23.25.1 * ocfs2-kmp-default-6.4.0-150600.23.25.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.25.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.25.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * kernel-default-debuginfo-6.4.0-150600.23.25.1 * kernel-default-extra-6.4.0-150600.23.25.1 * kernel-default-debugsource-6.4.0-150600.23.25.1 * kernel-default-extra-debuginfo-6.4.0-150600.23.25.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52610.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2023-52916.html * https://www.suse.com/security/cve/CVE-2024-26640.html * https://www.suse.com/security/cve/CVE-2024-26759.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-36953.html * https://www.suse.com/security/cve/CVE-2024-38538.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-40965.html * https://www.suse.com/security/cve/CVE-2024-40973.html * https://www.suse.com/security/cve/CVE-2024-40983.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42243.html * https://www.suse.com/security/cve/CVE-2024-42252.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42294.html * https://www.suse.com/security/cve/CVE-2024-42304.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43828.html * https://www.suse.com/security/cve/CVE-2024-43832.html * https://www.suse.com/security/cve/CVE-2024-43835.html * https://www.suse.com/security/cve/CVE-2024-43845.html * https://www.suse.com/security/cve/CVE-2024-43870.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43904.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44935.html * https://www.suse.com/security/cve/CVE-2024-44944.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44951.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44960.html * https://www.suse.com/security/cve/CVE-2024-44961.html * https://www.suse.com/security/cve/CVE-2024-44962.html * https://www.suse.com/security/cve/CVE-2024-44965.html * https://www.suse.com/security/cve/CVE-2024-44967.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44970.html * https://www.suse.com/security/cve/CVE-2024-44971.html * https://www.suse.com/security/cve/CVE-2024-44977.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44984.html * https://www.suse.com/security/cve/CVE-2024-44985.html * https://www.suse.com/security/cve/CVE-2024-44986.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44988.html * https://www.suse.com/security/cve/CVE-2024-44989.html * https://www.suse.com/security/cve/CVE-2024-44990.html * https://www.suse.com/security/cve/CVE-2024-44991.html * https://www.suse.com/security/cve/CVE-2024-44997.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45000.html * https://www.suse.com/security/cve/CVE-2024-45001.html * https://www.suse.com/security/cve/CVE-2024-45002.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45005.html * https://www.suse.com/security/cve/CVE-2024-45006.html * https://www.suse.com/security/cve/CVE-2024-45007.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-45011.html * https://www.suse.com/security/cve/CVE-2024-45012.html * https://www.suse.com/security/cve/CVE-2024-45013.html * https://www.suse.com/security/cve/CVE-2024-45015.html * https://www.suse.com/security/cve/CVE-2024-45017.html * https://www.suse.com/security/cve/CVE-2024-45018.html * https://www.suse.com/security/cve/CVE-2024-45019.html * https://www.suse.com/security/cve/CVE-2024-45020.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-45022.html * https://www.suse.com/security/cve/CVE-2024-45023.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-45028.html * https://www.suse.com/security/cve/CVE-2024-45029.html * https://www.suse.com/security/cve/CVE-2024-45030.html * https://www.suse.com/security/cve/CVE-2024-46672.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46687.html * https://www.suse.com/security/cve/CVE-2024-46689.html * https://www.suse.com/security/cve/CVE-2024-46691.html * https://www.suse.com/security/cve/CVE-2024-46692.html * https://www.suse.com/security/cve/CVE-2024-46693.html * https://www.suse.com/security/cve/CVE-2024-46694.html * https://www.suse.com/security/cve/CVE-2024-46695.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46706.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46709.html * https://www.suse.com/security/cve/CVE-2024-46710.html * https://www.suse.com/security/cve/CVE-2024-46714.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46716.html * https://www.suse.com/security/cve/CVE-2024-46717.html * https://www.suse.com/security/cve/CVE-2024-46719.html * https://www.suse.com/security/cve/CVE-2024-46720.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46724.html * https://www.suse.com/security/cve/CVE-2024-46725.html * https://www.suse.com/security/cve/CVE-2024-46726.html * https://www.suse.com/security/cve/CVE-2024-46728.html * https://www.suse.com/security/cve/CVE-2024-46729.html * https://www.suse.com/security/cve/CVE-2024-46730.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46732.html * https://www.suse.com/security/cve/CVE-2024-46734.html * https://www.suse.com/security/cve/CVE-2024-46735.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46741.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46746.html * https://www.suse.com/security/cve/CVE-2024-46747.html * https://www.suse.com/security/cve/CVE-2024-46749.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46751.html * https://www.suse.com/security/cve/CVE-2024-46752.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46755.html * https://www.suse.com/security/cve/CVE-2024-46756.html * https://www.suse.com/security/cve/CVE-2024-46757.html * https://www.suse.com/security/cve/CVE-2024-46758.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46760.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46767.html * https://www.suse.com/security/cve/CVE-2024-46771.html * https://www.suse.com/security/cve/CVE-2024-46772.html * https://www.suse.com/security/cve/CVE-2024-46773.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46776.html * https://www.suse.com/security/cve/CVE-2024-46778.html * https://www.suse.com/security/cve/CVE-2024-46780.html * https://www.suse.com/security/cve/CVE-2024-46781.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46786.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46791.html * https://www.suse.com/security/cve/CVE-2024-46794.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46798.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221527 * https://bugzilla.suse.com/show_bug.cgi?id=1221610 * https://bugzilla.suse.com/show_bug.cgi?id=1221650 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1225487 * https://bugzilla.suse.com/show_bug.cgi?id=1225812 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226507 * https://bugzilla.suse.com/show_bug.cgi?id=1226606 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227694 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227819 * https://bugzilla.suse.com/show_bug.cgi?id=1227885 * https://bugzilla.suse.com/show_bug.cgi?id=1227890 * https://bugzilla.suse.com/show_bug.cgi?id=1227962 * https://bugzilla.suse.com/show_bug.cgi?id=1228090 * https://bugzilla.suse.com/show_bug.cgi?id=1228140 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228771 * https://bugzilla.suse.com/show_bug.cgi?id=1229001 * https://bugzilla.suse.com/show_bug.cgi?id=1229004 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229289 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229364 * https://bugzilla.suse.com/show_bug.cgi?id=1229371 * https://bugzilla.suse.com/show_bug.cgi?id=1229380 * https://bugzilla.suse.com/show_bug.cgi?id=1229389 * https://bugzilla.suse.com/show_bug.cgi?id=1229394 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229443 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229494 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229768 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229810 * https://bugzilla.suse.com/show_bug.cgi?id=1229899 * https://bugzilla.suse.com/show_bug.cgi?id=1229928 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230119 * https://bugzilla.suse.com/show_bug.cgi?id=1230123 * https://bugzilla.suse.com/show_bug.cgi?id=1230124 * https://bugzilla.suse.com/show_bug.cgi?id=1230125 * https://bugzilla.suse.com/show_bug.cgi?id=1230169 * https://bugzilla.suse.com/show_bug.cgi?id=1230170 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230173 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230175 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230181 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230191 * https://bugzilla.suse.com/show_bug.cgi?id=1230192 * https://bugzilla.suse.com/show_bug.cgi?id=1230193 * https://bugzilla.suse.com/show_bug.cgi?id=1230194 * https://bugzilla.suse.com/show_bug.cgi?id=1230195 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230206 * https://bugzilla.suse.com/show_bug.cgi?id=1230207 * https://bugzilla.suse.com/show_bug.cgi?id=1230209 * https://bugzilla.suse.com/show_bug.cgi?id=1230211 * https://bugzilla.suse.com/show_bug.cgi?id=1230213 * https://bugzilla.suse.com/show_bug.cgi?id=1230217 * https://bugzilla.suse.com/show_bug.cgi?id=1230221 * https://bugzilla.suse.com/show_bug.cgi?id=1230224 * https://bugzilla.suse.com/show_bug.cgi?id=1230230 * https://bugzilla.suse.com/show_bug.cgi?id=1230232 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230240 * https://bugzilla.suse.com/show_bug.cgi?id=1230244 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230247 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230269 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230340 * https://bugzilla.suse.com/show_bug.cgi?id=1230426 * https://bugzilla.suse.com/show_bug.cgi?id=1230430 * https://bugzilla.suse.com/show_bug.cgi?id=1230431 * https://bugzilla.suse.com/show_bug.cgi?id=1230432 * https://bugzilla.suse.com/show_bug.cgi?id=1230433 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230435 * https://bugzilla.suse.com/show_bug.cgi?id=1230440 * https://bugzilla.suse.com/show_bug.cgi?id=1230441 * https://bugzilla.suse.com/show_bug.cgi?id=1230442 * https://bugzilla.suse.com/show_bug.cgi?id=1230444 * https://bugzilla.suse.com/show_bug.cgi?id=1230450 * https://bugzilla.suse.com/show_bug.cgi?id=1230451 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1230455 * https://bugzilla.suse.com/show_bug.cgi?id=1230457 * https://bugzilla.suse.com/show_bug.cgi?id=1230459 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230511 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230518 * https://bugzilla.suse.com/show_bug.cgi?id=1230519 * https://bugzilla.suse.com/show_bug.cgi?id=1230520 * https://bugzilla.suse.com/show_bug.cgi?id=1230521 * https://bugzilla.suse.com/show_bug.cgi?id=1230524 * https://bugzilla.suse.com/show_bug.cgi?id=1230526 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230539 * https://bugzilla.suse.com/show_bug.cgi?id=1230540 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230562 * https://bugzilla.suse.com/show_bug.cgi?id=1230563 * https://bugzilla.suse.com/show_bug.cgi?id=1230564 * https://bugzilla.suse.com/show_bug.cgi?id=1230580 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230602 * https://bugzilla.suse.com/show_bug.cgi?id=1230699 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230701 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230703 * https://bugzilla.suse.com/show_bug.cgi?id=1230704 * https://bugzilla.suse.com/show_bug.cgi?id=1230705 * https://bugzilla.suse.com/show_bug.cgi?id=1230706 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230711 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230715 * https://bugzilla.suse.com/show_bug.cgi?id=1230719 * https://bugzilla.suse.com/show_bug.cgi?id=1230722 * https://bugzilla.suse.com/show_bug.cgi?id=1230724 * https://bugzilla.suse.com/show_bug.cgi?id=1230725 * https://bugzilla.suse.com/show_bug.cgi?id=1230726 * https://bugzilla.suse.com/show_bug.cgi?id=1230727 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230749 * https://bugzilla.suse.com/show_bug.cgi?id=1230751 * https://bugzilla.suse.com/show_bug.cgi?id=1230752 * https://bugzilla.suse.com/show_bug.cgi?id=1230753 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230766 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230768 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230772 * https://bugzilla.suse.com/show_bug.cgi?id=1230775 * https://bugzilla.suse.com/show_bug.cgi?id=1230776 * https://bugzilla.suse.com/show_bug.cgi?id=1230780 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230786 * https://bugzilla.suse.com/show_bug.cgi?id=1230787 * https://bugzilla.suse.com/show_bug.cgi?id=1230791 * https://bugzilla.suse.com/show_bug.cgi?id=1230794 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230802 * https://bugzilla.suse.com/show_bug.cgi?id=1230806 * https://bugzilla.suse.com/show_bug.cgi?id=1230808 * https://bugzilla.suse.com/show_bug.cgi?id=1230809 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230812 * https://bugzilla.suse.com/show_bug.cgi?id=1230813 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230821 * https://bugzilla.suse.com/show_bug.cgi?id=1230825 * https://bugzilla.suse.com/show_bug.cgi?id=1230830 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230854 * https://bugzilla.suse.com/show_bug.cgi?id=1230948 * https://bugzilla.suse.com/show_bug.cgi?id=1231008 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://jira.suse.com/browse/PED-10954 * https://jira.suse.com/browse/PED-9899 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 12:41:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 12:41:05 -0000 Subject: SUSE-RU-2024:3560-1: moderate: Recommended update for certification-sles-eal4 Message-ID: <172847766547.6932.16008062438732583374@smelt2.prg2.suse.org> # Recommended update for certification-sles-eal4 Announcement ID: SUSE-RU-2024:3560-1 Release Date: 2024-10-09T08:43:59Z Rating: moderate References: * bsc#1228795 Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for certification-sles-eal4 fixes the following issue: * require crypto-policies-scripts (bsc#1228795). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3560=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3560=1 ## Package List: * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * certification-sles-eal4-15.6+git20240925.229b814-150600.14.12.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * certification-sles-eal4-15.6+git20240925.229b814-150600.14.12.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228795 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 16:30:03 -0000 Subject: SUSE-RU-2024:3574-1: moderate: Recommended update for go1.23 Message-ID: <172849140383.6959.3334278313122853264@smelt2.prg2.suse.org> # Recommended update for go1.23 Announcement ID: SUSE-RU-2024:3574-1 Release Date: 2024-10-09T13:29:54Z Rating: moderate References: * bsc#1229122 Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for go1.23 fixes the following issues: * Version update 1.23.2 includes fixes to the compiler, cgo, the runtime, maps, os, os/exec, time, and unique packages (bsc#1229122) * os: double close pidfd if caller uses pidfd updated by os.StartProcess * maps: segmentation violation in maps.Clone * cmd/cgo: alignment issue with int128 inside of a struct * unique: fatal error: found pointer to free object * runtime,time: timer.Stop returns false even when no value is read from the channel * unique: large string still referenced, after interning only a small substring * os/exec: resource leak on exec failure * cmd/compile: mysterious crashes and non-determinism with range over func ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3574=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3574=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3574=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3574=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.2-150000.1.9.1 * go1.23-1.23.2-150000.1.9.1 * go1.23-doc-1.23.2-150000.1.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.2-150000.1.9.1 * go1.23-1.23.2-150000.1.9.1 * go1.23-doc-1.23.2-150000.1.9.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.2-150000.1.9.1 * go1.23-1.23.2-150000.1.9.1 * go1.23-doc-1.23.2-150000.1.9.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.2-150000.1.9.1 * go1.23-1.23.2-150000.1.9.1 * go1.23-doc-1.23.2-150000.1.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229122 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 16:30:05 -0000 Subject: SUSE-RU-2024:3573-1: moderate: Recommended update for go1.22 Message-ID: <172849140595.6959.9564559141685287464@smelt2.prg2.suse.org> # Recommended update for go1.22 Announcement ID: SUSE-RU-2024:3573-1 Release Date: 2024-10-09T13:29:32Z Rating: moderate References: * bsc#1218424 Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for go1.22 fixes the following issues: * Version update 1.22.8 includes fixes to cgo, and the maps and syscall packages (bsc#1229122) * maps: segmentation violation in maps.Clone * cmd/cgo: alignment issue with int128 inside of a struct * syscall: TestAmbientCapsUserns fails on Ubuntu 24.04/Linux 6.8.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3573=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3573=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3573=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3573=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.22-race-1.22.8-150000.1.30.1 * go1.22-doc-1.22.8-150000.1.30.1 * go1.22-1.22.8-150000.1.30.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * go1.22-race-1.22.8-150000.1.30.1 * go1.22-doc-1.22.8-150000.1.30.1 * go1.22-1.22.8-150000.1.30.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.22-race-1.22.8-150000.1.30.1 * go1.22-doc-1.22.8-150000.1.30.1 * go1.22-1.22.8-150000.1.30.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * go1.22-race-1.22.8-150000.1.30.1 * go1.22-doc-1.22.8-150000.1.30.1 * go1.22-1.22.8-150000.1.30.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218424 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 16:30:07 -0000 Subject: SUSE-RU-2024:3572-1: moderate: Recommended update for go1.23 Message-ID: <172849140786.6959.8137592136720222968@smelt2.prg2.suse.org> # Recommended update for go1.23 Announcement ID: SUSE-RU-2024:3572-1 Release Date: 2024-10-09T13:29:15Z Rating: moderate References: * bsc#1229122 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that has one fix can now be installed. ## Description: This update for go1.23 fixes the following issues: * Version update 1.23.2 includes fixes to the compiler, cgo, the runtime, maps, os, os/exec, time, and unique packages (bsc#1229122) * os: double close pidfd if caller uses pidfd updated by os.StartProcess * maps: segmentation violation in maps.Clone * cmd/cgo: alignment issue with int128 inside of a struct * unique: fatal error: found pointer to free object * runtime,time: timer.Stop returns false even when no value is read from the channel * unique: large string still referenced, after interning only a small substring * os/exec: resource leak on exec failure * cmd/compile: mysterious crashes and non-determinism with range over func ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3572=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * go1.23-doc-1.23.2-1.9.1 * go1.23-1.23.2-1.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229122 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 16:30:09 -0000 Subject: SUSE-RU-2024:3571-1: moderate: Recommended update for go1.22 Message-ID: <172849140956.6959.12751415285386395397@smelt2.prg2.suse.org> # Recommended update for go1.22 Announcement ID: SUSE-RU-2024:3571-1 Release Date: 2024-10-09T13:29:06Z Rating: moderate References: * bsc#1218424 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that has one fix can now be installed. ## Description: This update for go1.22 fixes the following issues: * Version update 1.22.8 includes fixes to cgo, and the maps and syscall packages (bsc#1229122) * maps: segmentation violation in maps.Clone * cmd/cgo: alignment issue with int128 inside of a struct * syscall: TestAmbientCapsUserns fails on Ubuntu 24.04/Linux 6.8.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3571=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * go1.22-doc-1.22.8-1.24.1 * go1.22-1.22.8-1.24.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218424 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 16:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 16:30:13 -0000 Subject: SUSE-SU-2024:3570-1: critical: Security update for cups-filters Message-ID: <172849141376.6959.634690674890262630@smelt2.prg2.suse.org> # Security update for cups-filters Announcement ID: SUSE-SU-2024:3570-1 Release Date: 2024-10-09T13:28:58Z Rating: critical References: * bsc#1230939 * bsc#1231294 Cross-References: * CVE-2024-47176 * CVE-2024-47850 CVSS scores: * CVE-2024-47176 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H * CVE-2024-47176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47176 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-47850 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H * CVE-2024-47850 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-47850 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for cups-filters fixes the following issues: * CVE-2024-47176: cups-browsed binds on UDP port 631 and trusts packets that try to trigger a Get-Printer-Attributes IPP request. (bsc#1230939) * CVE-2024-47850: cups-browsed can be abused to initiate remote DDoS against third-party targets (bsc#1231294) The fix is disabling the CUPS protocol in cups-browsed. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3570=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3570=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3570=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3570=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libpoppler-cpp0-debuginfo-0.43.0-16.49.1 * libpoppler-glib-devel-0.43.0-16.49.1 * libpoppler-devel-0.43.0-16.49.1 * libpoppler-qt4-devel-0.43.0-16.49.1 * typelib-1_0-Poppler-0_18-0.43.0-16.49.1 * libpoppler-cpp0-0.43.0-16.49.1 * poppler-debugsource-0.43.0-16.49.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * cups-filters-cups-browsed-debuginfo-1.0.58-19.26.1 * poppler-tools-debuginfo-0.43.0-16.49.1 * libpoppler60-debuginfo-0.43.0-16.49.1 * poppler-debugsource-0.43.0-16.49.1 * cups-filters-foomatic-rip-debuginfo-1.0.58-19.26.1 * poppler-tools-0.43.0-16.49.1 * libpoppler-glib8-debuginfo-0.43.0-16.49.1 * cups-filters-cups-browsed-1.0.58-19.26.1 * cups-filters-1.0.58-19.26.1 * libpoppler-qt4-4-0.43.0-16.49.1 * cups-filters-debugsource-1.0.58-19.26.1 * cups-filters-foomatic-rip-1.0.58-19.26.1 * cups-filters-ghostscript-1.0.58-19.26.1 * cups-filters-debuginfo-1.0.58-19.26.1 * libpoppler-glib8-0.43.0-16.49.1 * libpoppler60-0.43.0-16.49.1 * cups-filters-ghostscript-debuginfo-1.0.58-19.26.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libpoppler-qt4-4-debuginfo-0.43.0-16.49.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * cups-filters-cups-browsed-debuginfo-1.0.58-19.26.1 * poppler-tools-debuginfo-0.43.0-16.49.1 * libpoppler60-debuginfo-0.43.0-16.49.1 * poppler-debugsource-0.43.0-16.49.1 * cups-filters-foomatic-rip-debuginfo-1.0.58-19.26.1 * poppler-tools-0.43.0-16.49.1 * libpoppler-glib8-debuginfo-0.43.0-16.49.1 * cups-filters-cups-browsed-1.0.58-19.26.1 * cups-filters-1.0.58-19.26.1 * libpoppler-qt4-4-0.43.0-16.49.1 * cups-filters-debugsource-1.0.58-19.26.1 * cups-filters-foomatic-rip-1.0.58-19.26.1 * cups-filters-ghostscript-1.0.58-19.26.1 * cups-filters-debuginfo-1.0.58-19.26.1 * libpoppler-glib8-0.43.0-16.49.1 * libpoppler60-0.43.0-16.49.1 * cups-filters-ghostscript-debuginfo-1.0.58-19.26.1 * SUSE Linux Enterprise Server 12 SP5 (ppc64le s390x x86_64) * libpoppler-qt4-4-debuginfo-0.43.0-16.49.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * cups-filters-cups-browsed-debuginfo-1.0.58-19.26.1 * poppler-tools-debuginfo-0.43.0-16.49.1 * libpoppler-qt4-4-debuginfo-0.43.0-16.49.1 * libpoppler60-debuginfo-0.43.0-16.49.1 * poppler-debugsource-0.43.0-16.49.1 * cups-filters-foomatic-rip-debuginfo-1.0.58-19.26.1 * poppler-tools-0.43.0-16.49.1 * libpoppler-glib8-debuginfo-0.43.0-16.49.1 * cups-filters-cups-browsed-1.0.58-19.26.1 * cups-filters-1.0.58-19.26.1 * libpoppler-qt4-4-0.43.0-16.49.1 * cups-filters-debugsource-1.0.58-19.26.1 * cups-filters-foomatic-rip-1.0.58-19.26.1 * cups-filters-ghostscript-1.0.58-19.26.1 * cups-filters-debuginfo-1.0.58-19.26.1 * libpoppler-glib8-0.43.0-16.49.1 * libpoppler60-0.43.0-16.49.1 * cups-filters-ghostscript-debuginfo-1.0.58-19.26.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47176.html * https://www.suse.com/security/cve/CVE-2024-47850.html * https://bugzilla.suse.com/show_bug.cgi?id=1230939 * https://bugzilla.suse.com/show_bug.cgi?id=1231294 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 9 20:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 09 Oct 2024 20:30:03 -0000 Subject: SUSE-SU-2024:3575-1: important: Security update for redis Message-ID: <172850580388.14555.16558914258759084531@smelt2.prg2.suse.org> # Security update for redis Announcement ID: SUSE-SU-2024:3575-1 Release Date: 2024-10-09T16:55:37Z Rating: important References: * bsc#1231264 * bsc#1231265 Cross-References: * CVE-2024-31228 * CVE-2024-31449 CVSS scores: * CVE-2024-31228 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31228 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31449 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-31449 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for redis fixes the following issues: * CVE-2024-31228: Fixed unbounded recursive pattern matching (bsc#1231265) * CVE-2024-31449: Fixed integer overflow bug in Lua bit_tohex (bsc#1231264) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3575=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3575=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3575=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3575=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3575=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3575=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3575=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3575=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3575=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3575=1 ## Package List: * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * redis-debugsource-6.2.6-150400.3.28.1 * redis-debuginfo-6.2.6-150400.3.28.1 * redis-6.2.6-150400.3.28.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * redis-debugsource-6.2.6-150400.3.28.1 * redis-debuginfo-6.2.6-150400.3.28.1 * redis-6.2.6-150400.3.28.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * redis-debugsource-6.2.6-150400.3.28.1 * redis-debuginfo-6.2.6-150400.3.28.1 * redis-6.2.6-150400.3.28.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * redis-debugsource-6.2.6-150400.3.28.1 * redis-debuginfo-6.2.6-150400.3.28.1 * redis-6.2.6-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * redis-debugsource-6.2.6-150400.3.28.1 * redis-debuginfo-6.2.6-150400.3.28.1 * redis-6.2.6-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * redis-debugsource-6.2.6-150400.3.28.1 * redis-debuginfo-6.2.6-150400.3.28.1 * redis-6.2.6-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * redis-debugsource-6.2.6-150400.3.28.1 * redis-debuginfo-6.2.6-150400.3.28.1 * redis-6.2.6-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * redis-debugsource-6.2.6-150400.3.28.1 * redis-debuginfo-6.2.6-150400.3.28.1 * redis-6.2.6-150400.3.28.1 * SUSE Manager Proxy 4.3 (x86_64) * redis-debugsource-6.2.6-150400.3.28.1 * redis-debuginfo-6.2.6-150400.3.28.1 * redis-6.2.6-150400.3.28.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * redis-debugsource-6.2.6-150400.3.28.1 * redis-debuginfo-6.2.6-150400.3.28.1 * redis-6.2.6-150400.3.28.1 ## References: * https://www.suse.com/security/cve/CVE-2024-31228.html * https://www.suse.com/security/cve/CVE-2024-31449.html * https://bugzilla.suse.com/show_bug.cgi?id=1231264 * https://bugzilla.suse.com/show_bug.cgi?id=1231265 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 08:30:03 -0000 Subject: SUSE-RU-2024:3584-1: moderate: Recommended update for wicked Message-ID: <172854900360.7152.14440463702297122817@smelt2.prg2.suse.org> # Recommended update for wicked Announcement ID: SUSE-RU-2024:3584-1 Release Date: 2024-10-10T07:13:16Z Rating: moderate References: * bsc#1229555 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for wicked fixes the following issue: * compat-suse: fix dummy interfaces configuration with `INTERFACETYPE=dummy` (bsc#1229555). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3584=1 openSUSE-SLE-15.5-2024-3584=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3584=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3584=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3584=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * wicked-0.6.76-150500.3.36.2 * wicked-nbft-0.6.76-150500.3.36.2 * wicked-debuginfo-0.6.76-150500.3.36.2 * wicked-service-0.6.76-150500.3.36.2 * wicked-debugsource-0.6.76-150500.3.36.2 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * wicked-0.6.76-150500.3.36.2 * wicked-service-0.6.76-150500.3.36.2 * wicked-debuginfo-0.6.76-150500.3.36.2 * wicked-debugsource-0.6.76-150500.3.36.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * wicked-0.6.76-150500.3.36.2 * wicked-service-0.6.76-150500.3.36.2 * wicked-debuginfo-0.6.76-150500.3.36.2 * wicked-debugsource-0.6.76-150500.3.36.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * wicked-0.6.76-150500.3.36.2 * wicked-nbft-0.6.76-150500.3.36.2 * wicked-debuginfo-0.6.76-150500.3.36.2 * wicked-service-0.6.76-150500.3.36.2 * wicked-debugsource-0.6.76-150500.3.36.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229555 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 08:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 08:30:05 -0000 Subject: SUSE-RU-2024:3583-1: moderate: Recommended update for wicked Message-ID: <172854900569.7152.17269149576477702297@smelt2.prg2.suse.org> # Recommended update for wicked Announcement ID: SUSE-RU-2024:3583-1 Release Date: 2024-10-10T06:56:29Z Rating: moderate References: * bsc#1229555 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for wicked fixes the following issues: * compat-suse: fix dummy interfaces configuration with `INTERFACETYPE=dummy` (bsc#1229555). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3583=1 openSUSE-SLE-15.6-2024-3583=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3583=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * wicked-service-0.6.76-150600.11.12.2 * wicked-0.6.76-150600.11.12.2 * wicked-nbft-0.6.76-150600.11.12.2 * wicked-debuginfo-0.6.76-150600.11.12.2 * wicked-debugsource-0.6.76-150600.11.12.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * wicked-service-0.6.76-150600.11.12.2 * wicked-0.6.76-150600.11.12.2 * wicked-nbft-0.6.76-150600.11.12.2 * wicked-debuginfo-0.6.76-150600.11.12.2 * wicked-debugsource-0.6.76-150600.11.12.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229555 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 08:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 08:30:08 -0000 Subject: SUSE-RU-2024:3581-1: moderate: Recommended update for wicked Message-ID: <172854900867.7152.6140346685683763741@smelt2.prg2.suse.org> # Recommended update for wicked Announcement ID: SUSE-RU-2024:3581-1 Release Date: 2024-10-10T06:45:04Z Rating: moderate References: * bsc#1229555 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for wicked fixes the following issue: * compat-suse: fix dummy interfaces configuration with `INTERFACETYPE=dummy` (bsc#1229555). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3581=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3581=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3581=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * wicked-service-0.6.76-3.50.7 * wicked-debugsource-0.6.76-3.50.7 * wicked-0.6.76-3.50.7 * wicked-debuginfo-0.6.76-3.50.7 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * wicked-service-0.6.76-3.50.7 * wicked-debugsource-0.6.76-3.50.7 * wicked-0.6.76-3.50.7 * wicked-debuginfo-0.6.76-3.50.7 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * wicked-service-0.6.76-3.50.7 * wicked-debugsource-0.6.76-3.50.7 * wicked-0.6.76-3.50.7 * wicked-debuginfo-0.6.76-3.50.7 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229555 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 08:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 08:30:12 -0000 Subject: SUSE-RU-2024:3580-1: moderate: Recommended update for wicked Message-ID: <172854901201.7152.4849201716895767967@smelt2.prg2.suse.org> # Recommended update for wicked Announcement ID: SUSE-RU-2024:3580-1 Release Date: 2024-10-10T06:40:08Z Rating: moderate References: * bsc#1229555 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for wicked fixes the following issue: * compat-suse: fix dummy interfaces configuration with `INTERFACETYPE=dummy` (bsc#1229555). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3580=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3580=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3580=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3580=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3580=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3580=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3580=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3580=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3580=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3580=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3580=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3580=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3580=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 * SUSE Manager Proxy 4.3 (x86_64) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 * SUSE Manager Retail Branch Server 4.3 (x86_64) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * wicked-service-0.6.76-150400.3.33.6 * wicked-0.6.76-150400.3.33.6 * wicked-debuginfo-0.6.76-150400.3.33.6 * wicked-debugsource-0.6.76-150400.3.33.6 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229555 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 08:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 08:30:15 -0000 Subject: SUSE-RU-2024:3579-1: moderate: Recommended update for wicked Message-ID: <172854901596.7152.6988950862395804009@smelt2.prg2.suse.org> # Recommended update for wicked Announcement ID: SUSE-RU-2024:3579-1 Release Date: 2024-10-10T06:34:59Z Rating: moderate References: * bsc#1218668 * bsc#1229555 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has two fixes can now be installed. ## Description: This update for wicked fixes the following issue: * compat-suse: fix dummy interfaces configuration with `INTERFACETYPE=dummy` (bsc#1229555). * VLANs bonds didn't come up after reboot or wicked restart (bsc#1218668). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3579=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3579=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3579=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3579=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3579=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3579=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3579=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3579=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * wicked-service-0.6.76-150300.4.38.7 * wicked-debugsource-0.6.76-150300.4.38.7 * wicked-0.6.76-150300.4.38.7 * wicked-debuginfo-0.6.76-150300.4.38.7 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * wicked-service-0.6.76-150300.4.38.7 * wicked-debugsource-0.6.76-150300.4.38.7 * wicked-0.6.76-150300.4.38.7 * wicked-debuginfo-0.6.76-150300.4.38.7 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * wicked-service-0.6.76-150300.4.38.7 * wicked-debugsource-0.6.76-150300.4.38.7 * wicked-0.6.76-150300.4.38.7 * wicked-debuginfo-0.6.76-150300.4.38.7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * wicked-service-0.6.76-150300.4.38.7 * wicked-debugsource-0.6.76-150300.4.38.7 * wicked-0.6.76-150300.4.38.7 * wicked-debuginfo-0.6.76-150300.4.38.7 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * wicked-service-0.6.76-150300.4.38.7 * wicked-debugsource-0.6.76-150300.4.38.7 * wicked-0.6.76-150300.4.38.7 * wicked-debuginfo-0.6.76-150300.4.38.7 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * wicked-service-0.6.76-150300.4.38.7 * wicked-debugsource-0.6.76-150300.4.38.7 * wicked-0.6.76-150300.4.38.7 * wicked-debuginfo-0.6.76-150300.4.38.7 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * wicked-service-0.6.76-150300.4.38.7 * wicked-debugsource-0.6.76-150300.4.38.7 * wicked-0.6.76-150300.4.38.7 * wicked-debuginfo-0.6.76-150300.4.38.7 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * wicked-service-0.6.76-150300.4.38.7 * wicked-debugsource-0.6.76-150300.4.38.7 * wicked-0.6.76-150300.4.38.7 * wicked-debuginfo-0.6.76-150300.4.38.7 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218668 * https://bugzilla.suse.com/show_bug.cgi?id=1229555 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 08:30:23 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 08:30:23 -0000 Subject: SUSE-SU-2024:3577-1: important: Security update for libreoffice Message-ID: <172854902362.7152.11128730515975237999@smelt2.prg2.suse.org> # Security update for libreoffice Announcement ID: SUSE-SU-2024:3577-1 Release Date: 2024-10-10T04:37:02Z Rating: important References: * bsc#1047218 * bsc#1225597 * bsc#1226975 * bsc#1229589 * jsc#PED-10362 Cross-References: * CVE-2024-5261 CVSS scores: * CVE-2024-5261 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability, contains one feature and has three security fixes can now be installed. ## Description: This update for libreofficefixes the following issues: libreoffice was updated to version 24.8.1.2 (jsc#PED-10362): * Release notes: * https://wiki.documentfoundation.org/Releases/24.8.0/RC1 and * https://wiki.documentfoundation.org/Releases/24.8.0/RC2 and * https://wiki.documentfoundation.org/Releases/24.8.0/RC3 * Security issues fixed: * CVE-2024-526: Fixed TLS certificates are not properly verified when utilizing LibreOfficeKit (bsc#1226975) * Other bugs fixed: * Use system curl instead of the bundled one on systems greater than or equal to SLE15 (bsc#1229589) * Use the new clucene function, which makes index files reproducible (bsc#1047218) * Support firebird database with new package `libreoffice-base-drivers- firebird` in Package Hub and openSUSE Leap (bsc#1225597) * Update bundled dependencies: * Java-Websocket updated from 1.5.4 to 1.5.6 * boost updated from 1.82.0 to 1.85.0 * curl updated from 8.7.1 to 8.9.1 * fontconfig updated from 2.14.2 to 2.15.0 * freetype updated from 2.13.0 to 2.13.2 * harfbuzz updated from 8.2.2 to 8.5.0 * icu4c-data updated from 73.2 to 74.2 * icu4c-src updated from 73.2 to 74.2 * libassuan updated from 2.5.7 to 3.0.1 * libcmis updated from 0.6.1 to 0.6.2 * libgpg-error updated from 1.48 to 1.50 * pdfium updated from 6179 to 6425 * poppler updated from 23.09.0 to 24.08.0 * tiff updated from 4.6.0 to 4.6.0t ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3577=1 openSUSE-SLE-15.5-2024-3577=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3577=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3577=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3577=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3577=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3577=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libreoffice-base-24.8.1.2-150500.20.11.2 * libreoffice-sdk-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-pyuno-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-postgresql-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-sdk-doc-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-postgresql-24.8.1.2-150500.20.11.2 * libreoffice-gtk3-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-officebean-24.8.1.2-150500.20.11.2 * libreoffice-impress-24.8.1.2-150500.20.11.2 * libreoffice-writer-extensions-24.8.1.2-150500.20.11.2 * libreoffice-gtk3-24.8.1.2-150500.20.11.2 * libreoffice-filters-optional-24.8.1.2-150500.20.11.2 * libreoffice-qt5-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-gnome-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-librelogo-24.8.1.2-150500.20.11.2 * libreofficekit-24.8.1.2-150500.20.11.2 * libreofficekit-devel-24.8.1.2-150500.20.11.2 * libreoffice-gnome-24.8.1.2-150500.20.11.2 * libreoffice-officebean-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-draw-24.8.1.2-150500.20.11.2 * libreoffice-math-24.8.1.2-150500.20.11.2 * libreoffice-calc-extensions-24.8.1.2-150500.20.11.2 * libreoffice-impress-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-writer-24.8.1.2-150500.20.11.2 * libreoffice-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-debugsource-24.8.1.2-150500.20.11.2 * libreoffice-calc-24.8.1.2-150500.20.11.2 * libreoffice-math-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-firebird-24.8.1.2-150500.20.11.2 * libreoffice-draw-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-sdk-24.8.1.2-150500.20.11.2 * libreoffice-mailmerge-24.8.1.2-150500.20.11.2 * libreoffice-qt5-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-firebird-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-calc-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-pyuno-24.8.1.2-150500.20.11.2 * libreoffice-24.8.1.2-150500.20.11.2 * libreoffice-writer-debuginfo-24.8.1.2-150500.20.11.2 * openSUSE Leap 15.5 (noarch) * libreoffice-l10n-ru-24.8.1.2-150500.20.11.2 * libreoffice-l10n-et-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ug-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sw_TZ-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tg-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-th-24.8.1.2-150500.20.11.2 * libreoffice-l10n-te-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sq-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-om-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bs-24.8.1.2-150500.20.11.2 * libreoffice-l10n-xh-24.8.1.2-150500.20.11.2 * libreoffice-l10n-am-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pa-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ve-24.8.1.2-150500.20.11.2 * libreoffice-l10n-de-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ss-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pt_BR-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dgo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nl-24.8.1.2-150500.20.11.2 * libreoffice-icon-themes-24.8.1.2-150500.20.11.2 * libreoffice-l10n-el-24.8.1.2-150500.20.11.2 * libreoffice-l10n-es-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ca-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bg-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ar-24.8.1.2-150500.20.11.2 * libreoffice-l10n-szl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-or-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ro-24.8.1.2-150500.20.11.2 * libreoffice-l10n-uk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dsb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-vec-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lb-24.8.1.2-150500.20.11.2 * libreoffice-kdeintegration-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ne-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sat-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ka-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pt_PT-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ja-24.8.1.2-150500.20.11.2 * libreoffice-l10n-brx-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tt-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mni-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ast-24.8.1.2-150500.20.11.2 * libreoffice-branding-upstream-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en_GB-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-uz-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zh_CN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-id-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-is-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ml-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ckb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-cy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-da-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sv-24.8.1.2-150500.20.11.2 * libreoffice-glade-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-be-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gd-24.8.1.2-150500.20.11.2 * libreoffice-l10n-br-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hsb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en_ZA-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fur-24.8.1.2-150500.20.11.2 * libreoffice-l10n-as-24.8.1.2-150500.20.11.2 * libreoffice-l10n-si-24.8.1.2-150500.20.11.2 * libreoffice-l10n-eo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kok-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bn_IN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-km-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kmr_Latn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ga-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fa-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sa_IN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-oc-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kab-24.8.1.2-150500.20.11.2 * libreoffice-l10n-vi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zh_TW-24.8.1.2-150500.20.11.2 * libreoffice-l10n-st-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gug-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ca_valencia-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mai-24.8.1.2-150500.20.11.2 * libreoffice-gdb-pretty-printers-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ks-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sid-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ta-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-my-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-rw-24.8.1.2-150500.20.11.2 * libreoffice-l10n-af-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lt-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dz-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ts-24.8.1.2-150500.20.11.2 * libreoffice-l10n-cs-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ko-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-it-24.8.1.2-150500.20.11.2 * libreoffice-l10n-eu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nso-24.8.1.2-150500.20.11.2 * libreoffice-l10n-he-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lv-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sd-24.8.1.2-150500.20.11.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libreoffice-base-24.8.1.2-150500.20.11.2 * libreoffice-sdk-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-pyuno-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-postgresql-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-sdk-doc-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-postgresql-24.8.1.2-150500.20.11.2 * libreoffice-gtk3-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-officebean-24.8.1.2-150500.20.11.2 * libreoffice-impress-24.8.1.2-150500.20.11.2 * libreoffice-writer-extensions-24.8.1.2-150500.20.11.2 * libreoffice-gtk3-24.8.1.2-150500.20.11.2 * libreoffice-filters-optional-24.8.1.2-150500.20.11.2 * libreoffice-qt5-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-gnome-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-librelogo-24.8.1.2-150500.20.11.2 * libreofficekit-24.8.1.2-150500.20.11.2 * libreofficekit-devel-24.8.1.2-150500.20.11.2 * libreoffice-gnome-24.8.1.2-150500.20.11.2 * libreoffice-officebean-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-draw-24.8.1.2-150500.20.11.2 * libreoffice-math-24.8.1.2-150500.20.11.2 * libreoffice-calc-extensions-24.8.1.2-150500.20.11.2 * libreoffice-impress-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-writer-24.8.1.2-150500.20.11.2 * libreoffice-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-debugsource-24.8.1.2-150500.20.11.2 * libreoffice-calc-24.8.1.2-150500.20.11.2 * libreoffice-math-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-firebird-24.8.1.2-150500.20.11.2 * libreoffice-draw-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-sdk-24.8.1.2-150500.20.11.2 * libreoffice-mailmerge-24.8.1.2-150500.20.11.2 * libreoffice-qt5-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-firebird-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-calc-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-pyuno-24.8.1.2-150500.20.11.2 * libreoffice-24.8.1.2-150500.20.11.2 * libreoffice-writer-debuginfo-24.8.1.2-150500.20.11.2 * openSUSE Leap 15.6 (noarch) * libreoffice-l10n-ru-24.8.1.2-150500.20.11.2 * libreoffice-l10n-et-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ug-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sw_TZ-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tg-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-th-24.8.1.2-150500.20.11.2 * libreoffice-l10n-te-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sq-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-om-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bs-24.8.1.2-150500.20.11.2 * libreoffice-l10n-xh-24.8.1.2-150500.20.11.2 * libreoffice-l10n-am-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pa-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ve-24.8.1.2-150500.20.11.2 * libreoffice-l10n-de-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ss-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pt_BR-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dgo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nl-24.8.1.2-150500.20.11.2 * libreoffice-icon-themes-24.8.1.2-150500.20.11.2 * libreoffice-l10n-el-24.8.1.2-150500.20.11.2 * libreoffice-l10n-es-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ca-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bg-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ar-24.8.1.2-150500.20.11.2 * libreoffice-l10n-szl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-or-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ro-24.8.1.2-150500.20.11.2 * libreoffice-l10n-uk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dsb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-vec-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ne-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sat-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ka-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pt_PT-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ja-24.8.1.2-150500.20.11.2 * libreoffice-l10n-brx-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tt-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mni-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ast-24.8.1.2-150500.20.11.2 * libreoffice-branding-upstream-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en_GB-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-uz-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zh_CN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-id-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-is-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ml-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ckb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-cy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-da-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sv-24.8.1.2-150500.20.11.2 * libreoffice-glade-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-be-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gd-24.8.1.2-150500.20.11.2 * libreoffice-l10n-br-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hsb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en_ZA-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fur-24.8.1.2-150500.20.11.2 * libreoffice-l10n-as-24.8.1.2-150500.20.11.2 * libreoffice-l10n-si-24.8.1.2-150500.20.11.2 * libreoffice-l10n-eo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kok-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bn_IN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-km-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kmr_Latn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ga-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fa-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sa_IN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-oc-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kab-24.8.1.2-150500.20.11.2 * libreoffice-l10n-vi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zh_TW-24.8.1.2-150500.20.11.2 * libreoffice-l10n-st-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gug-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ca_valencia-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mai-24.8.1.2-150500.20.11.2 * libreoffice-gdb-pretty-printers-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ks-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sid-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ta-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-my-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-rw-24.8.1.2-150500.20.11.2 * libreoffice-l10n-af-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lt-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dz-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ts-24.8.1.2-150500.20.11.2 * libreoffice-l10n-cs-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ko-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-it-24.8.1.2-150500.20.11.2 * libreoffice-l10n-eu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nso-24.8.1.2-150500.20.11.2 * libreoffice-l10n-he-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lv-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sd-24.8.1.2-150500.20.11.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le) * libreoffice-base-24.8.1.2-150500.20.11.2 * libreoffice-sdk-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-pyuno-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-postgresql-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-sdk-doc-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-postgresql-24.8.1.2-150500.20.11.2 * libreoffice-gtk3-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-officebean-24.8.1.2-150500.20.11.2 * libreoffice-impress-24.8.1.2-150500.20.11.2 * libreoffice-writer-extensions-24.8.1.2-150500.20.11.2 * libreoffice-gtk3-24.8.1.2-150500.20.11.2 * libreoffice-filters-optional-24.8.1.2-150500.20.11.2 * libreoffice-qt5-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-gnome-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-librelogo-24.8.1.2-150500.20.11.2 * libreofficekit-24.8.1.2-150500.20.11.2 * libreofficekit-devel-24.8.1.2-150500.20.11.2 * libreoffice-gnome-24.8.1.2-150500.20.11.2 * libreoffice-officebean-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-draw-24.8.1.2-150500.20.11.2 * libreoffice-math-24.8.1.2-150500.20.11.2 * libreoffice-calc-extensions-24.8.1.2-150500.20.11.2 * libreoffice-impress-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-writer-24.8.1.2-150500.20.11.2 * libreoffice-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-debugsource-24.8.1.2-150500.20.11.2 * libreoffice-calc-24.8.1.2-150500.20.11.2 * libreoffice-math-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-draw-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-sdk-24.8.1.2-150500.20.11.2 * libreoffice-mailmerge-24.8.1.2-150500.20.11.2 * libreoffice-qt5-24.8.1.2-150500.20.11.2 * libreoffice-calc-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-pyuno-24.8.1.2-150500.20.11.2 * libreoffice-24.8.1.2-150500.20.11.2 * libreoffice-writer-debuginfo-24.8.1.2-150500.20.11.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le x86_64) * libreoffice-base-drivers-firebird-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-firebird-debuginfo-24.8.1.2-150500.20.11.2 * SUSE Package Hub 15 15-SP5 (noarch) * libreoffice-l10n-ru-24.8.1.2-150500.20.11.2 * libreoffice-l10n-et-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ug-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sw_TZ-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tg-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-th-24.8.1.2-150500.20.11.2 * libreoffice-l10n-te-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sq-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-om-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bs-24.8.1.2-150500.20.11.2 * libreoffice-l10n-xh-24.8.1.2-150500.20.11.2 * libreoffice-l10n-am-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pa-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ve-24.8.1.2-150500.20.11.2 * libreoffice-l10n-de-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ss-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pt_BR-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dgo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nl-24.8.1.2-150500.20.11.2 * libreoffice-icon-themes-24.8.1.2-150500.20.11.2 * libreoffice-l10n-el-24.8.1.2-150500.20.11.2 * libreoffice-l10n-es-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ca-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bg-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ar-24.8.1.2-150500.20.11.2 * libreoffice-l10n-szl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-or-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ro-24.8.1.2-150500.20.11.2 * libreoffice-l10n-uk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dsb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-vec-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ne-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sat-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ka-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pt_PT-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ja-24.8.1.2-150500.20.11.2 * libreoffice-l10n-brx-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tt-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mni-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ast-24.8.1.2-150500.20.11.2 * libreoffice-branding-upstream-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en_GB-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-uz-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zh_CN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-id-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-is-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ml-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ckb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-cy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-da-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sv-24.8.1.2-150500.20.11.2 * libreoffice-glade-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-be-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gd-24.8.1.2-150500.20.11.2 * libreoffice-l10n-br-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hsb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en_ZA-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fur-24.8.1.2-150500.20.11.2 * libreoffice-l10n-as-24.8.1.2-150500.20.11.2 * libreoffice-l10n-si-24.8.1.2-150500.20.11.2 * libreoffice-l10n-eo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kok-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bn_IN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-km-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kmr_Latn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ga-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fa-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sa_IN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-oc-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kab-24.8.1.2-150500.20.11.2 * libreoffice-l10n-vi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zh_TW-24.8.1.2-150500.20.11.2 * libreoffice-l10n-st-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gug-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ca_valencia-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mai-24.8.1.2-150500.20.11.2 * libreoffice-gdb-pretty-printers-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ks-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sid-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ta-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-my-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-rw-24.8.1.2-150500.20.11.2 * libreoffice-l10n-af-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lt-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dz-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ts-24.8.1.2-150500.20.11.2 * libreoffice-l10n-cs-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ko-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-it-24.8.1.2-150500.20.11.2 * libreoffice-l10n-eu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nso-24.8.1.2-150500.20.11.2 * libreoffice-l10n-he-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lv-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sd-24.8.1.2-150500.20.11.2 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le) * libreoffice-base-24.8.1.2-150500.20.11.2 * libreoffice-sdk-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-pyuno-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-postgresql-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-sdk-doc-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-postgresql-24.8.1.2-150500.20.11.2 * libreoffice-gtk3-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-officebean-24.8.1.2-150500.20.11.2 * libreoffice-impress-24.8.1.2-150500.20.11.2 * libreoffice-writer-extensions-24.8.1.2-150500.20.11.2 * libreoffice-gtk3-24.8.1.2-150500.20.11.2 * libreoffice-filters-optional-24.8.1.2-150500.20.11.2 * libreoffice-qt5-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-gnome-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-librelogo-24.8.1.2-150500.20.11.2 * libreofficekit-24.8.1.2-150500.20.11.2 * libreofficekit-devel-24.8.1.2-150500.20.11.2 * libreoffice-gnome-24.8.1.2-150500.20.11.2 * libreoffice-officebean-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-draw-24.8.1.2-150500.20.11.2 * libreoffice-math-24.8.1.2-150500.20.11.2 * libreoffice-calc-extensions-24.8.1.2-150500.20.11.2 * libreoffice-impress-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-writer-24.8.1.2-150500.20.11.2 * libreoffice-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-debugsource-24.8.1.2-150500.20.11.2 * libreoffice-calc-24.8.1.2-150500.20.11.2 * libreoffice-math-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-draw-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-sdk-24.8.1.2-150500.20.11.2 * libreoffice-mailmerge-24.8.1.2-150500.20.11.2 * libreoffice-qt5-24.8.1.2-150500.20.11.2 * libreoffice-calc-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-pyuno-24.8.1.2-150500.20.11.2 * libreoffice-24.8.1.2-150500.20.11.2 * libreoffice-writer-debuginfo-24.8.1.2-150500.20.11.2 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le x86_64) * libreoffice-base-drivers-firebird-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-firebird-debuginfo-24.8.1.2-150500.20.11.2 * SUSE Package Hub 15 15-SP6 (noarch) * libreoffice-l10n-ru-24.8.1.2-150500.20.11.2 * libreoffice-l10n-et-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ug-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sw_TZ-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tg-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-th-24.8.1.2-150500.20.11.2 * libreoffice-l10n-te-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sq-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-om-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bs-24.8.1.2-150500.20.11.2 * libreoffice-l10n-xh-24.8.1.2-150500.20.11.2 * libreoffice-l10n-am-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pa-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ve-24.8.1.2-150500.20.11.2 * libreoffice-l10n-de-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ss-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pt_BR-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dgo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nl-24.8.1.2-150500.20.11.2 * libreoffice-icon-themes-24.8.1.2-150500.20.11.2 * libreoffice-l10n-el-24.8.1.2-150500.20.11.2 * libreoffice-l10n-es-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ca-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bg-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ar-24.8.1.2-150500.20.11.2 * libreoffice-l10n-szl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-or-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ro-24.8.1.2-150500.20.11.2 * libreoffice-l10n-uk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dsb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-vec-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ne-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sat-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ka-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pt_PT-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ja-24.8.1.2-150500.20.11.2 * libreoffice-l10n-brx-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tt-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mni-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ast-24.8.1.2-150500.20.11.2 * libreoffice-branding-upstream-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en_GB-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-uz-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zh_CN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-id-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-is-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ml-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ckb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-cy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-da-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sv-24.8.1.2-150500.20.11.2 * libreoffice-glade-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-be-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gd-24.8.1.2-150500.20.11.2 * libreoffice-l10n-br-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hsb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en_ZA-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fur-24.8.1.2-150500.20.11.2 * libreoffice-l10n-as-24.8.1.2-150500.20.11.2 * libreoffice-l10n-si-24.8.1.2-150500.20.11.2 * libreoffice-l10n-eo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kok-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bn_IN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-km-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kmr_Latn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ga-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fa-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sa_IN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-oc-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kab-24.8.1.2-150500.20.11.2 * libreoffice-l10n-vi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zh_TW-24.8.1.2-150500.20.11.2 * libreoffice-l10n-st-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gug-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ca_valencia-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mai-24.8.1.2-150500.20.11.2 * libreoffice-gdb-pretty-printers-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ks-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sid-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ta-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-my-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-rw-24.8.1.2-150500.20.11.2 * libreoffice-l10n-af-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lt-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dz-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ts-24.8.1.2-150500.20.11.2 * libreoffice-l10n-cs-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ko-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-it-24.8.1.2-150500.20.11.2 * libreoffice-l10n-eu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nso-24.8.1.2-150500.20.11.2 * libreoffice-l10n-he-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lv-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sd-24.8.1.2-150500.20.11.2 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * libreoffice-base-24.8.1.2-150500.20.11.2 * libreoffice-pyuno-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-postgresql-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-postgresql-24.8.1.2-150500.20.11.2 * libreoffice-gtk3-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-officebean-24.8.1.2-150500.20.11.2 * libreoffice-impress-24.8.1.2-150500.20.11.2 * libreoffice-writer-extensions-24.8.1.2-150500.20.11.2 * libreoffice-gtk3-24.8.1.2-150500.20.11.2 * libreoffice-filters-optional-24.8.1.2-150500.20.11.2 * libreofficekit-24.8.1.2-150500.20.11.2 * libreoffice-gnome-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-gnome-24.8.1.2-150500.20.11.2 * libreoffice-officebean-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-draw-24.8.1.2-150500.20.11.2 * libreoffice-math-24.8.1.2-150500.20.11.2 * libreoffice-calc-extensions-24.8.1.2-150500.20.11.2 * libreoffice-impress-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-writer-24.8.1.2-150500.20.11.2 * libreoffice-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-debugsource-24.8.1.2-150500.20.11.2 * libreoffice-calc-24.8.1.2-150500.20.11.2 * libreoffice-math-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-draw-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-mailmerge-24.8.1.2-150500.20.11.2 * libreoffice-calc-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-pyuno-24.8.1.2-150500.20.11.2 * libreoffice-24.8.1.2-150500.20.11.2 * libreoffice-writer-debuginfo-24.8.1.2-150500.20.11.2 * SUSE Linux Enterprise Workstation Extension 15 SP5 (noarch) * libreoffice-l10n-ru-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zh_CN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-et-24.8.1.2-150500.20.11.2 * libreoffice-l10n-el-24.8.1.2-150500.20.11.2 * libreoffice-l10n-es-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ca-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zh_TW-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bg-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ar-24.8.1.2-150500.20.11.2 * libreoffice-l10n-st-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ml-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-or-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ro-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mai-24.8.1.2-150500.20.11.2 * libreoffice-l10n-th-24.8.1.2-150500.20.11.2 * libreoffice-l10n-uk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ckb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-cy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-da-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sv-24.8.1.2-150500.20.11.2 * libreoffice-l10n-te-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ve-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ta-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-af-24.8.1.2-150500.20.11.2 * libreoffice-l10n-xh-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pt_PT-24.8.1.2-150500.20.11.2 * libreoffice-l10n-br-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lt-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ja-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pa-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dz-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fur-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ts-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-cs-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-de-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ko-24.8.1.2-150500.20.11.2 * libreoffice-l10n-as-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-si-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ss-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-eo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pt_BR-24.8.1.2-150500.20.11.2 * libreoffice-l10n-it-24.8.1.2-150500.20.11.2 * libreoffice-l10n-eu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nso-24.8.1.2-150500.20.11.2 * libreoffice-l10n-he-24.8.1.2-150500.20.11.2 * libreoffice-branding-upstream-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lv-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ga-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mr-24.8.1.2-150500.20.11.2 * libreoffice-icon-themes-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fa-24.8.1.2-150500.20.11.2 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * libreoffice-base-24.8.1.2-150500.20.11.2 * libreoffice-pyuno-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-postgresql-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-drivers-postgresql-24.8.1.2-150500.20.11.2 * libreoffice-gtk3-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-officebean-24.8.1.2-150500.20.11.2 * libreoffice-impress-24.8.1.2-150500.20.11.2 * libreoffice-writer-extensions-24.8.1.2-150500.20.11.2 * libreoffice-gtk3-24.8.1.2-150500.20.11.2 * libreoffice-filters-optional-24.8.1.2-150500.20.11.2 * libreofficekit-24.8.1.2-150500.20.11.2 * libreoffice-gnome-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-gnome-24.8.1.2-150500.20.11.2 * libreoffice-officebean-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-draw-24.8.1.2-150500.20.11.2 * libreoffice-math-24.8.1.2-150500.20.11.2 * libreoffice-calc-extensions-24.8.1.2-150500.20.11.2 * libreoffice-impress-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-writer-24.8.1.2-150500.20.11.2 * libreoffice-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-debugsource-24.8.1.2-150500.20.11.2 * libreoffice-calc-24.8.1.2-150500.20.11.2 * libreoffice-math-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-base-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-draw-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-mailmerge-24.8.1.2-150500.20.11.2 * libreoffice-calc-debuginfo-24.8.1.2-150500.20.11.2 * libreoffice-pyuno-24.8.1.2-150500.20.11.2 * libreoffice-24.8.1.2-150500.20.11.2 * libreoffice-writer-debuginfo-24.8.1.2-150500.20.11.2 * SUSE Linux Enterprise Workstation Extension 15 SP6 (noarch) * libreoffice-l10n-ru-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zh_CN-24.8.1.2-150500.20.11.2 * libreoffice-l10n-et-24.8.1.2-150500.20.11.2 * libreoffice-l10n-el-24.8.1.2-150500.20.11.2 * libreoffice-l10n-es-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ca-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zh_TW-24.8.1.2-150500.20.11.2 * libreoffice-l10n-zu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bg-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ar-24.8.1.2-150500.20.11.2 * libreoffice-l10n-st-24.8.1.2-150500.20.11.2 * libreoffice-l10n-bn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ml-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-or-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ro-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mai-24.8.1.2-150500.20.11.2 * libreoffice-l10n-th-24.8.1.2-150500.20.11.2 * libreoffice-l10n-uk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ckb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-cy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-da-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sk-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sv-24.8.1.2-150500.20.11.2 * libreoffice-l10n-te-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ve-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ta-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-en-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fi-24.8.1.2-150500.20.11.2 * libreoffice-l10n-gl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hy-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nb-24.8.1.2-150500.20.11.2 * libreoffice-l10n-af-24.8.1.2-150500.20.11.2 * libreoffice-l10n-xh-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pt_PT-24.8.1.2-150500.20.11.2 * libreoffice-l10n-br-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lt-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ja-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pa-24.8.1.2-150500.20.11.2 * libreoffice-l10n-dz-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fur-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ts-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-cs-24.8.1.2-150500.20.11.2 * libreoffice-l10n-hr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-de-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ko-24.8.1.2-150500.20.11.2 * libreoffice-l10n-as-24.8.1.2-150500.20.11.2 * libreoffice-l10n-sl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-si-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ss-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-eo-24.8.1.2-150500.20.11.2 * libreoffice-l10n-pt_BR-24.8.1.2-150500.20.11.2 * libreoffice-l10n-it-24.8.1.2-150500.20.11.2 * libreoffice-l10n-eu-24.8.1.2-150500.20.11.2 * libreoffice-l10n-tr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nso-24.8.1.2-150500.20.11.2 * libreoffice-l10n-he-24.8.1.2-150500.20.11.2 * libreoffice-branding-upstream-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nr-24.8.1.2-150500.20.11.2 * libreoffice-l10n-kn-24.8.1.2-150500.20.11.2 * libreoffice-l10n-lv-24.8.1.2-150500.20.11.2 * libreoffice-l10n-nl-24.8.1.2-150500.20.11.2 * libreoffice-l10n-ga-24.8.1.2-150500.20.11.2 * libreoffice-l10n-mr-24.8.1.2-150500.20.11.2 * libreoffice-icon-themes-24.8.1.2-150500.20.11.2 * libreoffice-l10n-fa-24.8.1.2-150500.20.11.2 ## References: * https://www.suse.com/security/cve/CVE-2024-5261.html * https://bugzilla.suse.com/show_bug.cgi?id=1047218 * https://bugzilla.suse.com/show_bug.cgi?id=1225597 * https://bugzilla.suse.com/show_bug.cgi?id=1226975 * https://bugzilla.suse.com/show_bug.cgi?id=1229589 * https://jira.suse.com/browse/PED-10362 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 08:30:29 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 08:30:29 -0000 Subject: SUSE-SU-2024:3576-1: important: Security update for libreoffice Message-ID: <172854902930.7152.1986398914242780963@smelt2.prg2.suse.org> # Security update for libreoffice Announcement ID: SUSE-SU-2024:3576-1 Release Date: 2024-10-10T04:15:27Z Rating: important References: * bsc#1047218 * bsc#1202273 * bsc#1226975 * bsc#1229589 * jsc#PED-10362 Cross-References: * CVE-2024-5261 CVSS scores: * CVE-2024-5261 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves one vulnerability, contains one feature and has three security fixes can now be installed. ## Description: This update for libreoffice fixes the following issues: libreoffice was updated to version 24.8.1.2 (jsc#PED-10362): * Release notes: * https://wiki.documentfoundation.org/Releases/24.8.0/RC1 and * https://wiki.documentfoundation.org/Releases/24.8.0/RC2 and * https://wiki.documentfoundation.org/Releases/24.8.0/RC3 * Security issues fixed: * CVE-2024-526: Fixed TLS certificates are not properly verified when utilizing LibreOfficeKit (bsc#1226975) * Other bugs fixed: * Use system curl instead of the bundled one on systems greater than or equal to SLE15 (bsc#1229589) * Use the new clucene function, which makes index files reproducible (bsc#1047218) * Update bundled dependencies: * Java-Websocket updated from 1.5.4 to 1.5.6 * boost updated from 1.82.0 to 1.85.0 * curl updated from 8.7.1 to 8.9.1 * fontconfig updated from 2.14.2 to 2.15.0 * freetype updated from 2.13.0 to 2.13.2 * harfbuzz updated from 8.2.2 to 8.5.0 * icu4c-data updated from 73.2 to 74.2 * icu4c-src updated from 73.2 to 74.2 * libassuan updated from 2.5.7 to 3.0.1 * libcmis updated from 0.6.1 to 0.6.2 * libgpg-error updated from 1.48 to 1.50 * pdfium updated from 6179 to 6425 * poppler updated from 23.09.0 to 24.08.0 * tiff updated from 4.6.0 to 4.6.0t ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3576=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-3576=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (x86_64) * libreoffice-debugsource-24.8.1.2-48.64.2 * libreoffice-sdk-debuginfo-24.8.1.2-48.64.2 * libreoffice-sdk-24.8.1.2-48.64.2 * libreoffice-debuginfo-24.8.1.2-48.64.2 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * libreoffice-filters-optional-24.8.1.2-48.64.2 * libreoffice-debugsource-24.8.1.2-48.64.2 * libreoffice-officebean-24.8.1.2-48.64.2 * libreoffice-impress-debuginfo-24.8.1.2-48.64.2 * libreoffice-debuginfo-24.8.1.2-48.64.2 * libreoffice-writer-debuginfo-24.8.1.2-48.64.2 * libreoffice-base-24.8.1.2-48.64.2 * libreoffice-base-drivers-postgresql-debuginfo-24.8.1.2-48.64.2 * libreoffice-gtk3-debuginfo-24.8.1.2-48.64.2 * libreoffice-calc-debuginfo-24.8.1.2-48.64.2 * libreoffice-writer-extensions-24.8.1.2-48.64.2 * libreoffice-calc-extensions-24.8.1.2-48.64.2 * libreoffice-writer-24.8.1.2-48.64.2 * libreoffice-impress-24.8.1.2-48.64.2 * libreoffice-math-24.8.1.2-48.64.2 * libreoffice-mailmerge-24.8.1.2-48.64.2 * libreoffice-draw-24.8.1.2-48.64.2 * libreoffice-draw-debuginfo-24.8.1.2-48.64.2 * libreoffice-24.8.1.2-48.64.2 * libreoffice-gnome-debuginfo-24.8.1.2-48.64.2 * libreoffice-pyuno-24.8.1.2-48.64.2 * libreoffice-base-debuginfo-24.8.1.2-48.64.2 * libreoffice-calc-24.8.1.2-48.64.2 * libreoffice-math-debuginfo-24.8.1.2-48.64.2 * libreoffice-pyuno-debuginfo-24.8.1.2-48.64.2 * libreoffice-librelogo-24.8.1.2-48.64.2 * libreoffice-officebean-debuginfo-24.8.1.2-48.64.2 * libreoffice-gnome-24.8.1.2-48.64.2 * libreoffice-gtk3-24.8.1.2-48.64.2 * libreoffice-base-drivers-postgresql-24.8.1.2-48.64.2 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (noarch) * libreoffice-l10n-ca-24.8.1.2-48.64.2 * libreoffice-l10n-cs-24.8.1.2-48.64.2 * libreoffice-l10n-nn-24.8.1.2-48.64.2 * libreoffice-l10n-af-24.8.1.2-48.64.2 * libreoffice-l10n-bg-24.8.1.2-48.64.2 * libreoffice-l10n-sk-24.8.1.2-48.64.2 * libreoffice-l10n-ro-24.8.1.2-48.64.2 * libreoffice-l10n-sv-24.8.1.2-48.64.2 * libreoffice-l10n-ko-24.8.1.2-48.64.2 * libreoffice-l10n-xh-24.8.1.2-48.64.2 * libreoffice-l10n-hr-24.8.1.2-48.64.2 * libreoffice-l10n-pl-24.8.1.2-48.64.2 * libreoffice-l10n-zh_CN-24.8.1.2-48.64.2 * libreoffice-l10n-hi-24.8.1.2-48.64.2 * libreoffice-l10n-ja-24.8.1.2-48.64.2 * libreoffice-l10n-zu-24.8.1.2-48.64.2 * libreoffice-l10n-pt_PT-24.8.1.2-48.64.2 * libreoffice-l10n-hu-24.8.1.2-48.64.2 * libreoffice-l10n-ar-24.8.1.2-48.64.2 * libreoffice-branding-upstream-24.8.1.2-48.64.2 * libreoffice-l10n-de-24.8.1.2-48.64.2 * libreoffice-l10n-fr-24.8.1.2-48.64.2 * libreoffice-l10n-gu-24.8.1.2-48.64.2 * libreoffice-l10n-nb-24.8.1.2-48.64.2 * libreoffice-l10n-fi-24.8.1.2-48.64.2 * libreoffice-l10n-ru-24.8.1.2-48.64.2 * libreoffice-l10n-lt-24.8.1.2-48.64.2 * libreoffice-icon-themes-24.8.1.2-48.64.2 * libreoffice-l10n-da-24.8.1.2-48.64.2 * libreoffice-l10n-it-24.8.1.2-48.64.2 * libreoffice-l10n-zh_TW-24.8.1.2-48.64.2 * libreoffice-l10n-es-24.8.1.2-48.64.2 * libreoffice-l10n-uk-24.8.1.2-48.64.2 * libreoffice-l10n-nl-24.8.1.2-48.64.2 * libreoffice-l10n-en-24.8.1.2-48.64.2 * libreoffice-l10n-pt_BR-24.8.1.2-48.64.2 ## References: * https://www.suse.com/security/cve/CVE-2024-5261.html * https://bugzilla.suse.com/show_bug.cgi?id=1047218 * https://bugzilla.suse.com/show_bug.cgi?id=1202273 * https://bugzilla.suse.com/show_bug.cgi?id=1226975 * https://bugzilla.suse.com/show_bug.cgi?id=1229589 * https://jira.suse.com/browse/PED-10362 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 12:30:07 -0000 Subject: SUSE-SU-2024:3586-1: important: Security update for xen Message-ID: <172856340723.6932.13860371035931907050@smelt2.prg2.suse.org> # Security update for xen Announcement ID: SUSE-SU-2024:3586-1 Release Date: 2024-10-10T11:29:45Z Rating: important References: * bsc#1027519 * bsc#1228574 * bsc#1228575 * bsc#1230366 Cross-References: * CVE-2024-31145 * CVE-2024-31146 * CVE-2024-45817 CVSS scores: * CVE-2024-31145 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2024-31145 ( NVD ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2024-31146 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-31146 ( NVD ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2024-45817 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45817 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves three vulnerabilities and has one security fix can now be installed. ## Description: This update for xen fixes the following issues: Security fixes: * CVE-2024-31145: Fixed error handling in x86 IOMMU identity mapping (XSA-460) (bsc#1228574) * CVE-2024-31146: Fixed PCI device pass-through with shared resources (XSA-461) (bsc#1228575) * CVE-2024-45817: Fixed Deadlock in vlapic_error() (XSA-462) (bsc#1230366) Other fixes: * Upstream bug fixes (bsc#1027519) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3586=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3586=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3586=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3586=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 x86_64) * xen-devel-4.12.4_56-3.121.1 * xen-debugsource-4.12.4_56-3.121.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * xen-doc-html-4.12.4_56-3.121.1 * xen-libs-debuginfo-4.12.4_56-3.121.1 * xen-libs-32bit-4.12.4_56-3.121.1 * xen-libs-4.12.4_56-3.121.1 * xen-tools-4.12.4_56-3.121.1 * xen-tools-debuginfo-4.12.4_56-3.121.1 * xen-tools-domU-4.12.4_56-3.121.1 * xen-libs-debuginfo-32bit-4.12.4_56-3.121.1 * xen-tools-domU-debuginfo-4.12.4_56-3.121.1 * xen-4.12.4_56-3.121.1 * xen-debugsource-4.12.4_56-3.121.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * xen-doc-html-4.12.4_56-3.121.1 * xen-libs-debuginfo-4.12.4_56-3.121.1 * xen-libs-32bit-4.12.4_56-3.121.1 * xen-libs-4.12.4_56-3.121.1 * xen-tools-4.12.4_56-3.121.1 * xen-tools-debuginfo-4.12.4_56-3.121.1 * xen-tools-domU-4.12.4_56-3.121.1 * xen-libs-debuginfo-32bit-4.12.4_56-3.121.1 * xen-tools-domU-debuginfo-4.12.4_56-3.121.1 * xen-4.12.4_56-3.121.1 * xen-debugsource-4.12.4_56-3.121.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * xen-doc-html-4.12.4_56-3.121.1 * xen-libs-debuginfo-4.12.4_56-3.121.1 * xen-libs-32bit-4.12.4_56-3.121.1 * xen-libs-4.12.4_56-3.121.1 * xen-tools-4.12.4_56-3.121.1 * xen-tools-debuginfo-4.12.4_56-3.121.1 * xen-tools-domU-4.12.4_56-3.121.1 * xen-libs-debuginfo-32bit-4.12.4_56-3.121.1 * xen-tools-domU-debuginfo-4.12.4_56-3.121.1 * xen-4.12.4_56-3.121.1 * xen-debugsource-4.12.4_56-3.121.1 ## References: * https://www.suse.com/security/cve/CVE-2024-31145.html * https://www.suse.com/security/cve/CVE-2024-31146.html * https://www.suse.com/security/cve/CVE-2024-45817.html * https://bugzilla.suse.com/show_bug.cgi?id=1027519 * https://bugzilla.suse.com/show_bug.cgi?id=1228574 * https://bugzilla.suse.com/show_bug.cgi?id=1228575 * https://bugzilla.suse.com/show_bug.cgi?id=1230366 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 12:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 12:30:22 -0000 Subject: SUSE-SU-2024:3585-1: important: Security update for the Linux Kernel Message-ID: <172856342246.6932.11224161189437340564@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3585-1 Release Date: 2024-10-10T09:05:17Z Rating: important References: * bsc#1220826 * bsc#1226145 * bsc#1226666 * bsc#1227487 * bsc#1228466 * bsc#1229633 * bsc#1230015 * bsc#1230245 * bsc#1230326 * bsc#1230398 * bsc#1230434 * bsc#1230519 * bsc#1230767 Cross-References: * CVE-2021-47069 * CVE-2022-48911 * CVE-2022-48945 * CVE-2024-36971 * CVE-2024-41087 * CVE-2024-44946 * CVE-2024-45003 * CVE-2024-45021 * CVE-2024-46695 * CVE-2024-46774 CVSS scores: * CVE-2021-47069 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36971 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36971 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves 10 vulnerabilities and has three security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47069: Fixed a crash due to relying on a stack reference past its expiry in ipc/mqueue, ipc/msg, ipc/sem (bsc#1220826). * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). * CVE-2022-48945: media: vivid: fix compose size exceed boundary (bsc#1230398). * CVE-2024-41087: Fix double free on error (bsc#1228466). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-46695: selinux,smack: do not bypass permissions check in inode_setsecctx hook (bsc#1230519). * CVE-2024-36971: Fixed __dst_negative_advice() race (bsc#1226145). The following non-security bugs were fixed: * ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1230326). * ext4: add reserved GDT blocks check (bsc#1230326). * ext4: consolidate checks for resize of bigalloc into ext4_resize_begin (bsc#1230326). * ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1230326). * kabi: add __nf_queue_get_refs() for kabi compliance. * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * Revert "ext4: consolidate checks for resize of bigalloc into ext4_resize_begin" (bsc#1230326). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3585=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-3585=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-3585=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3585=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3585=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3585=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3585=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3585=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3585=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3585=1 ## Package List: * openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.179.1 * openSUSE Leap 15.3 (noarch) * kernel-source-vanilla-5.3.18-150300.59.179.1 * kernel-source-5.3.18-150300.59.179.1 * kernel-devel-5.3.18-150300.59.179.1 * kernel-docs-html-5.3.18-150300.59.179.1 * kernel-macros-5.3.18-150300.59.179.1 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-debug-5.3.18-150300.59.179.1 * kernel-kvmsmall-5.3.18-150300.59.179.1 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-debug-devel-5.3.18-150300.59.179.1 * kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.179.1 * kernel-debug-debuginfo-5.3.18-150300.59.179.1 * kernel-kvmsmall-devel-5.3.18-150300.59.179.1 * kernel-debug-debugsource-5.3.18-150300.59.179.1 * kernel-debug-livepatch-devel-5.3.18-150300.59.179.1 * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.179.1 * kernel-debug-devel-debuginfo-5.3.18-150300.59.179.1 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.179.1 * kernel-kvmsmall-debugsource-5.3.18-150300.59.179.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * kernel-syms-5.3.18-150300.59.179.1 * kernel-obs-qa-5.3.18-150300.59.179.1 * gfs2-kmp-default-5.3.18-150300.59.179.1 * cluster-md-kmp-default-5.3.18-150300.59.179.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-base-5.3.18-150300.59.179.1.150300.18.105.2 * dlm-kmp-default-5.3.18-150300.59.179.1 * ocfs2-kmp-default-5.3.18-150300.59.179.1 * kernel-obs-build-debugsource-5.3.18-150300.59.179.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-base-rebuild-5.3.18-150300.59.179.1.150300.18.105.2 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.179.1 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-optional-debuginfo-5.3.18-150300.59.179.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-extra-5.3.18-150300.59.179.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.179.1 * kernel-default-livepatch-5.3.18-150300.59.179.1 * kernel-default-debugsource-5.3.18-150300.59.179.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-devel-5.3.18-150300.59.179.1 * kernel-default-optional-5.3.18-150300.59.179.1 * kernel-default-extra-debuginfo-5.3.18-150300.59.179.1 * kernel-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-livepatch-devel-5.3.18-150300.59.179.1 * reiserfs-kmp-default-5.3.18-150300.59.179.1 * kernel-obs-build-5.3.18-150300.59.179.1 * kselftests-kmp-default-5.3.18-150300.59.179.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.179.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-1-150300.7.3.2 * kernel-livepatch-SLE15-SP3_Update_49-debugsource-1-150300.7.3.2 * kernel-livepatch-5_3_18-150300_59_179-default-1-150300.7.3.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_179-preempt-1-150300.7.3.2 * kernel-livepatch-5_3_18-150300_59_179-preempt-debuginfo-1-150300.7.3.2 * openSUSE Leap 15.3 (aarch64 x86_64) * reiserfs-kmp-preempt-5.3.18-150300.59.179.1 * kselftests-kmp-preempt-5.3.18-150300.59.179.1 * kernel-preempt-debugsource-5.3.18-150300.59.179.1 * kernel-preempt-optional-5.3.18-150300.59.179.1 * dlm-kmp-preempt-5.3.18-150300.59.179.1 * kernel-preempt-debuginfo-5.3.18-150300.59.179.1 * gfs2-kmp-preempt-5.3.18-150300.59.179.1 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.179.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.179.1 * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.179.1 * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.179.1 * ocfs2-kmp-preempt-5.3.18-150300.59.179.1 * kernel-preempt-devel-5.3.18-150300.59.179.1 * kernel-preempt-livepatch-devel-5.3.18-150300.59.179.1 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.179.1 * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.179.1 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.179.1 * cluster-md-kmp-preempt-5.3.18-150300.59.179.1 * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.179.1 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.179.1 * kernel-preempt-extra-5.3.18-150300.59.179.1 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.179.1 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.179.1 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debuginfo-5.3.18-150300.59.179.1 * kernel-zfcpdump-debugsource-5.3.18-150300.59.179.1 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.179.1 * openSUSE Leap 15.3 (aarch64) * dtb-exynos-5.3.18-150300.59.179.1 * dtb-allwinner-5.3.18-150300.59.179.1 * dtb-cavium-5.3.18-150300.59.179.1 * dtb-renesas-5.3.18-150300.59.179.1 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.179.1 * kernel-64kb-livepatch-devel-5.3.18-150300.59.179.1 * dtb-sprd-5.3.18-150300.59.179.1 * kselftests-kmp-64kb-5.3.18-150300.59.179.1 * dtb-zte-5.3.18-150300.59.179.1 * gfs2-kmp-64kb-5.3.18-150300.59.179.1 * kernel-64kb-devel-5.3.18-150300.59.179.1 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.179.1 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.179.1 * dtb-xilinx-5.3.18-150300.59.179.1 * kernel-64kb-extra-5.3.18-150300.59.179.1 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.179.1 * dtb-socionext-5.3.18-150300.59.179.1 * dtb-al-5.3.18-150300.59.179.1 * dtb-freescale-5.3.18-150300.59.179.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.179.1 * dtb-altera-5.3.18-150300.59.179.1 * kernel-64kb-optional-5.3.18-150300.59.179.1 * dtb-marvell-5.3.18-150300.59.179.1 * dtb-amlogic-5.3.18-150300.59.179.1 * dtb-qcom-5.3.18-150300.59.179.1 * dtb-rockchip-5.3.18-150300.59.179.1 * kernel-64kb-debuginfo-5.3.18-150300.59.179.1 * reiserfs-kmp-64kb-5.3.18-150300.59.179.1 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.179.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.179.1 * dtb-apm-5.3.18-150300.59.179.1 * dtb-broadcom-5.3.18-150300.59.179.1 * dtb-amd-5.3.18-150300.59.179.1 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.179.1 * dtb-arm-5.3.18-150300.59.179.1 * dtb-mediatek-5.3.18-150300.59.179.1 * cluster-md-kmp-64kb-5.3.18-150300.59.179.1 * dlm-kmp-64kb-5.3.18-150300.59.179.1 * kernel-64kb-debugsource-5.3.18-150300.59.179.1 * dtb-nvidia-5.3.18-150300.59.179.1 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.179.1 * ocfs2-kmp-64kb-5.3.18-150300.59.179.1 * dtb-lg-5.3.18-150300.59.179.1 * dtb-hisilicon-5.3.18-150300.59.179.1 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-1-150300.7.3.2 * kernel-default-livepatch-5.3.18-150300.59.179.1 * kernel-default-debuginfo-5.3.18-150300.59.179.1 * kernel-livepatch-SLE15-SP3_Update_49-debugsource-1-150300.7.3.2 * kernel-default-debugsource-5.3.18-150300.59.179.1 * kernel-default-livepatch-devel-5.3.18-150300.59.179.1 * kernel-livepatch-5_3_18-150300_59_179-default-1-150300.7.3.2 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-debuginfo-5.3.18-150300.59.179.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.179.1 * gfs2-kmp-default-5.3.18-150300.59.179.1 * ocfs2-kmp-default-5.3.18-150300.59.179.1 * cluster-md-kmp-default-5.3.18-150300.59.179.1 * kernel-default-debugsource-5.3.18-150300.59.179.1 * dlm-kmp-default-5.3.18-150300.59.179.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.179.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.179.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.179.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.179.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.179.1 * kernel-64kb-debuginfo-5.3.18-150300.59.179.1 * kernel-64kb-devel-5.3.18-150300.59.179.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.179.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.179.1 * kernel-default-5.3.18-150300.59.179.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-preempt-devel-debuginfo-5.3.18-150300.59.179.1 * kernel-syms-5.3.18-150300.59.179.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.179.1 * kernel-preempt-debugsource-5.3.18-150300.59.179.1 * kernel-preempt-devel-5.3.18-150300.59.179.1 * kernel-default-debuginfo-5.3.18-150300.59.179.1 * kernel-preempt-debuginfo-5.3.18-150300.59.179.1 * kernel-default-debugsource-5.3.18-150300.59.179.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-base-5.3.18-150300.59.179.1.150300.18.105.2 * kernel-obs-build-debugsource-5.3.18-150300.59.179.1 * reiserfs-kmp-default-5.3.18-150300.59.179.1 * kernel-obs-build-5.3.18-150300.59.179.1 * kernel-default-devel-5.3.18-150300.59.179.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.179.1 * kernel-macros-5.3.18-150300.59.179.1 * kernel-devel-5.3.18-150300.59.179.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.179.1 * kernel-64kb-debuginfo-5.3.18-150300.59.179.1 * kernel-64kb-devel-5.3.18-150300.59.179.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * kernel-syms-5.3.18-150300.59.179.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.179.1 * kernel-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-debugsource-5.3.18-150300.59.179.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-base-5.3.18-150300.59.179.1.150300.18.105.2 * kernel-obs-build-debugsource-5.3.18-150300.59.179.1 * reiserfs-kmp-default-5.3.18-150300.59.179.1 * kernel-obs-build-5.3.18-150300.59.179.1 * kernel-default-devel-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * kernel-source-5.3.18-150300.59.179.1 * kernel-macros-5.3.18-150300.59.179.1 * kernel-devel-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * kernel-preempt-devel-5.3.18-150300.59.179.1 * kernel-preempt-debugsource-5.3.18-150300.59.179.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.179.1 * kernel-preempt-debuginfo-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x) * kernel-zfcpdump-debuginfo-5.3.18-150300.59.179.1 * kernel-zfcpdump-debugsource-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * kernel-syms-5.3.18-150300.59.179.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.179.1 * kernel-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-debugsource-5.3.18-150300.59.179.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-base-5.3.18-150300.59.179.1.150300.18.105.2 * kernel-obs-build-debugsource-5.3.18-150300.59.179.1 * reiserfs-kmp-default-5.3.18-150300.59.179.1 * kernel-obs-build-5.3.18-150300.59.179.1 * kernel-default-devel-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.179.1 * kernel-macros-5.3.18-150300.59.179.1 * kernel-devel-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-devel-5.3.18-150300.59.179.1 * kernel-preempt-debugsource-5.3.18-150300.59.179.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.179.1 * kernel-preempt-debuginfo-5.3.18-150300.59.179.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.179.1 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.179.1 * kernel-64kb-debuginfo-5.3.18-150300.59.179.1 * kernel-64kb-devel-5.3.18-150300.59.179.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.179.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.179.1 * kernel-default-5.3.18-150300.59.179.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-preempt-devel-debuginfo-5.3.18-150300.59.179.1 * kernel-syms-5.3.18-150300.59.179.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.179.1 * kernel-preempt-debugsource-5.3.18-150300.59.179.1 * kernel-preempt-devel-5.3.18-150300.59.179.1 * kernel-default-debuginfo-5.3.18-150300.59.179.1 * kernel-preempt-debuginfo-5.3.18-150300.59.179.1 * kernel-default-debugsource-5.3.18-150300.59.179.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-base-5.3.18-150300.59.179.1.150300.18.105.2 * kernel-obs-build-debugsource-5.3.18-150300.59.179.1 * reiserfs-kmp-default-5.3.18-150300.59.179.1 * kernel-obs-build-5.3.18-150300.59.179.1 * kernel-default-devel-5.3.18-150300.59.179.1 * SUSE Enterprise Storage 7.1 (noarch) * kernel-source-5.3.18-150300.59.179.1 * kernel-macros-5.3.18-150300.59.179.1 * kernel-devel-5.3.18-150300.59.179.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-debugsource-5.3.18-150300.59.179.1 * kernel-default-debuginfo-5.3.18-150300.59.179.1 * kernel-default-base-5.3.18-150300.59.179.1.150300.18.105.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.179.1.150300.18.105.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debugsource-5.3.18-150300.59.179.1 * kernel-default-debuginfo-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.179.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.179.1.150300.18.105.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debugsource-5.3.18-150300.59.179.1 * kernel-default-debuginfo-5.3.18-150300.59.179.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47069.html * https://www.suse.com/security/cve/CVE-2022-48911.html * https://www.suse.com/security/cve/CVE-2022-48945.html * https://www.suse.com/security/cve/CVE-2024-36971.html * https://www.suse.com/security/cve/CVE-2024-41087.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-46695.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://bugzilla.suse.com/show_bug.cgi?id=1220826 * https://bugzilla.suse.com/show_bug.cgi?id=1226145 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1228466 * https://bugzilla.suse.com/show_bug.cgi?id=1229633 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230326 * https://bugzilla.suse.com/show_bug.cgi?id=1230398 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230519 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 16:31:20 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 16:31:20 -0000 Subject: SUSE-SU-2024:3591-1: important: Security update for the Linux Kernel Message-ID: <172857788092.27570.11318448226316675616@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3591-1 Release Date: 2024-10-10T15:34:35Z Rating: important References: * bsc#1054914 * bsc#1065729 * bsc#1207341 * bsc#1225316 * bsc#1226846 * bsc#1226860 * bsc#1226878 * bsc#1227487 * bsc#1227941 * bsc#1227952 * bsc#1227953 * bsc#1228000 * bsc#1228002 * bsc#1228068 * bsc#1228507 * bsc#1228615 * bsc#1228620 * bsc#1228635 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229456 * bsc#1229457 * bsc#1229633 * bsc#1229645 * bsc#1229739 * bsc#1229753 * bsc#1229764 * bsc#1229790 * bsc#1229830 * bsc#1230015 * bsc#1230151 * bsc#1230171 * bsc#1230174 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230185 * bsc#1230200 * bsc#1230204 * bsc#1230233 * bsc#1230248 * bsc#1230270 * bsc#1230398 * bsc#1230506 * bsc#1230515 * bsc#1230517 * bsc#1230533 * bsc#1230535 * bsc#1230549 * bsc#1230556 * bsc#1230582 * bsc#1230589 * bsc#1230700 * bsc#1230702 * bsc#1230709 * bsc#1230710 * bsc#1230712 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230747 * bsc#1230748 * bsc#1230756 * bsc#1230761 * bsc#1230763 * bsc#1230767 * bsc#1230771 * bsc#1230783 * bsc#1230796 * bsc#1230810 * bsc#1230814 * bsc#1230815 * bsc#1230826 * bsc#1231083 * bsc#1231084 * bsc#1231089 * bsc#1231120 * bsc#1231146 * bsc#1231184 Cross-References: * CVE-2021-47387 * CVE-2022-48788 * CVE-2022-48789 * CVE-2022-48790 * CVE-2022-48791 * CVE-2022-48799 * CVE-2022-48844 * CVE-2022-48911 * CVE-2022-48943 * CVE-2022-48945 * CVE-2023-52915 * CVE-2024-38381 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-41073 * CVE-2024-41079 * CVE-2024-41082 * CVE-2024-42154 * CVE-2024-42265 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43884 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43912 * CVE-2024-43914 * CVE-2024-44946 * CVE-2024-44947 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44969 * CVE-2024-44982 * CVE-2024-44987 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45008 * CVE-2024-46673 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46702 * CVE-2024-46707 * CVE-2024-46715 * CVE-2024-46721 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46731 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46750 * CVE-2024-46753 * CVE-2024-46759 * CVE-2024-46761 * CVE-2024-46770 * CVE-2024-46774 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46787 * CVE-2024-46822 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46859 CVSS scores: * CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48799 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48844 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38381 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38381 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43884 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43912 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 71 vulnerabilities and has nine security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47387: cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory (bsc#1225316). * CVE-2022-48788: nvme-rdma: fix possible use-after-free in transport error_recovery work (bsc#1227952). * CVE-2022-48789: nvme-tcp: fix possible use-after-free in transport error_recovery work (bsc#1228000). * CVE-2022-48790: nvme: fix a possible use-after-free in controller reset during load (bsc#1227941). * CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002) * CVE-2022-48799: perf: Fix list corruption in perf_cgroup_switch() (bsc#1227953). * CVE-2022-48844: Bluetooth: hci_core: Fix leaking sent_cmd skb (bsc#1228068). * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). * CVE-2022-48943: KVM: x86/mmu: make apf token non-zero to fix bug (bsc#1229645). * CVE-2022-48945: media: vivid: fix compose size exceed boundary (bsc#1230398). * CVE-2023-52915: media: dvb-usb-v2: af9035: fix missing unlock (bsc#1230270). * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-41073: nvme: avoid double free special payload (bsc#1228635). * CVE-2024-41079: nvmet: always initialize cqe.result (bsc#1228615). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620 CVE-2024-41082). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-43884: Add error handling to pair_device() (bsc#1229739) * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830) * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44948: x86/mtrr: Check if fixed MTRRs exist before saving them (bsc#1230174). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race (bsc#1230178). * CVE-2024-44954: ALSA: line6: Fix racy access to midibuf (bsc#1230176). * CVE-2024-44969: s390/sclp: Prevent release of buffer in I/O (bsc#1230200). * CVE-2024-44982: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (bsc#1230204). * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45008: Input: MT - limit max slots (bsc#1230248). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46675: usb: dwc3: core: Prevent USB core invalid event buffer address access (bsc#1230533). * CVE-2024-46676: nfc: pn533: Add poll mod list filling check (bsc#1230535). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515) * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589) * CVE-2024-46707: KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (bsc#1230582). * CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access (bsc#1230700). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46722: drm/amdgpu: fix mc_data out-of-bounds read warning (bsc#1230712). * CVE-2024-46723: drm/amdgpu: fix ucode out-of-bounds read warning (bsc#1230702). * CVE-2024-46731: drm/amd/pm: fix the Out-of-bounds read warning (bsc#1230709). * CVE-2024-46738: VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (bsc#1230731). * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46744: Squashfs: sanity check symbolic link size (bsc#1230747). * CVE-2024-46745: Input: uinput - reject requests with unreasonable number of slots (bsc#1230748). * CVE-2024-46750: PCI: Add missing bridge lock to pci_bus_lock() (bsc#1230783). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46759: hwmon: (adc128d818) Fix underflows seen when writing limit attributes (bsc#1230814). * CVE-2024-46761: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (bsc#1230761). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). * CVE-2024-46853: spi: nxp-fspi: fix the KASAN report out-of-bounds bug (bsc#1231083). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46859: platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (bsc#1231089). The following non-security bugs were fixed: * ACPI / EC: Clean up EC GPE mask flag (git-fixes). * ACPI: EC: Avoid printing confusing messages in acpi_ec_setup() (git-fixes). * ACPI: EC: Fix an EC event IRQ storming issue (git-fixes). * ACPI: EC: tweak naming in preparation for GpioInt support (git-fixes). * ACPI: SPCR: Consider baud rate 0 as preconfigured state (git-fixes). * ACPI: SPCR: Workaround for APM X-Gene 8250 UART 32-alignment errata (git- fixes). * ACPI: SPCR: work around clock issue on xgene UART (git-fixes). * ACPI: blacklist: fix clang warning for unused DMI table (git-fixes). * ACPI: video: Add new hw_changes_brightness quirk, set it on PB Easynote MZ35 (git-fixes). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Fix bsc#1054914 reference. * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * Revert "ACPI / EC: Remove old CLEAR_ON_RESUME quirk" (git-fixes). * af_unix: Fix data races around sk->sk_shutdown (bsc#1226846). * af_unix: annotate lockless accesses to sk->sk_err (bsc#1226846). * autofs4: use wait_event_killable (bsc#1207341). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231184). * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230151). * kabi fix for proc/mounts: add cursor (bsc#1207341). * kabi/severities: Ignore ppc instruction emulation (bsc#1230826 ltc#205848) These are lowlevel functions not used outside of exception handling and kernel debugging facilities. * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * media: vivid: avoid integer overflow (git-fixes). * media: vivid: dev->bitmap_cap wasn't freed in all cases (git-fixes). * media: vivid: fix assignment of dev->fbuf_out_flags (git-fixes). * media: vivid: s_fbuf: add more sanity checks (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git- fixes). * net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git- fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * powerpc sstep: Add support for cnttzw, cnttzd instructions (bsc#1230826 ltc#205848). * powerpc sstep: Add support for extswsli instruction (bsc#1230826 ltc#205848). * powerpc sstep: Add support for modsd, modud instructions (bsc#1230826 ltc#205848). * powerpc sstep: Add support for modsw, moduw instructions (bsc#1230826 ltc#205848). * powerpc/32: Move the inline keyword at the beginning of function declaration (bsc#1230826 ltc#205848). * powerpc/64: Fix update forms of loads and stores to write 64-bit EA (bsc#1230826 ltc#205848). * powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1230826 ltc#205848). * powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git- fixes). * powerpc/imc-pmu: Revert nest_init_lock to being a mutex (bsc#1065729). * powerpc/iommu: Annotate nested lock for lockdep (bsc#1065729). * powerpc/kprobes: Blacklist emulate_update_regs() from kprobes (bsc#1230826 ltc#205848). * powerpc/kprobes: Update optprobes to use emulate_update_regs() (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add XER bits introduced in POWER ISA v3.0 (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add bpermd instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add cmpb instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add isel instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add popcnt instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add prty instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix count leading zeros instructions (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix fixed-point arithmetic instructions that set CA32 (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix fixed-point shift instructions that set CA32 (bsc#1230826 ltc#205848). * powerpc/lib/sstep: fix 'ptesync' build error (bsc#1230826 ltc#205848). * powerpc/lib: Fix "integer constant is too large" build failure (bsc#1230826 ltc#205848). * powerpc/lib: fix redundant inclusion of quad.o (bsc#1230826 ltc#205848). * powerpc/ppc-opcode: Add divde and divdeu opcodes (bsc#1230826 ltc#205848). * powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1065729). * powerpc/sstep: Add support for divde[.] and divdeu[.] instructions (bsc#1230826 ltc#205848). * powerpc/sstep: Avoid used uninitialized error (bsc#1230826 ltc#205848). * powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1230826 ltc#205848). * powerpc/sstep: Fix darn emulation (bsc#1230826 ltc#205848). * powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1230826 ltc#205848). * powerpc/sstep: Fix issues with mcrf (bsc#1230826 ltc#205848). * powerpc/sstep: Fix issues with set_cr0() (bsc#1230826 ltc#205848). * powerpc/sstep: Fix kernel crash if VSX is not present (bsc#1230826 ltc#205848). * powerpc/sstep: Introduce GETTYPE macro (bsc#1230826 ltc#205848). * powerpc/sstep: mullw should calculate a 64 bit signed result (bsc#1230826 ltc#205848). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * powerpc: Add emulation for the addpcis instruction (bsc#1230826 ltc#205848). * powerpc: Change analyse_instr so it does not modify *regs (bsc#1230826 ltc#205848). * powerpc: Do not check MSR FP/VMX/VSX enable bits in analyse_instr() (bsc#1230826 ltc#205848). * powerpc: Do not update CR0 in emulation of popcnt, prty, bpermd instructions (bsc#1230826 ltc#205848). * powerpc: Emulate FP/vector/VSX loads/stores correctly when regs not live (bsc#1230826 ltc#205848). * powerpc: Emulate load/store floating double pair instructions (bsc#1230826 ltc#205848). * powerpc: Emulate load/store floating point as integer word instructions (bsc#1230826 ltc#205848). * powerpc: Emulate the dcbz instruction (bsc#1230826 ltc#205848). * powerpc: Emulate vector element load/store instructions (bsc#1230826 ltc#205848). * powerpc: Fix emulation of the isel instruction (bsc#1230826 ltc#205848). * powerpc: Fix handling of alignment interrupt on dcbz instruction (bsc#1230826 ltc#205848). * powerpc: Fix kernel crash in emulation of vector loads and stores (bsc#1230826 ltc#205848). * powerpc: Handle most loads and stores in instruction emulation code (bsc#1230826 ltc#205848). * powerpc: Handle opposite-endian processes in emulation code (bsc#1230826 ltc#205848). * powerpc: Make load/store emulation use larger memory accesses (bsc#1230826 ltc#205848). * powerpc: Remove support for PowerPC 601 (Remove unused and malformed assembly causing build error). * powerpc: Separate out load/store emulation into its own function (bsc#1230826 ltc#205848). * powerpc: Set regs->dar if memory access fails in emulate_step() (bsc#1230826 ltc#205848). * powerpc: Use instruction emulation infrastructure to handle alignment faults (bsc#1230826 ltc#205848). * powerpc: Wrap register number correctly for string load/store instructions (bsc#1230826 ltc#205848). * powerpc: sstep: Add support for darn instruction (bsc#1230826 ltc#205848). * powerpc: sstep: Add support for maddhd, maddhdu, maddld instructions (bsc#1230826 ltc#205848). * proc/mounts: add cursor (bsc#1207341). * profiling: fix shift too large makes kernel panic (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * usbnet: modern method to get random MAC (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3591=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3591=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3591=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.200.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-azure-debuginfo-4.12.14-16.200.1 * kernel-syms-azure-4.12.14-16.200.1 * kernel-azure-base-4.12.14-16.200.1 * kernel-azure-devel-4.12.14-16.200.1 * kernel-azure-base-debuginfo-4.12.14-16.200.1 * kernel-azure-debugsource-4.12.14-16.200.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-source-azure-4.12.14-16.200.1 * kernel-devel-azure-4.12.14-16.200.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.200.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-azure-debuginfo-4.12.14-16.200.1 * kernel-syms-azure-4.12.14-16.200.1 * kernel-azure-base-4.12.14-16.200.1 * kernel-azure-devel-4.12.14-16.200.1 * kernel-azure-base-debuginfo-4.12.14-16.200.1 * kernel-azure-debugsource-4.12.14-16.200.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-source-azure-4.12.14-16.200.1 * kernel-devel-azure-4.12.14-16.200.1 * SUSE Linux Enterprise Server 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.200.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-azure-debuginfo-4.12.14-16.200.1 * kernel-syms-azure-4.12.14-16.200.1 * kernel-azure-base-4.12.14-16.200.1 * kernel-azure-devel-4.12.14-16.200.1 * kernel-azure-base-debuginfo-4.12.14-16.200.1 * kernel-azure-debugsource-4.12.14-16.200.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-source-azure-4.12.14-16.200.1 * kernel-devel-azure-4.12.14-16.200.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47387.html * https://www.suse.com/security/cve/CVE-2022-48788.html * https://www.suse.com/security/cve/CVE-2022-48789.html * https://www.suse.com/security/cve/CVE-2022-48790.html * https://www.suse.com/security/cve/CVE-2022-48791.html * https://www.suse.com/security/cve/CVE-2022-48799.html * https://www.suse.com/security/cve/CVE-2022-48844.html * https://www.suse.com/security/cve/CVE-2022-48911.html * https://www.suse.com/security/cve/CVE-2022-48943.html * https://www.suse.com/security/cve/CVE-2022-48945.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2024-38381.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-41073.html * https://www.suse.com/security/cve/CVE-2024-41079.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43884.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43912.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://bugzilla.suse.com/show_bug.cgi?id=1054914 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1207341 * https://bugzilla.suse.com/show_bug.cgi?id=1225316 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1226878 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227941 * https://bugzilla.suse.com/show_bug.cgi?id=1227952 * https://bugzilla.suse.com/show_bug.cgi?id=1227953 * https://bugzilla.suse.com/show_bug.cgi?id=1228000 * https://bugzilla.suse.com/show_bug.cgi?id=1228002 * https://bugzilla.suse.com/show_bug.cgi?id=1228068 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228615 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228635 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229457 * https://bugzilla.suse.com/show_bug.cgi?id=1229633 * https://bugzilla.suse.com/show_bug.cgi?id=1229645 * https://bugzilla.suse.com/show_bug.cgi?id=1229739 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229830 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230151 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230398 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230826 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231184 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 16:31:22 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 16:31:22 -0000 Subject: SUSE-OU-2024:3590-1: moderate: Optional update for mailx Message-ID: <172857788290.27570.4802566991927980540@smelt2.prg2.suse.org> # Optional update for mailx Announcement ID: SUSE-OU-2024:3590-1 Release Date: 2024-10-10T15:13:07Z Rating: moderate References: * jsc#SMO-444 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature can now be installed. ## Description: This update ships mailx to SUSE Linux Enterprise Micro. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3590=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3590=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3590=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3590=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3590=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3590=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3590=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3590=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3590=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3590=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3590=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * mailx-12.5-150000.3.5.1 * mailx-debugsource-12.5-150000.3.5.1 * mailx-debuginfo-12.5-150000.3.5.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * mailx-12.5-150000.3.5.1 * mailx-debugsource-12.5-150000.3.5.1 * mailx-debuginfo-12.5-150000.3.5.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * mailx-12.5-150000.3.5.1 * mailx-debugsource-12.5-150000.3.5.1 * mailx-debuginfo-12.5-150000.3.5.1 * openSUSE Leap Micro 5.5 (aarch64 ppc64le s390x x86_64) * mailx-12.5-150000.3.5.1 * mailx-debugsource-12.5-150000.3.5.1 * mailx-debuginfo-12.5-150000.3.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * mailx-12.5-150000.3.5.1 * mailx-debugsource-12.5-150000.3.5.1 * mailx-debuginfo-12.5-150000.3.5.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * mailx-12.5-150000.3.5.1 * mailx-debugsource-12.5-150000.3.5.1 * mailx-debuginfo-12.5-150000.3.5.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * mailx-12.5-150000.3.5.1 * mailx-debugsource-12.5-150000.3.5.1 * mailx-debuginfo-12.5-150000.3.5.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * mailx-12.5-150000.3.5.1 * mailx-debugsource-12.5-150000.3.5.1 * mailx-debuginfo-12.5-150000.3.5.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * mailx-12.5-150000.3.5.1 * mailx-debugsource-12.5-150000.3.5.1 * mailx-debuginfo-12.5-150000.3.5.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * mailx-12.5-150000.3.5.1 * mailx-debugsource-12.5-150000.3.5.1 * mailx-debuginfo-12.5-150000.3.5.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * mailx-12.5-150000.3.5.1 * mailx-debugsource-12.5-150000.3.5.1 * mailx-debuginfo-12.5-150000.3.5.1 ## References: * https://jira.suse.com/browse/SMO-444 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 16:31:24 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 16:31:24 -0000 Subject: SUSE-RU-2024:3589-1: moderate: Recommended update for cyrus-sasl Message-ID: <172857788496.27570.10355818762254782745@smelt2.prg2.suse.org> # Recommended update for cyrus-sasl Announcement ID: SUSE-RU-2024:3589-1 Release Date: 2024-10-10T14:39:21Z Rating: moderate References: * bsc#1230111 Affected Products: * Basesystem Module 15-SP6 * Legacy Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for cyrus-sasl fixes the following issues: * Make DIGEST-MD5 work with openssl3 ( bsc#1230111 ) RC4 is legacy provided since openSSL3 and requires explicit loading, disable openssl3 depricated API warnings. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3589=1 openSUSE-SLE-15.6-2024-3589=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3589=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3589=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3589=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * cyrus-sasl-ldap-auxprop-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-2.1.28-150600.7.3.1 * cyrus-sasl-scram-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-digestmd5-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-plain-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-crammd5-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-bdb-debugsource-2.1.28-150600.7.3.1 * cyrus-sasl-otp-2.1.28-150600.7.3.1 * cyrus-sasl-scram-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-debugsource-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-scram-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-bdb-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-otp-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-debuginfo-2.1.28-150600.7.3.1 * libsasl2-3-debuginfo-2.1.28-150600.7.3.1 * libsasl2-3-2.1.28-150600.7.3.1 * cyrus-sasl-gs2-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-gssapi-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-bdb-2.1.28-150600.7.3.1 * cyrus-sasl-sqlauxprop-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-gssapi-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-crammd5-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-ntlm-2.1.28-150600.7.3.1 * cyrus-sasl-ldap-auxprop-bdb-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-crammd5-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-gs2-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-devel-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-plain-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-crammd5-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-ntlm-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-otp-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-plain-2.1.28-150600.7.3.1 * cyrus-sasl-digestmd5-2.1.28-150600.7.3.1 * cyrus-sasl-sqlauxprop-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-gssapi-2.1.28-150600.7.3.1 * cyrus-sasl-digestmd5-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-gs2-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-debugsource-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-scram-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-digestmd5-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-otp-2.1.28-150600.7.3.1 * cyrus-sasl-gssapi-2.1.28-150600.7.3.1 * cyrus-sasl-plain-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-sqlauxprop-bdb-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-sqlauxprop-bdb-2.1.28-150600.7.3.1 * cyrus-sasl-ntlm-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-devel-2.1.28-150600.7.3.1 * cyrus-sasl-ldap-auxprop-bdb-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-ldap-auxprop-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-2.1.28-150600.7.3.1 * cyrus-sasl-gs2-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-ntlm-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-debugsource-2.1.28-150600.7.3.1 * openSUSE Leap 15.6 (x86_64) * libsasl2-3-32bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-32bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-digestmd5-32bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-digestmd5-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-crammd5-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-plain-32bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-gssapi-32bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-plain-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-crammd5-32bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-sqlauxprop-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-devel-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-otp-32bit-debuginfo-2.1.28-150600.7.3.1 * libsasl2-3-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-gssapi-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-sqlauxprop-32bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-otp-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-ldap-auxprop-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-ldap-auxprop-32bit-debuginfo-2.1.28-150600.7.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libsasl2-3-64bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-ldap-auxprop-64bit-2.1.28-150600.7.3.1 * cyrus-sasl-gssapi-64bit-2.1.28-150600.7.3.1 * cyrus-sasl-plain-64bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-sqlauxprop-64bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-sqlauxprop-64bit-2.1.28-150600.7.3.1 * cyrus-sasl-64bit-2.1.28-150600.7.3.1 * cyrus-sasl-plain-64bit-2.1.28-150600.7.3.1 * cyrus-sasl-otp-64bit-2.1.28-150600.7.3.1 * cyrus-sasl-crammd5-64bit-2.1.28-150600.7.3.1 * cyrus-sasl-devel-64bit-2.1.28-150600.7.3.1 * cyrus-sasl-digestmd5-64bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-gssapi-64bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-digestmd5-64bit-2.1.28-150600.7.3.1 * cyrus-sasl-64bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-ldap-auxprop-64bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-crammd5-64bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-otp-64bit-debuginfo-2.1.28-150600.7.3.1 * libsasl2-3-64bit-2.1.28-150600.7.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * cyrus-sasl-saslauthd-2.1.28-150600.7.3.1 * cyrus-sasl-otp-2.1.28-150600.7.3.1 * cyrus-sasl-debugsource-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-debuginfo-2.1.28-150600.7.3.1 * libsasl2-3-debuginfo-2.1.28-150600.7.3.1 * libsasl2-3-2.1.28-150600.7.3.1 * cyrus-sasl-gssapi-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-2.1.28-150600.7.3.1 * cyrus-sasl-crammd5-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-ntlm-2.1.28-150600.7.3.1 * cyrus-sasl-crammd5-2.1.28-150600.7.3.1 * cyrus-sasl-otp-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-plain-2.1.28-150600.7.3.1 * cyrus-sasl-digestmd5-2.1.28-150600.7.3.1 * cyrus-sasl-digestmd5-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-gssapi-2.1.28-150600.7.3.1 * cyrus-sasl-plain-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-ntlm-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-devel-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-debugsource-2.1.28-150600.7.3.1 * Basesystem Module 15-SP6 (x86_64) * libsasl2-3-32bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-32bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-digestmd5-32bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-digestmd5-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-crammd5-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-plain-32bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-gssapi-32bit-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-crammd5-32bit-debuginfo-2.1.28-150600.7.3.1 * libsasl2-3-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-gssapi-32bit-2.1.28-150600.7.3.1 * cyrus-sasl-plain-32bit-2.1.28-150600.7.3.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * cyrus-sasl-bdb-digestmd5-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-plain-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-crammd5-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-bdb-debugsource-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-scram-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-bdb-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-otp-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-bdb-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-gssapi-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-crammd5-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-gs2-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-plain-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-ntlm-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-gssapi-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-gs2-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-debugsource-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-scram-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-digestmd5-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-otp-2.1.28-150600.7.3.1 * cyrus-sasl-sqlauxprop-bdb-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-sqlauxprop-bdb-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-ntlm-2.1.28-150600.7.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * cyrus-sasl-sqlauxprop-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-sqlauxprop-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-devel-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-debuginfo-2.1.28-150600.7.3.1 * cyrus-sasl-bdb-debugsource-2.1.28-150600.7.3.1 * cyrus-sasl-saslauthd-debugsource-2.1.28-150600.7.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230111 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 16:31:27 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 16:31:27 -0000 Subject: SUSE-RU-2024:3492-2: low: Recommended update for udisks2 Message-ID: <172857788783.27570.11677224405820150003@smelt2.prg2.suse.org> # Recommended update for udisks2 Announcement ID: SUSE-RU-2024:3492-2 Release Date: 2024-10-10T14:17:39Z Rating: low References: * bsc#1227458 Affected Products: * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for udisks2 fixes the following issues: * Add libudisks2-0_btrfs to PackeHub 15-SP6 (bsc#1227458) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3492=1 ## Package List: * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libudisks2-0_btrfs-2.9.2-150400.3.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1227458 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 16:31:29 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 16:31:29 -0000 Subject: SUSE-RU-2024:3588-1: moderate: Recommended update for elemental-toolkit Message-ID: <172857788904.27570.11521713426188975898@smelt2.prg2.suse.org> # Recommended update for elemental-toolkit Announcement ID: SUSE-RU-2024:3588-1 Release Date: 2024-10-10T13:34:11Z Rating: moderate References: Affected Products: * SUSE Linux Enterprise Micro for Rancher 5.5 An update that can now be installed. ## Description: This update for elemental-toolkit contains the following fix: * Update to version 1.1.6: * Run KVM tests on ubuntu-latest * Install qemu in github workflow * Do not return error for efi.ReadLoadOption ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.5 zypper in -t patch SUSE-Elemental-5.5-2024-3588=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.5 (x86_64) * elemental-toolkit-1.1.6-150500.3.6.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 16:33:38 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 16:33:38 -0000 Subject: SUSE-SU-2024:3587-1: important: Security update for the Linux Kernel Message-ID: <172857801875.27570.6011172523905857008@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3587-1 Release Date: 2024-10-10T13:29:57Z Rating: important References: * bsc#1054914 * bsc#1065729 * bsc#1194869 * bsc#1199769 * bsc#1216223 * bsc#1220382 * bsc#1221610 * bsc#1221650 * bsc#1222629 * bsc#1222973 * bsc#1223600 * bsc#1223848 * bsc#1224085 * bsc#1225903 * bsc#1226003 * bsc#1226606 * bsc#1226631 * bsc#1226662 * bsc#1226666 * bsc#1226846 * bsc#1226860 * bsc#1226875 * bsc#1226915 * bsc#1227487 * bsc#1227726 * bsc#1227819 * bsc#1227832 * bsc#1227890 * bsc#1228507 * bsc#1228576 * bsc#1228620 * bsc#1228747 * bsc#1228771 * bsc#1229031 * bsc#1229034 * bsc#1229086 * bsc#1229156 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229364 * bsc#1229394 * bsc#1229429 * bsc#1229453 * bsc#1229572 * bsc#1229573 * bsc#1229585 * bsc#1229607 * bsc#1229619 * bsc#1229633 * bsc#1229662 * bsc#1229753 * bsc#1229764 * bsc#1229790 * bsc#1229810 * bsc#1229830 * bsc#1229891 * bsc#1229899 * bsc#1229928 * bsc#1229947 * bsc#1230015 * bsc#1230055 * bsc#1230129 * bsc#1230130 * bsc#1230170 * bsc#1230171 * bsc#1230174 * bsc#1230175 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230185 * bsc#1230192 * bsc#1230193 * bsc#1230194 * bsc#1230200 * bsc#1230204 * bsc#1230209 * bsc#1230211 * bsc#1230217 * bsc#1230224 * bsc#1230230 * bsc#1230233 * bsc#1230244 * bsc#1230245 * bsc#1230247 * bsc#1230248 * bsc#1230269 * bsc#1230289 * bsc#1230339 * bsc#1230340 * bsc#1230392 * bsc#1230398 * bsc#1230431 * bsc#1230433 * bsc#1230434 * bsc#1230440 * bsc#1230442 * bsc#1230444 * bsc#1230450 * bsc#1230451 * bsc#1230454 * bsc#1230506 * bsc#1230507 * bsc#1230511 * bsc#1230515 * bsc#1230517 * bsc#1230524 * bsc#1230533 * bsc#1230535 * bsc#1230549 * bsc#1230550 * bsc#1230556 * bsc#1230582 * bsc#1230589 * bsc#1230591 * bsc#1230592 * bsc#1230699 * bsc#1230700 * bsc#1230701 * bsc#1230702 * bsc#1230703 * bsc#1230705 * bsc#1230706 * bsc#1230709 * bsc#1230710 * bsc#1230711 * bsc#1230712 * bsc#1230719 * bsc#1230724 * bsc#1230725 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230733 * bsc#1230747 * bsc#1230748 * bsc#1230751 * bsc#1230752 * bsc#1230756 * bsc#1230761 * bsc#1230763 * bsc#1230766 * bsc#1230767 * bsc#1230768 * bsc#1230771 * bsc#1230774 * bsc#1230783 * bsc#1230786 * bsc#1230791 * bsc#1230794 * bsc#1230796 * bsc#1230802 * bsc#1230806 * bsc#1230808 * bsc#1230810 * bsc#1230812 * bsc#1230813 * bsc#1230814 * bsc#1230815 * bsc#1230821 * bsc#1230825 * bsc#1230830 * bsc#1231013 * bsc#1231017 * bsc#1231084 * bsc#1231085 * bsc#1231087 * bsc#1231115 * bsc#1231116 * bsc#1231120 * bsc#1231146 * bsc#1231180 * bsc#1231181 * bsc#1231277 * bsc#1231327 Cross-References: * CVE-2022-48901 * CVE-2022-48911 * CVE-2022-48923 * CVE-2022-48935 * CVE-2022-48944 * CVE-2022-48945 * CVE-2023-52610 * CVE-2023-52916 * CVE-2024-26640 * CVE-2024-26759 * CVE-2024-26767 * CVE-2024-26804 * CVE-2024-26837 * CVE-2024-37353 * CVE-2024-38538 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-40910 * CVE-2024-40973 * CVE-2024-40983 * CVE-2024-41062 * CVE-2024-41082 * CVE-2024-42154 * CVE-2024-42259 * CVE-2024-42265 * CVE-2024-42304 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43828 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43912 * CVE-2024-43914 * CVE-2024-44935 * CVE-2024-44944 * CVE-2024-44946 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44967 * CVE-2024-44969 * CVE-2024-44970 * CVE-2024-44971 * CVE-2024-44977 * CVE-2024-44982 * CVE-2024-44986 * CVE-2024-44987 * CVE-2024-44988 * CVE-2024-44989 * CVE-2024-44990 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45000 * CVE-2024-45001 * CVE-2024-45003 * CVE-2024-45006 * CVE-2024-45007 * CVE-2024-45008 * CVE-2024-45011 * CVE-2024-45013 * CVE-2024-45015 * CVE-2024-45018 * CVE-2024-45020 * CVE-2024-45021 * CVE-2024-45026 * CVE-2024-45028 * CVE-2024-45029 * CVE-2024-46673 * CVE-2024-46674 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46678 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46689 * CVE-2024-46694 * CVE-2024-46702 * CVE-2024-46707 * CVE-2024-46714 * CVE-2024-46715 * CVE-2024-46717 * CVE-2024-46720 * CVE-2024-46721 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46724 * CVE-2024-46725 * CVE-2024-46726 * CVE-2024-46728 * CVE-2024-46730 * CVE-2024-46731 * CVE-2024-46732 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46746 * CVE-2024-46747 * CVE-2024-46750 * CVE-2024-46751 * CVE-2024-46752 * CVE-2024-46753 * CVE-2024-46755 * CVE-2024-46756 * CVE-2024-46758 * CVE-2024-46759 * CVE-2024-46761 * CVE-2024-46770 * CVE-2024-46771 * CVE-2024-46773 * CVE-2024-46774 * CVE-2024-46775 * CVE-2024-46780 * CVE-2024-46781 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46786 * CVE-2024-46787 * CVE-2024-46791 * CVE-2024-46794 * CVE-2024-46798 * CVE-2024-46822 * CVE-2024-46826 * CVE-2024-46830 * CVE-2024-46854 * CVE-2024-46855 * CVE-2024-46857 CVSS scores: * CVE-2022-48901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48923 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48944 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48944 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-37353 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42259 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42259 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43912 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46724 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46747 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46752 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46756 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46756 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46758 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46758 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46786 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46794 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46798 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 132 vulnerabilities and has 44 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-48901: btrfs: do not start relocation until in progress drops are done (bsc#1229607). * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). * CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662) * CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619) * CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610). * CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269). * CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650). * CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340). * CVE-2024-26767: drm/amd/display: fixed integer types and null check locations (bsc#1230339). * CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629). * CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973). * CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875). * CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606). * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819). * CVE-2024-41062: Sync sock recv cb and release (bsc#1228576). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620 CVE-2024-41082). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42259: Fix Virtual Memory mapping boundaries calculation (bsc#1229156) * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830) * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810). * CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race (bsc#1230178). * CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209). * CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211). * CVE-2024-44986: ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230230) * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192). * CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193). * CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). * CVE-2024-45007: char: xillybus: Refine workqueue handling (bsc#1230175). * CVE-2024-45008: Input: MT - limit max slots (bsc#1230248). * CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442). * CVE-2024-45015: drm/msm/dpu: move dpu_encoder's connector assignment to (bsc#1230444) * CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe error path (bsc#1230507). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515) * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46689: soc: qcom: cmd-db: Map shared memory as WC, not WB (bsc#1230524) * CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589) * CVE-2024-46707: KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (bsc#1230582). * CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access (bsc#1230700). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46728: drm/amd/display: Check index for aux_rd_interval before using (bsc#1230703) * CVE-2024-46730: drm/amd/display: Ensure array index tg_inst won't be -1 (bsc#1230701) * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786). * CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115). * CVE-2024-46830: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (bsc#1231116). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085). * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087). The following non-security bugs were fixed: * ACPI: CPPC: Fix MASK_VAL() usage (git-fixes). * ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git- fixes). * ACPI: SBS: manage alarm sysfs attribute through psy core (git-fixes). * ACPI: battery: create alarm sysfs attribute atomically (git-fixes). * ACPI: processor: Fix memory leaks in error paths of processor_add() (stable- fixes). * ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes). * ACPI: sysfs: validate return type of _STR method (git-fixes). * ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes). * ALSA: hda/conexant: Mute speakers at suspend / shutdown (stable-fixes). * ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown (stable-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes). * ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes). * ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes). * ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes). * ASoC: meson: axg-card: fix 'use-after-free' (git-fixes). * ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes). * ASoC: tegra: Fix CBB error during probe() (git-fixes). * ASoC: topology: Properly initialize soc_enum values (stable-fixes). * ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes). * Bluetooth: L2CAP: Fix deadlock (git-fixes). * Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes). * Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes). * Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes). * Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git- fixes). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Drivers: hv: vmbus: Fix the misplaced function description (git-fixes). * HID: amd_sfh: free driver_data after destroying hid device (stable-fixes). * HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable- fixes). * IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes) * IB/hfi1: Fix potential deadlock on &irq_src_lock and &dd->uctxt_lock (git- fixes) * Input: ilitek_ts_i2c - add report id message validation (git-fixes). * Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes). * Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Input: uinput - reject requests with unreasonable number of slots (stable- fixes). * KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231277). * NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662). * NFS: Reduce use of uncached readdir (bsc#1226662). * NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726). * NFSD: Fix frame size warning in svc_export_parse() (git-fixes). * NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes). * NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes). * PCI/ASPM: Move pci_function_0() upward (bsc#1226915) * PCI/ASPM: Remove struct aspm_latency (bsc#1226915) * PCI/ASPM: Stop caching device L0s, L1 acceptable exit latencies (bsc#1226915) * PCI/ASPM: Stop caching link L0s, L1 exit latencies (bsc#1226915) * PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes). * PCI: Support BAR sizes up to 8TB (bsc#1231017) * PCI: Wait for Link before restoring Downstream Buses (git-fixes). * PCI: al: Check IORESOURCE_BUS existence during probe (git-fixes). * PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes). * PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes). * PCI: dwc: Restore MSI Receiver mask during resume (git-fixes). * PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable- fixes). * PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes). * PCI: xilinx-nwl: Fix register misspelling (git-fixes). * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/efa: Properly handle unexpected AQ completions (git-fixes) * RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes) * RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git- fixes) * RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes) * RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes) * RDMA/hns: Optimize hem allocation performance (git-fixes) * RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes) * RDMA/rtrs: Fix the problem of variable not initialized fully (git-fixes) * RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git- fixes) * Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes). * Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE" (git-fixes). * Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (git-fixes). * Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (stable-fixes). * Revert "mm, kmsan: fix infinite recursion due to RCU critical section". * Revert "mm/sparsemem: fix race in accessing memory_section->usage". * Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()". * Squashfs: sanity check symbolic link size (git-fixes). * USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes). * USB: serial: kobil_sct: restore initial terminal settings (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (git-fixes). * USB: usbtmc: prevent kernel-usb-infoleak (git-fixes). * VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes). * af_unix: Fix data races around sk->sk_shutdown (bsc#1226846). * af_unix: Fix data-races around sk->sk_shutdown (git-fixes). * af_unix: annotate lockless accesses to sk->sk_err (bsc#1226846). * apparmor: fix possible NULL pointer dereference (stable-fixes). * arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585) * arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585) * arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes). * arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git- fixes). * arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes). * arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git- fixes). * arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585) * arm64: tlb: Fix TLBI RANGE operand (bsc#1229585) * arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585) * ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes). * ata: pata_macio: Use WARN instead of BUG (stable-fixes). * blk-mq: Build default queue map via group_cpus_evenly() (bsc#1229031). * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: add number of queue calc helper (bsc#1229034). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * blk-mq: introduce blk_mq_dev_map_queues (bsc#1229034). * blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1229034). * blk-mq: use hk cpus only when isolcpus=io_queue is enabled (bsc#1229034). * cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231013). * cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231181). * can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes). * can: bcm: Remove proc entry when dev is unregistered (git-fixes). * can: j1939: use correct function name in comment (git-fixes). * can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git- fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231180). * char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git- fixes). * char: xillybus: Check USB endpoints when probing device (git-fixes). * clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes). * clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git- fixes). * clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes). * cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes). * crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes). * crypto: virtio - Handle dataq logic with tasklet (git-fixes). * crypto: virtio - Wait for tasklet to complete on device remove (git-fixes). * crypto: xor - fix template benchmarking (git-fixes). * devres: Initialize an uninitialized struct member (stable-fixes). * driver core: Add debug logs when fwnode links are added/deleted (git-fixes). * driver core: Add missing parameter description to __fwnode_link_add() (git- fixes). * driver core: Create __fwnode_link_del() helper function (git-fixes). * driver core: Set deferred probe reason when deferred by driver core (git- fixes). * driver core: fw_devlink: Allow marking a fwnode link as being part of a cycle (git-fixes). * driver core: fw_devlink: Consolidate device link flag computation (git- fixes). * drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes). * drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes). * drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes). * drm/amd/amdgpu: Check tbo resource pointer (stable-fixes). * drm/amd/amdgpu: Properly tune the size of struct (git-fixes). * drm/amd/display: Add array index check for hdcp ddc access (stable-fixes). * drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes). * drm/amd/display: Check HDCP returned status (stable-fixes). * drm/amd/display: Check denominator pbn_div before used (stable-fixes). * drm/amd/display: Check gpio_id before used as array index (stable-fixes). * drm/amd/display: Check msg_id before processing transcation (stable-fixes). * drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes). * drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes). * drm/amd/display: Ensure index calculation will not overflow (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes). * drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes). * drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable- fixes). * drm/amd/display: Spinlock before reading event (stable-fixes). * drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes). * drm/amd/display: added NULL check at start of dc_validate_stream (stable- fixes). * drm/amd/pm: Fix negative array index read (stable-fixes). * drm/amd/pm: check negtive return for table entries (stable-fixes). * drm/amd/pm: check specific index for aldebaran (stable-fixes). * drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable- fixes). * drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable- fixes). * drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes). * drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes). * drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable- fixes). * drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes). * drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes). * drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes). * drm/amdgpu: Fix out-of-bounds write warning (stable-fixes). * drm/amdgpu: Fix smatch static checker warning (stable-fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable- fixes). * drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes). * drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes). * drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes). * drm/amdgpu: fix a possible null pointer dereference (git-fixes). * drm/amdgpu: fix dereference after null check (stable-fixes). * drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix overflowed array index read warning (stable-fixes). * drm/amdgpu: fix the waring dereferencing hive (stable-fixes). * drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes). * drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes). * drm/amdgpu: update type of buf size to u32 for eeprom functions (stable- fixes). * drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes). * drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes). * drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes). * drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes). * drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git- fixes). * drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes). * drm/meson: plane: Add error handling (stable-fixes). * drm/msm/a5xx: disable preemption in submits by default (git-fixes). * drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes). * drm/msm/a5xx: properly clear preemption records on resume (git-fixes). * drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes). * drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes). * drm/msm/disp/dpu: use atomic enable/disable callbacks for encoder (bsc#1230444) * drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes). * drm/msm: fix %s null argument error (git-fixes). * drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git- fixes). * drm/radeon: fix null pointer dereference in radeon_add_common_modes (git- fixes). * drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git- fixes). * drm/rockchip: vop: Allow 4096px width scaling (git-fixes). * drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes). * drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes). * exfat: fix memory leak in exfat_load_bitmap() (git-fixes). * fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes). * filemap: remove use of wait bookmarks (bsc#1224085). * firmware_loader: Block path traversal (git-fixes). * fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230592). * fuse: update stats for pages in dropped aux writeback list (bsc#1230130). * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230129). * genirq/affinity: Do not pass irq_affinity_desc array to irq_build_affinity_masks (bsc#1229031). * genirq/affinity: Move group_cpus_evenly() into lib/ (bsc#1229031). * genirq/affinity: Only build SMP-only helper functions on SMP kernels (bsc#1229031). * genirq/affinity: Pass affinity managed mask array to irq_build_affinity_masks (bsc#1229031). * genirq/affinity: Remove the 'firstvec' parameter from irq_build_affinity_masks (bsc#1229031). * genirq/affinity: Rename irq_build_affinity_masks as group_cpus_evenly (bsc#1229031). * genirq/affinity: Replace cpumask_weight() with cpumask_empty() where appropriate (bsc#1229031). * gfs2: setattr_chown: Add missing initialization (git-fixes). * hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable- fixes). * hwmon: (max16065) Fix overflows seen when writing limits (git-fixes). * hwmon: (ntc_thermistor) fix module autoloading (git-fixes). * hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes). * hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git- fixes). * hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git- fixes). * hwrng: mtk - Use devm_pm_runtime_enable (git-fixes). * i2c: Fix conditional for substituting empty ACPI functions (stable-fixes). * i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes). * i2c: aspeed: Update the stop sw state when the bus recovery occurs (git- fixes). * i2c: isch: Add missed 'else' (git-fixes). * i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes). * i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable- fixes). * iio: adc: ad7124: fix chip ID mismatch (git-fixes). * iio: adc: ad7124: fix config comparison (git-fixes). * iio: adc: ad7606: fix oversampling gpio array (git-fixes). * iio: adc: ad7606: fix standby gpio state to match the documentation (git- fixes). * iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes). * iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git- fixes). * iio: fix scale application in iio_convert_raw_to_processed_unlocked (git- fixes). * iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes). * ipmi: docs: do not advertise deprecated sysfs entries (git-fixes). * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipmi:ssif: Improve detecting during probing (bsc#1228771) * jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes). * kABI, crypto: virtio - Handle dataq logic with tasklet (git-fixes). * kabi: add __nf_queue_get_refs() for kabi compliance. * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * lib/group_cpus.c: avoid acquiring cpu hotplug lock in group_cpus_evenly (bsc#1229031). * lib/group_cpus.c: honor housekeeping config when grouping CPUs (bsc#1229034). * lib/group_cpus: Export group_cpus_evenly() (bsc#1229031). * lirc: rc_dev_get_from_fd(): fix file leak (git-fixes). * mailbox: bcm2835: Fix timeout during suspend mode (git-fixes). * mailbox: rockchip: fix a typo in module autoloading (git-fixes). * media: Revert "media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()" (git-fixes). * media: aspeed: Fix no complete irq for non-64-aligned width (bsc#1230269) * media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes). * media: qcom: camss: Fix ordering of pm_runtime_enable (git-fixes). * media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes). * media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes). * media: uvcvideo: Enforce alignment of frame and interval (stable-fixes). * media: venus: fix use after free bug in venus_remove due to race condition (git-fixes). * media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes). * media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes). * media: vivid: fix wrong sizeimage value for mplane (stable-fixes). * mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes). * mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes). * mmc: sdhci-of-aspeed: fix module autoloading (git-fixes). * mtd: powernv: Add check devm_kasprintf() returned value (git-fixes). * mtd: slram: insert break after errors in parsing the map (git-fixes). * net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891). * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289). * net: missing check virtio (git-fixes). * net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes). * nf_conntrack_proto_udp: do not accept packets with IPS_NAT_CLASH (bsc#1199769). * nilfs2: Constify struct kobj_type (git-fixes). * nilfs2: determine empty node blocks as corrupted (git-fixes). * nilfs2: fix missing cleanup on rollforward recovery error (git-fixes). * nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes). * nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes). * nilfs2: fix state management in error path of log writing function (git- fixes). * nilfs2: protect references to superblock parameters exposed in sysfs (git- fixes). * nilfs2: replace snprintf in show functions with sysfs_emit (git-fixes). * nilfs2: use default_groups in kobj_type (git-fixes). * nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes). * nvme-pci: use block layer helpers to calculate num of queues (bsc#1229034). * nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes). * nvme: move stopping keep-alive into nvme_uninit_ctrl() (git-fixes). * nvme: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034). * nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes). * nvmet-tcp: do not continue for invalid icreq (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet-trace: avoid dereferencing pointer too early (git-fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes). * pcmcia: Use resource_size function on resource object (stable-fixes). * pinctrl: single: fix missing error code in pcs_probe() (git-fixes). * pinctrl: single: fix potential NULL dereference in pcs_get_function() (git- fixes). * platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes). * platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes). * platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git- fixes). * power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes). * power: supply: axp20x_battery: Remove design from min and max voltage (git- fixes). * power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes). * power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes). * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869). * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869). * powerpc/boot: Only free if realloc() succeeds (bsc#1194869). * powerpc/code-patching: Add generic memory patching (bsc#1194869). * powerpc/code-patching: Consolidate and cache per-cpu patching context (bsc#1194869). * powerpc/code-patching: Do not call is_vmalloc_or_module_addr() without CONFIG_MODULES (bsc#1194869). * powerpc/code-patching: Fix error handling in do_patch_instruction() (bsc#1194869). * powerpc/code-patching: Fix oops with DEBUG_VM enabled (bsc#1194869). * powerpc/code-patching: Fix unmap_patch_area() error handling (bsc#1194869). * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869). * powerpc/code-patching: Pre-map patch area (bsc#1194869). * powerpc/code-patching: Remove #ifdef CONFIG_STRICT_KERNEL_RWX (bsc#1194869). * powerpc/code-patching: Remove pr_debug()/pr_devel() messages and fix check() (bsc#1194869). * powerpc/code-patching: Reorganise do_patch_instruction() to ease error handling (bsc#1194869). * powerpc/code-patching: Speed up page mapping/unmapping (bsc#1194869). * powerpc/code-patching: Use WARN_ON and fix check in poking_init (bsc#1194869). * powerpc/code-patching: Use jump_label to check if poking_init() is done (bsc#1194869). * powerpc/code-patching: Use temporary mm for Radix MMU (bsc#1194869). * powerpc/code-patching: introduce patch_instructions() (bsc#1194869). * powerpc/ftrace: Use patch_instruction() return directly (bsc#1194869). * powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git- fixes). * powerpc/imc-pmu: Use the correct spinlock initializer (bsc#1054914 git- fixes). * powerpc/inst: Refactor ___get_user_instr() (bsc#1194869). * powerpc/lib: Add __init attribute to eligible functions (bsc#1194869). * powerpc/tlb: Add local flush for page given mm_struct and psize (bsc#1194869). * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869). * powerpc/vdso: Merge vdso64 and vdso32 into a single directory (bsc#1194869). * powerpc/vdso: Rework VDSO32 makefile to add a prefix to object files (bsc#1194869). * powerpc/vdso: augment VDSO32 functions to support 64 bits build (bsc#1194869). * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * powerpc: Allow clearing and restoring registers independent of saved breakpoint state (bsc#1194869). * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631). * rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full (bsc#1231327) * rtc: at91sam9: fix OF node leak in probe() error path (git-fixes). * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747). * sched/isolation: Prevent boot crash when the boot CPU is (bsc#1231327) * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055). * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429). * scsi: lpfc: Fix overflow build issue (bsc#1229429). * scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429). * scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429). * scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429). * scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429). * scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429). * scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429). * scsi: pm8001: do not overwrite PCI queue mapping (bsc#1229034). * scsi: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034). * scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848). * scsi: use block layer helpers to calculate num of queues (bsc#1229034). * spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes). * staging: iio: frequency: ad9834: Validate frequency parameter value (git- fixes). * thunderbolt: Mark XDomain as unplugged when router is removed (stable- fixes). * tomoyo: fallback to realpath if symlink's pathname does not exist (git- fixes). * tools/virtio: fix build (git-fixes). * tpm: Clean up TPM space after command failure (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes). * udp: fix receiving fraglist GSO packets (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usb: cdnsp: Fix incorrect usb_request status (git-fixes). * usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes). * usb: dwc2: drd: fix clock gating on USB role switch (git-fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (git- fixes). * usb: dwc3: core: Skip setting event buffers for host only controllers (git- fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (git-fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes). * usb: dwc3: omap: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes). * usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes). * usb: uas: set host status byte on data completion error (git-fixes). * usb: uas: set host status byte on data completion error (stable-fixes). * usb: xhci: fix loss of data on Cadence xHC (git-fixes). * usbip: Do not submit special requests twice (stable-fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * usbnet: ipheth: race between ipheth_close and error handling (git-fixes). * usbnet: modern method to get random MAC (git-fixes). * vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes). * vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes). * virito: add APIs for retrieving vq affinity (bsc#1229034). * virtio-blk: Ensure no requests in virtqueues before deleting vqs (git- fixes). * virtio/vsock: fix logic which reduces credit update messages (git-fixes). * virtio: blk/scs: replace blk_mq_virtio_map_queues with blk_mq_dev_map_queues (bsc#1229034). * virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1229034). * virtio: reenable config if freezing device failed (git-fixes). * virtio_net: Fix "'%d' directive writing between 1 and 11 bytes into a region of size 10" warnings (git-fixes). * virtio_net: checksum offloading handling fix (git-fixes). * virtio_net: use u64_stats_t infra to avoid data-races (git-fixes). * virtiofs: forbid newlines in tags (bsc#1230591). * vsock/virtio: add support for device suspend/resume (git-fixes). * vsock/virtio: factor our the code to initialize and delete VQs (git-fixes). * vsock/virtio: initialize the_virtio_vsock before using VQs (git-fixes). * vsock/virtio: remove socket from connected/bound list on shutdown (git- fixes). * watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes). * wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes). * wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes). * wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git- fixes). * wifi: iwlwifi: mvm: increase the time between ranging measurements (git- fixes). * wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git- fixes). * wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git- fixes). * wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes). * wifi: rtw88: 8822c: Fix reported RX band width (git-fixes). * wifi: rtw88: always wait for both firmware loading attempts (git-fixes). * wifi: rtw88: remove CPT execution branch never used (git-fixes). * wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes). * workqueue: Avoid using isolated cpus' timers on (bsc#1231327) * workqueue: mark power efficient workqueue as unbounded if (bsc#1231327) * x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes). * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). * x86/xen: Convert comma to semicolon (git-fixes). * xen/swiotlb: add alignment check for dma buffers (bsc#1229928). * xen/swiotlb: fix allocated size (git-fixes). * xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003). * xen: allow mapping ACPI data using a different physical address (bsc#1226003). * xen: introduce generic helper checking for memory map conflicts (bsc#1226003). * xen: move checks for e820 conflicts further up (bsc#1226003). * xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003). * xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003). * xen: use correct end address of kernel for conflict checking (bsc#1226003). * xfs: do not include bnobt blocks when reserving free block pool (git-fixes). * xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git- fixes). * xz: cleanup CRC32 edits from 2018 (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3587=1 openSUSE-SLE-15.5-2024-3587=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-3587=1 ## Package List: * openSUSE Leap 15.5 (aarch64 x86_64) * kselftests-kmp-azure-debuginfo-5.14.21-150500.33.69.1 * reiserfs-kmp-azure-5.14.21-150500.33.69.1 * kernel-azure-devel-5.14.21-150500.33.69.1 * kernel-azure-optional-debuginfo-5.14.21-150500.33.69.1 * kernel-azure-extra-5.14.21-150500.33.69.1 * gfs2-kmp-azure-debuginfo-5.14.21-150500.33.69.1 * reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.69.1 * cluster-md-kmp-azure-5.14.21-150500.33.69.1 * kernel-azure-debugsource-5.14.21-150500.33.69.1 * cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.69.1 * dlm-kmp-azure-debuginfo-5.14.21-150500.33.69.1 * ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.69.1 * kernel-azure-devel-debuginfo-5.14.21-150500.33.69.1 * ocfs2-kmp-azure-5.14.21-150500.33.69.1 * gfs2-kmp-azure-5.14.21-150500.33.69.1 * dlm-kmp-azure-5.14.21-150500.33.69.1 * kernel-azure-livepatch-devel-5.14.21-150500.33.69.1 * kernel-syms-azure-5.14.21-150500.33.69.1 * kernel-azure-debuginfo-5.14.21-150500.33.69.1 * kernel-azure-extra-debuginfo-5.14.21-150500.33.69.1 * kernel-azure-optional-5.14.21-150500.33.69.1 * kselftests-kmp-azure-5.14.21-150500.33.69.1 * openSUSE Leap 15.5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.69.1 * openSUSE Leap 15.5 (x86_64) * kernel-azure-vdso-5.14.21-150500.33.69.1 * kernel-azure-vdso-debuginfo-5.14.21-150500.33.69.1 * openSUSE Leap 15.5 (noarch) * kernel-source-azure-5.14.21-150500.33.69.1 * kernel-devel-azure-5.14.21-150500.33.69.1 * Public Cloud Module 15-SP5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.69.1 * Public Cloud Module 15-SP5 (aarch64 x86_64) * kernel-syms-azure-5.14.21-150500.33.69.1 * kernel-azure-devel-5.14.21-150500.33.69.1 * kernel-azure-debuginfo-5.14.21-150500.33.69.1 * kernel-azure-debugsource-5.14.21-150500.33.69.1 * kernel-azure-devel-debuginfo-5.14.21-150500.33.69.1 * Public Cloud Module 15-SP5 (noarch) * kernel-source-azure-5.14.21-150500.33.69.1 * kernel-devel-azure-5.14.21-150500.33.69.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48901.html * https://www.suse.com/security/cve/CVE-2022-48911.html * https://www.suse.com/security/cve/CVE-2022-48923.html * https://www.suse.com/security/cve/CVE-2022-48935.html * https://www.suse.com/security/cve/CVE-2022-48944.html * https://www.suse.com/security/cve/CVE-2022-48945.html * https://www.suse.com/security/cve/CVE-2023-52610.html * https://www.suse.com/security/cve/CVE-2023-52916.html * https://www.suse.com/security/cve/CVE-2024-26640.html * https://www.suse.com/security/cve/CVE-2024-26759.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-26837.html * https://www.suse.com/security/cve/CVE-2024-37353.html * https://www.suse.com/security/cve/CVE-2024-38538.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-40910.html * https://www.suse.com/security/cve/CVE-2024-40973.html * https://www.suse.com/security/cve/CVE-2024-40983.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42259.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42304.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43828.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43912.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44935.html * https://www.suse.com/security/cve/CVE-2024-44944.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44967.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44970.html * https://www.suse.com/security/cve/CVE-2024-44971.html * https://www.suse.com/security/cve/CVE-2024-44977.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44986.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44988.html * https://www.suse.com/security/cve/CVE-2024-44989.html * https://www.suse.com/security/cve/CVE-2024-44990.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45000.html * https://www.suse.com/security/cve/CVE-2024-45001.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45006.html * https://www.suse.com/security/cve/CVE-2024-45007.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-45011.html * https://www.suse.com/security/cve/CVE-2024-45013.html * https://www.suse.com/security/cve/CVE-2024-45015.html * https://www.suse.com/security/cve/CVE-2024-45018.html * https://www.suse.com/security/cve/CVE-2024-45020.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-45028.html * https://www.suse.com/security/cve/CVE-2024-45029.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46678.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46689.html * https://www.suse.com/security/cve/CVE-2024-46694.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46714.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46717.html * https://www.suse.com/security/cve/CVE-2024-46720.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46724.html * https://www.suse.com/security/cve/CVE-2024-46725.html * https://www.suse.com/security/cve/CVE-2024-46726.html * https://www.suse.com/security/cve/CVE-2024-46728.html * https://www.suse.com/security/cve/CVE-2024-46730.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46732.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46746.html * https://www.suse.com/security/cve/CVE-2024-46747.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46751.html * https://www.suse.com/security/cve/CVE-2024-46752.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46755.html * https://www.suse.com/security/cve/CVE-2024-46756.html * https://www.suse.com/security/cve/CVE-2024-46758.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46771.html * https://www.suse.com/security/cve/CVE-2024-46773.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46775.html * https://www.suse.com/security/cve/CVE-2024-46780.html * https://www.suse.com/security/cve/CVE-2024-46781.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46786.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46791.html * https://www.suse.com/security/cve/CVE-2024-46794.html * https://www.suse.com/security/cve/CVE-2024-46798.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://www.suse.com/security/cve/CVE-2024-46826.html * https://www.suse.com/security/cve/CVE-2024-46830.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46855.html * https://www.suse.com/security/cve/CVE-2024-46857.html * https://bugzilla.suse.com/show_bug.cgi?id=1054914 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1199769 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221610 * https://bugzilla.suse.com/show_bug.cgi?id=1221650 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1222973 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1224085 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226606 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226662 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1226875 * https://bugzilla.suse.com/show_bug.cgi?id=1226915 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227819 * https://bugzilla.suse.com/show_bug.cgi?id=1227832 * https://bugzilla.suse.com/show_bug.cgi?id=1227890 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228576 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228747 * https://bugzilla.suse.com/show_bug.cgi?id=1228771 * https://bugzilla.suse.com/show_bug.cgi?id=1229031 * https://bugzilla.suse.com/show_bug.cgi?id=1229034 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229156 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229364 * https://bugzilla.suse.com/show_bug.cgi?id=1229394 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229453 * https://bugzilla.suse.com/show_bug.cgi?id=1229572 * https://bugzilla.suse.com/show_bug.cgi?id=1229573 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229607 * https://bugzilla.suse.com/show_bug.cgi?id=1229619 * https://bugzilla.suse.com/show_bug.cgi?id=1229633 * https://bugzilla.suse.com/show_bug.cgi?id=1229662 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229810 * https://bugzilla.suse.com/show_bug.cgi?id=1229830 * https://bugzilla.suse.com/show_bug.cgi?id=1229891 * https://bugzilla.suse.com/show_bug.cgi?id=1229899 * https://bugzilla.suse.com/show_bug.cgi?id=1229928 * https://bugzilla.suse.com/show_bug.cgi?id=1229947 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230129 * https://bugzilla.suse.com/show_bug.cgi?id=1230130 * https://bugzilla.suse.com/show_bug.cgi?id=1230170 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230175 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230192 * https://bugzilla.suse.com/show_bug.cgi?id=1230193 * https://bugzilla.suse.com/show_bug.cgi?id=1230194 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230209 * https://bugzilla.suse.com/show_bug.cgi?id=1230211 * https://bugzilla.suse.com/show_bug.cgi?id=1230217 * https://bugzilla.suse.com/show_bug.cgi?id=1230224 * https://bugzilla.suse.com/show_bug.cgi?id=1230230 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230244 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230247 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230269 * https://bugzilla.suse.com/show_bug.cgi?id=1230289 * https://bugzilla.suse.com/show_bug.cgi?id=1230339 * https://bugzilla.suse.com/show_bug.cgi?id=1230340 * https://bugzilla.suse.com/show_bug.cgi?id=1230392 * https://bugzilla.suse.com/show_bug.cgi?id=1230398 * https://bugzilla.suse.com/show_bug.cgi?id=1230431 * https://bugzilla.suse.com/show_bug.cgi?id=1230433 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230440 * https://bugzilla.suse.com/show_bug.cgi?id=1230442 * https://bugzilla.suse.com/show_bug.cgi?id=1230444 * https://bugzilla.suse.com/show_bug.cgi?id=1230450 * https://bugzilla.suse.com/show_bug.cgi?id=1230451 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230511 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230524 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230550 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230591 * https://bugzilla.suse.com/show_bug.cgi?id=1230592 * https://bugzilla.suse.com/show_bug.cgi?id=1230699 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230701 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230703 * https://bugzilla.suse.com/show_bug.cgi?id=1230705 * https://bugzilla.suse.com/show_bug.cgi?id=1230706 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230711 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230719 * https://bugzilla.suse.com/show_bug.cgi?id=1230724 * https://bugzilla.suse.com/show_bug.cgi?id=1230725 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230751 * https://bugzilla.suse.com/show_bug.cgi?id=1230752 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230766 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230768 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230774 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230786 * https://bugzilla.suse.com/show_bug.cgi?id=1230791 * https://bugzilla.suse.com/show_bug.cgi?id=1230794 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230802 * https://bugzilla.suse.com/show_bug.cgi?id=1230806 * https://bugzilla.suse.com/show_bug.cgi?id=1230808 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230812 * https://bugzilla.suse.com/show_bug.cgi?id=1230813 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230821 * https://bugzilla.suse.com/show_bug.cgi?id=1230825 * https://bugzilla.suse.com/show_bug.cgi?id=1230830 * https://bugzilla.suse.com/show_bug.cgi?id=1231013 * https://bugzilla.suse.com/show_bug.cgi?id=1231017 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231085 * https://bugzilla.suse.com/show_bug.cgi?id=1231087 * https://bugzilla.suse.com/show_bug.cgi?id=1231115 * https://bugzilla.suse.com/show_bug.cgi?id=1231116 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231180 * https://bugzilla.suse.com/show_bug.cgi?id=1231181 * https://bugzilla.suse.com/show_bug.cgi?id=1231277 * https://bugzilla.suse.com/show_bug.cgi?id=1231327 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 20:32:05 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 20:32:05 -0000 Subject: SUSE-SU-2024:3592-1: important: Security update for the Linux Kernel Message-ID: <172859232587.7152.11553557436062277303@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3592-1 Release Date: 2024-10-10T16:03:56Z Rating: important References: * bsc#1199769 * bsc#1216223 * bsc#1220382 * bsc#1221610 * bsc#1221650 * bsc#1222629 * bsc#1222973 * bsc#1223600 * bsc#1223848 * bsc#1224085 * bsc#1225903 * bsc#1226003 * bsc#1226606 * bsc#1226662 * bsc#1226666 * bsc#1226846 * bsc#1226860 * bsc#1226875 * bsc#1226915 * bsc#1227487 * bsc#1227726 * bsc#1227819 * bsc#1227832 * bsc#1227890 * bsc#1228507 * bsc#1228576 * bsc#1228620 * bsc#1228771 * bsc#1229031 * bsc#1229034 * bsc#1229086 * bsc#1229156 * bsc#1229289 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229364 * bsc#1229394 * bsc#1229429 * bsc#1229453 * bsc#1229572 * bsc#1229573 * bsc#1229585 * bsc#1229607 * bsc#1229619 * bsc#1229633 * bsc#1229662 * bsc#1229753 * bsc#1229764 * bsc#1229790 * bsc#1229810 * bsc#1229830 * bsc#1229899 * bsc#1229928 * bsc#1229947 * bsc#1230015 * bsc#1230129 * bsc#1230130 * bsc#1230170 * bsc#1230171 * bsc#1230174 * bsc#1230175 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230185 * bsc#1230192 * bsc#1230193 * bsc#1230194 * bsc#1230200 * bsc#1230204 * bsc#1230209 * bsc#1230211 * bsc#1230212 * bsc#1230217 * bsc#1230224 * bsc#1230230 * bsc#1230233 * bsc#1230244 * bsc#1230245 * bsc#1230247 * bsc#1230248 * bsc#1230269 * bsc#1230339 * bsc#1230340 * bsc#1230392 * bsc#1230398 * bsc#1230431 * bsc#1230433 * bsc#1230434 * bsc#1230440 * bsc#1230442 * bsc#1230444 * bsc#1230450 * bsc#1230451 * bsc#1230454 * bsc#1230506 * bsc#1230507 * bsc#1230511 * bsc#1230515 * bsc#1230517 * bsc#1230524 * bsc#1230533 * bsc#1230535 * bsc#1230549 * bsc#1230556 * bsc#1230582 * bsc#1230589 * bsc#1230591 * bsc#1230592 * bsc#1230699 * bsc#1230700 * bsc#1230701 * bsc#1230702 * bsc#1230703 * bsc#1230705 * bsc#1230706 * bsc#1230707 * bsc#1230709 * bsc#1230710 * bsc#1230711 * bsc#1230712 * bsc#1230719 * bsc#1230724 * bsc#1230725 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230733 * bsc#1230747 * bsc#1230748 * bsc#1230751 * bsc#1230752 * bsc#1230756 * bsc#1230761 * bsc#1230766 * bsc#1230767 * bsc#1230768 * bsc#1230771 * bsc#1230772 * bsc#1230776 * bsc#1230783 * bsc#1230786 * bsc#1230791 * bsc#1230794 * bsc#1230796 * bsc#1230802 * bsc#1230806 * bsc#1230808 * bsc#1230810 * bsc#1230812 * bsc#1230813 * bsc#1230814 * bsc#1230815 * bsc#1230821 * bsc#1230825 * bsc#1230830 * bsc#1231013 * bsc#1231017 * bsc#1231116 * bsc#1231120 * bsc#1231146 * bsc#1231180 * bsc#1231181 Cross-References: * CVE-2022-48901 * CVE-2022-48911 * CVE-2022-48923 * CVE-2022-48935 * CVE-2022-48944 * CVE-2022-48945 * CVE-2023-52610 * CVE-2023-52916 * CVE-2024-26640 * CVE-2024-26759 * CVE-2024-26767 * CVE-2024-26804 * CVE-2024-26837 * CVE-2024-37353 * CVE-2024-38538 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-40910 * CVE-2024-40973 * CVE-2024-40983 * CVE-2024-41062 * CVE-2024-41082 * CVE-2024-42154 * CVE-2024-42259 * CVE-2024-42265 * CVE-2024-42304 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43828 * CVE-2024-43835 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43912 * CVE-2024-43914 * CVE-2024-44935 * CVE-2024-44944 * CVE-2024-44946 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44967 * CVE-2024-44969 * CVE-2024-44970 * CVE-2024-44971 * CVE-2024-44972 * CVE-2024-44977 * CVE-2024-44982 * CVE-2024-44986 * CVE-2024-44987 * CVE-2024-44988 * CVE-2024-44989 * CVE-2024-44990 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45000 * CVE-2024-45001 * CVE-2024-45003 * CVE-2024-45006 * CVE-2024-45007 * CVE-2024-45008 * CVE-2024-45011 * CVE-2024-45013 * CVE-2024-45015 * CVE-2024-45018 * CVE-2024-45020 * CVE-2024-45021 * CVE-2024-45026 * CVE-2024-45028 * CVE-2024-45029 * CVE-2024-46673 * CVE-2024-46674 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46689 * CVE-2024-46694 * CVE-2024-46702 * CVE-2024-46707 * CVE-2024-46714 * CVE-2024-46715 * CVE-2024-46717 * CVE-2024-46720 * CVE-2024-46721 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46724 * CVE-2024-46725 * CVE-2024-46726 * CVE-2024-46727 * CVE-2024-46728 * CVE-2024-46730 * CVE-2024-46731 * CVE-2024-46732 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46746 * CVE-2024-46747 * CVE-2024-46750 * CVE-2024-46751 * CVE-2024-46752 * CVE-2024-46753 * CVE-2024-46755 * CVE-2024-46756 * CVE-2024-46758 * CVE-2024-46759 * CVE-2024-46761 * CVE-2024-46771 * CVE-2024-46772 * CVE-2024-46773 * CVE-2024-46774 * CVE-2024-46778 * CVE-2024-46780 * CVE-2024-46781 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46786 * CVE-2024-46787 * CVE-2024-46791 * CVE-2024-46794 * CVE-2024-46798 * CVE-2024-46822 * CVE-2024-46830 CVSS scores: * CVE-2022-48901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48923 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48944 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48944 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-37353 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42259 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42259 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43912 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44988 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46724 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46747 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46752 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46756 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46756 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46758 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46758 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46786 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46794 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46798 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Real Time Module 15-SP5 An update that solves 130 vulnerabilities and has 34 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-48901: btrfs: do not start relocation until in progress drops are done (bsc#1229607). * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). * CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662) * CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619) * CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610). * CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269). * CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650). * CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340). * CVE-2024-26767: drm/amd/display: fixed integer types and null check locations (bsc#1230339). * CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629). * CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973). * CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875). * CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606). * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819). * CVE-2024-41062: Sync sock recv cb and release (bsc#1228576). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620 CVE-2024-41082). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42259: Fix Virtual Memory mapping boundaries calculation (bsc#1229156) * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830) * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810). * CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race (bsc#1230178). * CVE-2024-44954: ALSA: line6: Fix racy access to midibuf (bsc#1230176). * CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209). * CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211). * CVE-2024-44986: ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230230) * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192). * CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193). * CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). * CVE-2024-45007: char: xillybus: Refine workqueue handling (bsc#1230175). * CVE-2024-45008: Input: MT - limit max slots (bsc#1230248). * CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442). * CVE-2024-45015: drm/msm/dpu: move dpu_encoder's connector assignment to (bsc#1230444) * CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe error path (bsc#1230507). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515) * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46689: soc: qcom: cmd-db: Map shared memory as WC, not WB (bsc#1230524) * CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589) * CVE-2024-46707: KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (bsc#1230582). * CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access (bsc#1230700). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46728: drm/amd/display: Check index for aux_rd_interval before using (bsc#1230703) * CVE-2024-46730: drm/amd/display: Ensure array index tg_inst won't be -1 (bsc#1230701) * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46750: PCI: Add missing bridge lock to pci_bus_lock() (bsc#1230783). * CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786). * CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). * CVE-2024-46830: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (bsc#1231116). The following non-security bugs were fixed: * ACPI: battery: create alarm sysfs attribute atomically (git-fixes). * ACPI: CPPC: Fix MASK_VAL() usage (git-fixes). * ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git- fixes). * ACPI: processor: Fix memory leaks in error paths of processor_add() (stable- fixes). * ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes). * ACPI: SBS: manage alarm sysfs attribute through psy core (git-fixes). * ACPI: sysfs: validate return type of _STR method (git-fixes). * af_unix: annotate lockless accesses to sk->sk_err (bsc#1226846). * af_unix: Fix data races around sk->sk_shutdown (bsc#1226846). * af_unix: Fix data-races around sk->sk_shutdown (git-fixes). * ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes). * ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes). * ALSA: hda/conexant: Mute speakers at suspend / shutdown (stable-fixes). * ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown (stable-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes). * apparmor: fix possible NULL pointer dereference (stable-fixes). * arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes). * arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git- fixes). * arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git- fixes). * arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes). * arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585) * arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585) * arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585) * arm64: tlb: Fix TLBI RANGE operand (bsc#1229585) * arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585) * ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes). * ASoC: meson: axg-card: fix 'use-after-free' (git-fixes). * ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes). * ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes). * ASoC: tegra: Fix CBB error during probe() (git-fixes). * ASoC: topology: Properly initialize soc_enum values (stable-fixes). * ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes). * ata: pata_macio: Use WARN instead of BUG (stable-fixes). * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: add number of queue calc helper (bsc#1229034). * blk-mq: Build default queue map via group_cpus_evenly() (bsc#1229031). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * blk-mq: introduce blk_mq_dev_map_queues (bsc#1229034). * blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1229034). * blk-mq: use hk cpus only when isolcpus=io_queue is enabled (bsc#1229034). * Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes). * Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes). * Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git- fixes). * Bluetooth: L2CAP: Fix deadlock (git-fixes). * Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes). * cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231181). * cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231013). * can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes). * can: bcm: Remove proc entry when dev is unregistered (git-fixes). * can: j1939: use correct function name in comment (git-fixes). * can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git- fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231180). * char: xillybus: Check USB endpoints when probing device (git-fixes). * clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes). * clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git- fixes). * clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes). * cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes). * crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes). * crypto: virtio - Handle dataq logic with tasklet (git-fixes). * crypto: virtio - Wait for tasklet to complete on device remove (git-fixes). * crypto: xor - fix template benchmarking (git-fixes). * devres: Initialize an uninitialized struct member (stable-fixes). * driver core: Add debug logs when fwnode links are added/deleted (git-fixes). * driver core: Add missing parameter description to __fwnode_link_add() (git- fixes). * driver core: Create __fwnode_link_del() helper function (git-fixes). * driver core: fw_devlink: Allow marking a fwnode link as being part of a cycle (git-fixes). * driver core: fw_devlink: Consolidate device link flag computation (git- fixes). * driver core: Set deferred probe reason when deferred by driver core (git- fixes). * drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Drivers: hv: vmbus: Fix the misplaced function description (git-fixes). * drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes). * drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes). * drm/amd/amdgpu: Check tbo resource pointer (stable-fixes). * drm/amd/amdgpu: Properly tune the size of struct (git-fixes). * drm/amd/display: Add array index check for hdcp ddc access (stable-fixes). * drm/amd/display: added NULL check at start of dc_validate_stream (stable- fixes). * drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes). * drm/amd/display: Check denominator pbn_div before used (stable-fixes). * drm/amd/display: Check gpio_id before used as array index (stable-fixes). * drm/amd/display: Check HDCP returned status (stable-fixes). * drm/amd/display: Check msg_id before processing transcation (stable-fixes). * drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes). * drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes). * drm/amd/display: Ensure index calculation will not overflow (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes). * drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes). * drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable- fixes). * drm/amd/display: Spinlock before reading event (stable-fixes). * drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes). * drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes). * drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes). * drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes). * drm/amdgpu: fix a possible null pointer dereference (git-fixes). * drm/amdgpu: fix dereference after null check (stable-fixes). * drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes). * drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes). * drm/amdgpu: Fix out-of-bounds write warning (stable-fixes). * drm/amdgpu: fix overflowed array index read warning (stable-fixes). * drm/amdgpu: Fix smatch static checker warning (stable-fixes). * drm/amdgpu: fix the waring dereferencing hive (stable-fixes). * drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable- fixes). * drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes). * drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable- fixes). * drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes). * drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes). * drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes). * drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes). * drm/amdgpu: update type of buf size to u32 for eeprom functions (stable- fixes). * drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes). * drm/amd/pm: check negtive return for table entries (stable-fixes). * drm/amd/pm: check specific index for aldebaran (stable-fixes). * drm/amd/pm: Fix negative array index read (stable-fixes). * drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable- fixes). * drm/amd/pm: fix uninitialized variable warning (stable-fixes). * drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable- fixes). * drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes). * drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes). * drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes). * drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git- fixes). * drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes). * drm/meson: plane: Add error handling (stable-fixes). * drm/msm/a5xx: disable preemption in submits by default (git-fixes). * drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes). * drm/msm/a5xx: properly clear preemption records on resume (git-fixes). * drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes). * drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes). * drm/msm/disp/dpu: use atomic enable/disable callbacks for encoder (bsc#1230444) * drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes). * drm/msm: fix %s null argument error (git-fixes). * drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes). * drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git- fixes). * drm/radeon: fix null pointer dereference in radeon_add_common_modes (git- fixes). * drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git- fixes). * drm/rockchip: vop: Allow 4096px width scaling (git-fixes). * drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes). * exfat: fix memory leak in exfat_load_bitmap() (git-fixes). * fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes). * filemap: remove use of wait bookmarks (bsc#1224085). * firmware_loader: Block path traversal (git-fixes). * fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230592). * fuse: update stats for pages in dropped aux writeback list (bsc#1230130). * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230129). * genirq/affinity: Do not pass irq_affinity_desc array to irq_build_affinity_masks (bsc#1229031). * genirq/affinity: Move group_cpus_evenly() into lib/ (bsc#1229031). * genirq/affinity: Only build SMP-only helper functions on SMP kernels (bsc#1229031). * genirq/affinity: Pass affinity managed mask array to irq_build_affinity_masks (bsc#1229031). * genirq/affinity: Remove the 'firstvec' parameter from irq_build_affinity_masks (bsc#1229031). * genirq/affinity: Rename irq_build_affinity_masks as group_cpus_evenly (bsc#1229031). * genirq/affinity: Replace cpumask_weight() with cpumask_empty() where appropriate (bsc#1229031). * gfs2: setattr_chown: Add missing initialization (git-fixes). * HID: amd_sfh: free driver_data after destroying hid device (stable-fixes). * HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable- fixes). * hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable- fixes). * hwmon: (max16065) Fix overflows seen when writing limits (git-fixes). * hwmon: (ntc_thermistor) fix module autoloading (git-fixes). * hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes). * hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git- fixes). * hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git- fixes). * hwrng: mtk - Use devm_pm_runtime_enable (git-fixes). * i2c: aspeed: Update the stop sw state when the bus recovery occurs (git- fixes). * i2c: Fix conditional for substituting empty ACPI functions (stable-fixes). * i2c: isch: Add missed 'else' (git-fixes). * i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes). * i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes). * i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable- fixes). * IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes) * IB/hfi1: Fix potential deadlock on &irq_src_lock and &dd->uctxt_lock (git- fixes) * iio: adc: ad7124: fix chip ID mismatch (git-fixes). * iio: adc: ad7124: fix config comparison (git-fixes). * iio: adc: ad7606: fix oversampling gpio array (git-fixes). * iio: adc: ad7606: fix standby gpio state to match the documentation (git- fixes). * iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes). * iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git- fixes). * iio: fix scale application in iio_convert_raw_to_processed_unlocked (git- fixes). * iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes). * Input: ilitek_ts_i2c - add report id message validation (git-fixes). * Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes). * Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Input: uinput - reject requests with unreasonable number of slots (stable- fixes). * ipmi: docs: do not advertise deprecated sysfs entries (git-fixes). * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipmi:ssif: Improve detecting during probing (bsc#1228771) * jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes). * kabi: add __nf_queue_get_refs() for kabi compliance. * kABI, crypto: virtio - Handle dataq logic with tasklet (git-fixes). * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * lib/group_cpus.c: avoid acquiring cpu hotplug lock in group_cpus_evenly (bsc#1229031). * lib/group_cpus.c: honor housekeeping config when grouping CPUs (bsc#1229034). * lib/group_cpus: Export group_cpus_evenly() (bsc#1229031). * lirc: rc_dev_get_from_fd(): fix file leak (git-fixes). * mailbox: bcm2835: Fix timeout during suspend mode (git-fixes). * mailbox: rockchip: fix a typo in module autoloading (git-fixes). * media: aspeed: Fix no complete irq for non-64-aligned width (bsc#1230269) * media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes). * media: qcom: camss: Fix ordering of pm_runtime_enable (git-fixes). * media: Revert "media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()" (git-fixes). * media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes). * media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes). * media: uvcvideo: Enforce alignment of frame and interval (stable-fixes). * media: venus: fix use after free bug in venus_remove due to race condition (git-fixes). * media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes). * media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes). * media: vivid: fix wrong sizeimage value for mplane (stable-fixes). * mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes). * mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes). * mmc: sdhci-of-aspeed: fix module autoloading (git-fixes). * mtd: powernv: Add check devm_kasprintf() returned value (git-fixes). * mtd: slram: insert break after errors in parsing the map (git-fixes). * net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: missing check virtio (git-fixes). * net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes). * nf_conntrack_proto_udp: do not accept packets with IPS_NAT_CLASH (bsc#1199769). * NFSD: Fix frame size warning in svc_export_parse() (git-fixes). * NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662). * NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes). * NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726). * NFS: Reduce use of uncached readdir (bsc#1226662). * NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes). * nilfs2: Constify struct kobj_type (git-fixes). * nilfs2: determine empty node blocks as corrupted (git-fixes). * nilfs2: fix missing cleanup on rollforward recovery error (git-fixes). * nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes). * nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes). * nilfs2: fix state management in error path of log writing function (git- fixes). * nilfs2: protect references to superblock parameters exposed in sysfs (git- fixes). * nilfs2: replace snprintf in show functions with sysfs_emit (git-fixes). * nilfs2: use default_groups in kobj_type (git-fixes). * nvme: move stopping keep-alive into nvme_uninit_ctrl() (git-fixes). * nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes). * nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes). * nvme-pci: use block layer helpers to calculate num of queues (bsc#1229034). * nvme: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes). * nvmet-tcp: do not continue for invalid icreq (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet-trace: avoid dereferencing pointer too early (git-fixes). * ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes). * PCI: al: Check IORESOURCE_BUS existence during probe (git-fixes). * PCI/ASPM: Move pci_function_0() upward (bsc#1226915) * PCI/ASPM: Remove struct aspm_latency (bsc#1226915) * PCI/ASPM: Stop caching device L0s, L1 acceptable exit latencies (bsc#1226915) * PCI/ASPM: Stop caching link L0s, L1 exit latencies (bsc#1226915) * PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes). * PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes). * PCI: dwc: Restore MSI Receiver mask during resume (git-fixes). * pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes). * PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable- fixes). * PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes). * PCI: Support BAR sizes up to 8TB (bsc#1231017) * PCI: Wait for Link before restoring Downstream Buses (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes). * PCI: xilinx-nwl: Fix register misspelling (git-fixes). * pcmcia: Use resource_size function on resource object (stable-fixes). * pinctrl: single: fix missing error code in pcs_probe() (git-fixes). * pinctrl: single: fix potential NULL dereference in pcs_get_function() (git- fixes). * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes). * platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes). * platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git- fixes). * power: supply: axp20x_battery: Remove design from min and max voltage (git- fixes). * power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes). * power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes). * power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/efa: Properly handle unexpected AQ completions (git-fixes) * RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes) * RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes) * RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes) * RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git- fixes) * RDMA/hns: Optimize hem allocation performance (git-fixes) * RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes) * RDMA/rtrs: Fix the problem of variable not initialized fully (git-fixes) * RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git- fixes) * Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes). * Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE" (git-fixes). * Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (git-fixes). * Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (stable-fixes). * rtc: at91sam9: fix OF node leak in probe() error path (git-fixes). * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429). * scsi: lpfc: Copyright updates for 14.4.0.4 patches (bsc#1229429). * scsi: lpfc: Fix overflow build issue (bsc#1229429). * scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429). * scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429). * scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429). * scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429). * scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429). * scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429). * scsi: pm8001: do not overwrite PCI queue mapping (bsc#1229034). * scsi: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034). * scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848). * scsi: use block layer helpers to calculate num of queues (bsc#1229034). * spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes). * Squashfs: sanity check symbolic link size (git-fixes). * staging: iio: frequency: ad9834: Validate frequency parameter value (git- fixes). * thunderbolt: Mark XDomain as unplugged when router is removed (stable- fixes). * tomoyo: fallback to realpath if symlink's pathname does not exist (git- fixes). * tools/virtio: fix build (git-fixes). * tpm: Clean up TPM space after command failure (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes). * udp: fix receiving fraglist GSO packets (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usb: cdnsp: Fix incorrect usb_request status (git-fixes). * USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes). * usb: dwc2: drd: fix clock gating on USB role switch (git-fixes). * usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (git- fixes). * usb: dwc3: core: Skip setting event buffers for host only controllers (git- fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (git-fixes). * usb: dwc3: omap: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes). * usbip: Do not submit special requests twice (stable-fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * usbnet: ipheth: race between ipheth_close and error handling (git-fixes). * usbnet: modern method to get random MAC (git-fixes). * USB: serial: kobil_sct: restore initial terminal settings (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (git-fixes). * usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes). * usb: uas: set host status byte on data completion error (git-fixes). * usb: uas: set host status byte on data completion error (stable-fixes). * USB: usbtmc: prevent kernel-usb-infoleak (git-fixes). * usb: xhci: fix loss of data on Cadence xHC (git-fixes). * vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes). * vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes). * virito: add APIs for retrieving vq affinity (bsc#1229034). * virtio-blk: Ensure no requests in virtqueues before deleting vqs (git- fixes). * virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1229034). * virtio: blk/scs: replace blk_mq_virtio_map_queues with blk_mq_dev_map_queues (bsc#1229034). * virtiofs: forbid newlines in tags (bsc#1230591). * virtio_net: checksum offloading handling fix (git-fixes). * virtio_net: Fix "'%d' directive writing between 1 and 11 bytes into a region of size 10" warnings (git-fixes). * virtio_net: use u64_stats_t infra to avoid data-races (git-fixes). * virtio: reenable config if freezing device failed (git-fixes). * virtio/vsock: fix logic which reduces credit update messages (git-fixes). * VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes). * vsock/virtio: add support for device suspend/resume (git-fixes). * vsock/virtio: factor our the code to initialize and delete VQs (git-fixes). * vsock/virtio: initialize the_virtio_vsock before using VQs (git-fixes). * vsock/virtio: remove socket from connected/bound list on shutdown (git- fixes). * watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes). * wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes). * wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git- fixes). * wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes). * wifi: iwlwifi: mvm: increase the time between ranging measurements (git- fixes). * wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git- fixes). * wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git- fixes). * wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes). * wifi: rtw88: 8822c: Fix reported RX band width (git-fixes). * wifi: rtw88: always wait for both firmware loading attempts (git-fixes). * wifi: rtw88: remove CPT execution branch never used (git-fixes). * wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes). * x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes). * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). * x86/xen: Convert comma to semicolon (git-fixes). * xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003). * xen: allow mapping ACPI data using a different physical address (bsc#1226003). * xen: introduce generic helper checking for memory map conflicts (bsc#1226003). * xen: move checks for e820 conflicts further up (bsc#1226003). * xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003). * xen/swiotlb: add alignment check for dma buffers (bsc#1229928). * xen/swiotlb: fix allocated size (git-fixes). * xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003). * xen: use correct end address of kernel for conflict checking (bsc#1226003). * xfs: do not include bnobt blocks when reserving free block pool (git-fixes). * xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git- fixes). * xz: cleanup CRC32 edits from 2018 (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3592=1 SUSE-2024-3592=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3592=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3592=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3592=1 * SUSE Real Time Module 15-SP5 zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-3592=1 ## Package List: * openSUSE Leap 15.5 (noarch) * kernel-source-rt-5.14.21-150500.13.73.1 * kernel-devel-rt-5.14.21-150500.13.73.1 * openSUSE Leap 15.5 (x86_64) * kernel-syms-rt-5.14.21-150500.13.73.1 * kernel-livepatch-SLE15-SP5-RT_Update_21-debugsource-1-150500.11.3.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.73.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.73.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.73.1 * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.73.1 * dlm-kmp-rt-5.14.21-150500.13.73.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.73.1 * kernel-rt-livepatch-5.14.21-150500.13.73.1 * kselftests-kmp-rt-5.14.21-150500.13.73.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.73.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.73.1 * kernel-livepatch-5_14_21-150500_13_73-rt-1-150500.11.3.1 * kernel-rt_debug-livepatch-devel-5.14.21-150500.13.73.1 * kernel-rt-optional-5.14.21-150500.13.73.1 * kernel-livepatch-5_14_21-150500_13_73-rt-debuginfo-1-150500.11.3.1 * kernel-rt-debugsource-5.14.21-150500.13.73.1 * kernel-rt-devel-5.14.21-150500.13.73.1 * kernel-rt-debuginfo-5.14.21-150500.13.73.1 * kernel-rt-optional-debuginfo-5.14.21-150500.13.73.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.73.1 * reiserfs-kmp-rt-5.14.21-150500.13.73.1 * kernel-rt-vdso-5.14.21-150500.13.73.1 * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.73.1 * cluster-md-kmp-rt-5.14.21-150500.13.73.1 * kernel-rt_debug-devel-5.14.21-150500.13.73.1 * gfs2-kmp-rt-5.14.21-150500.13.73.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.73.1 * kernel-rt-livepatch-devel-5.14.21-150500.13.73.1 * ocfs2-kmp-rt-5.14.21-150500.13.73.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.73.1 * kernel-rt_debug-vdso-5.14.21-150500.13.73.1 * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.73.1 * kernel-rt-extra-5.14.21-150500.13.73.1 * kernel-rt-extra-debuginfo-5.14.21-150500.13.73.1 * openSUSE Leap 15.5 (nosrc x86_64) * kernel-rt_debug-5.14.21-150500.13.73.1 * kernel-rt-5.14.21-150500.13.73.1 * openSUSE Leap Micro 5.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.73.1 * openSUSE Leap Micro 5.5 (x86_64) * kernel-rt-debuginfo-5.14.21-150500.13.73.1 * kernel-rt-debugsource-5.14.21-150500.13.73.1 * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.73.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * kernel-rt-debuginfo-5.14.21-150500.13.73.1 * kernel-rt-debugsource-5.14.21-150500.13.73.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * kernel-source-rt-5.14.21-150500.13.73.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_21-debugsource-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_13_73-rt-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_13_73-rt-debuginfo-1-150500.11.3.1 * SUSE Real Time Module 15-SP5 (x86_64) * kernel-syms-rt-5.14.21-150500.13.73.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.73.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.73.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.73.1 * dlm-kmp-rt-5.14.21-150500.13.73.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.73.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.73.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.73.1 * kernel-rt-debugsource-5.14.21-150500.13.73.1 * kernel-rt-devel-5.14.21-150500.13.73.1 * kernel-rt-debuginfo-5.14.21-150500.13.73.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.73.1 * kernel-rt-vdso-5.14.21-150500.13.73.1 * cluster-md-kmp-rt-5.14.21-150500.13.73.1 * kernel-rt_debug-devel-5.14.21-150500.13.73.1 * gfs2-kmp-rt-5.14.21-150500.13.73.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.73.1 * ocfs2-kmp-rt-5.14.21-150500.13.73.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.73.1 * kernel-rt_debug-vdso-5.14.21-150500.13.73.1 * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.73.1 * SUSE Real Time Module 15-SP5 (noarch) * kernel-source-rt-5.14.21-150500.13.73.1 * kernel-devel-rt-5.14.21-150500.13.73.1 * SUSE Real Time Module 15-SP5 (nosrc x86_64) * kernel-rt_debug-5.14.21-150500.13.73.1 * kernel-rt-5.14.21-150500.13.73.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48901.html * https://www.suse.com/security/cve/CVE-2022-48911.html * https://www.suse.com/security/cve/CVE-2022-48923.html * https://www.suse.com/security/cve/CVE-2022-48935.html * https://www.suse.com/security/cve/CVE-2022-48944.html * https://www.suse.com/security/cve/CVE-2022-48945.html * https://www.suse.com/security/cve/CVE-2023-52610.html * https://www.suse.com/security/cve/CVE-2023-52916.html * https://www.suse.com/security/cve/CVE-2024-26640.html * https://www.suse.com/security/cve/CVE-2024-26759.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-26837.html * https://www.suse.com/security/cve/CVE-2024-37353.html * https://www.suse.com/security/cve/CVE-2024-38538.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-40910.html * https://www.suse.com/security/cve/CVE-2024-40973.html * https://www.suse.com/security/cve/CVE-2024-40983.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42259.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42304.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43828.html * https://www.suse.com/security/cve/CVE-2024-43835.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43912.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44935.html * https://www.suse.com/security/cve/CVE-2024-44944.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44967.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44970.html * https://www.suse.com/security/cve/CVE-2024-44971.html * https://www.suse.com/security/cve/CVE-2024-44972.html * https://www.suse.com/security/cve/CVE-2024-44977.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44986.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44988.html * https://www.suse.com/security/cve/CVE-2024-44989.html * https://www.suse.com/security/cve/CVE-2024-44990.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45000.html * https://www.suse.com/security/cve/CVE-2024-45001.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45006.html * https://www.suse.com/security/cve/CVE-2024-45007.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-45011.html * https://www.suse.com/security/cve/CVE-2024-45013.html * https://www.suse.com/security/cve/CVE-2024-45015.html * https://www.suse.com/security/cve/CVE-2024-45018.html * https://www.suse.com/security/cve/CVE-2024-45020.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-45028.html * https://www.suse.com/security/cve/CVE-2024-45029.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46689.html * https://www.suse.com/security/cve/CVE-2024-46694.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46714.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46717.html * https://www.suse.com/security/cve/CVE-2024-46720.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46724.html * https://www.suse.com/security/cve/CVE-2024-46725.html * https://www.suse.com/security/cve/CVE-2024-46726.html * https://www.suse.com/security/cve/CVE-2024-46727.html * https://www.suse.com/security/cve/CVE-2024-46728.html * https://www.suse.com/security/cve/CVE-2024-46730.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46732.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46746.html * https://www.suse.com/security/cve/CVE-2024-46747.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46751.html * https://www.suse.com/security/cve/CVE-2024-46752.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46755.html * https://www.suse.com/security/cve/CVE-2024-46756.html * https://www.suse.com/security/cve/CVE-2024-46758.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46771.html * https://www.suse.com/security/cve/CVE-2024-46772.html * https://www.suse.com/security/cve/CVE-2024-46773.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46778.html * https://www.suse.com/security/cve/CVE-2024-46780.html * https://www.suse.com/security/cve/CVE-2024-46781.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46786.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46791.html * https://www.suse.com/security/cve/CVE-2024-46794.html * https://www.suse.com/security/cve/CVE-2024-46798.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://www.suse.com/security/cve/CVE-2024-46830.html * https://bugzilla.suse.com/show_bug.cgi?id=1199769 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221610 * https://bugzilla.suse.com/show_bug.cgi?id=1221650 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1222973 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1224085 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226606 * https://bugzilla.suse.com/show_bug.cgi?id=1226662 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1226875 * https://bugzilla.suse.com/show_bug.cgi?id=1226915 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227819 * https://bugzilla.suse.com/show_bug.cgi?id=1227832 * https://bugzilla.suse.com/show_bug.cgi?id=1227890 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228576 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228771 * https://bugzilla.suse.com/show_bug.cgi?id=1229031 * https://bugzilla.suse.com/show_bug.cgi?id=1229034 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229156 * https://bugzilla.suse.com/show_bug.cgi?id=1229289 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229364 * https://bugzilla.suse.com/show_bug.cgi?id=1229394 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229453 * https://bugzilla.suse.com/show_bug.cgi?id=1229572 * https://bugzilla.suse.com/show_bug.cgi?id=1229573 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229607 * https://bugzilla.suse.com/show_bug.cgi?id=1229619 * https://bugzilla.suse.com/show_bug.cgi?id=1229633 * https://bugzilla.suse.com/show_bug.cgi?id=1229662 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229810 * https://bugzilla.suse.com/show_bug.cgi?id=1229830 * https://bugzilla.suse.com/show_bug.cgi?id=1229899 * https://bugzilla.suse.com/show_bug.cgi?id=1229928 * https://bugzilla.suse.com/show_bug.cgi?id=1229947 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230129 * https://bugzilla.suse.com/show_bug.cgi?id=1230130 * https://bugzilla.suse.com/show_bug.cgi?id=1230170 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230175 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230192 * https://bugzilla.suse.com/show_bug.cgi?id=1230193 * https://bugzilla.suse.com/show_bug.cgi?id=1230194 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230209 * https://bugzilla.suse.com/show_bug.cgi?id=1230211 * https://bugzilla.suse.com/show_bug.cgi?id=1230212 * https://bugzilla.suse.com/show_bug.cgi?id=1230217 * https://bugzilla.suse.com/show_bug.cgi?id=1230224 * https://bugzilla.suse.com/show_bug.cgi?id=1230230 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230244 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230247 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230269 * https://bugzilla.suse.com/show_bug.cgi?id=1230339 * https://bugzilla.suse.com/show_bug.cgi?id=1230340 * https://bugzilla.suse.com/show_bug.cgi?id=1230392 * https://bugzilla.suse.com/show_bug.cgi?id=1230398 * https://bugzilla.suse.com/show_bug.cgi?id=1230431 * https://bugzilla.suse.com/show_bug.cgi?id=1230433 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230440 * https://bugzilla.suse.com/show_bug.cgi?id=1230442 * https://bugzilla.suse.com/show_bug.cgi?id=1230444 * https://bugzilla.suse.com/show_bug.cgi?id=1230450 * https://bugzilla.suse.com/show_bug.cgi?id=1230451 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230511 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230524 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230591 * https://bugzilla.suse.com/show_bug.cgi?id=1230592 * https://bugzilla.suse.com/show_bug.cgi?id=1230699 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230701 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230703 * https://bugzilla.suse.com/show_bug.cgi?id=1230705 * https://bugzilla.suse.com/show_bug.cgi?id=1230706 * https://bugzilla.suse.com/show_bug.cgi?id=1230707 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230711 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230719 * https://bugzilla.suse.com/show_bug.cgi?id=1230724 * https://bugzilla.suse.com/show_bug.cgi?id=1230725 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230751 * https://bugzilla.suse.com/show_bug.cgi?id=1230752 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230766 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230768 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230772 * https://bugzilla.suse.com/show_bug.cgi?id=1230776 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230786 * https://bugzilla.suse.com/show_bug.cgi?id=1230791 * https://bugzilla.suse.com/show_bug.cgi?id=1230794 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230802 * https://bugzilla.suse.com/show_bug.cgi?id=1230806 * https://bugzilla.suse.com/show_bug.cgi?id=1230808 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230812 * https://bugzilla.suse.com/show_bug.cgi?id=1230813 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230821 * https://bugzilla.suse.com/show_bug.cgi?id=1230825 * https://bugzilla.suse.com/show_bug.cgi?id=1230830 * https://bugzilla.suse.com/show_bug.cgi?id=1231013 * https://bugzilla.suse.com/show_bug.cgi?id=1231017 * https://bugzilla.suse.com/show_bug.cgi?id=1231116 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231180 * https://bugzilla.suse.com/show_bug.cgi?id=1231181 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 10 20:32:10 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 10 Oct 2024 20:32:10 -0000 Subject: SUSE-RU-2024:3593-1: moderate: Recommended update for rsyslog Message-ID: <172859233010.7152.13509122221299365968@smelt2.prg2.suse.org> # Recommended update for rsyslog Announcement ID: SUSE-RU-2024:3593-1 Release Date: 2024-10-10T16:43:42Z Rating: moderate References: * bsc#1231229 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for rsyslog fixes the following issue: * fix PreserveFQDN option before daemon is restarted (bsc#1231229) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3593=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3593=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3593=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3593=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3593=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3593=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3593=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3593=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3593=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3593=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3593=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3593=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * rsyslog-module-ossl-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gcrypt-8.2306.0-150400.5.30.2 * rsyslog-module-relp-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-diag-tools-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-elasticsearch-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-8.2306.0-150400.5.30.2 * rsyslog-module-ossl-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gcrypt-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-8.2306.0-150400.5.30.2 * rsyslog-module-omtcl-8.2306.0-150400.5.30.2 * rsyslog-8.2306.0-150400.5.30.2 * rsyslog-doc-8.2306.0-150400.5.30.2 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-omhttpfs-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-8.2306.0-150400.5.30.2 * rsyslog-module-omamqp1-8.2306.0-150400.5.30.2 * rsyslog-module-omamqp1-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-omtcl-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-elasticsearch-8.2306.0-150400.5.30.2 * rsyslog-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-8.2306.0-150400.5.30.2 * rsyslog-module-dbi-8.2306.0-150400.5.30.2 * rsyslog-module-kafka-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-omhttpfs-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-8.2306.0-150400.5.30.2 * rsyslog-debugsource-8.2306.0-150400.5.30.2 * rsyslog-module-dbi-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-diag-tools-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-kafka-debuginfo-8.2306.0-150400.5.30.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * rsyslog-module-ossl-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gcrypt-8.2306.0-150400.5.30.2 * rsyslog-module-relp-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-diag-tools-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-elasticsearch-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-8.2306.0-150400.5.30.2 * rsyslog-module-ossl-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gcrypt-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-8.2306.0-150400.5.30.2 * rsyslog-module-omtcl-8.2306.0-150400.5.30.2 * rsyslog-8.2306.0-150400.5.30.2 * rsyslog-doc-8.2306.0-150400.5.30.2 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-omhttpfs-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-8.2306.0-150400.5.30.2 * rsyslog-module-omamqp1-8.2306.0-150400.5.30.2 * rsyslog-module-omamqp1-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-omtcl-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-elasticsearch-8.2306.0-150400.5.30.2 * rsyslog-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-8.2306.0-150400.5.30.2 * rsyslog-module-dbi-8.2306.0-150400.5.30.2 * rsyslog-module-kafka-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-omhttpfs-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-8.2306.0-150400.5.30.2 * rsyslog-debugsource-8.2306.0-150400.5.30.2 * rsyslog-module-dbi-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-diag-tools-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-kafka-debuginfo-8.2306.0-150400.5.30.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-8.2306.0-150400.5.30.2 * rsyslog-debugsource-8.2306.0-150400.5.30.2 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-8.2306.0-150400.5.30.2 * rsyslog-module-relp-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-8.2306.0-150400.5.30.2 * rsyslog-debugsource-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.30.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-8.2306.0-150400.5.30.2 * rsyslog-module-relp-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-8.2306.0-150400.5.30.2 * rsyslog-debugsource-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.30.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-8.2306.0-150400.5.30.2 * rsyslog-module-relp-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-8.2306.0-150400.5.30.2 * rsyslog-debugsource-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.30.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-8.2306.0-150400.5.30.2 * rsyslog-debugsource-8.2306.0-150400.5.30.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-8.2306.0-150400.5.30.2 * rsyslog-module-relp-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-8.2306.0-150400.5.30.2 * rsyslog-debugsource-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.30.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-8.2306.0-150400.5.30.2 * rsyslog-module-relp-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-8.2306.0-150400.5.30.2 * rsyslog-debugsource-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.30.2 * SUSE Manager Proxy 4.3 (x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-8.2306.0-150400.5.30.2 * rsyslog-module-relp-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-8.2306.0-150400.5.30.2 * rsyslog-debugsource-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.30.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-8.2306.0-150400.5.30.2 * rsyslog-module-relp-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-8.2306.0-150400.5.30.2 * rsyslog-debugsource-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.30.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * rsyslog-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-8.2306.0-150400.5.30.2 * rsyslog-module-udpspoof-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-8.2306.0-150400.5.30.2 * rsyslog-module-relp-8.2306.0-150400.5.30.2 * rsyslog-module-gtls-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-mysql-8.2306.0-150400.5.30.2 * rsyslog-debugsource-8.2306.0-150400.5.30.2 * rsyslog-module-gssapi-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-pgsql-8.2306.0-150400.5.30.2 * rsyslog-module-mmnormalize-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-snmp-debuginfo-8.2306.0-150400.5.30.2 * rsyslog-module-relp-debuginfo-8.2306.0-150400.5.30.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231229 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 12:30:06 -0000 Subject: SUSE-RU-2024:3492-3: low: Recommended update for udisks2 Message-ID: <172864980628.5826.17561126374976950180@smelt2.prg2.suse.org> # Recommended update for udisks2 Announcement ID: SUSE-RU-2024:3492-3 Release Date: 2024-10-11T11:36:42Z Rating: low References: * bsc#1227458 Affected Products: * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for udisks2 fixes the following issues: * Add libudisks2-0_btrfs to PackeHub 15-SP6 (bsc#1227458) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3492=1 ## Package List: * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libudisks2-0_btrfs-2.9.2-150400.3.8.1 * libudisks2-0_lvm2-2.9.2-150400.3.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1227458 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 12:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 12:30:12 -0000 Subject: SUSE-RU-2024:3602-1: moderate: Recommended update for grub2 Message-ID: <172864981215.5826.7147149159683902402@smelt2.prg2.suse.org> # Recommended update for grub2 Announcement ID: SUSE-RU-2024:3602-1 Release Date: 2024-10-11T11:02:19Z Rating: moderate References: * bsc#1224465 * bsc#1230263 * bsc#1230840 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has three fixes can now be installed. ## Description: This update for grub2 fixes the following issues: * Fix OOM (out of memory) error in loading loopback file (bsc#1230840). * Fix UEFI PXE boot failure on tagged VLAN network (bsc#1230263). * Fix grub screen is filled with artifects from earlier post menu (bsc#1224465). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3602=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3602=1 openSUSE-SLE-15.6-2024-3602=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3602=1 ## Package List: * Server Applications Module 15-SP6 (noarch) * grub2-x86_64-xen-2.12-150600.8.9.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * grub2-debuginfo-2.12-150600.8.9.2 * grub2-branding-upstream-2.12-150600.8.9.2 * grub2-2.12-150600.8.9.2 * openSUSE Leap 15.6 (aarch64 s390x x86_64 i586) * grub2-debugsource-2.12-150600.8.9.2 * openSUSE Leap 15.6 (noarch) * grub2-arm64-efi-2.12-150600.8.9.2 * grub2-x86_64-efi-2.12-150600.8.9.2 * grub2-i386-pc-debug-2.12-150600.8.9.2 * grub2-x86_64-efi-debug-2.12-150600.8.9.2 * grub2-powerpc-ieee1275-debug-2.12-150600.8.9.2 * grub2-arm64-efi-debug-2.12-150600.8.9.2 * grub2-x86_64-efi-extras-2.12-150600.8.9.2 * grub2-i386-xen-2.12-150600.8.9.2 * grub2-i386-efi-2.12-150600.8.9.2 * grub2-i386-efi-extras-2.12-150600.8.9.2 * grub2-x86_64-xen-2.12-150600.8.9.2 * grub2-i386-pc-extras-2.12-150600.8.9.2 * grub2-powerpc-ieee1275-2.12-150600.8.9.2 * grub2-powerpc-ieee1275-extras-2.12-150600.8.9.2 * grub2-i386-efi-debug-2.12-150600.8.9.2 * grub2-s390x-emu-extras-2.12-150600.8.9.2 * grub2-i386-xen-extras-2.12-150600.8.9.2 * grub2-i386-pc-2.12-150600.8.9.2 * grub2-systemd-sleep-plugin-2.12-150600.8.9.2 * grub2-x86_64-xen-extras-2.12-150600.8.9.2 * grub2-arm64-efi-extras-2.12-150600.8.9.2 * grub2-snapper-plugin-2.12-150600.8.9.2 * openSUSE Leap 15.6 (s390x) * grub2-s390x-emu-debug-2.12-150600.8.9.2 * grub2-s390x-emu-2.12-150600.8.9.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * grub2-debuginfo-2.12-150600.8.9.2 * grub2-2.12-150600.8.9.2 * Basesystem Module 15-SP6 (noarch) * grub2-arm64-efi-2.12-150600.8.9.2 * grub2-i386-pc-2.12-150600.8.9.2 * grub2-x86_64-efi-2.12-150600.8.9.2 * grub2-powerpc-ieee1275-2.12-150600.8.9.2 * grub2-systemd-sleep-plugin-2.12-150600.8.9.2 * grub2-snapper-plugin-2.12-150600.8.9.2 * Basesystem Module 15-SP6 (aarch64 s390x x86_64) * grub2-debugsource-2.12-150600.8.9.2 * Basesystem Module 15-SP6 (s390x) * grub2-s390x-emu-2.12-150600.8.9.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224465 * https://bugzilla.suse.com/show_bug.cgi?id=1230263 * https://bugzilla.suse.com/show_bug.cgi?id=1230840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 12:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 12:30:13 -0000 Subject: SUSE-RU-2024:3601-1: moderate: Recommended update for SLES-LTSS-Extended-Security Message-ID: <172864981317.5826.11761523229279940174@smelt2.prg2.suse.org> # Recommended update for SLES-LTSS-Extended-Security Announcement ID: SUSE-RU-2024:3601-1 Release Date: 2024-10-11T08:45:43Z Rating: moderate References: * jsc#MSC-853 Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security 12-SP5 An update that contains one feature can now be installed. ## Description: This update for SLES-LTSS-Extended-Security provides the following fix: * Adjust the EOL date for the product. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security 12-SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-3601=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security 12-SP5 (x86_64) * sles-ltss-extended-security-release-12.5-8.4.1 * sles-ltss-extended-security-release-POOL-12.5-8.4.1 ## References: * https://jira.suse.com/browse/MSC-853 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 12:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 12:30:15 -0000 Subject: SUSE-RU-2024:3600-1: moderate: Recommended update for python-requests Message-ID: <172864981512.5826.7732450989504935708@smelt2.prg2.suse.org> # Recommended update for python-requests Announcement ID: SUSE-RU-2024:3600-1 Release Date: 2024-10-11T08:43:29Z Rating: moderate References: * bsc#1225912 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Python 3 Module 15-SP5 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-requests fixes the following issue: * Update CVE-2024-35195.patch to allow the usage of "verify" parameter as a directory (bsc#1225912) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3600=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3600=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3600=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3600=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-3600=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-3600=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3600=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3600=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3600=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3600=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3600=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python311-requests-2.31.0-150400.6.15.1 * openSUSE Leap 15.5 (noarch) * python311-requests-2.31.0-150400.6.15.1 * openSUSE Leap 15.6 (noarch) * python311-requests-2.31.0-150400.6.15.1 * Public Cloud Module 15-SP4 (noarch) * python311-requests-2.31.0-150400.6.15.1 * Python 3 Module 15-SP5 (noarch) * python311-requests-2.31.0-150400.6.15.1 * Python 3 Module 15-SP6 (noarch) * python311-requests-2.31.0-150400.6.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python311-requests-2.31.0-150400.6.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python311-requests-2.31.0-150400.6.15.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python311-requests-2.31.0-150400.6.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python311-requests-2.31.0-150400.6.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python311-requests-2.31.0-150400.6.15.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1225912 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 12:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 12:30:17 -0000 Subject: SUSE-RU-2024:3599-1: moderate: Recommended update for python-requests Message-ID: <172864981724.5826.13931020710869243646@smelt2.prg2.suse.org> # Recommended update for python-requests Announcement ID: SUSE-RU-2024:3599-1 Release Date: 2024-10-11T08:42:38Z Rating: moderate References: * bsc#1225912 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * Advanced Systems Management Module 12 * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that solves one vulnerability can now be installed. ## Description: This update for python-requests fixes the following issue: * Update CVE-2024-35195.patch to allow the usage of "verify" parameter as a directory (bsc#1225912) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Advanced Systems Management Module 12 zypper in -t patch SUSE-SLE-Module-Adv-Systems-Management-12-2024-3599=1 * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2024-3599=1 ## Package List: * Advanced Systems Management Module 12 (noarch) * python-requests-2.11.1-6.40.1 * python3-requests-2.11.1-6.40.1 * SUSE Manager Client Tools for SLE 12 (noarch) * python-requests-2.11.1-6.40.1 * python3-requests-2.11.1-6.40.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1225912 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 12:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 12:30:19 -0000 Subject: SUSE-RU-2024:3598-1: moderate: Recommended update for python-requests Message-ID: <172864981958.5826.3331186935338527945@smelt2.prg2.suse.org> # Recommended update for python-requests Announcement ID: SUSE-RU-2024:3598-1 Release Date: 2024-10-11T08:42:23Z Rating: moderate References: * bsc#1225912 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-requests fixes the following issue: * Update CVE-2024-35195.patch to allow the usage of "verify" parameter as a directory (bsc#1225912) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-3598=1 SUSE-SLE- SERVER-12-SP5-2024-3598=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-3598=1 * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2024-3598=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3598=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3598=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * python-requests-2.24.0-8.20.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (noarch) * python-requests-2.24.0-8.20.1 * Public Cloud Module 12 (noarch) * python-requests-2.24.0-8.20.1 * python3-requests-2.24.0-8.20.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * python-requests-2.24.0-8.20.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * python-requests-2.24.0-8.20.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1225912 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 12:30:21 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 12:30:21 -0000 Subject: SUSE-RU-2024:3597-1: moderate: Recommended update for bash Message-ID: <172864982182.5826.6610764076462606515@smelt2.prg2.suse.org> # Recommended update for bash Announcement ID: SUSE-RU-2024:3597-1 Release Date: 2024-10-11T08:40:42Z Rating: moderate References: * bsc#1227807 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for bash fixes the following issues: * Load completion file eveh if a brace expansion is in the command line included (bsc#1227807). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3597=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3597=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3597=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3597=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3597=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3597=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3597=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3597=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3597=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3597=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3597=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3597=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3597=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3597=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3597=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3597=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3597=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3597=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3597=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * Basesystem Module 15-SP5 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * Basesystem Module 15-SP5 (x86_64) * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * Basesystem Module 15-SP6 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * Basesystem Module 15-SP6 (x86_64) * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * SUSE Manager Proxy 4.3 (x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * SUSE Manager Proxy 4.3 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * SUSE Manager Server 4.3 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * SUSE Manager Server 4.3 (x86_64) * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * openSUSE Leap 15.4 (x86_64) * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * bash-32bit-debuginfo-4.4-150400.27.3.2 * readline-devel-32bit-7.0-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * bash-loadables-4.4-150400.27.3.2 * bash-loadables-debuginfo-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * readline-devel-static-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * openSUSE Leap 15.4 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * openSUSE Leap 15.4 (aarch64_ilp32) * readline-devel-64bit-7.0-150400.27.3.2 * libreadline7-64bit-7.0-150400.27.3.2 * libreadline7-64bit-debuginfo-7.0-150400.27.3.2 * bash-64bit-debuginfo-4.4-150400.27.3.2 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * openSUSE Leap 15.5 (x86_64) * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * bash-32bit-debuginfo-4.4-150400.27.3.2 * readline-devel-32bit-7.0-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * bash-loadables-4.4-150400.27.3.2 * bash-loadables-debuginfo-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * readline-devel-static-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * openSUSE Leap 15.5 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * openSUSE Leap 15.6 (x86_64) * libreadline7-32bit-debuginfo-7.0-150400.27.3.2 * bash-32bit-debuginfo-4.4-150400.27.3.2 * readline-devel-32bit-7.0-150400.27.3.2 * libreadline7-32bit-7.0-150400.27.3.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-devel-4.4-150400.27.3.2 * bash-loadables-4.4-150400.27.3.2 * bash-loadables-debuginfo-4.4-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * readline-devel-7.0-150400.27.3.2 * readline-devel-static-7.0-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * openSUSE Leap 15.6 (noarch) * bash-lang-4.4-150400.27.3.2 * bash-doc-4.4-150400.27.3.2 * readline-doc-7.0-150400.27.3.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * bash-debugsource-4.4-150400.27.3.2 * bash-4.4-150400.27.3.2 * bash-sh-4.4-150400.27.3.2 * bash-debuginfo-4.4-150400.27.3.2 * libreadline7-debuginfo-7.0-150400.27.3.2 * libreadline7-7.0-150400.27.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1227807 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 12:30:24 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 12:30:24 -0000 Subject: SUSE-SU-2024:3596-1: moderate: Security update for apache-commons-io Message-ID: <172864982405.5826.15125290713174435884@smelt2.prg2.suse.org> # Security update for apache-commons-io Announcement ID: SUSE-SU-2024:3596-1 Release Date: 2024-10-11T08:38:55Z Rating: moderate References: * bsc#1231298 Cross-References: * CVE-2024-47554 CVSS scores: * CVE-2024-47554 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47554 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for apache-commons-io fixes the following issues: Upgrade to 2.17.0: * CVE-2024-47554: Fixed untrusted input to XmlStreamReader can lead to uncontrolled resource consumption (bsc#1231298) Other changes: \- https://commons.apache.org/proper/commons-io/changes- report.html#a2.17.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3596=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3596=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3596=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3596=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch) * apache-commons-io-2.17.0-11.3.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * apache-commons-io-2.17.0-11.3.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * apache-commons-io-2.17.0-11.3.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * apache-commons-io-2.17.0-11.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47554.html * https://bugzilla.suse.com/show_bug.cgi?id=1231298 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 12:30:26 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 12:30:26 -0000 Subject: SUSE-RU-2024:3595-1: moderate: Recommended update for lttng-modules Message-ID: <172864982649.5826.2499833963912782218@smelt2.prg2.suse.org> # Recommended update for lttng-modules Announcement ID: SUSE-RU-2024:3595-1 Release Date: 2024-10-11T08:30:47Z Rating: moderate References: * bsc#1229151 Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for lttng-modules fixes the following issues: * disable rt builds for SUSE:SLE-15-SP6:Update since RT is being managed in a different update project for SP6 * kernel-source was not included in -kernel_module_package_buildreqs- so btrfs lttng tracepoints were not being enabled explaining why build failures were only being seen for kernel-source-rt. Add explicit BuildRequires: kernel-source. * fix build error caused by btrfs kernel tracepoint change (bsc#1229151). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3595=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3595=1 openSUSE-SLE-15.6-2024-3595=1 ## Package List: * Development Tools Module 15-SP6 (x86_64) * lttng-modules-kmp-default-2.13.11_k6.4.0_150600.23.22-150600.3.3.8 * lttng-modules-debugsource-2.13.11-150600.3.3.8 * lttng-modules-kmp-default-debuginfo-2.13.11_k6.4.0_150600.23.22-150600.3.3.8 * lttng-modules-2.13.11-150600.3.3.8 * openSUSE Leap 15.6 (x86_64) * lttng-modules-kmp-default-2.13.11_k6.4.0_150600.23.22-150600.3.3.8 * lttng-modules-debugsource-2.13.11-150600.3.3.8 * lttng-modules-kmp-default-debuginfo-2.13.11_k6.4.0_150600.23.22-150600.3.3.8 * lttng-modules-2.13.11-150600.3.3.8 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229151 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 12:30:28 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 12:30:28 -0000 Subject: SUSE-RU-2024:3594-1: moderate: Recommended update for lttng-modules Message-ID: <172864982835.5826.9154496435567797244@smelt2.prg2.suse.org> # Recommended update for lttng-modules Announcement ID: SUSE-RU-2024:3594-1 Release Date: 2024-10-11T07:59:32Z Rating: moderate References: * bsc#1229151 Affected Products: * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Real Time Module 15-SP6 An update that has one fix can now be installed. ## Description: This update for lttng-modules fixes the following issues: * Adding explicit build tequirements to kernel-source. kernel-source was not included in %kernel_module_package_buildreqs so btrfs tracepoints were not being enabled explaining why build failures were only being seen for kernel-source-rt. * fix build error caused by btrfs kernel change (bsc#1229151). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Real Time Module 15-SP6 zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2024-3594=1 ## Package List: * SUSE Real Time Module 15-SP6 (x86_64) * lttng-modules-kmp-rt-2.13.11_k6.4.0_150600.10.5-150600.3.3.2 * lttng-modules-kmp-rt-debuginfo-2.13.11_k6.4.0_150600.10.5-150600.3.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229151 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 16:30:06 -0000 Subject: SUSE-RU-2024:3606-1: moderate: Recommended update for icewm-theme-branding Message-ID: <172866420678.7152.15930058124475699469@smelt2.prg2.suse.org> # Recommended update for icewm-theme-branding Announcement ID: SUSE-RU-2024:3606-1 Release Date: 2024-10-11T15:17:03Z Rating: moderate References: * bsc#1220034 * bsc#1222655 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for icewm-theme-branding fixes the following issue: * The Adwaita theme does not provide much legacy apps icon now, redirect icewm web-browser icon to the right place (bsc#1220034, bsc#1222655). See: * https://gitlab.gnome.org/GNOME/adwaita-icon-theme/-/issues/163 * https://gitlab.gnome.org/GNOME/adwaita-icon-theme/-/merge_requests/34/ ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3606=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3606=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3606=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3606=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3606=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3606=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3606=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3606=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3606=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3606=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3606=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3606=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3606=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3606=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3606=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3606=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3606=1 ## Package List: * openSUSE Leap 15.3 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * openSUSE Leap 15.5 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * openSUSE Leap 15.6 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * Basesystem Module 15-SP5 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * Basesystem Module 15-SP6 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * SUSE Manager Proxy 4.3 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * SUSE Manager Server 4.3 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 * SUSE Enterprise Storage 7.1 (noarch) * icewm-theme-branding-1.2.5-150300.5.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220034 * https://bugzilla.suse.com/show_bug.cgi?id=1222655 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 16:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 16:30:08 -0000 Subject: SUSE-RU-2024:3605-1: moderate: Recommended update for grub2 Message-ID: <172866420897.7152.6985777278256028065@smelt2.prg2.suse.org> # Recommended update for grub2 Announcement ID: SUSE-RU-2024:3605-1 Release Date: 2024-10-11T15:09:55Z Rating: moderate References: * bsc#1230840 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for grub2 fixes the following issue: * Fix out of memory error in loading loopback file (bsc#1230840). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3605=1 SUSE-2024-3605=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3605=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3605=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3605=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3605=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * grub2-2.06-150500.29.34.2 * grub2-branding-upstream-2.06-150500.29.34.2 * grub2-debuginfo-2.06-150500.29.34.2 * openSUSE Leap 15.5 (aarch64 s390x x86_64 i586) * grub2-debugsource-2.06-150500.29.34.2 * openSUSE Leap 15.5 (noarch) * grub2-systemd-sleep-plugin-2.06-150500.29.34.2 * grub2-i386-xen-2.06-150500.29.34.2 * grub2-s390x-emu-extras-2.06-150500.29.34.2 * grub2-x86_64-efi-2.06-150500.29.34.2 * grub2-x86_64-efi-extras-2.06-150500.29.34.2 * grub2-i386-pc-debug-2.06-150500.29.34.2 * grub2-i386-xen-extras-2.06-150500.29.34.2 * grub2-arm64-efi-2.06-150500.29.34.2 * grub2-arm64-efi-extras-2.06-150500.29.34.2 * grub2-i386-pc-2.06-150500.29.34.2 * grub2-i386-efi-extras-2.06-150500.29.34.2 * grub2-powerpc-ieee1275-2.06-150500.29.34.2 * grub2-x86_64-xen-extras-2.06-150500.29.34.2 * grub2-i386-efi-debug-2.06-150500.29.34.2 * grub2-powerpc-ieee1275-extras-2.06-150500.29.34.2 * grub2-x86_64-efi-debug-2.06-150500.29.34.2 * grub2-powerpc-ieee1275-debug-2.06-150500.29.34.2 * grub2-snapper-plugin-2.06-150500.29.34.2 * grub2-i386-pc-extras-2.06-150500.29.34.2 * grub2-i386-efi-2.06-150500.29.34.2 * grub2-arm64-efi-debug-2.06-150500.29.34.2 * grub2-x86_64-xen-2.06-150500.29.34.2 * openSUSE Leap 15.5 (s390x) * grub2-s390x-emu-debug-2.06-150500.29.34.2 * grub2-s390x-emu-2.06-150500.29.34.2 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150500.29.34.2 * grub2-2.06-150500.29.34.2 * grub2-debuginfo-2.06-150500.29.34.2 * openSUSE Leap Micro 5.5 (noarch) * grub2-arm64-efi-2.06-150500.29.34.2 * grub2-snapper-plugin-2.06-150500.29.34.2 * grub2-x86_64-efi-2.06-150500.29.34.2 * grub2-i386-pc-2.06-150500.29.34.2 * grub2-x86_64-xen-2.06-150500.29.34.2 * openSUSE Leap Micro 5.5 (s390x) * grub2-s390x-emu-2.06-150500.29.34.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * grub2-2.06-150500.29.34.2 * grub2-debuginfo-2.06-150500.29.34.2 * SUSE Linux Enterprise Micro 5.5 (noarch) * grub2-arm64-efi-2.06-150500.29.34.2 * grub2-snapper-plugin-2.06-150500.29.34.2 * grub2-x86_64-efi-2.06-150500.29.34.2 * grub2-i386-pc-2.06-150500.29.34.2 * grub2-x86_64-xen-2.06-150500.29.34.2 * grub2-powerpc-ieee1275-2.06-150500.29.34.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150500.29.34.2 * SUSE Linux Enterprise Micro 5.5 (s390x) * grub2-s390x-emu-2.06-150500.29.34.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * grub2-2.06-150500.29.34.2 * grub2-debuginfo-2.06-150500.29.34.2 * Basesystem Module 15-SP5 (noarch) * grub2-arm64-efi-2.06-150500.29.34.2 * grub2-systemd-sleep-plugin-2.06-150500.29.34.2 * grub2-snapper-plugin-2.06-150500.29.34.2 * grub2-x86_64-efi-2.06-150500.29.34.2 * grub2-i386-pc-2.06-150500.29.34.2 * grub2-powerpc-ieee1275-2.06-150500.29.34.2 * Basesystem Module 15-SP5 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150500.29.34.2 * Basesystem Module 15-SP5 (s390x) * grub2-s390x-emu-2.06-150500.29.34.2 * Server Applications Module 15-SP5 (noarch) * grub2-x86_64-xen-2.06-150500.29.34.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 16:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 16:30:11 -0000 Subject: SUSE-SU-2024:3604-1: moderate: Security update for OpenIPMI Message-ID: <172866421114.7152.2292933205830632905@smelt2.prg2.suse.org> # Security update for OpenIPMI Announcement ID: SUSE-SU-2024:3604-1 Release Date: 2024-10-11T15:00:59Z Rating: moderate References: * bsc#1229910 Cross-References: * CVE-2024-42934 CVSS scores: * CVE-2024-42934 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-42934 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for OpenIPMI fixes the following issues: * CVE-2024-42934: Fixed missing check on the authorization type on incoming LAN messages in IPMI simulator (bsc#1229910) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3604=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3604=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3604=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libOpenIPMI0-debuginfo-2.0.31-150400.3.5.1 * OpenIPMI-devel-2.0.31-150400.3.5.1 * OpenIPMI-debuginfo-2.0.31-150400.3.5.1 * libOpenIPMI0-2.0.31-150400.3.5.1 * OpenIPMI-python3-debuginfo-2.0.31-150400.3.5.1 * OpenIPMI-2.0.31-150400.3.5.1 * OpenIPMI-python3-2.0.31-150400.3.5.1 * OpenIPMI-debugsource-2.0.31-150400.3.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libOpenIPMI0-debuginfo-2.0.31-150400.3.5.1 * OpenIPMI-devel-2.0.31-150400.3.5.1 * OpenIPMI-debuginfo-2.0.31-150400.3.5.1 * libOpenIPMI0-2.0.31-150400.3.5.1 * OpenIPMI-python3-debuginfo-2.0.31-150400.3.5.1 * OpenIPMI-2.0.31-150400.3.5.1 * OpenIPMI-python3-2.0.31-150400.3.5.1 * OpenIPMI-debugsource-2.0.31-150400.3.5.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libOpenIPMI0-debuginfo-2.0.31-150400.3.5.1 * OpenIPMI-devel-2.0.31-150400.3.5.1 * libOpenIPMI0-2.0.31-150400.3.5.1 * OpenIPMI-debuginfo-2.0.31-150400.3.5.1 * OpenIPMI-2.0.31-150400.3.5.1 * OpenIPMI-debugsource-2.0.31-150400.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-42934.html * https://bugzilla.suse.com/show_bug.cgi?id=1229910 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 11 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 11 Oct 2024 16:30:14 -0000 Subject: SUSE-SU-2024:3603-1: critical: Security update for MozillaFirefox Message-ID: <172866421475.7152.1104317944831193898@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2024:3603-1 Release Date: 2024-10-11T12:33:48Z Rating: critical References: * bsc#1230979 * bsc#1231413 Cross-References: * CVE-2024-8900 * CVE-2024-9392 * CVE-2024-9393 * CVE-2024-9394 * CVE-2024-9396 * CVE-2024-9397 * CVE-2024-9398 * CVE-2024-9399 * CVE-2024-9400 * CVE-2024-9401 * CVE-2024-9402 * CVE-2024-9680 CVSS scores: * CVE-2024-8900 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-9392 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9392 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9392 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9393 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9393 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9394 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9394 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9396 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-9396 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-9396 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9397 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9397 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9398 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-9398 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-9399 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-9399 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-9400 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-9400 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-9400 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9401 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9401 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9401 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9402 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9402 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9402 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9680 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9680 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves 12 vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 128.3.1 ESR MFSA 2024-51 (bsc#1231413) * CVE-2024-9680: Use-after-free in Animation timeline (bmo#1923344) Also includes the following CVEs from MFSA 2024-47 (bsc#1230979) * CVE-2024-9392: Compromised content process can bypass site isolation (bmo#1899154, bmo#1905843) * CVE-2024-9393: Cross-origin access to PDF contents through multipart responses (bmo#1918301) * CVE-2024-9394: Cross-origin access to JSON contents through multipart responses (bmo#1918874) * CVE-2024-8900: Clipboard write permission bypass (bmo#1872841) * CVE-2024-9396: Potential memory corruption may occur when cloning certain objects (bmo#1912471) * CVE-2024-9397: Potential directory upload bypass via clickjacking (bmo#1916659) * CVE-2024-9398: External protocol handlers could be enumerated via popups (bmo#1881037) * CVE-2024-9399: Specially crafted WebTransport requests could lead to denial of service (bmo#1907726) * CVE-2024-9400: Potential memory corruption during JIT compilation (bmo#1915249) * CVE-2024-9401: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 (bmo#1872744, bmo#1897792, bmo#1911317, bmo#1916476) * CVE-2024-9402: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3i (bmo#1872744, bmo#1897792, bmo#1911317, bmo#1913445, bmo#1914106, bmo#1914475, bmo#1914963, bmo#1915008, bmo#1916476) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3603=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3603=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3603=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3603=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debugsource-128.3.1-112.231.1 * MozillaFirefox-debuginfo-128.3.1-112.231.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch) * MozillaFirefox-devel-128.3.1-112.231.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * MozillaFirefox-128.3.1-112.231.1 * MozillaFirefox-debugsource-128.3.1-112.231.1 * MozillaFirefox-translations-common-128.3.1-112.231.1 * MozillaFirefox-debuginfo-128.3.1-112.231.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * MozillaFirefox-devel-128.3.1-112.231.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.3.1-112.231.1 * MozillaFirefox-debugsource-128.3.1-112.231.1 * MozillaFirefox-translations-common-128.3.1-112.231.1 * MozillaFirefox-debuginfo-128.3.1-112.231.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * MozillaFirefox-devel-128.3.1-112.231.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * MozillaFirefox-128.3.1-112.231.1 * MozillaFirefox-debugsource-128.3.1-112.231.1 * MozillaFirefox-translations-common-128.3.1-112.231.1 * MozillaFirefox-debuginfo-128.3.1-112.231.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * MozillaFirefox-devel-128.3.1-112.231.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8900.html * https://www.suse.com/security/cve/CVE-2024-9392.html * https://www.suse.com/security/cve/CVE-2024-9393.html * https://www.suse.com/security/cve/CVE-2024-9394.html * https://www.suse.com/security/cve/CVE-2024-9396.html * https://www.suse.com/security/cve/CVE-2024-9397.html * https://www.suse.com/security/cve/CVE-2024-9398.html * https://www.suse.com/security/cve/CVE-2024-9399.html * https://www.suse.com/security/cve/CVE-2024-9400.html * https://www.suse.com/security/cve/CVE-2024-9401.html * https://www.suse.com/security/cve/CVE-2024-9402.html * https://www.suse.com/security/cve/CVE-2024-9680.html * https://bugzilla.suse.com/show_bug.cgi?id=1230979 * https://bugzilla.suse.com/show_bug.cgi?id=1231413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 12:30:10 -0000 Subject: SUSE-RU-2024:3616-1: moderate: Recommended update for libnettle Message-ID: <172890901009.10662.4624881701806922019@smelt2.prg2.suse.org> # Recommended update for libnettle Announcement ID: SUSE-RU-2024:3616-1 Release Date: 2024-10-14T11:04:04Z Rating: moderate References: * bsc#1221714 * bsc#1226724 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has two fixes can now be installed. ## Description: This update for libnettle fixes the following issue: * FIPS integrity checksums were not correct on s390x (bsc#1221714) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3616=1 openSUSE-SLE-15.6-2024-3616=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3616=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libnettle8-3.9.1-150600.3.2.1 * nettle-debuginfo-3.9.1-150600.3.2.1 * libhogweed6-3.9.1-150600.3.2.1 * libnettle8-debuginfo-3.9.1-150600.3.2.1 * libhogweed6-debuginfo-3.9.1-150600.3.2.1 * nettle-3.9.1-150600.3.2.1 * libnettle-devel-3.9.1-150600.3.2.1 * libnettle-debugsource-3.9.1-150600.3.2.1 * openSUSE Leap 15.6 (x86_64) * libnettle8-32bit-debuginfo-3.9.1-150600.3.2.1 * libhogweed6-32bit-3.9.1-150600.3.2.1 * libhogweed6-32bit-debuginfo-3.9.1-150600.3.2.1 * libnettle-devel-32bit-3.9.1-150600.3.2.1 * libnettle8-32bit-3.9.1-150600.3.2.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libhogweed6-64bit-debuginfo-3.9.1-150600.3.2.1 * libhogweed6-64bit-3.9.1-150600.3.2.1 * libnettle-devel-64bit-3.9.1-150600.3.2.1 * libnettle8-64bit-debuginfo-3.9.1-150600.3.2.1 * libnettle8-64bit-3.9.1-150600.3.2.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libnettle8-3.9.1-150600.3.2.1 * libhogweed6-3.9.1-150600.3.2.1 * libnettle8-debuginfo-3.9.1-150600.3.2.1 * libhogweed6-debuginfo-3.9.1-150600.3.2.1 * libnettle-devel-3.9.1-150600.3.2.1 * libnettle-debugsource-3.9.1-150600.3.2.1 * Basesystem Module 15-SP6 (x86_64) * libnettle8-32bit-3.9.1-150600.3.2.1 * libhogweed6-32bit-debuginfo-3.9.1-150600.3.2.1 * libnettle8-32bit-debuginfo-3.9.1-150600.3.2.1 * libhogweed6-32bit-3.9.1-150600.3.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221714 * https://bugzilla.suse.com/show_bug.cgi?id=1226724 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 12:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 12:30:13 -0000 Subject: SUSE-SU-2024:3615-1: moderate: Security update for wireshark Message-ID: <172890901377.10662.15551447899379886331@smelt2.prg2.suse.org> # Security update for wireshark Announcement ID: SUSE-SU-2024:3615-1 Release Date: 2024-10-14T11:03:49Z Rating: moderate References: * bsc#1231476 Cross-References: * CVE-2024-9781 CVSS scores: * CVE-2024-9781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-9781 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for wireshark fixes the following issues: Update to Wireshark 4.2.8: * CVE-2024-9781: Fixed AppleTalk and RELOAD Framing dissector crash (bsc#1231476). * Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.2.8.html ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3615=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3615=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3615=1 openSUSE-SLE-15.6-2024-3615=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libwireshark17-debuginfo-4.2.8-150600.18.14.1 * libwiretap14-debuginfo-4.2.8-150600.18.14.1 * libwiretap14-4.2.8-150600.18.14.1 * libwsutil15-debuginfo-4.2.8-150600.18.14.1 * wireshark-debugsource-4.2.8-150600.18.14.1 * libwireshark17-4.2.8-150600.18.14.1 * wireshark-4.2.8-150600.18.14.1 * wireshark-debuginfo-4.2.8-150600.18.14.1 * libwsutil15-4.2.8-150600.18.14.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * wireshark-debugsource-4.2.8-150600.18.14.1 * wireshark-ui-qt-debuginfo-4.2.8-150600.18.14.1 * wireshark-devel-4.2.8-150600.18.14.1 * wireshark-debuginfo-4.2.8-150600.18.14.1 * wireshark-ui-qt-4.2.8-150600.18.14.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libwireshark17-debuginfo-4.2.8-150600.18.14.1 * libwiretap14-debuginfo-4.2.8-150600.18.14.1 * libwiretap14-4.2.8-150600.18.14.1 * libwsutil15-debuginfo-4.2.8-150600.18.14.1 * wireshark-debugsource-4.2.8-150600.18.14.1 * wireshark-ui-qt-debuginfo-4.2.8-150600.18.14.1 * libwireshark17-4.2.8-150600.18.14.1 * wireshark-devel-4.2.8-150600.18.14.1 * wireshark-4.2.8-150600.18.14.1 * wireshark-debuginfo-4.2.8-150600.18.14.1 * libwsutil15-4.2.8-150600.18.14.1 * wireshark-ui-qt-4.2.8-150600.18.14.1 ## References: * https://www.suse.com/security/cve/CVE-2024-9781.html * https://bugzilla.suse.com/show_bug.cgi?id=1231476 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 12:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 12:30:17 -0000 Subject: SUSE-SU-2024:3614-1: critical: Security update for MozillaFirefox Message-ID: <172890901723.10662.1792702917306478093@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2024:3614-1 Release Date: 2024-10-14T10:01:38Z Rating: critical References: * bsc#1230979 * bsc#1231413 Cross-References: * CVE-2024-8900 * CVE-2024-9392 * CVE-2024-9393 * CVE-2024-9394 * CVE-2024-9396 * CVE-2024-9397 * CVE-2024-9398 * CVE-2024-9399 * CVE-2024-9400 * CVE-2024-9401 * CVE-2024-9402 * CVE-2024-9680 CVSS scores: * CVE-2024-8900 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-9392 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9392 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9392 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9393 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9393 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9393 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9394 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9394 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9394 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9396 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-9396 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-9396 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9397 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9397 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9397 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-9398 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-9398 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-9398 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-9399 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-9399 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-9400 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-9400 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-9400 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9401 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9401 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9401 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9402 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9402 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9402 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9680 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9680 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 12 vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 128.3.1 ESR MFSA 2024-51 (bsc#1231413) * CVE-2024-9680: Use-after-free in Animation timeline (bmo#1923344) Also includes the following CVEs from MFSA 2024-47 (bsc#1230979) * CVE-2024-9392: Compromised content process can bypass site isolation (bmo#1899154, bmo#1905843) * CVE-2024-9393: Cross-origin access to PDF contents through multipart responses (bmo#1918301) * CVE-2024-9394: Cross-origin access to JSON contents through multipart responses (bmo#1918874) * CVE-2024-8900: Clipboard write permission bypass (bmo#1872841) * CVE-2024-9396: Potential memory corruption may occur when cloning certain objects (bmo#1912471) * CVE-2024-9397: Potential directory upload bypass via clickjacking (bmo#1916659) * CVE-2024-9398: External protocol handlers could be enumerated via popups (bmo#1881037) * CVE-2024-9399: Specially crafted WebTransport requests could lead to denial of service (bmo#1907726) * CVE-2024-9400: Potential memory corruption during JIT compilation (bmo#1915249) * CVE-2024-9401: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 (bmo#1872744, bmo#1897792, bmo#1911317, bmo#1916476) * CVE-2024-9402: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3i (bmo#1872744, bmo#1897792, bmo#1911317, bmo#1913445, bmo#1914106, bmo#1914475, bmo#1914963, bmo#1915008, bmo#1916476) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3614=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3614=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3614=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3614=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3614=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3614=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3614=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3614=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3614=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3614=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3614=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3614=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3614=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3614=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3614=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3614=1 ## Package List: * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * Desktop Applications Module 15-SP5 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * Desktop Applications Module 15-SP6 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * SUSE Enterprise Storage 7.1 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-branding-upstream-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * openSUSE Leap 15.5 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-128.3.1-150200.152.155.1 * MozillaFirefox-debugsource-128.3.1-150200.152.155.1 * MozillaFirefox-translations-other-128.3.1-150200.152.155.1 * MozillaFirefox-branding-upstream-128.3.1-150200.152.155.1 * MozillaFirefox-translations-common-128.3.1-150200.152.155.1 * MozillaFirefox-128.3.1-150200.152.155.1 * openSUSE Leap 15.6 (noarch) * MozillaFirefox-devel-128.3.1-150200.152.155.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8900.html * https://www.suse.com/security/cve/CVE-2024-9392.html * https://www.suse.com/security/cve/CVE-2024-9393.html * https://www.suse.com/security/cve/CVE-2024-9394.html * https://www.suse.com/security/cve/CVE-2024-9396.html * https://www.suse.com/security/cve/CVE-2024-9397.html * https://www.suse.com/security/cve/CVE-2024-9398.html * https://www.suse.com/security/cve/CVE-2024-9399.html * https://www.suse.com/security/cve/CVE-2024-9400.html * https://www.suse.com/security/cve/CVE-2024-9401.html * https://www.suse.com/security/cve/CVE-2024-9402.html * https://www.suse.com/security/cve/CVE-2024-9680.html * https://bugzilla.suse.com/show_bug.cgi?id=1230979 * https://bugzilla.suse.com/show_bug.cgi?id=1231413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 12:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 12:30:22 -0000 Subject: SUSE-RU-2024:3613-1: moderate: Recommended update for clone-master-clean-up Message-ID: <172890902244.10662.1058130710037520340@smelt2.prg2.suse.org> # Recommended update for clone-master-clean-up Announcement ID: SUSE-RU-2024:3613-1 Release Date: 2024-10-14T09:58:20Z Rating: moderate References: * bsc#1221533 * bsc#1229217 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for clone-master-clean-up fixes the following issues: * Minor version update: 1.13. * Solving clone-master-clean-up error on a SLES minimal installation (bsc#1221533). The script died with the error message: "cp: cannot stat 'journald.conf': No such file or directory" * modified fstab from UUID to /dev/sdx. (bsc#1229217). * Introduce two command line parameters: -n, --dont-ask suppresses all requests. -f, --dont-change-fstab Do not swap UUID and label into device name in fstab. Without this parameters it behaves as usual. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3613=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3613=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3613=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3613=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3613=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3613=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3613=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3613=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3613=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3613=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3613=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3613=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3613=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3613=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3613=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3613=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3613=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3613=1 ## Package List: * openSUSE Leap 15.5 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * openSUSE Leap 15.6 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * Server Applications Module 15-SP5 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * Server Applications Module 15-SP6 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Manager Proxy 4.3 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Manager Server 4.3 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 * SUSE Enterprise Storage 7.1 (noarch) * clone-master-clean-up-1.13-150100.3.26.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221533 * https://bugzilla.suse.com/show_bug.cgi?id=1229217 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 12:30:26 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 12:30:26 -0000 Subject: SUSE-RU-2024:3612-1: moderate: Recommended update for lifecycle-data-sle-live-patching Message-ID: <172890902692.10662.311352904587216229@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-live-patching Announcement ID: SUSE-RU-2024:3612-1 Release Date: 2024-10-14T09:40:30Z Rating: moderate References: * bsc#1020320 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 12 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for lifecycle-data-sle-live-patching fixes the following issues: * Added data for 4_12_14-122_222, 4_12_14-122_225. (bsc#1020320) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12 zypper in -t patch SUSE-SLE-Live-Patching-12-2024-3612=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-3612=1 ## Package List: * SUSE Linux Enterprise Live Patching 12 (noarch) * lifecycle-data-sle-live-patching-1-10.152.1 * SUSE Linux Enterprise Live Patching 12-SP5 (noarch) * lifecycle-data-sle-live-patching-1-10.152.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1020320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 12:30:30 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 12:30:30 -0000 Subject: SUSE-RU-2024:3611-1: moderate: Recommended update for lifecycle-data-sle-module-live-patching Message-ID: <172890903047.10662.7118706334906691091@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-module-live-patching Announcement ID: SUSE-RU-2024:3611-1 Release Date: 2024-10-14T09:40:19Z Rating: moderate References: * bsc#1020320 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for lifecycle-data-sle-module-live-patching fixes the following issues: * Added data for 5_14_21-150400_24_125, 5_14_21-150400_24_128, 5_14_21-150500_55_73, 5_3_18-150200_24_197, 5_3_18-150200_24_200, 5_3_18-150300_59_167, 5_3_18-150300_59_170, 6_4_0-150600_23_14, 6_4_0-150600_23_17, +kernel-livepatch-5_14_21-150500_13_64-rt, _,+kernel- livepatch-6_4_0-150600_10_5-rt,_ ,+kernel-livepatch-6_4_0-150600_8-rt,*. (bsc#1020320) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3611=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3611=1 * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-3611=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-3611=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3611=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3611=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3611=1 ## Package List: * openSUSE Leap 15.5 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.117.1 * openSUSE Leap 15.6 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.117.1 * SUSE Linux Enterprise Live Patching 15-SP2 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.117.1 * SUSE Linux Enterprise Live Patching 15-SP3 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.117.1 * SUSE Linux Enterprise Live Patching 15-SP4 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.117.1 * SUSE Linux Enterprise Live Patching 15-SP5 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.117.1 * SUSE Linux Enterprise Live Patching 15-SP6 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.117.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1020320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 12:30:33 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 12:30:33 -0000 Subject: SUSE-RU-2024:3609-1: moderate: Recommended update for SLES-release Message-ID: <172890903398.10662.16666708688295610394@smelt2.prg2.suse.org> # Recommended update for SLES-release Announcement ID: SUSE-RU-2024:3609-1 Release Date: 2024-10-14T09:39:17Z Rating: moderate References: * bsc#1227100 * bsc#1230135 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 An update that has two fixes can now be installed. ## Description: This update for SLES-release fixes the following issues: * update codestream end date (bsc#1227100) * added weakremover(libsemanage1) (bsc#1230135) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3609=1 * SUSE Linux Enterprise Server 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-2024-3609=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * sles-release-15.6-150600.64.3.1 * SUSE Linux Enterprise Server 15 SP6 (aarch64 ppc64le s390x x86_64) * sles-release-15.6-150600.64.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1227100 * https://bugzilla.suse.com/show_bug.cgi?id=1230135 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 12:30:36 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 12:30:36 -0000 Subject: SUSE-RU-2024:3608-1: low: Recommended update for chromaprint Message-ID: <172890903651.10662.8759744102786687414@smelt2.prg2.suse.org> # Recommended update for chromaprint Announcement ID: SUSE-RU-2024:3608-1 Release Date: 2024-10-14T09:39:08Z Rating: low References: * bsc#1229135 Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for chromaprint fixes the following issues: * Add libchromaprint1 to PackeHub 15-SP6 (bsc#1229135) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3608=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3608=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3608=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3608=1 ## Package List: * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libchromaprint1-1.4.3-150200.3.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * chromaprint-fpcalc-debuginfo-1.4.3-150200.3.2.1 * libchromaprint1-1.4.3-150200.3.2.1 * libchromaprint-devel-1.4.3-150200.3.2.1 * chromaprint-debugsource-1.4.3-150200.3.2.1 * chromaprint-fpcalc-1.4.3-150200.3.2.1 * libchromaprint1-debuginfo-1.4.3-150200.3.2.1 * openSUSE Leap 15.5 (x86_64) * libchromaprint1-32bit-debuginfo-1.4.3-150200.3.2.1 * libchromaprint1-32bit-1.4.3-150200.3.2.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * chromaprint-fpcalc-debuginfo-1.4.3-150200.3.2.1 * libchromaprint1-1.4.3-150200.3.2.1 * libchromaprint-devel-1.4.3-150200.3.2.1 * chromaprint-debugsource-1.4.3-150200.3.2.1 * chromaprint-fpcalc-1.4.3-150200.3.2.1 * libchromaprint1-debuginfo-1.4.3-150200.3.2.1 * openSUSE Leap 15.6 (x86_64) * libchromaprint1-32bit-debuginfo-1.4.3-150200.3.2.1 * libchromaprint1-32bit-1.4.3-150200.3.2.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * chromaprint-debugsource-1.4.3-150200.3.2.1 * libchromaprint1-1.4.3-150200.3.2.1 * libchromaprint1-debuginfo-1.4.3-150200.3.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229135 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 16:30:04 -0000 Subject: SUSE-RU-2024:3619-1: low: Recommended update for python-dbus-python, python-qt5-sip, python-qt5 Message-ID: <172892340469.11128.6752031910897136137@smelt2.prg2.suse.org> # Recommended update for python-dbus-python, python-qt5-sip, python-qt5 Announcement ID: SUSE-RU-2024:3619-1 Release Date: 2024-10-14T12:14:05Z Rating: low References: * bsc#1229135 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for python-dbus-python, python-qt5-sip, python-qt5 fixes the following issues: * Add python311-qt5, python311-qt5-sip, and python311-dbus-python to SLE-15-SP6 Subpackages (bsc#1229135) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3619=1 openSUSE-SLE-15.6-2024-3619=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3619=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python311-qt5-debuginfo-5.15.10-150600.3.2.1 * python-qt5-debugsource-5.15.10-150600.3.2.1 * python311-qt5-sip-12.13.0-150600.4.2.1 * python311-qt5-5.15.10-150600.3.2.1 * python311-dbus-python-devel-1.3.2-150600.3.2.1 * python311-qt5-sip-debuginfo-12.13.0-150600.4.2.1 * python311-qt5-remoteobjects-debuginfo-5.15.10-150600.3.2.1 * python311-qt5-quick3d-devel-5.15.10-150600.3.2.1 * python311-qt5-remoteobjects-devel-5.15.10-150600.3.2.1 * python311-qt5-devel-5.15.10-150600.3.2.1 * python-dbus-python-common-devel-1.3.2-150600.3.2.1 * python311-qt5-quick3d-5.15.10-150600.3.2.1 * python311-dbus-python-debuginfo-1.3.2-150600.3.2.1 * python311-dbus-python-1.3.2-150600.3.2.1 * python311-qt5-devel-debuginfo-5.15.10-150600.3.2.1 * python311-qt5-quick3d-debuginfo-5.15.10-150600.3.2.1 * python-qt5-debuginfo-5.15.10-150600.3.2.1 * python-dbus-python-debugsource-1.3.2-150600.3.2.1 * python311-qt5-remoteobjects-5.15.10-150600.3.2.1 * python-qt5-sip-debugsource-12.13.0-150600.4.2.1 * openSUSE Leap 15.6 (noarch) * python311-qt5-doc-5.15.10-150600.3.2.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * python-qt5-debugsource-5.15.10-150600.3.2.1 * python311-qt5-sip-12.13.0-150600.4.2.1 * python311-qt5-5.15.10-150600.3.2.1 * python311-dbus-python-1.3.2-150600.3.2.1 * python-qt5-debuginfo-5.15.10-150600.3.2.1 * python-dbus-python-debugsource-1.3.2-150600.3.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229135 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 16:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 16:30:10 -0000 Subject: SUSE-RU-2024:3618-1: low: Recommended update for libgepub Message-ID: <172892341090.11128.13831542356581259480@smelt2.prg2.suse.org> # Recommended update for libgepub Announcement ID: SUSE-RU-2024:3618-1 Release Date: 2024-10-14T12:13:45Z Rating: low References: * bsc#1228157 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for libgepub fixes the following issues: * Add libgepub-0_7-0 to Package Hub Subpackages (bsc#1228157) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3618=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3618=1 openSUSE-SLE-15.6-2024-3618=1 ## Package List: * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libgepub-debugsource-0.7.1-150600.3.2.1 * libgepub-0_7-0-0.7.1-150600.3.2.1 * libgepub-devel-0.7.1-150600.3.2.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libgepub-devel-0.7.1-150600.3.2.1 * libgepub-0_7-0-0.7.1-150600.3.2.1 * libgepub-0_7-0-debuginfo-0.7.1-150600.3.2.1 * libgepub-debugsource-0.7.1-150600.3.2.1 * typelib-1_0-Gepub-0_7-0.7.1-150600.3.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228157 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 16:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 16:30:18 -0000 Subject: SUSE-SU-2024:3617-1: moderate: Security update for the Linux Kernel Message-ID: <172892341865.11128.16515435467374111442@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3617-1 Release Date: 2024-10-14T12:07:08Z Rating: moderate References: * bsc#1214298 * bsc#1226606 * bsc#1227764 * bsc#1228487 * bsc#1228654 * bsc#1230434 Cross-References: * CVE-2024-38538 * CVE-2024-40902 * CVE-2024-42104 * CVE-2024-42148 * CVE-2024-45021 CVSS scores: * CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 11 SP4 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606). * CVE-2024-40902: jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227764). * CVE-2024-42104: nilfs2: add missing check for inode numbers on directory entries (bsc#1228654). * CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). The following non-security bugs were fixed: * alarmtimer: Lock k_itimer during timer callback (bsc#1214298). * alarmtimers: Add alarm_forward functionality (bsc#1214298). * alarmtimers: Change alarmtimer functions to return alarmtimer_restart (bsc#1214298). * alarmtimers: Push rearming peroidic timers down into alamrtimer (bsc#1214298). * alarmtimers: Remove interval cap limit hack (bsc#1214298). * kABI fix for alarmtimer_restart functionality (bsc#1214298). * kABI fix update for alarm_forward (bsc#1214298). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-3617=1 * SUSE Linux Enterprise Server 11 SP4 zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-3617=1 ## Package List: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 (nosrc x86_64) * kernel-default-3.0.101-108.165.1 * kernel-xen-3.0.101-108.165.1 * kernel-trace-3.0.101-108.165.1 * kernel-ec2-3.0.101-108.165.1 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 (x86_64) * kernel-default-base-3.0.101-108.165.1 * kernel-xen-base-3.0.101-108.165.1 * kernel-default-devel-3.0.101-108.165.1 * kernel-ec2-base-3.0.101-108.165.1 * kernel-trace-devel-3.0.101-108.165.1 * kernel-source-3.0.101-108.165.1 * kernel-xen-devel-3.0.101-108.165.1 * kernel-ec2-devel-3.0.101-108.165.1 * kernel-trace-base-3.0.101-108.165.1 * kernel-syms-3.0.101-108.165.1 * SUSE Linux Enterprise Server 11 SP4 (nosrc x86_64) * kernel-default-3.0.101-108.165.1 * kernel-xen-3.0.101-108.165.1 * kernel-trace-3.0.101-108.165.1 * kernel-ec2-3.0.101-108.165.1 * SUSE Linux Enterprise Server 11 SP4 (x86_64) * kernel-default-base-3.0.101-108.165.1 * kernel-xen-base-3.0.101-108.165.1 * kernel-default-devel-3.0.101-108.165.1 * kernel-ec2-base-3.0.101-108.165.1 * kernel-trace-devel-3.0.101-108.165.1 * kernel-source-3.0.101-108.165.1 * kernel-xen-devel-3.0.101-108.165.1 * kernel-ec2-devel-3.0.101-108.165.1 * kernel-trace-base-3.0.101-108.165.1 * kernel-syms-3.0.101-108.165.1 ## References: * https://www.suse.com/security/cve/CVE-2024-38538.html * https://www.suse.com/security/cve/CVE-2024-40902.html * https://www.suse.com/security/cve/CVE-2024-42104.html * https://www.suse.com/security/cve/CVE-2024-42148.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://bugzilla.suse.com/show_bug.cgi?id=1214298 * https://bugzilla.suse.com/show_bug.cgi?id=1226606 * https://bugzilla.suse.com/show_bug.cgi?id=1227764 * https://bugzilla.suse.com/show_bug.cgi?id=1228487 * https://bugzilla.suse.com/show_bug.cgi?id=1228654 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 20:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 20:30:05 -0000 Subject: SUSE-RU-2024:3621-1: moderate: Recommended update for open-iscsi Message-ID: <172893780524.13782.16073837637959428108@smelt2.prg2.suse.org> # Recommended update for open-iscsi Announcement ID: SUSE-RU-2024:3621-1 Release Date: 2024-10-14T17:00:42Z Rating: moderate References: * bsc#1228084 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for open-iscsi fixes the following issues: * Update to version 2.1.10.suse, code bugfixing and behavior : * Turn off iSCSI NOP-Outs, by default. * Change a discovery function to (void) return type. * grammar nitpicks and improving comments. * Make it visible when memory allocation failure. * Better handle multiple iscsiadm commands and allow hostnames in node-mode commands. * Modify workqueue priority set. * iscsid: Rescan devices on relogin. * Add missing characters in README. * Fix: add missing underline in usr/iscsid_req.h * Fix firmware targets startup to always be "onboot" (bsc#1228084). * Fix gcc issues. * Fix read specific sysfs value "off" of session attribute. * Fix bug where abort_tmo read failures were ignored. * Fix memory leak in iscsi_check_session_use_count. * Fix authmethod check by printing a warning message when CHAP used and authmethod=None. * Updated to latest upstream: two small changes, with no known functional changes: * Incorrect documentation for `iscsiadm -m session` print level * Stop using deprecated functions: inet_aton(), inet_ntoa() * Stopped using pre-prepared tarballs for the build, instead now using a service file to get latest SUSE sources directly. which were created by a shell script, and added a service generated file with the form: * open-iscsi-2.1.9.suse+TAG_OFFSET.tar.xz where: * TAG_OFFSET is of the form "COMMIT_COUNT.HASH" * COMMIT_COUNT is the count of commits since 2.1.9-suse (in this case), and HASH is the git commit hash being used. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3621=1 openSUSE-SLE-15.6-2024-3621=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3621=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * iscsiuio-debuginfo-0.7.8.8-150600.51.3.2 * libopeniscsiusr0-0.2.0-150600.51.3.2 * open-iscsi-2.1.10-150600.51.3.2 * libopeniscsiusr0-debuginfo-0.2.0-150600.51.3.2 * open-iscsi-debugsource-2.1.10-150600.51.3.2 * iscsiuio-0.7.8.8-150600.51.3.2 * open-iscsi-devel-2.1.10-150600.51.3.2 * open-iscsi-debuginfo-2.1.10-150600.51.3.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * iscsiuio-debuginfo-0.7.8.8-150600.51.3.2 * libopeniscsiusr0-0.2.0-150600.51.3.2 * open-iscsi-2.1.10-150600.51.3.2 * libopeniscsiusr0-debuginfo-0.2.0-150600.51.3.2 * open-iscsi-debugsource-2.1.10-150600.51.3.2 * iscsiuio-0.7.8.8-150600.51.3.2 * open-iscsi-devel-2.1.10-150600.51.3.2 * open-iscsi-debuginfo-2.1.10-150600.51.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228084 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 14 20:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 14 Oct 2024 20:30:08 -0000 Subject: SUSE-RU-2024:3620-1: moderate: Recommended update for hawk2 Message-ID: <172893780897.13782.2865353064399390945@smelt2.prg2.suse.org> # Recommended update for hawk2 Announcement ID: SUSE-RU-2024:3620-1 Release Date: 2024-10-14T16:53:08Z Rating: moderate References: * bsc#1219831 * bsc#1230672 * bsc#1230674 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has three fixes can now be installed. ## Description: This update for hawk2 fixes the following issues: * Update to version v2.6.5: * Fix: hb_report: indicate the 'crm report' failure (bsc#1230674). * Dev: wizards: don't use root password (bsc#1230672). * Fix: decode the resource type from URI. * Fix: use ocf:heartbeat:Dummy instead of ocf:heartbeat:anything . * Make compatible with sle15.2 . * Fix: cibtools: adjust to the new cibadmin format (bsc#1219831). * Use crm_attribute --list-options. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-3620=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3620=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3620=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3620=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3620=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-3620=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-3620=1 ## Package List: * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debuginfo-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debugsource-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debuginfo-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debugsource-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debuginfo-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debugsource-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debuginfo-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debugsource-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debuginfo-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debugsource-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debuginfo-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debugsource-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debuginfo-2.6.5+git.1727339846.0abbc129-150000.3.53.3 * hawk2-debugsource-2.6.5+git.1727339846.0abbc129-150000.3.53.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219831 * https://bugzilla.suse.com/show_bug.cgi?id=1230672 * https://bugzilla.suse.com/show_bug.cgi?id=1230674 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 08:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 08:30:08 -0000 Subject: SUSE-SU-2024:3628-1: important: Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) Message-ID: <172898100881.6932.17381472271541343605@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) Announcement ID: SUSE-SU-2024:3628-1 Release Date: 2024-10-15T03:33:34Z Rating: important References: * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228786 Cross-References: * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 CVSS scores: * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_8 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3628=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_8-rt-4-150600.3.1 * kernel-livepatch-6_4_0-150600_8-rt-debuginfo-4-150600.3.1 * kernel-livepatch-SLE15-SP6-RT_Update_0-debugsource-4-150600.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 08:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 08:30:13 -0000 Subject: SUSE-SU-2024:3627-1: important: Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5) Message-ID: <172898101315.6932.2210614954932866643@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3627-1 Release Date: 2024-10-15T03:33:31Z Rating: important References: * bsc#1228349 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2024-40909 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_61 fixes several issues. The following security issues were fixed: * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1228349). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3627=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3627=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_17-debugsource-2-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_61-rt-debuginfo-2-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_61-rt-2-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_17-debugsource-2-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_61-rt-debuginfo-2-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_61-rt-2-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1228349 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 08:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 08:30:16 -0000 Subject: SUSE-SU-2024:3626-1: important: Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) Message-ID: <172898101633.6932.12242683672667952763@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) Announcement ID: SUSE-SU-2024:3626-1 Release Date: 2024-10-15T02:33:30Z Rating: important References: * bsc#1228349 * bsc#1228786 Cross-References: * CVE-2024-40909 * CVE-2024-40954 CVSS scores: * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_5 fixes several issues. The following security issues were fixed: * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1228349). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3626=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource-3-150600.1.8.1 * kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo-3-150600.1.8.1 * kernel-livepatch-6_4_0-150600_10_5-rt-3-150600.1.8.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://bugzilla.suse.com/show_bug.cgi?id=1228349 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 08:30:26 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 08:30:26 -0000 Subject: SUSE-SU-2024:3625-1: important: Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5) Message-ID: <172898102628.6932.10264249614227149500@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3625-1 Release Date: 2024-10-15T01:03:49Z Rating: important References: * bsc#1223363 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2023-52846 * CVE-2024-26828 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves nine vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_55 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3625=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3625=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_15-debugsource-5-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_55-rt-debuginfo-5-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_15-debugsource-5-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_55-rt-debuginfo-5-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 08:30:44 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 08:30:44 -0000 Subject: SUSE-SU-2024:3623-1: important: Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) Message-ID: <172898104470.6932.7283585304527889063@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3623-1 Release Date: 2024-10-14T21:35:12Z Rating: important References: * bsc#1220145 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225310 * bsc#1225312 * bsc#1225313 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52502 * CVE-2023-52846 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26610 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 19 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_38 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3623=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3623=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_11-debugsource-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_38-rt-debuginfo-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_11-debugsource-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_38-rt-debuginfo-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 08:30:50 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 08:30:50 -0000 Subject: SUSE-SU-2024:3624-1: important: Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) Message-ID: <172898105038.6932.11546966548570743132@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3624-1 Release Date: 2024-10-15T01:03:40Z Rating: important References: * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_24 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3622=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-3624=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3624=1 SUSE-2024-3622=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_18-rt-debuginfo-14-150500.2.1 * kernel-livepatch-5_14_21-150500_13_18-rt-14-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-13-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_5-debugsource-14-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-13-150500.2.1 * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_18-rt-debuginfo-14-150500.2.1 * kernel-livepatch-5_14_21-150500_13_18-rt-14-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-13-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_5-debugsource-14-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-13-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 08:30:54 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 08:30:54 -0000 Subject: SUSE-SU-2024:3629-1: important: Security update for MozillaThunderbird Message-ID: <172898105444.6932.10175178034537179107@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2024:3629-1 Release Date: 2024-10-15T06:57:43Z Rating: important References: * bsc#1230979 * bsc#1231413 Cross-References: * CVE-2024-8900 * CVE-2024-9392 * CVE-2024-9393 * CVE-2024-9394 * CVE-2024-9396 * CVE-2024-9397 * CVE-2024-9398 * CVE-2024-9399 * CVE-2024-9400 * CVE-2024-9401 * CVE-2024-9402 * CVE-2024-9680 CVSS scores: * CVE-2024-8900 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-9392 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9392 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9392 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9393 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9393 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9393 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9394 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9394 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9394 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9396 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-9396 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-9396 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9397 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9397 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9397 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-9398 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-9398 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-9398 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-9399 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-9399 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-9400 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-9400 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-9400 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9401 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9401 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9401 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9402 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9402 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9402 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9680 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9680 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves 12 vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: Update to Mozilla Thunderbird 128.3.1 (MFSA 2024-51, bsc#1231413): * CVE-2024-9680: Use-after-free in Animation timeline Update to Mozilla Thunderbird 128.3 (MFSA 2024-49, bsc#1230979): * CVE-2024-9392: Compromised content process can bypass site isolation * CVE-2024-9393: Cross-origin access to PDF contents through multipart responses * CVE-2024-9394: Cross-origin access to JSON contents through multipart responses * CVE-2024-8900: Clipboard write permission bypass * CVE-2024-9396: Potential memory corruption may occur when cloning certain objects * CVE-2024-9397: Potential directory upload bypass via clickjacking * CVE-2024-9398: External protocol handlers could be enumerated via popups * CVE-2024-9399: Specially crafted WebTransport requests could lead to denial of service * CVE-2024-9400: Potential memory corruption during JIT compilation * CVE-2024-9401: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 * CVE-2024-9402: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 Other fixes: * fixed: Opening an EML file with a 'mailto:' link did not work * fixed: Collapsed POP3 account folder was expanded after emptying trash on exit * fixed: "Mark Folder Read" on a cross-folder search marked all underlying folders read * fixed: Unable to open/view attached OpenPGP encrypted messages * fixed: Unable to "Decrypt and Open" an attached OpenPGP key file * fixed: Subject could disappear when replying to a message saved in an EML file * fixed: OAuth2 authentication method was not available when adding SMTP server * fixed: Unable to subscribe to .ics calendars in some situations * fixed: Visual and UX improvements ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3629=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3629=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3629=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3629=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3629=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3629=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3629=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-common-128.3.0-150200.8.182.1 * MozillaThunderbird-debugsource-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-other-128.3.0-150200.8.182.1 * MozillaThunderbird-debuginfo-128.3.0-150200.8.182.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-common-128.3.0-150200.8.182.1 * MozillaThunderbird-debugsource-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-other-128.3.0-150200.8.182.1 * MozillaThunderbird-debuginfo-128.3.0-150200.8.182.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * MozillaThunderbird-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-common-128.3.0-150200.8.182.1 * MozillaThunderbird-debugsource-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-other-128.3.0-150200.8.182.1 * MozillaThunderbird-debuginfo-128.3.0-150200.8.182.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-common-128.3.0-150200.8.182.1 * MozillaThunderbird-debugsource-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-other-128.3.0-150200.8.182.1 * MozillaThunderbird-debuginfo-128.3.0-150200.8.182.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * MozillaThunderbird-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-common-128.3.0-150200.8.182.1 * MozillaThunderbird-debugsource-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-other-128.3.0-150200.8.182.1 * MozillaThunderbird-debuginfo-128.3.0-150200.8.182.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * MozillaThunderbird-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-common-128.3.0-150200.8.182.1 * MozillaThunderbird-debugsource-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-other-128.3.0-150200.8.182.1 * MozillaThunderbird-debuginfo-128.3.0-150200.8.182.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-common-128.3.0-150200.8.182.1 * MozillaThunderbird-debugsource-128.3.0-150200.8.182.1 * MozillaThunderbird-translations-other-128.3.0-150200.8.182.1 * MozillaThunderbird-debuginfo-128.3.0-150200.8.182.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8900.html * https://www.suse.com/security/cve/CVE-2024-9392.html * https://www.suse.com/security/cve/CVE-2024-9393.html * https://www.suse.com/security/cve/CVE-2024-9394.html * https://www.suse.com/security/cve/CVE-2024-9396.html * https://www.suse.com/security/cve/CVE-2024-9397.html * https://www.suse.com/security/cve/CVE-2024-9398.html * https://www.suse.com/security/cve/CVE-2024-9399.html * https://www.suse.com/security/cve/CVE-2024-9400.html * https://www.suse.com/security/cve/CVE-2024-9401.html * https://www.suse.com/security/cve/CVE-2024-9402.html * https://www.suse.com/security/cve/CVE-2024-9680.html * https://bugzilla.suse.com/show_bug.cgi?id=1230979 * https://bugzilla.suse.com/show_bug.cgi?id=1231413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 12:30:10 -0000 Subject: SUSE-SU-2024:3636-1: important: Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5) Message-ID: <172899541050.7152.11015643449200631326@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3636-1 Release Date: 2024-10-15T09:33:31Z Rating: important References: * bsc#1223683 * bsc#1225099 * bsc#1225739 * bsc#1228349 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2023-52846 * CVE-2024-26923 * CVE-2024-36899 * CVE-2024-40909 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves six vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_58 fixes several issues. The following security issues were fixed: * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1228349). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3636=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3636=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_16-debugsource-4-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_58-rt-debuginfo-4-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_16-debugsource-4-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_58-rt-debuginfo-4-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1228349 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 12:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 12:30:20 -0000 Subject: SUSE-SU-2024:3632-1: important: Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5) Message-ID: <172899542020.7152.11965643810688805980@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3632-1 Release Date: 2024-10-15T09:03:56Z Rating: important References: * bsc#1223363 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2023-52846 * CVE-2024-26828 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves nine vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_52 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3632=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3632=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_52-rt-debuginfo-5-150500.11.8.1 * kernel-livepatch-SLE15-SP5-RT_Update_14-debugsource-5-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_52-rt-debuginfo-5-150500.11.8.1 * kernel-livepatch-SLE15-SP5-RT_Update_14-debugsource-5-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 12:30:41 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 12:30:41 -0000 Subject: SUSE-SU-2024:3631-1: important: Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5) Message-ID: <172899544105.7152.1585705186832031420@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3631-1 Release Date: 2024-10-15T09:03:51Z Rating: important References: * bsc#1219296 * bsc#1220145 * bsc#1220211 * bsc#1220828 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1222882 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225310 * bsc#1225312 * bsc#1225313 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52340 * CVE-2023-52502 * CVE-2023-52846 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26585 * CVE-2024-26610 * CVE-2024-26622 * CVE-2024-26766 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52340 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 23 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_35 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220211). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828). * CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big' packets (bsc#1219296). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3631=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3631=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_35-rt-debuginfo-9-150500.11.8.1 * kernel-livepatch-SLE15-SP5-RT_Update_10-debugsource-9-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_35-rt-debuginfo-9-150500.11.8.1 * kernel-livepatch-SLE15-SP5-RT_Update_10-debugsource-9-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52340.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26585.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26622.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1219296 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220211 * https://bugzilla.suse.com/show_bug.cgi?id=1220828 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 12:30:46 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 12:30:46 -0000 Subject: SUSE-SU-2024:3635-1: important: Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5) Message-ID: <172899544668.7152.1373585282876589365@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3635-1 Release Date: 2024-10-15T09:33:26Z Rating: important References: * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_30 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3635=1 SUSE-2024-3630=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3635=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-3630=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_27-rt-12-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-11-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-12-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-11-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-11-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_27-rt-12-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-11-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-12-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-11-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-11-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 12:30:50 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 12:30:50 -0000 Subject: SUSE-RU-2024:3637-1: moderate: Recommended update for python-maturin Message-ID: <172899545004.7152.12900889044479199058@smelt2.prg2.suse.org> # Recommended update for python-maturin Announcement ID: SUSE-RU-2024:3637-1 Release Date: 2024-10-15T10:07:30Z Rating: moderate References: * bsc#1230027 Affected Products: * openSUSE Leap 15.6 An update that has one fix can now be installed. ## Description: This update for python-maturin fixes the following issues: * update vendored rust libraries including shlex to version 1.3.0 (bsc#1230027) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3637=1 openSUSE-SLE-15.6-2024-3637=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python311-maturin-1.4.0-150600.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230027 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 12:30:52 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 12:30:52 -0000 Subject: SUSE-SU-2024:3634-1: moderate: Security update for keepalived Message-ID: <172899545275.7152.4024177330854831899@smelt2.prg2.suse.org> # Security update for keepalived Announcement ID: SUSE-SU-2024:3634-1 Release Date: 2024-10-15T09:21:36Z Rating: moderate References: * bsc#1228123 Cross-References: * CVE-2024-41184 CVSS scores: * CVE-2024-41184 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for keepalived fixes the following issues: * CVE-2024-41184: Fixed integer overflow in vrrp_ipsets_handler (bsc#1228123) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3634=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3634=1 openSUSE-SLE-15.5-2024-3634=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3634=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3634=1 ## Package List: * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * keepalived-2.2.2-150500.8.5.1 * keepalived-debuginfo-2.2.2-150500.8.5.1 * keepalived-debugsource-2.2.2-150500.8.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * keepalived-2.2.2-150500.8.5.1 * keepalived-debuginfo-2.2.2-150500.8.5.1 * keepalived-debugsource-2.2.2-150500.8.5.1 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * keepalived-2.2.2-150500.8.5.1 * keepalived-debuginfo-2.2.2-150500.8.5.1 * keepalived-debugsource-2.2.2-150500.8.5.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * keepalived-2.2.2-150500.8.5.1 * keepalived-debuginfo-2.2.2-150500.8.5.1 * keepalived-debugsource-2.2.2-150500.8.5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41184.html * https://bugzilla.suse.com/show_bug.cgi?id=1228123 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 12:30:55 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 12:30:55 -0000 Subject: SUSE-SU-2024:3633-1: moderate: Security update for keepalived Message-ID: <172899545510.7152.16070571598450185662@smelt2.prg2.suse.org> # Security update for keepalived Announcement ID: SUSE-SU-2024:3633-1 Release Date: 2024-10-15T09:20:42Z Rating: moderate References: * bsc#1228123 Cross-References: * CVE-2024-41184 CVSS scores: * CVE-2024-41184 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for keepalived fixes the following issues: * CVE-2024-41184: Fixed integer overflow in vrrp_ipsets_handler (bsc#1228123) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3633=1 openSUSE-SLE-15.6-2024-3633=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3633=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * keepalived-debugsource-2.2.8-150600.3.5.1 * keepalived-2.2.8-150600.3.5.1 * keepalived-debuginfo-2.2.8-150600.3.5.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * keepalived-debugsource-2.2.8-150600.3.5.1 * keepalived-2.2.8-150600.3.5.1 * keepalived-debuginfo-2.2.8-150600.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41184.html * https://bugzilla.suse.com/show_bug.cgi?id=1228123 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 16:30:03 -0000 Subject: SUSE-SU-2024:3640-1: important: Security update for the Linux Kernel (Live Patch 50 for SLE 12 SP5) Message-ID: <172900980390.29496.8533490722870392@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 50 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:3640-1 Release Date: 2024-10-15T12:33:32Z Rating: important References: * bsc#1226325 * bsc#1228573 Cross-References: * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_183 fixes several issues. The following security issues were fixed: * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-3640=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_183-default-13-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 16:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 16:30:17 -0000 Subject: SUSE-SU-2024:3639-1: important: Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) Message-ID: <172900981733.29496.16061633576127889506@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3639-1 Release Date: 2024-10-15T12:03:52Z Rating: important References: * bsc#1221302 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225310 * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52846 * CVE-2024-26610 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 14 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_47 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3639=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3639=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_47-rt-debuginfo-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 * kernel-livepatch-SLE15-SP5-RT_Update_13-debugsource-7-150500.11.6.1 * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_47-rt-debuginfo-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 * kernel-livepatch-SLE15-SP5-RT_Update_13-debugsource-7-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 16:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 16:30:22 -0000 Subject: SUSE-SU-2024:3638-1: important: Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5) Message-ID: <172900982255.29496.9129418282395035562@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3638-1 Release Date: 2024-10-15T12:03:46Z Rating: important References: * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_21 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3638=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3638=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_6-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-debuginfo-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-13-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_6-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-debuginfo-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-13-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 20:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 20:30:18 -0000 Subject: SUSE-SU-2024:3642-1: important: Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2) Message-ID: <172902421891.30335.2983858583452821869@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:3642-1 Release Date: 2024-10-15T19:03:43Z Rating: important References: * bsc#1210619 * bsc#1218487 * bsc#1220145 * bsc#1220537 * bsc#1222685 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225302 * bsc#1225310 * bsc#1225312 * bsc#1226325 * bsc#1227651 * bsc#1228573 Cross-References: * CVE-2021-46955 * CVE-2021-47291 * CVE-2021-47378 * CVE-2021-47383 * CVE-2021-47402 * CVE-2022-48651 * CVE-2023-1829 * CVE-2023-6531 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves 18 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_183 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218487). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-3642=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP2_Update_46-debugsource-8-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_183-default-debuginfo-8-150200.5.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1218487 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225302 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 15 20:30:23 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 15 Oct 2024 20:30:23 -0000 Subject: SUSE-SU-2024:3641-1: important: Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP2) Message-ID: <172902422326.30335.10190534217041728093@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:3641-1 Release Date: 2024-10-15T19:03:34Z Rating: important References: * bsc#1225312 * bsc#1226325 * bsc#1227651 * bsc#1228573 Cross-References: * CVE-2021-47291 * CVE-2024-35861 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_178 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-3641=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP2_Update_45-debugsource-10-150200.2.1 * kernel-livepatch-5_3_18-150200_24_178-default-debuginfo-10-150200.2.1 * kernel-livepatch-5_3_18-150200_24_178-default-10-150200.2.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 08:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 08:30:08 -0000 Subject: SUSE-SU-2024:3643-1: important: Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4) Message-ID: <172906740894.4625.15816979642283646070@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:3643-1 Release Date: 2024-10-16T05:03:45Z Rating: important References: * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_92 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3643=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3643=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_92-default-debuginfo-13-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_19-debugsource-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_92-default-13-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_92-default-debuginfo-13-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_19-debugsource-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_92-default-13-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 08:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 08:30:16 -0000 Subject: SUSE-RU-2024:3645-1: important: Recommended update for installation-images Message-ID: <172906741637.4625.17537762135374044964@smelt2.prg2.suse.org> # Recommended update for installation-images Announcement ID: SUSE-RU-2024:3645-1 Release Date: 2024-10-16T07:01:07Z Rating: important References: * bsc#1215290 * bsc#1223982 * bsc#1227672 * bsc#1228736 * jsc#PED-8374 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains one feature and has four fixes can now be installed. ## Description: This update for installation-images fixes the following issues: * Version upgrade (v16.59.16). * Require `libsolv-tools` explicitly (bsc#1227672). * Revert "drop unused wget (bsc#1215290)" (bsc#1228736). * make some compression settings configurable (bsc#1223982, jsc#PED-8374). * limit compression in OBS to 4 threads * ppc64: optimize for smaller compressed initrd size * fix perl issue in test case ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3645=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3645=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * installation-images-SLES-16.59.16-150600.3.7.2 * install-initrd-SLES-16.59.16-150600.3.7.2 * skelcd-installer-SLES-16.59.16-150600.3.7.2 * installation-images-debuginfodeps-SLES-16.59.16-150600.3.7.2 * skelcd-installer-net-SLES-16.59.16-150600.3.7.2 * openSUSE Leap 15.6 (noarch) * tftpboot-installation-SLE-15-SP6-x86_64-16.59.16-150600.3.7.2 * tftpboot-installation-SLE-15-SP6-ppc64le-16.59.16-150600.3.7.2 * tftpboot-installation-SLE-15-SP6-aarch64-16.59.16-150600.3.7.2 * tftpboot-installation-SLE-15-SP6-s390x-16.59.16-150600.3.7.2 * Basesystem Module 15-SP6 (noarch) * tftpboot-installation-SLE-15-SP6-x86_64-16.59.16-150600.3.7.2 * tftpboot-installation-SLE-15-SP6-ppc64le-16.59.16-150600.3.7.2 * tftpboot-installation-SLE-15-SP6-aarch64-16.59.16-150600.3.7.2 * tftpboot-installation-SLE-15-SP6-s390x-16.59.16-150600.3.7.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215290 * https://bugzilla.suse.com/show_bug.cgi?id=1223982 * https://bugzilla.suse.com/show_bug.cgi?id=1227672 * https://bugzilla.suse.com/show_bug.cgi?id=1228736 * https://jira.suse.com/browse/PED-8374 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 08:30:21 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 08:30:21 -0000 Subject: SUSE-SU-2024:3644-1: moderate: Security update for rubygem-puma Message-ID: <172906742123.4625.14256774077545431053@smelt2.prg2.suse.org> # Security update for rubygem-puma Announcement ID: SUSE-SU-2024:3644-1 Release Date: 2024-10-16T06:55:19Z Rating: moderate References: * bsc#1218638 * bsc#1230848 Cross-References: * CVE-2024-21647 * CVE-2024-45614 CVSS scores: * CVE-2024-21647 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21647 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45614 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-45614 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2024-45614 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2024-45614 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for rubygem-puma fixes the following issues: * CVE-2024-45614: Prevent underscores from clobbering hyphen headers (bsc#1230848). * CVE-2024-21647: Fixed DoS when parsing chunked Transfer-Encoding bodies (bsc#1218638). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3644=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-3644=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-3644=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-3644=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3644=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * rubygem-puma-debugsource-4.3.12-150000.3.15.1 * ruby2.5-rubygem-puma-4.3.12-150000.3.15.1 * ruby2.5-rubygem-puma-doc-4.3.12-150000.3.15.1 * ruby2.5-rubygem-puma-debuginfo-4.3.12-150000.3.15.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-puma-4.3.12-150000.3.15.1 * ruby2.5-rubygem-puma-debuginfo-4.3.12-150000.3.15.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * rubygem-puma-debugsource-4.3.12-150000.3.15.1 * ruby2.5-rubygem-puma-4.3.12-150000.3.15.1 * ruby2.5-rubygem-puma-debuginfo-4.3.12-150000.3.15.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * rubygem-puma-debugsource-4.3.12-150000.3.15.1 * ruby2.5-rubygem-puma-4.3.12-150000.3.15.1 * ruby2.5-rubygem-puma-debuginfo-4.3.12-150000.3.15.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * rubygem-puma-debugsource-4.3.12-150000.3.15.1 * ruby2.5-rubygem-puma-4.3.12-150000.3.15.1 * ruby2.5-rubygem-puma-debuginfo-4.3.12-150000.3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21647.html * https://www.suse.com/security/cve/CVE-2024-45614.html * https://bugzilla.suse.com/show_bug.cgi?id=1218638 * https://bugzilla.suse.com/show_bug.cgi?id=1230848 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 12:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 12:30:09 -0000 Subject: SUSE-SU-2024:3655-1: important: Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) Message-ID: <172908180970.6932.7568499110622316218@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3655-1 Release Date: 2024-10-16T11:33:28Z Rating: important References: * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_31 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3655=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3655=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_6-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_31-default-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_31-default-debuginfo-13-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_6-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_31-default-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_31-default-debuginfo-13-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 12:30:25 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 12:30:25 -0000 Subject: SUSE-SU-2024:3652-1: important: Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) Message-ID: <172908182523.6932.18134172564777137328@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:3652-1 Release Date: 2024-10-16T10:04:15Z Rating: important References: * bsc#1210619 * bsc#1220145 * bsc#1220537 * bsc#1221302 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225302 * bsc#1225310 * bsc#1225312 * bsc#1226325 * bsc#1227651 * bsc#1228573 Cross-References: * CVE-2021-46955 * CVE-2021-47291 * CVE-2021-47378 * CVE-2021-47383 * CVE-2021-47402 * CVE-2022-48651 * CVE-2023-1829 * CVE-2024-23307 * CVE-2024-26610 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves 17 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_158 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3652=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-3652=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_43-debugsource-7-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_158-default-debuginfo-7-150300.7.6.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_158-preempt-7-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_158-preempt-debuginfo-7-150300.7.6.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225302 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 12:30:41 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 12:30:41 -0000 Subject: SUSE-SU-2024:3651-1: important: Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3) Message-ID: <172908184187.6932.6798606799731941027@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:3651-1 Release Date: 2024-10-16T10:04:05Z Rating: important References: * bsc#1210619 * bsc#1218487 * bsc#1220145 * bsc#1220537 * bsc#1221302 * bsc#1222685 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225302 * bsc#1225310 * bsc#1225312 * bsc#1226325 * bsc#1227651 * bsc#1228573 Cross-References: * CVE-2021-46955 * CVE-2021-47291 * CVE-2021-47378 * CVE-2021-47383 * CVE-2021-47402 * CVE-2022-48651 * CVE-2023-1829 * CVE-2023-6531 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26610 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves 19 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_153 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218487). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3651=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-3651=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_42-debugsource-8-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_153-default-debuginfo-8-150300.7.6.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_153-preempt-debuginfo-8-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_153-preempt-8-150300.7.6.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1218487 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225302 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 12:30:57 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 12:30:57 -0000 Subject: SUSE-SU-2024:3649-1: important: Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) Message-ID: <172908185715.6932.7580274050750412682@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:3649-1 Release Date: 2024-10-16T09:33:39Z Rating: important References: * bsc#1210619 * bsc#1220145 * bsc#1220537 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225302 * bsc#1225310 * bsc#1225312 * bsc#1226325 * bsc#1227651 * bsc#1228573 Cross-References: * CVE-2021-46955 * CVE-2021-47291 * CVE-2021-47378 * CVE-2021-47383 * CVE-2021-47402 * CVE-2022-48651 * CVE-2023-1829 * CVE-2024-23307 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves 16 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_188 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-3649=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_188-default-debuginfo-7-150200.5.6.1 * kernel-livepatch-SLE15-SP2_Update_47-debugsource-7-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225302 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 12:31:01 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 12:31:01 -0000 Subject: SUSE-SU-2024:3648-1: important: Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) Message-ID: <172908186147.6932.14370479930591142504@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:3648-1 Release Date: 2024-10-16T10:03:55Z Rating: important References: * bsc#1225312 * bsc#1226325 * bsc#1227651 * bsc#1228573 Cross-References: * CVE-2021-47291 * CVE-2024-35861 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_150 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-3648=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3650=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-3650=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_166-default-debuginfo-14-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_41-debugsource-14-150200.2.1 * kernel-livepatch-5_3_18-150200_24_166-default-14-150200.2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_150-default-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_150-default-debuginfo-11-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_41-debugsource-11-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_150-preempt-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_150-preempt-debuginfo-11-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_150-default-11-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 12:31:17 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 12:31:17 -0000 Subject: SUSE-SU-2024:3656-1: moderate: Security update for etcd Message-ID: <172908187751.6932.1111926422633087737@smelt2.prg2.suse.org> # Security update for etcd Announcement ID: SUSE-SU-2024:3656-1 Release Date: 2024-10-16T11:33:45Z Rating: moderate References: * bsc#1095184 * bsc#1118897 * bsc#1118898 * bsc#1118899 * bsc#1121850 * bsc#1174951 * bsc#1181400 * bsc#1183703 * bsc#1199031 * bsc#1208270 * bsc#1208297 * bsc#1210138 * bsc#1213229 * bsc#1217070 * bsc#1217950 * bsc#1218150 Cross-References: * CVE-2018-16873 * CVE-2018-16874 * CVE-2018-16875 * CVE-2018-16886 * CVE-2020-15106 * CVE-2020-15112 * CVE-2021-28235 * CVE-2022-41723 * CVE-2023-29406 * CVE-2023-47108 * CVE-2023-48795 CVSS scores: * CVE-2018-16873 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2018-16873 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-16873 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-16874 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2018-16874 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-16874 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-16875 ( SUSE ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2018-16875 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2018-16886 ( SUSE ): 6.8 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2018-16886 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2020-15106 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2020-15106 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2020-15112 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2020-15112 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-28235 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-28235 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-41723 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-29406 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-29406 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2023-47108 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 An update that solves 11 vulnerabilities and has five security fixes can now be installed. ## Description: This update for etcd fixes the following issues: Update to version 3.5.12: Security fixes: * CVE-2018-16873: Fixed remote command execution in cmd/go (bsc#1118897) * CVE-2018-16874: Fixed directory traversal in cmd/go (bsc#1118898) * CVE-2018-16875: Fixed CPU denial of service in crypto/x509 (bsc#1118899) * CVE-2018-16886: Fixed improper authentication issue when RBAC and client- cert-auth is enabled (bsc#1121850) * CVE-2020-15106: Fixed panic in decodeRecord method (bsc#1174951) * CVE-2020-15112: Fixed improper checks in entry index (bsc#1174951) * CVE-2021-28235: Fixed information discosure via debug function (bsc#1210138) * CVE-2022-41723: Fixed quadratic complexity in HPACK decoding in net/http (bsc#1208270, bsc#1208297) * CVE-2023-29406: Fixed insufficient sanitization of Host header in go net/http (bsc#1213229) * CVE-2023-47108: Fixed DoS vulnerability in otelgrpc (bsc#1217070) * CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (aka Terrapin Attack) in crypto/ssh (bsc#1217950, bsc#1218150) Other changes: * Added hardening to systemd service(s) (bsc#1181400) * Fixed static /tmp file issue (bsc#1199031) * Fixed systemd service not starting (bsc#1183703) Full changelog: https://github.com/etcd-io/etcd/compare/v3.3.1...v3.5.12 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3656=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3656=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * etcdctl-3.5.12-150000.7.6.1 * etcd-3.5.12-150000.7.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * etcdctl-3.5.12-150000.7.6.1 * etcd-3.5.12-150000.7.6.1 ## References: * https://www.suse.com/security/cve/CVE-2018-16873.html * https://www.suse.com/security/cve/CVE-2018-16874.html * https://www.suse.com/security/cve/CVE-2018-16875.html * https://www.suse.com/security/cve/CVE-2018-16886.html * https://www.suse.com/security/cve/CVE-2020-15106.html * https://www.suse.com/security/cve/CVE-2020-15112.html * https://www.suse.com/security/cve/CVE-2021-28235.html * https://www.suse.com/security/cve/CVE-2022-41723.html * https://www.suse.com/security/cve/CVE-2023-29406.html * https://www.suse.com/security/cve/CVE-2023-47108.html * https://www.suse.com/security/cve/CVE-2023-48795.html * https://bugzilla.suse.com/show_bug.cgi?id=1095184 * https://bugzilla.suse.com/show_bug.cgi?id=1118897 * https://bugzilla.suse.com/show_bug.cgi?id=1118898 * https://bugzilla.suse.com/show_bug.cgi?id=1118899 * https://bugzilla.suse.com/show_bug.cgi?id=1121850 * https://bugzilla.suse.com/show_bug.cgi?id=1174951 * https://bugzilla.suse.com/show_bug.cgi?id=1181400 * https://bugzilla.suse.com/show_bug.cgi?id=1183703 * https://bugzilla.suse.com/show_bug.cgi?id=1199031 * https://bugzilla.suse.com/show_bug.cgi?id=1208270 * https://bugzilla.suse.com/show_bug.cgi?id=1208297 * https://bugzilla.suse.com/show_bug.cgi?id=1210138 * https://bugzilla.suse.com/show_bug.cgi?id=1213229 * https://bugzilla.suse.com/show_bug.cgi?id=1217070 * https://bugzilla.suse.com/show_bug.cgi?id=1217950 * https://bugzilla.suse.com/show_bug.cgi?id=1218150 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 12:31:20 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 12:31:20 -0000 Subject: SUSE-RU-2024:3654-1: low: Recommended update for evolution-data-server Message-ID: <172908188042.6932.14051255951784796911@smelt2.prg2.suse.org> # Recommended update for evolution-data-server Announcement ID: SUSE-RU-2024:3654-1 Release Date: 2024-10-16T10:05:59Z Rating: low References: * bsc#1224399 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for evolution-data-server fixes the following issues: * Add libcamel-1_2-64 binaries to SLE-15-SP6 Package Hub Subpackages (bsc#1224399) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3654=1 openSUSE-SLE-15.6-2024-3654=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3654=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3654=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libedata-book-1_2-27-3.50.3-150600.3.4.1 * typelib-1_0-EBook-1_2-3.50.3-150600.3.4.1 * libebook-1_2-21-debuginfo-3.50.3-150600.3.4.1 * libebook-1_2-21-3.50.3-150600.3.4.1 * typelib-1_0-EBackend-1_2-3.50.3-150600.3.4.1 * libedata-book-1_2-27-debuginfo-3.50.3-150600.3.4.1 * libedataserverui4-1_0-0-3.50.3-150600.3.4.1 * typelib-1_0-EDataServer-1_2-3.50.3-150600.3.4.1 * typelib-1_0-EBookContacts-1_2-3.50.3-150600.3.4.1 * libebook-contacts-1_2-4-3.50.3-150600.3.4.1 * libcamel-1_2-64-debuginfo-3.50.3-150600.3.4.1 * libedataserverui-1_2-4-debuginfo-3.50.3-150600.3.4.1 * evolution-data-server-debugsource-3.50.3-150600.3.4.1 * evolution-data-server-devel-3.50.3-150600.3.4.1 * typelib-1_0-EDataBook-1_2-3.50.3-150600.3.4.1 * libebackend-1_2-11-debuginfo-3.50.3-150600.3.4.1 * evolution-data-server-3.50.3-150600.3.4.1 * typelib-1_0-EDataCal-2_0-3.50.3-150600.3.4.1 * libcamel-1_2-64-3.50.3-150600.3.4.1 * libebook-contacts-1_2-4-debuginfo-3.50.3-150600.3.4.1 * libedataserver-1_2-27-3.50.3-150600.3.4.1 * typelib-1_0-EDataServerUI-1_2-3.50.3-150600.3.4.1 * libecal-2_0-2-3.50.3-150600.3.4.1 * typelib-1_0-Camel-1_2-3.50.3-150600.3.4.1 * libedata-cal-2_0-2-debuginfo-3.50.3-150600.3.4.1 * libedataserver-1_2-27-debuginfo-3.50.3-150600.3.4.1 * libedataserverui-1_2-4-3.50.3-150600.3.4.1 * typelib-1_0-EDataServerUI4-1_0-3.50.3-150600.3.4.1 * libedataserverui4-1_0-0-debuginfo-3.50.3-150600.3.4.1 * libecal-2_0-2-debuginfo-3.50.3-150600.3.4.1 * evolution-data-server-debuginfo-3.50.3-150600.3.4.1 * libedata-cal-2_0-2-3.50.3-150600.3.4.1 * libebackend-1_2-11-3.50.3-150600.3.4.1 * typelib-1_0-ECal-2_0-3.50.3-150600.3.4.1 * openSUSE Leap 15.6 (noarch) * evolution-data-server-lang-3.50.3-150600.3.4.1 * SUSE Package Hub 15 15-SP6 (aarch64 s390x) * evolution-data-server-devel-3.50.3-150600.3.4.1 * evolution-data-server-3.50.3-150600.3.4.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * typelib-1_0-Camel-1_2-3.50.3-150600.3.4.1 * typelib-1_0-EBook-1_2-3.50.3-150600.3.4.1 * typelib-1_0-EDataBook-1_2-3.50.3-150600.3.4.1 * typelib-1_0-EDataServer-1_2-3.50.3-150600.3.4.1 * typelib-1_0-EDataCal-2_0-3.50.3-150600.3.4.1 * libcamel-1_2-64-3.50.3-150600.3.4.1 * typelib-1_0-EBookContacts-1_2-3.50.3-150600.3.4.1 * typelib-1_0-EBackend-1_2-3.50.3-150600.3.4.1 * evolution-data-server-debuginfo-3.50.3-150600.3.4.1 * libedataserver-1_2-27-3.50.3-150600.3.4.1 * typelib-1_0-ECal-2_0-3.50.3-150600.3.4.1 * typelib-1_0-EDataServerUI-1_2-3.50.3-150600.3.4.1 * evolution-data-server-debugsource-3.50.3-150600.3.4.1 * SUSE Package Hub 15 15-SP6 (noarch) * evolution-data-server-lang-3.50.3-150600.3.4.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * libedata-book-1_2-27-3.50.3-150600.3.4.1 * typelib-1_0-EBook-1_2-3.50.3-150600.3.4.1 * libebook-1_2-21-debuginfo-3.50.3-150600.3.4.1 * libebook-1_2-21-3.50.3-150600.3.4.1 * libedata-book-1_2-27-debuginfo-3.50.3-150600.3.4.1 * libedataserverui4-1_0-0-3.50.3-150600.3.4.1 * typelib-1_0-EDataServer-1_2-3.50.3-150600.3.4.1 * typelib-1_0-EBookContacts-1_2-3.50.3-150600.3.4.1 * libebook-contacts-1_2-4-3.50.3-150600.3.4.1 * libcamel-1_2-64-debuginfo-3.50.3-150600.3.4.1 * libedataserverui-1_2-4-debuginfo-3.50.3-150600.3.4.1 * evolution-data-server-debugsource-3.50.3-150600.3.4.1 * evolution-data-server-devel-3.50.3-150600.3.4.1 * libebackend-1_2-11-debuginfo-3.50.3-150600.3.4.1 * evolution-data-server-3.50.3-150600.3.4.1 * libcamel-1_2-64-3.50.3-150600.3.4.1 * libebook-contacts-1_2-4-debuginfo-3.50.3-150600.3.4.1 * libedataserver-1_2-27-3.50.3-150600.3.4.1 * typelib-1_0-EDataServerUI-1_2-3.50.3-150600.3.4.1 * libecal-2_0-2-3.50.3-150600.3.4.1 * typelib-1_0-Camel-1_2-3.50.3-150600.3.4.1 * libedata-cal-2_0-2-debuginfo-3.50.3-150600.3.4.1 * libedataserver-1_2-27-debuginfo-3.50.3-150600.3.4.1 * libedataserverui-1_2-4-3.50.3-150600.3.4.1 * typelib-1_0-EDataServerUI4-1_0-3.50.3-150600.3.4.1 * libedataserverui4-1_0-0-debuginfo-3.50.3-150600.3.4.1 * libecal-2_0-2-debuginfo-3.50.3-150600.3.4.1 * evolution-data-server-debuginfo-3.50.3-150600.3.4.1 * libedata-cal-2_0-2-3.50.3-150600.3.4.1 * libebackend-1_2-11-3.50.3-150600.3.4.1 * typelib-1_0-ECal-2_0-3.50.3-150600.3.4.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (noarch) * evolution-data-server-lang-3.50.3-150600.3.4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224399 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 12:31:23 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 12:31:23 -0000 Subject: SUSE-RU-2024:3653-1: low: Recommended update for gssdp Message-ID: <172908188345.6932.435802135827674189@smelt2.prg2.suse.org> # Recommended update for gssdp Announcement ID: SUSE-RU-2024:3653-1 Release Date: 2024-10-16T10:05:43Z Rating: low References: * bsc#1224398 Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for gssdp fixes the following issues: * Add libgssdp-1_2-0 to SLE-15-SP6 Package Hub Subpackages (bsc#1224398) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3653=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3653=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3653=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3653=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3653=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gssdp-debugsource-1.4.0.1-150400.3.2.1 * libgssdp-1_2-0-1.4.0.1-150400.3.2.1 * typelib-1_0-GSSDP-1_0-1.4.0.1-150400.3.2.1 * libgssdp-1_2-0-debuginfo-1.4.0.1-150400.3.2.1 * libgssdp-devel-1.4.0.1-150400.3.2.1 * openSUSE Leap 15.4 (x86_64) * libgssdp-1_2-0-32bit-1.4.0.1-150400.3.2.1 * libgssdp-1_2-0-32bit-debuginfo-1.4.0.1-150400.3.2.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libgssdp-1_2-0-64bit-1.4.0.1-150400.3.2.1 * libgssdp-1_2-0-64bit-debuginfo-1.4.0.1-150400.3.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * gssdp-debugsource-1.4.0.1-150400.3.2.1 * libgssdp-1_2-0-1.4.0.1-150400.3.2.1 * typelib-1_0-GSSDP-1_0-1.4.0.1-150400.3.2.1 * libgssdp-1_2-0-debuginfo-1.4.0.1-150400.3.2.1 * libgssdp-devel-1.4.0.1-150400.3.2.1 * openSUSE Leap 15.5 (x86_64) * libgssdp-1_2-0-32bit-1.4.0.1-150400.3.2.1 * libgssdp-1_2-0-32bit-debuginfo-1.4.0.1-150400.3.2.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gssdp-debugsource-1.4.0.1-150400.3.2.1 * libgssdp-1_2-0-1.4.0.1-150400.3.2.1 * typelib-1_0-GSSDP-1_0-1.4.0.1-150400.3.2.1 * libgssdp-1_2-0-debuginfo-1.4.0.1-150400.3.2.1 * libgssdp-devel-1.4.0.1-150400.3.2.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * libgssdp-1_2-0-1.4.0.1-150400.3.2.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * gssdp-debugsource-1.4.0.1-150400.3.2.1 * libgssdp-1_2-0-1.4.0.1-150400.3.2.1 * libgssdp-1_2-0-debuginfo-1.4.0.1-150400.3.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224398 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 12:31:25 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 12:31:25 -0000 Subject: SUSE-SU-2024:3647-1: moderate: Security update for unbound Message-ID: <172908188549.6932.16612459922219044390@smelt2.prg2.suse.org> # Security update for unbound Announcement ID: SUSE-SU-2024:3647-1 Release Date: 2024-10-16T09:32:21Z Rating: moderate References: * bsc#1231284 Cross-References: * CVE-2024-8508 CVSS scores: * CVE-2024-8508 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-8508 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2024-8508 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for unbound fixes the following issues: * CVE-2024-8508: Fixed unbounded name compression that could lead to denial of service (bsc#1231284) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3647=1 openSUSE-SLE-15.6-2024-3647=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3647=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3647=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libunbound-devel-mini-1.20.0-150600.23.9.1 * unbound-devel-1.20.0-150600.23.9.1 * libunbound-devel-mini-debuginfo-1.20.0-150600.23.9.1 * libunbound8-1.20.0-150600.23.9.1 * libunbound8-debuginfo-1.20.0-150600.23.9.1 * unbound-debugsource-1.20.0-150600.23.9.1 * unbound-debuginfo-1.20.0-150600.23.9.1 * unbound-anchor-1.20.0-150600.23.9.1 * libunbound-devel-mini-debugsource-1.20.0-150600.23.9.1 * unbound-1.20.0-150600.23.9.1 * unbound-anchor-debuginfo-1.20.0-150600.23.9.1 * unbound-python-debuginfo-1.20.0-150600.23.9.1 * unbound-python-1.20.0-150600.23.9.1 * openSUSE Leap 15.6 (noarch) * unbound-munin-1.20.0-150600.23.9.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * unbound-devel-1.20.0-150600.23.9.1 * libunbound8-1.20.0-150600.23.9.1 * libunbound8-debuginfo-1.20.0-150600.23.9.1 * unbound-debugsource-1.20.0-150600.23.9.1 * unbound-debuginfo-1.20.0-150600.23.9.1 * unbound-anchor-1.20.0-150600.23.9.1 * unbound-anchor-debuginfo-1.20.0-150600.23.9.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * unbound-debugsource-1.20.0-150600.23.9.1 * unbound-debuginfo-1.20.0-150600.23.9.1 * unbound-1.20.0-150600.23.9.1 * unbound-python-debuginfo-1.20.0-150600.23.9.1 * unbound-python-1.20.0-150600.23.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8508.html * https://bugzilla.suse.com/show_bug.cgi?id=1231284 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 12:31:27 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 12:31:27 -0000 Subject: SUSE-SU-2024:3646-1: moderate: Security update for unbound Message-ID: <172908188788.6932.17270946651410195179@smelt2.prg2.suse.org> # Security update for unbound Announcement ID: SUSE-SU-2024:3646-1 Release Date: 2024-10-16T09:31:58Z Rating: moderate References: * bsc#1231284 Cross-References: * CVE-2024-8508 CVSS scores: * CVE-2024-8508 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-8508 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2024-8508 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for unbound fixes the following issues: * CVE-2024-8508: Fixed unbounded name compression that could lead to denial of service (bsc#1231284) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3646=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3646=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3646=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3646=1 ## Package List: * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * unbound-1.20.0-150100.10.19.1 * unbound-debugsource-1.20.0-150100.10.19.1 * unbound-python-1.20.0-150100.10.19.1 * unbound-python-debuginfo-1.20.0-150100.10.19.1 * unbound-debuginfo-1.20.0-150100.10.19.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * unbound-devel-1.20.0-150100.10.19.1 * unbound-1.20.0-150100.10.19.1 * unbound-debugsource-1.20.0-150100.10.19.1 * unbound-python-1.20.0-150100.10.19.1 * libunbound8-1.20.0-150100.10.19.1 * unbound-python-debuginfo-1.20.0-150100.10.19.1 * unbound-debuginfo-1.20.0-150100.10.19.1 * libunbound8-debuginfo-1.20.0-150100.10.19.1 * unbound-anchor-1.20.0-150100.10.19.1 * unbound-anchor-debuginfo-1.20.0-150100.10.19.1 * openSUSE Leap 15.5 (noarch) * unbound-munin-1.20.0-150100.10.19.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * unbound-debugsource-1.20.0-150100.10.19.1 * libunbound8-1.20.0-150100.10.19.1 * unbound-debuginfo-1.20.0-150100.10.19.1 * libunbound8-debuginfo-1.20.0-150100.10.19.1 * unbound-anchor-1.20.0-150100.10.19.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * unbound-devel-1.20.0-150100.10.19.1 * unbound-debugsource-1.20.0-150100.10.19.1 * libunbound8-1.20.0-150100.10.19.1 * unbound-debuginfo-1.20.0-150100.10.19.1 * libunbound8-debuginfo-1.20.0-150100.10.19.1 * unbound-anchor-1.20.0-150100.10.19.1 * unbound-anchor-debuginfo-1.20.0-150100.10.19.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8508.html * https://bugzilla.suse.com/show_bug.cgi?id=1231284 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 16:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 16:30:12 -0000 Subject: SUSE-SU-2024:3663-1: important: Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) Message-ID: <172909621204.7152.89743074281850788@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:3663-1 Release Date: 2024-10-16T14:03:59Z Rating: important References: * bsc#1210619 * bsc#1220537 * bsc#1223363 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225310 * bsc#1226325 * bsc#1228573 Cross-References: * CVE-2021-46955 * CVE-2021-47378 * CVE-2021-47383 * CVE-2023-1829 * CVE-2024-26828 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_216 fixes several issues. The following security issues were fixed: * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-3663=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_216-default-6-8.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 16:30:23 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 16:30:23 -0000 Subject: SUSE-SU-2024:3662-1: important: Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) Message-ID: <172909622370.7152.11053807092504918863@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:3662-1 Release Date: 2024-10-16T14:03:47Z Rating: important References: * bsc#1210619 * bsc#1220145 * bsc#1220537 * bsc#1222685 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223681 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225310 * bsc#1226325 * bsc#1228573 Cross-References: * CVE-2021-46955 * CVE-2021-47378 * CVE-2021-47383 * CVE-2022-48651 * CVE-2023-1829 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 15 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_201 fixes several issues. The following security issues were fixed: * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-3662=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_201-default-8-8.10.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 16:30:29 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 16:30:29 -0000 Subject: SUSE-SU-2024:3661-1: important: Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) Message-ID: <172909622962.7152.8494270425975889587@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:3661-1 Release Date: 2024-10-16T13:33:42Z Rating: important References: * bsc#1223683 * bsc#1225310 * bsc#1225312 * bsc#1226325 * bsc#1227651 * bsc#1228573 Cross-References: * CVE-2021-47291 * CVE-2024-26923 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves six vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_164 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3661=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-3661=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-3-150300.7.6.1 * kernel-livepatch-SLE15-SP3_Update_45-debugsource-3-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-3-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_164-preempt-3-150300.7.6.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 16:30:32 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 16:30:32 -0000 Subject: SUSE-SU-2024:3660-1: important: Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5) Message-ID: <172909623279.7152.11789618133685331813@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:3660-1 Release Date: 2024-10-16T14:33:27Z Rating: important References: * bsc#1226325 * bsc#1228573 Cross-References: * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_189 fixes several issues. The following security issues were fixed: * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-3665=1 SUSE-SLE-Live- Patching-12-SP5-2024-3660=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_189-default-11-2.1 * kgraft-patch-4_12_14-122_179-default-13-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 16:30:37 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 16:30:37 -0000 Subject: SUSE-SU-2024:3664-1: moderate: Security update for php8 Message-ID: <172909623732.7152.16638584685634979939@smelt2.prg2.suse.org> # Security update for php8 Announcement ID: SUSE-SU-2024:3664-1 Release Date: 2024-10-16T14:28:54Z Rating: moderate References: * bsc#1231358 * bsc#1231360 * bsc#1231382 Cross-References: * CVE-2024-8925 * CVE-2024-8927 * CVE-2024-9026 CVSS scores: * CVE-2024-8925 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8925 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-8925 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-8927 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-8927 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9026 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9026 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-9026 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * Web and Scripting Module 15-SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for php8 fixes the following issues: * CVE-2024-8925: Fixed erroneous parsing of multipart form data in HTTP POST requests leads to legitimate data not being processed (bsc#1231360) * CVE-2024-8927: Fixed cgi.force_redirect configuration is bypassable due to an environment variable collision (bsc#1231358) * CVE-2024-9026: Fixed pollution of worker output logs in PHP-FPM (bsc#1231382) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3664=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3664=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-3664=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * php8-cli-debuginfo-8.0.30-150400.4.46.1 * php8-ftp-8.0.30-150400.4.46.1 * php8-tokenizer-8.0.30-150400.4.46.1 * php8-test-8.0.30-150400.4.46.1 * php8-bz2-8.0.30-150400.4.46.1 * php8-fileinfo-8.0.30-150400.4.46.1 * php8-curl-8.0.30-150400.4.46.1 * php8-gettext-debuginfo-8.0.30-150400.4.46.1 * php8-calendar-8.0.30-150400.4.46.1 * php8-fpm-debugsource-8.0.30-150400.4.46.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.46.1 * php8-bcmath-debuginfo-8.0.30-150400.4.46.1 * php8-xmlwriter-8.0.30-150400.4.46.1 * php8-sqlite-debuginfo-8.0.30-150400.4.46.1 * php8-shmop-debuginfo-8.0.30-150400.4.46.1 * php8-debuginfo-8.0.30-150400.4.46.1 * php8-odbc-debuginfo-8.0.30-150400.4.46.1 * php8-pdo-8.0.30-150400.4.46.1 * php8-zip-debuginfo-8.0.30-150400.4.46.1 * php8-sysvmsg-8.0.30-150400.4.46.1 * php8-8.0.30-150400.4.46.1 * php8-bz2-debuginfo-8.0.30-150400.4.46.1 * php8-openssl-8.0.30-150400.4.46.1 * php8-embed-debuginfo-8.0.30-150400.4.46.1 * php8-gd-8.0.30-150400.4.46.1 * php8-tidy-8.0.30-150400.4.46.1 * php8-pcntl-debuginfo-8.0.30-150400.4.46.1 * php8-sysvsem-8.0.30-150400.4.46.1 * php8-odbc-8.0.30-150400.4.46.1 * php8-ctype-debuginfo-8.0.30-150400.4.46.1 * php8-gd-debuginfo-8.0.30-150400.4.46.1 * php8-embed-debugsource-8.0.30-150400.4.46.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.46.1 * php8-zlib-8.0.30-150400.4.46.1 * php8-dom-8.0.30-150400.4.46.1 * php8-mbstring-debuginfo-8.0.30-150400.4.46.1 * php8-readline-8.0.30-150400.4.46.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.46.1 * php8-sqlite-8.0.30-150400.4.46.1 * php8-soap-8.0.30-150400.4.46.1 * php8-pdo-debuginfo-8.0.30-150400.4.46.1 * php8-iconv-debuginfo-8.0.30-150400.4.46.1 * php8-mysql-8.0.30-150400.4.46.1 * php8-cli-8.0.30-150400.4.46.1 * php8-ftp-debuginfo-8.0.30-150400.4.46.1 * php8-devel-8.0.30-150400.4.46.1 * php8-debugsource-8.0.30-150400.4.46.1 * php8-intl-debuginfo-8.0.30-150400.4.46.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.46.1 * php8-posix-8.0.30-150400.4.46.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.46.1 * php8-phar-8.0.30-150400.4.46.1 * php8-dom-debuginfo-8.0.30-150400.4.46.1 * php8-sodium-debuginfo-8.0.30-150400.4.46.1 * php8-soap-debuginfo-8.0.30-150400.4.46.1 * php8-intl-8.0.30-150400.4.46.1 * php8-pgsql-debuginfo-8.0.30-150400.4.46.1 * php8-iconv-8.0.30-150400.4.46.1 * php8-gmp-debuginfo-8.0.30-150400.4.46.1 * php8-dba-debuginfo-8.0.30-150400.4.46.1 * php8-calendar-debuginfo-8.0.30-150400.4.46.1 * php8-fastcgi-debugsource-8.0.30-150400.4.46.1 * php8-zlib-debuginfo-8.0.30-150400.4.46.1 * php8-xsl-8.0.30-150400.4.46.1 * php8-exif-debuginfo-8.0.30-150400.4.46.1 * apache2-mod_php8-8.0.30-150400.4.46.1 * php8-mysql-debuginfo-8.0.30-150400.4.46.1 * php8-opcache-8.0.30-150400.4.46.1 * php8-curl-debuginfo-8.0.30-150400.4.46.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.46.1 * php8-sockets-8.0.30-150400.4.46.1 * php8-tidy-debuginfo-8.0.30-150400.4.46.1 * php8-exif-8.0.30-150400.4.46.1 * php8-xsl-debuginfo-8.0.30-150400.4.46.1 * php8-zip-8.0.30-150400.4.46.1 * php8-enchant-8.0.30-150400.4.46.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.46.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.46.1 * php8-readline-debuginfo-8.0.30-150400.4.46.1 * php8-pcntl-8.0.30-150400.4.46.1 * php8-ctype-8.0.30-150400.4.46.1 * php8-dba-8.0.30-150400.4.46.1 * php8-ldap-8.0.30-150400.4.46.1 * php8-bcmath-8.0.30-150400.4.46.1 * php8-posix-debuginfo-8.0.30-150400.4.46.1 * php8-mbstring-8.0.30-150400.4.46.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.46.1 * php8-phar-debuginfo-8.0.30-150400.4.46.1 * php8-opcache-debuginfo-8.0.30-150400.4.46.1 * php8-gmp-8.0.30-150400.4.46.1 * php8-sysvshm-8.0.30-150400.4.46.1 * php8-fastcgi-8.0.30-150400.4.46.1 * php8-gettext-8.0.30-150400.4.46.1 * php8-sodium-8.0.30-150400.4.46.1 * php8-enchant-debuginfo-8.0.30-150400.4.46.1 * php8-shmop-8.0.30-150400.4.46.1 * php8-fpm-debuginfo-8.0.30-150400.4.46.1 * php8-snmp-debuginfo-8.0.30-150400.4.46.1 * php8-sockets-debuginfo-8.0.30-150400.4.46.1 * php8-pgsql-8.0.30-150400.4.46.1 * php8-fpm-8.0.30-150400.4.46.1 * php8-xmlreader-8.0.30-150400.4.46.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.46.1 * php8-ldap-debuginfo-8.0.30-150400.4.46.1 * php8-openssl-debuginfo-8.0.30-150400.4.46.1 * php8-snmp-8.0.30-150400.4.46.1 * php8-embed-8.0.30-150400.4.46.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * php8-cli-debuginfo-8.0.30-150400.4.46.1 * php8-ftp-8.0.30-150400.4.46.1 * php8-tokenizer-8.0.30-150400.4.46.1 * php8-test-8.0.30-150400.4.46.1 * php8-bz2-8.0.30-150400.4.46.1 * php8-fileinfo-8.0.30-150400.4.46.1 * php8-curl-8.0.30-150400.4.46.1 * php8-fpm-debugsource-8.0.30-150400.4.46.1 * php8-calendar-8.0.30-150400.4.46.1 * php8-gettext-debuginfo-8.0.30-150400.4.46.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.46.1 * php8-bcmath-debuginfo-8.0.30-150400.4.46.1 * php8-xmlwriter-8.0.30-150400.4.46.1 * php8-sqlite-debuginfo-8.0.30-150400.4.46.1 * php8-shmop-debuginfo-8.0.30-150400.4.46.1 * php8-debuginfo-8.0.30-150400.4.46.1 * php8-odbc-debuginfo-8.0.30-150400.4.46.1 * php8-pdo-8.0.30-150400.4.46.1 * php8-zip-debuginfo-8.0.30-150400.4.46.1 * php8-sysvmsg-8.0.30-150400.4.46.1 * php8-bz2-debuginfo-8.0.30-150400.4.46.1 * php8-8.0.30-150400.4.46.1 * php8-embed-debuginfo-8.0.30-150400.4.46.1 * php8-openssl-8.0.30-150400.4.46.1 * php8-gd-8.0.30-150400.4.46.1 * php8-tidy-8.0.30-150400.4.46.1 * php8-pcntl-debuginfo-8.0.30-150400.4.46.1 * php8-sysvsem-8.0.30-150400.4.46.1 * php8-odbc-8.0.30-150400.4.46.1 * php8-ctype-debuginfo-8.0.30-150400.4.46.1 * php8-embed-debugsource-8.0.30-150400.4.46.1 * php8-gd-debuginfo-8.0.30-150400.4.46.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.46.1 * php8-zlib-8.0.30-150400.4.46.1 * php8-dom-8.0.30-150400.4.46.1 * php8-mbstring-debuginfo-8.0.30-150400.4.46.1 * php8-readline-8.0.30-150400.4.46.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.46.1 * php8-sqlite-8.0.30-150400.4.46.1 * php8-soap-8.0.30-150400.4.46.1 * php8-pdo-debuginfo-8.0.30-150400.4.46.1 * php8-iconv-debuginfo-8.0.30-150400.4.46.1 * php8-mysql-8.0.30-150400.4.46.1 * php8-cli-8.0.30-150400.4.46.1 * php8-ftp-debuginfo-8.0.30-150400.4.46.1 * php8-devel-8.0.30-150400.4.46.1 * php8-debugsource-8.0.30-150400.4.46.1 * php8-intl-debuginfo-8.0.30-150400.4.46.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.46.1 * php8-posix-8.0.30-150400.4.46.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.46.1 * php8-phar-8.0.30-150400.4.46.1 * php8-dom-debuginfo-8.0.30-150400.4.46.1 * php8-sodium-debuginfo-8.0.30-150400.4.46.1 * php8-soap-debuginfo-8.0.30-150400.4.46.1 * php8-intl-8.0.30-150400.4.46.1 * php8-pgsql-debuginfo-8.0.30-150400.4.46.1 * php8-iconv-8.0.30-150400.4.46.1 * php8-gmp-debuginfo-8.0.30-150400.4.46.1 * php8-dba-debuginfo-8.0.30-150400.4.46.1 * php8-calendar-debuginfo-8.0.30-150400.4.46.1 * php8-fastcgi-debugsource-8.0.30-150400.4.46.1 * php8-zlib-debuginfo-8.0.30-150400.4.46.1 * php8-xsl-8.0.30-150400.4.46.1 * apache2-mod_php8-8.0.30-150400.4.46.1 * php8-exif-debuginfo-8.0.30-150400.4.46.1 * php8-mysql-debuginfo-8.0.30-150400.4.46.1 * php8-opcache-8.0.30-150400.4.46.1 * php8-curl-debuginfo-8.0.30-150400.4.46.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.46.1 * php8-sockets-8.0.30-150400.4.46.1 * php8-tidy-debuginfo-8.0.30-150400.4.46.1 * php8-exif-8.0.30-150400.4.46.1 * php8-xsl-debuginfo-8.0.30-150400.4.46.1 * php8-zip-8.0.30-150400.4.46.1 * php8-enchant-8.0.30-150400.4.46.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.46.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.46.1 * php8-readline-debuginfo-8.0.30-150400.4.46.1 * php8-pcntl-8.0.30-150400.4.46.1 * php8-ctype-8.0.30-150400.4.46.1 * php8-dba-8.0.30-150400.4.46.1 * php8-ldap-8.0.30-150400.4.46.1 * php8-bcmath-8.0.30-150400.4.46.1 * php8-posix-debuginfo-8.0.30-150400.4.46.1 * php8-mbstring-8.0.30-150400.4.46.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.46.1 * php8-phar-debuginfo-8.0.30-150400.4.46.1 * php8-opcache-debuginfo-8.0.30-150400.4.46.1 * php8-gmp-8.0.30-150400.4.46.1 * php8-sysvshm-8.0.30-150400.4.46.1 * php8-fastcgi-8.0.30-150400.4.46.1 * php8-gettext-8.0.30-150400.4.46.1 * php8-sodium-8.0.30-150400.4.46.1 * php8-enchant-debuginfo-8.0.30-150400.4.46.1 * php8-shmop-8.0.30-150400.4.46.1 * php8-fpm-debuginfo-8.0.30-150400.4.46.1 * php8-snmp-debuginfo-8.0.30-150400.4.46.1 * php8-sockets-debuginfo-8.0.30-150400.4.46.1 * php8-fpm-8.0.30-150400.4.46.1 * php8-pgsql-8.0.30-150400.4.46.1 * php8-xmlreader-8.0.30-150400.4.46.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.46.1 * php8-ldap-debuginfo-8.0.30-150400.4.46.1 * php8-openssl-debuginfo-8.0.30-150400.4.46.1 * php8-embed-8.0.30-150400.4.46.1 * php8-snmp-8.0.30-150400.4.46.1 * Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64) * php8-cli-debuginfo-8.0.30-150400.4.46.1 * php8-ftp-8.0.30-150400.4.46.1 * php8-tokenizer-8.0.30-150400.4.46.1 * php8-test-8.0.30-150400.4.46.1 * php8-bz2-8.0.30-150400.4.46.1 * php8-fileinfo-8.0.30-150400.4.46.1 * php8-curl-8.0.30-150400.4.46.1 * php8-fpm-debugsource-8.0.30-150400.4.46.1 * php8-calendar-8.0.30-150400.4.46.1 * php8-gettext-debuginfo-8.0.30-150400.4.46.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.46.1 * php8-bcmath-debuginfo-8.0.30-150400.4.46.1 * php8-xmlwriter-8.0.30-150400.4.46.1 * php8-sqlite-debuginfo-8.0.30-150400.4.46.1 * php8-shmop-debuginfo-8.0.30-150400.4.46.1 * php8-debuginfo-8.0.30-150400.4.46.1 * php8-odbc-debuginfo-8.0.30-150400.4.46.1 * php8-pdo-8.0.30-150400.4.46.1 * php8-zip-debuginfo-8.0.30-150400.4.46.1 * php8-sysvmsg-8.0.30-150400.4.46.1 * php8-bz2-debuginfo-8.0.30-150400.4.46.1 * php8-8.0.30-150400.4.46.1 * php8-embed-debuginfo-8.0.30-150400.4.46.1 * php8-openssl-8.0.30-150400.4.46.1 * php8-gd-8.0.30-150400.4.46.1 * php8-tidy-8.0.30-150400.4.46.1 * php8-pcntl-debuginfo-8.0.30-150400.4.46.1 * php8-sysvsem-8.0.30-150400.4.46.1 * php8-odbc-8.0.30-150400.4.46.1 * php8-ctype-debuginfo-8.0.30-150400.4.46.1 * php8-embed-debugsource-8.0.30-150400.4.46.1 * php8-gd-debuginfo-8.0.30-150400.4.46.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.46.1 * php8-zlib-8.0.30-150400.4.46.1 * php8-dom-8.0.30-150400.4.46.1 * php8-mbstring-debuginfo-8.0.30-150400.4.46.1 * php8-readline-8.0.30-150400.4.46.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.46.1 * php8-sqlite-8.0.30-150400.4.46.1 * php8-soap-8.0.30-150400.4.46.1 * php8-pdo-debuginfo-8.0.30-150400.4.46.1 * php8-iconv-debuginfo-8.0.30-150400.4.46.1 * php8-mysql-8.0.30-150400.4.46.1 * php8-cli-8.0.30-150400.4.46.1 * php8-ftp-debuginfo-8.0.30-150400.4.46.1 * php8-devel-8.0.30-150400.4.46.1 * php8-debugsource-8.0.30-150400.4.46.1 * php8-intl-debuginfo-8.0.30-150400.4.46.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.46.1 * php8-posix-8.0.30-150400.4.46.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.46.1 * php8-phar-8.0.30-150400.4.46.1 * php8-dom-debuginfo-8.0.30-150400.4.46.1 * php8-sodium-debuginfo-8.0.30-150400.4.46.1 * php8-soap-debuginfo-8.0.30-150400.4.46.1 * php8-intl-8.0.30-150400.4.46.1 * php8-pgsql-debuginfo-8.0.30-150400.4.46.1 * php8-iconv-8.0.30-150400.4.46.1 * php8-gmp-debuginfo-8.0.30-150400.4.46.1 * php8-dba-debuginfo-8.0.30-150400.4.46.1 * php8-calendar-debuginfo-8.0.30-150400.4.46.1 * php8-fastcgi-debugsource-8.0.30-150400.4.46.1 * php8-zlib-debuginfo-8.0.30-150400.4.46.1 * php8-xsl-8.0.30-150400.4.46.1 * apache2-mod_php8-8.0.30-150400.4.46.1 * php8-exif-debuginfo-8.0.30-150400.4.46.1 * php8-mysql-debuginfo-8.0.30-150400.4.46.1 * php8-opcache-8.0.30-150400.4.46.1 * php8-curl-debuginfo-8.0.30-150400.4.46.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.46.1 * php8-sockets-8.0.30-150400.4.46.1 * php8-tidy-debuginfo-8.0.30-150400.4.46.1 * php8-exif-8.0.30-150400.4.46.1 * php8-xsl-debuginfo-8.0.30-150400.4.46.1 * php8-zip-8.0.30-150400.4.46.1 * php8-enchant-8.0.30-150400.4.46.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.46.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.46.1 * php8-readline-debuginfo-8.0.30-150400.4.46.1 * php8-pcntl-8.0.30-150400.4.46.1 * php8-ctype-8.0.30-150400.4.46.1 * php8-dba-8.0.30-150400.4.46.1 * php8-ldap-8.0.30-150400.4.46.1 * php8-bcmath-8.0.30-150400.4.46.1 * php8-posix-debuginfo-8.0.30-150400.4.46.1 * php8-mbstring-8.0.30-150400.4.46.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.46.1 * php8-phar-debuginfo-8.0.30-150400.4.46.1 * php8-opcache-debuginfo-8.0.30-150400.4.46.1 * php8-gmp-8.0.30-150400.4.46.1 * php8-sysvshm-8.0.30-150400.4.46.1 * php8-fastcgi-8.0.30-150400.4.46.1 * php8-gettext-8.0.30-150400.4.46.1 * php8-sodium-8.0.30-150400.4.46.1 * php8-enchant-debuginfo-8.0.30-150400.4.46.1 * php8-shmop-8.0.30-150400.4.46.1 * php8-fpm-debuginfo-8.0.30-150400.4.46.1 * php8-snmp-debuginfo-8.0.30-150400.4.46.1 * php8-sockets-debuginfo-8.0.30-150400.4.46.1 * php8-fpm-8.0.30-150400.4.46.1 * php8-pgsql-8.0.30-150400.4.46.1 * php8-xmlreader-8.0.30-150400.4.46.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.46.1 * php8-ldap-debuginfo-8.0.30-150400.4.46.1 * php8-openssl-debuginfo-8.0.30-150400.4.46.1 * php8-embed-8.0.30-150400.4.46.1 * php8-snmp-8.0.30-150400.4.46.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8925.html * https://www.suse.com/security/cve/CVE-2024-8927.html * https://www.suse.com/security/cve/CVE-2024-9026.html * https://bugzilla.suse.com/show_bug.cgi?id=1231358 * https://bugzilla.suse.com/show_bug.cgi?id=1231360 * https://bugzilla.suse.com/show_bug.cgi?id=1231382 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 16:30:45 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 16:30:45 -0000 Subject: SUSE-RU-2024:3659-1: moderate: Recommended update for gcc14 Message-ID: <172909624587.7152.11636247635918286955@smelt2.prg2.suse.org> # Recommended update for gcc14 Announcement ID: SUSE-RU-2024:3659-1 Release Date: 2024-10-16T13:14:50Z Rating: moderate References: * bsc#1188441 * bsc#1210959 * bsc#1214915 * bsc#1219031 * bsc#1220724 * bsc#1221601 * jsc#PED-10474 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that contains one feature and has six fixes can now be installed. ## Description: This update for gcc14 fixes the following issues: This update ships the GNU Compiler Collection GCC 14.2. (jsc#PED-10474) The compiler runtime libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 13 ones. The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP5 and SP6, and provided in the "Development Tools" module. The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories. To use gcc14 compilers use: * install "gcc14" or "gcc14-c++" or one of the other "gcc14-COMPILER" frontend packages. * override your Makefile to use CC=gcc14, CXX=g++14 and similar overrides for the other languages. For a full changelog with all new GCC14 features, check out https://gcc.gnu.org/gcc-14/changes.html * Add libquadmath0-devel-gcc14 sub-package to allow installing quadmath.h and SO link without installing the fortran frontend * Avoid combine spending too much compile-time and memory doing nothing on s390x. [bsc#1188441] * Remove timezone Recommends from the libstdc++6 package. [bsc#1221601] * Revert libgccjit dependency change. [bsc#1220724] * Fix libgccjit-devel dependency, a newer shared library is OK. * Fix libgccjit dependency, the corresponding compiler isn't required. * Add cross-X-newlib-devel requires to newlib cross compilers. [bsc#1219031] * Re-enable AutoReqProv for cross packages but filter files processed via __requires_exclude_from and __provides_exclude_from. [bsc#1219031] * Package m2rte.so plugin in the gcc14-m2 sub-package rather than in gcc13-devel. [bsc#1210959] * Require libstdc++6-devel-gcc14 from gcc14-m2 as m2 programs are linked against libstdc++6. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3659=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3659=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3659=1 * SUSE Linux Enterprise Server 15 SP2 zypper in -t patch SUSE-SLE-INSTALLER-15-SP2-2024-3659=1 * SUSE Linux Enterprise Server 15 SP3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP3-2024-3659=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3659=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3659=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3659=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3659=1 SUSE-SLE- INSTALLER-15-SP4-2024-3659=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3659=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3659=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3659=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3659=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3659=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3659=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3659=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3659=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3659=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3659=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3659=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3659=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3659=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3659=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3659=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3659=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3659=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3659=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3659=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3659=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3659=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3659=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3659=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3659=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3659=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3659=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3659=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3659=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3659=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3659=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3659=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3659=1 ## Package List: * openSUSE Leap Micro 5.5 (aarch64 ppc64le s390x x86_64) * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cross-m68k-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * gcc14-objc-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-riscv64-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * cross-hppa-gcc14-14.2.0+git10526-150000.1.3.2 * cross-sparc64-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * libgo23-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-arm-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * libtsan2-14.2.0+git10526-150000.1.3.3 * cross-sparc64-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * cross-hppa-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * cross-m68k-gcc14-14.2.0+git10526-150000.1.3.2 * libada14-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * libm2cor19-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-locale-14.2.0+git10526-150000.1.3.3 * gcc14-obj-c++-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-sparc64-gcc14-14.2.0+git10526-150000.1.3.2 * cross-avr-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * libm2iso19-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2pim19-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-arm-gcc14-14.2.0+git10526-150000.1.3.2 * cross-mips-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cross-rx-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * libstdc++6-14.2.0+git10526-150000.1.3.3 * gcc14-c++-14.2.0+git10526-150000.1.3.3 * cross-sparc-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * libm2min19-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-hppa-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * libgomp1-14.2.0+git10526-150000.1.3.3 * cross-hppa-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-mips-gcc14-14.2.0+git10526-150000.1.3.2 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-rx-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-sparc-gcc14-14.2.0+git10526-150000.1.3.2 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-riscv64-elf-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libstdc++6-devel-gcc14-14.2.0+git10526-150000.1.3.3 * gcc14-m2-14.2.0+git10526-150000.1.3.3 * cross-arm-none-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-sparc64-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * gcc14-fortran-14.2.0+git10526-150000.1.3.3 * cross-arm-none-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * cross-sparc-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cross-avr-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-hppa-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * libada14-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-pru-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * gcc14-fortran-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2cor19-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * cross-pru-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-m68k-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cpp14-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-arm-none-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * cross-riscv64-elf-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * libgo23-14.2.0+git10526-150000.1.3.3 * cross-bpf-gcc14-debugsource-14.2.0+git10526-150000.1.3.1 * cross-hppa-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-rx-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * gcc14-PIE-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-sparcv9-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-go-14.2.0+git10526-150000.1.3.3 * cross-riscv64-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * gcc14-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-m2-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-mips-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * gcc14-ada-14.2.0+git10526-150000.1.3.3 * cross-riscv64-elf-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2log19-14.2.0+git10526-150000.1.3.3 * gcc14-obj-c++-14.2.0+git10526-150000.1.3.3 * cross-pru-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * cross-avr-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * cross-arm-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * cross-m68k-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * gcc14-go-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2log19-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-objc-14.2.0+git10526-150000.1.3.3 * cross-bpf-gcc14-debuginfo-14.2.0+git10526-150000.1.3.1 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * libm2min19-14.2.0+git10526-150000.1.3.3 * libm2iso19-14.2.0+git10526-150000.1.3.3 * gcc14-testresults-14.2.0+git10526-150000.1.3.6 * cross-riscv64-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-arm-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * gcc14-c++-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-hppa-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * cross-mips-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * cpp14-14.2.0+git10526-150000.1.3.3 * libm2pim19-14.2.0+git10526-150000.1.3.3 * cross-bpf-gcc14-14.2.0+git10526-150000.1.3.1 * gcc14-ada-debuginfo-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * cross-aarch64-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * cross-aarch64-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-aarch64-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * openSUSE Leap 15.5 (x86_64) * cross-nvptx-gcc14-14.2.0+git10526-150000.1.3.2 * cross-nvptx-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cross-nvptx-newlib14-devel-14.2.0+git10526-150000.1.3.2 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * cross-nvptx-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.5 (aarch64 s390x x86_64) * cross-ppc64-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cross-ppc64le-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * gcc14-d-debuginfo-14.2.0+git10526-150000.1.3.3 * libgdruntime5-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-d-14.2.0+git10526-150000.1.3.3 * cross-ppc64le-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * cross-ppc64le-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * cross-ppc64-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * cross-ppc64-gcc14-14.2.0+git10526-150000.1.3.2 * libgdruntime5-14.2.0+git10526-150000.1.3.3 * libgphobos5-14.2.0+git10526-150000.1.3.3 * libgphobos5-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-ppc64-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * cross-s390x-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * cross-s390x-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-s390x-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * openSUSE Leap 15.5 (s390x x86_64) * libm2log19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-fortran-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-m2-32bit-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgdruntime5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2iso19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgo23-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-d-32bit-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-obj-c++-32bit-14.2.0+git10526-150000.1.3.3 * libgphobos5-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-c++-32bit-14.2.0+git10526-150000.1.3.3 * libm2log19-32bit-14.2.0+git10526-150000.1.3.3 * libm2min19-32bit-14.2.0+git10526-150000.1.3.3 * libm2cor19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-ada-32bit-14.2.0+git10526-150000.1.3.3 * libgphobos5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgo23-32bit-14.2.0+git10526-150000.1.3.3 * libm2iso19-32bit-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-32bit-14.2.0+git10526-150000.1.3.3 * libm2min19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libm2pim19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libada14-32bit-14.2.0+git10526-150000.1.3.3 * libm2pim19-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libada14-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-go-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-objc-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libgdruntime5-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2cor19-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-devel-gcc14-32bit-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.5 (noarch) * gcc14-info-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.5 (aarch64 x86_64) * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.5 (ppc64le x86_64) * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.5 (aarch64 ppc64le s390x) * cross-x86_64-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-x86_64-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cross-x86_64-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * cross-x86_64-gcc14-14.2.0+git10526-150000.1.3.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cross-m68k-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * gcc14-objc-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-riscv64-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * cross-hppa-gcc14-14.2.0+git10526-150000.1.3.2 * cross-sparc64-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * libgo23-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-arm-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * libtsan2-14.2.0+git10526-150000.1.3.3 * cross-sparc64-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * cross-hppa-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * cross-m68k-gcc14-14.2.0+git10526-150000.1.3.2 * libada14-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * libm2cor19-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-locale-14.2.0+git10526-150000.1.3.3 * gcc14-obj-c++-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-sparc64-gcc14-14.2.0+git10526-150000.1.3.2 * cross-avr-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * libm2iso19-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2pim19-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-arm-gcc14-14.2.0+git10526-150000.1.3.2 * cross-mips-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cross-rx-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * libstdc++6-14.2.0+git10526-150000.1.3.3 * gcc14-c++-14.2.0+git10526-150000.1.3.3 * cross-sparc-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * libm2min19-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-hppa-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * libgomp1-14.2.0+git10526-150000.1.3.3 * cross-hppa-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-mips-gcc14-14.2.0+git10526-150000.1.3.2 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-rx-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-sparc-gcc14-14.2.0+git10526-150000.1.3.2 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-riscv64-elf-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libstdc++6-devel-gcc14-14.2.0+git10526-150000.1.3.3 * gcc14-m2-14.2.0+git10526-150000.1.3.3 * cross-arm-none-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-sparc64-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * gcc14-fortran-14.2.0+git10526-150000.1.3.3 * cross-arm-none-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * cross-sparc-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cross-avr-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-hppa-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * libada14-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-pru-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * gcc14-fortran-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2cor19-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * cross-pru-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-m68k-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cpp14-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-arm-none-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * cross-riscv64-elf-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * libgo23-14.2.0+git10526-150000.1.3.3 * cross-bpf-gcc14-debugsource-14.2.0+git10526-150000.1.3.1 * cross-hppa-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-rx-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * gcc14-PIE-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-sparcv9-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-go-14.2.0+git10526-150000.1.3.3 * cross-riscv64-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * gcc14-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-m2-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-mips-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * gcc14-ada-14.2.0+git10526-150000.1.3.3 * cross-riscv64-elf-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2log19-14.2.0+git10526-150000.1.3.3 * gcc14-obj-c++-14.2.0+git10526-150000.1.3.3 * cross-pru-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * cross-avr-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * cross-arm-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * cross-m68k-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * gcc14-go-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2log19-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-objc-14.2.0+git10526-150000.1.3.3 * cross-bpf-gcc14-debuginfo-14.2.0+git10526-150000.1.3.1 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * libm2min19-14.2.0+git10526-150000.1.3.3 * libm2iso19-14.2.0+git10526-150000.1.3.3 * gcc14-testresults-14.2.0+git10526-150000.1.3.6 * cross-riscv64-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-arm-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * gcc14-c++-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-hppa-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * cross-mips-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * cpp14-14.2.0+git10526-150000.1.3.3 * libm2pim19-14.2.0+git10526-150000.1.3.3 * cross-bpf-gcc14-14.2.0+git10526-150000.1.3.1 * gcc14-ada-debuginfo-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * cross-aarch64-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * cross-aarch64-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-aarch64-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * openSUSE Leap 15.6 (x86_64) * cross-nvptx-gcc14-14.2.0+git10526-150000.1.3.2 * cross-nvptx-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cross-nvptx-newlib14-devel-14.2.0+git10526-150000.1.3.2 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * cross-nvptx-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-devel-gcc14-32bit-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.6 (aarch64 s390x x86_64) * cross-ppc64-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cross-ppc64le-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * gcc14-d-debuginfo-14.2.0+git10526-150000.1.3.3 * libgdruntime5-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-d-14.2.0+git10526-150000.1.3.3 * cross-ppc64le-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * cross-ppc64le-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * cross-ppc64-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * cross-ppc64-gcc14-14.2.0+git10526-150000.1.3.2 * libgdruntime5-14.2.0+git10526-150000.1.3.3 * libgphobos5-14.2.0+git10526-150000.1.3.3 * libgphobos5-debuginfo-14.2.0+git10526-150000.1.3.3 * cross-ppc64-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * cross-s390x-gcc14-bootstrap-14.2.0+git10526-150000.1.3.2 * cross-s390x-gcc14-bootstrap-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-s390x-gcc14-bootstrap-debugsource-14.2.0+git10526-150000.1.3.2 * openSUSE Leap 15.6 (s390x x86_64) * libm2log19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-fortran-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-m2-32bit-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgdruntime5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2iso19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgo23-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-d-32bit-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-obj-c++-32bit-14.2.0+git10526-150000.1.3.3 * libgphobos5-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-c++-32bit-14.2.0+git10526-150000.1.3.3 * libm2log19-32bit-14.2.0+git10526-150000.1.3.3 * libm2min19-32bit-14.2.0+git10526-150000.1.3.3 * libm2cor19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-ada-32bit-14.2.0+git10526-150000.1.3.3 * libgphobos5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgo23-32bit-14.2.0+git10526-150000.1.3.3 * libm2iso19-32bit-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-32bit-14.2.0+git10526-150000.1.3.3 * libm2min19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libm2pim19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libada14-32bit-14.2.0+git10526-150000.1.3.3 * libm2pim19-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libada14-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-go-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-objc-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libgdruntime5-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2cor19-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-devel-gcc14-32bit-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.6 (noarch) * gcc14-info-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.6 (aarch64 x86_64) * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.6 (ppc64le x86_64) * libquadmath0-devel-gcc14-14.2.0+git10526-150000.1.3.3 * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x) * cross-x86_64-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * cross-x86_64-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cross-x86_64-gcc14-icecream-backend-14.2.0+git10526-150000.1.3.2 * cross-x86_64-gcc14-14.2.0+git10526-150000.1.3.2 * SUSE Linux Enterprise Server 15 SP2 (aarch64 ppc64le s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP3 (aarch64 ppc64le s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * SUSE Manager Proxy 4.3 (x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * Basesystem Module 15-SP5 (aarch64 x86_64) * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * Basesystem Module 15-SP5 (ppc64le x86_64) * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * Basesystem Module 15-SP5 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * Basesystem Module 15-SP6 (aarch64 x86_64) * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * Basesystem Module 15-SP6 (ppc64le x86_64) * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * Basesystem Module 15-SP6 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libstdc++6-devel-gcc14-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * cpp14-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-c++-14.2.0+git10526-150000.1.3.3 * gcc14-PIE-14.2.0+git10526-150000.1.3.3 * cpp14-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-fortran-14.2.0+git10526-150000.1.3.3 * gcc14-14.2.0+git10526-150000.1.3.3 * gcc14-c++-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-fortran-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-locale-14.2.0+git10526-150000.1.3.3 * Development Tools Module 15-SP5 (noarch) * gcc14-info-14.2.0+git10526-150000.1.3.3 * Development Tools Module 15-SP5 (ppc64le x86_64) * libquadmath0-devel-gcc14-14.2.0+git10526-150000.1.3.3 * Development Tools Module 15-SP5 (x86_64) * gcc14-fortran-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-c++-32bit-14.2.0+git10526-150000.1.3.3 * cross-nvptx-gcc14-14.2.0+git10526-150000.1.3.2 * cross-nvptx-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cross-nvptx-newlib14-devel-14.2.0+git10526-150000.1.3.2 * cross-nvptx-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * libquadmath0-devel-gcc14-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-devel-gcc14-32bit-14.2.0+git10526-150000.1.3.3 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libstdc++6-devel-gcc14-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * cpp14-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-c++-14.2.0+git10526-150000.1.3.3 * gcc14-PIE-14.2.0+git10526-150000.1.3.3 * cpp14-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-fortran-14.2.0+git10526-150000.1.3.3 * gcc14-14.2.0+git10526-150000.1.3.3 * gcc14-c++-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-fortran-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-locale-14.2.0+git10526-150000.1.3.3 * Development Tools Module 15-SP6 (noarch) * gcc14-info-14.2.0+git10526-150000.1.3.3 * Development Tools Module 15-SP6 (ppc64le x86_64) * libquadmath0-devel-gcc14-14.2.0+git10526-150000.1.3.3 * Development Tools Module 15-SP6 (x86_64) * gcc14-fortran-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-c++-32bit-14.2.0+git10526-150000.1.3.3 * cross-nvptx-gcc14-14.2.0+git10526-150000.1.3.2 * cross-nvptx-gcc14-debugsource-14.2.0+git10526-150000.1.3.2 * cross-nvptx-newlib14-devel-14.2.0+git10526-150000.1.3.2 * cross-nvptx-gcc14-debuginfo-14.2.0+git10526-150000.1.3.2 * libquadmath0-devel-gcc14-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-devel-gcc14-32bit-14.2.0+git10526-150000.1.3.3 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * gcc14-objc-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2log19-14.2.0+git10526-150000.1.3.3 * gcc14-obj-c++-14.2.0+git10526-150000.1.3.3 * libgo23-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-go-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2log19-debuginfo-14.2.0+git10526-150000.1.3.3 * libgo23-14.2.0+git10526-150000.1.3.3 * gcc14-objc-14.2.0+git10526-150000.1.3.3 * libada14-14.2.0+git10526-150000.1.3.3 * libm2cor19-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-obj-c++-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * libm2min19-14.2.0+git10526-150000.1.3.3 * gcc14-m2-14.2.0+git10526-150000.1.3.3 * libm2iso19-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2iso19-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2pim19-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-go-14.2.0+git10526-150000.1.3.3 * libm2pim19-14.2.0+git10526-150000.1.3.3 * libm2min19-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-m2-debuginfo-14.2.0+git10526-150000.1.3.3 * libada14-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-ada-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-ada-14.2.0+git10526-150000.1.3.3 * libm2cor19-14.2.0+git10526-150000.1.3.3 * SUSE Package Hub 15 15-SP5 (aarch64 s390x x86_64) * gcc14-d-debuginfo-14.2.0+git10526-150000.1.3.3 * libgdruntime5-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-d-14.2.0+git10526-150000.1.3.3 * libgphobos5-14.2.0+git10526-150000.1.3.3 * libgdruntime5-14.2.0+git10526-150000.1.3.3 * libgphobos5-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Package Hub 15 15-SP5 (x86_64) * libm2log19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-m2-32bit-14.2.0+git10526-150000.1.3.3 * libm2cor19-32bit-14.2.0+git10526-150000.1.3.3 * libgdruntime5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgo23-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-d-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-obj-c++-32bit-14.2.0+git10526-150000.1.3.3 * libgphobos5-32bit-14.2.0+git10526-150000.1.3.3 * libm2log19-32bit-14.2.0+git10526-150000.1.3.3 * libm2min19-32bit-14.2.0+git10526-150000.1.3.3 * libm2cor19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-ada-32bit-14.2.0+git10526-150000.1.3.3 * libgphobos5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2iso19-32bit-14.2.0+git10526-150000.1.3.3 * libgo23-32bit-14.2.0+git10526-150000.1.3.3 * libm2min19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2pim19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libada14-32bit-14.2.0+git10526-150000.1.3.3 * libm2pim19-32bit-14.2.0+git10526-150000.1.3.3 * libada14-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-go-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-objc-32bit-14.2.0+git10526-150000.1.3.3 * libgdruntime5-32bit-14.2.0+git10526-150000.1.3.3 * libm2iso19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * gcc14-objc-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2log19-14.2.0+git10526-150000.1.3.3 * gcc14-obj-c++-14.2.0+git10526-150000.1.3.3 * libgo23-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-go-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2log19-debuginfo-14.2.0+git10526-150000.1.3.3 * libgo23-14.2.0+git10526-150000.1.3.3 * gcc14-objc-14.2.0+git10526-150000.1.3.3 * libada14-14.2.0+git10526-150000.1.3.3 * libm2cor19-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-obj-c++-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * libm2min19-14.2.0+git10526-150000.1.3.3 * gcc14-m2-14.2.0+git10526-150000.1.3.3 * libm2iso19-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2iso19-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2pim19-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-go-14.2.0+git10526-150000.1.3.3 * libm2pim19-14.2.0+git10526-150000.1.3.3 * libm2min19-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-m2-debuginfo-14.2.0+git10526-150000.1.3.3 * libada14-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-ada-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-ada-14.2.0+git10526-150000.1.3.3 * libm2cor19-14.2.0+git10526-150000.1.3.3 * SUSE Package Hub 15 15-SP6 (aarch64 s390x x86_64) * gcc14-d-debuginfo-14.2.0+git10526-150000.1.3.3 * libgdruntime5-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-d-14.2.0+git10526-150000.1.3.3 * libgphobos5-14.2.0+git10526-150000.1.3.3 * libgdruntime5-14.2.0+git10526-150000.1.3.3 * libgphobos5-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Package Hub 15 15-SP6 (x86_64) * libm2log19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-m2-32bit-14.2.0+git10526-150000.1.3.3 * libm2cor19-32bit-14.2.0+git10526-150000.1.3.3 * libgdruntime5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgo23-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-d-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-obj-c++-32bit-14.2.0+git10526-150000.1.3.3 * libgphobos5-32bit-14.2.0+git10526-150000.1.3.3 * libm2log19-32bit-14.2.0+git10526-150000.1.3.3 * libm2min19-32bit-14.2.0+git10526-150000.1.3.3 * libm2cor19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-ada-32bit-14.2.0+git10526-150000.1.3.3 * libgphobos5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2iso19-32bit-14.2.0+git10526-150000.1.3.3 * libgo23-32bit-14.2.0+git10526-150000.1.3.3 * libm2min19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libm2pim19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libada14-32bit-14.2.0+git10526-150000.1.3.3 * libm2pim19-32bit-14.2.0+git10526-150000.1.3.3 * libada14-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-go-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-objc-32bit-14.2.0+git10526-150000.1.3.3 * libgdruntime5-32bit-14.2.0+git10526-150000.1.3.3 * libm2iso19-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (ppc64le x86_64) * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (ppc64le x86_64) * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64) * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (ppc64le x86_64) * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libgomp1-14.2.0+git10526-150000.1.3.3 * libgomp1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-debuginfo-14.2.0+git10526-150000.1.3.3 * libtsan2-14.2.0+git10526-150000.1.3.3 * libubsan1-14.2.0+git10526-150000.1.3.3 * libobjc4-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * libobjc4-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-14.2.0+git10526-150000.1.3.3 * libgfortran5-14.2.0+git10526-150000.1.3.3 * libitm1-14.2.0+git10526-150000.1.3.3 * libstdc++6-locale-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * libgfortran5-debuginfo-14.2.0+git10526-150000.1.3.3 * libubsan1-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libhwasan0-14.2.0+git10526-150000.1.3.3 * libasan8-14.2.0+git10526-150000.1.3.3 * libatomic1-debuginfo-14.2.0+git10526-150000.1.3.3 * liblsan0-debuginfo-14.2.0+git10526-150000.1.3.3 * libstdc++6-14.2.0+git10526-150000.1.3.3 * libasan8-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Enterprise Storage 7.1 (x86_64) * libstdc++6-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-debuginfo-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libquadmath0-14.2.0+git10526-150000.1.3.3 * libatomic1-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-pp-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-14.2.0+git10526-150000.1.3.3 * libubsan1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libitm1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgfortran5-32bit-14.2.0+git10526-150000.1.3.3 * libstdc++6-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-32bit-14.2.0+git10526-150000.1.3.3 * libasan8-32bit-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-14.2.0+git10526-150000.1.3.3 * libobjc4-32bit-14.2.0+git10526-150000.1.3.3 * libquadmath0-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * libgomp1-32bit-debuginfo-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libstdc++6-14.2.0+git10526-150000.1.3.3 * gcc14-debugsource-14.2.0+git10526-150000.1.3.3 * libstdc++6-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-debuginfo-14.2.0+git10526-150000.1.3.3 * gcc14-debuginfo-14.2.0+git10526-150000.1.3.3 * libgcc_s1-14.2.0+git10526-150000.1.3.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1188441 * https://bugzilla.suse.com/show_bug.cgi?id=1210959 * https://bugzilla.suse.com/show_bug.cgi?id=1214915 * https://bugzilla.suse.com/show_bug.cgi?id=1219031 * https://bugzilla.suse.com/show_bug.cgi?id=1220724 * https://bugzilla.suse.com/show_bug.cgi?id=1221601 * https://jira.suse.com/browse/PED-10474 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 16:30:48 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 16:30:48 -0000 Subject: SUSE-SU-2024:3658-1: moderate: Security update for keepalived Message-ID: <172909624840.7152.7346505853442072417@smelt2.prg2.suse.org> # Security update for keepalived Announcement ID: SUSE-SU-2024:3658-1 Release Date: 2024-10-16T13:03:40Z Rating: moderate References: * bsc#1228123 Cross-References: * CVE-2024-41184 CVSS scores: * CVE-2024-41184 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 An update that solves one vulnerability can now be installed. ## Description: This update for keepalived fixes the following issues: * CVE-2024-41184: fixed integer overflow in vrrp_ipsets_handler (bsc#1228123) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-3658=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-3658=1 ## Package List: * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * keepalived-2.0.19-150100.3.9.1 * keepalived-debugsource-2.0.19-150100.3.9.1 * keepalived-debuginfo-2.0.19-150100.3.9.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * keepalived-2.0.19-150100.3.9.1 * keepalived-debugsource-2.0.19-150100.3.9.1 * keepalived-debuginfo-2.0.19-150100.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41184.html * https://bugzilla.suse.com/show_bug.cgi?id=1228123 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 16:30:53 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 16:30:53 -0000 Subject: SUSE-RU-2024:3657-1: moderate: Recommended update for release-notes-sles Message-ID: <172909625334.7152.2200577069186897380@smelt2.prg2.suse.org> # Recommended update for release-notes-sles Announcement ID: SUSE-RU-2024:3657-1 Release Date: 2024-10-16T12:45:04Z Rating: moderate References: * bsc#1214405 * bsc#1222298 * bsc#933411 * jsc#PED-8089 * jsc#SLE-17083 * jsc#SLE-21015 * jsc#SLE-21223 * jsc#SLE-21234 * jsc#SLE-21522 * jsc#SLE-22248 * jsc#SLE-22569 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that contains eight features and has three fixes can now be installed. ## Description: This update for release-notes-sles fixes the following issues: * Version update 12.5.20241014 (bsc#933411) * Added note about openSSH (bsc#1222298) * Added note about unsupported hibernate/suspend on Xen (bsc#1214405) * Added note about chrony (jsc#SLE-22248) * Added note about adcli --dont-expire-password (jsc#SLE-21223) * Added note about sudo -U -l restriction (jsc#SLE-22569) * Added note about nodejs16 addition (jsc#SLE-21234) * Added note about rsyslog (jsc#SLE-21522) * Added note about tcl (jsc#SLE-21015) * Added note about sudo update (jsc#SLE-17083) * Added note about unsupported modules (jsc#PED-8089) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3657=1 SUSE-SLE-SERVER- INSTALLER-12-SP5-2024-3657=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3657=1 SUSE-SLE-SERVER- INSTALLER-12-SP5-2024-3657=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3657=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * release-notes-sles-12.5.20241014-3.40.2 * SUSE Linux Enterprise Server 12 SP5 (noarch) * release-notes-sles-12.5.20241014-3.40.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * release-notes-sles-12.5.20241014-3.40.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214405 * https://bugzilla.suse.com/show_bug.cgi?id=1222298 * https://bugzilla.suse.com/show_bug.cgi?id=933411 * https://jira.suse.com/browse/PED-8089 * https://jira.suse.com/browse/SLE-17083 * https://jira.suse.com/browse/SLE-21015 * https://jira.suse.com/browse/SLE-21223 * https://jira.suse.com/browse/SLE-21234 * https://jira.suse.com/browse/SLE-21522 * https://jira.suse.com/browse/SLE-22248 * https://jira.suse.com/browse/SLE-22569 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:30:12 -0000 Subject: SUSE-SU-2024:3702-1: important: Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) Message-ID: <172911061244.6932.15004553900106843185@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3702-1 Release Date: 2024-10-16T19:34:10Z Rating: important References: * bsc#1223683 * bsc#1225099 * bsc#1225739 * bsc#1228349 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2023-52846 * CVE-2024-26923 * CVE-2024-36899 * CVE-2024-40909 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves six vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_68 fixes several issues. The following security issues were fixed: * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1228349). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3702=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3702=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_15-debugsource-4-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-4-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_15-debugsource-4-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-4-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1228349 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:30:19 -0000 Subject: SUSE-SU-2024:3701-1: important: Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) Message-ID: <172911061992.6932.813321275335028639@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3701-1 Release Date: 2024-10-16T19:34:00Z Rating: important References: * bsc#1223363 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2023-52846 * CVE-2024-26828 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves nine vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_62 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3701=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3701=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-5-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_13-debugsource-5-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-5-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_13-debugsource-5-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:30:31 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:30:31 -0000 Subject: SUSE-SU-2024:3700-1: important: Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) Message-ID: <172911063104.6932.5123925806505119407@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:3700-1 Release Date: 2024-10-16T19:33:49Z Rating: important References: * bsc#1223059 * bsc#1223363 * bsc#1223681 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225310 * bsc#1225312 * bsc#1225313 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2023-52846 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 13 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_119 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3700=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3700=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_26-debugsource-6-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-6-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_26-debugsource-6-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-6-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:30:33 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:30:33 -0000 Subject: SUSE-SU-2024:3698-1: important: Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) Message-ID: <172911063362.6932.12156911788210406440@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:3698-1 Release Date: 2024-10-16T19:33:32Z Rating: important References: * bsc#1228573 Cross-References: * CVE-2024-41059 CVSS scores: * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_222 fixes one issue. The following security issue was fixed: * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-3698=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_222-default-2-8.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:30:49 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:30:49 -0000 Subject: SUSE-SU-2024:3697-1: important: Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5) Message-ID: <172911064939.6932.14578819309265717781@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3697-1 Release Date: 2024-10-16T19:04:40Z Rating: important References: * bsc#1220145 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225310 * bsc#1225312 * bsc#1225313 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52502 * CVE-2023-52846 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26610 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 19 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_52 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3697=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3697=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_11-debugsource-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_52-default-debuginfo-7-150500.11.6.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_11-debugsource-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_52-default-debuginfo-7-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:31:04 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:31:04 -0000 Subject: SUSE-SU-2024:3696-1: important: Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) Message-ID: <172911066486.6932.9382064624755921921@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:3696-1 Release Date: 2024-10-16T19:04:30Z Rating: important References: * bsc#1220145 * bsc#1221302 * bsc#1222882 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225310 * bsc#1225312 * bsc#1225313 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52846 * CVE-2024-23307 * CVE-2024-26610 * CVE-2024-26766 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 18 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_116 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3696=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3696=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_25-debugsource-7-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-7-150400.9.8.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_25-debugsource-7-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-7-150400.9.8.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:31:21 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:31:21 -0000 Subject: SUSE-SU-2024:3695-1: important: Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) Message-ID: <172911068183.6932.17909438321712159792@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:3695-1 Release Date: 2024-10-16T19:04:20Z Rating: important References: * bsc#1220145 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1222882 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225310 * bsc#1225312 * bsc#1225313 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52502 * CVE-2023-52846 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26610 * CVE-2024-26766 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 20 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_111 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3695=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3695=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_24-debugsource-7-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-7-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_24-debugsource-7-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-7-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:31:25 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:31:25 -0000 Subject: SUSE-SU-2024:3687-1: important: Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5) Message-ID: <172911068500.6932.17126658087177413776@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:3687-1 Release Date: 2024-10-16T18:33:32Z Rating: important References: * bsc#1226325 * bsc#1228573 Cross-References: * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_194 fixes several issues. The following security issues were fixed: * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-3687=1 SUSE-SLE-Live- Patching-12-SP5-2024-3682=1 SUSE-SLE-Live-Patching-12-SP5-2024-3683=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_176-default-14-2.1 * kgraft-patch-4_12_14-122_186-default-12-2.1 * kgraft-patch-4_12_14-122_194-default-9-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:31:27 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:31:27 -0000 Subject: SUSE-SU-2024:3680-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) Message-ID: <172911068756.6932.3832659147705267125@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) Announcement ID: SUSE-SU-2024:3680-1 Release Date: 2024-10-16T17:34:24Z Rating: important References: * bsc#1225739 * bsc#1228786 Cross-References: * CVE-2024-36899 * CVE-2024-40954 CVSS scores: * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_7 fixes several issues. The following security issues were fixed: * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3680=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3680=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_1-debugsource-3-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-3-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_7-default-3-150600.13.6.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_1-debugsource-3-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-3-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_7-default-3-150600.13.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:31:40 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:31:40 -0000 Subject: SUSE-SU-2024:3679-1: important: Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) Message-ID: <172911070051.6932.7115729194596207224@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3679-1 Release Date: 2024-10-16T17:34:15Z Rating: important References: * bsc#1221302 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225310 * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52846 * CVE-2024-26610 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 14 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_59 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3679=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3679=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 * kernel-livepatch-5_14_21-150500_55_59-default-debuginfo-7-150500.11.10.1 * kernel-livepatch-SLE15-SP5_Update_12-debugsource-7-150500.11.10.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 * kernel-livepatch-5_14_21-150500_55_59-default-debuginfo-7-150500.11.10.1 * kernel-livepatch-SLE15-SP5_Update_12-debugsource-7-150500.11.10.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:31:58 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:31:58 -0000 Subject: SUSE-SU-2024:3694-1: important: Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) Message-ID: <172911071816.6932.8275243808698690230@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3694-1 Release Date: 2024-10-16T19:04:10Z Rating: important References: * bsc#1219296 * bsc#1220145 * bsc#1220211 * bsc#1220828 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1222882 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225310 * bsc#1225312 * bsc#1225313 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52340 * CVE-2023-52502 * CVE-2023-52846 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26585 * CVE-2024-26610 * CVE-2024-26622 * CVE-2024-26766 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52340 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 23 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_49 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220211). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828). * CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big' packets (bsc#1219296). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3694=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3694=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3678=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3678=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-9-150400.9.8.1 * kernel-livepatch-SLE15-SP4_Update_23-debugsource-9-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-9-150400.9.8.1 * kernel-livepatch-SLE15-SP4_Update_23-debugsource-9-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 * kernel-livepatch-SLE15-SP5_Update_10-debugsource-9-150500.11.8.1 * kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-9-150500.11.8.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 * kernel-livepatch-SLE15-SP5_Update_10-debugsource-9-150500.11.8.1 * kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-9-150500.11.8.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52340.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26585.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26622.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1219296 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220211 * https://bugzilla.suse.com/show_bug.cgi?id=1220828 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:32:04 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:32:04 -0000 Subject: SUSE-SU-2024:3676-1: important: Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP2) Message-ID: <172911072476.6932.6935521602089305263@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:3676-1 Release Date: 2024-10-16T17:33:49Z Rating: important References: * bsc#1223683 * bsc#1225310 * bsc#1225312 * bsc#1226325 * bsc#1227651 * bsc#1228573 Cross-References: * CVE-2021-47291 * CVE-2024-26923 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves six vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_194 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-3676=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_194-default-debuginfo-3-150200.5.6.1 * kernel-livepatch-SLE15-SP2_Update_49-debugsource-3-150200.5.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:32:09 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:32:09 -0000 Subject: SUSE-SU-2024:3674-1: important: Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) Message-ID: <172911072972.6932.4593952160114464061@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:3674-1 Release Date: 2024-10-16T17:03:36Z Rating: important References: * bsc#1223683 * bsc#1225310 * bsc#1226325 * bsc#1228573 Cross-References: * CVE-2024-26923 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_219 fixes several issues. The following security issues were fixed: * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-3674=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_219-default-3-8.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:32:16 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:32:16 -0000 Subject: SUSE-SU-2024:3672-1: important: Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) Message-ID: <172911073688.6932.1459523473875137198@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:3672-1 Release Date: 2024-10-16T16:34:16Z Rating: important References: * bsc#1223683 * bsc#1225099 * bsc#1225310 * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2023-52846 * CVE-2024-26923 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves eight vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_122 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3672=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3672=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-4-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_27-debugsource-4-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-4-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_27-debugsource-4-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:32:21 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:32:21 -0000 Subject: SUSE-SU-2024:3670-1: important: Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) Message-ID: <172911074197.6932.8070582480224827182@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3670-1 Release Date: 2024-10-16T19:33:39Z Rating: important References: * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_44 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3670=1 SUSE-2024-3699=1 SUSE-2024-3671=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3670=1 SUSE-SLE- Module-Live-Patching-15-SP4-2024-3699=1 SUSE-SLE-Module-Live- Patching-15-SP4-2024-3671=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3689=1 SUSE-2024-3673=1 SUSE-2024-3688=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3689=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-3673=1 SUSE-SLE-Module-Live- Patching-15-SP5-2024-3688=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_97-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_22-debugsource-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_21-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_20-debugsource-12-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_97-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_22-debugsource-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_21-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_20-debugsource-12-150400.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_28-default-debuginfo-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_5-debugsource-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_8-debugsource-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_9-debugsource-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-14-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_28-default-debuginfo-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_5-debugsource-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_8-debugsource-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_9-debugsource-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-14-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:32:32 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:32:32 -0000 Subject: SUSE-SU-2024:3685-1: important: Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) Message-ID: <172911075234.6932.2170716516659244443@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:3685-1 Release Date: 2024-10-16T18:04:02Z Rating: important References: * bsc#1210619 * bsc#1223363 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225302 * bsc#1225310 * bsc#1225312 * bsc#1226325 * bsc#1227651 * bsc#1228573 Cross-References: * CVE-2021-47291 * CVE-2021-47378 * CVE-2021-47383 * CVE-2021-47402 * CVE-2023-1829 * CVE-2024-26828 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves 12 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_161 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-3685=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3669=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-3669=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_191-default-debuginfo-6-150200.5.6.1 * kernel-livepatch-SLE15-SP2_Update_48-debugsource-6-150200.5.6.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_44-debugsource-6-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_161-default-debuginfo-6-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_161-preempt-6-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_161-preempt-debuginfo-6-150300.7.6.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225302 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:32:37 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:32:37 -0000 Subject: SUSE-SU-2024:3690-1: important: Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3) Message-ID: <172911075713.6932.4563868232262919434@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:3690-1 Release Date: 2024-10-16T19:04:01Z Rating: important References: * bsc#1225312 * bsc#1226325 * bsc#1227651 * bsc#1228573 Cross-References: * CVE-2021-47291 * CVE-2024-35861 * CVE-2024-36964 * CVE-2024-41059 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_147 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-3684=1 SUSE-SLE- Module-Live-Patching-15-SP2-2024-3691=1 SUSE-SLE-Module-Live- Patching-15-SP2-2024-3667=1 SUSE-SLE-Module-Live-Patching-15-SP2-2024-3690=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3692=1 SUSE-2024-3668=1 SUSE-2024-3677=1 SUSE-2024-3686=1 SUSE-2024-3693=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-3692=1 SUSE-SLE- Module-Live-Patching-15-SP3-2024-3668=1 SUSE-SLE-Module-Live- Patching-15-SP3-2024-3677=1 SUSE-SLE-Module-Live-Patching-15-SP3-2024-3686=1 SUSE-SLE-Module-Live-Patching-15-SP3-2024-3693=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_163-default-14-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_43-debugsource-12-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_44-debugsource-13-150200.2.1 * kernel-livepatch-5_3_18-150200_24_172-default-12-150200.2.1 * kernel-livepatch-5_3_18-150200_24_172-default-debuginfo-12-150200.2.1 * kernel-livepatch-5_3_18-150200_24_175-default-debuginfo-13-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_40-debugsource-14-150200.2.1 * kernel-livepatch-5_3_18-150200_24_163-default-debuginfo-14-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_42-debugsource-14-150200.2.1 * kernel-livepatch-5_3_18-150200_24_169-default-debuginfo-14-150200.2.1 * kernel-livepatch-5_3_18-150200_24_175-default-13-150200.2.1 * kernel-livepatch-5_3_18-150200_24_169-default-14-150200.2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_144-default-debuginfo-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_138-default-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_133-default-debuginfo-14-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_39-debugsource-12-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_38-debugsource-13-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-default-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-default-12-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_36-debugsource-14-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_37-debugsource-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-default-debuginfo-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_138-default-debuginfo-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-default-13-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-default-debuginfo-13-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_40-debugsource-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_133-default-14-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_133-preempt-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-preempt-debuginfo-13-150300.2.1 * kernel-livepatch-5_3_18-150300_59_138-preempt-debuginfo-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_133-preempt-debuginfo-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-preempt-debuginfo-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-preempt-13-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-preempt-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-preempt-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-preempt-debuginfo-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_138-preempt-14-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_138-default-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-default-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-default-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-default-13-150300.2.1 * kernel-livepatch-5_3_18-150300_59_133-default-14-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:32:43 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:32:43 -0000 Subject: SUSE-SU-2024:3666-1: important: Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) Message-ID: <172911076365.6932.6076329253652595298@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) Announcement ID: SUSE-SU-2024:3666-1 Release Date: 2024-10-16T16:03:40Z Rating: important References: * bsc#1225099 * bsc#1225312 * bsc#1225313 * bsc#1225739 * bsc#1226325 * bsc#1228786 Cross-References: * CVE-2023-52846 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 CVSS scores: * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves six vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_21 fixes several issues. The following security issues were fixed: * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3666=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3666=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1 * kernel-livepatch-6_4_0-150600_21-default-debuginfo-5-150600.1.1 * kernel-livepatch-SLE15-SP6_Update_0-debugsource-5-150600.1.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1 * kernel-livepatch-6_4_0-150600_21-default-debuginfo-5-150600.1.1 * kernel-livepatch-SLE15-SP6_Update_0-debugsource-5-150600.1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:32:46 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:32:46 -0000 Subject: SUSE-RU-2024:3681-1: important: Recommended update for libzypp Message-ID: <172911076684.6932.11915550575371149572@smelt2.prg2.suse.org> # Recommended update for libzypp Announcement ID: SUSE-RU-2024:3681-1 Release Date: 2024-10-16T17:34:50Z Rating: important References: * bsc#1230912 * bsc#1231043 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has two fixes can now be installed. ## Description: This update for libzypp fixes the following issues: * Send unescaped colons in header values. According to the STOMP protocol, it would be correct to escape colon here but the practice broke plugin receivers that didn't expect this. The incompatiblity affected customers who were running spacewalk-repo-sync and experienced issues when accessing the cloud URL. [bsc#1231043] * Fix hang in curl code with no network connection. [bsc#1230912] ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3681=1 openSUSE-SLE-15.6-2024-3681=1 * SUSE Linux Enterprise High Performance Computing 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3681=1 * SUSE Linux Enterprise Server 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3681=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3681=1 * SUSE Linux Enterprise Desktop 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3681=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3681=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libzypp-debugsource-17.35.12-150600.3.27.1 * libzypp-debuginfo-17.35.12-150600.3.27.1 * libzypp-17.35.12-150600.3.27.1 * libzypp-devel-17.35.12-150600.3.27.1 * libzypp-devel-doc-17.35.12-150600.3.27.1 * SUSE Linux Enterprise High Performance Computing 15 SP6 (aarch64 x86_64) * libzypp-17.35.12-150600.3.27.1 * SUSE Linux Enterprise Server 15 SP6 (aarch64 ppc64le s390x x86_64) * libzypp-17.35.12-150600.3.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libzypp-17.35.12-150600.3.27.1 * SUSE Linux Enterprise Desktop 15 SP6 (x86_64) * libzypp-17.35.12-150600.3.27.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libzypp-debugsource-17.35.12-150600.3.27.1 * libzypp-debuginfo-17.35.12-150600.3.27.1 * libzypp-devel-17.35.12-150600.3.27.1 * libzypp-17.35.12-150600.3.27.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230912 * https://bugzilla.suse.com/show_bug.cgi?id=1231043 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 16 20:32:50 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 16 Oct 2024 20:32:50 -0000 Subject: SUSE-SU-2024:3675-1: important: Security update for libarchive Message-ID: <172911077015.6932.13825713508312016218@smelt2.prg2.suse.org> # Security update for libarchive Announcement ID: SUSE-SU-2024:3675-1 Release Date: 2024-10-16T17:33:40Z Rating: important References: * bsc#1231544 Cross-References: * CVE-2024-48957 CVSS scores: * CVE-2024-48957 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-48957 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H * CVE-2024-48957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for libarchive fixes the following issues: * CVE-2024-48957: Fixed out-of-bounds access in execute_filter_audio in archive_read_support_format_rar.c (bsc#1231544). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3675=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3675=1 openSUSE-SLE-15.6-2024-3675=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3675=1 ## Package List: * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * bsdtar-debuginfo-3.7.2-150600.3.6.1 * libarchive-debugsource-3.7.2-150600.3.6.1 * bsdtar-3.7.2-150600.3.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libarchive-devel-3.7.2-150600.3.6.1 * libarchive13-debuginfo-3.7.2-150600.3.6.1 * libarchive13-3.7.2-150600.3.6.1 * libarchive-debugsource-3.7.2-150600.3.6.1 * bsdtar-debuginfo-3.7.2-150600.3.6.1 * bsdtar-3.7.2-150600.3.6.1 * openSUSE Leap 15.6 (x86_64) * libarchive13-32bit-debuginfo-3.7.2-150600.3.6.1 * libarchive13-32bit-3.7.2-150600.3.6.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libarchive13-64bit-debuginfo-3.7.2-150600.3.6.1 * libarchive13-64bit-3.7.2-150600.3.6.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libarchive13-3.7.2-150600.3.6.1 * libarchive-devel-3.7.2-150600.3.6.1 * libarchive-debugsource-3.7.2-150600.3.6.1 * libarchive13-debuginfo-3.7.2-150600.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-48957.html * https://bugzilla.suse.com/show_bug.cgi?id=1231544 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 17 08:30:38 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 17 Oct 2024 08:30:38 -0000 Subject: SUSE-SU-2024:3710-1: important: Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) Message-ID: <172915383857.7152.12258978669139424827@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3710-1 Release Date: 2024-10-16T21:44:03Z Rating: important References: * bsc#1223363 * bsc#1223683 * bsc#1225013 * bsc#1225099 * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2023-52846 * CVE-2024-26828 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves nine vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_65 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3710=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3710=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_65-default-debuginfo-5-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_14-debugsource-5-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_65-default-debuginfo-5-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_14-debugsource-5-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 17 08:30:41 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 17 Oct 2024 08:30:41 -0000 Subject: SUSE-SU-2024:3707-1: important: Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) Message-ID: <172915384173.7152.1116743955170457933@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:3707-1 Release Date: 2024-10-16T20:52:37Z Rating: important References: * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_125 fixes several issues. The following security issues were fixed: * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3707=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3707=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-2-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_125-default-2-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_28-debugsource-2-150400.9.6.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-2-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_125-default-2-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_28-debugsource-2-150400.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 17 08:30:54 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 17 Oct 2024 08:30:54 -0000 Subject: SUSE-SU-2024:3706-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) Message-ID: <172915385409.7152.15707226051770496061@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:3706-1 Release Date: 2024-10-16T21:17:23Z Rating: important References: * bsc#1225312 * bsc#1225739 * bsc#1226325 * bsc#1228573 * bsc#1228786 Cross-References: * CVE-2024-35861 * CVE-2024-36899 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 CVSS scores: * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_36 fixes several issues. The following security issues were fixed: * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3706=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3709=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3709=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3706=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_88-default-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_18-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_88-default-debuginfo-14-150400.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_36-default-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_7-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-12-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_36-default-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_7-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-12-150500.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_88-default-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_18-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_88-default-debuginfo-14-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 17 08:30:57 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 17 Oct 2024 08:30:57 -0000 Subject: SUSE-SU-2024:3704-1: important: Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) Message-ID: <172915385726.7152.18185477547779101715@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:3704-1 Release Date: 2024-10-16T20:52:19Z Rating: important References: * bsc#1227651 * bsc#1228573 Cross-References: * CVE-2021-47291 * CVE-2024-41059 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_167 fixes several issues. The following security issues were fixed: * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-3704=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3705=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-3705=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_197-default-debuginfo-2-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_197-default-2-150200.5.6.1 * kernel-livepatch-SLE15-SP2_Update_50-debugsource-2-150200.5.6.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_46-debugsource-2-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_167-default-debuginfo-2-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_167-default-2-150300.7.6.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_167-preempt-2-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_167-preempt-debuginfo-2-150300.7.6.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_167-default-2-150300.7.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 17 08:31:23 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 17 Oct 2024 08:31:23 -0000 Subject: SUSE-SU-2024:3708-1: important: Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) Message-ID: <172915388323.7152.2617340661772510414@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) Announcement ID: SUSE-SU-2024:3708-1 Release Date: 2024-10-16T20:52:47Z Rating: important References: * bsc#1228349 * bsc#1228786 Cross-References: * CVE-2024-40909 * CVE-2024-40954 CVSS scores: * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_17 fixes several issues. The following security issues were fixed: * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1228349). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3708=1 SUSE-2024-3703=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3708=1 SUSE-SLE- Module-Live-Patching-15-SP6-2024-3703=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_2-debugsource-3-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_17-default-debuginfo-3-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-3-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_17-default-3-150600.13.6.1 * kernel-livepatch-SLE15-SP6_Update_3-debugsource-3-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_14-default-3-150600.13.6.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_2-debugsource-3-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_17-default-debuginfo-3-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-3-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_17-default-3-150600.13.6.1 * kernel-livepatch-SLE15-SP6_Update_3-debugsource-3-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_14-default-3-150600.13.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://bugzilla.suse.com/show_bug.cgi?id=1228349 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 17 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 17 Oct 2024 16:30:07 -0000 Subject: SUSE-RU-2024:3716-1: moderate: Recommended update for sap-installation-wizard Message-ID: <172918260715.6932.5616370890570974955@smelt2.prg2.suse.org> # Recommended update for sap-installation-wizard Announcement ID: SUSE-RU-2024:3716-1 Release Date: 2024-10-17T13:22:48Z Rating: moderate References: * bsc#1220851 * bsc#1230165 Affected Products: * openSUSE Leap 15.5 * SAP Applications Module 15-SP5 * SAP Business One Module 15-SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for sap-installation-wizard fixes the following issues: * Version upgrade * openQA test fails in "autoyast_sles4sap_hana" autoyast installation reporting: Value '' is invalid. Use one of: ports, hostnames (bsc#1220851). * BusinessOne installer, Set the host name instead of the IP address and instead of the default values for all occurrences (bsc#1230165). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3716=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-3716=1 * SAP Business One Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-3716=1 ## Package List: * openSUSE Leap 15.5 (ppc64le x86_64) * bone-installation-wizard-4.5.16-150500.5.23.5 * sap-installation-wizard-4.5.16-150500.5.23.5 * SAP Applications Module 15-SP5 (ppc64le x86_64) * sap-installation-wizard-4.5.16-150500.5.23.5 * SAP Business One Module 15-SP5 (x86_64) * bone-installation-wizard-4.5.16-150500.5.23.5 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220851 * https://bugzilla.suse.com/show_bug.cgi?id=1230165 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 17 16:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 17 Oct 2024 16:30:10 -0000 Subject: SUSE-RU-2024:3715-1: moderate: Recommended update for sap-installation-wizard Message-ID: <172918261013.6932.2646624654451976240@smelt2.prg2.suse.org> # Recommended update for sap-installation-wizard Announcement ID: SUSE-RU-2024:3715-1 Release Date: 2024-10-17T13:16:41Z Rating: moderate References: * bsc#1230165 Affected Products: * openSUSE Leap 15.6 * SAP Applications Module 15-SP6 * SAP Business One Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for sap-installation-wizard fixes the following issues: * Version upgrade * BusinessOne installer, Set the host name instead of the IP address and instead of the default values for all occurrences (bsc#1230165). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2024-3715=1 * SAP Business One Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Business-One-15-SP6-2024-3715=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3715=1 ## Package List: * SAP Applications Module 15-SP6 (ppc64le x86_64) * sap-installation-wizard-4.6.16-150600.3.8.2 * SAP Business One Module 15-SP6 (x86_64) * bone-installation-wizard-4.6.16-150600.3.8.2 * openSUSE Leap 15.6 (ppc64le x86_64) * sap-installation-wizard-4.6.16-150600.3.8.2 * bone-installation-wizard-4.6.16-150600.3.8.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230165 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 17 16:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 17 Oct 2024 16:30:12 -0000 Subject: SUSE-RU-2024:3714-1: moderate: Recommended update for patterns-sap Message-ID: <172918261230.6932.8899305132011148853@smelt2.prg2.suse.org> # Recommended update for patterns-sap Announcement ID: SUSE-RU-2024:3714-1 Release Date: 2024-10-17T13:10:48Z Rating: moderate References: * bsc#1230380 Affected Products: * openSUSE Leap 15.5 * SAP Applications Module 15-SP5 * SAP Business One Module 15-SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for patterns-sap fixes the following issue: * libicu60_2 is missed in SAP BusinessOne Server Base pattern (bsc#1230380). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3714=1 openSUSE-SLE-15.5-2024-3714=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-3714=1 * SAP Business One Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-3714=1 ## Package List: * openSUSE Leap 15.5 (ppc64le x86_64) * patterns-sap-bone-15.5.1-150500.5.11.2 * patterns-sap-hana-15.5.1-150500.5.11.2 * patterns-sap-nw-15.5.1-150500.5.11.2 * patterns-sap-15.5.1-150500.5.11.2 * SAP Applications Module 15-SP5 (ppc64le x86_64) * patterns-sap-hana-15.5.1-150500.5.11.2 * patterns-sap-nw-15.5.1-150500.5.11.2 * SAP Business One Module 15-SP5 (x86_64) * patterns-sap-bone-15.5.1-150500.5.11.2 * patterns-sap-hana-15.5.1-150500.5.11.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230380 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 17 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 17 Oct 2024 16:30:14 -0000 Subject: SUSE-RU-2024:3713-1: moderate: Recommended update for supportutils-plugin-ha-sap Message-ID: <172918261442.6932.16367694820618267628@smelt2.prg2.suse.org> # Recommended update for supportutils-plugin-ha-sap Announcement ID: SUSE-RU-2024:3713-1 Release Date: 2024-10-17T13:06:23Z Rating: moderate References: * bsc#1230319 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SAP Applications Module 15-SP2 * SAP Applications Module 15-SP3 * SAP Applications Module 15-SP4 * SAP Applications Module 15-SP5 * SAP Applications Module 15-SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for supportutils-plugin-ha-sap fixes the following issues: * Version update 0.0.6+git.1727164834.7af8512: * supportutils-plugin-ha-sap does not know about recent SAPHana-angi. This was partialy solved by last commit (bsc#1230319). * switch from the deprecated scplugin.rc to supportconfig.rc adapt all function calls. This was triggered by SLE16 package submission, because of missing provides to fulfill the package requirements. But this change was long overdue as scplugin.rc is deprecated in SLE15 cdestreams as well ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-3713=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-3713=1 * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2024-3713=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3713=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3713=1 * SAP Applications Module 15-SP2 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP2-2024-3713=1 * SAP Applications Module 15-SP3 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP3-2024-3713=1 ## Package List: * SAP Applications Module 15-SP4 (noarch) * supportutils-plugin-ha-sap-0.0.6+git.1727164834.7af8512-150000.1.18.2 * SAP Applications Module 15-SP5 (noarch) * supportutils-plugin-ha-sap-0.0.6+git.1727164834.7af8512-150000.1.18.2 * SAP Applications Module 15-SP6 (noarch) * supportutils-plugin-ha-sap-0.0.6+git.1727164834.7af8512-150000.1.18.2 * openSUSE Leap 15.5 (noarch) * supportutils-plugin-ha-sap-0.0.6+git.1727164834.7af8512-150000.1.18.2 * openSUSE Leap 15.6 (noarch) * supportutils-plugin-ha-sap-0.0.6+git.1727164834.7af8512-150000.1.18.2 * SAP Applications Module 15-SP2 (noarch) * supportutils-plugin-ha-sap-0.0.6+git.1727164834.7af8512-150000.1.18.2 * SAP Applications Module 15-SP3 (noarch) * supportutils-plugin-ha-sap-0.0.6+git.1727164834.7af8512-150000.1.18.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230319 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 17 16:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 17 Oct 2024 16:30:16 -0000 Subject: SUSE-RU-2024:3712-1: moderate: Recommended update for samba Message-ID: <172918261653.6932.5963835943131711094@smelt2.prg2.suse.org> # Recommended update for samba Announcement ID: SUSE-RU-2024:3712-1 Release Date: 2024-10-17T13:01:08Z Rating: moderate References: * bsc#1229684 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for samba fixes the following issues: * Incorrect FSCTL_QUERY_ALLOCATED_RANGES response when truncated (bsc#1229684). * Version update * Invalid client warning about command line passwords. * program version string is truncated in manpages. * \--version-* options reject tilde characters. * We have added new options --vendor-name and --vendor-patch- revision arguments to ./configure to allow distributions and packagers to put their name in the Samba version string so that when debugging Samba the source of the binary is obvious. * Unable to log on to a Windows computer when user account need to change their own password. * Fix clock skew error message and memory cache clock skew recovery. * Dynamic DNS updates with the internal DNS are not working. * "client use kerberos" and --use-kerberos is ignored for the machine account. * Regression DFS not working with widelinks=true. * ntlm_auth make logs more consistent with length check. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3712=1 openSUSE-SLE-15.6-2024-3712=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3712=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3712=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * samba-winbind-libs-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-gpupdate-4.19.8+git.368.51d32c069f-150600.3.6.11 * ctdb-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-libs-4.19.8+git.368.51d32c069f-150600.3.6.11 * ctdb-pcp-pmda-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-python3-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-test-4.19.8+git.368.51d32c069f-150600.3.6.11 * libsamba-policy0-python3-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-libs-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-tool-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-ldb-ldap-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-python3-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-python3-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-winbind-libs-4.19.8+git.368.51d32c069f-150600.3.6.11 * libsamba-policy-devel-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * ctdb-pcp-pmda-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * libsamba-policy0-python3-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * ctdb-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-winbind-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-devel-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-winbind-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * libsamba-policy-python3-devel-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-python3-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-ldb-ldap-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-test-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-debugsource-4.19.8+git.368.51d32c069f-150600.3.6.11 * openSUSE Leap 15.6 (x86_64) * libsamba-policy0-python3-32bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-32bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-python3-32bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * libsamba-policy0-python3-32bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-32bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-libs-32bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-python3-32bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-winbind-libs-32bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-libs-32bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-winbind-libs-32bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-32bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-32bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-devel-32bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * openSUSE Leap 15.6 (noarch) * samba-doc-4.19.8+git.368.51d32c069f-150600.3.6.11 * openSUSE Leap 15.6 (aarch64 x86_64) * samba-ceph-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-ceph-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * openSUSE Leap 15.6 (aarch64_ilp32) * samba-libs-64bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-python3-64bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-python3-64bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-libs-64bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-libs-64bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * libsamba-policy0-python3-64bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-64bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * libsamba-policy0-python3-64bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-winbind-libs-64bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-winbind-libs-64bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-64bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-devel-64bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-64bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * samba-winbind-libs-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-gpupdate-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-libs-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-python3-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * libsamba-policy0-python3-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-libs-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-tool-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-python3-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-ldb-ldap-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-python3-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-winbind-libs-4.19.8+git.368.51d32c069f-150600.3.6.11 * libsamba-policy-devel-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * libsamba-policy0-python3-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-winbind-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-devel-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-winbind-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * libsamba-policy-python3-devel-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-python3-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-ldb-ldap-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-debugsource-4.19.8+git.368.51d32c069f-150600.3.6.11 * Basesystem Module 15-SP6 (aarch64 x86_64) * samba-ceph-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-ceph-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * Basesystem Module 15-SP6 (x86_64) * samba-libs-32bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-libs-32bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-winbind-libs-32bit-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-winbind-libs-32bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-client-libs-32bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-libs-32bit-4.19.8+git.368.51d32c069f-150600.3.6.11 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * ctdb-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 * samba-debugsource-4.19.8+git.368.51d32c069f-150600.3.6.11 * ctdb-debuginfo-4.19.8+git.368.51d32c069f-150600.3.6.11 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 17 16:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 17 Oct 2024 16:30:20 -0000 Subject: SUSE-SU-2024:3711-1: critical: Security update for cups-filters Message-ID: <172918262040.6932.17665996661674495905@smelt2.prg2.suse.org> # Security update for cups-filters Announcement ID: SUSE-SU-2024:3711-1 Release Date: 2024-10-17T12:33:37Z Rating: critical References: * bsc#1230939 * bsc#1231294 Cross-References: * CVE-2024-47176 * CVE-2024-47850 CVSS scores: * CVE-2024-47176 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H * CVE-2024-47176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47176 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-47850 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H * CVE-2024-47850 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-47850 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for cups-filters fixes the following issues: * cups-browsed would bind on UDP INADDR_ANY:631 and trust any packet from any source to trigger a Get-Printer-Attributes IPP request to an attacker controlled URL. This patch removes support for the legacy CUPS and LDAP protocols, the previous patch fix for this issue was incomplete (bsc#1230939, bsc#1231294, CVE-2024-47176, CVE-2024-47850) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3711=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3711=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3711=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * cups-filters-foomatic-rip-debuginfo-1.0.58-19.29.1 * cups-filters-cups-browsed-1.0.58-19.29.1 * cups-filters-ghostscript-debuginfo-1.0.58-19.29.1 * cups-filters-cups-browsed-debuginfo-1.0.58-19.29.1 * cups-filters-debugsource-1.0.58-19.29.1 * cups-filters-debuginfo-1.0.58-19.29.1 * cups-filters-1.0.58-19.29.1 * cups-filters-ghostscript-1.0.58-19.29.1 * cups-filters-foomatic-rip-1.0.58-19.29.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * cups-filters-foomatic-rip-debuginfo-1.0.58-19.29.1 * cups-filters-cups-browsed-1.0.58-19.29.1 * cups-filters-ghostscript-debuginfo-1.0.58-19.29.1 * cups-filters-cups-browsed-debuginfo-1.0.58-19.29.1 * cups-filters-debugsource-1.0.58-19.29.1 * cups-filters-debuginfo-1.0.58-19.29.1 * cups-filters-1.0.58-19.29.1 * cups-filters-ghostscript-1.0.58-19.29.1 * cups-filters-foomatic-rip-1.0.58-19.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * cups-filters-foomatic-rip-debuginfo-1.0.58-19.29.1 * cups-filters-cups-browsed-1.0.58-19.29.1 * cups-filters-ghostscript-debuginfo-1.0.58-19.29.1 * cups-filters-cups-browsed-debuginfo-1.0.58-19.29.1 * cups-filters-debugsource-1.0.58-19.29.1 * cups-filters-debuginfo-1.0.58-19.29.1 * cups-filters-1.0.58-19.29.1 * cups-filters-ghostscript-1.0.58-19.29.1 * cups-filters-foomatic-rip-1.0.58-19.29.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47176.html * https://www.suse.com/security/cve/CVE-2024-47850.html * https://bugzilla.suse.com/show_bug.cgi?id=1230939 * https://bugzilla.suse.com/show_bug.cgi?id=1231294 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 08:30:24 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 08:30:24 -0000 Subject: SUSE-RU-2024:3724-1: moderate: Recommended update for iputils Message-ID: <172924022433.6932.15891169156067109878@smelt2.prg2.suse.org> # Recommended update for iputils Announcement ID: SUSE-RU-2024:3724-1 Release Date: 2024-10-18T07:45:42Z Rating: moderate References: * bsc#1017616 * bsc#1057664 * bsc#1065835 * bsc#1072460 * bsc#1082788 * bsc#1196840 * bsc#1199918 * bsc#1199926 * bsc#1199927 * bsc#1221439 * bsc#674304 * bsc#795788 * bsc#860616 * bsc#860655 * bsc#927831 * jsc#PED-9524 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that contains one feature and has 15 fixes can now be installed. ## Description: This update for iputils fixes the following issues: Update version to version s20161105 (bsc#1221439 jsc#PED-9524): * This version can use ICMP datagram sockets without CAP_NET_RAW capabilites. Full changelog: * ping: eliminate deadcode & simplify * ping: do not allow oversized packets to root * correctly initialize first hop * ping: fix ping -6 -I * arping,doc: fix documentation of -I * ping: fix error message when getting EACCES from connect() * renamed INSTALL to INSTALL.md * ping: Silence GCC warnings when building with -fstrict-aliasing * tftpd: Drop supplementary groups for root * libgcrypt: fix static linking * doc: Inserted a missing word * tracepath6: avoid redundant family variable * tracepath: borrow everything good from tracepath6 * tracepath: switch to dual-stack operation * tracepath: remove now redundant tracepath6 * docs: fix parallel build of manpages * ping: remove assignments of values that are never read * docs: remove references to ping6 and traceroute6 * ping: work with older kernels that don't support ping sockets * Revert "ping_common.c: fix message flood when EPERM is encountered in ping" * reorder -I option parsing (bsc#1057664) * ping: also bind the ICMP socket to the specific device * tracepath6 is now symlink to tracepath. * Add fix for ICMP datagram socket ping6-Fix-device-binding.patch (bsc#1196840, bsc#1199918, bsc#1199926, bsc#1199927). * Backport license information from upstream (bsc#1082788): * Fix PMTU discovery in ping6. (bsc#1072460) * Install rdisc as rdisc, do not use in.rdisc anymore (xinetd which was using in.* names is obsolete anyways) * iputils: remove man pages of unused binaries: ninfod, pg3, rdisc (rdisc is in a separate package) * Add systemd service for rarpd * mark ping also verify not caps, as these are changed by the permissions package. (bsc#1065835) * Reintroduce rarpd as subpackage * Explicitly list content in filelist as we have two subpackages now Update to version s20161105 (Changes taken from the RELNOTES file): * ping: eliminate deadcode & simplify * ping: do not allow oversized packets to root * correctly initialize first hop * ping: fix ping -6 -I * arping,doc: fix documentation of -I * ping: fix error message when getting EACCES from connect() * renamed INSTALL to INSTALL.md * (re)structured INSTALL.md and transformed into markdown; added hint that installation into prefix has to be done with DESTDIR make variable and that there's no prefix support in configure, close #21 * ping: Silence GCC warnings when building with -fstrict-aliasing * tftpd: Drop supplementary groups for root * libgcrypt: fix static linking * doc: Inserted a missing word * tracepath6: avoid redundant family variable * tracepath: borrow everything good from tracepath6 * tracepath: switch to dual-stack operation * tracepath: remove now redundant tracepath6 * docs: fix parallel build of manpages * ping: remove assignments of values that are never read * docs: remove references to ping6 and traceroute6 * ping: work with older kernels that don't support ping sockets * Revert "ping_common.c: fix message flood when EPERM is encountered in ping" * reorder -I option parsing (bsc#1057664) * ping: also bind the ICMP socket to the specific device * tracepath6 is now symlink to tracepath. * Add ping6 symlink (bsc#1017616) * do not install rarpd and rarpd.8 manpage (comes from rarpd rpm currently) Update to version s20160308 (Changes taken from the RELNOTES file) * use syntax compatible with busybox date in Makefile * 'admin prohibited' should print !X not !S. * Makefile: use #define as in previous code changes * doc/Makefile: require bash, because we use pushd and popd * doc: don't timestamp manpages by default * ping: status() now returns received/transmitted instead of trans/recv * ping: don't mess with internals of struct msghdr * ping: ICMP error replies while errno < 0 is a hard error * ping: always use POSIX locale when parsing -i * ping: link against libm * made ping functions protocol independent * ping: perform dual-stack ping by default * ping: remove obsolete preprocessor directives * ping: avoid name clashes between IPv4 and IPv6 code * ping: merge all ping header files into a single one * ping: merge `ping6` command into `ping` * ping: refactor ping options * ping: refactor ping socket code * ping: merge IPv4 and IPv6 `pr_addr()` * ping: fix defines and libs in Makefile * ping: handle single protocol systems * iputils ping/ping6: Add a function to check if a packet is ours * ping: Add to fix compilation error. * ping6: Use GNUTLS API directly for MD5. (v2) * ping6: Use libgcrypt instead of gnutls for MD5. * Allow ping to use IPv6 addresses * ping,ping6 doc: More description on CAP_NET_RAW usage. * if IPv4 resolving fails fallback to ping6 * ping: in usage print the 'ping -6' options as well * ping: allow option -4 which forces IPv4 * combine sock and errno into a single structure * This patch allows running ping and ping6 without root privileges on * use better names for socket variables * tracepath,doc: fix corrupted tag * doc: ping: add missing options and remove ping6 * ninfod: remove unused variables * ninfod: Regenerate configure by autoconf-2.69. * ninfod: libgcrypt support. * Fix building with musl * travis.yml: install nettle-dev * Allow using nettle instead of libgcrypt for MD5 * avoid compiler warning caused by snapshot.h * make `getaddrinfo()` and `getnameinfo()` usage consistent * enable IDN by default * remove IPV4_TARGETS and IPV6_TARGETS * Use svg instead of png to get better image quality * spec: Configure before building ninfod. * spec: Fix date in %changelog. * Use Provides: for old /{,s}bin utils to satisfy reverse dependencies. * Install utilities to /bin and /sbin until reverse dependencies are properly fixed. * Do not install tftp and traceroute to avoid conflicts with the tftp and traceroute packages. Stick to what iputils used to provide in the past. * Install tracepath to /usr/bin. (bsc#795788) Update to version s20150815 * use syntax compatible with busybox date in Makefile * Makefile: use #define as in previous code changes * ping: status() now returns received/transmitted instead of trans/recv * ping: don't mess with internals of struct msghdr * tracepath,doc: fix corrupted tag * made ping functions protocol independent * Allow ping to use IPv6 addresses * if IPv4 resolving fails fallback to ping6 * ping: in usage print the 'ping -6' options as well * ping: allow option -4 which forces IPv4 * combine sock and errno into a single structure * This patch allows running ping and ping6 without root privileges on * use better names for socket variables * travis.yml: install nettle-dev * Allow using nettle instead of libgcrypt for MD5 * avoid compiler warning caused by snapshot.h * make `getaddrinfo()` and `getnameinfo()` usage consistent * enable IDN by default * ping: perform dual-stack ping by default * remove IPV4_TARGETS and IPV6_TARGETS * ping: remove obsolete preprocessor directives * ping: avoid name clashes between IPv4 and IPv6 code * ping: merge all ping header files into a single one * ping: merge `ping6` command into `ping` * ping: refactor ping options * ping: refactor ping socket code * ping: merge IPv4 and IPv6 `pr_addr()` * Use svg instead of png to get better image quality * iputils ping/ping6: Add a function to check if a packet is ours * ping: Add to fix compilation error. * ping6: Use GNUTLS API directly for MD5. (v2) * ping6: Use libgcrypt instead of gnutls for MD5. * ninfod: Regenerate configure by autoconf-2.69. * ninfod: libgcrypt support. * spec: Configure before building ninfod. * spec: Fix date in %changelog. * make,spec: Add rpm target. * ping,ping6 doc: More description on CAP_NET_RAW usage. * Fixed ping segfaults (bsc#860616,bsc#860655) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3724=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3724=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3724=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * iputils-s20161105-11.3.1 * iputils-debugsource-s20161105-11.3.1 * iputils-debuginfo-s20161105-11.3.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * iputils-s20161105-11.3.1 * iputils-debugsource-s20161105-11.3.1 * iputils-debuginfo-s20161105-11.3.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * iputils-s20161105-11.3.1 * iputils-debugsource-s20161105-11.3.1 * iputils-debuginfo-s20161105-11.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1017616 * https://bugzilla.suse.com/show_bug.cgi?id=1057664 * https://bugzilla.suse.com/show_bug.cgi?id=1065835 * https://bugzilla.suse.com/show_bug.cgi?id=1072460 * https://bugzilla.suse.com/show_bug.cgi?id=1082788 * https://bugzilla.suse.com/show_bug.cgi?id=1196840 * https://bugzilla.suse.com/show_bug.cgi?id=1199918 * https://bugzilla.suse.com/show_bug.cgi?id=1199926 * https://bugzilla.suse.com/show_bug.cgi?id=1199927 * https://bugzilla.suse.com/show_bug.cgi?id=1221439 * https://bugzilla.suse.com/show_bug.cgi?id=674304 * https://bugzilla.suse.com/show_bug.cgi?id=795788 * https://bugzilla.suse.com/show_bug.cgi?id=860616 * https://bugzilla.suse.com/show_bug.cgi?id=860655 * https://bugzilla.suse.com/show_bug.cgi?id=927831 * https://jira.suse.com/browse/PED-9524 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 08:30:26 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 08:30:26 -0000 Subject: SUSE-RU-2024:3723-1: moderate: Recommended update for apparmor Message-ID: <172924022630.6932.7945086801732648409@smelt2.prg2.suse.org> # Recommended update for apparmor Announcement ID: SUSE-RU-2024:3723-1 Release Date: 2024-10-18T07:45:31Z Rating: moderate References: * bsc#1230541 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for apparmor fixes the following issues: * apparmor: Allow ping to use IPv6 RAW sockets ( bsc#1230541 ). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3723=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3723=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3723=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * perl-apparmor-debuginfo-2.8.2-56.15.1 * apache2-mod_apparmor-2.8.2-56.15.1 * libapparmor1-debuginfo-2.8.2-56.15.1 * libapparmor1-2.8.2-56.15.1 * apparmor-parser-2.8.2-56.15.1 * apparmor-debugsource-2.8.2-56.15.1 * perl-apparmor-2.8.2-56.15.1 * apparmor-parser-debuginfo-2.8.2-56.15.1 * apache2-mod_apparmor-debuginfo-2.8.2-56.15.1 * pam_apparmor-2.8.2-56.15.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * apparmor-profiles-2.8.2-56.15.1 * apparmor-docs-2.8.2-56.15.1 * apparmor-utils-2.8.2-56.15.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libapparmor1-32bit-2.8.2-56.15.1 * libapparmor1-debuginfo-32bit-2.8.2-56.15.1 * pam_apparmor-32bit-2.8.2-56.15.1 * pam_apparmor-debuginfo-2.8.2-56.15.1 * pam_apparmor-debuginfo-32bit-2.8.2-56.15.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * perl-apparmor-debuginfo-2.8.2-56.15.1 * apache2-mod_apparmor-2.8.2-56.15.1 * libapparmor1-debuginfo-2.8.2-56.15.1 * libapparmor1-2.8.2-56.15.1 * apparmor-parser-2.8.2-56.15.1 * apparmor-debugsource-2.8.2-56.15.1 * perl-apparmor-2.8.2-56.15.1 * apparmor-parser-debuginfo-2.8.2-56.15.1 * apache2-mod_apparmor-debuginfo-2.8.2-56.15.1 * pam_apparmor-2.8.2-56.15.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * apparmor-profiles-2.8.2-56.15.1 * apparmor-docs-2.8.2-56.15.1 * apparmor-utils-2.8.2-56.15.1 * SUSE Linux Enterprise Server 12 SP5 (ppc64le s390x x86_64) * pam_apparmor-debuginfo-2.8.2-56.15.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libapparmor1-32bit-2.8.2-56.15.1 * libapparmor1-debuginfo-32bit-2.8.2-56.15.1 * pam_apparmor-32bit-2.8.2-56.15.1 * pam_apparmor-debuginfo-32bit-2.8.2-56.15.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * perl-apparmor-debuginfo-2.8.2-56.15.1 * apache2-mod_apparmor-2.8.2-56.15.1 * pam_apparmor-debuginfo-2.8.2-56.15.1 * libapparmor1-debuginfo-2.8.2-56.15.1 * libapparmor1-2.8.2-56.15.1 * apparmor-parser-2.8.2-56.15.1 * apparmor-debugsource-2.8.2-56.15.1 * perl-apparmor-2.8.2-56.15.1 * apparmor-parser-debuginfo-2.8.2-56.15.1 * apache2-mod_apparmor-debuginfo-2.8.2-56.15.1 * pam_apparmor-2.8.2-56.15.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * apparmor-profiles-2.8.2-56.15.1 * apparmor-docs-2.8.2-56.15.1 * apparmor-utils-2.8.2-56.15.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libapparmor1-32bit-2.8.2-56.15.1 * libapparmor1-debuginfo-32bit-2.8.2-56.15.1 * pam_apparmor-32bit-2.8.2-56.15.1 * pam_apparmor-debuginfo-32bit-2.8.2-56.15.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230541 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 08:30:29 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 08:30:29 -0000 Subject: SUSE-RU-2024:3721-1: moderate: Recommended update for libblockdev Message-ID: <172924022920.6932.4965678373807559201@smelt2.prg2.suse.org> # Recommended update for libblockdev Announcement ID: SUSE-RU-2024:3721-1 Release Date: 2024-10-18T07:45:16Z Rating: moderate References: * bsc#1227458 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for libblockdev fixes the following issue: * added libbd_btrfs2 as dependency of udisks2 btrfs module bsc#1227458 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3721=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3721=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3721=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3721=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3721=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3721=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3721=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3721=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3721=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3721=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3721=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3721=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libbd_part2-2.26-150400.3.2.1 * libbd_crypto2-debuginfo-2.26-150400.3.2.1 * libblockdev-debuginfo-2.26-150400.3.2.1 * libbd_swap2-2.26-150400.3.2.1 * libblockdev2-2.26-150400.3.2.1 * libbd_fs2-2.26-150400.3.2.1 * libbd_utils2-2.26-150400.3.2.1 * libbd_mdraid2-2.26-150400.3.2.1 * libbd_lvm2-2.26-150400.3.2.1 * libblockdev2-debuginfo-2.26-150400.3.2.1 * libblockdev-debugsource-2.26-150400.3.2.1 * libbd_loop2-debuginfo-2.26-150400.3.2.1 * libbd_part2-debuginfo-2.26-150400.3.2.1 * libbd_utils2-debuginfo-2.26-150400.3.2.1 * libbd_loop2-2.26-150400.3.2.1 * libbd_fs2-debuginfo-2.26-150400.3.2.1 * libbd_mdraid2-debuginfo-2.26-150400.3.2.1 * libbd_btrfs2-debuginfo-2.26-150400.3.2.1 * libbd_swap2-debuginfo-2.26-150400.3.2.1 * libbd_lvm2-debuginfo-2.26-150400.3.2.1 * libbd_crypto2-2.26-150400.3.2.1 * libblockdev-2.26-150400.3.2.1 * libbd_btrfs2-2.26-150400.3.2.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libbd_part2-2.26-150400.3.2.1 * libbd_crypto2-debuginfo-2.26-150400.3.2.1 * libblockdev-debuginfo-2.26-150400.3.2.1 * libbd_swap2-2.26-150400.3.2.1 * libblockdev2-2.26-150400.3.2.1 * libbd_fs2-2.26-150400.3.2.1 * libbd_utils2-2.26-150400.3.2.1 * libbd_mdraid2-2.26-150400.3.2.1 * libbd_lvm2-2.26-150400.3.2.1 * libblockdev2-debuginfo-2.26-150400.3.2.1 * libblockdev-debugsource-2.26-150400.3.2.1 * libbd_loop2-debuginfo-2.26-150400.3.2.1 * libbd_part2-debuginfo-2.26-150400.3.2.1 * libbd_utils2-debuginfo-2.26-150400.3.2.1 * libbd_loop2-2.26-150400.3.2.1 * libbd_fs2-debuginfo-2.26-150400.3.2.1 * libbd_mdraid2-debuginfo-2.26-150400.3.2.1 * libbd_btrfs2-debuginfo-2.26-150400.3.2.1 * libbd_swap2-debuginfo-2.26-150400.3.2.1 * libbd_lvm2-debuginfo-2.26-150400.3.2.1 * libbd_crypto2-2.26-150400.3.2.1 * libblockdev-2.26-150400.3.2.1 * libbd_btrfs2-2.26-150400.3.2.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libbd_part2-2.26-150400.3.2.1 * libbd_crypto2-debuginfo-2.26-150400.3.2.1 * libblockdev-debuginfo-2.26-150400.3.2.1 * libbd_swap2-2.26-150400.3.2.1 * libblockdev2-2.26-150400.3.2.1 * libbd_fs2-2.26-150400.3.2.1 * libbd_utils2-2.26-150400.3.2.1 * libbd_mdraid2-2.26-150400.3.2.1 * libbd_lvm2-2.26-150400.3.2.1 * libblockdev2-debuginfo-2.26-150400.3.2.1 * libblockdev-debugsource-2.26-150400.3.2.1 * libbd_loop2-debuginfo-2.26-150400.3.2.1 * libbd_part2-debuginfo-2.26-150400.3.2.1 * libbd_utils2-debuginfo-2.26-150400.3.2.1 * libbd_loop2-2.26-150400.3.2.1 * libbd_fs2-debuginfo-2.26-150400.3.2.1 * libbd_mdraid2-debuginfo-2.26-150400.3.2.1 * libbd_btrfs2-debuginfo-2.26-150400.3.2.1 * libbd_swap2-debuginfo-2.26-150400.3.2.1 * libbd_lvm2-debuginfo-2.26-150400.3.2.1 * libbd_crypto2-2.26-150400.3.2.1 * libblockdev-2.26-150400.3.2.1 * libbd_btrfs2-2.26-150400.3.2.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libbd_part2-2.26-150400.3.2.1 * libbd_crypto2-debuginfo-2.26-150400.3.2.1 * libblockdev-debuginfo-2.26-150400.3.2.1 * libbd_swap2-2.26-150400.3.2.1 * libblockdev2-2.26-150400.3.2.1 * libbd_fs2-2.26-150400.3.2.1 * libbd_utils2-2.26-150400.3.2.1 * libbd_mdraid2-2.26-150400.3.2.1 * libbd_lvm2-2.26-150400.3.2.1 * libblockdev2-debuginfo-2.26-150400.3.2.1 * libblockdev-debugsource-2.26-150400.3.2.1 * libbd_loop2-debuginfo-2.26-150400.3.2.1 * libbd_part2-debuginfo-2.26-150400.3.2.1 * libbd_utils2-debuginfo-2.26-150400.3.2.1 * libbd_loop2-2.26-150400.3.2.1 * libbd_fs2-debuginfo-2.26-150400.3.2.1 * libbd_mdraid2-debuginfo-2.26-150400.3.2.1 * libbd_btrfs2-debuginfo-2.26-150400.3.2.1 * libbd_swap2-debuginfo-2.26-150400.3.2.1 * libbd_lvm2-debuginfo-2.26-150400.3.2.1 * libbd_crypto2-2.26-150400.3.2.1 * libblockdev-2.26-150400.3.2.1 * libbd_btrfs2-2.26-150400.3.2.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libbd_part2-2.26-150400.3.2.1 * libbd_crypto2-debuginfo-2.26-150400.3.2.1 * libblockdev-debuginfo-2.26-150400.3.2.1 * libbd_swap2-2.26-150400.3.2.1 * libblockdev2-2.26-150400.3.2.1 * libbd_fs2-2.26-150400.3.2.1 * libbd_utils2-2.26-150400.3.2.1 * libbd_mdraid2-2.26-150400.3.2.1 * libbd_lvm2-2.26-150400.3.2.1 * libblockdev2-debuginfo-2.26-150400.3.2.1 * libblockdev-debugsource-2.26-150400.3.2.1 * libbd_loop2-debuginfo-2.26-150400.3.2.1 * libbd_part2-debuginfo-2.26-150400.3.2.1 * libbd_utils2-debuginfo-2.26-150400.3.2.1 * libbd_loop2-2.26-150400.3.2.1 * libbd_fs2-debuginfo-2.26-150400.3.2.1 * libbd_mdraid2-debuginfo-2.26-150400.3.2.1 * libbd_btrfs2-debuginfo-2.26-150400.3.2.1 * libbd_swap2-debuginfo-2.26-150400.3.2.1 * libbd_lvm2-debuginfo-2.26-150400.3.2.1 * libbd_crypto2-2.26-150400.3.2.1 * libblockdev-2.26-150400.3.2.1 * libbd_btrfs2-2.26-150400.3.2.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libbd_part2-2.26-150400.3.2.1 * libblockdev-debuginfo-2.26-150400.3.2.1 * libbd_swap2-2.26-150400.3.2.1 * libblockdev2-2.26-150400.3.2.1 * libbd_fs2-2.26-150400.3.2.1 * libbd_utils2-2.26-150400.3.2.1 * libbd_mdraid2-2.26-150400.3.2.1 * libbd_lvm2-2.26-150400.3.2.1 * libblockdev2-debuginfo-2.26-150400.3.2.1 * libblockdev-debugsource-2.26-150400.3.2.1 * libbd_loop2-debuginfo-2.26-150400.3.2.1 * libbd_part2-debuginfo-2.26-150400.3.2.1 * libbd_utils2-debuginfo-2.26-150400.3.2.1 * libbd_loop2-2.26-150400.3.2.1 * libbd_fs2-debuginfo-2.26-150400.3.2.1 * libbd_mdraid2-debuginfo-2.26-150400.3.2.1 * libbd_swap2-debuginfo-2.26-150400.3.2.1 * libbd_lvm2-debuginfo-2.26-150400.3.2.1 * libbd_crypto2-2.26-150400.3.2.1 * libblockdev-2.26-150400.3.2.1 * libbd_crypto2-debuginfo-2.26-150400.3.2.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libbd_part2-2.26-150400.3.2.1 * libblockdev-debuginfo-2.26-150400.3.2.1 * libbd_swap2-2.26-150400.3.2.1 * libblockdev2-2.26-150400.3.2.1 * libbd_fs2-2.26-150400.3.2.1 * libbd_utils2-2.26-150400.3.2.1 * libbd_mdraid2-2.26-150400.3.2.1 * libbd_lvm2-2.26-150400.3.2.1 * libblockdev2-debuginfo-2.26-150400.3.2.1 * libblockdev-debugsource-2.26-150400.3.2.1 * libbd_loop2-debuginfo-2.26-150400.3.2.1 * libbd_part2-debuginfo-2.26-150400.3.2.1 * libbd_utils2-debuginfo-2.26-150400.3.2.1 * libbd_loop2-2.26-150400.3.2.1 * libbd_fs2-debuginfo-2.26-150400.3.2.1 * libbd_mdraid2-debuginfo-2.26-150400.3.2.1 * libbd_swap2-debuginfo-2.26-150400.3.2.1 * libbd_lvm2-debuginfo-2.26-150400.3.2.1 * libbd_crypto2-2.26-150400.3.2.1 * libblockdev-2.26-150400.3.2.1 * libbd_crypto2-debuginfo-2.26-150400.3.2.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libblockdev-debugsource-2.26-150400.3.2.1 * libbd_btrfs2-debuginfo-2.26-150400.3.2.1 * libbd_btrfs2-2.26-150400.3.2.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libbd_vdo2-debuginfo-2.26-150400.3.2.1 * libbd_part2-2.26-150400.3.2.1 * libblockdev-devel-2.26-150400.3.2.1 * libbd_lvm-dbus2-2.26-150400.3.2.1 * libbd_kbd2-debuginfo-2.26-150400.3.2.1 * libblockdev-debuginfo-2.26-150400.3.2.1 * libbd_dm2-debuginfo-2.26-150400.3.2.1 * libbd_lvm-dbus-devel-2.26-150400.3.2.1 * libbd_dm2-2.26-150400.3.2.1 * libbd_fs-devel-2.26-150400.3.2.1 * libbd_swap2-2.26-150400.3.2.1 * libbd_mdraid-devel-2.26-150400.3.2.1 * libbd_lvm-devel-2.26-150400.3.2.1 * libblockdev2-2.26-150400.3.2.1 * libbd_crypto-devel-2.26-150400.3.2.1 * typelib-1_0-BlockDev-2_0-2.26-150400.3.2.1 * libbd_fs2-2.26-150400.3.2.1 * libbd_utils2-2.26-150400.3.2.1 * libbd_mdraid2-2.26-150400.3.2.1 * libbd_kbd2-2.26-150400.3.2.1 * libbd_lvm2-2.26-150400.3.2.1 * libblockdev2-debuginfo-2.26-150400.3.2.1 * libbd_mpath2-2.26-150400.3.2.1 * libblockdev-debugsource-2.26-150400.3.2.1 * libbd_mpath-devel-2.26-150400.3.2.1 * libbd_loop2-debuginfo-2.26-150400.3.2.1 * python3-libblockdev-2.26-150400.3.2.1 * libbd_lvm-dbus2-debuginfo-2.26-150400.3.2.1 * libbd_swap-devel-2.26-150400.3.2.1 * libbd_dm-devel-2.26-150400.3.2.1 * libbd_part2-debuginfo-2.26-150400.3.2.1 * libbd_utils2-debuginfo-2.26-150400.3.2.1 * libbd_kbd-devel-2.26-150400.3.2.1 * libbd_part-devel-2.26-150400.3.2.1 * libbd_loop2-2.26-150400.3.2.1 * libbd_fs2-debuginfo-2.26-150400.3.2.1 * libbd_mpath2-debuginfo-2.26-150400.3.2.1 * libbd_btrfs2-2.26-150400.3.2.1 * libbd_mdraid2-debuginfo-2.26-150400.3.2.1 * libbd_vdo2-2.26-150400.3.2.1 * libbd_btrfs2-debuginfo-2.26-150400.3.2.1 * libbd_vdo-devel-2.26-150400.3.2.1 * libbd_btrfs-devel-2.26-150400.3.2.1 * libbd_utils-devel-2.26-150400.3.2.1 * libbd_swap2-debuginfo-2.26-150400.3.2.1 * libbd_lvm2-debuginfo-2.26-150400.3.2.1 * libbd_crypto2-2.26-150400.3.2.1 * libbd_loop-devel-2.26-150400.3.2.1 * libblockdev-2.26-150400.3.2.1 * libbd_crypto2-debuginfo-2.26-150400.3.2.1 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * libbd_part2-2.26-150400.3.2.1 * libbd_crypto2-debuginfo-2.26-150400.3.2.1 * libblockdev-debuginfo-2.26-150400.3.2.1 * libbd_swap2-2.26-150400.3.2.1 * libblockdev2-2.26-150400.3.2.1 * libbd_fs2-2.26-150400.3.2.1 * libbd_utils2-2.26-150400.3.2.1 * libbd_mdraid2-2.26-150400.3.2.1 * libbd_lvm2-2.26-150400.3.2.1 * libblockdev2-debuginfo-2.26-150400.3.2.1 * libblockdev-debugsource-2.26-150400.3.2.1 * libbd_loop2-debuginfo-2.26-150400.3.2.1 * libbd_part2-debuginfo-2.26-150400.3.2.1 * libbd_utils2-debuginfo-2.26-150400.3.2.1 * libbd_loop2-2.26-150400.3.2.1 * libbd_fs2-debuginfo-2.26-150400.3.2.1 * libbd_mdraid2-debuginfo-2.26-150400.3.2.1 * libbd_btrfs2-debuginfo-2.26-150400.3.2.1 * libbd_swap2-debuginfo-2.26-150400.3.2.1 * libbd_lvm2-debuginfo-2.26-150400.3.2.1 * libbd_crypto2-2.26-150400.3.2.1 * libblockdev-2.26-150400.3.2.1 * libbd_btrfs2-2.26-150400.3.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libbd_vdo2-debuginfo-2.26-150400.3.2.1 * libbd_part2-2.26-150400.3.2.1 * libblockdev-devel-2.26-150400.3.2.1 * libbd_lvm-dbus2-2.26-150400.3.2.1 * libbd_kbd2-debuginfo-2.26-150400.3.2.1 * libblockdev-debuginfo-2.26-150400.3.2.1 * libbd_dm2-debuginfo-2.26-150400.3.2.1 * libbd_lvm-dbus-devel-2.26-150400.3.2.1 * libbd_dm2-2.26-150400.3.2.1 * libbd_fs-devel-2.26-150400.3.2.1 * libbd_swap2-2.26-150400.3.2.1 * libbd_mdraid-devel-2.26-150400.3.2.1 * libblockdev2-2.26-150400.3.2.1 * typelib-1_0-BlockDev-2_0-2.26-150400.3.2.1 * libbd_crypto-devel-2.26-150400.3.2.1 * libbd_fs2-2.26-150400.3.2.1 * libbd_utils2-2.26-150400.3.2.1 * libbd_mdraid2-2.26-150400.3.2.1 * libblockdev-2.26-150400.3.2.1 * libbd_kbd2-2.26-150400.3.2.1 * libbd_lvm2-2.26-150400.3.2.1 * libblockdev2-debuginfo-2.26-150400.3.2.1 * libbd_mpath2-2.26-150400.3.2.1 * libblockdev-debugsource-2.26-150400.3.2.1 * libbd_mpath-devel-2.26-150400.3.2.1 * libbd_loop2-debuginfo-2.26-150400.3.2.1 * python3-libblockdev-2.26-150400.3.2.1 * libbd_lvm-dbus2-debuginfo-2.26-150400.3.2.1 * libbd_swap-devel-2.26-150400.3.2.1 * libbd_dm-devel-2.26-150400.3.2.1 * libbd_part2-debuginfo-2.26-150400.3.2.1 * libbd_utils2-debuginfo-2.26-150400.3.2.1 * libbd_kbd-devel-2.26-150400.3.2.1 * libbd_part-devel-2.26-150400.3.2.1 * libbd_loop2-2.26-150400.3.2.1 * libbd_fs2-debuginfo-2.26-150400.3.2.1 * libbd_mpath2-debuginfo-2.26-150400.3.2.1 * libbd_btrfs2-2.26-150400.3.2.1 * libbd_mdraid2-debuginfo-2.26-150400.3.2.1 * libbd_vdo2-2.26-150400.3.2.1 * libbd_btrfs2-debuginfo-2.26-150400.3.2.1 * libbd_vdo-devel-2.26-150400.3.2.1 * libbd_btrfs-devel-2.26-150400.3.2.1 * libbd_utils-devel-2.26-150400.3.2.1 * libbd_swap2-debuginfo-2.26-150400.3.2.1 * libbd_lvm2-debuginfo-2.26-150400.3.2.1 * libbd_crypto2-2.26-150400.3.2.1 * libbd_loop-devel-2.26-150400.3.2.1 * libbd_lvm-devel-2.26-150400.3.2.1 * libbd_crypto2-debuginfo-2.26-150400.3.2.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libbd_vdo2-debuginfo-2.26-150400.3.2.1 * libbd_part2-2.26-150400.3.2.1 * libblockdev-devel-2.26-150400.3.2.1 * libbd_lvm-dbus2-2.26-150400.3.2.1 * libbd_kbd2-debuginfo-2.26-150400.3.2.1 * libblockdev-debuginfo-2.26-150400.3.2.1 * libbd_dm2-debuginfo-2.26-150400.3.2.1 * libbd_lvm-dbus-devel-2.26-150400.3.2.1 * libbd_dm2-2.26-150400.3.2.1 * libbd_fs-devel-2.26-150400.3.2.1 * libbd_swap2-2.26-150400.3.2.1 * libbd_mdraid-devel-2.26-150400.3.2.1 * libblockdev2-2.26-150400.3.2.1 * typelib-1_0-BlockDev-2_0-2.26-150400.3.2.1 * libbd_crypto-devel-2.26-150400.3.2.1 * libbd_fs2-2.26-150400.3.2.1 * libbd_utils2-2.26-150400.3.2.1 * libbd_mdraid2-2.26-150400.3.2.1 * libblockdev-2.26-150400.3.2.1 * libbd_kbd2-2.26-150400.3.2.1 * libbd_lvm2-2.26-150400.3.2.1 * libblockdev2-debuginfo-2.26-150400.3.2.1 * libbd_mpath2-2.26-150400.3.2.1 * libblockdev-debugsource-2.26-150400.3.2.1 * libbd_mpath-devel-2.26-150400.3.2.1 * libbd_loop2-debuginfo-2.26-150400.3.2.1 * python3-libblockdev-2.26-150400.3.2.1 * libbd_lvm-dbus2-debuginfo-2.26-150400.3.2.1 * libbd_swap-devel-2.26-150400.3.2.1 * libbd_dm-devel-2.26-150400.3.2.1 * libbd_part2-debuginfo-2.26-150400.3.2.1 * libbd_utils2-debuginfo-2.26-150400.3.2.1 * libbd_kbd-devel-2.26-150400.3.2.1 * libbd_part-devel-2.26-150400.3.2.1 * libbd_loop2-2.26-150400.3.2.1 * libbd_fs2-debuginfo-2.26-150400.3.2.1 * libbd_mpath2-debuginfo-2.26-150400.3.2.1 * libbd_btrfs2-2.26-150400.3.2.1 * libbd_mdraid2-debuginfo-2.26-150400.3.2.1 * libbd_vdo2-2.26-150400.3.2.1 * libbd_btrfs2-debuginfo-2.26-150400.3.2.1 * libbd_vdo-devel-2.26-150400.3.2.1 * libbd_btrfs-devel-2.26-150400.3.2.1 * libbd_utils-devel-2.26-150400.3.2.1 * libbd_swap2-debuginfo-2.26-150400.3.2.1 * libbd_lvm2-debuginfo-2.26-150400.3.2.1 * libbd_crypto2-2.26-150400.3.2.1 * libbd_loop-devel-2.26-150400.3.2.1 * libbd_lvm-devel-2.26-150400.3.2.1 * libbd_crypto2-debuginfo-2.26-150400.3.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1227458 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 08:30:32 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 08:30:32 -0000 Subject: SUSE-SU-2024:3720-1: moderate: Security update for jetty-minimal Message-ID: <172924023251.6932.15155678825758791392@smelt2.prg2.suse.org> # Security update for jetty-minimal Announcement ID: SUSE-SU-2024:3720-1 Release Date: 2024-10-18T06:34:07Z Rating: moderate References: * bsc#1231651 Cross-References: * CVE-2024-8184 CVSS scores: * CVE-2024-8184 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-8184 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-8184 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for jetty-minimal fixes the following issues: * CVE-2024-8184: Fixed remote denial-of-service in ThreadLimitHandler.getRemote() (bsc#1231651). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3720=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3720=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3720=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3720=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3720=1 ## Package List: * openSUSE Leap 15.5 (noarch) * jetty-client-9.4.56-150200.3.28.1 * jetty-minimal-javadoc-9.4.56-150200.3.28.1 * jetty-annotations-9.4.56-150200.3.28.1 * jetty-io-9.4.56-150200.3.28.1 * jetty-openid-9.4.56-150200.3.28.1 * jetty-server-9.4.56-150200.3.28.1 * jetty-rewrite-9.4.56-150200.3.28.1 * jetty-start-9.4.56-150200.3.28.1 * jetty-cdi-9.4.56-150200.3.28.1 * jetty-proxy-9.4.56-150200.3.28.1 * jetty-quickstart-9.4.56-150200.3.28.1 * jetty-jsp-9.4.56-150200.3.28.1 * jetty-plus-9.4.56-150200.3.28.1 * jetty-security-9.4.56-150200.3.28.1 * jetty-servlet-9.4.56-150200.3.28.1 * jetty-jmx-9.4.56-150200.3.28.1 * jetty-util-9.4.56-150200.3.28.1 * jetty-webapp-9.4.56-150200.3.28.1 * jetty-http-spi-9.4.56-150200.3.28.1 * jetty-util-ajax-9.4.56-150200.3.28.1 * jetty-servlets-9.4.56-150200.3.28.1 * jetty-http-9.4.56-150200.3.28.1 * jetty-ant-9.4.56-150200.3.28.1 * jetty-jaas-9.4.56-150200.3.28.1 * jetty-continuation-9.4.56-150200.3.28.1 * jetty-jndi-9.4.56-150200.3.28.1 * jetty-fcgi-9.4.56-150200.3.28.1 * jetty-deploy-9.4.56-150200.3.28.1 * jetty-xml-9.4.56-150200.3.28.1 * openSUSE Leap 15.6 (noarch) * jetty-client-9.4.56-150200.3.28.1 * jetty-minimal-javadoc-9.4.56-150200.3.28.1 * jetty-annotations-9.4.56-150200.3.28.1 * jetty-io-9.4.56-150200.3.28.1 * jetty-openid-9.4.56-150200.3.28.1 * jetty-server-9.4.56-150200.3.28.1 * jetty-rewrite-9.4.56-150200.3.28.1 * jetty-start-9.4.56-150200.3.28.1 * jetty-cdi-9.4.56-150200.3.28.1 * jetty-proxy-9.4.56-150200.3.28.1 * jetty-quickstart-9.4.56-150200.3.28.1 * jetty-jsp-9.4.56-150200.3.28.1 * jetty-plus-9.4.56-150200.3.28.1 * jetty-security-9.4.56-150200.3.28.1 * jetty-servlet-9.4.56-150200.3.28.1 * jetty-jmx-9.4.56-150200.3.28.1 * jetty-util-9.4.56-150200.3.28.1 * jetty-webapp-9.4.56-150200.3.28.1 * jetty-http-spi-9.4.56-150200.3.28.1 * jetty-util-ajax-9.4.56-150200.3.28.1 * jetty-servlets-9.4.56-150200.3.28.1 * jetty-http-9.4.56-150200.3.28.1 * jetty-ant-9.4.56-150200.3.28.1 * jetty-jaas-9.4.56-150200.3.28.1 * jetty-continuation-9.4.56-150200.3.28.1 * jetty-jndi-9.4.56-150200.3.28.1 * jetty-fcgi-9.4.56-150200.3.28.1 * jetty-deploy-9.4.56-150200.3.28.1 * jetty-xml-9.4.56-150200.3.28.1 * Development Tools Module 15-SP5 (noarch) * jetty-server-9.4.56-150200.3.28.1 * jetty-servlet-9.4.56-150200.3.28.1 * jetty-security-9.4.56-150200.3.28.1 * jetty-util-9.4.56-150200.3.28.1 * jetty-util-ajax-9.4.56-150200.3.28.1 * jetty-http-9.4.56-150200.3.28.1 * jetty-io-9.4.56-150200.3.28.1 * Development Tools Module 15-SP6 (noarch) * jetty-server-9.4.56-150200.3.28.1 * jetty-servlet-9.4.56-150200.3.28.1 * jetty-security-9.4.56-150200.3.28.1 * jetty-util-9.4.56-150200.3.28.1 * jetty-util-ajax-9.4.56-150200.3.28.1 * jetty-http-9.4.56-150200.3.28.1 * jetty-io-9.4.56-150200.3.28.1 * SUSE Package Hub 15 15-SP6 (noarch) * jetty-continuation-9.4.56-150200.3.28.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8184.html * https://bugzilla.suse.com/show_bug.cgi?id=1231651 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 08:30:35 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 08:30:35 -0000 Subject: SUSE-SU-2024:3719-1: important: Security update for python-starlette Message-ID: <172924023512.6932.5030096689620719556@smelt2.prg2.suse.org> # Security update for python-starlette Announcement ID: SUSE-SU-2024:3719-1 Release Date: 2024-10-18T05:54:49Z Rating: important References: * bsc#1231689 Cross-References: * CVE-2024-47874 CVSS scores: * CVE-2024-47874 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47874 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47874 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47874 ( NVD ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for python-starlette fixes the following issues: * CVE-2024-47874: Fixed possible DoS via parts size in multipart/form-data requests (bsc#1231689) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3719=1 openSUSE-SLE-15.6-2024-3719=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-starlette-0.35.1-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47874.html * https://bugzilla.suse.com/show_bug.cgi?id=1231689 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 08:30:39 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 08:30:39 -0000 Subject: SUSE-RU-2024:3718-1: important: Recommended update for libzypp Message-ID: <172924023910.6932.3240924620837152638@smelt2.prg2.suse.org> # Recommended update for libzypp Announcement ID: SUSE-RU-2024:3718-1 Release Date: 2024-10-18T02:04:46Z Rating: important References: * bsc#1230912 * bsc#1231043 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for libzypp fixes the following issues: * Send unescaped colons in header values. According to the STOMP protocol, it would be correct to escape colon here but the practice broke plugin receivers that didn't expect this. The incompatiblity affected customers who were running spacewalk-repo-sync and experienced issues when accessing the cloud URL. [bsc#1231043] * Fix hang in curl code with no network connection. [bsc#1230912] ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3718=1 SUSE-2024-3718=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3718=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3718=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3718=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3718=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3718=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3718=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3718=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libzypp-debugsource-17.35.12-150500.6.21.1 * libzypp-devel-17.35.12-150500.6.21.1 * libzypp-17.35.12-150500.6.21.1 * libzypp-debuginfo-17.35.12-150500.6.21.1 * libzypp-devel-doc-17.35.12-150500.6.21.1 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * libzypp-17.35.12-150500.6.21.1 * libzypp-debugsource-17.35.12-150500.6.21.1 * libzypp-debuginfo-17.35.12-150500.6.21.1 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libzypp-17.35.12-150500.6.21.1 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libzypp-17.35.12-150500.6.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libzypp-17.35.12-150500.6.21.1 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libzypp-17.35.12-150500.6.21.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libzypp-17.35.12-150500.6.21.1 * libzypp-debugsource-17.35.12-150500.6.21.1 * libzypp-debuginfo-17.35.12-150500.6.21.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libzypp-17.35.12-150500.6.21.1 * libzypp-debugsource-17.35.12-150500.6.21.1 * libzypp-debuginfo-17.35.12-150500.6.21.1 * libzypp-devel-17.35.12-150500.6.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230912 * https://bugzilla.suse.com/show_bug.cgi?id=1231043 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 08:30:42 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 08:30:42 -0000 Subject: SUSE-SU-2024:3717-1: moderate: Security update for OpenIPMI Message-ID: <172924024220.6932.11080314605077492981@smelt2.prg2.suse.org> # Security update for OpenIPMI Announcement ID: SUSE-SU-2024:3717-1 Release Date: 2024-10-18T00:33:55Z Rating: moderate References: * bsc#1229910 Cross-References: * CVE-2024-42934 CVSS scores: * CVE-2024-42934 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-42934 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for OpenIPMI fixes the following issues: * CVE-2024-42934: Fixed missing check on the authorization type on incoming LAN messages in IPMI simulator (bsc#1229910) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3717=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3717=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3717=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-3717=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * OpenIPMI-debugsource-2.0.21-10.9.1 * OpenIPMI-devel-2.0.21-10.9.1 * OpenIPMI-debuginfo-2.0.21-10.9.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * OpenIPMI-debugsource-2.0.21-10.9.1 * OpenIPMI-python-2.0.21-10.9.1 * OpenIPMI-2.0.21-10.9.1 * OpenIPMI-python-debuginfo-2.0.21-10.9.1 * OpenIPMI-debuginfo-2.0.21-10.9.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * OpenIPMI-debugsource-2.0.21-10.9.1 * OpenIPMI-python-2.0.21-10.9.1 * OpenIPMI-2.0.21-10.9.1 * OpenIPMI-python-debuginfo-2.0.21-10.9.1 * OpenIPMI-debuginfo-2.0.21-10.9.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * OpenIPMI-debugsource-2.0.21-10.9.1 * OpenIPMI-python-2.0.21-10.9.1 * OpenIPMI-2.0.21-10.9.1 * OpenIPMI-python-debuginfo-2.0.21-10.9.1 * OpenIPMI-debuginfo-2.0.21-10.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-42934.html * https://bugzilla.suse.com/show_bug.cgi?id=1229910 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 12:30:03 -0000 Subject: SUSE-RU-2024:3726-1: moderate: Recommended update for glibc Message-ID: <172925460370.3896.3977449569244953269@smelt2.prg2.suse.org> # Recommended update for glibc Announcement ID: SUSE-RU-2024:3726-1 Release Date: 2024-10-18T09:56:52Z Rating: moderate References: * bsc#1231051 Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for glibc fixes the following issue: * Apply libc_nonshared.a workaround on s390x and ppc64le architectures (bsc#1231051). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3726=1 openSUSE-SLE-15.6-2024-3726=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3726=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3726=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586 i686) * libnsl1-2.38-150600.14.14.2 * glibc-devel-2.38-150600.14.14.2 * glibc-profile-2.38-150600.14.14.2 * glibc-devel-debuginfo-2.38-150600.14.14.2 * glibc-locale-base-debuginfo-2.38-150600.14.14.2 * glibc-2.38-150600.14.14.2 * glibc-devel-static-2.38-150600.14.14.2 * glibc-locale-2.38-150600.14.14.2 * glibc-locale-base-2.38-150600.14.14.2 * glibc-debugsource-2.38-150600.14.14.2 * glibc-debuginfo-2.38-150600.14.14.2 * libnsl1-debuginfo-2.38-150600.14.14.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * glibc-extra-2.38-150600.14.14.2 * glibc-utils-debuginfo-2.38-150600.14.14.2 * nscd-2.38-150600.14.14.2 * nscd-debuginfo-2.38-150600.14.14.2 * glibc-extra-debuginfo-2.38-150600.14.14.2 * glibc-utils-2.38-150600.14.14.2 * glibc-utils-src-debugsource-2.38-150600.14.14.2 * openSUSE Leap 15.6 (noarch) * glibc-info-2.38-150600.14.14.2 * glibc-i18ndata-2.38-150600.14.14.2 * glibc-html-2.38-150600.14.14.2 * glibc-lang-2.38-150600.14.14.2 * openSUSE Leap 15.6 (x86_64) * glibc-32bit-2.38-150600.14.14.2 * libnsl1-32bit-debuginfo-2.38-150600.14.14.2 * glibc-locale-base-32bit-2.38-150600.14.14.2 * glibc-profile-32bit-2.38-150600.14.14.2 * glibc-devel-static-32bit-2.38-150600.14.14.2 * glibc-utils-32bit-2.38-150600.14.14.2 * libnsl1-32bit-2.38-150600.14.14.2 * glibc-locale-base-32bit-debuginfo-2.38-150600.14.14.2 * glibc-devel-32bit-2.38-150600.14.14.2 * glibc-utils-32bit-debuginfo-2.38-150600.14.14.2 * glibc-32bit-debuginfo-2.38-150600.14.14.2 * glibc-devel-32bit-debuginfo-2.38-150600.14.14.2 * openSUSE Leap 15.6 (aarch64_ilp32) * glibc-64bit-debuginfo-2.38-150600.14.14.2 * glibc-devel-static-64bit-2.38-150600.14.14.2 * glibc-devel-64bit-debuginfo-2.38-150600.14.14.2 * glibc-profile-64bit-2.38-150600.14.14.2 * libnsl1-64bit-2.38-150600.14.14.2 * glibc-utils-64bit-debuginfo-2.38-150600.14.14.2 * glibc-devel-64bit-2.38-150600.14.14.2 * glibc-locale-base-64bit-2.38-150600.14.14.2 * glibc-utils-64bit-2.38-150600.14.14.2 * glibc-locale-base-64bit-debuginfo-2.38-150600.14.14.2 * glibc-64bit-2.38-150600.14.14.2 * libnsl1-64bit-debuginfo-2.38-150600.14.14.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libnsl1-2.38-150600.14.14.2 * glibc-extra-2.38-150600.14.14.2 * glibc-devel-2.38-150600.14.14.2 * glibc-profile-2.38-150600.14.14.2 * glibc-devel-debuginfo-2.38-150600.14.14.2 * glibc-locale-base-debuginfo-2.38-150600.14.14.2 * glibc-2.38-150600.14.14.2 * glibc-locale-2.38-150600.14.14.2 * glibc-locale-base-2.38-150600.14.14.2 * glibc-debugsource-2.38-150600.14.14.2 * nscd-2.38-150600.14.14.2 * nscd-debuginfo-2.38-150600.14.14.2 * glibc-extra-debuginfo-2.38-150600.14.14.2 * glibc-debuginfo-2.38-150600.14.14.2 * libnsl1-debuginfo-2.38-150600.14.14.2 * Basesystem Module 15-SP6 (noarch) * glibc-info-2.38-150600.14.14.2 * glibc-i18ndata-2.38-150600.14.14.2 * glibc-lang-2.38-150600.14.14.2 * Basesystem Module 15-SP6 (x86_64) * glibc-32bit-2.38-150600.14.14.2 * libnsl1-32bit-debuginfo-2.38-150600.14.14.2 * glibc-locale-base-32bit-2.38-150600.14.14.2 * libnsl1-32bit-2.38-150600.14.14.2 * glibc-32bit-debuginfo-2.38-150600.14.14.2 * glibc-locale-base-32bit-debuginfo-2.38-150600.14.14.2 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * glibc-utils-debuginfo-2.38-150600.14.14.2 * glibc-utils-src-debugsource-2.38-150600.14.14.2 * glibc-devel-static-2.38-150600.14.14.2 * glibc-debugsource-2.38-150600.14.14.2 * glibc-utils-2.38-150600.14.14.2 * glibc-debuginfo-2.38-150600.14.14.2 * Development Tools Module 15-SP6 (x86_64) * glibc-devel-32bit-debuginfo-2.38-150600.14.14.2 * glibc-32bit-debuginfo-2.38-150600.14.14.2 * glibc-devel-32bit-2.38-150600.14.14.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231051 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 12:30:05 -0000 Subject: SUSE-RU-2024:3725-1: moderate: Recommended update for SLES-LTSS-release Message-ID: <172925460510.3896.34143726761827245@smelt2.prg2.suse.org> # Recommended update for SLES-LTSS-release Announcement ID: SUSE-RU-2024:3725-1 Release Date: 2024-10-18T08:13:28Z Rating: moderate References: * jsc#MSC-852 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS 12-SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that contains one feature can now be installed. ## Description: This update for SLES-LTSS-release provides the following fix: * Adjust the EOL date for the product. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS 12-SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-3725=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS 12-SP5 (aarch64 ppc64le s390x x86_64) * sles-ltss-release-12.5-16.4.1 * sles-ltss-release-POOL-12.5-16.4.1 ## References: * https://jira.suse.com/browse/MSC-852 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 16:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 16:30:08 -0000 Subject: SUSE-SU-2024:3733-1: moderate: Security update for php7 Message-ID: <172926900864.6514.17788014151954543065@smelt2.prg2.suse.org> # Security update for php7 Announcement ID: SUSE-SU-2024:3733-1 Release Date: 2024-10-18T15:48:48Z Rating: moderate References: * bsc#1231358 * bsc#1231360 * bsc#1231382 Cross-References: * CVE-2024-8925 * CVE-2024-8927 * CVE-2024-9026 CVSS scores: * CVE-2024-8925 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8925 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-8925 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-8925 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-8927 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-8927 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-8927 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9026 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9026 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-9026 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-9026 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * Legacy Module 15-SP5 * Legacy Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for php7 fixes the following issues: * CVE-2024-8925: Fixed erroneous parsing of multipart form data in HTTP POST requests leads to legitimate data not being processed (bsc#1231360) * CVE-2024-8927: Fixed cgi.force_redirect configuration is bypassable due to an environment variable collision (bsc#1231358) * CVE-2024-9026: Fixed pollution of worker output logs in PHP-FPM (bsc#1231382) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3733=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3733=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3733=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3733=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3733=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3733=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3733=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * apache2-mod_php7-debuginfo-7.4.33-150400.4.40.1 * php7-debuginfo-7.4.33-150400.4.40.1 * php7-dom-debuginfo-7.4.33-150400.4.40.1 * php7-odbc-7.4.33-150400.4.40.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.40.1 * php7-pgsql-debuginfo-7.4.33-150400.4.40.1 * php7-xmlreader-7.4.33-150400.4.40.1 * php7-gd-7.4.33-150400.4.40.1 * php7-pcntl-7.4.33-150400.4.40.1 * php7-pdo-7.4.33-150400.4.40.1 * php7-json-debuginfo-7.4.33-150400.4.40.1 * php7-openssl-debuginfo-7.4.33-150400.4.40.1 * php7-sysvshm-7.4.33-150400.4.40.1 * php7-sqlite-7.4.33-150400.4.40.1 * php7-exif-debuginfo-7.4.33-150400.4.40.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.40.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.40.1 * php7-dba-7.4.33-150400.4.40.1 * php7-opcache-7.4.33-150400.4.40.1 * php7-cli-7.4.33-150400.4.40.1 * php7-ctype-debuginfo-7.4.33-150400.4.40.1 * php7-xmlwriter-7.4.33-150400.4.40.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.40.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.40.1 * php7-fpm-debuginfo-7.4.33-150400.4.40.1 * php7-snmp-7.4.33-150400.4.40.1 * php7-sqlite-debuginfo-7.4.33-150400.4.40.1 * php7-embed-7.4.33-150400.4.40.1 * php7-soap-7.4.33-150400.4.40.1 * php7-sodium-debuginfo-7.4.33-150400.4.40.1 * php7-fileinfo-7.4.33-150400.4.40.1 * php7-posix-debuginfo-7.4.33-150400.4.40.1 * php7-gettext-7.4.33-150400.4.40.1 * php7-tidy-debuginfo-7.4.33-150400.4.40.1 * php7-shmop-debuginfo-7.4.33-150400.4.40.1 * php7-enchant-debuginfo-7.4.33-150400.4.40.1 * php7-soap-debuginfo-7.4.33-150400.4.40.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.40.1 * php7-iconv-7.4.33-150400.4.40.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.40.1 * php7-opcache-debuginfo-7.4.33-150400.4.40.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.40.1 * php7-gettext-debuginfo-7.4.33-150400.4.40.1 * php7-embed-debugsource-7.4.33-150400.4.40.1 * php7-calendar-debuginfo-7.4.33-150400.4.40.1 * php7-dba-debuginfo-7.4.33-150400.4.40.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.40.1 * php7-fpm-7.4.33-150400.4.40.1 * php7-curl-debuginfo-7.4.33-150400.4.40.1 * php7-enchant-7.4.33-150400.4.40.1 * php7-mysql-debuginfo-7.4.33-150400.4.40.1 * php7-bz2-debuginfo-7.4.33-150400.4.40.1 * php7-7.4.33-150400.4.40.1 * php7-gmp-7.4.33-150400.4.40.1 * php7-posix-7.4.33-150400.4.40.1 * php7-ftp-7.4.33-150400.4.40.1 * php7-zip-7.4.33-150400.4.40.1 * php7-readline-debuginfo-7.4.33-150400.4.40.1 * php7-snmp-debuginfo-7.4.33-150400.4.40.1 * php7-exif-7.4.33-150400.4.40.1 * php7-calendar-7.4.33-150400.4.40.1 * php7-sockets-debuginfo-7.4.33-150400.4.40.1 * php7-iconv-debuginfo-7.4.33-150400.4.40.1 * php7-shmop-7.4.33-150400.4.40.1 * php7-zlib-debuginfo-7.4.33-150400.4.40.1 * php7-readline-7.4.33-150400.4.40.1 * php7-sodium-7.4.33-150400.4.40.1 * php7-xsl-7.4.33-150400.4.40.1 * php7-bcmath-debuginfo-7.4.33-150400.4.40.1 * php7-gmp-debuginfo-7.4.33-150400.4.40.1 * php7-intl-debuginfo-7.4.33-150400.4.40.1 * php7-embed-debuginfo-7.4.33-150400.4.40.1 * php7-ftp-debuginfo-7.4.33-150400.4.40.1 * php7-fastcgi-debugsource-7.4.33-150400.4.40.1 * php7-test-7.4.33-150400.4.40.1 * php7-bz2-7.4.33-150400.4.40.1 * php7-phar-7.4.33-150400.4.40.1 * php7-pdo-debuginfo-7.4.33-150400.4.40.1 * php7-odbc-debuginfo-7.4.33-150400.4.40.1 * php7-curl-7.4.33-150400.4.40.1 * php7-pcntl-debuginfo-7.4.33-150400.4.40.1 * php7-intl-7.4.33-150400.4.40.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.40.1 * php7-ldap-7.4.33-150400.4.40.1 * php7-xmlrpc-7.4.33-150400.4.40.1 * php7-cli-debuginfo-7.4.33-150400.4.40.1 * php7-tokenizer-7.4.33-150400.4.40.1 * php7-ldap-debuginfo-7.4.33-150400.4.40.1 * php7-zip-debuginfo-7.4.33-150400.4.40.1 * php7-debugsource-7.4.33-150400.4.40.1 * php7-bcmath-7.4.33-150400.4.40.1 * php7-json-7.4.33-150400.4.40.1 * php7-openssl-7.4.33-150400.4.40.1 * php7-tidy-7.4.33-150400.4.40.1 * php7-mysql-7.4.33-150400.4.40.1 * php7-xsl-debuginfo-7.4.33-150400.4.40.1 * php7-pgsql-7.4.33-150400.4.40.1 * php7-mbstring-debuginfo-7.4.33-150400.4.40.1 * php7-zlib-7.4.33-150400.4.40.1 * php7-sysvsem-7.4.33-150400.4.40.1 * php7-devel-7.4.33-150400.4.40.1 * php7-fpm-debugsource-7.4.33-150400.4.40.1 * php7-gd-debuginfo-7.4.33-150400.4.40.1 * php7-dom-7.4.33-150400.4.40.1 * apache2-mod_php7-7.4.33-150400.4.40.1 * php7-fastcgi-7.4.33-150400.4.40.1 * php7-mbstring-7.4.33-150400.4.40.1 * php7-ctype-7.4.33-150400.4.40.1 * php7-phar-debuginfo-7.4.33-150400.4.40.1 * php7-sockets-7.4.33-150400.4.40.1 * php7-sysvmsg-7.4.33-150400.4.40.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * apache2-mod_php7-debuginfo-7.4.33-150400.4.40.1 * php7-debuginfo-7.4.33-150400.4.40.1 * php7-dom-debuginfo-7.4.33-150400.4.40.1 * php7-odbc-7.4.33-150400.4.40.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.40.1 * php7-pgsql-debuginfo-7.4.33-150400.4.40.1 * php7-xmlreader-7.4.33-150400.4.40.1 * php7-gd-7.4.33-150400.4.40.1 * php7-pcntl-7.4.33-150400.4.40.1 * php7-pdo-7.4.33-150400.4.40.1 * php7-json-debuginfo-7.4.33-150400.4.40.1 * php7-openssl-debuginfo-7.4.33-150400.4.40.1 * php7-sysvshm-7.4.33-150400.4.40.1 * php7-sqlite-7.4.33-150400.4.40.1 * php7-exif-debuginfo-7.4.33-150400.4.40.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.40.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.40.1 * php7-dba-7.4.33-150400.4.40.1 * php7-opcache-7.4.33-150400.4.40.1 * php7-cli-7.4.33-150400.4.40.1 * php7-ctype-debuginfo-7.4.33-150400.4.40.1 * php7-xmlwriter-7.4.33-150400.4.40.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.40.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.40.1 * php7-fpm-debuginfo-7.4.33-150400.4.40.1 * php7-snmp-7.4.33-150400.4.40.1 * php7-sqlite-debuginfo-7.4.33-150400.4.40.1 * php7-embed-7.4.33-150400.4.40.1 * php7-soap-7.4.33-150400.4.40.1 * php7-sodium-debuginfo-7.4.33-150400.4.40.1 * php7-fileinfo-7.4.33-150400.4.40.1 * php7-posix-debuginfo-7.4.33-150400.4.40.1 * php7-gettext-7.4.33-150400.4.40.1 * php7-tidy-debuginfo-7.4.33-150400.4.40.1 * php7-shmop-debuginfo-7.4.33-150400.4.40.1 * php7-enchant-debuginfo-7.4.33-150400.4.40.1 * php7-soap-debuginfo-7.4.33-150400.4.40.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.40.1 * php7-iconv-7.4.33-150400.4.40.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.40.1 * php7-opcache-debuginfo-7.4.33-150400.4.40.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.40.1 * php7-gettext-debuginfo-7.4.33-150400.4.40.1 * php7-embed-debugsource-7.4.33-150400.4.40.1 * php7-calendar-debuginfo-7.4.33-150400.4.40.1 * php7-dba-debuginfo-7.4.33-150400.4.40.1 * php7-fpm-7.4.33-150400.4.40.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.40.1 * php7-curl-debuginfo-7.4.33-150400.4.40.1 * php7-enchant-7.4.33-150400.4.40.1 * php7-mysql-debuginfo-7.4.33-150400.4.40.1 * php7-bz2-debuginfo-7.4.33-150400.4.40.1 * php7-7.4.33-150400.4.40.1 * php7-gmp-7.4.33-150400.4.40.1 * php7-posix-7.4.33-150400.4.40.1 * php7-ftp-7.4.33-150400.4.40.1 * php7-zip-7.4.33-150400.4.40.1 * php7-readline-debuginfo-7.4.33-150400.4.40.1 * php7-snmp-debuginfo-7.4.33-150400.4.40.1 * php7-exif-7.4.33-150400.4.40.1 * php7-calendar-7.4.33-150400.4.40.1 * php7-sockets-debuginfo-7.4.33-150400.4.40.1 * php7-iconv-debuginfo-7.4.33-150400.4.40.1 * php7-shmop-7.4.33-150400.4.40.1 * php7-zlib-debuginfo-7.4.33-150400.4.40.1 * php7-readline-7.4.33-150400.4.40.1 * php7-sodium-7.4.33-150400.4.40.1 * php7-xsl-7.4.33-150400.4.40.1 * php7-bcmath-debuginfo-7.4.33-150400.4.40.1 * php7-gmp-debuginfo-7.4.33-150400.4.40.1 * php7-intl-debuginfo-7.4.33-150400.4.40.1 * php7-embed-debuginfo-7.4.33-150400.4.40.1 * php7-ftp-debuginfo-7.4.33-150400.4.40.1 * php7-fastcgi-debugsource-7.4.33-150400.4.40.1 * php7-test-7.4.33-150400.4.40.1 * php7-bz2-7.4.33-150400.4.40.1 * php7-phar-7.4.33-150400.4.40.1 * php7-pdo-debuginfo-7.4.33-150400.4.40.1 * php7-odbc-debuginfo-7.4.33-150400.4.40.1 * php7-curl-7.4.33-150400.4.40.1 * php7-pcntl-debuginfo-7.4.33-150400.4.40.1 * php7-intl-7.4.33-150400.4.40.1 * php7-ldap-7.4.33-150400.4.40.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.40.1 * php7-xmlrpc-7.4.33-150400.4.40.1 * php7-cli-debuginfo-7.4.33-150400.4.40.1 * php7-tokenizer-7.4.33-150400.4.40.1 * php7-ldap-debuginfo-7.4.33-150400.4.40.1 * php7-zip-debuginfo-7.4.33-150400.4.40.1 * php7-debugsource-7.4.33-150400.4.40.1 * php7-bcmath-7.4.33-150400.4.40.1 * php7-json-7.4.33-150400.4.40.1 * php7-openssl-7.4.33-150400.4.40.1 * php7-tidy-7.4.33-150400.4.40.1 * php7-mysql-7.4.33-150400.4.40.1 * php7-xsl-debuginfo-7.4.33-150400.4.40.1 * php7-pgsql-7.4.33-150400.4.40.1 * php7-mbstring-debuginfo-7.4.33-150400.4.40.1 * php7-zlib-7.4.33-150400.4.40.1 * php7-sysvsem-7.4.33-150400.4.40.1 * php7-devel-7.4.33-150400.4.40.1 * php7-fpm-debugsource-7.4.33-150400.4.40.1 * php7-gd-debuginfo-7.4.33-150400.4.40.1 * php7-dom-7.4.33-150400.4.40.1 * apache2-mod_php7-7.4.33-150400.4.40.1 * php7-fastcgi-7.4.33-150400.4.40.1 * php7-mbstring-7.4.33-150400.4.40.1 * php7-ctype-7.4.33-150400.4.40.1 * php7-phar-debuginfo-7.4.33-150400.4.40.1 * php7-sockets-7.4.33-150400.4.40.1 * php7-sysvmsg-7.4.33-150400.4.40.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * apache2-mod_php7-debuginfo-7.4.33-150400.4.40.1 * php7-debuginfo-7.4.33-150400.4.40.1 * php7-dom-debuginfo-7.4.33-150400.4.40.1 * php7-odbc-7.4.33-150400.4.40.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.40.1 * php7-pgsql-debuginfo-7.4.33-150400.4.40.1 * php7-xmlreader-7.4.33-150400.4.40.1 * php7-gd-7.4.33-150400.4.40.1 * php7-pcntl-7.4.33-150400.4.40.1 * php7-pdo-7.4.33-150400.4.40.1 * php7-json-debuginfo-7.4.33-150400.4.40.1 * php7-openssl-debuginfo-7.4.33-150400.4.40.1 * php7-sysvshm-7.4.33-150400.4.40.1 * php7-sqlite-7.4.33-150400.4.40.1 * php7-exif-debuginfo-7.4.33-150400.4.40.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.40.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.40.1 * php7-dba-7.4.33-150400.4.40.1 * php7-opcache-7.4.33-150400.4.40.1 * php7-cli-7.4.33-150400.4.40.1 * php7-ctype-debuginfo-7.4.33-150400.4.40.1 * php7-xmlwriter-7.4.33-150400.4.40.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.40.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.40.1 * php7-fpm-debuginfo-7.4.33-150400.4.40.1 * php7-snmp-7.4.33-150400.4.40.1 * php7-sqlite-debuginfo-7.4.33-150400.4.40.1 * php7-embed-7.4.33-150400.4.40.1 * php7-soap-7.4.33-150400.4.40.1 * php7-sodium-debuginfo-7.4.33-150400.4.40.1 * php7-fileinfo-7.4.33-150400.4.40.1 * php7-posix-debuginfo-7.4.33-150400.4.40.1 * php7-gettext-7.4.33-150400.4.40.1 * php7-tidy-debuginfo-7.4.33-150400.4.40.1 * php7-shmop-debuginfo-7.4.33-150400.4.40.1 * php7-enchant-debuginfo-7.4.33-150400.4.40.1 * php7-soap-debuginfo-7.4.33-150400.4.40.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.40.1 * php7-iconv-7.4.33-150400.4.40.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.40.1 * php7-opcache-debuginfo-7.4.33-150400.4.40.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.40.1 * php7-gettext-debuginfo-7.4.33-150400.4.40.1 * php7-embed-debugsource-7.4.33-150400.4.40.1 * php7-calendar-debuginfo-7.4.33-150400.4.40.1 * php7-dba-debuginfo-7.4.33-150400.4.40.1 * php7-fpm-7.4.33-150400.4.40.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.40.1 * php7-curl-debuginfo-7.4.33-150400.4.40.1 * php7-enchant-7.4.33-150400.4.40.1 * php7-mysql-debuginfo-7.4.33-150400.4.40.1 * php7-bz2-debuginfo-7.4.33-150400.4.40.1 * php7-7.4.33-150400.4.40.1 * php7-gmp-7.4.33-150400.4.40.1 * php7-posix-7.4.33-150400.4.40.1 * php7-ftp-7.4.33-150400.4.40.1 * php7-zip-7.4.33-150400.4.40.1 * php7-readline-debuginfo-7.4.33-150400.4.40.1 * php7-snmp-debuginfo-7.4.33-150400.4.40.1 * php7-exif-7.4.33-150400.4.40.1 * php7-calendar-7.4.33-150400.4.40.1 * php7-sockets-debuginfo-7.4.33-150400.4.40.1 * php7-iconv-debuginfo-7.4.33-150400.4.40.1 * php7-shmop-7.4.33-150400.4.40.1 * php7-zlib-debuginfo-7.4.33-150400.4.40.1 * php7-readline-7.4.33-150400.4.40.1 * php7-sodium-7.4.33-150400.4.40.1 * php7-xsl-7.4.33-150400.4.40.1 * php7-bcmath-debuginfo-7.4.33-150400.4.40.1 * php7-gmp-debuginfo-7.4.33-150400.4.40.1 * php7-intl-debuginfo-7.4.33-150400.4.40.1 * php7-embed-debuginfo-7.4.33-150400.4.40.1 * php7-ftp-debuginfo-7.4.33-150400.4.40.1 * php7-fastcgi-debugsource-7.4.33-150400.4.40.1 * php7-test-7.4.33-150400.4.40.1 * php7-bz2-7.4.33-150400.4.40.1 * php7-phar-7.4.33-150400.4.40.1 * php7-pdo-debuginfo-7.4.33-150400.4.40.1 * php7-odbc-debuginfo-7.4.33-150400.4.40.1 * php7-curl-7.4.33-150400.4.40.1 * php7-pcntl-debuginfo-7.4.33-150400.4.40.1 * php7-intl-7.4.33-150400.4.40.1 * php7-ldap-7.4.33-150400.4.40.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.40.1 * php7-xmlrpc-7.4.33-150400.4.40.1 * php7-cli-debuginfo-7.4.33-150400.4.40.1 * php7-tokenizer-7.4.33-150400.4.40.1 * php7-ldap-debuginfo-7.4.33-150400.4.40.1 * php7-zip-debuginfo-7.4.33-150400.4.40.1 * php7-debugsource-7.4.33-150400.4.40.1 * php7-bcmath-7.4.33-150400.4.40.1 * php7-json-7.4.33-150400.4.40.1 * php7-openssl-7.4.33-150400.4.40.1 * php7-tidy-7.4.33-150400.4.40.1 * php7-mysql-7.4.33-150400.4.40.1 * php7-xsl-debuginfo-7.4.33-150400.4.40.1 * php7-pgsql-7.4.33-150400.4.40.1 * php7-mbstring-debuginfo-7.4.33-150400.4.40.1 * php7-zlib-7.4.33-150400.4.40.1 * php7-sysvsem-7.4.33-150400.4.40.1 * php7-devel-7.4.33-150400.4.40.1 * php7-fpm-debugsource-7.4.33-150400.4.40.1 * php7-gd-debuginfo-7.4.33-150400.4.40.1 * php7-dom-7.4.33-150400.4.40.1 * apache2-mod_php7-7.4.33-150400.4.40.1 * php7-fastcgi-7.4.33-150400.4.40.1 * php7-mbstring-7.4.33-150400.4.40.1 * php7-ctype-7.4.33-150400.4.40.1 * php7-phar-debuginfo-7.4.33-150400.4.40.1 * php7-sockets-7.4.33-150400.4.40.1 * php7-sysvmsg-7.4.33-150400.4.40.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * apache2-mod_php7-debuginfo-7.4.33-150400.4.40.1 * php7-debuginfo-7.4.33-150400.4.40.1 * php7-dom-debuginfo-7.4.33-150400.4.40.1 * php7-odbc-7.4.33-150400.4.40.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.40.1 * php7-pgsql-debuginfo-7.4.33-150400.4.40.1 * php7-xmlreader-7.4.33-150400.4.40.1 * php7-gd-7.4.33-150400.4.40.1 * php7-pcntl-7.4.33-150400.4.40.1 * php7-pdo-7.4.33-150400.4.40.1 * php7-json-debuginfo-7.4.33-150400.4.40.1 * php7-openssl-debuginfo-7.4.33-150400.4.40.1 * php7-sysvshm-7.4.33-150400.4.40.1 * php7-sqlite-7.4.33-150400.4.40.1 * php7-exif-debuginfo-7.4.33-150400.4.40.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.40.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.40.1 * php7-dba-7.4.33-150400.4.40.1 * php7-opcache-7.4.33-150400.4.40.1 * php7-cli-7.4.33-150400.4.40.1 * php7-ctype-debuginfo-7.4.33-150400.4.40.1 * php7-xmlwriter-7.4.33-150400.4.40.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.40.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.40.1 * php7-fpm-debuginfo-7.4.33-150400.4.40.1 * php7-snmp-7.4.33-150400.4.40.1 * php7-sqlite-debuginfo-7.4.33-150400.4.40.1 * php7-soap-7.4.33-150400.4.40.1 * php7-sodium-debuginfo-7.4.33-150400.4.40.1 * php7-fileinfo-7.4.33-150400.4.40.1 * php7-posix-debuginfo-7.4.33-150400.4.40.1 * php7-gettext-7.4.33-150400.4.40.1 * php7-tidy-debuginfo-7.4.33-150400.4.40.1 * php7-shmop-debuginfo-7.4.33-150400.4.40.1 * php7-enchant-debuginfo-7.4.33-150400.4.40.1 * php7-soap-debuginfo-7.4.33-150400.4.40.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.40.1 * php7-iconv-7.4.33-150400.4.40.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.40.1 * php7-opcache-debuginfo-7.4.33-150400.4.40.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.40.1 * php7-gettext-debuginfo-7.4.33-150400.4.40.1 * php7-calendar-debuginfo-7.4.33-150400.4.40.1 * php7-dba-debuginfo-7.4.33-150400.4.40.1 * php7-fpm-7.4.33-150400.4.40.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.40.1 * php7-curl-debuginfo-7.4.33-150400.4.40.1 * php7-enchant-7.4.33-150400.4.40.1 * php7-mysql-debuginfo-7.4.33-150400.4.40.1 * php7-bz2-debuginfo-7.4.33-150400.4.40.1 * php7-7.4.33-150400.4.40.1 * php7-gmp-7.4.33-150400.4.40.1 * php7-posix-7.4.33-150400.4.40.1 * php7-ftp-7.4.33-150400.4.40.1 * php7-zip-7.4.33-150400.4.40.1 * php7-readline-debuginfo-7.4.33-150400.4.40.1 * php7-snmp-debuginfo-7.4.33-150400.4.40.1 * php7-exif-7.4.33-150400.4.40.1 * php7-calendar-7.4.33-150400.4.40.1 * php7-sockets-debuginfo-7.4.33-150400.4.40.1 * php7-iconv-debuginfo-7.4.33-150400.4.40.1 * php7-shmop-7.4.33-150400.4.40.1 * php7-zlib-debuginfo-7.4.33-150400.4.40.1 * php7-readline-7.4.33-150400.4.40.1 * php7-sodium-7.4.33-150400.4.40.1 * php7-xsl-7.4.33-150400.4.40.1 * php7-bcmath-debuginfo-7.4.33-150400.4.40.1 * php7-gmp-debuginfo-7.4.33-150400.4.40.1 * php7-intl-debuginfo-7.4.33-150400.4.40.1 * php7-ftp-debuginfo-7.4.33-150400.4.40.1 * php7-fastcgi-debugsource-7.4.33-150400.4.40.1 * php7-bz2-7.4.33-150400.4.40.1 * php7-phar-7.4.33-150400.4.40.1 * php7-pdo-debuginfo-7.4.33-150400.4.40.1 * php7-odbc-debuginfo-7.4.33-150400.4.40.1 * php7-curl-7.4.33-150400.4.40.1 * php7-pcntl-debuginfo-7.4.33-150400.4.40.1 * php7-intl-7.4.33-150400.4.40.1 * php7-ldap-7.4.33-150400.4.40.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.40.1 * php7-xmlrpc-7.4.33-150400.4.40.1 * php7-cli-debuginfo-7.4.33-150400.4.40.1 * php7-tokenizer-7.4.33-150400.4.40.1 * php7-ldap-debuginfo-7.4.33-150400.4.40.1 * php7-zip-debuginfo-7.4.33-150400.4.40.1 * php7-debugsource-7.4.33-150400.4.40.1 * php7-bcmath-7.4.33-150400.4.40.1 * php7-json-7.4.33-150400.4.40.1 * php7-openssl-7.4.33-150400.4.40.1 * php7-tidy-7.4.33-150400.4.40.1 * php7-mysql-7.4.33-150400.4.40.1 * php7-xsl-debuginfo-7.4.33-150400.4.40.1 * php7-pgsql-7.4.33-150400.4.40.1 * php7-mbstring-debuginfo-7.4.33-150400.4.40.1 * php7-zlib-7.4.33-150400.4.40.1 * php7-sysvsem-7.4.33-150400.4.40.1 * php7-devel-7.4.33-150400.4.40.1 * php7-fpm-debugsource-7.4.33-150400.4.40.1 * php7-gd-debuginfo-7.4.33-150400.4.40.1 * php7-dom-7.4.33-150400.4.40.1 * apache2-mod_php7-7.4.33-150400.4.40.1 * php7-fastcgi-7.4.33-150400.4.40.1 * php7-mbstring-7.4.33-150400.4.40.1 * php7-ctype-7.4.33-150400.4.40.1 * php7-phar-debuginfo-7.4.33-150400.4.40.1 * php7-sockets-7.4.33-150400.4.40.1 * php7-sysvmsg-7.4.33-150400.4.40.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-mod_php7-debuginfo-7.4.33-150400.4.40.1 * php7-debuginfo-7.4.33-150400.4.40.1 * php7-dom-debuginfo-7.4.33-150400.4.40.1 * php7-odbc-7.4.33-150400.4.40.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.40.1 * php7-pgsql-debuginfo-7.4.33-150400.4.40.1 * php7-xmlreader-7.4.33-150400.4.40.1 * php7-gd-7.4.33-150400.4.40.1 * php7-pcntl-7.4.33-150400.4.40.1 * php7-pdo-7.4.33-150400.4.40.1 * php7-json-debuginfo-7.4.33-150400.4.40.1 * php7-openssl-debuginfo-7.4.33-150400.4.40.1 * php7-sysvshm-7.4.33-150400.4.40.1 * php7-sqlite-7.4.33-150400.4.40.1 * php7-exif-debuginfo-7.4.33-150400.4.40.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.40.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.40.1 * php7-dba-7.4.33-150400.4.40.1 * php7-opcache-7.4.33-150400.4.40.1 * php7-cli-7.4.33-150400.4.40.1 * php7-ctype-debuginfo-7.4.33-150400.4.40.1 * php7-xmlwriter-7.4.33-150400.4.40.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.40.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.40.1 * php7-fpm-debuginfo-7.4.33-150400.4.40.1 * php7-snmp-7.4.33-150400.4.40.1 * php7-sqlite-debuginfo-7.4.33-150400.4.40.1 * php7-soap-7.4.33-150400.4.40.1 * php7-sodium-debuginfo-7.4.33-150400.4.40.1 * php7-fileinfo-7.4.33-150400.4.40.1 * php7-posix-debuginfo-7.4.33-150400.4.40.1 * php7-gettext-7.4.33-150400.4.40.1 * php7-tidy-debuginfo-7.4.33-150400.4.40.1 * php7-shmop-debuginfo-7.4.33-150400.4.40.1 * php7-enchant-debuginfo-7.4.33-150400.4.40.1 * php7-soap-debuginfo-7.4.33-150400.4.40.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.40.1 * php7-iconv-7.4.33-150400.4.40.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.40.1 * php7-opcache-debuginfo-7.4.33-150400.4.40.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.40.1 * php7-gettext-debuginfo-7.4.33-150400.4.40.1 * php7-calendar-debuginfo-7.4.33-150400.4.40.1 * php7-dba-debuginfo-7.4.33-150400.4.40.1 * php7-fpm-7.4.33-150400.4.40.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.40.1 * php7-curl-debuginfo-7.4.33-150400.4.40.1 * php7-enchant-7.4.33-150400.4.40.1 * php7-mysql-debuginfo-7.4.33-150400.4.40.1 * php7-bz2-debuginfo-7.4.33-150400.4.40.1 * php7-7.4.33-150400.4.40.1 * php7-gmp-7.4.33-150400.4.40.1 * php7-posix-7.4.33-150400.4.40.1 * php7-ftp-7.4.33-150400.4.40.1 * php7-zip-7.4.33-150400.4.40.1 * php7-readline-debuginfo-7.4.33-150400.4.40.1 * php7-snmp-debuginfo-7.4.33-150400.4.40.1 * php7-exif-7.4.33-150400.4.40.1 * php7-calendar-7.4.33-150400.4.40.1 * php7-sockets-debuginfo-7.4.33-150400.4.40.1 * php7-iconv-debuginfo-7.4.33-150400.4.40.1 * php7-shmop-7.4.33-150400.4.40.1 * php7-zlib-debuginfo-7.4.33-150400.4.40.1 * php7-readline-7.4.33-150400.4.40.1 * php7-sodium-7.4.33-150400.4.40.1 * php7-xsl-7.4.33-150400.4.40.1 * php7-bcmath-debuginfo-7.4.33-150400.4.40.1 * php7-gmp-debuginfo-7.4.33-150400.4.40.1 * php7-intl-debuginfo-7.4.33-150400.4.40.1 * php7-ftp-debuginfo-7.4.33-150400.4.40.1 * php7-fastcgi-debugsource-7.4.33-150400.4.40.1 * php7-bz2-7.4.33-150400.4.40.1 * php7-phar-7.4.33-150400.4.40.1 * php7-pdo-debuginfo-7.4.33-150400.4.40.1 * php7-odbc-debuginfo-7.4.33-150400.4.40.1 * php7-curl-7.4.33-150400.4.40.1 * php7-pcntl-debuginfo-7.4.33-150400.4.40.1 * php7-intl-7.4.33-150400.4.40.1 * php7-ldap-7.4.33-150400.4.40.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.40.1 * php7-xmlrpc-7.4.33-150400.4.40.1 * php7-cli-debuginfo-7.4.33-150400.4.40.1 * php7-tokenizer-7.4.33-150400.4.40.1 * php7-ldap-debuginfo-7.4.33-150400.4.40.1 * php7-zip-debuginfo-7.4.33-150400.4.40.1 * php7-debugsource-7.4.33-150400.4.40.1 * php7-bcmath-7.4.33-150400.4.40.1 * php7-json-7.4.33-150400.4.40.1 * php7-openssl-7.4.33-150400.4.40.1 * php7-tidy-7.4.33-150400.4.40.1 * php7-mysql-7.4.33-150400.4.40.1 * php7-xsl-debuginfo-7.4.33-150400.4.40.1 * php7-pgsql-7.4.33-150400.4.40.1 * php7-mbstring-debuginfo-7.4.33-150400.4.40.1 * php7-zlib-7.4.33-150400.4.40.1 * php7-sysvsem-7.4.33-150400.4.40.1 * php7-devel-7.4.33-150400.4.40.1 * php7-fpm-debugsource-7.4.33-150400.4.40.1 * php7-gd-debuginfo-7.4.33-150400.4.40.1 * php7-dom-7.4.33-150400.4.40.1 * apache2-mod_php7-7.4.33-150400.4.40.1 * php7-fastcgi-7.4.33-150400.4.40.1 * php7-mbstring-7.4.33-150400.4.40.1 * php7-ctype-7.4.33-150400.4.40.1 * php7-phar-debuginfo-7.4.33-150400.4.40.1 * php7-sockets-7.4.33-150400.4.40.1 * php7-sysvmsg-7.4.33-150400.4.40.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * php7-embed-debuginfo-7.4.33-150400.4.40.1 * php7-embed-debugsource-7.4.33-150400.4.40.1 * php7-embed-7.4.33-150400.4.40.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * php7-embed-debuginfo-7.4.33-150400.4.40.1 * php7-embed-debugsource-7.4.33-150400.4.40.1 * php7-embed-7.4.33-150400.4.40.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8925.html * https://www.suse.com/security/cve/CVE-2024-8927.html * https://www.suse.com/security/cve/CVE-2024-9026.html * https://bugzilla.suse.com/show_bug.cgi?id=1231358 * https://bugzilla.suse.com/show_bug.cgi?id=1231360 * https://bugzilla.suse.com/show_bug.cgi?id=1231382 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 16:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 16:30:15 -0000 Subject: SUSE-SU-2024:3732-1: moderate: Security update for php74 Message-ID: <172926901578.6514.12183253357091361436@smelt2.prg2.suse.org> # Security update for php74 Announcement ID: SUSE-SU-2024:3732-1 Release Date: 2024-10-18T14:47:16Z Rating: moderate References: * bsc#1231358 * bsc#1231360 * bsc#1231382 Cross-References: * CVE-2024-8925 * CVE-2024-8927 * CVE-2024-9026 CVSS scores: * CVE-2024-8925 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8925 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-8925 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-8925 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-8927 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-8927 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-8927 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9026 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9026 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-9026 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-9026 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * Web and Scripting Module 12 An update that solves three vulnerabilities can now be installed. ## Description: This update for php74 fixes the following issues: * CVE-2024-8925: Fixed erroneous parsing of multipart form data in HTTP POST requests leads to legitimate data not being processed (bsc#1231360) * CVE-2024-8927: Fixed cgi.force_redirect configuration is bypassable due to an environment variable collision (bsc#1231358) * CVE-2024-9026: Fixed pollution of worker output logs in PHP-FPM (bsc#1231382) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Web and Scripting Module 12 zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2024-3732=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-3732=1 ## Package List: * Web and Scripting Module 12 (aarch64 ppc64le s390x x86_64) * php74-mysql-7.4.33-1.71.1 * php74-pdo-7.4.33-1.71.1 * php74-enchant-debuginfo-7.4.33-1.71.1 * php74-pdo-debuginfo-7.4.33-1.71.1 * php74-pcntl-7.4.33-1.71.1 * php74-tidy-debuginfo-7.4.33-1.71.1 * php74-intl-7.4.33-1.71.1 * php74-zlib-7.4.33-1.71.1 * php74-sysvmsg-7.4.33-1.71.1 * php74-sqlite-debuginfo-7.4.33-1.71.1 * php74-shmop-debuginfo-7.4.33-1.71.1 * php74-sysvsem-7.4.33-1.71.1 * php74-calendar-debuginfo-7.4.33-1.71.1 * php74-odbc-debuginfo-7.4.33-1.71.1 * php74-opcache-7.4.33-1.71.1 * php74-xmlrpc-7.4.33-1.71.1 * php74-dom-7.4.33-1.71.1 * php74-fastcgi-7.4.33-1.71.1 * php74-curl-debuginfo-7.4.33-1.71.1 * php74-readline-7.4.33-1.71.1 * php74-fileinfo-7.4.33-1.71.1 * php74-gd-debuginfo-7.4.33-1.71.1 * php74-openssl-debuginfo-7.4.33-1.71.1 * php74-sockets-7.4.33-1.71.1 * php74-7.4.33-1.71.1 * apache2-mod_php74-7.4.33-1.71.1 * php74-phar-7.4.33-1.71.1 * php74-gmp-debuginfo-7.4.33-1.71.1 * php74-sodium-debuginfo-7.4.33-1.71.1 * php74-opcache-debuginfo-7.4.33-1.71.1 * php74-enchant-7.4.33-1.71.1 * php74-intl-debuginfo-7.4.33-1.71.1 * php74-zip-debuginfo-7.4.33-1.71.1 * php74-bz2-debuginfo-7.4.33-1.71.1 * php74-xsl-7.4.33-1.71.1 * php74-soap-7.4.33-1.71.1 * php74-ldap-7.4.33-1.71.1 * php74-xmlrpc-debuginfo-7.4.33-1.71.1 * php74-xmlreader-debuginfo-7.4.33-1.71.1 * php74-gmp-7.4.33-1.71.1 * php74-xmlwriter-7.4.33-1.71.1 * php74-sysvmsg-debuginfo-7.4.33-1.71.1 * php74-dba-7.4.33-1.71.1 * php74-tokenizer-7.4.33-1.71.1 * php74-posix-debuginfo-7.4.33-1.71.1 * php74-gettext-debuginfo-7.4.33-1.71.1 * php74-readline-debuginfo-7.4.33-1.71.1 * php74-sockets-debuginfo-7.4.33-1.71.1 * php74-pgsql-debuginfo-7.4.33-1.71.1 * php74-gd-7.4.33-1.71.1 * php74-ftp-7.4.33-1.71.1 * php74-debugsource-7.4.33-1.71.1 * php74-json-debuginfo-7.4.33-1.71.1 * php74-json-7.4.33-1.71.1 * php74-openssl-7.4.33-1.71.1 * php74-bcmath-7.4.33-1.71.1 * php74-mbstring-debuginfo-7.4.33-1.71.1 * php74-shmop-7.4.33-1.71.1 * php74-soap-debuginfo-7.4.33-1.71.1 * php74-odbc-7.4.33-1.71.1 * php74-ftp-debuginfo-7.4.33-1.71.1 * php74-xmlreader-7.4.33-1.71.1 * php74-sqlite-7.4.33-1.71.1 * php74-dom-debuginfo-7.4.33-1.71.1 * php74-sysvsem-debuginfo-7.4.33-1.71.1 * php74-bz2-7.4.33-1.71.1 * php74-iconv-debuginfo-7.4.33-1.71.1 * php74-calendar-7.4.33-1.71.1 * php74-fpm-debuginfo-7.4.33-1.71.1 * php74-zip-7.4.33-1.71.1 * php74-tokenizer-debuginfo-7.4.33-1.71.1 * php74-sysvshm-7.4.33-1.71.1 * php74-posix-7.4.33-1.71.1 * php74-exif-debuginfo-7.4.33-1.71.1 * php74-snmp-7.4.33-1.71.1 * php74-debuginfo-7.4.33-1.71.1 * php74-iconv-7.4.33-1.71.1 * php74-tidy-7.4.33-1.71.1 * php74-ctype-debuginfo-7.4.33-1.71.1 * php74-gettext-7.4.33-1.71.1 * php74-sodium-7.4.33-1.71.1 * php74-fastcgi-debuginfo-7.4.33-1.71.1 * php74-zlib-debuginfo-7.4.33-1.71.1 * php74-mysql-debuginfo-7.4.33-1.71.1 * php74-dba-debuginfo-7.4.33-1.71.1 * php74-phar-debuginfo-7.4.33-1.71.1 * php74-bcmath-debuginfo-7.4.33-1.71.1 * php74-xsl-debuginfo-7.4.33-1.71.1 * php74-snmp-debuginfo-7.4.33-1.71.1 * php74-fpm-7.4.33-1.71.1 * php74-ldap-debuginfo-7.4.33-1.71.1 * php74-mbstring-7.4.33-1.71.1 * php74-curl-7.4.33-1.71.1 * php74-ctype-7.4.33-1.71.1 * php74-pcntl-debuginfo-7.4.33-1.71.1 * php74-pgsql-7.4.33-1.71.1 * apache2-mod_php74-debuginfo-7.4.33-1.71.1 * php74-exif-7.4.33-1.71.1 * php74-xmlwriter-debuginfo-7.4.33-1.71.1 * php74-fileinfo-debuginfo-7.4.33-1.71.1 * php74-sysvshm-debuginfo-7.4.33-1.71.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * php74-debugsource-7.4.33-1.71.1 * php74-devel-7.4.33-1.71.1 * php74-debuginfo-7.4.33-1.71.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8925.html * https://www.suse.com/security/cve/CVE-2024-8927.html * https://www.suse.com/security/cve/CVE-2024-9026.html * https://bugzilla.suse.com/show_bug.cgi?id=1231358 * https://bugzilla.suse.com/show_bug.cgi?id=1231360 * https://bugzilla.suse.com/show_bug.cgi?id=1231382 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 16:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 16:30:19 -0000 Subject: SUSE-SU-2024:3731-1: important: Security update for MozillaThunderbird Message-ID: <172926901906.6514.12688784727048729900@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2024:3731-1 Release Date: 2024-10-18T14:29:54Z Rating: important References: * bsc#1231413 Cross-References: * CVE-2024-9680 CVSS scores: * CVE-2024-9680 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9680 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9680 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: Update to Mozilla Thunderbird 128.3.1 (MFSA 2024-52, bsc#1231413): * CVE-2024-9680: Fixed use-after-free in Animation timeline (bmo#1923344) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3731=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3731=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3731=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3731=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3731=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3731=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3731=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-other-128.3.1-150200.8.185.1 * MozillaThunderbird-debugsource-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-common-128.3.1-150200.8.185.1 * MozillaThunderbird-debuginfo-128.3.1-150200.8.185.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-other-128.3.1-150200.8.185.1 * MozillaThunderbird-debugsource-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-common-128.3.1-150200.8.185.1 * MozillaThunderbird-debuginfo-128.3.1-150200.8.185.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * MozillaThunderbird-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-other-128.3.1-150200.8.185.1 * MozillaThunderbird-debugsource-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-common-128.3.1-150200.8.185.1 * MozillaThunderbird-debuginfo-128.3.1-150200.8.185.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-other-128.3.1-150200.8.185.1 * MozillaThunderbird-debugsource-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-common-128.3.1-150200.8.185.1 * MozillaThunderbird-debuginfo-128.3.1-150200.8.185.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * MozillaThunderbird-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-other-128.3.1-150200.8.185.1 * MozillaThunderbird-debugsource-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-common-128.3.1-150200.8.185.1 * MozillaThunderbird-debuginfo-128.3.1-150200.8.185.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * MozillaThunderbird-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-other-128.3.1-150200.8.185.1 * MozillaThunderbird-debugsource-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-common-128.3.1-150200.8.185.1 * MozillaThunderbird-debuginfo-128.3.1-150200.8.185.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-other-128.3.1-150200.8.185.1 * MozillaThunderbird-debugsource-128.3.1-150200.8.185.1 * MozillaThunderbird-translations-common-128.3.1-150200.8.185.1 * MozillaThunderbird-debuginfo-128.3.1-150200.8.185.1 ## References: * https://www.suse.com/security/cve/CVE-2024-9680.html * https://bugzilla.suse.com/show_bug.cgi?id=1231413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 16:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 16:30:22 -0000 Subject: SUSE-RU-2024:3730-1: important: Recommended update for libzypp Message-ID: <172926902264.6514.3868908686063684411@smelt2.prg2.suse.org> # Recommended update for libzypp Announcement ID: SUSE-RU-2024:3730-1 Release Date: 2024-10-18T13:35:23Z Rating: important References: * bsc#1230912 * bsc#1231043 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has two fixes can now be installed. ## Description: This update for libzypp fixes the following issues: * Send unescaped colons in header values. According to the STOMP protocol, it would be correct to escape colon here but the practice broke plugin receivers that didn't expect this. The incompatiblity affected customers who were running spacewalk-repo-sync and experienced issues when accessing the cloud URL. [bsc#1231043] * Fix hang in curl code with no network connection. [bsc#1230912] ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP2 zypper in -t patch SUSE-SLE-INSTALLER-15-SP2-2024-3730=1 * SUSE Linux Enterprise Server 15 SP3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP3-2024-3730=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3730=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3730=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3730=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3730=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3730=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3730=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3730=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3730=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3730=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3730=1 ## Package List: * SUSE Linux Enterprise Server 15 SP2 (aarch64 ppc64le s390x x86_64) * libzypp-17.35.12-150200.129.1 * SUSE Linux Enterprise Server 15 SP3 (aarch64 ppc64le s390x x86_64) * libzypp-17.35.12-150200.129.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libzypp-debuginfo-17.35.12-150200.129.1 * libzypp-devel-17.35.12-150200.129.1 * libzypp-17.35.12-150200.129.1 * libzypp-debugsource-17.35.12-150200.129.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libzypp-debuginfo-17.35.12-150200.129.1 * libzypp-devel-17.35.12-150200.129.1 * libzypp-17.35.12-150200.129.1 * libzypp-debugsource-17.35.12-150200.129.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libzypp-debuginfo-17.35.12-150200.129.1 * libzypp-devel-17.35.12-150200.129.1 * libzypp-17.35.12-150200.129.1 * libzypp-debugsource-17.35.12-150200.129.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libzypp-debuginfo-17.35.12-150200.129.1 * libzypp-devel-17.35.12-150200.129.1 * libzypp-17.35.12-150200.129.1 * libzypp-debugsource-17.35.12-150200.129.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libzypp-debuginfo-17.35.12-150200.129.1 * libzypp-devel-17.35.12-150200.129.1 * libzypp-17.35.12-150200.129.1 * libzypp-debugsource-17.35.12-150200.129.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libzypp-debuginfo-17.35.12-150200.129.1 * libzypp-devel-17.35.12-150200.129.1 * libzypp-17.35.12-150200.129.1 * libzypp-debugsource-17.35.12-150200.129.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libzypp-debuginfo-17.35.12-150200.129.1 * libzypp-devel-17.35.12-150200.129.1 * libzypp-17.35.12-150200.129.1 * libzypp-debugsource-17.35.12-150200.129.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libzypp-debuginfo-17.35.12-150200.129.1 * libzypp-17.35.12-150200.129.1 * libzypp-debugsource-17.35.12-150200.129.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libzypp-debuginfo-17.35.12-150200.129.1 * libzypp-17.35.12-150200.129.1 * libzypp-debugsource-17.35.12-150200.129.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libzypp-debuginfo-17.35.12-150200.129.1 * libzypp-17.35.12-150200.129.1 * libzypp-debugsource-17.35.12-150200.129.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230912 * https://bugzilla.suse.com/show_bug.cgi?id=1231043 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 16:30:26 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 16:30:26 -0000 Subject: SUSE-SU-2024:3729-1: moderate: Security update for php8 Message-ID: <172926902634.6514.4366279514695011072@smelt2.prg2.suse.org> # Security update for php8 Announcement ID: SUSE-SU-2024:3729-1 Release Date: 2024-10-18T13:23:01Z Rating: moderate References: * bsc#1231358 * bsc#1231360 * bsc#1231382 Cross-References: * CVE-2024-8925 * CVE-2024-8927 * CVE-2024-9026 CVSS scores: * CVE-2024-8925 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8925 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-8925 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-8925 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-8927 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-8927 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-8927 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9026 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9026 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-9026 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-9026 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * Web and Scripting Module 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for php8 fixes the following issues: Update to php 8.2.24: * CVE-2024-8925: Fixed erroneous parsing of multipart form data in HTTP POST requests leads to legitimate data not being processed (bsc#1231360) * CVE-2024-8927: Fixed cgi.force_redirect configuration is bypassable due to an environment variable collision (bsc#1231358) * CVE-2024-9026: Fixed pollution of worker output logs in PHP-FPM (bsc#1231382) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2024-3729=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3729=1 openSUSE-SLE-15.6-2024-3729=1 ## Package List: * Web and Scripting Module 15-SP6 (aarch64 ppc64le s390x x86_64) * php8-pgsql-debuginfo-8.2.24-150600.3.6.1 * php8-opcache-8.2.24-150600.3.6.1 * php8-ldap-8.2.24-150600.3.6.1 * php8-fpm-debuginfo-8.2.24-150600.3.6.1 * php8-sysvshm-debuginfo-8.2.24-150600.3.6.1 * php8-tidy-8.2.24-150600.3.6.1 * php8-iconv-8.2.24-150600.3.6.1 * php8-fpm-debugsource-8.2.24-150600.3.6.1 * php8-tokenizer-debuginfo-8.2.24-150600.3.6.1 * php8-embed-8.2.24-150600.3.6.1 * php8-odbc-8.2.24-150600.3.6.1 * php8-readline-debuginfo-8.2.24-150600.3.6.1 * php8-dom-debuginfo-8.2.24-150600.3.6.1 * php8-zip-8.2.24-150600.3.6.1 * php8-devel-8.2.24-150600.3.6.1 * php8-sqlite-8.2.24-150600.3.6.1 * php8-embed-debuginfo-8.2.24-150600.3.6.1 * php8-gettext-debuginfo-8.2.24-150600.3.6.1 * php8-sysvsem-debuginfo-8.2.24-150600.3.6.1 * php8-fpm-8.2.24-150600.3.6.1 * php8-pdo-8.2.24-150600.3.6.1 * php8-sysvsem-8.2.24-150600.3.6.1 * php8-snmp-8.2.24-150600.3.6.1 * apache2-mod_php8-debuginfo-8.2.24-150600.3.6.1 * php8-sqlite-debuginfo-8.2.24-150600.3.6.1 * php8-cli-8.2.24-150600.3.6.1 * php8-gmp-debuginfo-8.2.24-150600.3.6.1 * php8-enchant-debuginfo-8.2.24-150600.3.6.1 * php8-sysvshm-8.2.24-150600.3.6.1 * php8-sodium-debuginfo-8.2.24-150600.3.6.1 * php8-bcmath-8.2.24-150600.3.6.1 * php8-mysql-debuginfo-8.2.24-150600.3.6.1 * php8-zlib-8.2.24-150600.3.6.1 * php8-posix-debuginfo-8.2.24-150600.3.6.1 * php8-pcntl-8.2.24-150600.3.6.1 * php8-xmlreader-debuginfo-8.2.24-150600.3.6.1 * php8-shmop-debuginfo-8.2.24-150600.3.6.1 * php8-soap-debuginfo-8.2.24-150600.3.6.1 * php8-tidy-debuginfo-8.2.24-150600.3.6.1 * php8-enchant-8.2.24-150600.3.6.1 * php8-mbstring-8.2.24-150600.3.6.1 * php8-sysvmsg-debuginfo-8.2.24-150600.3.6.1 * php8-intl-debuginfo-8.2.24-150600.3.6.1 * php8-dba-8.2.24-150600.3.6.1 * php8-curl-8.2.24-150600.3.6.1 * php8-fileinfo-8.2.24-150600.3.6.1 * php8-ctype-8.2.24-150600.3.6.1 * php8-8.2.24-150600.3.6.1 * php8-ldap-debuginfo-8.2.24-150600.3.6.1 * php8-sockets-8.2.24-150600.3.6.1 * php8-soap-8.2.24-150600.3.6.1 * php8-readline-8.2.24-150600.3.6.1 * php8-pgsql-8.2.24-150600.3.6.1 * php8-ftp-8.2.24-150600.3.6.1 * php8-sodium-8.2.24-150600.3.6.1 * php8-exif-debuginfo-8.2.24-150600.3.6.1 * php8-xmlwriter-debuginfo-8.2.24-150600.3.6.1 * php8-xmlwriter-8.2.24-150600.3.6.1 * php8-curl-debuginfo-8.2.24-150600.3.6.1 * php8-gmp-8.2.24-150600.3.6.1 * php8-zip-debuginfo-8.2.24-150600.3.6.1 * php8-calendar-debuginfo-8.2.24-150600.3.6.1 * php8-debugsource-8.2.24-150600.3.6.1 * php8-bz2-8.2.24-150600.3.6.1 * php8-shmop-8.2.24-150600.3.6.1 * php8-gd-8.2.24-150600.3.6.1 * php8-mysql-8.2.24-150600.3.6.1 * php8-opcache-debuginfo-8.2.24-150600.3.6.1 * php8-xmlreader-8.2.24-150600.3.6.1 * php8-xsl-8.2.24-150600.3.6.1 * php8-odbc-debuginfo-8.2.24-150600.3.6.1 * php8-debuginfo-8.2.24-150600.3.6.1 * php8-bz2-debuginfo-8.2.24-150600.3.6.1 * php8-fastcgi-debuginfo-8.2.24-150600.3.6.1 * php8-bcmath-debuginfo-8.2.24-150600.3.6.1 * php8-test-8.2.24-150600.3.6.1 * php8-embed-debugsource-8.2.24-150600.3.6.1 * php8-gd-debuginfo-8.2.24-150600.3.6.1 * php8-snmp-debuginfo-8.2.24-150600.3.6.1 * php8-xsl-debuginfo-8.2.24-150600.3.6.1 * php8-phar-debuginfo-8.2.24-150600.3.6.1 * apache2-mod_php8-8.2.24-150600.3.6.1 * php8-fastcgi-debugsource-8.2.24-150600.3.6.1 * php8-iconv-debuginfo-8.2.24-150600.3.6.1 * php8-cli-debuginfo-8.2.24-150600.3.6.1 * php8-ftp-debuginfo-8.2.24-150600.3.6.1 * php8-openssl-8.2.24-150600.3.6.1 * php8-fileinfo-debuginfo-8.2.24-150600.3.6.1 * php8-sockets-debuginfo-8.2.24-150600.3.6.1 * php8-dom-8.2.24-150600.3.6.1 * php8-phar-8.2.24-150600.3.6.1 * php8-pcntl-debuginfo-8.2.24-150600.3.6.1 * php8-exif-8.2.24-150600.3.6.1 * php8-ctype-debuginfo-8.2.24-150600.3.6.1 * php8-sysvmsg-8.2.24-150600.3.6.1 * php8-openssl-debuginfo-8.2.24-150600.3.6.1 * php8-mbstring-debuginfo-8.2.24-150600.3.6.1 * php8-gettext-8.2.24-150600.3.6.1 * php8-intl-8.2.24-150600.3.6.1 * php8-zlib-debuginfo-8.2.24-150600.3.6.1 * php8-dba-debuginfo-8.2.24-150600.3.6.1 * php8-tokenizer-8.2.24-150600.3.6.1 * php8-calendar-8.2.24-150600.3.6.1 * apache2-mod_php8-debugsource-8.2.24-150600.3.6.1 * php8-posix-8.2.24-150600.3.6.1 * php8-pdo-debuginfo-8.2.24-150600.3.6.1 * php8-fastcgi-8.2.24-150600.3.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * php8-pgsql-debuginfo-8.2.24-150600.3.6.1 * php8-ffi-8.2.24-150600.3.6.1 * php8-opcache-8.2.24-150600.3.6.1 * php8-ldap-8.2.24-150600.3.6.1 * php8-fpm-debuginfo-8.2.24-150600.3.6.1 * php8-sysvshm-debuginfo-8.2.24-150600.3.6.1 * php8-tidy-8.2.24-150600.3.6.1 * php8-iconv-8.2.24-150600.3.6.1 * php8-fpm-debugsource-8.2.24-150600.3.6.1 * php8-tokenizer-debuginfo-8.2.24-150600.3.6.1 * php8-odbc-8.2.24-150600.3.6.1 * php8-embed-8.2.24-150600.3.6.1 * php8-readline-debuginfo-8.2.24-150600.3.6.1 * php8-dom-debuginfo-8.2.24-150600.3.6.1 * php8-zip-8.2.24-150600.3.6.1 * php8-devel-8.2.24-150600.3.6.1 * php8-sqlite-8.2.24-150600.3.6.1 * php8-embed-debuginfo-8.2.24-150600.3.6.1 * php8-gettext-debuginfo-8.2.24-150600.3.6.1 * php8-sysvsem-debuginfo-8.2.24-150600.3.6.1 * php8-fpm-8.2.24-150600.3.6.1 * php8-pdo-8.2.24-150600.3.6.1 * php8-sysvsem-8.2.24-150600.3.6.1 * php8-snmp-8.2.24-150600.3.6.1 * apache2-mod_php8-debuginfo-8.2.24-150600.3.6.1 * php8-sqlite-debuginfo-8.2.24-150600.3.6.1 * php8-cli-8.2.24-150600.3.6.1 * php8-gmp-debuginfo-8.2.24-150600.3.6.1 * php8-enchant-debuginfo-8.2.24-150600.3.6.1 * php8-sysvshm-8.2.24-150600.3.6.1 * php8-sodium-debuginfo-8.2.24-150600.3.6.1 * php8-bcmath-8.2.24-150600.3.6.1 * php8-mysql-debuginfo-8.2.24-150600.3.6.1 * php8-zlib-8.2.24-150600.3.6.1 * php8-posix-debuginfo-8.2.24-150600.3.6.1 * php8-pcntl-8.2.24-150600.3.6.1 * php8-xmlreader-debuginfo-8.2.24-150600.3.6.1 * php8-shmop-debuginfo-8.2.24-150600.3.6.1 * php8-soap-debuginfo-8.2.24-150600.3.6.1 * php8-tidy-debuginfo-8.2.24-150600.3.6.1 * php8-enchant-8.2.24-150600.3.6.1 * php8-mbstring-8.2.24-150600.3.6.1 * php8-sysvmsg-debuginfo-8.2.24-150600.3.6.1 * php8-intl-debuginfo-8.2.24-150600.3.6.1 * php8-dba-8.2.24-150600.3.6.1 * php8-curl-8.2.24-150600.3.6.1 * php8-fileinfo-8.2.24-150600.3.6.1 * php8-ctype-8.2.24-150600.3.6.1 * php8-8.2.24-150600.3.6.1 * php8-ldap-debuginfo-8.2.24-150600.3.6.1 * php8-sockets-8.2.24-150600.3.6.1 * php8-soap-8.2.24-150600.3.6.1 * php8-readline-8.2.24-150600.3.6.1 * php8-pgsql-8.2.24-150600.3.6.1 * php8-ftp-8.2.24-150600.3.6.1 * php8-sodium-8.2.24-150600.3.6.1 * php8-exif-debuginfo-8.2.24-150600.3.6.1 * php8-xmlwriter-debuginfo-8.2.24-150600.3.6.1 * php8-xmlwriter-8.2.24-150600.3.6.1 * php8-curl-debuginfo-8.2.24-150600.3.6.1 * php8-gmp-8.2.24-150600.3.6.1 * php8-zip-debuginfo-8.2.24-150600.3.6.1 * php8-calendar-debuginfo-8.2.24-150600.3.6.1 * php8-debugsource-8.2.24-150600.3.6.1 * php8-bz2-8.2.24-150600.3.6.1 * php8-shmop-8.2.24-150600.3.6.1 * php8-gd-8.2.24-150600.3.6.1 * php8-mysql-8.2.24-150600.3.6.1 * php8-opcache-debuginfo-8.2.24-150600.3.6.1 * php8-xmlreader-8.2.24-150600.3.6.1 * php8-xsl-8.2.24-150600.3.6.1 * php8-odbc-debuginfo-8.2.24-150600.3.6.1 * php8-debuginfo-8.2.24-150600.3.6.1 * php8-bz2-debuginfo-8.2.24-150600.3.6.1 * php8-fastcgi-debuginfo-8.2.24-150600.3.6.1 * php8-bcmath-debuginfo-8.2.24-150600.3.6.1 * php8-test-8.2.24-150600.3.6.1 * php8-ffi-debuginfo-8.2.24-150600.3.6.1 * php8-embed-debugsource-8.2.24-150600.3.6.1 * php8-gd-debuginfo-8.2.24-150600.3.6.1 * php8-snmp-debuginfo-8.2.24-150600.3.6.1 * php8-xsl-debuginfo-8.2.24-150600.3.6.1 * php8-phar-debuginfo-8.2.24-150600.3.6.1 * apache2-mod_php8-8.2.24-150600.3.6.1 * php8-iconv-debuginfo-8.2.24-150600.3.6.1 * php8-fastcgi-debugsource-8.2.24-150600.3.6.1 * php8-cli-debuginfo-8.2.24-150600.3.6.1 * php8-ftp-debuginfo-8.2.24-150600.3.6.1 * php8-openssl-8.2.24-150600.3.6.1 * php8-fileinfo-debuginfo-8.2.24-150600.3.6.1 * php8-sockets-debuginfo-8.2.24-150600.3.6.1 * php8-dom-8.2.24-150600.3.6.1 * php8-phar-8.2.24-150600.3.6.1 * php8-pcntl-debuginfo-8.2.24-150600.3.6.1 * php8-exif-8.2.24-150600.3.6.1 * php8-ctype-debuginfo-8.2.24-150600.3.6.1 * php8-sysvmsg-8.2.24-150600.3.6.1 * php8-openssl-debuginfo-8.2.24-150600.3.6.1 * php8-mbstring-debuginfo-8.2.24-150600.3.6.1 * php8-gettext-8.2.24-150600.3.6.1 * php8-intl-8.2.24-150600.3.6.1 * php8-zlib-debuginfo-8.2.24-150600.3.6.1 * php8-dba-debuginfo-8.2.24-150600.3.6.1 * php8-tokenizer-8.2.24-150600.3.6.1 * php8-calendar-8.2.24-150600.3.6.1 * php8-posix-8.2.24-150600.3.6.1 * apache2-mod_php8-debugsource-8.2.24-150600.3.6.1 * php8-pdo-debuginfo-8.2.24-150600.3.6.1 * php8-fastcgi-8.2.24-150600.3.6.1 * openSUSE Leap 15.6 (noarch) * php8-fpm-apache-8.2.24-150600.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8925.html * https://www.suse.com/security/cve/CVE-2024-8927.html * https://www.suse.com/security/cve/CVE-2024-9026.html * https://bugzilla.suse.com/show_bug.cgi?id=1231358 * https://bugzilla.suse.com/show_bug.cgi?id=1231360 * https://bugzilla.suse.com/show_bug.cgi?id=1231382 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 16:30:28 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 16:30:28 -0000 Subject: SUSE-SU-2024:3728-1: moderate: Security update for buildah Message-ID: <172926902880.6514.13308946638363399135@smelt2.prg2.suse.org> # Security update for buildah Announcement ID: SUSE-SU-2024:3728-1 Release Date: 2024-10-18T13:15:57Z Rating: moderate References: * bsc#1231499 Cross-References: * CVE-2024-9675 CVSS scores: * CVE-2024-9675 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2024-9675 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-9675 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * Containers Module 15-SP5 * Containers Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for buildah fixes the following issues: * CVE-2024-9675: Fixed arbitrary cache directory mount (bsc#1231499) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3728=1 openSUSE-SLE-15.5-2024-3728=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3728=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3728=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3728=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * buildah-1.35.4-150500.3.16.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * buildah-1.35.4-150500.3.16.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * buildah-1.35.4-150500.3.16.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * buildah-1.35.4-150500.3.16.1 ## References: * https://www.suse.com/security/cve/CVE-2024-9675.html * https://bugzilla.suse.com/show_bug.cgi?id=1231499 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 18 16:30:31 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 18 Oct 2024 16:30:31 -0000 Subject: SUSE-RU-2024:3727-1: important: Recommended update for libzypp Message-ID: <172926903191.6514.16694935267383481742@smelt2.prg2.suse.org> # Recommended update for libzypp Announcement ID: SUSE-RU-2024:3727-1 Release Date: 2024-10-18T13:04:52Z Rating: important References: * bsc#1230912 * bsc#1231043 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for libzypp fixes the following issues: * Send unescaped colons in header values. According to the STOMP protocol, it would be correct to escape colon here but the practice broke plugin receivers that didn't expect this. The incompatiblity affected customers who were running spacewalk-repo-sync and experienced issues when accessing the cloud URL. [bsc#1231043] * Fix hang in curl code with no network connection. [bsc#1230912] ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3727=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3727=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3727=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3727=1 SUSE- SLE-INSTALLER-15-SP4-2024-3727=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3727=1 SUSE-SLE- INSTALLER-15-SP4-2024-3727=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3727=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3727=1 SUSE-SLE-Product-SUSE- Manager-Retail-Branch-Server-4.3-2024-3727=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3727=1 SUSE- SLE-INSTALLER-15-SP4-2024-3727=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3727=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3727=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3727=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3727=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3727=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3727=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3727=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3727=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 * libzypp-devel-17.35.12-150400.3.93.1 * libzypp-devel-doc-17.35.12-150400.3.93.1 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libzypp-17.35.12-150400.3.93.1 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libzypp-17.35.12-150400.3.93.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-devel-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-devel-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libzypp-17.35.12-150400.3.93.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-devel-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 * SUSE Manager Proxy 4.3 (x86_64) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-devel-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-devel-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-devel-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-devel-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libzypp-debuginfo-17.35.12-150400.3.93.1 * libzypp-devel-17.35.12-150400.3.93.1 * libzypp-17.35.12-150400.3.93.1 * libzypp-debugsource-17.35.12-150400.3.93.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230912 * https://bugzilla.suse.com/show_bug.cgi?id=1231043 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 21 08:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 21 Oct 2024 08:30:06 -0000 Subject: SUSE-RU-2024:3736-1: moderate: Recommended update for crmsh Message-ID: <172949940678.6932.5823972834438552906@smelt2.prg2.suse.org> # Recommended update for crmsh Announcement ID: SUSE-RU-2024:3736-1 Release Date: 2024-10-21T06:35:08Z Rating: moderate References: * bsc#1231386 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for crmsh fixes the following issue: * Update to version 4.5.1+20241014.3a32b36: * Fix: cibconfig: Disable auto add advise values for operations (bsc#1231386). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3736=1 openSUSE-SLE-15.5-2024-3736=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3736=1 ## Package List: * openSUSE Leap 15.5 (noarch) * crmsh-test-4.5.1+20241014.3a32b36-150500.3.42.2 * crmsh-4.5.1+20241014.3a32b36-150500.3.42.2 * crmsh-scripts-4.5.1+20241014.3a32b36-150500.3.42.2 * SUSE Linux Enterprise High Availability Extension 15 SP5 (noarch) * crmsh-4.5.1+20241014.3a32b36-150500.3.42.2 * crmsh-scripts-4.5.1+20241014.3a32b36-150500.3.42.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231386 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 21 08:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 21 Oct 2024 08:30:11 -0000 Subject: SUSE-RU-2024:3735-1: important: Recommended update for crmsh Message-ID: <172949941143.6932.12770139746244995874@smelt2.prg2.suse.org> # Recommended update for crmsh Announcement ID: SUSE-RU-2024:3735-1 Release Date: 2024-10-21T06:34:53Z Rating: important References: * bsc#1228251 * bsc#1228899 * bsc#1229093 * bsc#1231386 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has four fixes can now be installed. ## Description: This update for crmsh fixes the following issues: * Version update 4.6.0+20241012.24810ae: * Fix: cibconfig: Disable auto add advise values for operations (bsc#1231386). * Fix: report: find_shell should accept hacluster user (bsc#1228899). * Fix: report: should not try interactive authentication when stdin is not a tty (bsc#1228899). * Fix: bootstrap: check is_nologin more robustly (bsc#1228251). * Fix: utils: Stop providing the detailed and precise sudoer rules to "hack" the privilege (bsc#1229093). * Dev: utils: Check node is reachable by using both ping and ssh. * Dev: report: do not capture stderr when unarchiving tarballs. * Dev: report: make error messages easier to parse for hawk2 (bsc#1228899). * Dev: healthcheck: Enhace log clarity. * Dev: ui_cluster: Change the completer for crm cluster health. * Dev: report: add a reminder to use `crm cluster health` (bsc#1228899). * Dev: ui_cluster: add a reminder to use "crm cluster init/join ssh" to initialize ssh (bsc#1228899). * Dev: scripts: add a reminder to use `crm cluster health` to fix hacluster passwordless ssh authentication (bsc#1228899). * Dev: scripts: generate readable messages when ssh authentication fails (bsc#1228899). * Dev: main: remove upgradeutil (bsc#1228899). * Dev: completers: Reuse node completer for cluster remove and health. * Dev: bootstrap: Enhance log clarity during crm cluster remove process. * Dev: utils: Catch PermissionError when reading files. * Dev: utils: Load CIB_file env before some readonly commands. * Dev: ui_node: Improve command 'clearstate -node-'. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3735=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3735=1 openSUSE-SLE-15.6-2024-3735=1 ## Package List: * SUSE Linux Enterprise High Availability Extension 15 SP6 (noarch) * crmsh-4.6.0+20241012.24810ae-150600.3.14.3 * crmsh-scripts-4.6.0+20241012.24810ae-150600.3.14.3 * openSUSE Leap 15.6 (noarch) * crmsh-test-4.6.0+20241012.24810ae-150600.3.14.3 * crmsh-4.6.0+20241012.24810ae-150600.3.14.3 * crmsh-scripts-4.6.0+20241012.24810ae-150600.3.14.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228251 * https://bugzilla.suse.com/show_bug.cgi?id=1228899 * https://bugzilla.suse.com/show_bug.cgi?id=1229093 * https://bugzilla.suse.com/show_bug.cgi?id=1231386 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 21 08:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 21 Oct 2024 08:30:14 -0000 Subject: SUSE-RU-2024:3734-1: moderate: Recommended update for crmsh Message-ID: <172949941440.6932.8763002302786946642@smelt2.prg2.suse.org> # Recommended update for crmsh Announcement ID: SUSE-RU-2024:3734-1 Release Date: 2024-10-21T06:33:45Z Rating: moderate References: * bsc#1228251 * bsc#1231386 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for crmsh fixes the following issues: * Version update 4.4.2+20241014.61bee46: * Fix: cibconfig: Disable auto add advise values for operations (bsc#1231386). * Fix: bootstrap: check is_nologin more robustly (bsc#1228251). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3734=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-3734=1 ## Package List: * openSUSE Leap 15.4 (noarch) * crmsh-test-4.4.2+20241014.61bee46-150400.3.37.2 * crmsh-scripts-4.4.2+20241014.61bee46-150400.3.37.2 * crmsh-4.4.2+20241014.61bee46-150400.3.37.2 * SUSE Linux Enterprise High Availability Extension 15 SP4 (noarch) * crmsh-scripts-4.4.2+20241014.61bee46-150400.3.37.2 * crmsh-4.4.2+20241014.61bee46-150400.3.37.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228251 * https://bugzilla.suse.com/show_bug.cgi?id=1231386 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 21 12:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 21 Oct 2024 12:30:01 -0000 Subject: SUSE-OU-2024:3739-1: moderate: Optional update for sssd, adcli Message-ID: <172951380173.6932.1789705017793824987@smelt2.prg2.suse.org> # Optional update for sssd, adcli Announcement ID: SUSE-OU-2024:3739-1 Release Date: 2024-10-21T11:29:01Z Rating: moderate References: * jsc#PED-9654 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains one feature can now be installed. ## Description: This update for sssd, adcli has the following feature: * Ship sssd-ad and adcli to SLE Micro 5.5 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3739=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3739=1 openSUSE-SLE-15.5-2024-3739=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3739=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3739=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3739=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3739=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3739=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * adcli-debuginfo-0.8.2-150400.17.8.3 * adcli-0.8.2-150400.17.8.3 * adcli-doc-0.8.2-150400.17.8.3 * adcli-debugsource-0.8.2-150400.17.8.3 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libsss_idmap-devel-2.5.2-150500.10.22.2 * libsss_simpleifp0-2.5.2-150500.10.22.2 * sssd-krb5-2.5.2-150500.10.22.2 * python3-sss-murmur-debuginfo-2.5.2-150500.10.22.2 * sssd-dbus-debuginfo-2.5.2-150500.10.22.2 * sssd-tools-debuginfo-2.5.2-150500.10.22.2 * libsss_certmap0-debuginfo-2.5.2-150500.10.22.2 * python3-sssd-config-debuginfo-2.5.2-150500.10.22.2 * sssd-dbus-2.5.2-150500.10.22.2 * libipa_hbac0-debuginfo-2.5.2-150500.10.22.2 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.22.2 * sssd-krb5-debuginfo-2.5.2-150500.10.22.2 * sssd-ldap-2.5.2-150500.10.22.2 * sssd-tools-2.5.2-150500.10.22.2 * sssd-kcm-debuginfo-2.5.2-150500.10.22.2 * python3-sss_nss_idmap-debuginfo-2.5.2-150500.10.22.2 * sssd-proxy-2.5.2-150500.10.22.2 * libsss_certmap-devel-2.5.2-150500.10.22.2 * libsss_simpleifp0-debuginfo-2.5.2-150500.10.22.2 * libnfsidmap-sss-debuginfo-2.5.2-150500.10.22.2 * libsss_idmap0-2.5.2-150500.10.22.2 * python3-sssd-config-2.5.2-150500.10.22.2 * sssd-common-2.5.2-150500.10.22.2 * sssd-common-debuginfo-2.5.2-150500.10.22.2 * sssd-kcm-2.5.2-150500.10.22.2 * libsss_nss_idmap0-2.5.2-150500.10.22.2 * sssd-ldap-debuginfo-2.5.2-150500.10.22.2 * sssd-proxy-debuginfo-2.5.2-150500.10.22.2 * sssd-winbind-idmap-2.5.2-150500.10.22.2 * python3-ipa_hbac-2.5.2-150500.10.22.2 * sssd-debugsource-2.5.2-150500.10.22.2 * libipa_hbac-devel-2.5.2-150500.10.22.2 * sssd-ipa-debuginfo-2.5.2-150500.10.22.2 * sssd-krb5-common-debuginfo-2.5.2-150500.10.22.2 * python3-sss_nss_idmap-2.5.2-150500.10.22.2 * sssd-ad-2.5.2-150500.10.22.2 * python3-ipa_hbac-debuginfo-2.5.2-150500.10.22.2 * python3-sss-murmur-2.5.2-150500.10.22.2 * sssd-2.5.2-150500.10.22.2 * libsss_certmap0-2.5.2-150500.10.22.2 * libipa_hbac0-2.5.2-150500.10.22.2 * sssd-ipa-2.5.2-150500.10.22.2 * libsss_idmap0-debuginfo-2.5.2-150500.10.22.2 * sssd-krb5-common-2.5.2-150500.10.22.2 * sssd-ad-debuginfo-2.5.2-150500.10.22.2 * sssd-winbind-idmap-debuginfo-2.5.2-150500.10.22.2 * libnfsidmap-sss-2.5.2-150500.10.22.2 * libsss_simpleifp-devel-2.5.2-150500.10.22.2 * libsss_nss_idmap-devel-2.5.2-150500.10.22.2 * openSUSE Leap 15.5 (x86_64) * sssd-common-32bit-2.5.2-150500.10.22.2 * sssd-common-32bit-debuginfo-2.5.2-150500.10.22.2 * openSUSE Leap 15.5 (aarch64_ilp32) * sssd-common-64bit-2.5.2-150500.10.22.2 * sssd-common-64bit-debuginfo-2.5.2-150500.10.22.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * adcli-debuginfo-0.8.2-150400.17.8.3 * adcli-0.8.2-150400.17.8.3 * adcli-doc-0.8.2-150400.17.8.3 * adcli-debugsource-0.8.2-150400.17.8.3 * openSUSE Leap Micro 5.5 (aarch64 ppc64le s390x x86_64) * adcli-debuginfo-0.8.2-150400.17.8.3 * adcli-doc-0.8.2-150400.17.8.3 * adcli-debugsource-0.8.2-150400.17.8.3 * sssd-ad-debuginfo-2.5.2-150500.10.22.2 * adcli-0.8.2-150400.17.8.3 * sssd-ad-2.5.2-150500.10.22.2 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.22.2 * libsss_nss_idmap0-2.5.2-150500.10.22.2 * sssd-ldap-debuginfo-2.5.2-150500.10.22.2 * sssd-ldap-2.5.2-150500.10.22.2 * libsss_certmap0-debuginfo-2.5.2-150500.10.22.2 * sssd-2.5.2-150500.10.22.2 * libsss_certmap0-2.5.2-150500.10.22.2 * sssd-debugsource-2.5.2-150500.10.22.2 * sssd-krb5-common-debuginfo-2.5.2-150500.10.22.2 * sssd-krb5-common-2.5.2-150500.10.22.2 * libsss_idmap0-debuginfo-2.5.2-150500.10.22.2 * libsss_idmap0-2.5.2-150500.10.22.2 * sssd-common-2.5.2-150500.10.22.2 * sssd-common-debuginfo-2.5.2-150500.10.22.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * adcli-debuginfo-0.8.2-150400.17.8.3 * adcli-0.8.2-150400.17.8.3 * adcli-doc-0.8.2-150400.17.8.3 * adcli-debugsource-0.8.2-150400.17.8.3 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.22.2 * adcli-debuginfo-0.8.2-150400.17.8.3 * libsss_nss_idmap0-2.5.2-150500.10.22.2 * sssd-common-debuginfo-2.5.2-150500.10.22.2 * adcli-doc-0.8.2-150400.17.8.3 * sssd-ad-2.5.2-150500.10.22.2 * sssd-ldap-2.5.2-150500.10.22.2 * sssd-ldap-debuginfo-2.5.2-150500.10.22.2 * libsss_certmap0-debuginfo-2.5.2-150500.10.22.2 * sssd-2.5.2-150500.10.22.2 * libsss_certmap0-2.5.2-150500.10.22.2 * sssd-debugsource-2.5.2-150500.10.22.2 * sssd-krb5-common-debuginfo-2.5.2-150500.10.22.2 * sssd-krb5-common-2.5.2-150500.10.22.2 * libsss_idmap0-debuginfo-2.5.2-150500.10.22.2 * sssd-ad-debuginfo-2.5.2-150500.10.22.2 * libsss_idmap0-2.5.2-150500.10.22.2 * sssd-common-2.5.2-150500.10.22.2 * adcli-0.8.2-150400.17.8.3 * adcli-debugsource-0.8.2-150400.17.8.3 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libsss_idmap-devel-2.5.2-150500.10.22.2 * libsss_simpleifp0-2.5.2-150500.10.22.2 * adcli-doc-0.8.2-150400.17.8.3 * sssd-krb5-2.5.2-150500.10.22.2 * sssd-dbus-debuginfo-2.5.2-150500.10.22.2 * sssd-tools-debuginfo-2.5.2-150500.10.22.2 * libsss_certmap0-debuginfo-2.5.2-150500.10.22.2 * python3-sssd-config-debuginfo-2.5.2-150500.10.22.2 * sssd-dbus-2.5.2-150500.10.22.2 * libipa_hbac0-debuginfo-2.5.2-150500.10.22.2 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.22.2 * sssd-krb5-debuginfo-2.5.2-150500.10.22.2 * sssd-ldap-2.5.2-150500.10.22.2 * sssd-tools-2.5.2-150500.10.22.2 * sssd-kcm-debuginfo-2.5.2-150500.10.22.2 * sssd-proxy-2.5.2-150500.10.22.2 * libsss_certmap-devel-2.5.2-150500.10.22.2 * libsss_simpleifp0-debuginfo-2.5.2-150500.10.22.2 * python3-sssd-config-2.5.2-150500.10.22.2 * libsss_idmap0-2.5.2-150500.10.22.2 * sssd-common-2.5.2-150500.10.22.2 * sssd-common-debuginfo-2.5.2-150500.10.22.2 * sssd-kcm-2.5.2-150500.10.22.2 * adcli-debuginfo-0.8.2-150400.17.8.3 * libsss_nss_idmap0-2.5.2-150500.10.22.2 * sssd-ldap-debuginfo-2.5.2-150500.10.22.2 * sssd-proxy-debuginfo-2.5.2-150500.10.22.2 * sssd-winbind-idmap-2.5.2-150500.10.22.2 * sssd-debugsource-2.5.2-150500.10.22.2 * libipa_hbac-devel-2.5.2-150500.10.22.2 * sssd-ipa-debuginfo-2.5.2-150500.10.22.2 * sssd-krb5-common-debuginfo-2.5.2-150500.10.22.2 * adcli-0.8.2-150400.17.8.3 * adcli-debugsource-0.8.2-150400.17.8.3 * sssd-ad-2.5.2-150500.10.22.2 * sssd-2.5.2-150500.10.22.2 * libsss_certmap0-2.5.2-150500.10.22.2 * libipa_hbac0-2.5.2-150500.10.22.2 * sssd-ipa-2.5.2-150500.10.22.2 * libsss_idmap0-debuginfo-2.5.2-150500.10.22.2 * sssd-krb5-common-2.5.2-150500.10.22.2 * sssd-ad-debuginfo-2.5.2-150500.10.22.2 * sssd-winbind-idmap-debuginfo-2.5.2-150500.10.22.2 * libsss_simpleifp-devel-2.5.2-150500.10.22.2 * libsss_nss_idmap-devel-2.5.2-150500.10.22.2 * Basesystem Module 15-SP5 (x86_64) * sssd-common-32bit-2.5.2-150500.10.22.2 * sssd-common-32bit-debuginfo-2.5.2-150500.10.22.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * adcli-debuginfo-0.8.2-150400.17.8.3 * adcli-0.8.2-150400.17.8.3 * adcli-doc-0.8.2-150400.17.8.3 * adcli-debugsource-0.8.2-150400.17.8.3 ## References: * https://jira.suse.com/browse/PED-9654 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 21 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 21 Oct 2024 12:30:02 -0000 Subject: SUSE-RU-2024:3738-1: moderate: Recommended update for govulncheck, govulncheck-vulndb Message-ID: <172951380295.6932.1390415344534444382@smelt2.prg2.suse.org> # Recommended update for govulncheck, govulncheck-vulndb Announcement ID: SUSE-RU-2024:3738-1 Release Date: 2024-10-21T10:41:23Z Rating: moderate References: Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that can now be installed. ## Description: This update for govulncheck, govulncheck-vulndb fixes the following issues: govulncheck is shipped in version 1.1.3: * internal/openvex: update handler test * LICENSE: update per Google Legal * internal/vulncheck: add warning message for ancient binaries * all: remove build restrictions requiring go1.18 * cmd/govulncheck: clarify unsafe/reflection limitations * cmd/govulncheck: update docs for old Go binaries * internal/openvex: omit vulns with no findings * cmd/govulncheck/integration: adjust k8s expectations * all: remove skipIfShort * all: remove unnecessary test lines for staticcheck * internal/vulncheck: avoid recomputing if module is known * go.mod: update golang.org/x dependencies * internal/buildinfo: add support for ancient Go binaries * internal/goversion: comment out a printing line * internal/goversion: add package as copy of rsc.io/goversion/version * cmd/govulncheck: remove line about go version requirements * internal/vulncheck: improve documentation * internal/vulncheck: use module info when looking for symbols * internal/vulncheck: handle symbols ending with . * cmd/govulncheck/integration: make expectation check more robust * all: require go1.21 Update to version 1.1.2: * internal/osv: add review status * vulncheck: update documentation for vex * cmd/govulncheck/integration/stackrox-scanner: update expectations * cmd/govulncheck/integration/k8s: update expectations * internal/govulncheck: add more comments for emitted OSVs * go.mod: update golang.org/x dependencies * internal/scan: increase telemetry counter for show flag * internal/scan: add format and scan level telemetry * internal/cmd/govulncheck: remove unnecessary binary dependency * cmd/govulncheck/integration: update go in integration tests * internal/openvex: add hash for doc ID * internal/openvex: add statements to handler * internal/openvex: add handler * all: remove test that runs govulncheck on govulncheck * internal/sarif: fix a typo * internal/scan: limit number of binary traces shown * cmd/govulncheck: record scan mode telemetry Update to version 1.1.1: * all: remove unit tests for staticcheck, unparam, and spellcheck * internal/sarif,cmd/govulncheck: publicize sarif * internal/vulncheck: load source code for scan symbol mode only * all: update golang.org/x/tools * internal/vulncheck: emit progress message instead of warning * internal/scan: improve textual output for binary traces * internal/buildinfo: avoid panic on nil symbol for elf * internal/sarif: improve GOMODCACHE relative paths * internal/sarif: add version to module info for locations * internal/sarif: remove originalURIBaseIds * go.mod: update golang.org/x dependencies * internal/gosym: preallocate inlined call slice * internal/vulncheck: improve progress message for binaries * internal/vulncheck: emit fetch db and vuln checking progress messages * internal/scan: print progress messages only in verbose mode * internal/scan: refactor flag usage in text handler * Revert "internal/scan: disallow multiple patterns in source mode" * internal/sarif: add missing required Message field * internal/scan: disallow multiple patterns in source mode * internal/vulncheck: use new improved DeleteSyntheticNodes Update to version 1.1.0: * internal/openvex: add vex types * internal/sarif: compute relative paths for findings * internal/sarif: remove unused field * go.mod: update golang.org/x dependencies * internal/sarif,internal/scan,internal/traces: clean up tests * internal/sarif: add region part of the physical location * internal/sarif: add code flows * cmd/govulncheck: clean up test * cmd/govulncheck: make test case config data * cmd/govulncheck: add comment capability to fixups * cmd/govulncheck: remove unnecessary fixups * cmd/govulncheck: make fixup part of a test case * cmd/govulncheck: extract stdlib into special test case * cmd/govulncheck: restore parallelism for tests * cmd/govulncheck: add nogomod test case * cmd/govulncheck: restructure testdata tests * cmd/govulncheck: add sarif test for binaries * internal/sarif: add stacks * internal/sarif: add result message * internal/vulncheck: get correctly package for instantiated functions * internal/sarif: add result stubs to run object * internal/govulncheck: add scan mode to config * internal/vulncheck: delete only synthetic nodes not related to generics * internal/scan: add more info to validation errors * internal/sarif: add rules * internal/scan: fix name of the error variable * internal/sarif: add handler * internal/scan: add sarif flag * internal/scan: add types for format, show, mode, and scan flags * go.mod: update golang.org/x dependencies * internal/vulncheck: use proper stdlib check when loading packages * internal/vulncheck,internal/scan: sort messages where needed * internal/scan: introduce format flag * internal/vulncheck: manipulate packages from PackageGraph * internal/vulncheck: do not have stdlibModule as global * cmd/govulncheck: make sure filepath are cross-platform * internal/govulncheck: fix up some comments * internal/vulncheck: add relative paths for vendored paths * internal/vulncheck: emit relative paths for call findings * internal/vulncheck, internal/scan: improve stdlib reporting * go.mod: update golang.org/x dependencies * all: remove bash checks * all: do go mod tidy test inside unit tests Update to version 1.0.4: * cmd/govulncheck: mask line numbers and columns * internal/scan: remove redundant new lines * internal/vulncheck: add position for sinks in findings' trace * internal/scan: put -show