<div class="container">
    <h1>Feature update for rabbitmq-server313, erlang26, elixir115</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-FU-2024:2078-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1181400">bsc#1181400</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1185075">bsc#1185075</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1186203">bsc#1186203</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187818">bsc#1187818</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187819">bsc#1187819</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1199431">bsc#1199431</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205267">bsc#1205267</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216582">bsc#1216582</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219532">bsc#1219532</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222591">bsc#1222591</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-8414">jsc#PED-8414</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-22116.html">CVE-2021-22116</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-32718.html">CVE-2021-32718</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-32719.html">CVE-2021-32719</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-31008.html">CVE-2022-31008</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-46118.html">CVE-2023-46118</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-22116</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-22116</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-32718</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-32718</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-32719</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-32719</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-31008</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-31008</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-46118</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-46118</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.3</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.6</li>
                    
                        <li class="list-group-item">Server Applications Module 15-SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves five vulnerabilities, contains one feature and has five fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for rabbitmq-server313, erlang26, elixir115 fixes the following issues:</p>
<p>rabbitmq-server was implemented with a parallel versioned RPM package at version 3.13.1 (jsc#PED-8414):</p>
<ul>
<li>
<p>Security issues fixed:</p>
</li>
<li>
<p>CVE-2021-22116: Fixed improper input validation that may lead to Denial of Sercice (DoS) attacks (bsc#1186203)</p>
</li>
<li>CVE-2021-32718, CVE-2021-32719: Fixed potential for JavaScript code execution in the management UI 
    (bsc#1187818, bsc#1187819)</li>
<li>CVE-2022-31008: Fixed encryption key used to encrypt the URI was seeded with a predictable secret (bsc#1205267)</li>
<li>
<p>CVE-2023-46118: Fixed HTTP API vulnerability for denial of service (DoS) attacks with very large messages
    (bsc#1216582)</p>
</li>
<li>
<p>Other bugs fixed:</p>
</li>
<li>
<p>Fixed RabbitMQ maintenance status issue (bsc#1199431)</p>
</li>
<li>Provide user/group for RPM 4.19 (bsc#1219532)</li>
<li>Fixed <code>rabbitmqctl</code> command for <code>add_user</code> (bsc#1222591)</li>
<li>Added hardening to systemd service(s) (bsc#1181400)</li>
<li>
<p>Use /run instead of deprecated /var/run in tmpfiles.conf (bsc#1185075)</p>
</li>
<li>
<p>For the full list of upstream changes of this update between version 3.8.11 and 3.13.1 please consult:</p>
</li>
<li>
<p>https://www.rabbitmq.com/release-information</p>
</li>
</ul>
<p>erlang26:</p>
<ul>
<li>Provide RPM package as it&#x27;s a dependency of rabbitmq-server313 (jsc#PED-8414)</li>
</ul>
<p>elixir115:</p>
<ul>
<li>Provide RPM package as needed in some cases by rabbitmq-server313 (jsc#PED-8414)</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                openSUSE Leap 15.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-2024-2078=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap 15.6
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-2024-2078=1 openSUSE-SLE-15.6-2024-2078=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                Server Applications Module 15-SP6
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2078=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    openSUSE Leap 15.3 (noarch)
                    <ul>
                        
                            <li>elixir115-doc-1.15.7-150300.7.5.1</li>
                        
                            <li>elixir115-1.15.7-150300.7.5.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
                    <ul>
                        
                            <li>erlang26-debugger-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-dialyzer-debuginfo-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-diameter-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-epmd-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-jinterface-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-reltool-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-et-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-debuginfo-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-reltool-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-et-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-jinterface-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-epmd-debuginfo-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-observer-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-diameter-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-debugger-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-debugsource-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-observer-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-wx-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-dialyzer-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-doc-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-wx-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-dialyzer-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-wx-debuginfo-26.2.1-150300.7.5.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
                    <ul>
                        
                            <li>rabbitmq-server313-plugins-3.13.1-150600.13.5.3</li>
                        
                            <li>erlang-rabbitmq-client313-3.13.1-150600.13.5.3</li>
                        
                            <li>rabbitmq-server313-3.13.1-150600.13.5.3</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.6 (noarch)
                    <ul>
                        
                            <li>elixir115-doc-1.15.7-150300.7.5.1</li>
                        
                            <li>rabbitmq-server313-bash-completion-3.13.1-150600.13.5.3</li>
                        
                            <li>rabbitmq-server313-zsh-completion-3.13.1-150600.13.5.3</li>
                        
                            <li>elixir115-1.15.7-150300.7.5.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>erlang26-debugger-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-dialyzer-debuginfo-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-diameter-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-epmd-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-jinterface-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-reltool-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-et-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-debuginfo-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-reltool-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-et-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-jinterface-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-epmd-debuginfo-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-observer-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-diameter-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-debugger-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-debugsource-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-observer-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-wx-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-dialyzer-src-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-doc-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-wx-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-dialyzer-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-wx-debuginfo-26.2.1-150300.7.5.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    Server Applications Module 15-SP6 (noarch)
                    <ul>
                        
                            <li>elixir115-1.15.7-150300.7.5.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>rabbitmq-server313-plugins-3.13.1-150600.13.5.3</li>
                        
                            <li>rabbitmq-server313-3.13.1-150600.13.5.3</li>
                        
                            <li>erlang26-debugsource-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang-rabbitmq-client313-3.13.1-150600.13.5.3</li>
                        
                            <li>erlang26-debuginfo-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-epmd-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-epmd-debuginfo-26.2.1-150300.7.5.1</li>
                        
                            <li>erlang26-26.2.1-150300.7.5.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-22116.html">https://www.suse.com/security/cve/CVE-2021-22116.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-32718.html">https://www.suse.com/security/cve/CVE-2021-32718.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-32719.html">https://www.suse.com/security/cve/CVE-2021-32719.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-31008.html">https://www.suse.com/security/cve/CVE-2022-31008.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-46118.html">https://www.suse.com/security/cve/CVE-2023-46118.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1181400">https://bugzilla.suse.com/show_bug.cgi?id=1181400</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1185075">https://bugzilla.suse.com/show_bug.cgi?id=1185075</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1186203">https://bugzilla.suse.com/show_bug.cgi?id=1186203</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187818">https://bugzilla.suse.com/show_bug.cgi?id=1187818</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187819">https://bugzilla.suse.com/show_bug.cgi?id=1187819</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1199431">https://bugzilla.suse.com/show_bug.cgi?id=1199431</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205267">https://bugzilla.suse.com/show_bug.cgi?id=1205267</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216582">https://bugzilla.suse.com/show_bug.cgi?id=1216582</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219532">https://bugzilla.suse.com/show_bug.cgi?id=1219532</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222591">https://bugzilla.suse.com/show_bug.cgi?id=1222591</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-8414">https://jira.suse.com/browse/PED-8414</a>
                    </li>
                
            
        </ul>
    
</div>