<div class="container">
<h1>Feature update for rabbitmq-server313, erlang26, elixir115</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-FU-2024:2078-1</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1181400">bsc#1181400</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1185075">bsc#1185075</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1186203">bsc#1186203</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1187818">bsc#1187818</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1187819">bsc#1187819</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1199431">bsc#1199431</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205267">bsc#1205267</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216582">bsc#1216582</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219532">bsc#1219532</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222591">bsc#1222591</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8414">jsc#PED-8414</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-22116.html">CVE-2021-22116</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-32718.html">CVE-2021-32718</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-32719.html">CVE-2021-32719</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-31008.html">CVE-2022-31008</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-46118.html">CVE-2023-46118</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-22116</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-22116</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-32718</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-32718</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.4</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-32719</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-32719</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-31008</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-31008</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-46118</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-46118</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">openSUSE Leap 15.3</li>
<li class="list-group-item">openSUSE Leap 15.6</li>
<li class="list-group-item">Server Applications Module 15-SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves five vulnerabilities, contains one feature and has five fixes can now be installed.</p>
<h2>Description:</h2>
<p>This update for rabbitmq-server313, erlang26, elixir115 fixes the following issues:</p>
<p>rabbitmq-server was implemented with a parallel versioned RPM package at version 3.13.1 (jsc#PED-8414):</p>
<ul>
<li>
<p>Security issues fixed:</p>
</li>
<li>
<p>CVE-2021-22116: Fixed improper input validation that may lead to Denial of Sercice (DoS) attacks (bsc#1186203)</p>
</li>
<li>CVE-2021-32718, CVE-2021-32719: Fixed potential for JavaScript code execution in the management UI
(bsc#1187818, bsc#1187819)</li>
<li>CVE-2022-31008: Fixed encryption key used to encrypt the URI was seeded with a predictable secret (bsc#1205267)</li>
<li>
<p>CVE-2023-46118: Fixed HTTP API vulnerability for denial of service (DoS) attacks with very large messages
(bsc#1216582)</p>
</li>
<li>
<p>Other bugs fixed:</p>
</li>
<li>
<p>Fixed RabbitMQ maintenance status issue (bsc#1199431)</p>
</li>
<li>Provide user/group for RPM 4.19 (bsc#1219532)</li>
<li>Fixed <code>rabbitmqctl</code> command for <code>add_user</code> (bsc#1222591)</li>
<li>Added hardening to systemd service(s) (bsc#1181400)</li>
<li>
<p>Use /run instead of deprecated /var/run in tmpfiles.conf (bsc#1185075)</p>
</li>
<li>
<p>For the full list of upstream changes of this update between version 3.8.11 and 3.13.1 please consult:</p>
</li>
<li>
<p>https://www.rabbitmq.com/release-information</p>
</li>
</ul>
<p>erlang26:</p>
<ul>
<li>Provide RPM package as it's a dependency of rabbitmq-server313 (jsc#PED-8414)</li>
</ul>
<p>elixir115:</p>
<ul>
<li>Provide RPM package as needed in some cases by rabbitmq-server313 (jsc#PED-8414)</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap 15.3
<br/>
<code>zypper in -t patch SUSE-2024-2078=1</code>
</li>
<li class="list-group-item">
openSUSE Leap 15.6
<br/>
<code>zypper in -t patch SUSE-2024-2078=1 openSUSE-SLE-15.6-2024-2078=1</code>
</li>
<li class="list-group-item">
Server Applications Module 15-SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2078=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap 15.3 (noarch)
<ul>
<li>elixir115-doc-1.15.7-150300.7.5.1</li>
<li>elixir115-1.15.7-150300.7.5.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
<ul>
<li>erlang26-debugger-26.2.1-150300.7.5.1</li>
<li>erlang26-dialyzer-debuginfo-26.2.1-150300.7.5.1</li>
<li>erlang26-diameter-26.2.1-150300.7.5.1</li>
<li>erlang26-epmd-26.2.1-150300.7.5.1</li>
<li>erlang26-jinterface-src-26.2.1-150300.7.5.1</li>
<li>erlang26-reltool-src-26.2.1-150300.7.5.1</li>
<li>erlang26-et-src-26.2.1-150300.7.5.1</li>
<li>erlang26-debuginfo-26.2.1-150300.7.5.1</li>
<li>erlang26-reltool-26.2.1-150300.7.5.1</li>
<li>erlang26-et-26.2.1-150300.7.5.1</li>
<li>erlang26-jinterface-26.2.1-150300.7.5.1</li>
<li>erlang26-epmd-debuginfo-26.2.1-150300.7.5.1</li>
<li>erlang26-observer-26.2.1-150300.7.5.1</li>
<li>erlang26-diameter-src-26.2.1-150300.7.5.1</li>
<li>erlang26-src-26.2.1-150300.7.5.1</li>
<li>erlang26-debugger-src-26.2.1-150300.7.5.1</li>
<li>erlang26-debugsource-26.2.1-150300.7.5.1</li>
<li>erlang26-observer-src-26.2.1-150300.7.5.1</li>
<li>erlang26-wx-src-26.2.1-150300.7.5.1</li>
<li>erlang26-dialyzer-src-26.2.1-150300.7.5.1</li>
<li>erlang26-doc-26.2.1-150300.7.5.1</li>
<li>erlang26-wx-26.2.1-150300.7.5.1</li>
<li>erlang26-26.2.1-150300.7.5.1</li>
<li>erlang26-dialyzer-26.2.1-150300.7.5.1</li>
<li>erlang26-wx-debuginfo-26.2.1-150300.7.5.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
<ul>
<li>rabbitmq-server313-plugins-3.13.1-150600.13.5.3</li>
<li>erlang-rabbitmq-client313-3.13.1-150600.13.5.3</li>
<li>rabbitmq-server313-3.13.1-150600.13.5.3</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (noarch)
<ul>
<li>elixir115-doc-1.15.7-150300.7.5.1</li>
<li>rabbitmq-server313-bash-completion-3.13.1-150600.13.5.3</li>
<li>rabbitmq-server313-zsh-completion-3.13.1-150600.13.5.3</li>
<li>elixir115-1.15.7-150300.7.5.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
<ul>
<li>erlang26-debugger-26.2.1-150300.7.5.1</li>
<li>erlang26-dialyzer-debuginfo-26.2.1-150300.7.5.1</li>
<li>erlang26-diameter-26.2.1-150300.7.5.1</li>
<li>erlang26-epmd-26.2.1-150300.7.5.1</li>
<li>erlang26-jinterface-src-26.2.1-150300.7.5.1</li>
<li>erlang26-reltool-src-26.2.1-150300.7.5.1</li>
<li>erlang26-et-src-26.2.1-150300.7.5.1</li>
<li>erlang26-debuginfo-26.2.1-150300.7.5.1</li>
<li>erlang26-reltool-26.2.1-150300.7.5.1</li>
<li>erlang26-et-26.2.1-150300.7.5.1</li>
<li>erlang26-jinterface-26.2.1-150300.7.5.1</li>
<li>erlang26-epmd-debuginfo-26.2.1-150300.7.5.1</li>
<li>erlang26-observer-26.2.1-150300.7.5.1</li>
<li>erlang26-diameter-src-26.2.1-150300.7.5.1</li>
<li>erlang26-src-26.2.1-150300.7.5.1</li>
<li>erlang26-debugger-src-26.2.1-150300.7.5.1</li>
<li>erlang26-debugsource-26.2.1-150300.7.5.1</li>
<li>erlang26-observer-src-26.2.1-150300.7.5.1</li>
<li>erlang26-wx-src-26.2.1-150300.7.5.1</li>
<li>erlang26-dialyzer-src-26.2.1-150300.7.5.1</li>
<li>erlang26-doc-26.2.1-150300.7.5.1</li>
<li>erlang26-wx-26.2.1-150300.7.5.1</li>
<li>erlang26-26.2.1-150300.7.5.1</li>
<li>erlang26-dialyzer-26.2.1-150300.7.5.1</li>
<li>erlang26-wx-debuginfo-26.2.1-150300.7.5.1</li>
</ul>
</li>
<li>
Server Applications Module 15-SP6 (noarch)
<ul>
<li>elixir115-1.15.7-150300.7.5.1</li>
</ul>
</li>
<li>
Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
<ul>
<li>rabbitmq-server313-plugins-3.13.1-150600.13.5.3</li>
<li>rabbitmq-server313-3.13.1-150600.13.5.3</li>
<li>erlang26-debugsource-26.2.1-150300.7.5.1</li>
<li>erlang-rabbitmq-client313-3.13.1-150600.13.5.3</li>
<li>erlang26-debuginfo-26.2.1-150300.7.5.1</li>
<li>erlang26-epmd-26.2.1-150300.7.5.1</li>
<li>erlang26-epmd-debuginfo-26.2.1-150300.7.5.1</li>
<li>erlang26-26.2.1-150300.7.5.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-22116.html">https://www.suse.com/security/cve/CVE-2021-22116.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-32718.html">https://www.suse.com/security/cve/CVE-2021-32718.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-32719.html">https://www.suse.com/security/cve/CVE-2021-32719.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-31008.html">https://www.suse.com/security/cve/CVE-2022-31008.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-46118.html">https://www.suse.com/security/cve/CVE-2023-46118.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1181400">https://bugzilla.suse.com/show_bug.cgi?id=1181400</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1185075">https://bugzilla.suse.com/show_bug.cgi?id=1185075</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1186203">https://bugzilla.suse.com/show_bug.cgi?id=1186203</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1187818">https://bugzilla.suse.com/show_bug.cgi?id=1187818</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1187819">https://bugzilla.suse.com/show_bug.cgi?id=1187819</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1199431">https://bugzilla.suse.com/show_bug.cgi?id=1199431</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205267">https://bugzilla.suse.com/show_bug.cgi?id=1205267</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216582">https://bugzilla.suse.com/show_bug.cgi?id=1216582</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219532">https://bugzilla.suse.com/show_bug.cgi?id=1219532</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222591">https://bugzilla.suse.com/show_bug.cgi?id=1222591</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-8414">https://jira.suse.com/browse/PED-8414</a>
</li>
</ul>
</div>