From null at suse.de Mon Feb 3 08:30:08 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Feb 2025 08:30:08 -0000 Subject: SUSE-RU-2025:0322-1: moderate: Recommended update for python-instance-billing-flavor-check Message-ID: <173857140823.22572.10936426260171598591@smelt2.prg2.suse.org> # Recommended update for python-instance-billing-flavor-check Announcement ID: SUSE-RU-2025:0322-1 Release Date: 2025-02-03T07:39:10Z Rating: moderate References: * bsc#1235991 * bsc#1235992 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has two fixes can now be installed. ## Description: This update for python-instance-billing-flavor-check fixes the following issues: * Add time stamp to log (bsc#1235991, bsc#1235992) * Doc improvements clarifying exit status codes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2025-322=1 ## Package List: * Public Cloud Module 12 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.1.1-1.14.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235991 * https://bugzilla.suse.com/show_bug.cgi?id=1235992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 3 08:30:13 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Feb 2025 08:30:13 -0000 Subject: SUSE-RU-2025:0321-1: moderate: Recommended update for python-instance-billing-flavor-check Message-ID: <173857141301.22572.3172613524919443718@smelt2.prg2.suse.org> # Recommended update for python-instance-billing-flavor-check Announcement ID: SUSE-RU-2025:0321-1 Release Date: 2025-02-03T07:38:23Z Rating: moderate References: * bsc#1235991 * bsc#1235992 Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for python-instance-billing-flavor-check fixes the following issues: * Add time stamp to log (bsc#1235991, bsc#1235992) * Doc improvements clarifying exit status codes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-321=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-321=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-321=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-321=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-321=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-321=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-321=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-321=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-321=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-321=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.1.1-150000.1.14.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-0.1.1-150000.1.14.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-0.1.1-150000.1.14.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-0.1.1-150000.1.14.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-0.1.1-150000.1.14.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.1.1-150000.1.14.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.1.1-150000.1.14.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.1.1-150000.1.14.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.1.1-150000.1.14.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.1.1-150000.1.14.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235991 * https://bugzilla.suse.com/show_bug.cgi?id=1235992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 3 08:30:16 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Feb 2025 08:30:16 -0000 Subject: SUSE-SU-2025:0320-1: important: Security update for buildah Message-ID: <173857141603.22572.10493141044083213110@smelt2.prg2.suse.org> # Security update for buildah Announcement ID: SUSE-SU-2025:0320-1 Release Date: 2025-02-01T09:53:57Z Rating: important References: * bsc#1236272 Cross-References: * CVE-2024-11218 * CVE-2024-9407 CVSS scores: * CVE-2024-11218 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-11218 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-11218 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-9407 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for buildah fixes the following issues: * Update to version 1.35.5 * CVE-2024-11218: Fix TOCTOU error when bind and cache mounts use "src" values. (bsc#1236272) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-320=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-320=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-320=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-320=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-320=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * buildah-1.35.5-150300.8.31.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * buildah-1.35.5-150300.8.31.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150300.8.31.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * buildah-1.35.5-150300.8.31.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * buildah-1.35.5-150300.8.31.2 ## References: * https://www.suse.com/security/cve/CVE-2024-11218.html * https://www.suse.com/security/cve/CVE-2024-9407.html * https://bugzilla.suse.com/show_bug.cgi?id=1236272 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 3 08:30:19 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Feb 2025 08:30:19 -0000 Subject: SUSE-SU-2025:0319-1: important: Security update for buildah Message-ID: <173857141984.22572.7403814249643994498@smelt2.prg2.suse.org> # Security update for buildah Announcement ID: SUSE-SU-2025:0319-1 Release Date: 2025-02-01T09:53:09Z Rating: important References: * bsc#1236272 Cross-References: * CVE-2024-11218 * CVE-2024-9407 CVSS scores: * CVE-2024-11218 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-11218 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-11218 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-9407 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for buildah fixes the following issues: * Update to version 1.35.5 * CVE-2024-11218: Fix TOCTOU error when bind and cache mounts use "src" values. (bsc#1236272) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-319=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-319=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-319=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-319=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-319=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * buildah-1.35.5-150400.3.36.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * buildah-1.35.5-150400.3.36.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * buildah-1.35.5-150400.3.36.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150400.3.36.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * buildah-1.35.5-150400.3.36.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11218.html * https://www.suse.com/security/cve/CVE-2024-9407.html * https://bugzilla.suse.com/show_bug.cgi?id=1236272 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 3 08:30:23 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Feb 2025 08:30:23 -0000 Subject: SUSE-SU-2025:0318-1: moderate: Security update for ignition Message-ID: <173857142332.22572.4360161504004481768@smelt2.prg2.suse.org> # Security update for ignition Announcement ID: SUSE-SU-2025:0318-1 Release Date: 2025-02-01T03:34:07Z Rating: moderate References: * bsc#1236518 Cross-References: * CVE-2023-45288 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves one vulnerability can now be installed. ## Description: This update for ignition fixes the following issues: CVE-2023-45288: Fixed unclosed connections when receiving too many headers in golang.org/x/net/http2 (bsc#1236518) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-318=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-318=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * ignition-dracut-grub2-2.15.0-150400.4.5.1 * ignition-debuginfo-2.15.0-150400.4.5.1 * ignition-2.15.0-150400.4.5.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * ignition-dracut-grub2-2.15.0-150400.4.5.1 * ignition-debuginfo-2.15.0-150400.4.5.1 * ignition-2.15.0-150400.4.5.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://bugzilla.suse.com/show_bug.cgi?id=1236518 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 3 12:30:14 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Feb 2025 12:30:14 -0000 Subject: SUSE-RU-2025:0331-1: moderate: Recommended update for yast2-iscsi-client Message-ID: <173858581457.22572.6013662343345664951@smelt2.prg2.suse.org> # Recommended update for yast2-iscsi-client Announcement ID: SUSE-RU-2025:0331-1 Release Date: 2025-02-03T11:40:31Z Rating: moderate References: * bsc#1233802 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for yast2-iscsi-client fixes the following issues: * Version update 4.6.6 * Try to load the iscsi_ibft module in ARM arch as it should be available for getting the iBFT configuration (bsc#1233802). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-331=1 openSUSE-SLE-15.6-2025-331=1 * SUSE Linux Enterprise High Performance Computing 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2025-331=1 * SUSE Linux Enterprise Server 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2025-331=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2025-331=1 * SUSE Linux Enterprise Desktop 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2025-331=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-331=1 ## Package List: * openSUSE Leap 15.6 (noarch) * yast2-iscsi-client-4.6.6-150600.3.14.2 * SUSE Linux Enterprise High Performance Computing 15 SP6 (noarch) * yast2-iscsi-client-4.6.6-150600.3.14.2 * SUSE Linux Enterprise Server 15 SP6 (noarch) * yast2-iscsi-client-4.6.6-150600.3.14.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * yast2-iscsi-client-4.6.6-150600.3.14.2 * SUSE Linux Enterprise Desktop 15 SP6 (noarch) * yast2-iscsi-client-4.6.6-150600.3.14.2 * Basesystem Module 15-SP6 (noarch) * yast2-iscsi-client-4.6.6-150600.3.14.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1233802 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 3 12:30:42 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Feb 2025 12:30:42 -0000 Subject: SUSE-RU-2025:0330-1: moderate: Recommended update for apache2 Message-ID: <173858584246.22572.4335113943261539913@smelt2.prg2.suse.org> # Recommended update for apache2 Announcement ID: SUSE-RU-2025:0330-1 Release Date: 2025-02-03T10:50:23Z Rating: moderate References: * bsc#1233433 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for apache2 fixes the following issue: * update-alternatives script not called during httpd update, never triggered from 'zypper dup' (bsc#1233433). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-330=1 openSUSE-SLE-15.6-2025-330=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-330=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-330=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-330=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * apache2-utils-2.4.58-150600.5.32.2 * apache2-worker-2.4.58-150600.5.32.2 * apache2-event-2.4.58-150600.5.32.2 * apache2-debuginfo-2.4.58-150600.5.32.2 * apache2-prefork-debugsource-2.4.58-150600.5.32.2 * apache2-utils-debuginfo-2.4.58-150600.5.32.2 * apache2-2.4.58-150600.5.32.2 * apache2-event-debuginfo-2.4.58-150600.5.32.2 * apache2-event-debugsource-2.4.58-150600.5.32.2 * apache2-devel-2.4.58-150600.5.32.2 * apache2-debugsource-2.4.58-150600.5.32.2 * apache2-prefork-debuginfo-2.4.58-150600.5.32.2 * apache2-utils-debugsource-2.4.58-150600.5.32.2 * apache2-worker-debuginfo-2.4.58-150600.5.32.2 * apache2-prefork-2.4.58-150600.5.32.2 * apache2-worker-debugsource-2.4.58-150600.5.32.2 * openSUSE Leap 15.6 (noarch) * apache2-manual-2.4.58-150600.5.32.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-debuginfo-2.4.58-150600.5.32.2 * apache2-prefork-debugsource-2.4.58-150600.5.32.2 * apache2-2.4.58-150600.5.32.2 * apache2-debugsource-2.4.58-150600.5.32.2 * apache2-prefork-debuginfo-2.4.58-150600.5.32.2 * apache2-prefork-2.4.58-150600.5.32.2 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-event-2.4.58-150600.5.32.2 * apache2-debuginfo-2.4.58-150600.5.32.2 * apache2-event-debuginfo-2.4.58-150600.5.32.2 * apache2-event-debugsource-2.4.58-150600.5.32.2 * apache2-debugsource-2.4.58-150600.5.32.2 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-utils-2.4.58-150600.5.32.2 * apache2-worker-2.4.58-150600.5.32.2 * apache2-utils-debuginfo-2.4.58-150600.5.32.2 * apache2-devel-2.4.58-150600.5.32.2 * apache2-utils-debugsource-2.4.58-150600.5.32.2 * apache2-worker-debuginfo-2.4.58-150600.5.32.2 * apache2-worker-debugsource-2.4.58-150600.5.32.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1233433 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 3 12:31:18 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 03 Feb 2025 12:31:18 -0000 Subject: SUSE-SU-2025:0328-1: important: Security update for clamav Message-ID: <173858587827.22572.561228162699156288@smelt2.prg2.suse.org> # Security update for clamav Announcement ID: SUSE-SU-2025:0328-1 Release Date: 2025-02-03T09:39:55Z Rating: important References: * bsc#1102840 * bsc#1103032 * bsc#1180296 * bsc#1202986 * bsc#1211594 * bsc#1214342 * bsc#1232242 * bsc#1236307 * jsc#PED-4596 Cross-References: * CVE-2018-14679 * CVE-2023-20197 * CVE-2024-20380 * CVE-2024-20505 * CVE-2024-20506 * CVE-2025-20128 CVSS scores: * CVE-2018-14679 ( SUSE ): 4.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L * CVE-2018-14679 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-20197 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-20197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-20380 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-20505 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-20505 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-20505 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-20505 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-20506 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-20506 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N * CVE-2024-20506 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-20506 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-20128 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-20128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-20128 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-20128 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves six vulnerabilities, contains one feature and has two security fixes can now be installed. ## Description: This update for clamav fixes the following issues: New version 1.4.2: * CVE-2025-20128, bsc#1236307: Fixed a possible buffer overflow read bug in the OLE2 file parser that could cause a denial-of-service (DoS) condition. * Start clamonacc with --fdpass to avoid errors due to clamd not being able to access user files. (bsc#1232242) * New version 1.4.1: * https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html * New version 1.4.0: * Added support for extracting ALZ archives. * Added support for extracting LHA/LZH archives. * Added the ability to disable image fuzzy hashing, if needed. For context, image fuzzy hashing is a detection mechanism useful for identifying malware by matching images included with the malware or phishing email/document. * https://blog.clamav.net/2024/08/clamav-140-feature-release-and-clamav.html * New version 1.3.2: * CVE-2024-20506: Changed the logging module to disable following symlinks on Linux and Unix systems so as to prevent an attacker with existing access to the 'clamd' or 'freshclam' services from using a symlink to corrupt system files. * CVE-2024-20505: Fixed a possible out-of-bounds read bug in the PDF file parser that could cause a denial-of-service condition. * Removed unused Python modules from freshclam tests including deprecated 'cgi' module that is expected to cause test failures in Python 3.13. * Fix unit test caused by expiring signing certificate. * Fixed a build issue on Windows with newer versions of Rust. Also upgraded GitHub Actions imports to fix CI failures. * Fixed an unaligned pointer dereference issue on select architectures. * Fixes to Jenkins CI pipeline. * New Version: 1.3.1: * CVE-2024-20380: Fixed a possible crash in the HTML file parser that could cause a denial-of-service (DoS) condition. * Updated select Rust dependencies to the latest versions. * Fixed a bug causing some text to be truncated when converting from UTF-16. * Fixed assorted complaints identified by Coverity static analysis. * Fixed a bug causing CVDs downloaded by the DatabaseCustomURL * Added the new 'valhalla' database name to the list of optional databases in preparation for future work. * New version: 1.3.0: * Added support for extracting and scanning attachments found in Microsoft OneNote section files. OneNote parsing will be enabled by default, but may be optionally disabled. * Added file type recognition for compiled Python ('.pyc') files. * Improved support for decrypting PDFs with empty passwords. * Fixed a warning when scanning some HTML files. * ClamOnAcc: Fixed an infinite loop when a watched directory does not exist. * ClamOnAcc: Fixed an infinite loop when a file has been deleted before a scan. * New version: 1.2.0: * Added support for extracting Universal Disk Format (UDF) partitions. * Added an option to customize the size of ClamAV's clean file cache. * Raised the MaxScanSize limit so the total amount of data scanned when scanning a file or archive may exceed 4 gigabytes. * Added ability for Freshclam to use a client certificate PEM file and a private key PEM file for authentication to a private mirror. * Fix an issue extracting files from ISO9660 partitions where the files are listed in the plain ISO tree and there also exists an empty Joliet tree. * PID and socket are now located under /run/clamav/clamd.pid and /run/clamav/clamd.sock . * bsc#1211594: Fixed an issue where ClamAV does not abort the signature load process after partially loading an invalid signature. * New version 1.1.0: * https://blog.clamav.net/2023/05/clamav-110-released.html * Added the ability to extract images embedded in HTML CSS