From maint-coord at suse.de Fri Sep 1 16:30:05 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Fri, 01 Sep 2023 16:30:05 -0000 Subject: SUSE-RU-2023:3515-1: moderate: Recommended update for libzypp, zypper Message-ID: <169358580535.8850.13236839353712371555@smelt2.suse.de> # Recommended update for libzypp, zypper Announcement ID: SUSE-RU-2023:3515-1 Rating: moderate References: * #1158763 * #1210740 * #1213231 * #1213557 * #1213673 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that has five recommended fixes can now be installed. ## Description: This update for libzypp, zypper fixes the following issues: * Fix occasional isue with downloading very small files (bsc#1213673) * Fix negative ZYPP_LOCK_TIMEOUT not waiting forever (bsc#1213231) * Fix OES synchronization issues when cookie file has mode 0600 (bsc#1158763) * Don't cleanup orphaned dirs if read-only mode was promised (bsc#1210740) * Revised explanation of --force-resolution in man page (bsc#1213557) * Print summary hint if policies were violated due to --force-resolution (bsc#1213557) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE Moderate update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP2 zypper in -t patch SUSE-SLE-INSTALLER-15-SP2-2023-3515=1 * SUSE Linux Enterprise Server 15 SP3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP3-2023-3515=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3515=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3515=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3515=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-3515=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3515=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3515=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3515=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3515=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3515=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3515=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3515=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3515=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3515=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3515=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3515=1 ## Package List: * SUSE Linux Enterprise Server 15 SP2 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.20-150200.75.1 * SUSE Linux Enterprise Server 15 SP3 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.20-150200.75.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * libzypp-devel-17.31.20-150200.75.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * zypper-log-1.14.63-150200.59.1 * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * libzypp-devel-17.31.20-150200.75.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * zypper-log-1.14.63-150200.59.1 * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * libzypp-devel-17.31.20-150200.75.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * zypper-log-1.14.63-150200.59.1 * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * libzypp-devel-17.31.20-150200.75.1 * SUSE Linux Enterprise Real Time 15 SP3 (noarch) * zypper-log-1.14.63-150200.59.1 * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * libzypp-devel-17.31.20-150200.75.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * zypper-log-1.14.63-150200.59.1 * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * libzypp-devel-17.31.20-150200.75.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * zypper-log-1.14.63-150200.59.1 * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * libzypp-devel-17.31.20-150200.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * zypper-log-1.14.63-150200.59.1 * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * libzypp-devel-17.31.20-150200.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * zypper-log-1.14.63-150200.59.1 * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Manager Proxy 4.2 (x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * libzypp-devel-17.31.20-150200.75.1 * SUSE Manager Proxy 4.2 (noarch) * zypper-log-1.14.63-150200.59.1 * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * libzypp-devel-17.31.20-150200.75.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * zypper-log-1.14.63-150200.59.1 * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * libzypp-devel-17.31.20-150200.75.1 * SUSE Manager Server 4.2 (noarch) * zypper-log-1.14.63-150200.59.1 * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * libzypp-devel-17.31.20-150200.75.1 * SUSE Enterprise Storage 7.1 (noarch) * zypper-log-1.14.63-150200.59.1 * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * zypper-needs-restarting-1.14.63-150200.59.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * zypper-debuginfo-1.14.63-150200.59.1 * libzypp-17.31.20-150200.75.1 * zypper-debugsource-1.14.63-150200.59.1 * libzypp-debuginfo-17.31.20-150200.75.1 * zypper-1.14.63-150200.59.1 * libzypp-debugsource-17.31.20-150200.75.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * zypper-needs-restarting-1.14.63-150200.59.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1158763 * https://bugzilla.suse.com/show_bug.cgi?id=1210740 * https://bugzilla.suse.com/show_bug.cgi?id=1213231 * https://bugzilla.suse.com/show_bug.cgi?id=1213557 * https://bugzilla.suse.com/show_bug.cgi?id=1213673 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Fri Sep 1 16:30:08 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Fri, 01 Sep 2023 16:30:08 -0000 Subject: SUSE-RU-2023:3514-1: moderate: Recommended update for libzypp, zypper Message-ID: <169358580829.8850.4648956083998674649@smelt2.suse.de> # Recommended update for libzypp, zypper Announcement ID: SUSE-RU-2023:3514-1 Rating: moderate References: * #1158763 * #1210740 * #1213231 * #1213557 * #1213673 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has five recommended fixes can now be installed. ## Description: This update for libzypp, zypper fixes the following issues: * Fix occasional isue with downloading very small files (bsc#1213673) * Fix negative ZYPP_LOCK_TIMEOUT not waiting forever (bsc#1213231) * Fix OES synchronization issues when cookie file has mode 0600 (bsc#1158763) * Don't cleanup orphaned dirs if read-only mode was promised (bsc#1210740) * Revised explanation of --force-resolution in man page (bsc#1213557) * Print summary hint if policies were violated due to --force-resolution (bsc#1213557) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE Moderate update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3514=1 SUSE-2023-3514=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3514=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3514=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3514=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3514=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3514=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3514=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3514=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3514=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2023-3514=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2023-3514=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2023-3514=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2023-3514=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3514=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3514=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3514=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3514=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3514=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3514=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libzypp-17.31.20-150400.3.40.1 * zypper-1.14.63-150400.3.29.1 * libzypp-devel-17.31.20-150400.3.40.1 * libzypp-devel-doc-17.31.20-150400.3.40.1 * zypper-debuginfo-1.14.63-150400.3.29.1 * libzypp-debuginfo-17.31.20-150400.3.40.1 * libzypp-debugsource-17.31.20-150400.3.40.1 * zypper-debugsource-1.14.63-150400.3.29.1 * openSUSE Leap 15.4 (noarch) * zypper-aptitude-1.14.63-150400.3.29.1 * zypper-needs-restarting-1.14.63-150400.3.29.1 * zypper-log-1.14.63-150400.3.29.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.20-150400.3.40.1 * zypper-1.14.63-150400.3.29.1 * libzypp-devel-17.31.20-150400.3.40.1 * libzypp-devel-doc-17.31.20-150400.3.40.1 * zypper-debuginfo-1.14.63-150400.3.29.1 * libzypp-debuginfo-17.31.20-150400.3.40.1 * libzypp-debugsource-17.31.20-150400.3.40.1 * zypper-debugsource-1.14.63-150400.3.29.1 * openSUSE Leap 15.5 (noarch) * zypper-aptitude-1.14.63-150400.3.29.1 * zypper-needs-restarting-1.14.63-150400.3.29.1 * zypper-log-1.14.63-150400.3.29.1 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libzypp-17.31.20-150400.3.40.1 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.20-150400.3.40.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libzypp-17.31.20-150400.3.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libzypp-17.31.20-150400.3.40.1 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libzypp-17.31.20-150400.3.40.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libzypp-17.31.20-150400.3.40.1 * SUSE Manager Proxy 4.3 (x86_64) * libzypp-17.31.20-150400.3.40.1 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libzypp-17.31.20-150400.3.40.1 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.20-150400.3.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libzypp-17.31.20-150400.3.40.1 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libzypp-17.31.20-150400.3.40.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libzypp-17.31.20-150400.3.40.1 * zypper-1.14.63-150400.3.29.1 * libzypp-debuginfo-17.31.20-150400.3.40.1 * libzypp-debugsource-17.31.20-150400.3.40.1 * zypper-debuginfo-1.14.63-150400.3.29.1 * zypper-debugsource-1.14.63-150400.3.29.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * zypper-needs-restarting-1.14.63-150400.3.29.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libzypp-17.31.20-150400.3.40.1 * zypper-1.14.63-150400.3.29.1 * libzypp-debuginfo-17.31.20-150400.3.40.1 * libzypp-debugsource-17.31.20-150400.3.40.1 * zypper-debuginfo-1.14.63-150400.3.29.1 * zypper-debugsource-1.14.63-150400.3.29.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * zypper-needs-restarting-1.14.63-150400.3.29.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libzypp-17.31.20-150400.3.40.1 * zypper-1.14.63-150400.3.29.1 * libzypp-debuginfo-17.31.20-150400.3.40.1 * libzypp-debugsource-17.31.20-150400.3.40.1 * zypper-debuginfo-1.14.63-150400.3.29.1 * zypper-debugsource-1.14.63-150400.3.29.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * zypper-needs-restarting-1.14.63-150400.3.29.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libzypp-17.31.20-150400.3.40.1 * zypper-1.14.63-150400.3.29.1 * libzypp-debuginfo-17.31.20-150400.3.40.1 * libzypp-debugsource-17.31.20-150400.3.40.1 * zypper-debuginfo-1.14.63-150400.3.29.1 * zypper-debugsource-1.14.63-150400.3.29.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * zypper-needs-restarting-1.14.63-150400.3.29.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.20-150400.3.40.1 * zypper-1.14.63-150400.3.29.1 * libzypp-devel-17.31.20-150400.3.40.1 * zypper-debuginfo-1.14.63-150400.3.29.1 * libzypp-debuginfo-17.31.20-150400.3.40.1 * libzypp-debugsource-17.31.20-150400.3.40.1 * zypper-debugsource-1.14.63-150400.3.29.1 * Basesystem Module 15-SP4 (noarch) * zypper-log-1.14.63-150400.3.29.1 * zypper-needs-restarting-1.14.63-150400.3.29.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.20-150400.3.40.1 * zypper-1.14.63-150400.3.29.1 * libzypp-devel-17.31.20-150400.3.40.1 * zypper-debuginfo-1.14.63-150400.3.29.1 * libzypp-debuginfo-17.31.20-150400.3.40.1 * libzypp-debugsource-17.31.20-150400.3.40.1 * zypper-debugsource-1.14.63-150400.3.29.1 * Basesystem Module 15-SP5 (noarch) * zypper-log-1.14.63-150400.3.29.1 * zypper-needs-restarting-1.14.63-150400.3.29.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1158763 * https://bugzilla.suse.com/show_bug.cgi?id=1210740 * https://bugzilla.suse.com/show_bug.cgi?id=1213231 * https://bugzilla.suse.com/show_bug.cgi?id=1213557 * https://bugzilla.suse.com/show_bug.cgi?id=1213673 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Tue Sep 5 12:42:11 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Tue, 05 Sep 2023 12:42:11 -0000 Subject: SUSE-RU-2023:3521-1: moderate: Recommended update for python-iniconfig Message-ID: <169391773134.22711.13758304763173963415@smelt2.suse.de> # Recommended update for python-iniconfig Announcement ID: SUSE-RU-2023:3521-1 Rating: moderate References: * #1213582 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for python-iniconfig provides python3-iniconfig to SUSE Linux Enterprise Micro 5.2. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3521=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3521=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3521=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3521=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3521=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3521=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3521=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3521=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3521=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3521=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3521=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3521=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3521=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3521=1 ## Package List: * SUSE Manager Proxy 4.2 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * SUSE Manager Server 4.2 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * python2-iniconfig-1.1.1-150000.1.11.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * openSUSE Leap 15.4 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * openSUSE Leap 15.5 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * Basesystem Module 15-SP4 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 * Basesystem Module 15-SP5 (noarch) * python3-iniconfig-1.1.1-150000.1.11.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213582 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Tue Sep 5 16:30:08 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Tue, 05 Sep 2023 16:30:08 -0000 Subject: SUSE-RU-2023:3540-1: important: Recommended update for dracut Message-ID: <169393140823.13565.2020905495947957137@smelt2.suse.de> # Recommended update for dracut Announcement ID: SUSE-RU-2023:3540-1 Rating: important References: * #1214081 Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that has one fix can now be installed. ## Description: This update for dracut fixes the following issues: * Exit if resolving executable dependencies fails (bsc#1214081) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3540=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3540=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3540=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3540=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3540=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3540=1 ## Package List: * SUSE Manager Proxy 4.2 (x86_64) * dracut-fips-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-debuginfo-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-ima-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-debugsource-049.1+suse.255.g19bd61fd-150200.3.72.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * dracut-fips-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-debuginfo-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-ima-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-debugsource-049.1+suse.255.g19bd61fd-150200.3.72.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * dracut-fips-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-debuginfo-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-ima-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-debugsource-049.1+suse.255.g19bd61fd-150200.3.72.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * dracut-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-debuginfo-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-fips-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-debugsource-049.1+suse.255.g19bd61fd-150200.3.72.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * dracut-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-debuginfo-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-fips-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-debugsource-049.1+suse.255.g19bd61fd-150200.3.72.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * dracut-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-debuginfo-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-fips-049.1+suse.255.g19bd61fd-150200.3.72.1 * dracut-debugsource-049.1+suse.255.g19bd61fd-150200.3.72.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214081 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 6 08:31:56 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 06 Sep 2023 08:31:56 -0000 Subject: SUSE-RU-2023:3543-1: moderate: Recommended update for protobuf-c Message-ID: <169398911647.25056.2999326653741443423@smelt2.suse.de> # Recommended update for protobuf-c Announcement ID: SUSE-RU-2023:3543-1 Rating: moderate References: * #1214006 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for protobuf-c fixes the following issues: * Add missing Provides/Obsoletes after package merge (bsc#1214006) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3543=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3543=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3543=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3543=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3543=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3543=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3543=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3543=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3543=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3543=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3543=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3543=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3543=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3543=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-3543=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3543=1 ## Package List: * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * SUSE Manager Proxy 4.2 (x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libprotobuf-c1-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c-devel-1.3.2-150200.3.9.1 * protobuf-c-debugsource-1.3.2-150200.3.9.1 * protobuf-c-debuginfo-1.3.2-150200.3.9.1 * libprotobuf-c1-1.3.2-150200.3.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214006 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 6 08:31:58 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 06 Sep 2023 08:31:58 -0000 Subject: SUSE-RU-2023:3542-1: moderate: Recommended update for mdadm Message-ID: <169398911885.25056.11396470331567888269@smelt2.suse.de> # Recommended update for mdadm Announcement ID: SUSE-RU-2023:3542-1 Rating: moderate References: * #1214427 Affected Products: * Basesystem Module 15-SP4 * openSUSE Leap 15.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for mdadm fixes the following issues: * Make sure initramfs is rebuilt in %posttrans (bsc#1214427) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3542=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3542=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3542=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3542=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3542=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3542=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3542=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3542=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3542=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3542=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3542=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3542=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3542=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3542=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3542=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3542=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3542=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Manager Proxy 4.2 (x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * mdadm-debuginfo-4.1-150300.24.30.1 * mdadm-debugsource-4.1-150300.24.30.1 * mdadm-4.1-150300.24.30.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214427 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 6 16:30:14 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 06 Sep 2023 16:30:14 -0000 Subject: SUSE-RU-2023:3546-1: low: Recommended update for open-iscsi Message-ID: <169401781457.14494.7597125445528674280@smelt2.suse.de> # Recommended update for open-iscsi Announcement ID: SUSE-RU-2023:3546-1 Rating: low References: * #1207157 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that has one fix can now be installed. ## Description: This update for open-iscsi fixes the following issues: -Set 'safe_logout' and 'startup' in iscsid.conf (bsc#1207157) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3546=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3546=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-3546=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3546=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3546=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3546=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3546=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3546=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3546=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3546=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3546=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3546=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * open-iscsi-debugsource-2.1.7-150300.32.24.1 * iscsiuio-0.7.8.6-150300.32.24.1 * libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.24.1 * open-iscsi-devel-2.1.7-150300.32.24.1 * open-iscsi-2.1.7-150300.32.24.1 * libopeniscsiusr0_2_0-2.1.7-150300.32.24.1 * open-iscsi-debuginfo-2.1.7-150300.32.24.1 * iscsiuio-debuginfo-0.7.8.6-150300.32.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * open-iscsi-debugsource-2.1.7-150300.32.24.1 * iscsiuio-0.7.8.6-150300.32.24.1 * libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.24.1 * open-iscsi-devel-2.1.7-150300.32.24.1 * open-iscsi-2.1.7-150300.32.24.1 * libopeniscsiusr0_2_0-2.1.7-150300.32.24.1 * open-iscsi-debuginfo-2.1.7-150300.32.24.1 * iscsiuio-debuginfo-0.7.8.6-150300.32.24.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * open-iscsi-debugsource-2.1.7-150300.32.24.1 * iscsiuio-0.7.8.6-150300.32.24.1 * libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.24.1 * open-iscsi-devel-2.1.7-150300.32.24.1 * open-iscsi-2.1.7-150300.32.24.1 * libopeniscsiusr0_2_0-2.1.7-150300.32.24.1 * open-iscsi-debuginfo-2.1.7-150300.32.24.1 * iscsiuio-debuginfo-0.7.8.6-150300.32.24.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * open-iscsi-debugsource-2.1.7-150300.32.24.1 * iscsiuio-0.7.8.6-150300.32.24.1 * libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.24.1 * open-iscsi-devel-2.1.7-150300.32.24.1 * open-iscsi-2.1.7-150300.32.24.1 * libopeniscsiusr0_2_0-2.1.7-150300.32.24.1 * open-iscsi-debuginfo-2.1.7-150300.32.24.1 * iscsiuio-debuginfo-0.7.8.6-150300.32.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * open-iscsi-debugsource-2.1.7-150300.32.24.1 * iscsiuio-0.7.8.6-150300.32.24.1 * libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.24.1 * open-iscsi-devel-2.1.7-150300.32.24.1 * open-iscsi-2.1.7-150300.32.24.1 * libopeniscsiusr0_2_0-2.1.7-150300.32.24.1 * open-iscsi-debuginfo-2.1.7-150300.32.24.1 * iscsiuio-debuginfo-0.7.8.6-150300.32.24.1 * SUSE Manager Proxy 4.2 (x86_64) * open-iscsi-debugsource-2.1.7-150300.32.24.1 * iscsiuio-0.7.8.6-150300.32.24.1 * libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.24.1 * open-iscsi-devel-2.1.7-150300.32.24.1 * open-iscsi-2.1.7-150300.32.24.1 * libopeniscsiusr0_2_0-2.1.7-150300.32.24.1 * open-iscsi-debuginfo-2.1.7-150300.32.24.1 * iscsiuio-debuginfo-0.7.8.6-150300.32.24.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * open-iscsi-debugsource-2.1.7-150300.32.24.1 * iscsiuio-0.7.8.6-150300.32.24.1 * libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.24.1 * open-iscsi-devel-2.1.7-150300.32.24.1 * open-iscsi-2.1.7-150300.32.24.1 * libopeniscsiusr0_2_0-2.1.7-150300.32.24.1 * open-iscsi-debuginfo-2.1.7-150300.32.24.1 * iscsiuio-debuginfo-0.7.8.6-150300.32.24.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * open-iscsi-debugsource-2.1.7-150300.32.24.1 * iscsiuio-0.7.8.6-150300.32.24.1 * libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.24.1 * open-iscsi-devel-2.1.7-150300.32.24.1 * open-iscsi-2.1.7-150300.32.24.1 * libopeniscsiusr0_2_0-2.1.7-150300.32.24.1 * open-iscsi-debuginfo-2.1.7-150300.32.24.1 * iscsiuio-debuginfo-0.7.8.6-150300.32.24.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * open-iscsi-debugsource-2.1.7-150300.32.24.1 * iscsiuio-0.7.8.6-150300.32.24.1 * libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.24.1 * open-iscsi-devel-2.1.7-150300.32.24.1 * open-iscsi-2.1.7-150300.32.24.1 * libopeniscsiusr0_2_0-2.1.7-150300.32.24.1 * open-iscsi-debuginfo-2.1.7-150300.32.24.1 * iscsiuio-debuginfo-0.7.8.6-150300.32.24.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * open-iscsi-debugsource-2.1.7-150300.32.24.1 * iscsiuio-0.7.8.6-150300.32.24.1 * libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.24.1 * open-iscsi-2.1.7-150300.32.24.1 * libopeniscsiusr0_2_0-2.1.7-150300.32.24.1 * open-iscsi-debuginfo-2.1.7-150300.32.24.1 * iscsiuio-debuginfo-0.7.8.6-150300.32.24.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * open-iscsi-debugsource-2.1.7-150300.32.24.1 * iscsiuio-0.7.8.6-150300.32.24.1 * libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.24.1 * open-iscsi-2.1.7-150300.32.24.1 * libopeniscsiusr0_2_0-2.1.7-150300.32.24.1 * open-iscsi-debuginfo-2.1.7-150300.32.24.1 * iscsiuio-debuginfo-0.7.8.6-150300.32.24.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * open-iscsi-debugsource-2.1.7-150300.32.24.1 * iscsiuio-0.7.8.6-150300.32.24.1 * libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.24.1 * open-iscsi-2.1.7-150300.32.24.1 * libopeniscsiusr0_2_0-2.1.7-150300.32.24.1 * open-iscsi-debuginfo-2.1.7-150300.32.24.1 * iscsiuio-debuginfo-0.7.8.6-150300.32.24.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1207157 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Fri Sep 8 12:30:27 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Fri, 08 Sep 2023 12:30:27 -0000 Subject: SUSE-SU-2023:2604-2: moderate: Security update for open-vm-tools Message-ID: <169417622709.17721.2747116715959630145@smelt2.suse.de> # Security update for open-vm-tools Announcement ID: SUSE-SU-2023:2604-2 Rating: moderate References: * #1210695 * #1212143 Cross-References: * CVE-2023-20867 CVSS scores: * CVE-2023-20867 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N * CVE-2023-20867 ( NVD ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: * CVE-2023-20867: Fixed authentication bypass vulnerability in the vgauth module (bsc#1212143). Bug fixes: * Fixed build problem with grpc 1.54 (bsc#1210695). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2604=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2604=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2604=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2604=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-2604=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2604=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-2604=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2604=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * open-vm-tools-sdmp-debuginfo-12.2.0-150300.29.1 * open-vm-tools-desktop-12.2.0-150300.29.1 * open-vm-tools-debuginfo-12.2.0-150300.29.1 * open-vm-tools-debugsource-12.2.0-150300.29.1 * libvmtools0-debuginfo-12.2.0-150300.29.1 * libvmtools-devel-12.2.0-150300.29.1 * open-vm-tools-sdmp-12.2.0-150300.29.1 * libvmtools0-12.2.0-150300.29.1 * open-vm-tools-12.2.0-150300.29.1 * open-vm-tools-desktop-debuginfo-12.2.0-150300.29.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * open-vm-tools-sdmp-debuginfo-12.2.0-150300.29.1 * open-vm-tools-desktop-12.2.0-150300.29.1 * open-vm-tools-debuginfo-12.2.0-150300.29.1 * open-vm-tools-salt-minion-12.2.0-150300.29.1 * open-vm-tools-debugsource-12.2.0-150300.29.1 * libvmtools0-debuginfo-12.2.0-150300.29.1 * libvmtools-devel-12.2.0-150300.29.1 * open-vm-tools-sdmp-12.2.0-150300.29.1 * libvmtools0-12.2.0-150300.29.1 * open-vm-tools-12.2.0-150300.29.1 * open-vm-tools-desktop-debuginfo-12.2.0-150300.29.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * open-vm-tools-sdmp-debuginfo-12.2.0-150300.29.1 * open-vm-tools-desktop-12.2.0-150300.29.1 * open-vm-tools-debuginfo-12.2.0-150300.29.1 * open-vm-tools-debugsource-12.2.0-150300.29.1 * libvmtools0-debuginfo-12.2.0-150300.29.1 * libvmtools-devel-12.2.0-150300.29.1 * open-vm-tools-sdmp-12.2.0-150300.29.1 * libvmtools0-12.2.0-150300.29.1 * open-vm-tools-12.2.0-150300.29.1 * open-vm-tools-desktop-debuginfo-12.2.0-150300.29.1 * SUSE Manager Proxy 4.2 (x86_64) * open-vm-tools-sdmp-debuginfo-12.2.0-150300.29.1 * open-vm-tools-debuginfo-12.2.0-150300.29.1 * open-vm-tools-debugsource-12.2.0-150300.29.1 * libvmtools0-debuginfo-12.2.0-150300.29.1 * libvmtools-devel-12.2.0-150300.29.1 * open-vm-tools-sdmp-12.2.0-150300.29.1 * libvmtools0-12.2.0-150300.29.1 * open-vm-tools-12.2.0-150300.29.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * open-vm-tools-sdmp-debuginfo-12.2.0-150300.29.1 * open-vm-tools-debuginfo-12.2.0-150300.29.1 * open-vm-tools-debugsource-12.2.0-150300.29.1 * libvmtools0-debuginfo-12.2.0-150300.29.1 * libvmtools-devel-12.2.0-150300.29.1 * open-vm-tools-sdmp-12.2.0-150300.29.1 * libvmtools0-12.2.0-150300.29.1 * open-vm-tools-12.2.0-150300.29.1 * SUSE Manager Server 4.2 (x86_64) * open-vm-tools-sdmp-debuginfo-12.2.0-150300.29.1 * open-vm-tools-debuginfo-12.2.0-150300.29.1 * open-vm-tools-debugsource-12.2.0-150300.29.1 * libvmtools0-debuginfo-12.2.0-150300.29.1 * libvmtools-devel-12.2.0-150300.29.1 * open-vm-tools-sdmp-12.2.0-150300.29.1 * libvmtools0-12.2.0-150300.29.1 * open-vm-tools-12.2.0-150300.29.1 * SUSE Enterprise Storage 7.1 (x86_64) * open-vm-tools-sdmp-debuginfo-12.2.0-150300.29.1 * open-vm-tools-desktop-12.2.0-150300.29.1 * open-vm-tools-debuginfo-12.2.0-150300.29.1 * open-vm-tools-salt-minion-12.2.0-150300.29.1 * open-vm-tools-debugsource-12.2.0-150300.29.1 * libvmtools0-debuginfo-12.2.0-150300.29.1 * libvmtools-devel-12.2.0-150300.29.1 * open-vm-tools-sdmp-12.2.0-150300.29.1 * libvmtools0-12.2.0-150300.29.1 * open-vm-tools-12.2.0-150300.29.1 * open-vm-tools-desktop-debuginfo-12.2.0-150300.29.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * open-vm-tools-sdmp-debuginfo-12.2.0-150300.29.1 * open-vm-tools-desktop-12.2.0-150300.29.1 * open-vm-tools-debuginfo-12.2.0-150300.29.1 * open-vm-tools-salt-minion-12.2.0-150300.29.1 * open-vm-tools-debugsource-12.2.0-150300.29.1 * libvmtools0-debuginfo-12.2.0-150300.29.1 * libvmtools-devel-12.2.0-150300.29.1 * open-vm-tools-sdmp-12.2.0-150300.29.1 * libvmtools0-12.2.0-150300.29.1 * open-vm-tools-12.2.0-150300.29.1 * open-vm-tools-desktop-debuginfo-12.2.0-150300.29.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20867.html * https://bugzilla.suse.com/show_bug.cgi?id=1210695 * https://bugzilla.suse.com/show_bug.cgi?id=1212143 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Fri Sep 8 16:30:17 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Fri, 08 Sep 2023 16:30:17 -0000 Subject: SUSE-SU-2023:3563-1: moderate: Security update for icu73_2 Message-ID: <169419061767.931.17377755106361707021@smelt2.suse.de> # Security update for icu73_2 Announcement ID: SUSE-SU-2023:3563-1 Rating: moderate References: * #1030253 * #1095425 * #1103893 * #1112183 * #1146907 * #1158955 * #1159131 * #1161007 * #1162882 * #1166844 * #1167603 * #1182252 * #1182645 * #1192935 * #1193951 * #354372 * #437293 * #824262 * PED-4917 * SLE-11118 Cross-References: * CVE-2020-10531 * CVE-2020-21913 CVSS scores: * CVE-2020-10531 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2020-10531 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2020-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2020-21913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves two vulnerabilities, contains two features and has 16 security fixes can now be installed. ## Description: This update for icu73_2 fixes the following issues: * Update to release 73.2 * CLDR extends the support for ?short? Chinese sort orders to cover some additional, required characters for Level 2. This is carried over into ICU collation. * ICU has a modified character conversion table, mapping some GB18030 characters to Unicode characters that were encoded after GB18030-2005. * fixes builds where UCHAR_TYPE is re-defined such as libqt5-qtwebengine * Update to release 73.1 * Improved Japanese and Korean short-text line breaking * Reduction of C++ memory use in date formatting * Update to release 72.1 * Support for Unicode 15, including new characters, scripts, emoji, and corresponding API constants. * Support for CLDR 42 locale data with various additions and corrections. * Shift to tzdb 2022e. Pre-1970 data for a number of timezones has been removed. * bump library packagename to libicu71 to match the version. * update to 71.1: * updates to CLDR 41 locale data with various additions and corrections. * phrase-based line breaking for Japanese. Existing line breaking methods follow standards and conventions for body text but do not work well for short Japanese text, such as in titles and headings. This new feature is optimized for these use cases. * support for Hindi written in Latin letters (hi_Latn). The CLDR data for this increasingly popular locale has been significantly revised and expanded. Note that based on user expectations, hi_Latn incorporates a large amount of English, and can also be referred to as ?Hinglish?. * time zone data updated to version 2022a. Note that pre-1970 data for a number of time zones has been removed, as has been the case in the upstream tzdata release since 2021b. * ICU-21793 Fix ucptrietest golden diff [bsc#1192935] * Update to release 70.1: * Unicode 14 (new characters, scripts, emoji, and API constants) * CLDR 40 (many additions and corrections) * Fixes for measurement unit formatting * Can now be built with up to C++20 compilers * ICU-21613 Fix undefined behaviour in ComplexUnitsConverter::applyRounder * Update to release 69.1 * CLDR 39 * For Norwegian, "no" is back to being the canonical code, with "nb" treated as equivalent. This aligns handling of Norwegian with other macro language codes. * Binary prefixes in measurement units (KiB, MiB, etc.) * Time zone offsets from local time: New APIs BasicTimeZone::getOffsetFromLocal() (C++) and ucal_getTimeZoneOffsetFromLocal() * Backport ICU-21366 (bsc#1182645) * Update to release 68.2 * Fix memory problem in FormattedStringBuilder * Fix assertion when setKeywordValue w/ long value. * Fix UBSan breakage on 8bit of rbbi * fix int32_t overflow in listFormat * Fix memory handling in MemoryPool::operator=() * Fix memory leak in AliasReplacer * Add back icu.keyring, see https://unicode-org.atlassian.net/browse/ICU-21361 * Update to release 68.1 * CLDR 38 * Measurement unit preferences * PluralRules selection for ranges of numbers * Locale ID canonicalization now conforms to the CLDR spec including edge cases * DateIntervalFormat supports output options such as capitalization * Measurement units are normalized in skeleton string output * Time zone data (tzdata) version 2020d * Add the provides for libicu to Make .Net core can install successfully. (bsc#1167603, bsc#1161007) * Update to version 67.1 * Unicode 13 (ICU-20893, same as in ICU 66) * Total of 5930 new characters * 4 new scripts * 55 new emoji characters, plus additional new sequences * New CJK extension, first characters in plane 3: U+30000..U+3134A * CLDR 37 * New language at Modern coverage: Nigerian Pidgin * New languages at Basic coverage: Fulah (Adlam), Maithili, Manipuri, Santali, Sindhi (Devanagari), Sundanese * Region containment: EU no longer includes GB * Unicode 13 root collation data and Chinese data for collation and transliteration * DateTimePatternGenerator now obeys the "hc" preference in the locale identifier (ICU-20442) * Various other improvements for ECMA-402 conformance * Number skeletons have a new "concise" form that can be used in MessageFormat strings (ICU-20418) * Currency formatting options for formal and other currency display name variants (ICU-20854) * ListFormatter: new public API to select the style & type (ICU-12863) * ListFormatter now selects the proper ?and?/?or? form for Spanish & Hebrew (ICU-21016) * Locale ID canonicalization upgraded to implement the complete CLDR spec (ICU-20834, ICU-20272) * LocaleMatcher: New option to ignore one-way matches (ICU-20936), and other tweaks to the code (ICU-20916, ICU-20917) and data (from CLDR) * acceptLanguage() reimplemented via LocaleMatcher (ICU-20700) * Data build tool: tzdbNames.res moved from the "zone_tree" category to the "zone_supplemental" category (ICU-21073) * Fixed uses of u8"literals" broken by the C++20 introduction of the incompatible char8_t type (ICU-20972), * and added a few API overloads to reduce the need for reinterpret_cast (ICU-20984). * Support for manipulating CLDR 37 unit identifiers in MeasureUnit. * Fix potential integer overflow in UnicodeString:doAppend (bsc#1166844, CVE-2020-10531). * Update to version 66.1 * Unicode 13 support * Fix uses of u8"literals" broken by C++20 introduction of incompatible char8_t type. (ICU-20972) * use LocalMemory for cmd to prevent use after free (bsc#1193951 CVE-2020-21913). * Remove /usr/lib(64)/icu/current [bsc#1158955]. * Update to release 65.1 (jsc#SLE-11118). * Updated to CLDR 36 locale data with many additions and corrections, and some new measurement units. * The Java LocaleMatcher API is improved, and ported to C++. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3563=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3563=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3563=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3563=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3563=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3563=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3563=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3563=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3563=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3563=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3563=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3563=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3563=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3563=1 ## Package List: * SUSE Manager Retail Branch Server 4.2 (x86_64) * libicu73_2-debuginfo-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-devel-73.2-150000.1.3.1 * libicu73_2-doc-73.2-150000.1.3.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libicu73_2-debuginfo-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-devel-73.2-150000.1.3.1 * libicu73_2-doc-73.2-150000.1.3.1 * SUSE Manager Server 4.2 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * libicu73_2-bedata-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * libicu73_2-debuginfo-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * libicu73_2-bedata-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * libicu73_2-debuginfo-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * libicu73_2-bedata-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * libicu73_2-debuginfo-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * libicu73_2-bedata-73.2-150000.1.3.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libicu73_2-debuginfo-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * icu73_2-73.2-150000.1.3.1 * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-devel-73.2-150000.1.3.1 * icu73_2-debuginfo-73.2-150000.1.3.1 * libicu73_2-doc-73.2-150000.1.3.1 * openSUSE Leap 15.4 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * libicu73_2-bedata-73.2-150000.1.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libicu73_2-debuginfo-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * icu73_2-73.2-150000.1.3.1 * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-devel-73.2-150000.1.3.1 * icu73_2-debuginfo-73.2-150000.1.3.1 * libicu73_2-doc-73.2-150000.1.3.1 * openSUSE Leap 15.5 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * libicu73_2-bedata-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * libicu73_2-debuginfo-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * libicu73_2-bedata-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * libicu73_2-debuginfo-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * libicu73_2-bedata-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * libicu73_2-debuginfo-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * libicu73_2-bedata-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * libicu73_2-debuginfo-73.2-150000.1.3.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * libicu73_2-bedata-73.2-150000.1.3.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libicu73_2-debuginfo-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-devel-73.2-150000.1.3.1 * libicu73_2-doc-73.2-150000.1.3.1 * Basesystem Module 15-SP4 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * libicu73_2-bedata-73.2-150000.1.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libicu73_2-debuginfo-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-devel-73.2-150000.1.3.1 * libicu73_2-doc-73.2-150000.1.3.1 * Basesystem Module 15-SP5 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 * libicu73_2-bedata-73.2-150000.1.3.1 * SUSE Manager Proxy 4.2 (x86_64) * libicu73_2-debuginfo-73.2-150000.1.3.1 * libicu73_2-73.2-150000.1.3.1 * icu73_2-debugsource-73.2-150000.1.3.1 * libicu73_2-devel-73.2-150000.1.3.1 * libicu73_2-doc-73.2-150000.1.3.1 * SUSE Manager Proxy 4.2 (noarch) * libicu73_2-ledata-73.2-150000.1.3.1 ## References: * https://www.suse.com/security/cve/CVE-2020-10531.html * https://www.suse.com/security/cve/CVE-2020-21913.html * https://bugzilla.suse.com/show_bug.cgi?id=1030253 * https://bugzilla.suse.com/show_bug.cgi?id=1095425 * https://bugzilla.suse.com/show_bug.cgi?id=1103893 * https://bugzilla.suse.com/show_bug.cgi?id=1112183 * https://bugzilla.suse.com/show_bug.cgi?id=1146907 * https://bugzilla.suse.com/show_bug.cgi?id=1158955 * https://bugzilla.suse.com/show_bug.cgi?id=1159131 * https://bugzilla.suse.com/show_bug.cgi?id=1161007 * https://bugzilla.suse.com/show_bug.cgi?id=1162882 * https://bugzilla.suse.com/show_bug.cgi?id=1166844 * https://bugzilla.suse.com/show_bug.cgi?id=1167603 * https://bugzilla.suse.com/show_bug.cgi?id=1182252 * https://bugzilla.suse.com/show_bug.cgi?id=1182645 * https://bugzilla.suse.com/show_bug.cgi?id=1192935 * https://bugzilla.suse.com/show_bug.cgi?id=1193951 * https://bugzilla.suse.com/show_bug.cgi?id=354372 * https://bugzilla.suse.com/show_bug.cgi?id=437293 * https://bugzilla.suse.com/show_bug.cgi?id=824262 * https://jira.suse.com/browse/PED-4917 * https://jira.suse.com/browse/SLE-11118 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Fri Sep 8 16:30:22 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Fri, 08 Sep 2023 16:30:22 -0000 Subject: SUSE-SU-2023:3561-1: important: Security update for skopeo Message-ID: <169419062226.931.5218528558893176592@smelt2.suse.de> # Security update for skopeo Announcement ID: SUSE-SU-2023:3561-1 Rating: important References: * #1212475 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has one security fix can now be installed. ## Description: This update of skopeo fixes the following issues: * rebuild the package with the go 1.21 security release (bsc#1212475). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3561=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3561=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3561=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3561=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3561=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3561=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3561=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3561=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3561=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3561=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3561=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3561=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.12.0-150300.11.5.1 * skopeo-1.12.0-150300.11.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.12.0-150300.11.5.1 * skopeo-1.12.0-150300.11.5.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.12.0-150300.11.5.1 * skopeo-1.12.0-150300.11.5.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.12.0-150300.11.5.1 * skopeo-1.12.0-150300.11.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * skopeo-debuginfo-1.12.0-150300.11.5.1 * skopeo-1.12.0-150300.11.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * skopeo-debuginfo-1.12.0-150300.11.5.1 * skopeo-1.12.0-150300.11.5.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.12.0-150300.11.5.1 * skopeo-1.12.0-150300.11.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * skopeo-debuginfo-1.12.0-150300.11.5.1 * skopeo-1.12.0-150300.11.5.1 * SUSE Manager Proxy 4.2 (x86_64) * skopeo-debuginfo-1.12.0-150300.11.5.1 * skopeo-1.12.0-150300.11.5.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * skopeo-debuginfo-1.12.0-150300.11.5.1 * skopeo-1.12.0-150300.11.5.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * skopeo-debuginfo-1.12.0-150300.11.5.1 * skopeo-1.12.0-150300.11.5.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * skopeo-debuginfo-1.12.0-150300.11.5.1 * skopeo-1.12.0-150300.11.5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212475 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Fri Sep 8 16:30:25 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Fri, 08 Sep 2023 16:30:25 -0000 Subject: SUSE-SU-2023:3560-1: important: Security update for geoipupdate Message-ID: <169419062533.931.13147562557776688416@smelt2.suse.de> # Security update for geoipupdate Announcement ID: SUSE-SU-2023:3560-1 Rating: important References: * #1212475 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has one security fix can now be installed. ## Description: This update of geoipupdate fixes the following issues: * rebuild the package with the go 1.21 security release (bsc#1212475). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3560=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3560=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3560=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3560=1 * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-3560=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3560=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3560=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3560=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3560=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3560=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3560=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3560=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3560=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3560=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3560=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3560=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3560=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3560=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3560=1 ## Package List: * SUSE Manager Proxy 4.2 (x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Enterprise Storage 7 (aarch64 x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE CaaS Platform 4.0 (x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * geoipupdate-legacy-4.2.2-150000.1.14.1 * geoipupdate-4.2.2-150000.1.14.1 * geoipupdate-debuginfo-4.2.2-150000.1.14.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212475 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Fri Sep 8 16:30:39 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Fri, 08 Sep 2023 16:30:39 -0000 Subject: SUSE-SU-2023:3555-1: important: Security update for libssh2_org Message-ID: <169419063992.931.10710574744408474656@smelt2.suse.de> # Security update for libssh2_org Announcement ID: SUSE-SU-2023:3555-1 Rating: important References: * #1214527 Cross-References: * CVE-2020-22218 CVSS scores: * CVE-2020-22218 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2020-22218 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for libssh2_org fixes the following issues: * CVE-2020-22218: Fixed a bug in _libssh2_packet_add() which allows to access out of bounds memory. (bsc#1214527) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3555=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3555=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3555=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3555=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3555=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3555=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3555=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3555=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3555=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3555=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3555=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3555=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3555=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3555=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3555=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3555=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3555=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3555=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3555=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3555=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3555=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3555=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3555=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3555=1 * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-3555=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3555=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * openSUSE Leap 15.4 (x86_64) * libssh2-1-32bit-1.9.0-150000.4.16.1 * libssh2-1-32bit-debuginfo-1.9.0-150000.4.16.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * openSUSE Leap 15.5 (x86_64) * libssh2-1-32bit-1.9.0-150000.4.16.1 * libssh2-1-32bit-debuginfo-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64) * libssh2-1-32bit-1.9.0-150000.4.16.1 * libssh2-1-32bit-debuginfo-1.9.0-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libssh2-1-32bit-1.9.0-150000.4.16.1 * libssh2-1-32bit-debuginfo-1.9.0-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64) * libssh2-1-32bit-1.9.0-150000.4.16.1 * libssh2-1-32bit-debuginfo-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libssh2-1-32bit-1.9.0-150000.4.16.1 * libssh2-1-32bit-debuginfo-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64) * libssh2-1-32bit-1.9.0-150000.4.16.1 * libssh2-1-32bit-debuginfo-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libssh2-1-32bit-1.9.0-150000.4.16.1 * libssh2-1-32bit-debuginfo-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Manager Proxy 4.2 (x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Enterprise Storage 7 (aarch64 x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * SUSE Enterprise Storage 7 (x86_64) * libssh2-1-32bit-1.9.0-150000.4.16.1 * libssh2-1-32bit-debuginfo-1.9.0-150000.4.16.1 * SUSE CaaS Platform 4.0 (x86_64) * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-1-32bit-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 * libssh2-devel-1.9.0-150000.4.16.1 * libssh2-1-32bit-1.9.0-150000.4.16.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libssh2_org-debugsource-1.9.0-150000.4.16.1 * libssh2-1-debuginfo-1.9.0-150000.4.16.1 * libssh2-1-1.9.0-150000.4.16.1 ## References: * https://www.suse.com/security/cve/CVE-2020-22218.html * https://bugzilla.suse.com/show_bug.cgi?id=1214527 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Mon Sep 18 12:30:17 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Mon, 18 Sep 2023 12:30:17 -0000 Subject: SUSE-SU-2023:3639-1: moderate: Security update for libeconf Message-ID: <169504021710.826.14501798092362946647@smelt2.suse.de> # Security update for libeconf Announcement ID: SUSE-SU-2023:3639-1 Rating: moderate References: * #1198165 * #1211078 Cross-References: * CVE-2023-22652 * CVE-2023-30078 * CVE-2023-30079 * CVE-2023-32181 CVSS scores: * CVE-2023-22652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-22652 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2023-30078 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-30078 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-30079 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-30079 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-32181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-32181 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves four vulnerabilities can now be installed. ## Description: This update for libeconf fixes the following issues: Update to version 0.5.2. * CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability in "econf_writeFile" function (bsc#1211078). * CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability in "read_file" function. (bsc#1211078) The following non-security bug was fixed: * Fixed parsing files correctly which have space characters AND none space characters as delimiters (bsc#1198165). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3639=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3639=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3639=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3639=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3639=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3639=1 ## Package List: * SUSE Manager Proxy 4.2 (x86_64) * libeconf-debugsource-0.5.2-150300.3.11.1 * libeconf0-debuginfo-0.5.2-150300.3.11.1 * libeconf0-0.5.2-150300.3.11.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libeconf-debugsource-0.5.2-150300.3.11.1 * libeconf0-debuginfo-0.5.2-150300.3.11.1 * libeconf0-0.5.2-150300.3.11.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libeconf-debugsource-0.5.2-150300.3.11.1 * libeconf0-debuginfo-0.5.2-150300.3.11.1 * libeconf0-0.5.2-150300.3.11.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libeconf-debugsource-0.5.2-150300.3.11.1 * libeconf0-debuginfo-0.5.2-150300.3.11.1 * libeconf0-0.5.2-150300.3.11.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libeconf-debugsource-0.5.2-150300.3.11.1 * libeconf0-debuginfo-0.5.2-150300.3.11.1 * libeconf0-0.5.2-150300.3.11.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libeconf-debugsource-0.5.2-150300.3.11.1 * libeconf0-debuginfo-0.5.2-150300.3.11.1 * libeconf0-0.5.2-150300.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2023-22652.html * https://www.suse.com/security/cve/CVE-2023-30078.html * https://www.suse.com/security/cve/CVE-2023-30079.html * https://www.suse.com/security/cve/CVE-2023-32181.html * https://bugzilla.suse.com/show_bug.cgi?id=1198165 * https://bugzilla.suse.com/show_bug.cgi?id=1211078 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Mon Sep 18 12:30:35 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Mon, 18 Sep 2023 12:30:35 -0000 Subject: SUSE-SU-2023:3635-1: moderate: Security update for flac Message-ID: <169504023528.826.8252853699412454220@smelt2.suse.de> # Security update for flac Announcement ID: SUSE-SU-2023:3635-1 Rating: moderate References: * #1214615 Cross-References: * CVE-2020-22219 CVSS scores: * CVE-2020-22219 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2020-22219 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for flac fixes the following issues: * CVE-2020-22219: Fixed a buffer overflow in function bitwriter_grow_ which might allow a remote attacker to run arbitrary code via crafted input to the encoder. (bsc#1214615) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3635=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3635=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3635=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3635=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3635=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3635=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3635=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3635=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3635=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * flac-devel-1.3.2-150000.3.14.1 * libFLAC8-debuginfo-1.3.2-150000.3.14.1 * flac-1.3.2-150000.3.14.1 * libFLAC8-1.3.2-150000.3.14.1 * libFLAC++6-1.3.2-150000.3.14.1 * flac-debuginfo-1.3.2-150000.3.14.1 * flac-debugsource-1.3.2-150000.3.14.1 * libFLAC++6-debuginfo-1.3.2-150000.3.14.1 * openSUSE Leap 15.4 (x86_64) * flac-devel-32bit-1.3.2-150000.3.14.1 * libFLAC++6-32bit-1.3.2-150000.3.14.1 * libFLAC++6-32bit-debuginfo-1.3.2-150000.3.14.1 * libFLAC8-32bit-debuginfo-1.3.2-150000.3.14.1 * libFLAC8-32bit-1.3.2-150000.3.14.1 * openSUSE Leap 15.4 (noarch) * flac-doc-1.3.2-150000.3.14.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * flac-devel-1.3.2-150000.3.14.1 * libFLAC8-debuginfo-1.3.2-150000.3.14.1 * flac-1.3.2-150000.3.14.1 * libFLAC8-1.3.2-150000.3.14.1 * libFLAC++6-1.3.2-150000.3.14.1 * flac-debuginfo-1.3.2-150000.3.14.1 * flac-debugsource-1.3.2-150000.3.14.1 * libFLAC++6-debuginfo-1.3.2-150000.3.14.1 * openSUSE Leap 15.5 (x86_64) * flac-devel-32bit-1.3.2-150000.3.14.1 * libFLAC++6-32bit-1.3.2-150000.3.14.1 * libFLAC++6-32bit-debuginfo-1.3.2-150000.3.14.1 * libFLAC8-32bit-debuginfo-1.3.2-150000.3.14.1 * libFLAC8-32bit-1.3.2-150000.3.14.1 * openSUSE Leap 15.5 (noarch) * flac-doc-1.3.2-150000.3.14.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * flac-devel-1.3.2-150000.3.14.1 * libFLAC8-debuginfo-1.3.2-150000.3.14.1 * libFLAC8-1.3.2-150000.3.14.1 * libFLAC++6-1.3.2-150000.3.14.1 * flac-debuginfo-1.3.2-150000.3.14.1 * flac-debugsource-1.3.2-150000.3.14.1 * libFLAC++6-debuginfo-1.3.2-150000.3.14.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * flac-devel-1.3.2-150000.3.14.1 * libFLAC8-debuginfo-1.3.2-150000.3.14.1 * libFLAC8-1.3.2-150000.3.14.1 * libFLAC++6-1.3.2-150000.3.14.1 * flac-debuginfo-1.3.2-150000.3.14.1 * flac-debugsource-1.3.2-150000.3.14.1 * libFLAC++6-debuginfo-1.3.2-150000.3.14.1 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64) * flac-debugsource-1.3.2-150000.3.14.1 * flac-1.3.2-150000.3.14.1 * flac-debuginfo-1.3.2-150000.3.14.1 * SUSE Package Hub 15 15-SP4 (x86_64) * libFLAC8-32bit-debuginfo-1.3.2-150000.3.14.1 * libFLAC8-32bit-1.3.2-150000.3.14.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * flac-debugsource-1.3.2-150000.3.14.1 * flac-1.3.2-150000.3.14.1 * flac-debuginfo-1.3.2-150000.3.14.1 * SUSE Package Hub 15 15-SP5 (x86_64) * libFLAC8-32bit-debuginfo-1.3.2-150000.3.14.1 * libFLAC8-32bit-1.3.2-150000.3.14.1 * SUSE Manager Proxy 4.2 (x86_64) * flac-devel-1.3.2-150000.3.14.1 * libFLAC8-debuginfo-1.3.2-150000.3.14.1 * libFLAC8-1.3.2-150000.3.14.1 * libFLAC++6-1.3.2-150000.3.14.1 * flac-debuginfo-1.3.2-150000.3.14.1 * flac-debugsource-1.3.2-150000.3.14.1 * libFLAC++6-debuginfo-1.3.2-150000.3.14.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * flac-devel-1.3.2-150000.3.14.1 * libFLAC8-debuginfo-1.3.2-150000.3.14.1 * libFLAC8-1.3.2-150000.3.14.1 * libFLAC++6-1.3.2-150000.3.14.1 * flac-debuginfo-1.3.2-150000.3.14.1 * flac-debugsource-1.3.2-150000.3.14.1 * libFLAC++6-debuginfo-1.3.2-150000.3.14.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * flac-devel-1.3.2-150000.3.14.1 * libFLAC8-debuginfo-1.3.2-150000.3.14.1 * libFLAC8-1.3.2-150000.3.14.1 * libFLAC++6-1.3.2-150000.3.14.1 * flac-debuginfo-1.3.2-150000.3.14.1 * flac-debugsource-1.3.2-150000.3.14.1 * libFLAC++6-debuginfo-1.3.2-150000.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2020-22219.html * https://bugzilla.suse.com/show_bug.cgi?id=1214615 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Mon Sep 18 12:30:38 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Mon, 18 Sep 2023 12:30:38 -0000 Subject: SUSE-SU-2023:3634-1: critical: Security update for libwebp Message-ID: <169504023847.826.10309456673588695146@smelt2.suse.de> # Security update for libwebp Announcement ID: SUSE-SU-2023:3634-1 Rating: critical References: * #1215231 Cross-References: * CVE-2023-4863 CVSS scores: * CVE-2023-4863 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libwebp fixes the following issues: * CVE-2023-4863: Fixed heap buffer overflow (bsc#1215231). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3634=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3634=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3634=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3634=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3634=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3634=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3634=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3634=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3634=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3634=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3634=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3634=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3634=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3634=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3634=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3634=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3634=1 ## Package List: * SUSE Package Hub 15 15-SP4 (x86_64) * libwebp7-32bit-debuginfo-1.0.3-150200.3.10.1 * libwebp7-32bit-1.0.3-150200.3.10.1 * SUSE Package Hub 15 15-SP5 (x86_64) * libwebp-debugsource-1.0.3-150200.3.10.1 * libwebp7-32bit-1.0.3-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * SUSE Manager Proxy 4.2 (x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebp-tools-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp-tools-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * openSUSE Leap 15.4 (x86_64) * libwebp7-32bit-1.0.3-150200.3.10.1 * libwebpdemux2-32bit-1.0.3-150200.3.10.1 * libwebpdemux2-32bit-debuginfo-1.0.3-150200.3.10.1 * libwebpdecoder3-32bit-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-32bit-1.0.3-150200.3.10.1 * libwebp7-32bit-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-32bit-1.0.3-150200.3.10.1 * libwebpdecoder3-32bit-1.0.3-150200.3.10.1 * libwebpmux3-32bit-debuginfo-1.0.3-150200.3.10.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebp-tools-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp-tools-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * openSUSE Leap 15.5 (x86_64) * libwebp7-32bit-1.0.3-150200.3.10.1 * libwebpdemux2-32bit-1.0.3-150200.3.10.1 * libwebpdemux2-32bit-debuginfo-1.0.3-150200.3.10.1 * libwebpdecoder3-32bit-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-32bit-1.0.3-150200.3.10.1 * libwebp7-32bit-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-32bit-1.0.3-150200.3.10.1 * libwebpdecoder3-32bit-1.0.3-150200.3.10.1 * libwebpmux3-32bit-debuginfo-1.0.3-150200.3.10.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwebp7-1.0.3-150200.3.10.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.10.1 * libwebpmux3-1.0.3-150200.3.10.1 * libwebpmux3-debuginfo-1.0.3-150200.3.10.1 * libwebpdemux2-1.0.3-150200.3.10.1 * libwebp7-debuginfo-1.0.3-150200.3.10.1 * libwebp-devel-1.0.3-150200.3.10.1 * libwebpdecoder3-1.0.3-150200.3.10.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.10.1 * libwebp-debugsource-1.0.3-150200.3.10.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4863.html * https://bugzilla.suse.com/show_bug.cgi?id=1215231 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Mon Sep 18 16:30:49 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Mon, 18 Sep 2023 16:30:49 -0000 Subject: SUSE-RU-2023:3641-1: important: Recommended update for java-11-openjdk Message-ID: <169505464997.11580.11264995090829234660@smelt2.suse.de> # Recommended update for java-11-openjdk Announcement ID: SUSE-RU-2023:3641-1 Rating: important References: Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that can now be installed. ## Description: This update for java-11-openjdk fixes the following issues: * Fix a regression where the validation would reject valid zip64 (zip with 64-bit offset extensions) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3641=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3641=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3641=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3641=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3641=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3641=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3641=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3641=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3641=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3641=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3641=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3641=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3641=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3641=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3641=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3641=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3641=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3641=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3641=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3641=1 * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-3641=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-src-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-jmods-11.0.20.1-150000.3.102.1 * java-11-openjdk-11.0.20.1-150000.3.102.1 * openSUSE Leap 15.4 (noarch) * java-11-openjdk-javadoc-11.0.20.1-150000.3.102.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-src-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-jmods-11.0.20.1-150000.3.102.1 * java-11-openjdk-11.0.20.1-150000.3.102.1 * openSUSE Leap 15.5 (noarch) * java-11-openjdk-javadoc-11.0.20.1-150000.3.102.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Package Hub 15 15-SP4 (noarch) * java-11-openjdk-javadoc-11.0.20.1-150000.3.102.1 * SUSE Package Hub 15 15-SP5 (noarch) * java-11-openjdk-javadoc-11.0.20.1-150000.3.102.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Manager Proxy 4.2 (x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE Enterprise Storage 7 (aarch64 x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 * SUSE CaaS Platform 4.0 (x86_64) * java-11-openjdk-11.0.20.1-150000.3.102.1 * java-11-openjdk-headless-11.0.20.1-150000.3.102.1 * java-11-openjdk-demo-11.0.20.1-150000.3.102.1 * java-11-openjdk-devel-11.0.20.1-150000.3.102.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Tue Sep 19 16:30:25 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Tue, 19 Sep 2023 16:30:25 -0000 Subject: SUSE-SU-2023:3684-1: important: Security update for the Linux Kernel Message-ID: <169514102570.13167.16562923697388040328@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2023:3684-1 Rating: important References: * #1023051 * #1203517 * #1210448 * #1213272 * #1213546 * #1213601 * #1213666 * #1213916 * #1213927 * #1213968 * #1213969 * #1213970 * #1213971 * #1214019 * #1214120 * #1214149 * #1214275 * #1214297 * #1214348 * #1214350 * #1214451 * PED-4579 * PED-5738 Cross-References: * CVE-2022-36402 * CVE-2023-2007 * CVE-2023-20588 * CVE-2023-21400 * CVE-2023-34319 * CVE-2023-3772 * CVE-2023-3863 * CVE-2023-4128 * CVE-2023-4132 * CVE-2023-4133 * CVE-2023-4134 * CVE-2023-4147 * CVE-2023-4194 * CVE-2023-4273 * CVE-2023-4385 * CVE-2023-4387 * CVE-2023-4459 CVSS scores: * CVE-2022-36402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36402 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2007 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2023-2007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-20588 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2023-20588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-21400 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-21400 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-34319 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-3772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3863 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3863 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4128 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4128 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4132 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4132 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4133 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4133 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4134 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4147 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4147 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-4194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-4273 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4273 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2023-4385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4385 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4387 ( SUSE ): 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4387 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-4459 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4459 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves 17 vulnerabilities, contains two features and has four security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2022-36402: Fixed an integer overflow vulnerability in vmwgfx driver in that allowed a local attacker with a user account on the system to gain privilege, causing a denial of service (bsc#1203517). * CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel (bsc#1210448). * CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to a possible kernel crash and denial of service (bsc#1213666). * CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local that allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601). * CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that allowed a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue (bsc#1214149). * CVE-2023-4132: Fixed use-after-free vulnerability was found in the siano smsusb module that allowed a local user to crash the system, causing a denial of service condition (bsc#1213969). * CVE-2023-4133: Fixed use after free bugs caused by circular dependency problem in cxgb4 (bsc#1213970). * CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work() (bsc#1213971). * CVE-2023-4147: Fixed use-after-free in nf_tables_newrule (bsc#1213968). * CVE-2023-4194: Fixed a type confusion in net tun_chr_open() (bsc#1214019). * CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack (bsc#1214120). * CVE-2023-4385: Fixed a NULL pointer dereference flaw in dbFree that may have allowed a local attacker to crash the system due to a missing sanity check (bsc#1214348). * CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that could allow a local attacker to crash the system due to a double-free (bsc#1214350). * CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup that may have allowed a local attacker with normal user privilege to cause a denial of service (bsc#1214451). * CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that can potentially return speculative data resulting in loss of confidentiality (bsc#1213927). * CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272). * CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in xen/netback (XSA-432) (bsc#1213546). The following non-security bugs were fixed: * ARM: spear: Do not use timer namespace for timer_shutdown() function (bsc#1213970). * Do not add and remove genksyms ifdefs * clocksource/drivers/arm_arch_timer: Do not use timer namespace for timer_shutdown() function (bsc#1213970). * clocksource/drivers/sp804: Do not use timer namespace for timer_shutdown() function (bsc#1213970). * e1000: Fix fall-through warnings for Clang (jsc#PED-5738). * e1000: Fix typos in comments (jsc#PED-5738). * e1000: Remove unnecessary use of kmap_atomic() (jsc#PED-5738). * e1000: drop unneeded assignment in e1000_set_itr() (jsc#PED-5738). * e1000: switch to napi_consume_skb() (jsc#PED-5738). * intel/e1000:fix repeated words in comments (jsc#PED-5738). * intel: remove checker warning (jsc#PED-5738). * kabi/severities: Ignore newly added SRSO mitigation functions * md/raid0: Factor out helper for mapping and submitting a bio (bsc#1213916). * md/raid0: Fix performance regression for large sequential writes (bsc#1213916). * net: e1000: remove repeated word "slot" for e1000_main.c (jsc#PED-5738). * net: e1000: remove repeated words for e1000_hw.c (jsc#PED-5738). * powerpc/rtas: block error injection when locked down (bsc#1023051). * powerpc/rtas: mandate RTAS syscall filtering (bsc#1023051). * powerpc/rtas: move syscall filter setup into separate function (bsc#1023051). * powerpc/rtas: remove ibm_suspend_me_token (bsc#1023051). * powerpc: Move DMA64_PROPNAME define to a header (bsc#1214297 ltc#197503). * pseries/iommu/ddw: Fix kdump to work in absence of ibm,dma-window (bsc#1214297 ltc#197503). * timers: Add shutdown mechanism to the internal functions (bsc#1213970). * timers: Provide timer_shutdown_sync (bsc#1213970). * timers: Rename del_timer() to timer_delete() (bsc#1213970). * timers: Rename del_timer_sync() to timer_delete_sync() (bsc#1213970). * timers: Replace BUG_ON()s (bsc#1213970). * timers: Silently ignore timers with a NULL function (bsc#1213970). * timers: Split [try_to_]del_timer_sync to prepare for shutdown mode (bsc#1213970). * timers: Update kernel-doc for various functions (bsc#1213970). * timers: Use del_timer_sync() even on UP (bsc#1213970). * x86/cpu/kvm: Provide UNTRAIN_RET_VM (git-fixes). * x86/cpu: Cleanup the untrain mess (git-fixes). * x86/cpu: Rename original retbleed methods (git-fixes). * x86/cpu: Rename srso_(.*) _alias to srso_alias_ \1 (git-fixes). * x86/retpoline: Do not clobber RFLAGS during srso_safe_ret() (git-fixes). * x86/speculation: Add cpu_show_gds() prototype (git-fixes). * x86/speculation: Mark all Skylake CPUs as vulnerable to GDS (git-fixes). * x86/srso: Correct the mitigation status when SMT is disabled (git-fixes). * x86/srso: Disable the mitigation on unaffected configurations (git-fixes). * x86/srso: Explain the untraining sequences a bit more (git-fixes). * x86: Move gds_ucode_mitigated() declaration to header (git-fixes). * xfs: fix sb write verify for lazysbcount (bsc#1214275). * xfs: gut error handling in xfs_trans_unreserve_and_mod_sb() (bsc#1214275). * xfs: update superblock counters correctly for !lazysbcount (bsc#1214275). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3684=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2023-3684=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2023-3684=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3684=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3684=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3684=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3684=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3684=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3684=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3684=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3684=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3684=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3684=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3684=1 ## Package List: * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.3.18-150300.59.133.1 * openSUSE Leap 15.4 (aarch64) * dtb-zte-5.3.18-150300.59.133.1 * dtb-al-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-default-livepatch-5.3.18-150300.59.133.1 * kernel-default-debuginfo-5.3.18-150300.59.133.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 * kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1 * kernel-default-livepatch-devel-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-5.3.18-150300.59.133.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.133.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.133.1 * cluster-md-kmp-default-5.3.18-150300.59.133.1 * ocfs2-kmp-default-5.3.18-150300.59.133.1 * kernel-default-debuginfo-5.3.18-150300.59.133.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.133.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.133.1 * dlm-kmp-default-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.133.1 * kernel-64kb-debuginfo-5.3.18-150300.59.133.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-64kb-devel-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.133.1 * kernel-preempt-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.133.1 * kernel-preempt-debugsource-5.3.18-150300.59.133.1 * kernel-preempt-debuginfo-5.3.18-150300.59.133.1 * kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.133.1 * kernel-default-devel-5.3.18-150300.59.133.1 * kernel-obs-build-5.3.18-150300.59.133.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 * kernel-default-debuginfo-5.3.18-150300.59.133.1 * kernel-preempt-devel-5.3.18-150300.59.133.1 * kernel-syms-5.3.18-150300.59.133.1 * reiserfs-kmp-default-5.3.18-150300.59.133.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.133.1 * kernel-devel-5.3.18-150300.59.133.1 * kernel-macros-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.133.1 * kernel-64kb-debuginfo-5.3.18-150300.59.133.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-64kb-devel-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.133.1 * kernel-preempt-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.133.1 * kernel-preempt-debugsource-5.3.18-150300.59.133.1 * kernel-preempt-debuginfo-5.3.18-150300.59.133.1 * kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.133.1 * kernel-default-devel-5.3.18-150300.59.133.1 * kernel-obs-build-5.3.18-150300.59.133.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 * kernel-default-debuginfo-5.3.18-150300.59.133.1 * kernel-preempt-devel-5.3.18-150300.59.133.1 * kernel-syms-5.3.18-150300.59.133.1 * reiserfs-kmp-default-5.3.18-150300.59.133.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.133.1 * kernel-devel-5.3.18-150300.59.133.1 * kernel-macros-5.3.18-150300.59.133.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.133.1 * kernel-64kb-debuginfo-5.3.18-150300.59.133.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-64kb-devel-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.133.1 * kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.133.1 * kernel-default-devel-5.3.18-150300.59.133.1 * kernel-obs-build-5.3.18-150300.59.133.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 * kernel-default-debuginfo-5.3.18-150300.59.133.1 * kernel-syms-5.3.18-150300.59.133.1 * reiserfs-kmp-default-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * kernel-source-5.3.18-150300.59.133.1 * kernel-devel-5.3.18-150300.59.133.1 * kernel-macros-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * kernel-preempt-devel-5.3.18-150300.59.133.1 * kernel-preempt-debugsource-5.3.18-150300.59.133.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-preempt-debuginfo-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.133.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.133.1 * kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.133.1 * kernel-default-devel-5.3.18-150300.59.133.1 * kernel-obs-build-5.3.18-150300.59.133.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 * kernel-default-debuginfo-5.3.18-150300.59.133.1 * kernel-syms-5.3.18-150300.59.133.1 * reiserfs-kmp-default-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.133.1 * kernel-devel-5.3.18-150300.59.133.1 * kernel-macros-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-devel-5.3.18-150300.59.133.1 * kernel-preempt-debugsource-5.3.18-150300.59.133.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-preempt-debuginfo-5.3.18-150300.59.133.1 * SUSE Manager Proxy 4.2 (nosrc x86_64) * kernel-default-5.3.18-150300.59.133.1 * kernel-preempt-5.3.18-150300.59.133.1 * SUSE Manager Proxy 4.2 (x86_64) * kernel-preempt-debugsource-5.3.18-150300.59.133.1 * kernel-preempt-debuginfo-5.3.18-150300.59.133.1 * kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 * kernel-default-devel-5.3.18-150300.59.133.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 * kernel-default-debuginfo-5.3.18-150300.59.133.1 * SUSE Manager Proxy 4.2 (noarch) * kernel-devel-5.3.18-150300.59.133.1 * kernel-macros-5.3.18-150300.59.133.1 * SUSE Manager Retail Branch Server 4.2 (nosrc x86_64) * kernel-default-5.3.18-150300.59.133.1 * kernel-preempt-5.3.18-150300.59.133.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * kernel-preempt-debugsource-5.3.18-150300.59.133.1 * kernel-preempt-debuginfo-5.3.18-150300.59.133.1 * kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 * kernel-default-devel-5.3.18-150300.59.133.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 * kernel-default-debuginfo-5.3.18-150300.59.133.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * kernel-devel-5.3.18-150300.59.133.1 * kernel-macros-5.3.18-150300.59.133.1 * SUSE Manager Server 4.2 (nosrc ppc64le s390x x86_64) * kernel-default-5.3.18-150300.59.133.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 * kernel-default-devel-5.3.18-150300.59.133.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 * kernel-default-debuginfo-5.3.18-150300.59.133.1 * SUSE Manager Server 4.2 (noarch) * kernel-devel-5.3.18-150300.59.133.1 * kernel-macros-5.3.18-150300.59.133.1 * SUSE Manager Server 4.2 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.133.1 * SUSE Manager Server 4.2 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.133.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.133.1 * SUSE Manager Server 4.2 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.133.1 * SUSE Manager Server 4.2 (x86_64) * kernel-preempt-debugsource-5.3.18-150300.59.133.1 * kernel-preempt-debuginfo-5.3.18-150300.59.133.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.133.1 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.133.1 * kernel-64kb-debuginfo-5.3.18-150300.59.133.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-64kb-devel-5.3.18-150300.59.133.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.133.1 * kernel-preempt-5.3.18-150300.59.133.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.133.1 * kernel-preempt-debugsource-5.3.18-150300.59.133.1 * kernel-preempt-debuginfo-5.3.18-150300.59.133.1 * kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.133.1 * kernel-default-devel-5.3.18-150300.59.133.1 * kernel-obs-build-5.3.18-150300.59.133.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.133.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 * kernel-default-debuginfo-5.3.18-150300.59.133.1 * kernel-preempt-devel-5.3.18-150300.59.133.1 * kernel-syms-5.3.18-150300.59.133.1 * reiserfs-kmp-default-5.3.18-150300.59.133.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.133.1 * SUSE Enterprise Storage 7.1 (noarch) * kernel-source-5.3.18-150300.59.133.1 * kernel-devel-5.3.18-150300.59.133.1 * kernel-macros-5.3.18-150300.59.133.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 * kernel-default-debuginfo-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.133.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.133.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.133.1 * kernel-default-debugsource-5.3.18-150300.59.133.1 ## References: * https://www.suse.com/security/cve/CVE-2022-36402.html * https://www.suse.com/security/cve/CVE-2023-2007.html * https://www.suse.com/security/cve/CVE-2023-20588.html * https://www.suse.com/security/cve/CVE-2023-21400.html * https://www.suse.com/security/cve/CVE-2023-34319.html * https://www.suse.com/security/cve/CVE-2023-3772.html * https://www.suse.com/security/cve/CVE-2023-3863.html * https://www.suse.com/security/cve/CVE-2023-4128.html * https://www.suse.com/security/cve/CVE-2023-4132.html * https://www.suse.com/security/cve/CVE-2023-4133.html * https://www.suse.com/security/cve/CVE-2023-4134.html * https://www.suse.com/security/cve/CVE-2023-4147.html * https://www.suse.com/security/cve/CVE-2023-4194.html * https://www.suse.com/security/cve/CVE-2023-4273.html * https://www.suse.com/security/cve/CVE-2023-4385.html * https://www.suse.com/security/cve/CVE-2023-4387.html * https://www.suse.com/security/cve/CVE-2023-4459.html * https://bugzilla.suse.com/show_bug.cgi?id=1023051 * https://bugzilla.suse.com/show_bug.cgi?id=1203517 * https://bugzilla.suse.com/show_bug.cgi?id=1210448 * https://bugzilla.suse.com/show_bug.cgi?id=1213272 * https://bugzilla.suse.com/show_bug.cgi?id=1213546 * https://bugzilla.suse.com/show_bug.cgi?id=1213601 * https://bugzilla.suse.com/show_bug.cgi?id=1213666 * https://bugzilla.suse.com/show_bug.cgi?id=1213916 * https://bugzilla.suse.com/show_bug.cgi?id=1213927 * https://bugzilla.suse.com/show_bug.cgi?id=1213968 * https://bugzilla.suse.com/show_bug.cgi?id=1213969 * https://bugzilla.suse.com/show_bug.cgi?id=1213970 * https://bugzilla.suse.com/show_bug.cgi?id=1213971 * https://bugzilla.suse.com/show_bug.cgi?id=1214019 * https://bugzilla.suse.com/show_bug.cgi?id=1214120 * https://bugzilla.suse.com/show_bug.cgi?id=1214149 * https://bugzilla.suse.com/show_bug.cgi?id=1214275 * https://bugzilla.suse.com/show_bug.cgi?id=1214297 * https://bugzilla.suse.com/show_bug.cgi?id=1214348 * https://bugzilla.suse.com/show_bug.cgi?id=1214350 * https://bugzilla.suse.com/show_bug.cgi?id=1214451 * https://jira.suse.com/browse/PED-4579 * https://jira.suse.com/browse/PED-5738 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 20 12:30:54 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 20 Sep 2023 12:30:54 -0000 Subject: SUSE-SU-2023:3698-1: important: Security update for libxml2 Message-ID: <169521305492.2038.11780673200648411104@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2023:3698-1 Rating: important References: * #1214768 Cross-References: * CVE-2023-39615 CVSS scores: * CVE-2023-39615 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-39615 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves one vulnerability can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2023-39615: Fixed crafted xml can cause global buffer overflow (bsc#1214768). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3698=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3698=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3698=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3698=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3698=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3698=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3698=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3698=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3698=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3698=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3698=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3698=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3698=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3698=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3698=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3698=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3698=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3698=1 * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-3698=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3698=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * python2-libxml2-python-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python2-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * python2-libxml2-python-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python2-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * python2-libxml2-python-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python2-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * python2-libxml2-python-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python2-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * python2-libxml2-python-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python2-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * python2-libxml2-python-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python2-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE Manager Proxy 4.2 (x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * python2-libxml2-python-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python2-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Manager Server 4.2 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Enterprise Storage 7.1 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE Enterprise Storage 7 (aarch64 x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * python2-libxml2-python-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python2-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Enterprise Storage 7 (x86_64) * libxml2-2-32bit-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * SUSE CaaS Platform 4.0 (x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * python3-libxml2-python-2.9.7-150000.3.60.1 * libxml2-2-32bit-2.9.7-150000.3.60.1 * python-libxml2-python-debugsource-2.9.7-150000.3.60.1 * python2-libxml2-python-2.9.7-150000.3.60.1 * libxml2-2-32bit-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-devel-2.9.7-150000.3.60.1 * python2-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libxml2-debugsource-2.9.7-150000.3.60.1 * libxml2-tools-debuginfo-2.9.7-150000.3.60.1 * libxml2-tools-2.9.7-150000.3.60.1 * libxml2-2-2.9.7-150000.3.60.1 * libxml2-2-debuginfo-2.9.7-150000.3.60.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39615.html * https://bugzilla.suse.com/show_bug.cgi?id=1214768 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 20 16:30:03 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 20 Sep 2023 16:30:03 -0000 Subject: SUSE-SU-2023:3708-1: important: Security update for python39 Message-ID: <169522740392.8343.1020673642426416717@smelt2.prg2.suse.org> # Security update for python39 Announcement ID: SUSE-SU-2023:3708-1 Rating: important References: * #1211765 * #1213463 * #1214692 Cross-References: * CVE-2023-40217 CVSS scores: * CVE-2023-40217 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2023-40217 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for python39 fixes the following issues: * Update to 3.9.18: * CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692). The following non-security bugs were fixed: * making marshalling of `set` and `frozenset` deterministic (bsc#1211765). * stabilizing FLAG_REF usage (required for reproduceability (bsc#1213463). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3708=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3708=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3708=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3708=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3708=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3708=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3708=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3708=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3708=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3708=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * python39-3.9.18-150300.4.33.1 * python39-dbm-debuginfo-3.9.18-150300.4.33.1 * python39-tools-3.9.18-150300.4.33.1 * python39-curses-debuginfo-3.9.18-150300.4.33.1 * python39-idle-3.9.18-150300.4.33.1 * python39-doc-devhelp-3.9.18-150300.4.33.1 * python39-core-debugsource-3.9.18-150300.4.33.1 * libpython3_9-1_0-debuginfo-3.9.18-150300.4.33.1 * python39-testsuite-debuginfo-3.9.18-150300.4.33.1 * python39-devel-3.9.18-150300.4.33.1 * python39-doc-3.9.18-150300.4.33.1 * python39-debuginfo-3.9.18-150300.4.33.1 * python39-debugsource-3.9.18-150300.4.33.1 * python39-base-debuginfo-3.9.18-150300.4.33.1 * python39-dbm-3.9.18-150300.4.33.1 * python39-testsuite-3.9.18-150300.4.33.1 * libpython3_9-1_0-3.9.18-150300.4.33.1 * python39-curses-3.9.18-150300.4.33.1 * python39-tk-3.9.18-150300.4.33.1 * python39-tk-debuginfo-3.9.18-150300.4.33.1 * python39-base-3.9.18-150300.4.33.1 * openSUSE Leap 15.4 (x86_64) * python39-base-32bit-3.9.18-150300.4.33.1 * libpython3_9-1_0-32bit-3.9.18-150300.4.33.1 * python39-base-32bit-debuginfo-3.9.18-150300.4.33.1 * libpython3_9-1_0-32bit-debuginfo-3.9.18-150300.4.33.1 * python39-32bit-debuginfo-3.9.18-150300.4.33.1 * python39-32bit-3.9.18-150300.4.33.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python39-3.9.18-150300.4.33.1 * python39-dbm-debuginfo-3.9.18-150300.4.33.1 * python39-tools-3.9.18-150300.4.33.1 * python39-curses-debuginfo-3.9.18-150300.4.33.1 * python39-idle-3.9.18-150300.4.33.1 * python39-doc-devhelp-3.9.18-150300.4.33.1 * python39-core-debugsource-3.9.18-150300.4.33.1 * libpython3_9-1_0-debuginfo-3.9.18-150300.4.33.1 * python39-testsuite-debuginfo-3.9.18-150300.4.33.1 * python39-devel-3.9.18-150300.4.33.1 * python39-doc-3.9.18-150300.4.33.1 * python39-debuginfo-3.9.18-150300.4.33.1 * python39-debugsource-3.9.18-150300.4.33.1 * python39-base-debuginfo-3.9.18-150300.4.33.1 * python39-dbm-3.9.18-150300.4.33.1 * python39-testsuite-3.9.18-150300.4.33.1 * libpython3_9-1_0-3.9.18-150300.4.33.1 * python39-curses-3.9.18-150300.4.33.1 * python39-tk-3.9.18-150300.4.33.1 * python39-tk-debuginfo-3.9.18-150300.4.33.1 * python39-base-3.9.18-150300.4.33.1 * openSUSE Leap 15.5 (x86_64) * python39-base-32bit-3.9.18-150300.4.33.1 * libpython3_9-1_0-32bit-3.9.18-150300.4.33.1 * python39-base-32bit-debuginfo-3.9.18-150300.4.33.1 * libpython3_9-1_0-32bit-debuginfo-3.9.18-150300.4.33.1 * python39-32bit-debuginfo-3.9.18-150300.4.33.1 * python39-32bit-3.9.18-150300.4.33.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * python39-tk-3.9.18-150300.4.33.1 * libpython3_9-1_0-3.9.18-150300.4.33.1 * python39-curses-3.9.18-150300.4.33.1 * python39-devel-3.9.18-150300.4.33.1 * python39-core-debugsource-3.9.18-150300.4.33.1 * python39-tools-3.9.18-150300.4.33.1 * python39-debuginfo-3.9.18-150300.4.33.1 * python39-3.9.18-150300.4.33.1 * python39-curses-debuginfo-3.9.18-150300.4.33.1 * python39-idle-3.9.18-150300.4.33.1 * python39-debugsource-3.9.18-150300.4.33.1 * python39-tk-debuginfo-3.9.18-150300.4.33.1 * python39-base-debuginfo-3.9.18-150300.4.33.1 * python39-base-3.9.18-150300.4.33.1 * python39-dbm-debuginfo-3.9.18-150300.4.33.1 * libpython3_9-1_0-debuginfo-3.9.18-150300.4.33.1 * python39-dbm-3.9.18-150300.4.33.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * python39-tk-3.9.18-150300.4.33.1 * libpython3_9-1_0-3.9.18-150300.4.33.1 * python39-curses-3.9.18-150300.4.33.1 * python39-devel-3.9.18-150300.4.33.1 * python39-core-debugsource-3.9.18-150300.4.33.1 * python39-tools-3.9.18-150300.4.33.1 * python39-debuginfo-3.9.18-150300.4.33.1 * python39-3.9.18-150300.4.33.1 * python39-curses-debuginfo-3.9.18-150300.4.33.1 * python39-idle-3.9.18-150300.4.33.1 * python39-debugsource-3.9.18-150300.4.33.1 * python39-tk-debuginfo-3.9.18-150300.4.33.1 * python39-base-debuginfo-3.9.18-150300.4.33.1 * python39-base-3.9.18-150300.4.33.1 * python39-dbm-debuginfo-3.9.18-150300.4.33.1 * libpython3_9-1_0-debuginfo-3.9.18-150300.4.33.1 * python39-dbm-3.9.18-150300.4.33.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * python39-tk-3.9.18-150300.4.33.1 * libpython3_9-1_0-3.9.18-150300.4.33.1 * python39-curses-3.9.18-150300.4.33.1 * python39-devel-3.9.18-150300.4.33.1 * python39-core-debugsource-3.9.18-150300.4.33.1 * python39-tools-3.9.18-150300.4.33.1 * python39-debuginfo-3.9.18-150300.4.33.1 * python39-3.9.18-150300.4.33.1 * python39-curses-debuginfo-3.9.18-150300.4.33.1 * python39-idle-3.9.18-150300.4.33.1 * python39-debugsource-3.9.18-150300.4.33.1 * python39-tk-debuginfo-3.9.18-150300.4.33.1 * python39-base-debuginfo-3.9.18-150300.4.33.1 * python39-base-3.9.18-150300.4.33.1 * python39-dbm-debuginfo-3.9.18-150300.4.33.1 * libpython3_9-1_0-debuginfo-3.9.18-150300.4.33.1 * python39-dbm-3.9.18-150300.4.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * python39-tk-3.9.18-150300.4.33.1 * libpython3_9-1_0-3.9.18-150300.4.33.1 * python39-curses-3.9.18-150300.4.33.1 * python39-devel-3.9.18-150300.4.33.1 * python39-core-debugsource-3.9.18-150300.4.33.1 * python39-tools-3.9.18-150300.4.33.1 * python39-debuginfo-3.9.18-150300.4.33.1 * python39-3.9.18-150300.4.33.1 * python39-curses-debuginfo-3.9.18-150300.4.33.1 * python39-idle-3.9.18-150300.4.33.1 * python39-debugsource-3.9.18-150300.4.33.1 * python39-tk-debuginfo-3.9.18-150300.4.33.1 * python39-base-debuginfo-3.9.18-150300.4.33.1 * python39-base-3.9.18-150300.4.33.1 * python39-dbm-debuginfo-3.9.18-150300.4.33.1 * libpython3_9-1_0-debuginfo-3.9.18-150300.4.33.1 * python39-dbm-3.9.18-150300.4.33.1 * SUSE Manager Proxy 4.2 (x86_64) * python39-tk-3.9.18-150300.4.33.1 * libpython3_9-1_0-3.9.18-150300.4.33.1 * python39-curses-3.9.18-150300.4.33.1 * python39-devel-3.9.18-150300.4.33.1 * python39-core-debugsource-3.9.18-150300.4.33.1 * python39-debuginfo-3.9.18-150300.4.33.1 * python39-3.9.18-150300.4.33.1 * python39-curses-debuginfo-3.9.18-150300.4.33.1 * python39-idle-3.9.18-150300.4.33.1 * python39-debugsource-3.9.18-150300.4.33.1 * python39-tk-debuginfo-3.9.18-150300.4.33.1 * python39-base-debuginfo-3.9.18-150300.4.33.1 * python39-base-3.9.18-150300.4.33.1 * python39-dbm-debuginfo-3.9.18-150300.4.33.1 * libpython3_9-1_0-debuginfo-3.9.18-150300.4.33.1 * python39-dbm-3.9.18-150300.4.33.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * python39-tk-3.9.18-150300.4.33.1 * libpython3_9-1_0-3.9.18-150300.4.33.1 * python39-curses-3.9.18-150300.4.33.1 * python39-devel-3.9.18-150300.4.33.1 * python39-core-debugsource-3.9.18-150300.4.33.1 * python39-debuginfo-3.9.18-150300.4.33.1 * python39-3.9.18-150300.4.33.1 * python39-curses-debuginfo-3.9.18-150300.4.33.1 * python39-idle-3.9.18-150300.4.33.1 * python39-debugsource-3.9.18-150300.4.33.1 * python39-tk-debuginfo-3.9.18-150300.4.33.1 * python39-base-debuginfo-3.9.18-150300.4.33.1 * python39-base-3.9.18-150300.4.33.1 * python39-dbm-debuginfo-3.9.18-150300.4.33.1 * libpython3_9-1_0-debuginfo-3.9.18-150300.4.33.1 * python39-dbm-3.9.18-150300.4.33.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * python39-tk-3.9.18-150300.4.33.1 * libpython3_9-1_0-3.9.18-150300.4.33.1 * python39-curses-3.9.18-150300.4.33.1 * python39-devel-3.9.18-150300.4.33.1 * python39-core-debugsource-3.9.18-150300.4.33.1 * python39-debuginfo-3.9.18-150300.4.33.1 * python39-3.9.18-150300.4.33.1 * python39-curses-debuginfo-3.9.18-150300.4.33.1 * python39-idle-3.9.18-150300.4.33.1 * python39-debugsource-3.9.18-150300.4.33.1 * python39-tk-debuginfo-3.9.18-150300.4.33.1 * python39-base-debuginfo-3.9.18-150300.4.33.1 * python39-base-3.9.18-150300.4.33.1 * python39-dbm-debuginfo-3.9.18-150300.4.33.1 * libpython3_9-1_0-debuginfo-3.9.18-150300.4.33.1 * python39-dbm-3.9.18-150300.4.33.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * python39-tk-3.9.18-150300.4.33.1 * libpython3_9-1_0-3.9.18-150300.4.33.1 * python39-curses-3.9.18-150300.4.33.1 * python39-devel-3.9.18-150300.4.33.1 * python39-core-debugsource-3.9.18-150300.4.33.1 * python39-tools-3.9.18-150300.4.33.1 * python39-debuginfo-3.9.18-150300.4.33.1 * python39-3.9.18-150300.4.33.1 * python39-curses-debuginfo-3.9.18-150300.4.33.1 * python39-idle-3.9.18-150300.4.33.1 * python39-debugsource-3.9.18-150300.4.33.1 * python39-tk-debuginfo-3.9.18-150300.4.33.1 * python39-base-debuginfo-3.9.18-150300.4.33.1 * python39-base-3.9.18-150300.4.33.1 * python39-dbm-debuginfo-3.9.18-150300.4.33.1 * libpython3_9-1_0-debuginfo-3.9.18-150300.4.33.1 * python39-dbm-3.9.18-150300.4.33.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40217.html * https://bugzilla.suse.com/show_bug.cgi?id=1211765 * https://bugzilla.suse.com/show_bug.cgi?id=1213463 * https://bugzilla.suse.com/show_bug.cgi?id=1214692 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 20 16:30:07 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 20 Sep 2023 16:30:07 -0000 Subject: SUSE-SU-2023:3707-1: important: Security update for cups Message-ID: <169522740758.8343.6146842514008570952@smelt2.prg2.suse.org> # Security update for cups Announcement ID: SUSE-SU-2023:3707-1 Rating: important References: * #1214254 * #1215204 Cross-References: * CVE-2023-32360 * CVE-2023-4504 CVSS scores: * CVE-2023-32360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-32360 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-4504 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for cups fixes the following issues: * CVE-2023-4504: Fixed heap overflow in OpenPrinting CUPS Postscript Parsing (bsc#1215204). * CVE-2023-32360: Fixed Information leak through Cups-Get-Document operation (bsc#1214254). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3707=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3707=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3707=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3707=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3707=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3707=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3707=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3707=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3707=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-3707=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2023-3707=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3707=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3707=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3707=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3707=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3707=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3707=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3707=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3707=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3707=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3707=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3707=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3707=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3707=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3707=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3707=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3707=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * openSUSE Leap 15.4 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-32bit-2.2.7-150000.3.51.2 * libcupsppdc1-32bit-2.2.7-150000.3.51.2 * libcupscgi1-32bit-debuginfo-2.2.7-150000.3.51.2 * cups-devel-32bit-2.2.7-150000.3.51.2 * libcupsimage2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-32bit-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * libcupsmime1-32bit-2.2.7-150000.3.51.2 * libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-32bit-debuginfo-2.2.7-150000.3.51.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * openSUSE Leap 15.5 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-32bit-2.2.7-150000.3.51.2 * libcupsppdc1-32bit-2.2.7-150000.3.51.2 * libcupscgi1-32bit-debuginfo-2.2.7-150000.3.51.2 * cups-devel-32bit-2.2.7-150000.3.51.2 * libcupsimage2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-32bit-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * libcupsmime1-32bit-2.2.7-150000.3.51.2 * libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-32bit-debuginfo-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libcups2-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libcups2-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libcups2-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libcups2-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * Basesystem Module 15-SP4 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * Desktop Applications Module 15-SP5 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * Development Tools Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cups-debugsource-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cups-debugsource-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * SUSE Manager Proxy 4.2 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * SUSE Manager Server 4.2 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * cups-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * SUSE Enterprise Storage 7.1 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * SUSE CaaS Platform 4.0 (x86_64) * libcupsmime1-debuginfo-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * libcupscgi1-debuginfo-2.2.7-150000.3.51.2 * cups-ddk-debuginfo-2.2.7-150000.3.51.2 * cups-client-2.2.7-150000.3.51.2 * libcupsimage2-2.2.7-150000.3.51.2 * cups-client-debuginfo-2.2.7-150000.3.51.2 * libcupsppdc1-debuginfo-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcupsmime1-2.2.7-150000.3.51.2 * libcupsimage2-debuginfo-2.2.7-150000.3.51.2 * libcupscgi1-2.2.7-150000.3.51.2 * libcups2-32bit-debuginfo-2.2.7-150000.3.51.2 * cups-2.2.7-150000.3.51.2 * libcups2-2.2.7-150000.3.51.2 * libcups2-32bit-2.2.7-150000.3.51.2 * libcupsppdc1-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * cups-ddk-2.2.7-150000.3.51.2 * cups-devel-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libcups2-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libcups2-2.2.7-150000.3.51.2 * cups-debuginfo-2.2.7-150000.3.51.2 * libcups2-debuginfo-2.2.7-150000.3.51.2 * cups-debugsource-2.2.7-150000.3.51.2 * cups-config-2.2.7-150000.3.51.2 ## References: * https://www.suse.com/security/cve/CVE-2023-32360.html * https://www.suse.com/security/cve/CVE-2023-4504.html * https://bugzilla.suse.com/show_bug.cgi?id=1214254 * https://bugzilla.suse.com/show_bug.cgi?id=1215204 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 21 08:30:12 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 21 Sep 2023 08:30:12 -0000 Subject: SUSE-RU-2023:3718-1: moderate: Recommended update for mariadb Message-ID: <169528501259.5260.15754531076757099255@smelt2.prg2.suse.org> # Recommended update for mariadb Announcement ID: SUSE-RU-2023:3718-1 Rating: moderate References: Affected Products: * Galera for Ericsson 15 SP3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that can now be installed. ## Description: This update for mariadb fixes the following issues: * Update to version 10.5.22: https://mariadb.com/kb/en/mariadb-10-5-22-release-notes/ https://mariadb.com/kb/en/mariadb-10-5-22-changelog/ ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3718=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3718=1 * Galera for Ericsson 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-ERICSSON-2023-3718=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3718=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3718=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3718=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3718=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3718=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3718=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * mariadb-tools-debuginfo-10.5.22-150300.3.35.1 * mariadb-debugsource-10.5.22-150300.3.35.1 * mariadb-client-10.5.22-150300.3.35.1 * mariadb-10.5.22-150300.3.35.1 * mariadb-tools-10.5.22-150300.3.35.1 * libmariadbd19-debuginfo-10.5.22-150300.3.35.1 * mariadb-debuginfo-10.5.22-150300.3.35.1 * mariadb-client-debuginfo-10.5.22-150300.3.35.1 * libmariadbd19-10.5.22-150300.3.35.1 * libmariadbd-devel-10.5.22-150300.3.35.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * mariadb-errormessages-10.5.22-150300.3.35.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * mariadb-tools-debuginfo-10.5.22-150300.3.35.1 * mariadb-debugsource-10.5.22-150300.3.35.1 * mariadb-client-10.5.22-150300.3.35.1 * mariadb-10.5.22-150300.3.35.1 * mariadb-tools-10.5.22-150300.3.35.1 * libmariadbd19-debuginfo-10.5.22-150300.3.35.1 * mariadb-debuginfo-10.5.22-150300.3.35.1 * mariadb-client-debuginfo-10.5.22-150300.3.35.1 * libmariadbd19-10.5.22-150300.3.35.1 * libmariadbd-devel-10.5.22-150300.3.35.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * mariadb-errormessages-10.5.22-150300.3.35.1 * Galera for Ericsson 15 SP3 (x86_64) * mariadb-galera-10.5.22-150300.3.35.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * mariadb-tools-debuginfo-10.5.22-150300.3.35.1 * mariadb-debugsource-10.5.22-150300.3.35.1 * mariadb-client-10.5.22-150300.3.35.1 * mariadb-10.5.22-150300.3.35.1 * mariadb-tools-10.5.22-150300.3.35.1 * libmariadbd19-debuginfo-10.5.22-150300.3.35.1 * mariadb-debuginfo-10.5.22-150300.3.35.1 * mariadb-client-debuginfo-10.5.22-150300.3.35.1 * libmariadbd19-10.5.22-150300.3.35.1 * libmariadbd-devel-10.5.22-150300.3.35.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * mariadb-errormessages-10.5.22-150300.3.35.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * mariadb-tools-debuginfo-10.5.22-150300.3.35.1 * mariadb-debugsource-10.5.22-150300.3.35.1 * mariadb-client-10.5.22-150300.3.35.1 * mariadb-10.5.22-150300.3.35.1 * mariadb-tools-10.5.22-150300.3.35.1 * libmariadbd19-debuginfo-10.5.22-150300.3.35.1 * mariadb-debuginfo-10.5.22-150300.3.35.1 * mariadb-client-debuginfo-10.5.22-150300.3.35.1 * libmariadbd19-10.5.22-150300.3.35.1 * libmariadbd-devel-10.5.22-150300.3.35.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * mariadb-errormessages-10.5.22-150300.3.35.1 * SUSE Manager Proxy 4.2 (x86_64) * mariadb-tools-debuginfo-10.5.22-150300.3.35.1 * mariadb-debugsource-10.5.22-150300.3.35.1 * mariadb-client-10.5.22-150300.3.35.1 * mariadb-10.5.22-150300.3.35.1 * mariadb-tools-10.5.22-150300.3.35.1 * libmariadbd19-debuginfo-10.5.22-150300.3.35.1 * mariadb-debuginfo-10.5.22-150300.3.35.1 * mariadb-client-debuginfo-10.5.22-150300.3.35.1 * libmariadbd19-10.5.22-150300.3.35.1 * libmariadbd-devel-10.5.22-150300.3.35.1 * SUSE Manager Proxy 4.2 (noarch) * mariadb-errormessages-10.5.22-150300.3.35.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * mariadb-tools-debuginfo-10.5.22-150300.3.35.1 * mariadb-debugsource-10.5.22-150300.3.35.1 * mariadb-client-10.5.22-150300.3.35.1 * mariadb-10.5.22-150300.3.35.1 * mariadb-tools-10.5.22-150300.3.35.1 * libmariadbd19-debuginfo-10.5.22-150300.3.35.1 * mariadb-debuginfo-10.5.22-150300.3.35.1 * mariadb-client-debuginfo-10.5.22-150300.3.35.1 * libmariadbd19-10.5.22-150300.3.35.1 * libmariadbd-devel-10.5.22-150300.3.35.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * mariadb-errormessages-10.5.22-150300.3.35.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * mariadb-tools-debuginfo-10.5.22-150300.3.35.1 * mariadb-debugsource-10.5.22-150300.3.35.1 * mariadb-client-10.5.22-150300.3.35.1 * mariadb-10.5.22-150300.3.35.1 * mariadb-tools-10.5.22-150300.3.35.1 * libmariadbd19-debuginfo-10.5.22-150300.3.35.1 * mariadb-debuginfo-10.5.22-150300.3.35.1 * mariadb-client-debuginfo-10.5.22-150300.3.35.1 * libmariadbd19-10.5.22-150300.3.35.1 * libmariadbd-devel-10.5.22-150300.3.35.1 * SUSE Manager Server 4.2 (noarch) * mariadb-errormessages-10.5.22-150300.3.35.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * mariadb-tools-debuginfo-10.5.22-150300.3.35.1 * mariadb-debugsource-10.5.22-150300.3.35.1 * mariadb-client-10.5.22-150300.3.35.1 * mariadb-10.5.22-150300.3.35.1 * mariadb-tools-10.5.22-150300.3.35.1 * libmariadbd19-debuginfo-10.5.22-150300.3.35.1 * mariadb-debuginfo-10.5.22-150300.3.35.1 * mariadb-client-debuginfo-10.5.22-150300.3.35.1 * libmariadbd19-10.5.22-150300.3.35.1 * libmariadbd-devel-10.5.22-150300.3.35.1 * SUSE Enterprise Storage 7.1 (noarch) * mariadb-errormessages-10.5.22-150300.3.35.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Mon Sep 25 16:30:03 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Mon, 25 Sep 2023 16:30:03 -0000 Subject: SUSE-SU-2023:3762-1: important: Security update for frr Message-ID: <169565940396.18054.12844191045890659383@smelt2.prg2.suse.org> # Security update for frr Announcement ID: SUSE-SU-2023:3762-1 Rating: important References: * #1213284 * #1214735 * #1215065 Cross-References: * CVE-2023-38802 * CVE-2023-41358 * CVE-2023-41909 CVSS scores: * CVE-2023-38802 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38802 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-41358 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-41358 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-41909 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-41909 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * Server Applications Module 15-SP4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for frr fixes the following issues: * CVE-2023-38802: Fixed bad length handling when processing BGP attributes. (bsc#1213284) * CVE-2023-41358: Fixed a possible crash when processing NLRIs with an attribute length of zero. (bsc#1214735) * CVE-2023-41909: Fixed NULL pointer dereference due to processing in bgp_nlri_parse_flowspec (bsc#1215065). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3762=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3762=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3762=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3762=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3762=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3762=1 * Server Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-3762=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3762=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3762=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3762=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libfrrzmq0-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-7.4-150300.4.17.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.17.1 * libfrrsnmp0-7.4-150300.4.17.1 * frr-debugsource-7.4-150300.4.17.1 * libfrr_pb0-7.4-150300.4.17.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.17.1 * libfrrospfapiclient0-7.4-150300.4.17.1 * libfrrgrpc_pb0-7.4-150300.4.17.1 * libfrrcares0-debuginfo-7.4-150300.4.17.1 * frr-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-7.4-150300.4.17.1 * libfrrfpm_pb0-7.4-150300.4.17.1 * frr-7.4-150300.4.17.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.17.1 * frr-devel-7.4-150300.4.17.1 * libfrrcares0-7.4-150300.4.17.1 * libfrr_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-debuginfo-7.4-150300.4.17.1 * libfrrzmq0-7.4-150300.4.17.1 * libfrrsnmp0-debuginfo-7.4-150300.4.17.1 * SUSE Manager Proxy 4.2 (x86_64) * libfrrzmq0-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-7.4-150300.4.17.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.17.1 * libfrrsnmp0-7.4-150300.4.17.1 * frr-debugsource-7.4-150300.4.17.1 * libfrr_pb0-7.4-150300.4.17.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.17.1 * libfrrospfapiclient0-7.4-150300.4.17.1 * libfrrgrpc_pb0-7.4-150300.4.17.1 * libfrrcares0-debuginfo-7.4-150300.4.17.1 * frr-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-7.4-150300.4.17.1 * libfrrfpm_pb0-7.4-150300.4.17.1 * frr-7.4-150300.4.17.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.17.1 * frr-devel-7.4-150300.4.17.1 * libfrrcares0-7.4-150300.4.17.1 * libfrr_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-debuginfo-7.4-150300.4.17.1 * libfrrzmq0-7.4-150300.4.17.1 * libfrrsnmp0-debuginfo-7.4-150300.4.17.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libfrrzmq0-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-7.4-150300.4.17.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.17.1 * libfrrsnmp0-7.4-150300.4.17.1 * frr-debugsource-7.4-150300.4.17.1 * libfrr_pb0-7.4-150300.4.17.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.17.1 * libfrrospfapiclient0-7.4-150300.4.17.1 * libfrrgrpc_pb0-7.4-150300.4.17.1 * libfrrcares0-debuginfo-7.4-150300.4.17.1 * frr-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-7.4-150300.4.17.1 * libfrrfpm_pb0-7.4-150300.4.17.1 * frr-7.4-150300.4.17.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.17.1 * frr-devel-7.4-150300.4.17.1 * libfrrcares0-7.4-150300.4.17.1 * libfrr_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-debuginfo-7.4-150300.4.17.1 * libfrrzmq0-7.4-150300.4.17.1 * libfrrsnmp0-debuginfo-7.4-150300.4.17.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libfrrzmq0-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-7.4-150300.4.17.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.17.1 * libfrrsnmp0-7.4-150300.4.17.1 * frr-debugsource-7.4-150300.4.17.1 * libfrr_pb0-7.4-150300.4.17.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.17.1 * libfrrospfapiclient0-7.4-150300.4.17.1 * libfrrgrpc_pb0-7.4-150300.4.17.1 * libfrrcares0-debuginfo-7.4-150300.4.17.1 * frr-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-7.4-150300.4.17.1 * libfrrfpm_pb0-7.4-150300.4.17.1 * frr-7.4-150300.4.17.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.17.1 * frr-devel-7.4-150300.4.17.1 * libfrrcares0-7.4-150300.4.17.1 * libfrr_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-debuginfo-7.4-150300.4.17.1 * libfrrzmq0-7.4-150300.4.17.1 * libfrrsnmp0-debuginfo-7.4-150300.4.17.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libfrrzmq0-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-7.4-150300.4.17.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.17.1 * libfrrsnmp0-7.4-150300.4.17.1 * frr-debugsource-7.4-150300.4.17.1 * libfrr_pb0-7.4-150300.4.17.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.17.1 * libfrrospfapiclient0-7.4-150300.4.17.1 * libfrrgrpc_pb0-7.4-150300.4.17.1 * libfrrcares0-debuginfo-7.4-150300.4.17.1 * frr-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-7.4-150300.4.17.1 * libfrrfpm_pb0-7.4-150300.4.17.1 * frr-7.4-150300.4.17.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.17.1 * frr-devel-7.4-150300.4.17.1 * libfrrcares0-7.4-150300.4.17.1 * libfrr_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-debuginfo-7.4-150300.4.17.1 * libfrrzmq0-7.4-150300.4.17.1 * libfrrsnmp0-debuginfo-7.4-150300.4.17.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libfrrzmq0-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-7.4-150300.4.17.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.17.1 * libfrrsnmp0-7.4-150300.4.17.1 * frr-debugsource-7.4-150300.4.17.1 * libfrr_pb0-7.4-150300.4.17.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.17.1 * libfrrospfapiclient0-7.4-150300.4.17.1 * libfrrgrpc_pb0-7.4-150300.4.17.1 * libfrrcares0-debuginfo-7.4-150300.4.17.1 * frr-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-7.4-150300.4.17.1 * libfrrfpm_pb0-7.4-150300.4.17.1 * frr-7.4-150300.4.17.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.17.1 * frr-devel-7.4-150300.4.17.1 * libfrrcares0-7.4-150300.4.17.1 * libfrr_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-debuginfo-7.4-150300.4.17.1 * libfrrzmq0-7.4-150300.4.17.1 * libfrrsnmp0-debuginfo-7.4-150300.4.17.1 * Server Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libfrrzmq0-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-7.4-150300.4.17.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.17.1 * libfrrsnmp0-7.4-150300.4.17.1 * frr-debugsource-7.4-150300.4.17.1 * libfrr_pb0-7.4-150300.4.17.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.17.1 * libfrrospfapiclient0-7.4-150300.4.17.1 * libfrrgrpc_pb0-7.4-150300.4.17.1 * libfrrcares0-debuginfo-7.4-150300.4.17.1 * frr-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-7.4-150300.4.17.1 * libfrrfpm_pb0-7.4-150300.4.17.1 * frr-7.4-150300.4.17.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.17.1 * frr-devel-7.4-150300.4.17.1 * libfrrcares0-7.4-150300.4.17.1 * libfrr_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-debuginfo-7.4-150300.4.17.1 * libfrrzmq0-7.4-150300.4.17.1 * libfrrsnmp0-debuginfo-7.4-150300.4.17.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libfrrzmq0-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-7.4-150300.4.17.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.17.1 * libfrrsnmp0-7.4-150300.4.17.1 * frr-debugsource-7.4-150300.4.17.1 * libfrr_pb0-7.4-150300.4.17.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.17.1 * libfrrospfapiclient0-7.4-150300.4.17.1 * libfrrgrpc_pb0-7.4-150300.4.17.1 * libfrrcares0-debuginfo-7.4-150300.4.17.1 * frr-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-7.4-150300.4.17.1 * libfrrfpm_pb0-7.4-150300.4.17.1 * frr-7.4-150300.4.17.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.17.1 * frr-devel-7.4-150300.4.17.1 * libfrrcares0-7.4-150300.4.17.1 * libfrr_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-debuginfo-7.4-150300.4.17.1 * libfrrzmq0-7.4-150300.4.17.1 * libfrrsnmp0-debuginfo-7.4-150300.4.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libfrrzmq0-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-7.4-150300.4.17.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.17.1 * libfrrsnmp0-7.4-150300.4.17.1 * frr-debugsource-7.4-150300.4.17.1 * libfrr_pb0-7.4-150300.4.17.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.17.1 * libfrrospfapiclient0-7.4-150300.4.17.1 * libfrrgrpc_pb0-7.4-150300.4.17.1 * libfrrcares0-debuginfo-7.4-150300.4.17.1 * frr-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-7.4-150300.4.17.1 * libfrrfpm_pb0-7.4-150300.4.17.1 * frr-7.4-150300.4.17.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.17.1 * frr-devel-7.4-150300.4.17.1 * libfrrcares0-7.4-150300.4.17.1 * libfrr_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-debuginfo-7.4-150300.4.17.1 * libfrrzmq0-7.4-150300.4.17.1 * libfrrsnmp0-debuginfo-7.4-150300.4.17.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libfrrzmq0-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-7.4-150300.4.17.1 * libfrrgrpc_pb0-debuginfo-7.4-150300.4.17.1 * libfrrsnmp0-7.4-150300.4.17.1 * frr-debugsource-7.4-150300.4.17.1 * libfrr_pb0-7.4-150300.4.17.1 * libfrrospfapiclient0-debuginfo-7.4-150300.4.17.1 * libfrrospfapiclient0-7.4-150300.4.17.1 * libfrrgrpc_pb0-7.4-150300.4.17.1 * libfrrcares0-debuginfo-7.4-150300.4.17.1 * frr-debuginfo-7.4-150300.4.17.1 * libmlag_pb0-7.4-150300.4.17.1 * libfrrfpm_pb0-7.4-150300.4.17.1 * frr-7.4-150300.4.17.1 * libfrrfpm_pb0-debuginfo-7.4-150300.4.17.1 * frr-devel-7.4-150300.4.17.1 * libfrrcares0-7.4-150300.4.17.1 * libfrr_pb0-debuginfo-7.4-150300.4.17.1 * libfrr0-debuginfo-7.4-150300.4.17.1 * libfrrzmq0-7.4-150300.4.17.1 * libfrrsnmp0-debuginfo-7.4-150300.4.17.1 ## References: * https://www.suse.com/security/cve/CVE-2023-38802.html * https://www.suse.com/security/cve/CVE-2023-41358.html * https://www.suse.com/security/cve/CVE-2023-41909.html * https://bugzilla.suse.com/show_bug.cgi?id=1213284 * https://bugzilla.suse.com/show_bug.cgi?id=1214735 * https://bugzilla.suse.com/show_bug.cgi?id=1215065 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Tue Sep 26 12:30:19 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Tue, 26 Sep 2023 12:30:19 -0000 Subject: SUSE-RU-2023:3780-1: moderate: Recommended update hidapi Message-ID: <169573141963.366.17272423642082125995@smelt2.prg2.suse.org> # Recommended update hidapi Announcement ID: SUSE-RU-2023:3780-1 Rating: moderate References: * #1214535 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for hidapi ships the missing libhidapi-raw0 library to SLE and Leap Micro 5.3 and 5.4. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3780=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3780=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3780=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3780=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3780=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3780=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3780=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3780=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3780=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3780=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3780=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * hidapi-debugsource-0.10.1-150300.3.2.1 * libhidapi-hidraw0-0.10.1-150300.3.2.1 * libhidapi-hidraw0-debuginfo-0.10.1-150300.3.2.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * hidapi-debugsource-0.10.1-150300.3.2.1 * libhidapi-hidraw0-0.10.1-150300.3.2.1 * libhidapi-hidraw0-debuginfo-0.10.1-150300.3.2.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * hidapi-debugsource-0.10.1-150300.3.2.1 * libhidapi-hidraw0-0.10.1-150300.3.2.1 * libhidapi-hidraw0-debuginfo-0.10.1-150300.3.2.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * hidapi-debugsource-0.10.1-150300.3.2.1 * libhidapi-hidraw0-0.10.1-150300.3.2.1 * libhidapi-hidraw0-debuginfo-0.10.1-150300.3.2.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libhidapi-libusb0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-hidraw0-0.10.1-150300.3.2.1 * hidapi-debuginfo-0.10.1-150300.3.2.1 * hidapi-debugsource-0.10.1-150300.3.2.1 * libhidapi-devel-0.10.1-150300.3.2.1 * libhidapi-hidraw0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-libusb0-0.10.1-150300.3.2.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libhidapi-libusb0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-hidraw0-0.10.1-150300.3.2.1 * hidapi-debuginfo-0.10.1-150300.3.2.1 * hidapi-debugsource-0.10.1-150300.3.2.1 * libhidapi-devel-0.10.1-150300.3.2.1 * libhidapi-hidraw0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-libusb0-0.10.1-150300.3.2.1 * SUSE Manager Proxy 4.2 (x86_64) * libhidapi-libusb0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-hidraw0-0.10.1-150300.3.2.1 * hidapi-debuginfo-0.10.1-150300.3.2.1 * hidapi-debugsource-0.10.1-150300.3.2.1 * libhidapi-devel-0.10.1-150300.3.2.1 * libhidapi-hidraw0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-libusb0-0.10.1-150300.3.2.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libhidapi-libusb0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-hidraw0-0.10.1-150300.3.2.1 * hidapi-debuginfo-0.10.1-150300.3.2.1 * hidapi-debugsource-0.10.1-150300.3.2.1 * libhidapi-devel-0.10.1-150300.3.2.1 * libhidapi-hidraw0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-libusb0-0.10.1-150300.3.2.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libhidapi-libusb0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-hidraw0-0.10.1-150300.3.2.1 * hidapi-debuginfo-0.10.1-150300.3.2.1 * hidapi-debugsource-0.10.1-150300.3.2.1 * libhidapi-devel-0.10.1-150300.3.2.1 * libhidapi-hidraw0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-libusb0-0.10.1-150300.3.2.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libhidapi-libusb0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-hidraw0-0.10.1-150300.3.2.1 * hidapi-debuginfo-0.10.1-150300.3.2.1 * hidapi-debugsource-0.10.1-150300.3.2.1 * libhidapi-devel-0.10.1-150300.3.2.1 * libhidapi-hidraw0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-libusb0-0.10.1-150300.3.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libhidapi-libusb0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-hidraw0-0.10.1-150300.3.2.1 * hidapi-debuginfo-0.10.1-150300.3.2.1 * hidapi-debugsource-0.10.1-150300.3.2.1 * libhidapi-devel-0.10.1-150300.3.2.1 * libhidapi-hidraw0-debuginfo-0.10.1-150300.3.2.1 * libhidapi-libusb0-0.10.1-150300.3.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214535 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Tue Sep 26 12:30:24 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Tue, 26 Sep 2023 12:30:24 -0000 Subject: SUSE-SU-2023:3778-1: moderate: Security update for wireshark Message-ID: <169573142461.366.18175564084413307192@smelt2.prg2.suse.org> # Security update for wireshark Announcement ID: SUSE-SU-2023:3778-1 Rating: moderate References: * #1214560 * #1214561 * #1214562 * #1214652 Cross-References: * CVE-2023-2906 * CVE-2023-4511 * CVE-2023-4512 * CVE-2023-4513 CVSS scores: * CVE-2023-2906 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2023-2906 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-4511 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2023-4511 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2023-4512 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2023-4512 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2023-4513 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2023-4513 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP4 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves four vulnerabilities can now be installed. ## Description: This update for wireshark fixes the following issues: * Wireshark update to v3.6.16. * CVE-2023-4512: Fixed a bug in CBOR dissector which could lead to crash. (bsc#1214561) * CVE-2023-4511: Fixed a bug in BT SDP dissector which could lead to an infinite loop. (bsc#1214560) * CVE-2023-4513: Fixed a bug in BT SDP dissector which could lead to a memory leak. (bsc#1214562) * CVE-2023-2906: Fixed a bug in CP2179 dissector which could lead to crash. (bsc#1214652) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3778=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3778=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3778=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3778=1 * Desktop Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3778=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3778=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3778=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3778=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3778=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * wireshark-devel-3.6.16-150000.3.100.1 * wireshark-ui-qt-debuginfo-3.6.16-150000.3.100.1 * libwsutil13-debuginfo-3.6.16-150000.3.100.1 * libwiretap12-3.6.16-150000.3.100.1 * libwsutil13-3.6.16-150000.3.100.1 * wireshark-3.6.16-150000.3.100.1 * libwireshark15-debuginfo-3.6.16-150000.3.100.1 * wireshark-ui-qt-3.6.16-150000.3.100.1 * wireshark-debugsource-3.6.16-150000.3.100.1 * libwireshark15-3.6.16-150000.3.100.1 * libwiretap12-debuginfo-3.6.16-150000.3.100.1 * wireshark-debuginfo-3.6.16-150000.3.100.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * wireshark-devel-3.6.16-150000.3.100.1 * wireshark-ui-qt-debuginfo-3.6.16-150000.3.100.1 * libwsutil13-debuginfo-3.6.16-150000.3.100.1 * libwiretap12-3.6.16-150000.3.100.1 * libwsutil13-3.6.16-150000.3.100.1 * wireshark-3.6.16-150000.3.100.1 * libwireshark15-debuginfo-3.6.16-150000.3.100.1 * wireshark-ui-qt-3.6.16-150000.3.100.1 * wireshark-debugsource-3.6.16-150000.3.100.1 * libwireshark15-3.6.16-150000.3.100.1 * libwiretap12-debuginfo-3.6.16-150000.3.100.1 * wireshark-debuginfo-3.6.16-150000.3.100.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libwsutil13-debuginfo-3.6.16-150000.3.100.1 * libwiretap12-3.6.16-150000.3.100.1 * libwsutil13-3.6.16-150000.3.100.1 * wireshark-3.6.16-150000.3.100.1 * libwireshark15-debuginfo-3.6.16-150000.3.100.1 * wireshark-debugsource-3.6.16-150000.3.100.1 * libwireshark15-3.6.16-150000.3.100.1 * libwiretap12-debuginfo-3.6.16-150000.3.100.1 * wireshark-debuginfo-3.6.16-150000.3.100.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwsutil13-debuginfo-3.6.16-150000.3.100.1 * libwiretap12-3.6.16-150000.3.100.1 * libwsutil13-3.6.16-150000.3.100.1 * wireshark-3.6.16-150000.3.100.1 * libwireshark15-debuginfo-3.6.16-150000.3.100.1 * wireshark-debugsource-3.6.16-150000.3.100.1 * libwireshark15-3.6.16-150000.3.100.1 * libwiretap12-debuginfo-3.6.16-150000.3.100.1 * wireshark-debuginfo-3.6.16-150000.3.100.1 * Desktop Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * wireshark-ui-qt-debuginfo-3.6.16-150000.3.100.1 * wireshark-debuginfo-3.6.16-150000.3.100.1 * wireshark-ui-qt-3.6.16-150000.3.100.1 * wireshark-debugsource-3.6.16-150000.3.100.1 * wireshark-devel-3.6.16-150000.3.100.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * wireshark-ui-qt-debuginfo-3.6.16-150000.3.100.1 * wireshark-debuginfo-3.6.16-150000.3.100.1 * wireshark-ui-qt-3.6.16-150000.3.100.1 * wireshark-debugsource-3.6.16-150000.3.100.1 * wireshark-devel-3.6.16-150000.3.100.1 * SUSE Manager Proxy 4.2 (x86_64) * libwsutil13-debuginfo-3.6.16-150000.3.100.1 * libwiretap12-3.6.16-150000.3.100.1 * libwsutil13-3.6.16-150000.3.100.1 * wireshark-3.6.16-150000.3.100.1 * libwireshark15-debuginfo-3.6.16-150000.3.100.1 * wireshark-debugsource-3.6.16-150000.3.100.1 * libwireshark15-3.6.16-150000.3.100.1 * libwiretap12-debuginfo-3.6.16-150000.3.100.1 * wireshark-debuginfo-3.6.16-150000.3.100.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libwsutil13-debuginfo-3.6.16-150000.3.100.1 * libwiretap12-3.6.16-150000.3.100.1 * libwsutil13-3.6.16-150000.3.100.1 * wireshark-3.6.16-150000.3.100.1 * libwireshark15-debuginfo-3.6.16-150000.3.100.1 * wireshark-debugsource-3.6.16-150000.3.100.1 * libwireshark15-3.6.16-150000.3.100.1 * libwiretap12-debuginfo-3.6.16-150000.3.100.1 * wireshark-debuginfo-3.6.16-150000.3.100.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libwsutil13-debuginfo-3.6.16-150000.3.100.1 * libwiretap12-3.6.16-150000.3.100.1 * libwsutil13-3.6.16-150000.3.100.1 * wireshark-3.6.16-150000.3.100.1 * libwireshark15-debuginfo-3.6.16-150000.3.100.1 * wireshark-debugsource-3.6.16-150000.3.100.1 * libwireshark15-3.6.16-150000.3.100.1 * libwiretap12-debuginfo-3.6.16-150000.3.100.1 * wireshark-debuginfo-3.6.16-150000.3.100.1 ## References: * https://www.suse.com/security/cve/CVE-2023-2906.html * https://www.suse.com/security/cve/CVE-2023-4511.html * https://www.suse.com/security/cve/CVE-2023-4512.html * https://www.suse.com/security/cve/CVE-2023-4513.html * https://bugzilla.suse.com/show_bug.cgi?id=1214560 * https://bugzilla.suse.com/show_bug.cgi?id=1214561 * https://bugzilla.suse.com/show_bug.cgi?id=1214562 * https://bugzilla.suse.com/show_bug.cgi?id=1214652 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 27 16:30:19 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 27 Sep 2023 16:30:19 -0000 Subject: SUSE-SU-2023:3805-1: important: Security update for bind Message-ID: <169583221915.3215.4548230907705391957@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2023:3805-1 Rating: important References: * #1215472 Cross-References: * CVE-2023-3341 CVSS scores: * CVE-2023-3341 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3341 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE CaaS Platform 4.0 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Client Tools for SLE Micro 5 An update that solves one vulnerability can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2023-3341: Fixed stack exhaustion flaw in control channel code may cause named to terminate unexpectedly (bsc#1215472). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3805=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2023-3805=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3805=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3805=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3805=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3805=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3805=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3805=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.4 (x86_64) * libbind9-1600-32bit-9.16.6-150000.12.71.1 * libisc1606-32bit-debuginfo-9.16.6-150000.12.71.1 * bind-devel-32bit-9.16.6-150000.12.71.1 * libdns1605-32bit-debuginfo-9.16.6-150000.12.71.1 * libdns1605-32bit-9.16.6-150000.12.71.1 * libisccc1600-32bit-9.16.6-150000.12.71.1 * libns1604-32bit-9.16.6-150000.12.71.1 * libisccfg1600-32bit-9.16.6-150000.12.71.1 * libirs1601-32bit-debuginfo-9.16.6-150000.12.71.1 * libns1604-32bit-debuginfo-9.16.6-150000.12.71.1 * libisc1606-32bit-9.16.6-150000.12.71.1 * libbind9-1600-32bit-debuginfo-9.16.6-150000.12.71.1 * libirs1601-32bit-9.16.6-150000.12.71.1 * libisccc1600-32bit-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-32bit-debuginfo-9.16.6-150000.12.71.1 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * libisc1606-9.16.6-150000.12.71.1 * libisccc1600-9.16.6-150000.12.71.1 * bind-utils-9.16.6-150000.12.71.1 * libbind9-1600-9.16.6-150000.12.71.1 * libisccfg1600-9.16.6-150000.12.71.1 * libirs1601-9.16.6-150000.12.71.1 * libdns1605-9.16.6-150000.12.71.1 * SUSE Manager Client Tools for SLE Micro 5 (aarch64_ilp32) * libisc1606-64bit-9.16.6-150000.12.71.1 * libbind9-1600-64bit-9.16.6-150000.12.71.1 * libisccfg1600-64bit-9.16.6-150000.12.71.1 * libirs1601-64bit-9.16.6-150000.12.71.1 * libdns1605-64bit-9.16.6-150000.12.71.1 * libisccc1600-64bit-9.16.6-150000.12.71.1 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * python3-bind-9.16.6-150000.12.71.1 * SUSE Manager Client Tools for SLE Micro 5 (s390x x86_64) * libns1604-9.16.6-150000.12.71.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libisccc1600-9.16.6-150000.12.71.1 * bind-utils-9.16.6-150000.12.71.1 * libirs1601-9.16.6-150000.12.71.1 * bind-utils-debuginfo-9.16.6-150000.12.71.1 * libirs-devel-9.16.6-150000.12.71.1 * bind-chrootenv-9.16.6-150000.12.71.1 * bind-debuginfo-9.16.6-150000.12.71.1 * libisc1606-9.16.6-150000.12.71.1 * bind-debugsource-9.16.6-150000.12.71.1 * libisc1606-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-debuginfo-9.16.6-150000.12.71.1 * libdns1605-9.16.6-150000.12.71.1 * libisccc1600-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-9.16.6-150000.12.71.1 * libns1604-debuginfo-9.16.6-150000.12.71.1 * bind-devel-9.16.6-150000.12.71.1 * libirs1601-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-debuginfo-9.16.6-150000.12.71.1 * libns1604-9.16.6-150000.12.71.1 * libdns1605-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-9.16.6-150000.12.71.1 * bind-9.16.6-150000.12.71.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * bind-doc-9.16.6-150000.12.71.1 * python3-bind-9.16.6-150000.12.71.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libisccc1600-9.16.6-150000.12.71.1 * bind-utils-9.16.6-150000.12.71.1 * libirs1601-9.16.6-150000.12.71.1 * bind-utils-debuginfo-9.16.6-150000.12.71.1 * libirs-devel-9.16.6-150000.12.71.1 * bind-chrootenv-9.16.6-150000.12.71.1 * bind-debuginfo-9.16.6-150000.12.71.1 * libisc1606-9.16.6-150000.12.71.1 * bind-debugsource-9.16.6-150000.12.71.1 * libisc1606-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-debuginfo-9.16.6-150000.12.71.1 * libdns1605-9.16.6-150000.12.71.1 * libisccc1600-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-9.16.6-150000.12.71.1 * libns1604-debuginfo-9.16.6-150000.12.71.1 * bind-devel-9.16.6-150000.12.71.1 * libirs1601-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-debuginfo-9.16.6-150000.12.71.1 * libns1604-9.16.6-150000.12.71.1 * libdns1605-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-9.16.6-150000.12.71.1 * bind-9.16.6-150000.12.71.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * bind-doc-9.16.6-150000.12.71.1 * python3-bind-9.16.6-150000.12.71.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libisccc1600-9.16.6-150000.12.71.1 * bind-utils-9.16.6-150000.12.71.1 * libirs1601-9.16.6-150000.12.71.1 * bind-utils-debuginfo-9.16.6-150000.12.71.1 * libirs-devel-9.16.6-150000.12.71.1 * bind-chrootenv-9.16.6-150000.12.71.1 * bind-debuginfo-9.16.6-150000.12.71.1 * libisc1606-9.16.6-150000.12.71.1 * bind-debugsource-9.16.6-150000.12.71.1 * libisc1606-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-debuginfo-9.16.6-150000.12.71.1 * libdns1605-9.16.6-150000.12.71.1 * libisccc1600-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-9.16.6-150000.12.71.1 * libns1604-debuginfo-9.16.6-150000.12.71.1 * bind-devel-9.16.6-150000.12.71.1 * libirs1601-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-debuginfo-9.16.6-150000.12.71.1 * libns1604-9.16.6-150000.12.71.1 * libdns1605-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-9.16.6-150000.12.71.1 * bind-9.16.6-150000.12.71.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * bind-doc-9.16.6-150000.12.71.1 * python3-bind-9.16.6-150000.12.71.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libisccc1600-9.16.6-150000.12.71.1 * bind-utils-9.16.6-150000.12.71.1 * libirs1601-9.16.6-150000.12.71.1 * bind-utils-debuginfo-9.16.6-150000.12.71.1 * libirs-devel-9.16.6-150000.12.71.1 * bind-chrootenv-9.16.6-150000.12.71.1 * bind-debuginfo-9.16.6-150000.12.71.1 * libisc1606-9.16.6-150000.12.71.1 * bind-debugsource-9.16.6-150000.12.71.1 * libisc1606-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-debuginfo-9.16.6-150000.12.71.1 * libdns1605-9.16.6-150000.12.71.1 * libisccc1600-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-9.16.6-150000.12.71.1 * libns1604-debuginfo-9.16.6-150000.12.71.1 * bind-devel-9.16.6-150000.12.71.1 * libirs1601-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-debuginfo-9.16.6-150000.12.71.1 * libns1604-9.16.6-150000.12.71.1 * libdns1605-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-9.16.6-150000.12.71.1 * bind-9.16.6-150000.12.71.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * bind-doc-9.16.6-150000.12.71.1 * python3-bind-9.16.6-150000.12.71.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libisccc1600-9.16.6-150000.12.71.1 * bind-utils-9.16.6-150000.12.71.1 * libirs1601-9.16.6-150000.12.71.1 * bind-utils-debuginfo-9.16.6-150000.12.71.1 * libirs-devel-9.16.6-150000.12.71.1 * bind-chrootenv-9.16.6-150000.12.71.1 * bind-debuginfo-9.16.6-150000.12.71.1 * libisc1606-9.16.6-150000.12.71.1 * bind-debugsource-9.16.6-150000.12.71.1 * libisc1606-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-debuginfo-9.16.6-150000.12.71.1 * libdns1605-9.16.6-150000.12.71.1 * libisccc1600-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-9.16.6-150000.12.71.1 * libns1604-debuginfo-9.16.6-150000.12.71.1 * bind-devel-9.16.6-150000.12.71.1 * libirs1601-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-debuginfo-9.16.6-150000.12.71.1 * libns1604-9.16.6-150000.12.71.1 * libdns1605-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-9.16.6-150000.12.71.1 * bind-9.16.6-150000.12.71.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * bind-doc-9.16.6-150000.12.71.1 * python3-bind-9.16.6-150000.12.71.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libisccc1600-9.16.6-150000.12.71.1 * bind-utils-9.16.6-150000.12.71.1 * libirs1601-9.16.6-150000.12.71.1 * bind-utils-debuginfo-9.16.6-150000.12.71.1 * libirs-devel-9.16.6-150000.12.71.1 * bind-chrootenv-9.16.6-150000.12.71.1 * bind-debuginfo-9.16.6-150000.12.71.1 * libisc1606-9.16.6-150000.12.71.1 * bind-debugsource-9.16.6-150000.12.71.1 * libisc1606-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-debuginfo-9.16.6-150000.12.71.1 * libdns1605-9.16.6-150000.12.71.1 * libisccc1600-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-9.16.6-150000.12.71.1 * libns1604-debuginfo-9.16.6-150000.12.71.1 * bind-devel-9.16.6-150000.12.71.1 * libirs1601-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-debuginfo-9.16.6-150000.12.71.1 * libns1604-9.16.6-150000.12.71.1 * libdns1605-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-9.16.6-150000.12.71.1 * bind-9.16.6-150000.12.71.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * bind-doc-9.16.6-150000.12.71.1 * python3-bind-9.16.6-150000.12.71.1 * SUSE CaaS Platform 4.0 (x86_64) * libisccc1600-9.16.6-150000.12.71.1 * bind-utils-9.16.6-150000.12.71.1 * libirs1601-9.16.6-150000.12.71.1 * bind-utils-debuginfo-9.16.6-150000.12.71.1 * libirs-devel-9.16.6-150000.12.71.1 * bind-chrootenv-9.16.6-150000.12.71.1 * bind-debuginfo-9.16.6-150000.12.71.1 * libisc1606-9.16.6-150000.12.71.1 * bind-debugsource-9.16.6-150000.12.71.1 * libisc1606-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-debuginfo-9.16.6-150000.12.71.1 * libdns1605-9.16.6-150000.12.71.1 * libisccc1600-debuginfo-9.16.6-150000.12.71.1 * libisccfg1600-9.16.6-150000.12.71.1 * libns1604-debuginfo-9.16.6-150000.12.71.1 * bind-devel-9.16.6-150000.12.71.1 * libirs1601-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-debuginfo-9.16.6-150000.12.71.1 * libns1604-9.16.6-150000.12.71.1 * libdns1605-debuginfo-9.16.6-150000.12.71.1 * libbind9-1600-9.16.6-150000.12.71.1 * bind-9.16.6-150000.12.71.1 * SUSE CaaS Platform 4.0 (noarch) * bind-doc-9.16.6-150000.12.71.1 * python3-bind-9.16.6-150000.12.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-3341.html * https://bugzilla.suse.com/show_bug.cgi?id=1215472 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 27 20:30:10 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 27 Sep 2023 20:30:10 -0000 Subject: SUSE-RU-2023:3843-1: important: Recommended update for suse-build-key Message-ID: <169584661052.15763.9514069115365391348@smelt2.prg2.suse.org> # Recommended update for suse-build-key Announcement ID: SUSE-RU-2023:3843-1 Rating: important References: * PED-2777 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for suse-build-key fixes the following issues: This update adds and runs a import-suse-build-key script. It is run after installation with libzypp based installers. (jsc#PED-2777) It imports the future SUSE Linux Enterprise 15 4096 bit RSA key primary and reserve keys. To manually import them you can also run: # rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-3fa1d6ce-63c9481c.asc # rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-d588dc46-63c939db.asc ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3843=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3843=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3843=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3843=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3843=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3843=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3843=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3843=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3843=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3843=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3843=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3843=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3843=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3843=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3843=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3843=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3843=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3843=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3843=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3843=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3843=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3843=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3843=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3843=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3843=1 ## Package List: * openSUSE Leap 15.4 (noarch) * suse-build-key-12.0-150000.8.34.1 * openSUSE Leap 15.5 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * suse-build-key-12.0-150000.8.34.1 * Basesystem Module 15-SP4 (noarch) * suse-build-key-12.0-150000.8.34.1 * Basesystem Module 15-SP5 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Manager Proxy 4.2 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Manager Server 4.2 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Enterprise Storage 7.1 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE CaaS Platform 4.0 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * suse-build-key-12.0-150000.8.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * suse-build-key-12.0-150000.8.34.1 ## References: * https://jira.suse.com/browse/PED-2777 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 27 20:30:25 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 27 Sep 2023 20:30:25 -0000 Subject: SUSE-SU-2023:3836-1: important: Security update for quagga Message-ID: <169584662557.15763.18444417445554368829@smelt2.prg2.suse.org> # Security update for quagga Announcement ID: SUSE-SU-2023:3836-1 Rating: important References: * #1213284 * #1214735 Cross-References: * CVE-2023-38802 * CVE-2023-41358 CVSS scores: * CVE-2023-38802 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38802 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-41358 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-41358 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves two vulnerabilities can now be installed. ## Description: This update for quagga fixes the following issues: * CVE-2023-38802: Fixed bad length handling in BGP attribute handling (bsc#1213284). * CVE-2023-41358: Fixed possible crash when processing NLRIs if the attribute length is zero (bsc#1214735). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3836=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3836=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3836=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3836=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3836=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3836=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3836=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3836=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3836=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3836=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3836=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3836=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3836=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3836=1 ## Package List: * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Manager Proxy 4.2 (x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE CaaS Platform 4.0 (x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libzebra1-1.1.1-150000.4.3.1 * quagga-debuginfo-1.1.1-150000.4.3.1 * libfpm_pb0-1.1.1-150000.4.3.1 * libospf0-debuginfo-1.1.1-150000.4.3.1 * libquagga_pb0-1.1.1-150000.4.3.1 * libospfapiclient0-debuginfo-1.1.1-150000.4.3.1 * libospf0-1.1.1-150000.4.3.1 * libquagga_pb0-debuginfo-1.1.1-150000.4.3.1 * quagga-1.1.1-150000.4.3.1 * quagga-devel-1.1.1-150000.4.3.1 * libzebra1-debuginfo-1.1.1-150000.4.3.1 * quagga-debugsource-1.1.1-150000.4.3.1 * libfpm_pb0-debuginfo-1.1.1-150000.4.3.1 * libospfapiclient0-1.1.1-150000.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-38802.html * https://www.suse.com/security/cve/CVE-2023-41358.html * https://bugzilla.suse.com/show_bug.cgi?id=1213284 * https://bugzilla.suse.com/show_bug.cgi?id=1214735 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 27 20:30:42 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 27 Sep 2023 20:30:42 -0000 Subject: SUSE-SU-2023:3835-1: important: Securitys update for open-vm-tools Message-ID: <169584664223.15763.17732387602393599186@smelt2.prg2.suse.org> # Securitys update for open-vm-tools Announcement ID: SUSE-SU-2023:3835-1 Rating: important References: * #1205927 * #1214850 * PED-1344 Cross-References: * CVE-2023-20900 CVSS scores: * CVE-2023-20900 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-20900 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP4 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability, contains one feature and has one security fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: Update to 12.3.0 (build 22234872) (bsc#1214850) * There are no new features in the open-vm-tools 12.3.0 release. This is primarily a maintenance release that addresses a few critical problems, including: * This release integrates CVE-2023-20900 without the need for a patch. For more information on this vulnerability and its impact on VMware products, see https://www.vmware.com/security/advisories/VMSA-2023-0019.html. * A tools.conf configuration setting is available to temporaily direct Linux quiesced snaphots to restore pre open-vm-tools 12.2.0 behavior of ignoring file systems already frozen. * Building of the VMware Guest Authentication Service (VGAuth) using "xml- security-c" and "xerces-c" is being deprecated. * A number of Coverity reported issues have been addressed. * A number of GitHub issues and pull requests have been handled. Please see the Resolves Issues section of the Release Notes. * For issues resolved in this release, see the Resolved Issues section of the Release Notes. * For complete details, see: https://github.com/vmware/open-vm- tools/releases/tag/stable-12.3.0 * Release Notes are available at https://github.com/vmware/open-vm- tools/blob/stable-12.3.0/ReleaseNotes.md * The granular changes that have gone into the 12.3.0 release are in the ChangeLog at https://github.com/vmware/open-vm- tools/blob/stable-12.3.0/open-vm-tools/ChangeLog * Fix (bsc#1205927) - hv_vmbus module is loaded unnecessarily in VMware guests * jsc#PED-1344 - reinable building containerinfo plugin for SLES 15 SP4. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3835=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3835=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3835=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3835=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3835=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3835=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3835=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3835=1 * Desktop Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3835=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3835=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3835=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3835=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3835=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3835=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3835=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3835=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3835=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3835=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3835=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3835=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3835=1 ## Package List: * openSUSE Leap 15.4 (aarch64 x86_64) * open-vm-tools-desktop-12.3.0-150300.37.1 * open-vm-tools-containerinfo-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-containerinfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * open-vm-tools-desktop-debuginfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-12.3.0-150300.37.1 * libvmtools-devel-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * openSUSE Leap 15.4 (x86_64) * open-vm-tools-salt-minion-12.3.0-150300.37.1 * openSUSE Leap 15.5 (aarch64 x86_64) * open-vm-tools-desktop-12.3.0-150300.37.1 * open-vm-tools-containerinfo-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-containerinfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * open-vm-tools-desktop-debuginfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-12.3.0-150300.37.1 * libvmtools-devel-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * openSUSE Leap 15.5 (x86_64) * open-vm-tools-salt-minion-12.3.0-150300.37.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * Basesystem Module 15-SP4 (aarch64 x86_64) * open-vm-tools-containerinfo-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-containerinfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * open-vm-tools-sdmp-12.3.0-150300.37.1 * libvmtools-devel-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * Basesystem Module 15-SP4 (x86_64) * open-vm-tools-salt-minion-12.3.0-150300.37.1 * Basesystem Module 15-SP5 (aarch64 x86_64) * open-vm-tools-containerinfo-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-containerinfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * open-vm-tools-sdmp-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * Basesystem Module 15-SP5 (x86_64) * libvmtools-devel-12.3.0-150300.37.1 * open-vm-tools-salt-minion-12.3.0-150300.37.1 * Desktop Applications Module 15-SP4 (aarch64 x86_64) * open-vm-tools-desktop-12.3.0-150300.37.1 * open-vm-tools-desktop-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * Desktop Applications Module 15-SP5 (aarch64 x86_64) * open-vm-tools-desktop-12.3.0-150300.37.1 * open-vm-tools-desktop-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * open-vm-tools-desktop-12.3.0-150300.37.1 * open-vm-tools-containerinfo-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-containerinfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * open-vm-tools-desktop-debuginfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-12.3.0-150300.37.1 * libvmtools-devel-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-salt-minion-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * open-vm-tools-desktop-12.3.0-150300.37.1 * open-vm-tools-containerinfo-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-containerinfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * open-vm-tools-desktop-debuginfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-12.3.0-150300.37.1 * libvmtools-devel-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * open-vm-tools-desktop-12.3.0-150300.37.1 * open-vm-tools-containerinfo-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-containerinfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * open-vm-tools-desktop-debuginfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-12.3.0-150300.37.1 * libvmtools-devel-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-salt-minion-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * open-vm-tools-desktop-12.3.0-150300.37.1 * open-vm-tools-containerinfo-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-containerinfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * open-vm-tools-desktop-debuginfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-12.3.0-150300.37.1 * libvmtools-devel-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Manager Proxy 4.2 (x86_64) * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * open-vm-tools-sdmp-12.3.0-150300.37.1 * libvmtools-devel-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * open-vm-tools-sdmp-12.3.0-150300.37.1 * libvmtools-devel-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Manager Server 4.2 (x86_64) * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * open-vm-tools-sdmp-12.3.0-150300.37.1 * libvmtools-devel-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Enterprise Storage 7.1 (x86_64) * open-vm-tools-desktop-12.3.0-150300.37.1 * open-vm-tools-containerinfo-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-containerinfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * open-vm-tools-desktop-debuginfo-12.3.0-150300.37.1 * open-vm-tools-sdmp-12.3.0-150300.37.1 * libvmtools-devel-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-salt-minion-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * open-vm-tools-debuginfo-12.3.0-150300.37.1 * open-vm-tools-debugsource-12.3.0-150300.37.1 * libvmtools0-12.3.0-150300.37.1 * open-vm-tools-12.3.0-150300.37.1 * libvmtools0-debuginfo-12.3.0-150300.37.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20900.html * https://bugzilla.suse.com/show_bug.cgi?id=1205927 * https://bugzilla.suse.com/show_bug.cgi?id=1214850 * https://jira.suse.com/browse/PED-1344 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 27 20:30:56 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 27 Sep 2023 20:30:56 -0000 Subject: SUSE-SU-2023:3830-1: moderate: Security update for xrdp Message-ID: <169584665615.15763.2604919635254373893@smelt2.prg2.suse.org> # Security update for xrdp Announcement ID: SUSE-SU-2023:3830-1 Rating: moderate References: * #1214805 Cross-References: * CVE-2023-40184 CVSS scores: * CVE-2023-40184 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2023-40184 ( NVD ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for xrdp fixes the following issues: * CVE-2023-40184: Fixed restriction bypass via improper session handling (bsc#1214805). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3830=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3830=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3830=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3830=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3830=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3830=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3830=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * xrdp-debugsource-0.9.13.1-150200.4.24.1 * libpainter0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-devel-0.9.13.1-150200.4.24.1 * libpainter0-0.9.13.1-150200.4.24.1 * librfxencode0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-0.9.13.1-150200.4.24.1 * librfxencode0-0.9.13.1-150200.4.24.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * xrdp-debugsource-0.9.13.1-150200.4.24.1 * libpainter0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-devel-0.9.13.1-150200.4.24.1 * libpainter0-0.9.13.1-150200.4.24.1 * librfxencode0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-0.9.13.1-150200.4.24.1 * librfxencode0-0.9.13.1-150200.4.24.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * xrdp-debugsource-0.9.13.1-150200.4.24.1 * libpainter0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-devel-0.9.13.1-150200.4.24.1 * libpainter0-0.9.13.1-150200.4.24.1 * librfxencode0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-0.9.13.1-150200.4.24.1 * librfxencode0-0.9.13.1-150200.4.24.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * xrdp-debugsource-0.9.13.1-150200.4.24.1 * libpainter0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-devel-0.9.13.1-150200.4.24.1 * libpainter0-0.9.13.1-150200.4.24.1 * librfxencode0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-0.9.13.1-150200.4.24.1 * librfxencode0-0.9.13.1-150200.4.24.1 * SUSE Manager Proxy 4.2 (x86_64) * xrdp-debugsource-0.9.13.1-150200.4.24.1 * libpainter0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-devel-0.9.13.1-150200.4.24.1 * libpainter0-0.9.13.1-150200.4.24.1 * librfxencode0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-0.9.13.1-150200.4.24.1 * librfxencode0-0.9.13.1-150200.4.24.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * xrdp-debugsource-0.9.13.1-150200.4.24.1 * libpainter0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-devel-0.9.13.1-150200.4.24.1 * libpainter0-0.9.13.1-150200.4.24.1 * librfxencode0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-0.9.13.1-150200.4.24.1 * librfxencode0-0.9.13.1-150200.4.24.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * xrdp-debugsource-0.9.13.1-150200.4.24.1 * libpainter0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-devel-0.9.13.1-150200.4.24.1 * libpainter0-0.9.13.1-150200.4.24.1 * librfxencode0-debuginfo-0.9.13.1-150200.4.24.1 * xrdp-0.9.13.1-150200.4.24.1 * librfxencode0-0.9.13.1-150200.4.24.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40184.html * https://bugzilla.suse.com/show_bug.cgi?id=1214805 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 27 20:31:02 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 27 Sep 2023 20:31:02 -0000 Subject: SUSE-SU-2023:3828-1: important: Security update for python3 Message-ID: <169584666219.15763.14940469580647117898@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2023:3828-1 Rating: important References: * #1214692 Cross-References: * CVE-2023-40217 CVSS scores: * CVE-2023-40217 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2023-40217 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python3 fixes the following issues: * CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3828=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3828=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3828=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3828=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3828=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3828=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3828=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3828=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-3828=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2023-3828=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3828=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3828=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3828=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3828=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3828=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3828=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3828=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3828=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3828=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3828=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * python3-3.6.15-150300.10.51.1 * python3-doc-devhelp-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-tools-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-idle-3.6.15-150300.10.51.1 * python3-testsuite-3.6.15-150300.10.51.1 * python3-devel-debuginfo-3.6.15-150300.10.51.1 * python3-dbm-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-dbm-debuginfo-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * python3-devel-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * python3-curses-debuginfo-3.6.15-150300.10.51.1 * python3-tk-debuginfo-3.6.15-150300.10.51.1 * python3-curses-3.6.15-150300.10.51.1 * python3-testsuite-debuginfo-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-doc-3.6.15-150300.10.51.1 * python3-tk-3.6.15-150300.10.51.1 * openSUSE Leap 15.4 (x86_64) * libpython3_6m1_0-32bit-3.6.15-150300.10.51.1 * libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.51.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python3-3.6.15-150300.10.51.1 * python3-doc-devhelp-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-tools-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-idle-3.6.15-150300.10.51.1 * python3-testsuite-3.6.15-150300.10.51.1 * python3-devel-debuginfo-3.6.15-150300.10.51.1 * python3-dbm-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-dbm-debuginfo-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * python3-devel-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * python3-curses-debuginfo-3.6.15-150300.10.51.1 * python3-tk-debuginfo-3.6.15-150300.10.51.1 * python3-curses-3.6.15-150300.10.51.1 * python3-testsuite-debuginfo-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-doc-3.6.15-150300.10.51.1 * python3-tk-3.6.15-150300.10.51.1 * openSUSE Leap 15.5 (x86_64) * libpython3_6m1_0-32bit-3.6.15-150300.10.51.1 * libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.51.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-curses-debuginfo-3.6.15-150300.10.51.1 * python3-tk-debuginfo-3.6.15-150300.10.51.1 * python3-idle-3.6.15-150300.10.51.1 * python3-curses-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-dbm-debuginfo-3.6.15-150300.10.51.1 * python3-devel-3.6.15-150300.10.51.1 * python3-devel-debuginfo-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * python3-tk-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-dbm-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-curses-debuginfo-3.6.15-150300.10.51.1 * python3-tk-debuginfo-3.6.15-150300.10.51.1 * python3-idle-3.6.15-150300.10.51.1 * python3-curses-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-dbm-debuginfo-3.6.15-150300.10.51.1 * python3-devel-3.6.15-150300.10.51.1 * python3-devel-debuginfo-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * python3-tk-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-dbm-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * Development Tools Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python3-tools-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-tools-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-curses-debuginfo-3.6.15-150300.10.51.1 * python3-tk-debuginfo-3.6.15-150300.10.51.1 * python3-idle-3.6.15-150300.10.51.1 * python3-curses-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-dbm-debuginfo-3.6.15-150300.10.51.1 * python3-devel-3.6.15-150300.10.51.1 * python3-devel-debuginfo-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * python3-tk-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-tools-3.6.15-150300.10.51.1 * python3-dbm-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-curses-debuginfo-3.6.15-150300.10.51.1 * python3-tk-debuginfo-3.6.15-150300.10.51.1 * python3-idle-3.6.15-150300.10.51.1 * python3-curses-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-dbm-debuginfo-3.6.15-150300.10.51.1 * python3-devel-3.6.15-150300.10.51.1 * python3-devel-debuginfo-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * python3-tk-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-tools-3.6.15-150300.10.51.1 * python3-dbm-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-curses-debuginfo-3.6.15-150300.10.51.1 * python3-tk-debuginfo-3.6.15-150300.10.51.1 * python3-idle-3.6.15-150300.10.51.1 * python3-curses-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-dbm-debuginfo-3.6.15-150300.10.51.1 * python3-devel-3.6.15-150300.10.51.1 * python3-devel-debuginfo-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * python3-tk-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-tools-3.6.15-150300.10.51.1 * python3-dbm-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-curses-debuginfo-3.6.15-150300.10.51.1 * python3-tk-debuginfo-3.6.15-150300.10.51.1 * python3-idle-3.6.15-150300.10.51.1 * python3-curses-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-dbm-debuginfo-3.6.15-150300.10.51.1 * python3-devel-3.6.15-150300.10.51.1 * python3-devel-debuginfo-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * python3-tk-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-tools-3.6.15-150300.10.51.1 * python3-dbm-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * SUSE Manager Proxy 4.2 (x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-curses-debuginfo-3.6.15-150300.10.51.1 * python3-tk-debuginfo-3.6.15-150300.10.51.1 * python3-idle-3.6.15-150300.10.51.1 * python3-curses-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-dbm-debuginfo-3.6.15-150300.10.51.1 * python3-devel-3.6.15-150300.10.51.1 * python3-devel-debuginfo-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * python3-tk-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-dbm-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-curses-debuginfo-3.6.15-150300.10.51.1 * python3-tk-debuginfo-3.6.15-150300.10.51.1 * python3-idle-3.6.15-150300.10.51.1 * python3-curses-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-dbm-debuginfo-3.6.15-150300.10.51.1 * python3-devel-3.6.15-150300.10.51.1 * python3-devel-debuginfo-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * python3-tk-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-dbm-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-curses-debuginfo-3.6.15-150300.10.51.1 * python3-tk-debuginfo-3.6.15-150300.10.51.1 * python3-idle-3.6.15-150300.10.51.1 * python3-curses-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-dbm-debuginfo-3.6.15-150300.10.51.1 * python3-devel-3.6.15-150300.10.51.1 * python3-devel-debuginfo-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * python3-tk-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-dbm-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-curses-debuginfo-3.6.15-150300.10.51.1 * python3-tk-debuginfo-3.6.15-150300.10.51.1 * python3-idle-3.6.15-150300.10.51.1 * python3-curses-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-dbm-debuginfo-3.6.15-150300.10.51.1 * python3-devel-3.6.15-150300.10.51.1 * python3-devel-debuginfo-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * python3-tk-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-tools-3.6.15-150300.10.51.1 * python3-dbm-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * python3-3.6.15-150300.10.51.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.51.1 * python3-base-3.6.15-150300.10.51.1 * python3-debugsource-3.6.15-150300.10.51.1 * python3-core-debugsource-3.6.15-150300.10.51.1 * python3-debuginfo-3.6.15-150300.10.51.1 * libpython3_6m1_0-3.6.15-150300.10.51.1 * python3-base-debuginfo-3.6.15-150300.10.51.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40217.html * https://bugzilla.suse.com/show_bug.cgi?id=1214692 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 27 20:31:09 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 27 Sep 2023 20:31:09 -0000 Subject: SUSE-SU-2023:3826-1: moderate: Security update for mutt Message-ID: <169584666952.15763.15480420171020703384@smelt2.prg2.suse.org> # Security update for mutt Announcement ID: SUSE-SU-2023:3826-1 Rating: moderate References: * #1215189 * #1215191 Cross-References: * CVE-2023-4874 * CVE-2023-4875 CVSS scores: * CVE-2023-4874 ( SUSE ): 2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2023-4874 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2023-4875 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2023-4875 ( NVD ): 2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for mutt fixes the following issues: * CVE-2023-4874: Fixed NULL pointer dereference when composing an email (bsc#1215189). * CVE-2023-4875: Fixed NULL pointer dereference when receiving an email (bsc#1215191). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3826=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3826=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3826=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3826=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3826=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3826=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3826=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * mutt-debugsource-1.10.1-150000.3.26.1 * mutt-1.10.1-150000.3.26.1 * mutt-debuginfo-1.10.1-150000.3.26.1 * openSUSE Leap 15.4 (noarch) * mutt-doc-1.10.1-150000.3.26.1 * mutt-lang-1.10.1-150000.3.26.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * mutt-debugsource-1.10.1-150000.3.26.1 * mutt-1.10.1-150000.3.26.1 * mutt-debuginfo-1.10.1-150000.3.26.1 * openSUSE Leap 15.5 (noarch) * mutt-doc-1.10.1-150000.3.26.1 * mutt-lang-1.10.1-150000.3.26.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * mutt-debugsource-1.10.1-150000.3.26.1 * mutt-1.10.1-150000.3.26.1 * mutt-debuginfo-1.10.1-150000.3.26.1 * Basesystem Module 15-SP4 (noarch) * mutt-doc-1.10.1-150000.3.26.1 * mutt-lang-1.10.1-150000.3.26.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * mutt-debugsource-1.10.1-150000.3.26.1 * mutt-1.10.1-150000.3.26.1 * mutt-debuginfo-1.10.1-150000.3.26.1 * Basesystem Module 15-SP5 (noarch) * mutt-doc-1.10.1-150000.3.26.1 * mutt-lang-1.10.1-150000.3.26.1 * SUSE Manager Proxy 4.2 (x86_64) * mutt-debugsource-1.10.1-150000.3.26.1 * mutt-1.10.1-150000.3.26.1 * mutt-debuginfo-1.10.1-150000.3.26.1 * SUSE Manager Proxy 4.2 (noarch) * mutt-doc-1.10.1-150000.3.26.1 * mutt-lang-1.10.1-150000.3.26.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * mutt-debugsource-1.10.1-150000.3.26.1 * mutt-1.10.1-150000.3.26.1 * mutt-debuginfo-1.10.1-150000.3.26.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * mutt-doc-1.10.1-150000.3.26.1 * mutt-lang-1.10.1-150000.3.26.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * mutt-debugsource-1.10.1-150000.3.26.1 * mutt-1.10.1-150000.3.26.1 * mutt-debuginfo-1.10.1-150000.3.26.1 * SUSE Manager Server 4.2 (noarch) * mutt-doc-1.10.1-150000.3.26.1 * mutt-lang-1.10.1-150000.3.26.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4874.html * https://www.suse.com/security/cve/CVE-2023-4875.html * https://bugzilla.suse.com/show_bug.cgi?id=1215189 * https://bugzilla.suse.com/show_bug.cgi?id=1215191 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 27 20:31:18 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 27 Sep 2023 20:31:18 -0000 Subject: SUSE-SU-2023:3825-1: important: Security update for binutils Message-ID: <169584667890.15763.11061376202165811964@smelt2.prg2.suse.org> # Security update for binutils Announcement ID: SUSE-SU-2023:3825-1 Rating: important References: * #1200962 * #1206080 * #1206556 * #1208037 * #1208038 * #1208040 * #1208409 * #1209642 * #1210297 * #1210733 * #1213458 * #1214565 * #1214567 * #1214579 * #1214580 * #1214604 * #1214611 * #1214619 * #1214620 * #1214623 * #1214624 * #1214625 * PED-5778 Cross-References: * CVE-2020-19726 * CVE-2021-32256 * CVE-2022-35205 * CVE-2022-35206 * CVE-2022-4285 * CVE-2022-44840 * CVE-2022-45703 * CVE-2022-47673 * CVE-2022-47695 * CVE-2022-47696 * CVE-2022-48063 * CVE-2022-48064 * CVE-2022-48065 * CVE-2023-0687 * CVE-2023-1579 * CVE-2023-1972 * CVE-2023-2222 * CVE-2023-25585 * CVE-2023-25587 * CVE-2023-25588 CVSS scores: * CVE-2020-19726 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2021-32256 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2021-32256 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-35205 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2022-35205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-35206 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-4285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-4285 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-44840 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-45703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-47673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-48063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-48064 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2022-48064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-48065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-0687 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2023-0687 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0687 ( NVD ): 4.6 CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-1579 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2023-1579 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-1972 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2023-1972 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-2222 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2023-25585 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2023-25585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-25587 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2023-25588 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2023-25588 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that solves 20 vulnerabilities, contains one feature and has two security fixes can now be installed. ## Description: This update for binutils fixes the following issues: Update to version 2.41 [jsc#PED-5778]: * The MIPS port now supports the Sony Interactive Entertainment Allegrex processor, used with the PlayStation Portable, which implements the MIPS II ISA along with a single-precision FPU and a few implementation-specific integer instructions. * Objdump's --private option can now be used on PE format files to display the fields in the file header and section headers. * New versioned release of libsframe: libsframe.so.1. This release introduces versioned symbols with version node name LIBSFRAME_1.0. This release also updates the ABI in an incompatible way: this includes removal of sframe_get_funcdesc_with_addr API, change in the behavior of sframe_fre_get_ra_offset and sframe_fre_get_fp_offset APIs. * SFrame Version 2 is now the default (and only) format version supported by gas, ld, readelf and objdump. * Add command-line option, --strip-section-headers, to objcopy and strip to remove ELF section header from ELF file. * The RISC-V port now supports the following new standard extensions: * Zicond (conditional zero instructions) * Zfa (additional floating-point instructions) * Zvbb, Zvbc, Zvkg, Zvkned, Zvknh[ab], Zvksed, Zvksh, Zvkn, Zvknc, Zvkng, Zvks, Zvksc, Zvkg, Zvkt (vector crypto instructions) * The RISC-V port now supports the following vendor-defined extensions: * XVentanaCondOps * Add support for Intel FRED, LKGS and AMX-COMPLEX instructions. * A new .insn directive is recognized by x86 gas. * Add SME2 support to the AArch64 port. * The linker now accepts a command line option of --remap-inputs = to relace any input file that matches with . In addition the option --remap-inputs-file= can be used to specify a file containing any number of these remapping directives. * The linker command line option --print-map-locals can be used to include local symbols in a linker map. (ELF targets only). * For most ELF based targets, if the --enable-linker-version option is used then the version of the linker will be inserted as a string into the .comment section. * The linker script syntax has a new command for output sections: ASCIZ "string" This will insert a zero-terminated string at the current location. * Add command-line option, -z nosectionheader, to omit ELF section header. * Contains fixes for these non-CVEs (not security bugs per upstreams SECURITY.md): * bsc#1209642 aka CVE-2023-1579 aka PR29988 * bsc#1210297 aka CVE-2023-1972 aka PR30285 * bsc#1210733 aka CVE-2023-2222 aka PR29936 * bsc#1213458 aka CVE-2021-32256 aka PR105039 (gcc) * bsc#1214565 aka CVE-2020-19726 aka PR26240 * bsc#1214567 aka CVE-2022-35206 aka PR29290 * bsc#1214579 aka CVE-2022-35205 aka PR29289 * bsc#1214580 aka CVE-2022-44840 aka PR29732 * bsc#1214604 aka CVE-2022-45703 aka PR29799 * bsc#1214611 aka CVE-2022-48065 aka PR29925 * bsc#1214619 aka CVE-2022-48064 aka PR29922 * bsc#1214620 aka CVE-2022-48063 aka PR29924 * bsc#1214623 aka CVE-2022-47696 aka PR29677 * bsc#1214624 aka CVE-2022-47695 aka PR29846 * bsc#1214625 aka CVE-2022-47673 aka PR29876 * This only existed only for a very short while in SLE-15, as the main variant in devel:gcc subsumed this in binutils-revert-rela.diff. Hence: * Document fixed CVEs: * bsc#1208037 aka CVE-2023-25588 aka PR29677 * bsc#1208038 aka CVE-2023-25587 aka PR29846 * bsc#1208040 aka CVE-2023-25585 aka PR29892 * bsc#1208409 aka CVE-2023-0687 aka PR29444 * Enable bpf-none cross target and add bpf-none to the multitarget set of supported targets. * Disable packed-relative-relocs for old codestreams. They generate buggy relocations when binutils-revert-rela.diff is active. [bsc#1206556] * Disable ZSTD debug section compress by default. * Enable zstd compression algorithm (instead of zlib) for debug info sections by default. * Pack libgprofng only for supported platforms. * Move libgprofng-related libraries to the proper locations (packages). * Add --without=bootstrap for skipping of bootstrap (faster testing of the package). * Remove broken arm32-avoid-copyreloc.patch to fix [gcc#108515] Update to version 2.40: * Objdump has a new command line option --show-all-symbols which will make it display all symbols that match a given address when disassembling. (Normally only the first symbol that matches an address is shown). * Add --enable-colored-disassembly configure time option to enable colored disassembly output by default, if the output device is a terminal. Note, this configure option is disabled by default. * DCO signed contributions are now accepted. * objcopy --decompress-debug-sections now supports zstd compressed debug sections. The new option --compress-debug-sections=zstd compresses debug sections with zstd. * addr2line and objdump --dwarf now support zstd compressed debug sections. * The dlltool program now accepts --deterministic-libraries and \--non- deterministic-libraries as command line options to control whether or not it generates deterministic output libraries. If neither of these options are used the default is whatever was set when the binutils were configured. * readelf and objdump now have a newly added option --sframe which dumps the SFrame section. * Add support for Intel RAO-INT instructions. * Add support for Intel AVX-NE-CONVERT instructions. * Add support for Intel MSRLIST instructions. * Add support for Intel WRMSRNS instructions. * Add support for Intel CMPccXADD instructions. * Add support for Intel AVX-VNNI-INT8 instructions. * Add support for Intel AVX-IFMA instructions. * Add support for Intel PREFETCHI instructions. * Add support for Intel AMX-FP16 instructions. * gas now supports --compress-debug-sections=zstd to compress debug sections with zstd. * Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd} that selects the default compression algorithm for --enable-compressed-debug- sections. * Add support for various T-Head extensions (XTheadBa, XTheadBb, XTheadBs, XTheadCmo, XTheadCondMov, XTheadFMemIdx, XTheadFmv, XTheadInt, XTheadMemIdx, XTheadMemPair, XTheadMac, and XTheadSync) from version 2.0 of the T-Head ISA manual, which are implemented in the Allwinner D1. * Add support for the RISC-V Zawrs extension, version 1.0-rc4. * Add support for Cortex-X1C for Arm. * New command line option --gsframe to generate SFrame unwind information on x86_64 and aarch64 targets. * The linker has a new command line option to suppress the generation of any warning or error messages. This can be useful when there is a need to create a known non-working binary. The option is -w or --no-warnings. * ld now supports zstd compressed debug sections. The new option \--compress- debug-sections=zstd compresses debug sections with zstd. * Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd} that selects the default compression algorithm for --enable-compressed-debug- sections. * Remove support for -z bndplt (MPX prefix instructions). * Includes fixes for these CVEs: * bsc#1206080 aka CVE-2022-4285 aka PR29699 * Enable by default: --enable-colored-disassembly. * fix build on x86_64_vX platforms ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3825=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3825=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3825=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-3825=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2023-3825=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3825=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3825=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3825=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3825=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3825=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3825=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3825=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3825=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3825=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3825=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3825=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3825=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3825=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3825=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3825=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3825=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3825=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cross-hppa64-binutils-debugsource-2.41-150100.7.46.1 * cross-sparc-binutils-debuginfo-2.41-150100.7.46.1 * cross-hppa64-binutils-debuginfo-2.41-150100.7.46.1 * cross-hppa-binutils-debugsource-2.41-150100.7.46.1 * cross-sparc-binutils-2.41-150100.7.46.1 * binutils-gold-2.41-150100.7.46.1 * cross-ia64-binutils-2.41-150100.7.46.1 * cross-spu-binutils-debuginfo-2.41-150100.7.46.1 * cross-avr-binutils-2.41-150100.7.46.1 * cross-sparc64-binutils-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * cross-sparc64-binutils-debuginfo-2.41-150100.7.46.1 * cross-s390-binutils-debugsource-2.41-150100.7.46.1 * cross-xtensa-binutils-2.41-150100.7.46.1 * cross-ppc-binutils-2.41-150100.7.46.1 * cross-ppc-binutils-debugsource-2.41-150100.7.46.1 * cross-epiphany-binutils-2.41-150100.7.46.1 * cross-i386-binutils-debuginfo-2.41-150100.7.46.1 * cross-riscv64-binutils-2.41-150100.7.46.1 * cross-ppc64-binutils-debugsource-2.41-150100.7.46.1 * cross-sparc64-binutils-debugsource-2.41-150100.7.46.1 * cross-hppa64-binutils-2.41-150100.7.46.1 * cross-arm-binutils-debuginfo-2.41-150100.7.46.1 * cross-arm-binutils-debugsource-2.41-150100.7.46.1 * cross-m68k-binutils-debuginfo-2.41-150100.7.46.1 * cross-rx-binutils-2.41-150100.7.46.1 * libctf-nobfd0-2.41-150100.7.46.1 * cross-xtensa-binutils-debuginfo-2.41-150100.7.46.1 * cross-i386-binutils-debugsource-2.41-150100.7.46.1 * cross-spu-binutils-debugsource-2.41-150100.7.46.1 * cross-epiphany-binutils-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * cross-riscv64-binutils-debugsource-2.41-150100.7.46.1 * cross-ia64-binutils-debugsource-2.41-150100.7.46.1 * binutils-gold-debuginfo-2.41-150100.7.46.1 * cross-rx-binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * cross-m68k-binutils-2.41-150100.7.46.1 * cross-mips-binutils-debuginfo-2.41-150100.7.46.1 * cross-hppa-binutils-2.41-150100.7.46.1 * cross-ppc64-binutils-debuginfo-2.41-150100.7.46.1 * cross-i386-binutils-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * cross-ia64-binutils-debuginfo-2.41-150100.7.46.1 * cross-rx-binutils-debuginfo-2.41-150100.7.46.1 * cross-xtensa-binutils-debugsource-2.41-150100.7.46.1 * cross-hppa-binutils-debuginfo-2.41-150100.7.46.1 * cross-ppc64-binutils-2.41-150100.7.46.1 * cross-epiphany-binutils-debugsource-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * cross-sparc-binutils-debugsource-2.41-150100.7.46.1 * cross-avr-binutils-debugsource-2.41-150100.7.46.1 * cross-avr-binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * cross-m68k-binutils-debugsource-2.41-150100.7.46.1 * cross-spu-binutils-2.41-150100.7.46.1 * cross-arm-binutils-2.41-150100.7.46.1 * cross-ppc-binutils-debuginfo-2.41-150100.7.46.1 * cross-s390-binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * cross-s390-binutils-debuginfo-2.41-150100.7.46.1 * cross-mips-binutils-debugsource-2.41-150100.7.46.1 * cross-mips-binutils-2.41-150100.7.46.1 * cross-riscv64-binutils-debuginfo-2.41-150100.7.46.1 * openSUSE Leap 15.5 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * cross-aarch64-binutils-debugsource-2.41-150100.7.46.1 * cross-aarch64-binutils-debuginfo-2.41-150100.7.46.1 * cross-aarch64-binutils-2.41-150100.7.46.1 * openSUSE Leap 15.5 (aarch64 s390x x86_64) * cross-ppc64le-binutils-debuginfo-2.41-150100.7.46.1 * cross-ppc64le-binutils-2.41-150100.7.46.1 * cross-ppc64le-binutils-debugsource-2.41-150100.7.46.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * cross-s390x-binutils-debugsource-2.41-150100.7.46.1 * cross-s390x-binutils-2.41-150100.7.46.1 * cross-s390x-binutils-debuginfo-2.41-150100.7.46.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x) * cross-x86_64-binutils-debugsource-2.41-150100.7.46.1 * cross-x86_64-binutils-debuginfo-2.41-150100.7.46.1 * cross-x86_64-binutils-2.41-150100.7.46.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * Development Tools Module 15-SP4 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * Development Tools Module 15-SP5 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64) * binutils-gold-2.41-150100.7.46.1 * binutils-gold-debuginfo-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * binutils-gold-2.41-150100.7.46.1 * binutils-gold-debuginfo-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * SUSE Manager Proxy 4.2 (x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * SUSE Enterprise Storage 7.1 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 * SUSE CaaS Platform 4.0 (x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * binutils-devel-32bit-2.41-150100.7.46.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libctf-nobfd0-2.41-150100.7.46.1 * binutils-debugsource-2.41-150100.7.46.1 * binutils-debuginfo-2.41-150100.7.46.1 * binutils-gold-2.41-150100.7.46.1 * libctf0-2.41-150100.7.46.1 * libctf-nobfd0-debuginfo-2.41-150100.7.46.1 * libctf0-debuginfo-2.41-150100.7.46.1 * binutils-2.41-150100.7.46.1 * binutils-devel-2.41-150100.7.46.1 * binutils-gold-debuginfo-2.41-150100.7.46.1 * openSUSE Leap 15.4 (x86_64) * binutils-devel-32bit-2.41-150100.7.46.1 ## References: * https://www.suse.com/security/cve/CVE-2020-19726.html * https://www.suse.com/security/cve/CVE-2021-32256.html * https://www.suse.com/security/cve/CVE-2022-35205.html * https://www.suse.com/security/cve/CVE-2022-35206.html * https://www.suse.com/security/cve/CVE-2022-4285.html * https://www.suse.com/security/cve/CVE-2022-44840.html * https://www.suse.com/security/cve/CVE-2022-45703.html * https://www.suse.com/security/cve/CVE-2022-47673.html * https://www.suse.com/security/cve/CVE-2022-47695.html * https://www.suse.com/security/cve/CVE-2022-47696.html * https://www.suse.com/security/cve/CVE-2022-48063.html * https://www.suse.com/security/cve/CVE-2022-48064.html * https://www.suse.com/security/cve/CVE-2022-48065.html * https://www.suse.com/security/cve/CVE-2023-0687.html * https://www.suse.com/security/cve/CVE-2023-1579.html * https://www.suse.com/security/cve/CVE-2023-1972.html * https://www.suse.com/security/cve/CVE-2023-2222.html * https://www.suse.com/security/cve/CVE-2023-25585.html * https://www.suse.com/security/cve/CVE-2023-25587.html * https://www.suse.com/security/cve/CVE-2023-25588.html * https://bugzilla.suse.com/show_bug.cgi?id=1200962 * https://bugzilla.suse.com/show_bug.cgi?id=1206080 * https://bugzilla.suse.com/show_bug.cgi?id=1206556 * https://bugzilla.suse.com/show_bug.cgi?id=1208037 * https://bugzilla.suse.com/show_bug.cgi?id=1208038 * https://bugzilla.suse.com/show_bug.cgi?id=1208040 * https://bugzilla.suse.com/show_bug.cgi?id=1208409 * https://bugzilla.suse.com/show_bug.cgi?id=1209642 * https://bugzilla.suse.com/show_bug.cgi?id=1210297 * https://bugzilla.suse.com/show_bug.cgi?id=1210733 * https://bugzilla.suse.com/show_bug.cgi?id=1213458 * https://bugzilla.suse.com/show_bug.cgi?id=1214565 * https://bugzilla.suse.com/show_bug.cgi?id=1214567 * https://bugzilla.suse.com/show_bug.cgi?id=1214579 * https://bugzilla.suse.com/show_bug.cgi?id=1214580 * https://bugzilla.suse.com/show_bug.cgi?id=1214604 * https://bugzilla.suse.com/show_bug.cgi?id=1214611 * https://bugzilla.suse.com/show_bug.cgi?id=1214619 * https://bugzilla.suse.com/show_bug.cgi?id=1214620 * https://bugzilla.suse.com/show_bug.cgi?id=1214623 * https://bugzilla.suse.com/show_bug.cgi?id=1214624 * https://bugzilla.suse.com/show_bug.cgi?id=1214625 * https://jira.suse.com/browse/PED-5778 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 27 20:31:29 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 27 Sep 2023 20:31:29 -0000 Subject: SUSE-SU-2023:3822-1: moderate: Security update for supportutils Message-ID: <169584668995.15763.16782920484422613925@smelt2.prg2.suse.org> # Security update for supportutils Announcement ID: SUSE-SU-2023:3822-1 Rating: moderate References: * #1181477 * #1196933 * #1204942 * #1205533 * #1206402 * #1206608 * #1207543 * #1207598 * #1208928 * #1209979 * #1210015 * #1210950 * #1211598 * #1211599 * #1213127 * PED-1703 Cross-References: * CVE-2022-45154 CVSS scores: * CVE-2022-45154 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2022-45154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability, contains one feature and has 14 security fixes can now be installed. ## Description: This update for supportutils fixes the following issues: Security fixes: * CVE-2022-45154: Removed iSCSI passwords (bsc#1207598). Other Fixes: * Changes in version 3.1.26 * powerpc plugin to collect the slots and active memory (bsc#1210950) * A Cleartext Storage of Sensitive Information vulnerability CVE-2022-45154 * supportconfig: collect BPF information (pr#154) * Added additional iscsi information (pr#155) * Added run time detection (bsc#1213127) * Changes for supportutils version 3.1.25 * Removed iSCSI passwords CVE-2022-45154 (bsc#1207598) * powerpc: Collect lsslot,amsstat, and opal elogs (pr#149) * powerpc: collect invscout logs (pr#150) * powerpc: collect RMC status logs (pr#151) * Added missing nvme nbft commands (bsc#1211599) * Fixed invalid nvme commands (bsc#1211598) * Added missing podman information (PED-1703, bsc#1181477) * Removed dependency on sysfstools * Check for systool use (bsc#1210015) * Added selinux checking (bsc#1209979) * Updated SLES_VER matrix * Fixed missing status detail for apparmor (bsc#1196933) * Corrected invalid argument list in docker.txt (bsc#1206608) * Applies limit equally to sar data and text files (bsc#1207543) * Collects hwinfo hardware logs (bsc#1208928) * Collects lparnumascore logs (issue#148) * Add dependency to `numactl` on ppc64le and `s390x`, this enforces that `numactl --hardware` data is provided in supportconfigs * Changes to supportconfig.rc version 3.1.11-35 * Corrected _sanitize_file to include iscsi.conf and others (bsc#1206402) * Changes to supportconfig version 3.1.11-46.4 * Added plymouth_info * Changes to getappcore version 1.53.02 * The location of chkbin was updated earlier. This documents that change (bsc#1205533, bsc#1204942) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3822=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3822=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3822=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3822=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3822=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3822=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3822=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3822=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3822=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3822=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3822=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3822=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3822=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3822=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3822=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3822=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3822=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3822=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3822=1 ## Package List: * openSUSE Leap 15.4 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * openSUSE Leap 15.5 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * Basesystem Module 15-SP4 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * Basesystem Module 15-SP5 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Manager Proxy 4.2 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Manager Server 4.2 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Enterprise Storage 7.1 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * supportutils-3.1.26-150300.7.35.21.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * supportutils-3.1.26-150300.7.35.21.1 ## References: * https://www.suse.com/security/cve/CVE-2022-45154.html * https://bugzilla.suse.com/show_bug.cgi?id=1181477 * https://bugzilla.suse.com/show_bug.cgi?id=1196933 * https://bugzilla.suse.com/show_bug.cgi?id=1204942 * https://bugzilla.suse.com/show_bug.cgi?id=1205533 * https://bugzilla.suse.com/show_bug.cgi?id=1206402 * https://bugzilla.suse.com/show_bug.cgi?id=1206608 * https://bugzilla.suse.com/show_bug.cgi?id=1207543 * https://bugzilla.suse.com/show_bug.cgi?id=1207598 * https://bugzilla.suse.com/show_bug.cgi?id=1208928 * https://bugzilla.suse.com/show_bug.cgi?id=1209979 * https://bugzilla.suse.com/show_bug.cgi?id=1210015 * https://bugzilla.suse.com/show_bug.cgi?id=1210950 * https://bugzilla.suse.com/show_bug.cgi?id=1211598 * https://bugzilla.suse.com/show_bug.cgi?id=1211599 * https://bugzilla.suse.com/show_bug.cgi?id=1213127 * https://jira.suse.com/browse/PED-1703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 27 20:31:39 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 27 Sep 2023 20:31:39 -0000 Subject: SUSE-SU-2023:3819-1: important: Security update for busybox Message-ID: <169584669909.15763.11492856652597266731@smelt2.prg2.suse.org> # Security update for busybox Announcement ID: SUSE-SU-2023:3819-1 Rating: important References: * #1214538 Cross-References: * CVE-2022-48174 CVSS scores: * CVE-2022-48174 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-48174 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves one vulnerability can now be installed. ## Description: This update for busybox fixes the following issues: * CVE-2022-48174: Fixed stack overflow vulnerability. (bsc#1214538) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3819=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3819=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3819=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3819=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3819=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3819=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3819=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3819=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3819=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3819=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3819=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3819=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3819=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3819=1 * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-3819=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Manager Proxy 4.2 (x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE Enterprise Storage 7 (aarch64 x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 * SUSE CaaS Platform 4.0 (x86_64) * busybox-static-1.35.0-150000.4.20.1 * busybox-1.35.0-150000.4.20.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48174.html * https://bugzilla.suse.com/show_bug.cgi?id=1214538 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Wed Sep 27 20:32:07 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Wed, 27 Sep 2023 20:32:07 -0000 Subject: SUSE-RU-2023:3814-1: moderate: Recommended update for glibc Message-ID: <169584672701.15763.8048665062364966664@smelt2.prg2.suse.org> # Recommended update for glibc Announcement ID: SUSE-RU-2023:3814-1 Rating: moderate References: * #1211829 * #1212819 * #1212910 * PED-4908 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that contains one feature and has three fixes can now be installed. ## Description: This update for glibc fixes the following issues: * nscd: Fix netlink cache invalidation if epoll is used (bsc#1212910, BZ #29415) * Restore lookup of IPv4 mapped addresses in files database (bsc#1212819, BZ #25457) * elf: Remove excessive p_align check on PT_LOAD segments (bsc#1211829, BZ #28688) * elf: Properly align PT_LOAD segments (bsc#1211829, BZ #28676) * ld.so: Always use MAP_COPY to map the first segment (BZ #30452) * add GB18030-2022 charmap (jsc#PED-4908, BZ #30243) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3814=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3814=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3814=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3814=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3814=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3814=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3814=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3814=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-3814=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2023-3814=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3814=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3814=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3814=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3814=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3814=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3814=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3814=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3814=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3814=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3814=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3814=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-utils-debuginfo-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * nscd-2.31-150300.58.1 * glibc-utils-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-extra-2.31-150300.58.1 * glibc-utils-src-debugsource-2.31-150300.58.1 * glibc-profile-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * glibc-devel-static-2.31-150300.58.1 * nscd-debuginfo-2.31-150300.58.1 * glibc-extra-debuginfo-2.31-150300.58.1 * openSUSE Leap 15.4 (x86_64) * glibc-devel-32bit-2.31-150300.58.1 * glibc-32bit-2.31-150300.58.1 * glibc-devel-32bit-debuginfo-2.31-150300.58.1 * glibc-utils-32bit-2.31-150300.58.1 * glibc-utils-32bit-debuginfo-2.31-150300.58.1 * glibc-devel-static-32bit-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-2.31-150300.58.1 * glibc-profile-32bit-2.31-150300.58.1 * openSUSE Leap 15.4 (noarch) * glibc-lang-2.31-150300.58.1 * glibc-i18ndata-2.31-150300.58.1 * glibc-html-2.31-150300.58.1 * glibc-info-2.31-150300.58.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-utils-debuginfo-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * nscd-2.31-150300.58.1 * glibc-utils-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-extra-2.31-150300.58.1 * glibc-utils-src-debugsource-2.31-150300.58.1 * glibc-profile-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * glibc-devel-static-2.31-150300.58.1 * nscd-debuginfo-2.31-150300.58.1 * glibc-extra-debuginfo-2.31-150300.58.1 * openSUSE Leap 15.5 (x86_64) * glibc-devel-32bit-2.31-150300.58.1 * glibc-32bit-2.31-150300.58.1 * glibc-devel-32bit-debuginfo-2.31-150300.58.1 * glibc-utils-32bit-2.31-150300.58.1 * glibc-utils-32bit-debuginfo-2.31-150300.58.1 * glibc-devel-static-32bit-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-2.31-150300.58.1 * glibc-profile-32bit-2.31-150300.58.1 * openSUSE Leap 15.5 (noarch) * glibc-lang-2.31-150300.58.1 * glibc-i18ndata-2.31-150300.58.1 * glibc-html-2.31-150300.58.1 * glibc-info-2.31-150300.58.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * nscd-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-extra-2.31-150300.58.1 * glibc-profile-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * nscd-debuginfo-2.31-150300.58.1 * glibc-extra-debuginfo-2.31-150300.58.1 * Basesystem Module 15-SP4 (noarch) * glibc-i18ndata-2.31-150300.58.1 * glibc-lang-2.31-150300.58.1 * glibc-info-2.31-150300.58.1 * Basesystem Module 15-SP4 (x86_64) * glibc-locale-base-32bit-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-32bit-2.31-150300.58.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.58.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * nscd-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-extra-2.31-150300.58.1 * glibc-profile-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * nscd-debuginfo-2.31-150300.58.1 * glibc-extra-debuginfo-2.31-150300.58.1 * Basesystem Module 15-SP5 (noarch) * glibc-i18ndata-2.31-150300.58.1 * glibc-lang-2.31-150300.58.1 * glibc-info-2.31-150300.58.1 * Basesystem Module 15-SP5 (x86_64) * glibc-locale-base-32bit-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-32bit-2.31-150300.58.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.58.1 * Development Tools Module 15-SP4 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-utils-debuginfo-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-utils-src-debugsource-2.31-150300.58.1 * glibc-devel-static-2.31-150300.58.1 * glibc-utils-2.31-150300.58.1 * Development Tools Module 15-SP4 (x86_64) * glibc-devel-32bit-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-devel-32bit-debuginfo-2.31-150300.58.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-utils-debuginfo-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-utils-src-debugsource-2.31-150300.58.1 * glibc-devel-static-2.31-150300.58.1 * glibc-utils-2.31-150300.58.1 * Development Tools Module 15-SP5 (x86_64) * glibc-devel-32bit-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-devel-32bit-debuginfo-2.31-150300.58.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-utils-debuginfo-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * nscd-2.31-150300.58.1 * glibc-utils-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-extra-2.31-150300.58.1 * glibc-utils-src-debugsource-2.31-150300.58.1 * glibc-profile-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * glibc-devel-static-2.31-150300.58.1 * nscd-debuginfo-2.31-150300.58.1 * glibc-extra-debuginfo-2.31-150300.58.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * glibc-i18ndata-2.31-150300.58.1 * glibc-lang-2.31-150300.58.1 * glibc-info-2.31-150300.58.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * glibc-devel-32bit-2.31-150300.58.1 * glibc-32bit-2.31-150300.58.1 * glibc-devel-32bit-debuginfo-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-2.31-150300.58.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-utils-debuginfo-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * nscd-2.31-150300.58.1 * glibc-utils-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-extra-2.31-150300.58.1 * glibc-utils-src-debugsource-2.31-150300.58.1 * glibc-profile-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * glibc-devel-static-2.31-150300.58.1 * nscd-debuginfo-2.31-150300.58.1 * glibc-extra-debuginfo-2.31-150300.58.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * glibc-i18ndata-2.31-150300.58.1 * glibc-lang-2.31-150300.58.1 * glibc-info-2.31-150300.58.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * glibc-devel-32bit-2.31-150300.58.1 * glibc-32bit-2.31-150300.58.1 * glibc-devel-32bit-debuginfo-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-2.31-150300.58.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-utils-debuginfo-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * nscd-2.31-150300.58.1 * glibc-utils-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-extra-2.31-150300.58.1 * glibc-utils-src-debugsource-2.31-150300.58.1 * glibc-profile-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * glibc-devel-static-2.31-150300.58.1 * nscd-debuginfo-2.31-150300.58.1 * glibc-extra-debuginfo-2.31-150300.58.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * glibc-i18ndata-2.31-150300.58.1 * glibc-lang-2.31-150300.58.1 * glibc-info-2.31-150300.58.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * glibc-devel-32bit-2.31-150300.58.1 * glibc-32bit-2.31-150300.58.1 * glibc-devel-32bit-debuginfo-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-2.31-150300.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-utils-debuginfo-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * nscd-2.31-150300.58.1 * glibc-utils-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-extra-2.31-150300.58.1 * glibc-utils-src-debugsource-2.31-150300.58.1 * glibc-profile-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * glibc-devel-static-2.31-150300.58.1 * nscd-debuginfo-2.31-150300.58.1 * glibc-extra-debuginfo-2.31-150300.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * glibc-i18ndata-2.31-150300.58.1 * glibc-lang-2.31-150300.58.1 * glibc-info-2.31-150300.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * glibc-devel-32bit-2.31-150300.58.1 * glibc-32bit-2.31-150300.58.1 * glibc-devel-32bit-debuginfo-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-2.31-150300.58.1 * SUSE Manager Proxy 4.2 (x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-32bit-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * nscd-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-extra-2.31-150300.58.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.58.1 * glibc-profile-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-2.31-150300.58.1 * nscd-debuginfo-2.31-150300.58.1 * glibc-extra-debuginfo-2.31-150300.58.1 * SUSE Manager Proxy 4.2 (noarch) * glibc-i18ndata-2.31-150300.58.1 * glibc-lang-2.31-150300.58.1 * glibc-info-2.31-150300.58.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-32bit-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * nscd-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-extra-2.31-150300.58.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.58.1 * glibc-profile-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-2.31-150300.58.1 * nscd-debuginfo-2.31-150300.58.1 * glibc-extra-debuginfo-2.31-150300.58.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * glibc-i18ndata-2.31-150300.58.1 * glibc-lang-2.31-150300.58.1 * glibc-info-2.31-150300.58.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * nscd-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-extra-2.31-150300.58.1 * glibc-profile-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * nscd-debuginfo-2.31-150300.58.1 * glibc-extra-debuginfo-2.31-150300.58.1 * SUSE Manager Server 4.2 (noarch) * glibc-i18ndata-2.31-150300.58.1 * glibc-lang-2.31-150300.58.1 * glibc-info-2.31-150300.58.1 * SUSE Manager Server 4.2 (x86_64) * glibc-locale-base-32bit-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-32bit-2.31-150300.58.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.58.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-utils-debuginfo-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * nscd-2.31-150300.58.1 * glibc-utils-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-devel-debuginfo-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-extra-2.31-150300.58.1 * glibc-utils-src-debugsource-2.31-150300.58.1 * glibc-profile-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * glibc-devel-static-2.31-150300.58.1 * nscd-debuginfo-2.31-150300.58.1 * glibc-extra-debuginfo-2.31-150300.58.1 * SUSE Enterprise Storage 7.1 (noarch) * glibc-i18ndata-2.31-150300.58.1 * glibc-lang-2.31-150300.58.1 * glibc-info-2.31-150300.58.1 * SUSE Enterprise Storage 7.1 (x86_64) * glibc-devel-32bit-2.31-150300.58.1 * glibc-32bit-2.31-150300.58.1 * glibc-devel-32bit-debuginfo-2.31-150300.58.1 * glibc-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.58.1 * glibc-locale-base-32bit-2.31-150300.58.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * glibc-debugsource-2.31-150300.58.1 * glibc-2.31-150300.58.1 * glibc-locale-base-2.31-150300.58.1 * glibc-debuginfo-2.31-150300.58.1 * glibc-devel-2.31-150300.58.1 * glibc-locale-2.31-150300.58.1 * glibc-locale-base-debuginfo-2.31-150300.58.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1211829 * https://bugzilla.suse.com/show_bug.cgi?id=1212819 * https://bugzilla.suse.com/show_bug.cgi?id=1212910 * https://jira.suse.com/browse/PED-4908 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 08:30:12 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 08:30:12 -0000 Subject: SUSE-RU-2023:3853-1: moderate: Recommended update for libostree Message-ID: <169588981204.3658.4479728512302749965@smelt2.prg2.suse.org> # Recommended update for libostree Announcement ID: SUSE-RU-2023:3853-1 Rating: moderate References: * #1214708 Affected Products: * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that has one fix can now be installed. ## Description: This update for libostree fixes the following issues: * Cherry-pick an upstream patch to fix corrupted files when using a large fs with 64-bit inodes (bsc#1214708) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3853=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3853=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3853=1 ## Package List: * SUSE Manager Proxy 4.2 (x86_64) * libostree-debuginfo-2020.8-150200.3.9.1 * libostree-1-1-debuginfo-2020.8-150200.3.9.1 * libostree-1-1-2020.8-150200.3.9.1 * libostree-debugsource-2020.8-150200.3.9.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libostree-debuginfo-2020.8-150200.3.9.1 * libostree-1-1-debuginfo-2020.8-150200.3.9.1 * libostree-1-1-2020.8-150200.3.9.1 * libostree-debugsource-2020.8-150200.3.9.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libostree-debuginfo-2020.8-150200.3.9.1 * libostree-1-1-debuginfo-2020.8-150200.3.9.1 * libostree-1-1-2020.8-150200.3.9.1 * libostree-debugsource-2020.8-150200.3.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214708 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 08:30:18 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 08:30:18 -0000 Subject: SUSE-RU-2023:3850-1: moderate: Recommended update for evolution Message-ID: <169588981896.3658.16279008718175974155@smelt2.prg2.suse.org> # Recommended update for evolution Announcement ID: SUSE-RU-2023:3850-1 Rating: moderate References: * #1213858 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP4 * Desktop Applications Module 15-SP5 * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP4 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that has one fix can now be installed. ## Description: This update for evolution and its dependencies fixes the following issues: evolution: * Handle frame flattening change in WebKitGTK 2.40 (bsc#1213858) bogofilter, evolution-data-server, gcr, geocode-glib, gjs, glade, gnome-autoar, gnome-desktop, gnome-online-accounts, gsl, gspell, gtkspell3, libcanberra, libgdata, libgweather, libical, liboauth, libphonenumber, librest, libxkbcommon, mozjs78: * Deliver missing direct and indirect dependencies of evolution to SUSE Package Hub 15 SP{4,5} for aarch64, ppc64le and s390x * There are NO code changes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2023-3850=1 openSUSE-SLE-15.4-2023-3850=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3850=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3850=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3850=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3850=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3850=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3850=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3850=1 * Desktop Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3850=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3850=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-3850=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2023-3850=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3850=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3850=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3850=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3850=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3850=1 * SUSE Linux Enterprise Workstation Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2023-3850=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2023-3850=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3850=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3850=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libebook-contacts-1_2-3-debuginfo-3.42.5-150400.3.5.4 * libgnome-desktop-3-19-41.8-150400.3.5.2 * glade-3.38.2-150400.4.2.2 * gnome-online-accounts-3.40.1-150400.3.2.2 * evolution-debuginfo-3.42.4-150400.3.8.2 * libical-glib-debugsource-3.0.10-150400.3.2.3 * libgnome-autoar-0-0-debuginfo-0.4.1-150400.3.2.2 * typelib-1_0-Gcr-3-3.41.1-150400.3.5.2 * libgdata22-debuginfo-0.18.1-150400.4.2.2 * libecal-2_0-1-debuginfo-3.42.5-150400.3.5.4 * libgeocode-glib0-debuginfo-3.26.4-150400.3.5.2 * libebook-contacts-1_2-3-3.42.5-150400.3.5.4 * gcr-prompter-debuginfo-3.41.1-150400.3.5.2 * libphonenumber8-debuginfo-8.12.23-150400.3.2.3 * libxkbcommon-tools-debuginfo-1.3.0-150400.3.2.2 * gcr-data-3.41.1-150400.3.5.2 * evolution-plugin-pst-import-3.42.4-150400.3.8.2 * libgnome-autoar-gtk-0-0-0.4.1-150400.3.2.2 * gspell-devel-1.10.0-150400.3.5.3 * libgoa-1_0-0-3.40.1-150400.3.2.2 * evolution-devel-3.42.4-150400.3.8.2 * libcanberra-devel-0.30-150400.15.2.2 * gnome-autoar-devel-0.4.1-150400.3.2.2 * libgjs0-1.70.2-150400.3.5.4 * libgdata22-0.18.1-150400.4.2.2 * gtkspell3-devel-3.0.10-150400.11.2.2 * typelib-1_0-EDataServer-1_2-3.42.5-150400.3.5.4 * libedata-book-1_2-26-3.42.5-150400.3.5.4 * geocode-glib-devel-3.26.4-150400.3.5.2 * typelib-1_0-ICal-3_0-3.0.10-150400.3.2.3 * typelib-1_0-GWeather-3_0-40.0-150400.3.2.2 * libxkbcommon-x11-0-1.3.0-150400.3.2.2 * libgjs-devel-1.70.2-150400.3.5.4 * typelib-1_0-GcrUi-3-3.41.1-150400.3.5.2 * libedataserverui-1_2-3-3.42.5-150400.3.5.4 * libgcr-devel-3.41.1-150400.3.5.2 * libebackend-1_2-10-3.42.5-150400.3.5.4 * gnome-desktop-debugsource-41.8-150400.3.5.2 * libcamel-1_2-63-debuginfo-3.42.5-150400.3.5.4 * typelib-1_0-GnomeDesktop-3_0-41.8-150400.3.5.2 * libgdata-devel-0.18.1-150400.4.2.2 * libedataserver-1_2-26-debuginfo-3.42.5-150400.3.5.4 * canberra-gtk-play-debuginfo-0.30-150400.15.2.2 * gnome-autoar-debugsource-0.4.1-150400.3.2.2 * evolution-plugin-spamassassin-3.42.4-150400.3.8.2 * libgnome-desktop-3-devel-41.8-150400.3.5.2 * libgnome-desktop-3_0-common-41.8-150400.3.5.2 * typelib-1_0-GtkSpell-3_0-3.0.10-150400.11.2.2 * libcanberra-debugsource-0.30-150400.15.2.2 * libcanberra0-0.30-150400.15.2.2 * libxkbcommon-tools-1.3.0-150400.3.2.2 * libgnome-autoar-0-0-0.4.1-150400.3.2.2 * typelib-1_0-GData-0_0-0.18.1-150400.4.2.2 * typelib-1_0-GeocodeGlib-1_0-3.26.4-150400.3.5.2 * libgeocode-glib0-3.26.4-150400.3.5.2 * gjs-debugsource-1.70.2-150400.3.5.4 * libcanberra-gtk3-module-0.30-150400.15.2.2 * typelib-1_0-Gck-1-3.41.1-150400.3.5.2 * libgweather-3-16-debuginfo-40.0-150400.3.2.2 * libical-debugsource-3.0.10-150400.3.2.4 * libgoa-backend-1_0-1-3.40.1-150400.3.2.2 * gcr-viewer-3.41.1-150400.3.5.2 * libgcr-3-1-debuginfo-3.41.1-150400.3.5.2 * gnome-desktop-debuginfo-41.8-150400.3.5.2 * libgoa-backend-1_0-1-debuginfo-3.40.1-150400.3.2.2 * gweather-data-40.0-150400.3.2.2 * libgnome-autoar-gtk-0-0-debuginfo-0.4.1-150400.3.2.2 * gcr-debugsource-3.41.1-150400.3.5.2 * typelib-1_0-Camel-1_2-3.42.5-150400.3.5.4 * gspell-debugsource-1.10.0-150400.3.5.3 * libedataserver-1_2-26-3.42.5-150400.3.5.4 * libebackend-1_2-10-debuginfo-3.42.5-150400.3.5.4 * libphonenumber-devel-8.12.23-150400.3.2.3 * typelib-1_0-Goa-1_0-3.40.1-150400.3.2.2 * gcr-viewer-debuginfo-3.41.1-150400.3.5.2 * typelib-1_0-GnomeAutoarGtk-0_1-0.4.1-150400.3.2.2 * libgnome-desktop-3-19-debuginfo-41.8-150400.3.5.2 * evolution-data-server-debugsource-3.42.5-150400.3.5.4 * libcamel-1_2-63-3.42.5-150400.3.5.4 * typelib-1_0-GnomeAutoar-0_1-0.4.1-150400.3.2.2 * libgspell-1-2-1.10.0-150400.3.5.3 * libgspell-1-2-debuginfo-1.10.0-150400.3.5.3 * libgweather-3-16-40.0-150400.3.2.2 * typelib-1_0-EBookContacts-1_2-3.42.5-150400.3.5.4 * typelib-1_0-ECal-2_0-3.42.5-150400.3.5.4 * libphonenumber8-8.12.23-150400.3.2.3 * typelib-1_0-EDataBook-1_2-3.42.5-150400.3.5.4 * evolution-data-server-devel-3.42.5-150400.3.5.4 * evolution-plugin-text-highlight-debuginfo-3.42.4-150400.3.8.2 * gcr-prompter-3.41.1-150400.3.5.2 * evolution-plugin-pst-import-debuginfo-3.42.4-150400.3.8.2 * gcr-ssh-askpass-debuginfo-3.41.1-150400.3.5.2 * evolution-debugsource-3.42.4-150400.3.8.2 * gspell-1.10.0-150400.3.5.3 * gnome-version-41.8-150400.3.5.2 * libebook-1_2-20-debuginfo-3.42.5-150400.3.5.4 * canberra-gtk-play-0.30-150400.15.2.2 * glade-debuginfo-3.38.2-150400.4.2.2 * evolution-data-server-3.42.5-150400.3.5.4 * glade-catalog-evolution-3.42.4-150400.3.8.2 * gspell-debuginfo-1.10.0-150400.3.5.3 * evolution-plugin-text-highlight-3.42.4-150400.3.8.2 * libecal-2_0-1-3.42.5-150400.3.5.4 * libgcr-3-1-3.41.1-150400.3.5.2 * libical3-3.0.10-150400.3.2.4 * libxkbcommon0-1.3.0-150400.3.2.2 * gcr-ssh-agent-3.41.1-150400.3.5.2 * libxkbcommon0-debuginfo-1.3.0-150400.3.2.2 * typelib-1_0-EBackend-1_2-3.42.5-150400.3.5.4 * libical-glib3-3.0.10-150400.3.2.3 * typelib-1_0-ICalGLib-3_0-3.0.10-150400.3.2.3 * libxkbregistry0-debuginfo-1.3.0-150400.3.2.2 * libcanberra0-debuginfo-0.30-150400.15.2.2 * libgdata-debugsource-0.18.1-150400.4.2.2 * typelib-1_0-EBook-1_2-3.42.5-150400.3.5.4 * typelib-1_0-GjsPrivate-1_0-1.70.2-150400.3.5.4 * libxkbcommon-x11-devel-1.3.0-150400.3.2.2 * libgck-1-0-debuginfo-3.41.1-150400.3.5.2 * libcanberra-gtk0-debuginfo-0.30-150400.15.2.2 * libcanberra-gtk3-0-debuginfo-0.30-150400.15.2.2 * libcanberra-gtk0-0.30-150400.15.2.2 * typelib-1_0-EDataServerUI-1_2-3.42.5-150400.3.5.4 * typelib-1_0-Gspell-1-1.10.0-150400.3.5.3 * libedataserverui-1_2-3-debuginfo-3.42.5-150400.3.5.4 * gcr-ssh-agent-debuginfo-3.41.1-150400.3.5.2 * libgladeui-2-13-3.38.2-150400.4.2.2 * typelib-1_0-EDataCal-2_0-3.42.5-150400.3.5.4 * libcanberra-gtk2-module-debuginfo-0.30-150400.15.2.2 * libedata-cal-2_0-1-debuginfo-3.42.5-150400.3.5.4 * libgweather-devel-40.0-150400.3.2.2 * libxkbregistry0-1.3.0-150400.3.2.2 * gnome-online-accounts-debuginfo-3.40.1-150400.3.2.2 * libgck-devel-3.41.1-150400.3.5.2 * glade-catalog-evolution-debuginfo-3.42.4-150400.3.8.2 * libxkbregistry-devel-1.3.0-150400.3.2.2 * libgweather-debugsource-40.0-150400.3.2.2 * libical-devel-3.0.10-150400.3.2.4 * libcanberra-gtk-devel-0.30-150400.15.2.2 * gnome-autoar-debuginfo-0.4.1-150400.3.2.2 * libedata-book-1_2-26-debuginfo-3.42.5-150400.3.5.4 * libxkbcommon-debugsource-1.3.0-150400.3.2.2 * gcr-ssh-askpass-3.41.1-150400.3.5.2 * libgtkspell3-3-0-3.0.10-150400.11.2.2 * libxkbcommon-devel-1.3.0-150400.3.2.2 * libical-glib3-debuginfo-3.0.10-150400.3.2.3 * evolution-plugin-bogofilter-debuginfo-3.42.4-150400.3.8.2 * evolution-data-server-debuginfo-3.42.5-150400.3.5.4 * evolution-3.42.4-150400.3.8.2 * libphonenumber-debugsource-8.12.23-150400.3.2.3 * evolution-plugin-spamassassin-debuginfo-3.42.4-150400.3.8.2 * glade-debugsource-3.38.2-150400.4.2.2 * gjs-1.70.2-150400.3.5.4 * geocode-glib-debugsource-3.26.4-150400.3.5.2 * libgladeui-2-devel-3.38.2-150400.4.2.2 * libcanberra-gtk3-devel-0.30-150400.15.2.2 * geocode-glib-3.26.4-150400.3.5.2 * libgck-1-0-3.41.1-150400.3.5.2 * gnome-online-accounts-devel-3.40.1-150400.3.2.2 * glade-docs-3.38.2-150400.4.2.2 * libgoa-1_0-0-debuginfo-3.40.1-150400.3.2.2 * typelib-1_0-Gladeui-2_0-3.38.2-150400.4.2.2 * libgtkspell3-3-0-debuginfo-3.0.10-150400.11.2.2 * gtkspell3-debugsource-3.0.10-150400.11.2.2 * canberra-gtk-play-gnome-0.30-150400.15.2.2 * libcanberra-gtk3-0-0.30-150400.15.2.2 * libical-glib-devel-3.0.10-150400.3.2.3 * libcanberra-gtk3-module-debuginfo-0.30-150400.15.2.2 * libgnome-desktop-3_0-common-debuginfo-41.8-150400.3.5.2 * libgjs0-debuginfo-1.70.2-150400.3.5.4 * libgladeui-2-13-debuginfo-3.38.2-150400.4.2.2 * gnome-online-accounts-debugsource-3.40.1-150400.3.2.2 * libical-glib-devel-debuginfo-3.0.10-150400.3.2.3 * libxkbcommon-x11-0-debuginfo-1.3.0-150400.3.2.2 * libcanberra-gtk-module-common-0.30-150400.15.2.2 * libcanberra-gtk2-module-0.30-150400.15.2.2 * libebook-1_2-20-3.42.5-150400.3.5.4 * libical3-debuginfo-3.0.10-150400.3.2.4 * libedata-cal-2_0-1-3.42.5-150400.3.5.4 * gjs-debuginfo-1.70.2-150400.3.5.4 * evolution-plugin-bogofilter-3.42.4-150400.3.8.2 * openSUSE Leap 15.4 (noarch) * libgdata-lang-0.18.1-150400.4.2.2 * gnome-desktop-lang-41.8-150400.3.5.2 * libical-doc-3.0.10-150400.3.2.4 * evolution-data-server-lang-3.42.5-150400.3.5.4 * bogofilter-doc-1.2.4-150000.3.2.3 * gsl_2_4-gnu-hpc-module-2.4-150100.9.7.1 * glade-lang-3.38.2-150400.4.2.2 * gsl_2_4-gnu-hpc-examples-2.4-150100.9.7.1 * evolution-lang-3.42.4-150400.3.8.2 * gspell-lang-1.10.0-150400.3.5.3 * libgweather-lang-40.0-150400.3.2.2 * gtkspell3-lang-3.0.10-150400.11.2.2 * libical-glib-doc-3.0.10-150400.3.2.3 * bogofilter-common-1.2.4-150000.3.2.3 * gcr-lang-3.41.1-150400.3.5.2 * gnome-online-accounts-lang-3.40.1-150400.3.2.2 * openSUSE Leap 15.4 (x86_64) * libgdata22-32bit-0.18.1-150400.4.2.2 * libgck-1-0-32bit-3.41.1-150400.3.5.2 * libgeocode-glib0-32bit-3.26.4-150400.3.5.2 * libgoa-backend-1_0-1-32bit-3.40.1-150400.3.2.2 * libgoa-1_0-0-32bit-debuginfo-3.40.1-150400.3.2.2 * librest-0_7-0-32bit-debuginfo-0.8.1-150000.3.4.3 * libgcr-3-1-32bit-3.41.1-150400.3.5.2 * libxkbcommon0-32bit-1.3.0-150400.3.2.2 * librest-0_7-0-32bit-0.8.1-150000.3.4.3 * libcanberra-gtk3-module-32bit-0.30-150400.15.2.2 * libgoa-backend-1_0-1-32bit-debuginfo-3.40.1-150400.3.2.2 * libgweather-3-16-32bit-debuginfo-40.0-150400.3.2.2 * libgeocode-glib0-32bit-debuginfo-3.26.4-150400.3.5.2 * libical-glib3-32bit-debuginfo-3.0.10-150400.3.2.3 * libxkbcommon-devel-32bit-1.3.0-150400.3.2.2 * libxkbcommon0-32bit-debuginfo-1.3.0-150400.3.2.2 * libgck-devel-32bit-3.41.1-150400.3.5.2 * libgoa-1_0-0-32bit-3.40.1-150400.3.2.2 * libcanberra-gtk0-32bit-debuginfo-0.30-150400.15.2.2 * libcanberra-gtk2-module-32bit-debuginfo-0.30-150400.15.2.2 * liboauth0-32bit-debuginfo-1.0.3-150000.5.2.3 * libical-glib3-32bit-3.0.10-150400.3.2.3 * libcanberra0-32bit-debuginfo-0.30-150400.15.2.2 * libcanberra-gtk2-module-32bit-0.30-150400.15.2.2 * libcanberra-gtk3-0-32bit-debuginfo-0.30-150400.15.2.2 * liboauth0-32bit-1.0.3-150000.5.2.3 * libcanberra-gtk3-0-32bit-0.30-150400.15.2.2 * libxkbcommon-x11-devel-32bit-1.3.0-150400.3.2.2 * libgweather-3-16-32bit-40.0-150400.3.2.2 * libcanberra-gtk3-module-32bit-debuginfo-0.30-150400.15.2.2 * libxkbcommon-x11-0-32bit-1.3.0-150400.3.2.2 * libgcr-devel-32bit-3.41.1-150400.3.5.2 * libgdata22-32bit-debuginfo-0.18.1-150400.4.2.2 * libxkbcommon-x11-0-32bit-debuginfo-1.3.0-150400.3.2.2 * libical3-32bit-3.0.10-150400.3.2.4 * libgck-1-0-32bit-debuginfo-3.41.1-150400.3.5.2 * libcanberra0-32bit-0.30-150400.15.2.2 * libcanberra-gtk0-32bit-0.30-150400.15.2.2 * libical3-32bit-debuginfo-3.0.10-150400.3.2.4 * libgcr-3-1-32bit-debuginfo-3.41.1-150400.3.5.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i686) * mozjs78-debuginfo-78.15.0-150400.3.2.4 * mozjs78-debugsource-78.15.0-150400.3.2.4 * libmozjs-78-0-debuginfo-78.15.0-150400.3.2.4 * libmozjs-78-0-78.15.0-150400.3.2.4 * mozjs78-devel-78.15.0-150400.3.2.4 * mozjs78-78.15.0-150400.3.2.4 * openSUSE Leap 15.4 (aarch64_ilp32) * libgdata22-64bit-debuginfo-0.18.1-150400.4.2.2 * libgck-devel-64bit-3.41.1-150400.3.5.2 * libcanberra-gtk2-module-64bit-0.30-150400.15.2.2 * libxkbcommon-x11-devel-64bit-1.3.0-150400.3.2.2 * libgeocode-glib0-64bit-3.26.4-150400.3.5.2 * libxkbcommon0-64bit-debuginfo-1.3.0-150400.3.2.2 * libical3-64bit-3.0.10-150400.3.2.4 * libical3-64bit-debuginfo-3.0.10-150400.3.2.4 * libxkbcommon0-64bit-1.3.0-150400.3.2.2 * libgeocode-glib0-64bit-debuginfo-3.26.4-150400.3.5.2 * libgck-1-0-64bit-3.41.1-150400.3.5.2 * libcanberra0-64bit-0.30-150400.15.2.2 * libgweather-3-16-64bit-40.0-150400.3.2.2 * libgck-1-0-64bit-debuginfo-3.41.1-150400.3.5.2 * libcanberra-gtk3-0-64bit-debuginfo-0.30-150400.15.2.2 * libgdata22-64bit-0.18.1-150400.4.2.2 * libcanberra0-64bit-debuginfo-0.30-150400.15.2.2 * libgcr-devel-64bit-3.41.1-150400.3.5.2 * libxkbcommon-devel-64bit-1.3.0-150400.3.2.2 * libcanberra-gtk3-0-64bit-0.30-150400.15.2.2 * libical-glib3-64bit-3.0.10-150400.3.2.3 * libcanberra-gtk2-module-64bit-debuginfo-0.30-150400.15.2.2 * libgweather-3-16-64bit-debuginfo-40.0-150400.3.2.2 * libgcr-3-1-64bit-3.41.1-150400.3.5.2 * libgoa-backend-1_0-1-64bit-debuginfo-3.40.1-150400.3.2.2 * libxkbcommon-x11-0-64bit-1.3.0-150400.3.2.2 * libgoa-1_0-0-64bit-debuginfo-3.40.1-150400.3.2.2 * libical-glib3-64bit-debuginfo-3.0.10-150400.3.2.3 * libcanberra-gtk3-module-64bit-0.30-150400.15.2.2 * libcanberra-gtk0-64bit-debuginfo-0.30-150400.15.2.2 * libgoa-1_0-0-64bit-3.40.1-150400.3.2.2 * libcanberra-gtk3-module-64bit-debuginfo-0.30-150400.15.2.2 * libxkbcommon-x11-0-64bit-debuginfo-1.3.0-150400.3.2.2 * libgoa-backend-1_0-1-64bit-3.40.1-150400.3.2.2 * libcanberra-gtk0-64bit-0.30-150400.15.2.2 * libgcr-3-1-64bit-debuginfo-3.41.1-150400.3.5.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * librest-devel-0.8.1-150000.3.4.3 * bogofilter-db-1.2.4-150000.3.2.3 * bogofilter-kyotocabinet-1.2.4-150000.3.2.3 * liboauth0-debuginfo-1.0.3-150000.5.2.3 * bogofilter-debugsource-1.2.4-150000.3.2.3 * gsl_2_4-gnu-hpc-devel-2.4-150100.9.7.1 * liboauth0-1.0.3-150000.5.2.3 * typelib-1_0-Rest-0_7-0.8.1-150000.3.4.3 * libgsl_2_4-gnu-hpc-debuginfo-2.4-150100.9.7.1 * libgslcblas_2_4-gnu-hpc-debuginfo-2.4-150100.9.7.1 * bogofilter-sqlite3-debuginfo-1.2.4-150000.3.2.3 * libgsl_2_4-gnu-hpc-2.4-150100.9.7.1 * libgslcblas_2_4-gnu-hpc-2.4-150100.9.7.1 * bogofilter-kyotocabinet-debuginfo-1.2.4-150000.3.2.3 * gsl_2_4-gnu-hpc-doc-2.4-150100.9.7.1 * libgsl23-2.4-150100.9.7.1 * gsl_2_4-gnu-hpc-debugsource-2.4-150100.9.7.1 * libgsl23-debuginfo-2.4-150100.9.7.1 * bogofilter-db-debuginfo-1.2.4-150000.3.2.3 * librest-debugsource-0.8.1-150000.3.4.3 * liboauth-devel-1.0.3-150000.5.2.3 * librest-0_7-0-debuginfo-0.8.1-150000.3.4.3 * gsl_2_4-gnu-hpc-debuginfo-2.4-150100.9.7.1 * liboauth-debugsource-1.0.3-150000.5.2.3 * gsl_2_4-gnu-hpc-2.4-150100.9.7.1 * librest-0_7-0-0.8.1-150000.3.4.3 * bogofilter-debuginfo-1.2.4-150000.3.2.3 * bogofilter-sqlite3-1.2.4-150000.3.2.3 * openSUSE Leap 15.5 (noarch) * libgdata-lang-0.18.1-150400.4.2.2 * bogofilter-doc-1.2.4-150000.3.2.3 * gnome-desktop-lang-41.8-150400.3.5.2 * evolution-data-server-lang-3.42.5-150400.3.5.4 * gsl_2_4-gnu-hpc-module-2.4-150100.9.7.1 * libical-doc-3.0.10-150400.3.2.4 * glade-lang-3.38.2-150400.4.2.2 * gsl_2_4-gnu-hpc-examples-2.4-150100.9.7.1 * evolution-lang-3.42.4-150400.3.8.2 * bogofilter-common-1.2.4-150000.3.2.3 * gspell-lang-1.10.0-150400.3.5.3 * gtkspell3-lang-3.0.10-150400.11.2.2 * libgweather-lang-40.0-150400.3.2.2 * libical-glib-doc-3.0.10-150400.3.2.3 * gcr-lang-3.41.1-150400.3.5.2 * gnome-online-accounts-lang-3.40.1-150400.3.2.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libebook-contacts-1_2-3-debuginfo-3.42.5-150400.3.5.4 * libgnome-desktop-3-19-41.8-150400.3.5.2 * glade-3.38.2-150400.4.2.2 * gnome-online-accounts-3.40.1-150400.3.2.2 * evolution-debuginfo-3.42.4-150400.3.8.2 * libical-glib-debugsource-3.0.10-150400.3.2.3 * libgnome-autoar-0-0-debuginfo-0.4.1-150400.3.2.2 * libmozjs-78-0-debuginfo-78.15.0-150400.3.2.4 * typelib-1_0-Gcr-3-3.41.1-150400.3.5.2 * libgdata22-debuginfo-0.18.1-150400.4.2.2 * gsl_2_4-gnu-hpc-devel-2.4-150100.9.7.1 * libecal-2_0-1-debuginfo-3.42.5-150400.3.5.4 * libebook-contacts-1_2-3-3.42.5-150400.3.5.4 * gcr-prompter-debuginfo-3.41.1-150400.3.5.2 * libgeocode-glib0-debuginfo-3.26.4-150400.3.5.2 * liboauth0-1.0.3-150000.5.2.3 * libphonenumber8-debuginfo-8.12.23-150400.3.2.3 * bogofilter-sqlite3-debuginfo-1.2.4-150000.3.2.3 * libxkbcommon-tools-debuginfo-1.3.0-150400.3.2.2 * gcr-data-3.41.1-150400.3.5.2 * evolution-plugin-pst-import-3.42.4-150400.3.8.2 * gspell-devel-1.10.0-150400.3.5.3 * libgnome-autoar-gtk-0-0-0.4.1-150400.3.2.2 * libgoa-1_0-0-3.40.1-150400.3.2.2 * evolution-devel-3.42.4-150400.3.8.2 * libcanberra-devel-0.30-150400.15.2.2 * gnome-autoar-devel-0.4.1-150400.3.2.2 * libgjs0-1.70.2-150400.3.5.4 * libgdata22-0.18.1-150400.4.2.2 * gtkspell3-devel-3.0.10-150400.11.2.2 * typelib-1_0-EDataServer-1_2-3.42.5-150400.3.5.4 * gsl_2_4-gnu-hpc-doc-2.4-150100.9.7.1 * libedata-book-1_2-26-3.42.5-150400.3.5.4 * geocode-glib-devel-3.26.4-150400.3.5.2 * bogofilter-db-debuginfo-1.2.4-150000.3.2.3 * typelib-1_0-ICal-3_0-3.0.10-150400.3.2.3 * typelib-1_0-GWeather-3_0-40.0-150400.3.2.2 * libxkbcommon-x11-0-1.3.0-150400.3.2.2 * libgjs-devel-1.70.2-150400.3.5.4 * typelib-1_0-GcrUi-3-3.41.1-150400.3.5.2 * libedataserverui-1_2-3-3.42.5-150400.3.5.4 * libgcr-devel-3.41.1-150400.3.5.2 * libebackend-1_2-10-3.42.5-150400.3.5.4 * gnome-desktop-debugsource-41.8-150400.3.5.2 * libcamel-1_2-63-debuginfo-3.42.5-150400.3.5.4 * typelib-1_0-GnomeDesktop-3_0-41.8-150400.3.5.2 * libgdata-devel-0.18.1-150400.4.2.2 * libedataserver-1_2-26-debuginfo-3.42.5-150400.3.5.4 * canberra-gtk-play-debuginfo-0.30-150400.15.2.2 * gnome-autoar-debugsource-0.4.1-150400.3.2.2 * evolution-plugin-spamassassin-3.42.4-150400.3.8.2 * libcanberra-debugsource-0.30-150400.15.2.2 * libcanberra0-0.30-150400.15.2.2 * libgnome-desktop-3-devel-41.8-150400.3.5.2 * libgnome-desktop-3_0-common-41.8-150400.3.5.2 * typelib-1_0-GtkSpell-3_0-3.0.10-150400.11.2.2 * libxkbcommon-tools-1.3.0-150400.3.2.2 * libgnome-autoar-0-0-0.4.1-150400.3.2.2 * bogofilter-sqlite3-1.2.4-150000.3.2.3 * typelib-1_0-GData-0_0-0.18.1-150400.4.2.2 * libgeocode-glib0-3.26.4-150400.3.5.2 * typelib-1_0-GeocodeGlib-1_0-3.26.4-150400.3.5.2 * gjs-debugsource-1.70.2-150400.3.5.4 * mozjs78-debuginfo-78.15.0-150400.3.2.4 * libcanberra-gtk3-module-0.30-150400.15.2.2 * bogofilter-db-1.2.4-150000.3.2.3 * bogofilter-kyotocabinet-1.2.4-150000.3.2.3 * typelib-1_0-Gck-1-3.41.1-150400.3.5.2 * libgweather-3-16-debuginfo-40.0-150400.3.2.2 * libical-debugsource-3.0.10-150400.3.2.4 * libgoa-backend-1_0-1-3.40.1-150400.3.2.2 * gcr-viewer-3.41.1-150400.3.5.2 * libgcr-3-1-debuginfo-3.41.1-150400.3.5.2 * gnome-desktop-debuginfo-41.8-150400.3.5.2 * gweather-data-40.0-150400.3.2.2 * libgoa-backend-1_0-1-debuginfo-3.40.1-150400.3.2.2 * libgnome-autoar-gtk-0-0-debuginfo-0.4.1-150400.3.2.2 * gcr-debugsource-3.41.1-150400.3.5.2 * typelib-1_0-Camel-1_2-3.42.5-150400.3.5.4 * libgsl_2_4-gnu-hpc-2.4-150100.9.7.1 * gspell-debugsource-1.10.0-150400.3.5.3 * libgslcblas_2_4-gnu-hpc-2.4-150100.9.7.1 * libedataserver-1_2-26-3.42.5-150400.3.5.4 * libebackend-1_2-10-debuginfo-3.42.5-150400.3.5.4 * libphonenumber-devel-8.12.23-150400.3.2.3 * mozjs78-78.15.0-150400.3.2.4 * typelib-1_0-Goa-1_0-3.40.1-150400.3.2.2 * gcr-viewer-debuginfo-3.41.1-150400.3.5.2 * typelib-1_0-GnomeAutoarGtk-0_1-0.4.1-150400.3.2.2 * libgnome-desktop-3-19-debuginfo-41.8-150400.3.5.2 * mozjs78-debugsource-78.15.0-150400.3.2.4 * evolution-data-server-debugsource-3.42.5-150400.3.5.4 * libcamel-1_2-63-3.42.5-150400.3.5.4 * typelib-1_0-GnomeAutoar-0_1-0.4.1-150400.3.2.2 * libgspell-1-2-1.10.0-150400.3.5.3 * libgspell-1-2-debuginfo-1.10.0-150400.3.5.3 * mozjs78-devel-78.15.0-150400.3.2.4 * libgweather-3-16-40.0-150400.3.2.2 * librest-debugsource-0.8.1-150000.3.4.3 * libphonenumber8-8.12.23-150400.3.2.3 * librest-0_7-0-debuginfo-0.8.1-150000.3.4.3 * typelib-1_0-EBookContacts-1_2-3.42.5-150400.3.5.4 * typelib-1_0-ECal-2_0-3.42.5-150400.3.5.4 * gcr-ssh-askpass-debuginfo-3.41.1-150400.3.5.2 * evolution-data-server-devel-3.42.5-150400.3.5.4 * evolution-plugin-text-highlight-debuginfo-3.42.4-150400.3.8.2 * gcr-prompter-3.41.1-150400.3.5.2 * evolution-plugin-pst-import-debuginfo-3.42.4-150400.3.8.2 * liboauth-debugsource-1.0.3-150000.5.2.3 * typelib-1_0-EDataBook-1_2-3.42.5-150400.3.5.4 * evolution-debugsource-3.42.4-150400.3.8.2 * gspell-1.10.0-150400.3.5.3 * gnome-version-41.8-150400.3.5.2 * libebook-1_2-20-debuginfo-3.42.5-150400.3.5.4 * canberra-gtk-play-0.30-150400.15.2.2 * glade-debuginfo-3.38.2-150400.4.2.2 * evolution-data-server-3.42.5-150400.3.5.4 * glade-catalog-evolution-3.42.4-150400.3.8.2 * gspell-debuginfo-1.10.0-150400.3.5.3 * librest-devel-0.8.1-150000.3.4.3 * evolution-plugin-text-highlight-3.42.4-150400.3.8.2 * libecal-2_0-1-3.42.5-150400.3.5.4 * libgcr-3-1-3.41.1-150400.3.5.2 * libical3-3.0.10-150400.3.2.4 * libxkbcommon0-1.3.0-150400.3.2.2 * gcr-ssh-agent-3.41.1-150400.3.5.2 * bogofilter-debugsource-1.2.4-150000.3.2.3 * libxkbcommon0-debuginfo-1.3.0-150400.3.2.2 * typelib-1_0-EBackend-1_2-3.42.5-150400.3.5.4 * libgsl_2_4-gnu-hpc-debuginfo-2.4-150100.9.7.1 * libgslcblas_2_4-gnu-hpc-debuginfo-2.4-150100.9.7.1 * libical-glib3-3.0.10-150400.3.2.3 * typelib-1_0-ICalGLib-3_0-3.0.10-150400.3.2.3 * typelib-1_0-Rest-0_7-0.8.1-150000.3.4.3 * libxkbregistry0-debuginfo-1.3.0-150400.3.2.2 * libcanberra0-debuginfo-0.30-150400.15.2.2 * libgdata-debugsource-0.18.1-150400.4.2.2 * libxkbcommon-x11-devel-1.3.0-150400.3.2.2 * typelib-1_0-EBook-1_2-3.42.5-150400.3.5.4 * typelib-1_0-GjsPrivate-1_0-1.70.2-150400.3.5.4 * libcanberra-gtk3-0-debuginfo-0.30-150400.15.2.2 * libcanberra-gtk0-debuginfo-0.30-150400.15.2.2 * libgck-1-0-debuginfo-3.41.1-150400.3.5.2 * libcanberra-gtk0-0.30-150400.15.2.2 * typelib-1_0-EDataServerUI-1_2-3.42.5-150400.3.5.4 * typelib-1_0-Gspell-1-1.10.0-150400.3.5.3 * libedataserverui-1_2-3-debuginfo-3.42.5-150400.3.5.4 * gcr-ssh-agent-debuginfo-3.41.1-150400.3.5.2 * libgladeui-2-13-3.38.2-150400.4.2.2 * typelib-1_0-EDataCal-2_0-3.42.5-150400.3.5.4 * libcanberra-gtk2-module-debuginfo-0.30-150400.15.2.2 * gsl_2_4-gnu-hpc-debugsource-2.4-150100.9.7.1 * libedata-cal-2_0-1-debuginfo-3.42.5-150400.3.5.4 * libgweather-devel-40.0-150400.3.2.2 * liboauth-devel-1.0.3-150000.5.2.3 * libxkbregistry0-1.3.0-150400.3.2.2 * gsl_2_4-gnu-hpc-debuginfo-2.4-150100.9.7.1 * gnome-online-accounts-debuginfo-3.40.1-150400.3.2.2 * libgck-devel-3.41.1-150400.3.5.2 * glade-catalog-evolution-debuginfo-3.42.4-150400.3.8.2 * libxkbregistry-devel-1.3.0-150400.3.2.2 * libgweather-debugsource-40.0-150400.3.2.2 * libmozjs-78-0-78.15.0-150400.3.2.4 * bogofilter-debuginfo-1.2.4-150000.3.2.3 * libical-devel-3.0.10-150400.3.2.4 * libcanberra-gtk-devel-0.30-150400.15.2.2 * gnome-autoar-debuginfo-0.4.1-150400.3.2.2 * libedata-book-1_2-26-debuginfo-3.42.5-150400.3.5.4 * libxkbcommon-debugsource-1.3.0-150400.3.2.2 * gcr-ssh-askpass-3.41.1-150400.3.5.2 * libgtkspell3-3-0-3.0.10-150400.11.2.2 * libxkbcommon-devel-1.3.0-150400.3.2.2 * libical-glib3-debuginfo-3.0.10-150400.3.2.3 * evolution-plugin-bogofilter-debuginfo-3.42.4-150400.3.8.2 * evolution-data-server-debuginfo-3.42.5-150400.3.5.4 * liboauth0-debuginfo-1.0.3-150000.5.2.3 * evolution-3.42.4-150400.3.8.2 * libphonenumber-debugsource-8.12.23-150400.3.2.3 * evolution-plugin-spamassassin-debuginfo-3.42.4-150400.3.8.2 * glade-debugsource-3.38.2-150400.4.2.2 * gjs-1.70.2-150400.3.5.4 * geocode-glib-debugsource-3.26.4-150400.3.5.2 * libcanberra-gtk3-devel-0.30-150400.15.2.2 * libgladeui-2-devel-3.38.2-150400.4.2.2 * geocode-glib-3.26.4-150400.3.5.2 * gnome-online-accounts-devel-3.40.1-150400.3.2.2 * libgck-1-0-3.41.1-150400.3.5.2 * glade-docs-3.38.2-150400.4.2.2 * bogofilter-kyotocabinet-debuginfo-1.2.4-150000.3.2.3 * libgoa-1_0-0-debuginfo-3.40.1-150400.3.2.2 * libgtkspell3-3-0-debuginfo-3.0.10-150400.11.2.2 * typelib-1_0-Gladeui-2_0-3.38.2-150400.4.2.2 * canberra-gtk-play-gnome-0.30-150400.15.2.2 * gtkspell3-debugsource-3.0.10-150400.11.2.2 * libcanberra-gtk3-0-0.30-150400.15.2.2 * libical-glib-devel-3.0.10-150400.3.2.3 * libcanberra-gtk3-module-debuginfo-0.30-150400.15.2.2 * libgnome-desktop-3_0-common-debuginfo-41.8-150400.3.5.2 * libgjs0-debuginfo-1.70.2-150400.3.5.4 * libgladeui-2-13-debuginfo-3.38.2-150400.4.2.2 * gnome-online-accounts-debugsource-3.40.1-150400.3.2.2 * libical-glib-devel-debuginfo-3.0.10-150400.3.2.3 * libxkbcommon-x11-0-debuginfo-1.3.0-150400.3.2.2 * gsl_2_4-gnu-hpc-2.4-150100.9.7.1 * libcanberra-gtk-module-common-0.30-150400.15.2.2 * librest-0_7-0-0.8.1-150000.3.4.3 * libcanberra-gtk2-module-0.30-150400.15.2.2 * libebook-1_2-20-3.42.5-150400.3.5.4 * libical3-debuginfo-3.0.10-150400.3.2.4 * libedata-cal-2_0-1-3.42.5-150400.3.5.4 * gjs-debuginfo-1.70.2-150400.3.5.4 * evolution-plugin-bogofilter-3.42.4-150400.3.8.2 * openSUSE Leap 15.5 (x86_64) * libgdata22-32bit-0.18.1-150400.4.2.2 * libgck-1-0-32bit-3.41.1-150400.3.5.2 * libgeocode-glib0-32bit-3.26.4-150400.3.5.2 * libgoa-backend-1_0-1-32bit-3.40.1-150400.3.2.2 * libgoa-1_0-0-32bit-debuginfo-3.40.1-150400.3.2.2 * librest-0_7-0-32bit-debuginfo-0.8.1-150000.3.4.3 * libgcr-3-1-32bit-3.41.1-150400.3.5.2 * librest-0_7-0-32bit-0.8.1-150000.3.4.3 * libxkbcommon0-32bit-1.3.0-150400.3.2.2 * libcanberra-gtk3-module-32bit-0.30-150400.15.2.2 * libgoa-backend-1_0-1-32bit-debuginfo-3.40.1-150400.3.2.2 * libgweather-3-16-32bit-debuginfo-40.0-150400.3.2.2 * libgeocode-glib0-32bit-debuginfo-3.26.4-150400.3.5.2 * libical-glib3-32bit-debuginfo-3.0.10-150400.3.2.3 * libxkbcommon-devel-32bit-1.3.0-150400.3.2.2 * libxkbcommon0-32bit-debuginfo-1.3.0-150400.3.2.2 * libgck-devel-32bit-3.41.1-150400.3.5.2 * libgoa-1_0-0-32bit-3.40.1-150400.3.2.2 * libcanberra-gtk0-32bit-debuginfo-0.30-150400.15.2.2 * libcanberra-gtk2-module-32bit-debuginfo-0.30-150400.15.2.2 * liboauth0-32bit-debuginfo-1.0.3-150000.5.2.3 * libical-glib3-32bit-3.0.10-150400.3.2.3 * libcanberra0-32bit-debuginfo-0.30-150400.15.2.2 * libcanberra-gtk2-module-32bit-0.30-150400.15.2.2 * libcanberra-gtk3-0-32bit-debuginfo-0.30-150400.15.2.2 * liboauth0-32bit-1.0.3-150000.5.2.3 * libcanberra-gtk3-0-32bit-0.30-150400.15.2.2 * libxkbcommon-x11-devel-32bit-1.3.0-150400.3.2.2 * libgweather-3-16-32bit-40.0-150400.3.2.2 * libcanberra-gtk3-module-32bit-debuginfo-0.30-150400.15.2.2 * libxkbcommon-x11-0-32bit-1.3.0-150400.3.2.2 * libgcr-devel-32bit-3.41.1-150400.3.5.2 * libgdata22-32bit-debuginfo-0.18.1-150400.4.2.2 * libxkbcommon-x11-0-32bit-debuginfo-1.3.0-150400.3.2.2 * libical3-32bit-3.0.10-150400.3.2.4 * libgck-1-0-32bit-debuginfo-3.41.1-150400.3.5.2 * libcanberra0-32bit-0.30-150400.15.2.2 * libcanberra-gtk0-32bit-0.30-150400.15.2.2 * libical3-32bit-debuginfo-3.0.10-150400.3.2.4 * libgcr-3-1-32bit-debuginfo-3.41.1-150400.3.5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libxkbcommon0-debuginfo-1.3.0-150400.3.2.2 * libxkbcommon0-1.3.0-150400.3.2.2 * libxkbcommon-debugsource-1.3.0-150400.3.2.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libxkbcommon0-debuginfo-1.3.0-150400.3.2.2 * libxkbcommon0-1.3.0-150400.3.2.2 * libxkbcommon-debugsource-1.3.0-150400.3.2.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libxkbcommon0-debuginfo-1.3.0-150400.3.2.2 * libxkbcommon0-1.3.0-150400.3.2.2 * libxkbcommon-debugsource-1.3.0-150400.3.2.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libxkbcommon0-debuginfo-1.3.0-150400.3.2.2 * libxkbcommon0-1.3.0-150400.3.2.2 * libxkbcommon-debugsource-1.3.0-150400.3.2.2 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libxkbcommon-devel-1.3.0-150400.3.2.2 * libxkbcommon-x11-0-debuginfo-1.3.0-150400.3.2.2 * libcanberra0-debuginfo-0.30-150400.15.2.2 * libxkbcommon-x11-devel-1.3.0-150400.3.2.2 * libcanberra-debugsource-0.30-150400.15.2.2 * libcanberra0-0.30-150400.15.2.2 * libical3-3.0.10-150400.3.2.4 * libxkbcommon0-1.3.0-150400.3.2.2 * libical-debugsource-3.0.10-150400.3.2.4 * libxkbcommon-x11-0-1.3.0-150400.3.2.2 * libical3-debuginfo-3.0.10-150400.3.2.4 * libxkbcommon0-debuginfo-1.3.0-150400.3.2.2 * libxkbcommon-debugsource-1.3.0-150400.3.2.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libxkbcommon-devel-1.3.0-150400.3.2.2 * libxkbcommon-x11-0-debuginfo-1.3.0-150400.3.2.2 * libcanberra0-debuginfo-0.30-150400.15.2.2 * libxkbcommon-x11-devel-1.3.0-150400.3.2.2 * libcanberra-debugsource-0.30-150400.15.2.2 * libcanberra0-0.30-150400.15.2.2 * libxkbcommon0-1.3.0-150400.3.2.2 * libxkbcommon-x11-0-1.3.0-150400.3.2.2 * libxkbcommon0-debuginfo-1.3.0-150400.3.2.2 * libxkbcommon-debugsource-1.3.0-150400.3.2.2 * Desktop Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libgnome-autoar-0-0-debuginfo-0.4.1-150400.3.2.2 * libmozjs-78-0-debuginfo-78.15.0-150400.3.2.4 * typelib-1_0-Gcr-3-3.41.1-150400.3.5.2 * libgdata22-debuginfo-0.18.1-150400.4.2.2 * libgeocode-glib0-debuginfo-3.26.4-150400.3.5.2 * liboauth0-1.0.3-150000.5.2.3 * gcr-prompter-debuginfo-3.41.1-150400.3.5.2 * gcr-data-3.41.1-150400.3.5.2 * gspell-devel-1.10.0-150400.3.5.3 * libgnome-autoar-gtk-0-0-0.4.1-150400.3.2.2 * libgoa-1_0-0-3.40.1-150400.3.2.2 * libcanberra-devel-0.30-150400.15.2.2 * gnome-autoar-devel-0.4.1-150400.3.2.2 * libgjs0-1.70.2-150400.3.5.4 * libgdata22-0.18.1-150400.4.2.2 * gtkspell3-devel-3.0.10-150400.11.2.2 * geocode-glib-devel-3.26.4-150400.3.5.2 * typelib-1_0-GWeather-3_0-40.0-150400.3.2.2 * libgjs-devel-1.70.2-150400.3.5.4 * typelib-1_0-GcrUi-3-3.41.1-150400.3.5.2 * libgcr-devel-3.41.1-150400.3.5.2 * gnome-desktop-debugsource-41.8-150400.3.5.2 * typelib-1_0-GnomeDesktop-3_0-41.8-150400.3.5.2 * libgdata-devel-0.18.1-150400.4.2.2 * canberra-gtk-play-debuginfo-0.30-150400.15.2.2 * gnome-autoar-debugsource-0.4.1-150400.3.2.2 * libcanberra-debugsource-0.30-150400.15.2.2 * libgnome-desktop-3-devel-41.8-150400.3.5.2 * libgnome-desktop-3_0-common-41.8-150400.3.5.2 * typelib-1_0-GtkSpell-3_0-3.0.10-150400.11.2.2 * libgnome-autoar-0-0-0.4.1-150400.3.2.2 * typelib-1_0-GData-0_0-0.18.1-150400.4.2.2 * typelib-1_0-GeocodeGlib-1_0-3.26.4-150400.3.5.2 * libgeocode-glib0-3.26.4-150400.3.5.2 * gjs-debugsource-1.70.2-150400.3.5.4 * mozjs78-debuginfo-78.15.0-150400.3.2.4 * libcanberra-gtk3-module-0.30-150400.15.2.2 * typelib-1_0-Gck-1-3.41.1-150400.3.5.2 * libgweather-3-16-debuginfo-40.0-150400.3.2.2 * libical-debugsource-3.0.10-150400.3.2.4 * libgoa-backend-1_0-1-3.40.1-150400.3.2.2 * gcr-viewer-3.41.1-150400.3.5.2 * libgcr-3-1-debuginfo-3.41.1-150400.3.5.2 * gnome-desktop-debuginfo-41.8-150400.3.5.2 * gweather-data-40.0-150400.3.2.2 * libgoa-backend-1_0-1-debuginfo-3.40.1-150400.3.2.2 * libgnome-autoar-gtk-0-0-debuginfo-0.4.1-150400.3.2.2 * gcr-debugsource-3.41.1-150400.3.5.2 * gspell-debugsource-1.10.0-150400.3.5.3 * typelib-1_0-Goa-1_0-3.40.1-150400.3.2.2 * gcr-viewer-debuginfo-3.41.1-150400.3.5.2 * typelib-1_0-GnomeAutoarGtk-0_1-0.4.1-150400.3.2.2 * libgnome-desktop-3-19-debuginfo-41.8-150400.3.5.2 * mozjs78-debugsource-78.15.0-150400.3.2.4 * typelib-1_0-GnomeAutoar-0_1-0.4.1-150400.3.2.2 * libgspell-1-2-1.10.0-150400.3.5.3 * libgspell-1-2-debuginfo-1.10.0-150400.3.5.3 * mozjs78-devel-78.15.0-150400.3.2.4 * libgweather-3-16-40.0-150400.3.2.2 * librest-debugsource-0.8.1-150000.3.4.3 * librest-0_7-0-debuginfo-0.8.1-150000.3.4.3 * gcr-ssh-askpass-debuginfo-3.41.1-150400.3.5.2 * liboauth-debugsource-1.0.3-150000.5.2.3 * gcr-prompter-3.41.1-150400.3.5.2 * gnome-version-41.8-150400.3.5.2 * canberra-gtk-play-0.30-150400.15.2.2 * gspell-debuginfo-1.10.0-150400.3.5.3 * librest-devel-0.8.1-150000.3.4.3 * libgcr-3-1-3.41.1-150400.3.5.2 * gcr-ssh-agent-3.41.1-150400.3.5.2 * typelib-1_0-Rest-0_7-0.8.1-150000.3.4.3 * libxkbregistry0-debuginfo-1.3.0-150400.3.2.2 * libgdata-debugsource-0.18.1-150400.4.2.2 * typelib-1_0-GjsPrivate-1_0-1.70.2-150400.3.5.4 * libcanberra-gtk3-0-debuginfo-0.30-150400.15.2.2 * libcanberra-gtk0-debuginfo-0.30-150400.15.2.2 * libgck-1-0-debuginfo-3.41.1-150400.3.5.2 * libcanberra-gtk0-0.30-150400.15.2.2 * typelib-1_0-Gspell-1-1.10.0-150400.3.5.3 * gcr-ssh-agent-debuginfo-3.41.1-150400.3.5.2 * libcanberra-gtk2-module-debuginfo-0.30-150400.15.2.2 * libgweather-devel-40.0-150400.3.2.2 * liboauth-devel-1.0.3-150000.5.2.3 * libxkbregistry0-1.3.0-150400.3.2.2 * gnome-online-accounts-debuginfo-3.40.1-150400.3.2.2 * libgck-devel-3.41.1-150400.3.5.2 * libxkbregistry-devel-1.3.0-150400.3.2.2 * libgweather-debugsource-40.0-150400.3.2.2 * libmozjs-78-0-78.15.0-150400.3.2.4 * libical-devel-3.0.10-150400.3.2.4 * libcanberra-gtk-devel-0.30-150400.15.2.2 * gnome-autoar-debuginfo-0.4.1-150400.3.2.2 * libxkbcommon-debugsource-1.3.0-150400.3.2.2 * gcr-ssh-askpass-3.41.1-150400.3.5.2 * libgtkspell3-3-0-3.0.10-150400.11.2.2 * liboauth0-debuginfo-1.0.3-150000.5.2.3 * gjs-1.70.2-150400.3.5.4 * geocode-glib-debugsource-3.26.4-150400.3.5.2 * libcanberra-gtk3-devel-0.30-150400.15.2.2 * geocode-glib-3.26.4-150400.3.5.2 * gnome-online-accounts-devel-3.40.1-150400.3.2.2 * libgck-1-0-3.41.1-150400.3.5.2 * libgoa-1_0-0-debuginfo-3.40.1-150400.3.2.2 * libgtkspell3-3-0-debuginfo-3.0.10-150400.11.2.2 * gtkspell3-debugsource-3.0.10-150400.11.2.2 * libcanberra-gtk3-0-0.30-150400.15.2.2 * libcanberra-gtk3-module-debuginfo-0.30-150400.15.2.2 * libgnome-desktop-3_0-common-debuginfo-41.8-150400.3.5.2 * libgjs0-debuginfo-1.70.2-150400.3.5.4 * gnome-online-accounts-debugsource-3.40.1-150400.3.2.2 * librest-0_7-0-0.8.1-150000.3.4.3 * libcanberra-gtk-module-common-0.30-150400.15.2.2 * libcanberra-gtk2-module-0.30-150400.15.2.2 * libgnome-desktop-3-19-41.8-150400.3.5.2 * gjs-debuginfo-1.70.2-150400.3.5.4 * Desktop Applications Module 15-SP4 (noarch) * gspell-lang-1.10.0-150400.3.5.3 * gtkspell3-lang-3.0.10-150400.11.2.2 * gnome-desktop-lang-41.8-150400.3.5.2 * gcr-lang-3.41.1-150400.3.5.2 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libgnome-autoar-0-0-debuginfo-0.4.1-150400.3.2.2 * libmozjs-78-0-debuginfo-78.15.0-150400.3.2.4 * typelib-1_0-Gcr-3-3.41.1-150400.3.5.2 * libgdata22-debuginfo-0.18.1-150400.4.2.2 * libgeocode-glib0-debuginfo-3.26.4-150400.3.5.2 * liboauth0-1.0.3-150000.5.2.3 * gcr-prompter-debuginfo-3.41.1-150400.3.5.2 * gcr-data-3.41.1-150400.3.5.2 * gspell-devel-1.10.0-150400.3.5.3 * libgnome-autoar-gtk-0-0-0.4.1-150400.3.2.2 * libgoa-1_0-0-3.40.1-150400.3.2.2 * libcanberra-devel-0.30-150400.15.2.2 * gnome-autoar-devel-0.4.1-150400.3.2.2 * libgjs0-1.70.2-150400.3.5.4 * libgdata22-0.18.1-150400.4.2.2 * gtkspell3-devel-3.0.10-150400.11.2.2 * geocode-glib-devel-3.26.4-150400.3.5.2 * typelib-1_0-GWeather-3_0-40.0-150400.3.2.2 * libgjs-devel-1.70.2-150400.3.5.4 * typelib-1_0-GcrUi-3-3.41.1-150400.3.5.2 * libgcr-devel-3.41.1-150400.3.5.2 * gnome-desktop-debugsource-41.8-150400.3.5.2 * typelib-1_0-GnomeDesktop-3_0-41.8-150400.3.5.2 * libgdata-devel-0.18.1-150400.4.2.2 * canberra-gtk-play-debuginfo-0.30-150400.15.2.2 * gnome-autoar-debugsource-0.4.1-150400.3.2.2 * libcanberra-debugsource-0.30-150400.15.2.2 * libgnome-desktop-3-devel-41.8-150400.3.5.2 * libgnome-desktop-3_0-common-41.8-150400.3.5.2 * typelib-1_0-GtkSpell-3_0-3.0.10-150400.11.2.2 * libgnome-autoar-0-0-0.4.1-150400.3.2.2 * typelib-1_0-GData-0_0-0.18.1-150400.4.2.2 * typelib-1_0-GeocodeGlib-1_0-3.26.4-150400.3.5.2 * libgeocode-glib0-3.26.4-150400.3.5.2 * gjs-debugsource-1.70.2-150400.3.5.4 * mozjs78-debuginfo-78.15.0-150400.3.2.4 * libcanberra-gtk3-module-0.30-150400.15.2.2 * typelib-1_0-Gck-1-3.41.1-150400.3.5.2 * libgweather-3-16-debuginfo-40.0-150400.3.2.2 * libical-debugsource-3.0.10-150400.3.2.4 * libgoa-backend-1_0-1-3.40.1-150400.3.2.2 * gcr-viewer-3.41.1-150400.3.5.2 * libgcr-3-1-debuginfo-3.41.1-150400.3.5.2 * gnome-desktop-debuginfo-41.8-150400.3.5.2 * gweather-data-40.0-150400.3.2.2 * libgoa-backend-1_0-1-debuginfo-3.40.1-150400.3.2.2 * libgnome-autoar-gtk-0-0-debuginfo-0.4.1-150400.3.2.2 * gcr-debugsource-3.41.1-150400.3.5.2 * gspell-debugsource-1.10.0-150400.3.5.3 * typelib-1_0-Goa-1_0-3.40.1-150400.3.2.2 * gcr-viewer-debuginfo-3.41.1-150400.3.5.2 * typelib-1_0-GnomeAutoarGtk-0_1-0.4.1-150400.3.2.2 * libgnome-desktop-3-19-debuginfo-41.8-150400.3.5.2 * mozjs78-debugsource-78.15.0-150400.3.2.4 * typelib-1_0-GnomeAutoar-0_1-0.4.1-150400.3.2.2 * libgspell-1-2-1.10.0-150400.3.5.3 * libgspell-1-2-debuginfo-1.10.0-150400.3.5.3 * mozjs78-devel-78.15.0-150400.3.2.4 * libgweather-3-16-40.0-150400.3.2.2 * librest-debugsource-0.8.1-150000.3.4.3 * librest-0_7-0-debuginfo-0.8.1-150000.3.4.3 * gcr-ssh-askpass-debuginfo-3.41.1-150400.3.5.2 * liboauth-debugsource-1.0.3-150000.5.2.3 * gcr-prompter-3.41.1-150400.3.5.2 * gnome-version-41.8-150400.3.5.2 * canberra-gtk-play-0.30-150400.15.2.2 * gspell-debuginfo-1.10.0-150400.3.5.3 * librest-devel-0.8.1-150000.3.4.3 * libgcr-3-1-3.41.1-150400.3.5.2 * libical3-3.0.10-150400.3.2.4 * gcr-ssh-agent-3.41.1-150400.3.5.2 * typelib-1_0-Rest-0_7-0.8.1-150000.3.4.3 * libxkbregistry0-debuginfo-1.3.0-150400.3.2.2 * libgdata-debugsource-0.18.1-150400.4.2.2 * typelib-1_0-GjsPrivate-1_0-1.70.2-150400.3.5.4 * libcanberra-gtk3-0-debuginfo-0.30-150400.15.2.2 * libcanberra-gtk0-debuginfo-0.30-150400.15.2.2 * libgck-1-0-debuginfo-3.41.1-150400.3.5.2 * libcanberra-gtk0-0.30-150400.15.2.2 * typelib-1_0-Gspell-1-1.10.0-150400.3.5.3 * gcr-ssh-agent-debuginfo-3.41.1-150400.3.5.2 * libcanberra-gtk2-module-debuginfo-0.30-150400.15.2.2 * libgweather-devel-40.0-150400.3.2.2 * liboauth-devel-1.0.3-150000.5.2.3 * libxkbregistry0-1.3.0-150400.3.2.2 * gnome-online-accounts-debuginfo-3.40.1-150400.3.2.2 * libgck-devel-3.41.1-150400.3.5.2 * libxkbregistry-devel-1.3.0-150400.3.2.2 * libgweather-debugsource-40.0-150400.3.2.2 * libmozjs-78-0-78.15.0-150400.3.2.4 * libical-devel-3.0.10-150400.3.2.4 * libcanberra-gtk-devel-0.30-150400.15.2.2 * gnome-autoar-debuginfo-0.4.1-150400.3.2.2 * libxkbcommon-debugsource-1.3.0-150400.3.2.2 * gcr-ssh-askpass-3.41.1-150400.3.5.2 * libgtkspell3-3-0-3.0.10-150400.11.2.2 * liboauth0-debuginfo-1.0.3-150000.5.2.3 * gjs-1.70.2-150400.3.5.4 * geocode-glib-debugsource-3.26.4-150400.3.5.2 * libcanberra-gtk3-devel-0.30-150400.15.2.2 * geocode-glib-3.26.4-150400.3.5.2 * gnome-online-accounts-devel-3.40.1-150400.3.2.2 * libgck-1-0-3.41.1-150400.3.5.2 * libgoa-1_0-0-debuginfo-3.40.1-150400.3.2.2 * libgtkspell3-3-0-debuginfo-3.0.10-150400.11.2.2 * gtkspell3-debugsource-3.0.10-150400.11.2.2 * libcanberra-gtk3-0-0.30-150400.15.2.2 * libcanberra-gtk3-module-debuginfo-0.30-150400.15.2.2 * libgnome-desktop-3_0-common-debuginfo-41.8-150400.3.5.2 * libgjs0-debuginfo-1.70.2-150400.3.5.4 * gnome-online-accounts-debugsource-3.40.1-150400.3.2.2 * librest-0_7-0-0.8.1-150000.3.4.3 * libcanberra-gtk-module-common-0.30-150400.15.2.2 * libcanberra-gtk2-module-0.30-150400.15.2.2 * libical3-debuginfo-3.0.10-150400.3.2.4 * libgnome-desktop-3-19-41.8-150400.3.5.2 * gjs-debuginfo-1.70.2-150400.3.5.4 * Desktop Applications Module 15-SP5 (noarch) * gspell-lang-1.10.0-150400.3.5.3 * gtkspell3-lang-3.0.10-150400.11.2.2 * gnome-desktop-lang-41.8-150400.3.5.2 * gcr-lang-3.41.1-150400.3.5.2 * Development Tools Module 15-SP4 (aarch64 ppc64le s390x x86_64) * glade-debugsource-3.38.2-150400.4.2.2 * typelib-1_0-Gladeui-2_0-3.38.2-150400.4.2.2 * libgladeui-2-13-3.38.2-150400.4.2.2 * glade-3.38.2-150400.4.2.2 * libgladeui-2-devel-3.38.2-150400.4.2.2 * glade-docs-3.38.2-150400.4.2.2 * libgladeui-2-13-debuginfo-3.38.2-150400.4.2.2 * glade-debuginfo-3.38.2-150400.4.2.2 * Development Tools Module 15-SP4 (noarch) * glade-lang-3.38.2-150400.4.2.2 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * glade-debugsource-3.38.2-150400.4.2.2 * typelib-1_0-Gladeui-2_0-3.38.2-150400.4.2.2 * libgladeui-2-13-3.38.2-150400.4.2.2 * glade-3.38.2-150400.4.2.2 * libgladeui-2-devel-3.38.2-150400.4.2.2 * glade-docs-3.38.2-150400.4.2.2 * libgladeui-2-13-debuginfo-3.38.2-150400.4.2.2 * glade-debuginfo-3.38.2-150400.4.2.2 * Development Tools Module 15-SP5 (noarch) * glade-lang-3.38.2-150400.4.2.2 * SUSE Package Hub 15 15-SP4 (noarch) * bogofilter-doc-1.2.4-150000.3.2.3 * evolution-data-server-lang-3.42.5-150400.3.5.4 * evolution-lang-3.42.4-150400.3.8.2 * bogofilter-common-1.2.4-150000.3.2.3 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x) * libebook-contacts-1_2-3-debuginfo-3.42.5-150400.3.5.4 * glade-3.38.2-150400.4.2.2 * evolution-debuginfo-3.42.4-150400.3.8.2 * typelib-1_0-Gcr-3-3.41.1-150400.3.5.2 * libecal-2_0-1-debuginfo-3.42.5-150400.3.5.4 * liboauth0-1.0.3-150000.5.2.3 * libebook-contacts-1_2-3-3.42.5-150400.3.5.4 * bogofilter-sqlite3-debuginfo-1.2.4-150000.3.2.3 * gcr-data-3.41.1-150400.3.5.2 * evolution-plugin-pst-import-3.42.4-150400.3.8.2 * libgnome-autoar-gtk-0-0-0.4.1-150400.3.2.2 * libgoa-1_0-0-3.40.1-150400.3.2.2 * evolution-devel-3.42.4-150400.3.8.2 * libgjs0-1.70.2-150400.3.5.4 * libgdata22-0.18.1-150400.4.2.2 * gtkspell3-devel-3.0.10-150400.11.2.2 * typelib-1_0-EDataServer-1_2-3.42.5-150400.3.5.4 * libedata-book-1_2-26-3.42.5-150400.3.5.4 * geocode-glib-devel-3.26.4-150400.3.5.2 * bogofilter-db-debuginfo-1.2.4-150000.3.2.3 * typelib-1_0-ICal-3_0-3.0.10-150400.3.2.3 * typelib-1_0-GWeather-3_0-40.0-150400.3.2.2 * typelib-1_0-GcrUi-3-3.41.1-150400.3.5.2 * libedataserverui-1_2-3-3.42.5-150400.3.5.4 * libgcr-devel-3.41.1-150400.3.5.2 * libebackend-1_2-10-3.42.5-150400.3.5.4 * typelib-1_0-GnomeDesktop-3_0-41.8-150400.3.5.2 * libgdata-devel-0.18.1-150400.4.2.2 * evolution-plugin-spamassassin-3.42.4-150400.3.8.2 * libgnome-desktop-3-devel-41.8-150400.3.5.2 * libgnome-desktop-3_0-common-41.8-150400.3.5.2 * libgnome-autoar-0-0-0.4.1-150400.3.2.2 * libedata-cal-2_0-1-3.42.5-150400.3.5.4 * bogofilter-sqlite3-1.2.4-150000.3.2.3 * typelib-1_0-GData-0_0-0.18.1-150400.4.2.2 * libgeocode-glib0-3.26.4-150400.3.5.2 * typelib-1_0-GeocodeGlib-1_0-3.26.4-150400.3.5.2 * bogofilter-db-1.2.4-150000.3.2.3 * bogofilter-kyotocabinet-1.2.4-150000.3.2.3 * typelib-1_0-Gck-1-3.41.1-150400.3.5.2 * libgoa-backend-1_0-1-3.40.1-150400.3.2.2 * gweather-data-40.0-150400.3.2.2 * typelib-1_0-Camel-1_2-3.42.5-150400.3.5.4 * libedataserver-1_2-26-3.42.5-150400.3.5.4 * libebackend-1_2-10-debuginfo-3.42.5-150400.3.5.4 * typelib-1_0-Goa-1_0-3.40.1-150400.3.2.2 * evolution-data-server-debugsource-3.42.5-150400.3.5.4 * libcamel-1_2-63-3.42.5-150400.3.5.4 * libgspell-1-2-1.10.0-150400.3.5.3 * libgweather-3-16-40.0-150400.3.2.2 * libphonenumber8-8.12.23-150400.3.2.3 * typelib-1_0-EBookContacts-1_2-3.42.5-150400.3.5.4 * typelib-1_0-ECal-2_0-3.42.5-150400.3.5.4 * typelib-1_0-EDataBook-1_2-3.42.5-150400.3.5.4 * evolution-data-server-devel-3.42.5-150400.3.5.4 * evolution-plugin-text-highlight-debuginfo-3.42.4-150400.3.8.2 * gcr-prompter-3.41.1-150400.3.5.2 * evolution-plugin-pst-import-debuginfo-3.42.4-150400.3.8.2 * evolution-debugsource-3.42.4-150400.3.8.2 * libebook-1_2-20-debuginfo-3.42.5-150400.3.5.4 * evolution-data-server-3.42.5-150400.3.5.4 * glade-catalog-evolution-3.42.4-150400.3.8.2 * evolution-plugin-text-highlight-3.42.4-150400.3.8.2 * libecal-2_0-1-3.42.5-150400.3.5.4 * libgcr-3-1-3.41.1-150400.3.5.2 * bogofilter-debugsource-1.2.4-150000.3.2.3 * typelib-1_0-EBackend-1_2-3.42.5-150400.3.5.4 * libical-glib3-3.0.10-150400.3.2.3 * typelib-1_0-ICalGLib-3_0-3.0.10-150400.3.2.3 * typelib-1_0-EBook-1_2-3.42.5-150400.3.5.4 * typelib-1_0-GjsPrivate-1_0-1.70.2-150400.3.5.4 * typelib-1_0-EDataServerUI-1_2-3.42.5-150400.3.5.4 * libgladeui-2-13-3.38.2-150400.4.2.2 * typelib-1_0-EDataCal-2_0-3.42.5-150400.3.5.4 * libedata-cal-2_0-1-debuginfo-3.42.5-150400.3.5.4 * libgweather-devel-40.0-150400.3.2.2 * liboauth-devel-1.0.3-150000.5.2.3 * libxkbregistry0-1.3.0-150400.3.2.2 * libgck-devel-3.41.1-150400.3.5.2 * glade-catalog-evolution-debuginfo-3.42.4-150400.3.8.2 * libxkbregistry-devel-1.3.0-150400.3.2.2 * libmozjs-78-0-78.15.0-150400.3.2.4 * bogofilter-debuginfo-1.2.4-150000.3.2.3 * libical-devel-3.0.10-150400.3.2.4 * libedata-book-1_2-26-debuginfo-3.42.5-150400.3.5.4 * evolution-plugin-bogofilter-debuginfo-3.42.4-150400.3.8.2 * evolution-data-server-debuginfo-3.42.5-150400.3.5.4 * evolution-3.42.4-150400.3.8.2 * evolution-plugin-spamassassin-debuginfo-3.42.4-150400.3.8.2 * geocode-glib-3.26.4-150400.3.5.2 * gnome-online-accounts-devel-3.40.1-150400.3.2.2 * libgck-1-0-3.41.1-150400.3.5.2 * bogofilter-kyotocabinet-debuginfo-1.2.4-150000.3.2.3 * libgsl23-2.4-150100.9.7.1 * libical-glib-devel-3.0.10-150400.3.2.3 * libcanberra-gtk3-0-0.30-150400.15.2.2 * librest-0_7-0-0.8.1-150000.3.4.3 * libebook-1_2-20-3.42.5-150400.3.5.4 * libgnome-desktop-3-19-41.8-150400.3.5.2 * evolution-plugin-bogofilter-3.42.4-150400.3.8.2 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64) * gtkspell3-debugsource-3.0.10-150400.11.2.2 * typelib-1_0-GtkSpell-3_0-3.0.10-150400.11.2.2 * libgtkspell3-3-0-3.0.10-150400.11.2.2 * SUSE Package Hub 15 15-SP4 (ppc64le) * libical3-3.0.10-150400.3.2.4 * SUSE Package Hub 15 15-SP5 (noarch) * bogofilter-doc-1.2.4-150000.3.2.3 * evolution-data-server-lang-3.42.5-150400.3.5.4 * evolution-lang-3.42.4-150400.3.8.2 * bogofilter-common-1.2.4-150000.3.2.3 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * libebook-contacts-1_2-3-debuginfo-3.42.5-150400.3.5.4 * glade-3.38.2-150400.4.2.2 * evolution-debuginfo-3.42.4-150400.3.8.2 * typelib-1_0-Gcr-3-3.41.1-150400.3.5.2 * libecal-2_0-1-debuginfo-3.42.5-150400.3.5.4 * liboauth0-1.0.3-150000.5.2.3 * libebook-contacts-1_2-3-3.42.5-150400.3.5.4 * bogofilter-sqlite3-debuginfo-1.2.4-150000.3.2.3 * gcr-data-3.41.1-150400.3.5.2 * evolution-plugin-pst-import-3.42.4-150400.3.8.2 * libgnome-autoar-gtk-0-0-0.4.1-150400.3.2.2 * libgoa-1_0-0-3.40.1-150400.3.2.2 * evolution-devel-3.42.4-150400.3.8.2 * libgjs0-1.70.2-150400.3.5.4 * libgdata22-0.18.1-150400.4.2.2 * gtkspell3-devel-3.0.10-150400.11.2.2 * typelib-1_0-EDataServer-1_2-3.42.5-150400.3.5.4 * libedata-book-1_2-26-3.42.5-150400.3.5.4 * geocode-glib-devel-3.26.4-150400.3.5.2 * bogofilter-db-debuginfo-1.2.4-150000.3.2.3 * typelib-1_0-ICal-3_0-3.0.10-150400.3.2.3 * typelib-1_0-GWeather-3_0-40.0-150400.3.2.2 * typelib-1_0-GcrUi-3-3.41.1-150400.3.5.2 * libedataserverui-1_2-3-3.42.5-150400.3.5.4 * libgcr-devel-3.41.1-150400.3.5.2 * libebackend-1_2-10-3.42.5-150400.3.5.4 * typelib-1_0-GnomeDesktop-3_0-41.8-150400.3.5.2 * libgdata-devel-0.18.1-150400.4.2.2 * evolution-plugin-spamassassin-3.42.4-150400.3.8.2 * libgnome-desktop-3-devel-41.8-150400.3.5.2 * libgnome-desktop-3_0-common-41.8-150400.3.5.2 * libgnome-autoar-0-0-0.4.1-150400.3.2.2 * libedata-cal-2_0-1-3.42.5-150400.3.5.4 * bogofilter-sqlite3-1.2.4-150000.3.2.3 * typelib-1_0-GData-0_0-0.18.1-150400.4.2.2 * libgeocode-glib0-3.26.4-150400.3.5.2 * typelib-1_0-GeocodeGlib-1_0-3.26.4-150400.3.5.2 * bogofilter-db-1.2.4-150000.3.2.3 * bogofilter-kyotocabinet-1.2.4-150000.3.2.3 * typelib-1_0-Gck-1-3.41.1-150400.3.5.2 * libgoa-backend-1_0-1-3.40.1-150400.3.2.2 * gweather-data-40.0-150400.3.2.2 * typelib-1_0-Camel-1_2-3.42.5-150400.3.5.4 * libedataserver-1_2-26-3.42.5-150400.3.5.4 * libebackend-1_2-10-debuginfo-3.42.5-150400.3.5.4 * typelib-1_0-Goa-1_0-3.40.1-150400.3.2.2 * evolution-data-server-debugsource-3.42.5-150400.3.5.4 * libcamel-1_2-63-3.42.5-150400.3.5.4 * libgspell-1-2-1.10.0-150400.3.5.3 * libgweather-3-16-40.0-150400.3.2.2 * libphonenumber8-8.12.23-150400.3.2.3 * typelib-1_0-EBookContacts-1_2-3.42.5-150400.3.5.4 * typelib-1_0-ECal-2_0-3.42.5-150400.3.5.4 * typelib-1_0-EDataBook-1_2-3.42.5-150400.3.5.4 * evolution-data-server-devel-3.42.5-150400.3.5.4 * evolution-plugin-text-highlight-debuginfo-3.42.4-150400.3.8.2 * gcr-prompter-3.41.1-150400.3.5.2 * evolution-plugin-pst-import-debuginfo-3.42.4-150400.3.8.2 * evolution-debugsource-3.42.4-150400.3.8.2 * libebook-1_2-20-debuginfo-3.42.5-150400.3.5.4 * evolution-data-server-3.42.5-150400.3.5.4 * glade-catalog-evolution-3.42.4-150400.3.8.2 * evolution-plugin-text-highlight-3.42.4-150400.3.8.2 * libecal-2_0-1-3.42.5-150400.3.5.4 * libgcr-3-1-3.41.1-150400.3.5.2 * libical3-3.0.10-150400.3.2.4 * bogofilter-debugsource-1.2.4-150000.3.2.3 * typelib-1_0-EBackend-1_2-3.42.5-150400.3.5.4 * libical-glib3-3.0.10-150400.3.2.3 * typelib-1_0-ICalGLib-3_0-3.0.10-150400.3.2.3 * typelib-1_0-EBook-1_2-3.42.5-150400.3.5.4 * typelib-1_0-GjsPrivate-1_0-1.70.2-150400.3.5.4 * typelib-1_0-EDataServerUI-1_2-3.42.5-150400.3.5.4 * libgladeui-2-13-3.38.2-150400.4.2.2 * typelib-1_0-EDataCal-2_0-3.42.5-150400.3.5.4 * libedata-cal-2_0-1-debuginfo-3.42.5-150400.3.5.4 * libgweather-devel-40.0-150400.3.2.2 * liboauth-devel-1.0.3-150000.5.2.3 * libxkbregistry0-1.3.0-150400.3.2.2 * libgck-devel-3.41.1-150400.3.5.2 * glade-catalog-evolution-debuginfo-3.42.4-150400.3.8.2 * libxkbregistry-devel-1.3.0-150400.3.2.2 * libmozjs-78-0-78.15.0-150400.3.2.4 * bogofilter-debuginfo-1.2.4-150000.3.2.3 * libical-devel-3.0.10-150400.3.2.4 * libedata-book-1_2-26-debuginfo-3.42.5-150400.3.5.4 * evolution-plugin-bogofilter-debuginfo-3.42.4-150400.3.8.2 * evolution-data-server-debuginfo-3.42.5-150400.3.5.4 * evolution-3.42.4-150400.3.8.2 * evolution-plugin-spamassassin-debuginfo-3.42.4-150400.3.8.2 * geocode-glib-3.26.4-150400.3.5.2 * gnome-online-accounts-devel-3.40.1-150400.3.2.2 * libgck-1-0-3.41.1-150400.3.5.2 * bogofilter-kyotocabinet-debuginfo-1.2.4-150000.3.2.3 * libgsl23-2.4-150100.9.7.1 * libical-glib-devel-3.0.10-150400.3.2.3 * libcanberra-gtk3-0-0.30-150400.15.2.2 * librest-0_7-0-0.8.1-150000.3.4.3 * libebook-1_2-20-3.42.5-150400.3.5.4 * libgnome-desktop-3-19-41.8-150400.3.5.2 * evolution-plugin-bogofilter-3.42.4-150400.3.8.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * gtkspell3-debugsource-3.0.10-150400.11.2.2 * typelib-1_0-GtkSpell-3_0-3.0.10-150400.11.2.2 * libgtkspell3-3-0-3.0.10-150400.11.2.2 * SUSE Manager Proxy 4.2 (x86_64) * librest-0_7-0-0.8.1-150000.3.4.3 * librest-debugsource-0.8.1-150000.3.4.3 * librest-0_7-0-debuginfo-0.8.1-150000.3.4.3 * SUSE Manager Retail Branch Server 4.2 (x86_64) * librest-0_7-0-0.8.1-150000.3.4.3 * librest-debugsource-0.8.1-150000.3.4.3 * librest-0_7-0-debuginfo-0.8.1-150000.3.4.3 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * librest-0_7-0-0.8.1-150000.3.4.3 * librest-debugsource-0.8.1-150000.3.4.3 * librest-0_7-0-debuginfo-0.8.1-150000.3.4.3 * SUSE Linux Enterprise Workstation Extension 15 SP4 (noarch) * libgdata-lang-0.18.1-150400.4.2.2 * evolution-data-server-lang-3.42.5-150400.3.5.4 * evolution-lang-3.42.4-150400.3.8.2 * bogofilter-common-1.2.4-150000.3.2.3 * libgweather-lang-40.0-150400.3.2.2 * gnome-online-accounts-lang-3.40.1-150400.3.2.2 * SUSE Linux Enterprise Workstation Extension 15 SP4 (x86_64) * libebook-contacts-1_2-3-debuginfo-3.42.5-150400.3.5.4 * gnome-online-accounts-3.40.1-150400.3.2.2 * gsl-debugsource-2.4-150100.9.7.1 * evolution-debuginfo-3.42.4-150400.3.8.2 * libical-glib-debugsource-3.0.10-150400.3.2.3 * bogofilter-db-1.2.4-150000.3.2.3 * evolution-plugin-text-highlight-3.42.4-150400.3.8.2 * libecal-2_0-1-3.42.5-150400.3.5.4 * libical-glib3-debuginfo-3.0.10-150400.3.2.3 * evolution-plugin-bogofilter-debuginfo-3.42.4-150400.3.8.2 * evolution-data-server-debuginfo-3.42.5-150400.3.5.4 * gsl-debuginfo-2.4-150100.9.7.1 * bogofilter-debugsource-1.2.4-150000.3.2.3 * libecal-2_0-1-debuginfo-3.42.5-150400.3.5.4 * libphonenumber8-debuginfo-8.12.23-150400.3.2.3 * libebook-contacts-1_2-3-3.42.5-150400.3.5.4 * evolution-3.42.4-150400.3.8.2 * libphonenumber-debugsource-8.12.23-150400.3.2.3 * evolution-plugin-spamassassin-debuginfo-3.42.4-150400.3.8.2 * libical-glib3-3.0.10-150400.3.2.3 * typelib-1_0-ICalGLib-3_0-3.0.10-150400.3.2.3 * evolution-plugin-pst-import-3.42.4-150400.3.8.2 * typelib-1_0-Camel-1_2-3.42.5-150400.3.5.4 * typelib-1_0-EBook-1_2-3.42.5-150400.3.5.4 * evolution-devel-3.42.4-150400.3.8.2 * typelib-1_0-EDataServerUI-1_2-3.42.5-150400.3.5.4 * libedataserver-1_2-26-3.42.5-150400.3.5.4 * libebackend-1_2-10-debuginfo-3.42.5-150400.3.5.4 * typelib-1_0-EDataServer-1_2-3.42.5-150400.3.5.4 * libedataserverui-1_2-3-debuginfo-3.42.5-150400.3.5.4 * libgsl23-2.4-150100.9.7.1 * libedata-book-1_2-26-3.42.5-150400.3.5.4 * libedata-cal-2_0-1-debuginfo-3.42.5-150400.3.5.4 * evolution-data-server-debugsource-3.42.5-150400.3.5.4 * libcamel-1_2-63-3.42.5-150400.3.5.4 * libgsl23-debuginfo-2.4-150100.9.7.1 * libical-glib-devel-3.0.10-150400.3.2.3 * bogofilter-db-debuginfo-1.2.4-150000.3.2.3 * typelib-1_0-ICal-3_0-3.0.10-150400.3.2.3 * libedataserverui-1_2-3-3.42.5-150400.3.5.4 * libebackend-1_2-10-3.42.5-150400.3.5.4 * gnome-online-accounts-debugsource-3.40.1-150400.3.2.2 * libphonenumber8-8.12.23-150400.3.2.3 * typelib-1_0-EBookContacts-1_2-3.42.5-150400.3.5.4 * libical-glib-devel-debuginfo-3.0.10-150400.3.2.3 * libcamel-1_2-63-debuginfo-3.42.5-150400.3.5.4 * typelib-1_0-ECal-2_0-3.42.5-150400.3.5.4 * evolution-data-server-devel-3.42.5-150400.3.5.4 * evolution-plugin-text-highlight-debuginfo-3.42.4-150400.3.8.2 * gnome-online-accounts-debuginfo-3.40.1-150400.3.2.2 * evolution-plugin-pst-import-debuginfo-3.42.4-150400.3.8.2 * libedataserver-1_2-26-debuginfo-3.42.5-150400.3.5.4 * evolution-plugin-spamassassin-3.42.4-150400.3.8.2 * evolution-debugsource-3.42.4-150400.3.8.2 * bogofilter-debuginfo-1.2.4-150000.3.2.3 * libebook-1_2-20-3.42.5-150400.3.5.4 * libebook-1_2-20-debuginfo-3.42.5-150400.3.5.4 * libedata-cal-2_0-1-3.42.5-150400.3.5.4 * evolution-data-server-3.42.5-150400.3.5.4 * evolution-plugin-bogofilter-3.42.4-150400.3.8.2 * libedata-book-1_2-26-debuginfo-3.42.5-150400.3.5.4 * SUSE Linux Enterprise Workstation Extension 15 SP5 (noarch) * libgdata-lang-0.18.1-150400.4.2.2 * evolution-data-server-lang-3.42.5-150400.3.5.4 * evolution-lang-3.42.4-150400.3.8.2 * bogofilter-common-1.2.4-150000.3.2.3 * libgweather-lang-40.0-150400.3.2.2 * gnome-online-accounts-lang-3.40.1-150400.3.2.2 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * libebook-contacts-1_2-3-debuginfo-3.42.5-150400.3.5.4 * gnome-online-accounts-3.40.1-150400.3.2.2 * gsl-debugsource-2.4-150100.9.7.1 * evolution-debuginfo-3.42.4-150400.3.8.2 * libical-glib-debugsource-3.0.10-150400.3.2.3 * bogofilter-db-1.2.4-150000.3.2.3 * evolution-plugin-text-highlight-3.42.4-150400.3.8.2 * libecal-2_0-1-3.42.5-150400.3.5.4 * libical-glib3-debuginfo-3.0.10-150400.3.2.3 * evolution-plugin-bogofilter-debuginfo-3.42.4-150400.3.8.2 * evolution-data-server-debuginfo-3.42.5-150400.3.5.4 * gsl-debuginfo-2.4-150100.9.7.1 * bogofilter-debugsource-1.2.4-150000.3.2.3 * libecal-2_0-1-debuginfo-3.42.5-150400.3.5.4 * libphonenumber8-debuginfo-8.12.23-150400.3.2.3 * libebook-contacts-1_2-3-3.42.5-150400.3.5.4 * evolution-3.42.4-150400.3.8.2 * libphonenumber-debugsource-8.12.23-150400.3.2.3 * evolution-plugin-spamassassin-debuginfo-3.42.4-150400.3.8.2 * libical-glib3-3.0.10-150400.3.2.3 * typelib-1_0-ICalGLib-3_0-3.0.10-150400.3.2.3 * evolution-plugin-pst-import-3.42.4-150400.3.8.2 * typelib-1_0-Camel-1_2-3.42.5-150400.3.5.4 * typelib-1_0-EBook-1_2-3.42.5-150400.3.5.4 * evolution-devel-3.42.4-150400.3.8.2 * typelib-1_0-EDataServerUI-1_2-3.42.5-150400.3.5.4 * libedataserver-1_2-26-3.42.5-150400.3.5.4 * libebackend-1_2-10-debuginfo-3.42.5-150400.3.5.4 * typelib-1_0-EDataServer-1_2-3.42.5-150400.3.5.4 * libedataserverui-1_2-3-debuginfo-3.42.5-150400.3.5.4 * libgsl23-2.4-150100.9.7.1 * libedata-book-1_2-26-3.42.5-150400.3.5.4 * libedata-cal-2_0-1-debuginfo-3.42.5-150400.3.5.4 * evolution-data-server-debugsource-3.42.5-150400.3.5.4 * libcamel-1_2-63-3.42.5-150400.3.5.4 * libgsl23-debuginfo-2.4-150100.9.7.1 * libical-glib-devel-3.0.10-150400.3.2.3 * bogofilter-db-debuginfo-1.2.4-150000.3.2.3 * typelib-1_0-ICal-3_0-3.0.10-150400.3.2.3 * libedataserverui-1_2-3-3.42.5-150400.3.5.4 * libebackend-1_2-10-3.42.5-150400.3.5.4 * gnome-online-accounts-debugsource-3.40.1-150400.3.2.2 * libphonenumber8-8.12.23-150400.3.2.3 * typelib-1_0-EBookContacts-1_2-3.42.5-150400.3.5.4 * libical-glib-devel-debuginfo-3.0.10-150400.3.2.3 * libcamel-1_2-63-debuginfo-3.42.5-150400.3.5.4 * typelib-1_0-ECal-2_0-3.42.5-150400.3.5.4 * evolution-data-server-devel-3.42.5-150400.3.5.4 * evolution-plugin-text-highlight-debuginfo-3.42.4-150400.3.8.2 * gnome-online-accounts-debuginfo-3.40.1-150400.3.2.2 * evolution-plugin-pst-import-debuginfo-3.42.4-150400.3.8.2 * libedataserver-1_2-26-debuginfo-3.42.5-150400.3.5.4 * evolution-plugin-spamassassin-3.42.4-150400.3.8.2 * evolution-debugsource-3.42.4-150400.3.8.2 * bogofilter-debuginfo-1.2.4-150000.3.2.3 * libebook-1_2-20-3.42.5-150400.3.5.4 * libebook-1_2-20-debuginfo-3.42.5-150400.3.5.4 * libedata-cal-2_0-1-3.42.5-150400.3.5.4 * evolution-data-server-3.42.5-150400.3.5.4 * evolution-plugin-bogofilter-3.42.4-150400.3.8.2 * libedata-book-1_2-26-debuginfo-3.42.5-150400.3.5.4 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * librest-0_7-0-0.8.1-150000.3.4.3 * librest-debugsource-0.8.1-150000.3.4.3 * librest-0_7-0-debuginfo-0.8.1-150000.3.4.3 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * librest-0_7-0-0.8.1-150000.3.4.3 * librest-debugsource-0.8.1-150000.3.4.3 * librest-0_7-0-debuginfo-0.8.1-150000.3.4.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213858 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:30:20 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:30:20 -0000 Subject: SUSE-SU-2023:3885-1: important: Maintenance update for SUSE Manager 4.3.8 Release Notes Message-ID: <169590422022.32431.2634210717102366731@smelt2.prg2.suse.org> # Maintenance update for SUSE Manager 4.3.8 Release Notes Announcement ID: SUSE-SU-2023:3885-1 Rating: important References: * #1193948 * #1193948 * #1207330 * #1207330 * #1208692 * #1208692 * #1208692 * #1210935 * #1210935 * #1211525 * #1211525 * #1211525 * #1211874 * #1211874 * #1211884 * #1211884 * #1212246 * #1212246 * #1212730 * #1212730 * #1212814 * #1212814 * #1212827 * #1212827 * #1212856 * #1212856 * #1212856 * #1212943 * #1212943 * #1212943 * #1213009 * #1213009 * #1213077 * #1213077 * #1213288 * #1213288 * #1213441 * #1213441 * #1213445 * #1213445 * #1213445 * #1213469 * #1213469 * #1213675 * #1213675 * #1213675 * #1213716 * #1213716 * #1213880 * #1213880 * #1214002 * #1214002 * #1214121 * #1214121 * #1214124 * #1214124 * #1214187 * #1214187 * #1214266 * #1214266 * #1214280 * #1214280 * #1214796 * #1214796 * #1214797 * #1214797 * #1214889 * #1214889 * #1214982 * #1214982 * #1215352 * #1215352 * #1215362 * #1215362 * #1215413 * #1215413 * #1215497 * #1215497 * #1215756 * #1215756 * MSQA-699 * MSQA-699 * MSQA-699 * SUMA-158 * SUMA-158 * SUMA-280 * SUMA-280 Cross-References: * CVE-2023-20897 * CVE-2023-20897 * CVE-2023-20898 * CVE-2023-20898 * CVE-2023-29409 * CVE-2023-29409 CVSS scores: * CVE-2023-20897 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20897 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20898 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2023-20898 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2023-29409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-29409 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves six vulnerabilities, contains seven features and has 74 security fixes can now be installed. ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.3 ### Description: This update fixes the following issues: release-notes-susemanager-proxy: * Update to SUSE Manager 4.3.8 * Bugs mentioned bsc#1208692, bsc#1211525, bsc#1212856, bsc#1212943, bsc#1213445, bsc#1213675 ## Security update for SUSE Manager Server 4.3 ### Description: This update fixes the following issues: release-notes-susemanager: * Update to SUSE Manager 4.3.8 * Important Salt minion update * SUSE Manager Pay-as-you-go (PAYG) * Automated RHUI credential update * Monitoring: Prometheus upgraded to 2.45.0 * Monitoring: Apache exporter updated to version 1.0.0 * Expose lastBuildDate property (last build/promote date of an environment) through contentlifecycle API (jsc#SUMA-280) * Add saltboot redeploy and repartition based on pillars (jsc#SUMA-158) * Security CVE issues fixed: CVE-2023-29409, CVE-2023-20897, CVE-2023-20898 * Bugs mentioned bsc#1207330, bsc#1208692, bsc#1210935, bsc#1211525, bsc#1211874 bsc#1211884, bsc#1212246, bsc#1212730, bsc#1212814, bsc#1212827 bsc#1212856, bsc#1212943, bsc#1213009, bsc#1213077, bsc#1213288 bsc#1213445, bsc#1213675, bsc#1213716, bsc#1213880, bsc#1214002 bsc#1214121, bsc#1214124, bsc#1214187, bsc#1214266, bsc#1214280 bsc#1214889, bsc#1214982, bsc#1215352, bsc#1215362, bsc#1215497 bsc#1193948, bsc#1214797, bsc#1213441, bsc#1214796, bsc#1213469 bsc#1215413, bsc#1215756 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2023-3885=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2023-3885=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2023-3885=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2023-3885=1 ## Package List: * openSUSE Leap 15.4 (noarch) * release-notes-susemanager-proxy-4.3.8-150400.3.61.2 * release-notes-susemanager-4.3.8-150400.3.77.1 * SUSE Manager Proxy 4.3 (noarch) * release-notes-susemanager-proxy-4.3.8-150400.3.61.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * release-notes-susemanager-proxy-4.3.8-150400.3.61.2 * SUSE Manager Server 4.3 (noarch) * release-notes-susemanager-4.3.8-150400.3.77.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20897.html * https://www.suse.com/security/cve/CVE-2023-20897.html * https://www.suse.com/security/cve/CVE-2023-20898.html * https://www.suse.com/security/cve/CVE-2023-20898.html * https://www.suse.com/security/cve/CVE-2023-29409.html * https://www.suse.com/security/cve/CVE-2023-29409.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1207330 * https://bugzilla.suse.com/show_bug.cgi?id=1207330 * https://bugzilla.suse.com/show_bug.cgi?id=1208692 * https://bugzilla.suse.com/show_bug.cgi?id=1208692 * https://bugzilla.suse.com/show_bug.cgi?id=1208692 * https://bugzilla.suse.com/show_bug.cgi?id=1210935 * https://bugzilla.suse.com/show_bug.cgi?id=1210935 * https://bugzilla.suse.com/show_bug.cgi?id=1211525 * https://bugzilla.suse.com/show_bug.cgi?id=1211525 * https://bugzilla.suse.com/show_bug.cgi?id=1211525 * https://bugzilla.suse.com/show_bug.cgi?id=1211874 * https://bugzilla.suse.com/show_bug.cgi?id=1211874 * https://bugzilla.suse.com/show_bug.cgi?id=1211884 * https://bugzilla.suse.com/show_bug.cgi?id=1211884 * https://bugzilla.suse.com/show_bug.cgi?id=1212246 * https://bugzilla.suse.com/show_bug.cgi?id=1212246 * https://bugzilla.suse.com/show_bug.cgi?id=1212730 * https://bugzilla.suse.com/show_bug.cgi?id=1212730 * https://bugzilla.suse.com/show_bug.cgi?id=1212814 * https://bugzilla.suse.com/show_bug.cgi?id=1212814 * https://bugzilla.suse.com/show_bug.cgi?id=1212827 * https://bugzilla.suse.com/show_bug.cgi?id=1212827 * https://bugzilla.suse.com/show_bug.cgi?id=1212856 * https://bugzilla.suse.com/show_bug.cgi?id=1212856 * https://bugzilla.suse.com/show_bug.cgi?id=1212856 * https://bugzilla.suse.com/show_bug.cgi?id=1212943 * https://bugzilla.suse.com/show_bug.cgi?id=1212943 * https://bugzilla.suse.com/show_bug.cgi?id=1212943 * https://bugzilla.suse.com/show_bug.cgi?id=1213009 * https://bugzilla.suse.com/show_bug.cgi?id=1213009 * https://bugzilla.suse.com/show_bug.cgi?id=1213077 * https://bugzilla.suse.com/show_bug.cgi?id=1213077 * https://bugzilla.suse.com/show_bug.cgi?id=1213288 * https://bugzilla.suse.com/show_bug.cgi?id=1213288 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213445 * https://bugzilla.suse.com/show_bug.cgi?id=1213445 * https://bugzilla.suse.com/show_bug.cgi?id=1213445 * https://bugzilla.suse.com/show_bug.cgi?id=1213469 * https://bugzilla.suse.com/show_bug.cgi?id=1213469 * https://bugzilla.suse.com/show_bug.cgi?id=1213675 * https://bugzilla.suse.com/show_bug.cgi?id=1213675 * https://bugzilla.suse.com/show_bug.cgi?id=1213675 * https://bugzilla.suse.com/show_bug.cgi?id=1213716 * https://bugzilla.suse.com/show_bug.cgi?id=1213716 * https://bugzilla.suse.com/show_bug.cgi?id=1213880 * https://bugzilla.suse.com/show_bug.cgi?id=1213880 * https://bugzilla.suse.com/show_bug.cgi?id=1214002 * https://bugzilla.suse.com/show_bug.cgi?id=1214002 * https://bugzilla.suse.com/show_bug.cgi?id=1214121 * https://bugzilla.suse.com/show_bug.cgi?id=1214121 * https://bugzilla.suse.com/show_bug.cgi?id=1214124 * https://bugzilla.suse.com/show_bug.cgi?id=1214124 * https://bugzilla.suse.com/show_bug.cgi?id=1214187 * https://bugzilla.suse.com/show_bug.cgi?id=1214187 * https://bugzilla.suse.com/show_bug.cgi?id=1214266 * https://bugzilla.suse.com/show_bug.cgi?id=1214266 * https://bugzilla.suse.com/show_bug.cgi?id=1214280 * https://bugzilla.suse.com/show_bug.cgi?id=1214280 * https://bugzilla.suse.com/show_bug.cgi?id=1214796 * https://bugzilla.suse.com/show_bug.cgi?id=1214796 * https://bugzilla.suse.com/show_bug.cgi?id=1214797 * https://bugzilla.suse.com/show_bug.cgi?id=1214797 * https://bugzilla.suse.com/show_bug.cgi?id=1214889 * https://bugzilla.suse.com/show_bug.cgi?id=1214889 * https://bugzilla.suse.com/show_bug.cgi?id=1214982 * https://bugzilla.suse.com/show_bug.cgi?id=1214982 * https://bugzilla.suse.com/show_bug.cgi?id=1215352 * https://bugzilla.suse.com/show_bug.cgi?id=1215352 * https://bugzilla.suse.com/show_bug.cgi?id=1215362 * https://bugzilla.suse.com/show_bug.cgi?id=1215362 * https://bugzilla.suse.com/show_bug.cgi?id=1215413 * https://bugzilla.suse.com/show_bug.cgi?id=1215413 * https://bugzilla.suse.com/show_bug.cgi?id=1215497 * https://bugzilla.suse.com/show_bug.cgi?id=1215497 * https://bugzilla.suse.com/show_bug.cgi?id=1215756 * https://bugzilla.suse.com/show_bug.cgi?id=1215756 * https://jira.suse.com/browse/MSQA-699 * https://jira.suse.com/browse/MSQA-699 * https://jira.suse.com/browse/MSQA-699 * https://jira.suse.com/browse/SUMA-158 * https://jira.suse.com/browse/SUMA-158 * https://jira.suse.com/browse/SUMA-280 * https://jira.suse.com/browse/SUMA-280 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:30:26 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:30:26 -0000 Subject: SUSE-SU-2023:3884-1: moderate: Security update for SUSE Manager Salt Bundle Message-ID: <169590422628.32431.13493684022629702820@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-2023:3884-1 Rating: moderate References: * #1193948 * #1210994 * #1212794 * #1212844 * #1212855 * #1213257 * #1213441 * #1213630 * #1213960 * #1214796 * #1214797 * #1215489 * MSQA-699 Cross-References: * CVE-2023-20897 * CVE-2023-20898 CVSS scores: * CVE-2023-20897 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20897 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20898 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2023-20898 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N Affected Products: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 An update that solves two vulnerabilities, contains one feature and has 10 security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Security issues fixed: * CVE-2023-20897: Do not fail on bad message pack message (bsc#1213441) * CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base name. (bsc#1214797, bsc#1193948) * Bugs fixed: * Revert usage of long running REQ channel to prevent possible missing responses on requests and duplicated responses (bsc#1213960, bsc#1213630, bsc#1213257) * Create minion_id with reproducible mtime * Do not recompile SELinux policy module on building. Use precompiled module instead to avoid incompatibility errors. * Fix broken tests to make them running in the testsuite * Fix detection of Salt codename by "salt_version" execution module * Fix inconsistency in reported version by egg-info metadata (bsc#1215489) * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844) * Fix the regression of user.present state when group is unset (bsc#1212855) * Fix utf8 handling in 'pass' renderer and make it more robust * Fix zypper repositories always being reconfigured * Make sure configured user is properly set by Salt (bsc#1210994) * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794) * Ship SELinux policy module version 19 to make it compatible with broader list of Linux distributions ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 zypper in -t patch SUSE-EL-9-CLIENT-TOOLS-2023-3884=1 ## Package List: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-1.24.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20897.html * https://www.suse.com/security/cve/CVE-2023-20898.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1210994 * https://bugzilla.suse.com/show_bug.cgi?id=1212794 * https://bugzilla.suse.com/show_bug.cgi?id=1212844 * https://bugzilla.suse.com/show_bug.cgi?id=1212855 * https://bugzilla.suse.com/show_bug.cgi?id=1213257 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213630 * https://bugzilla.suse.com/show_bug.cgi?id=1213960 * https://bugzilla.suse.com/show_bug.cgi?id=1214796 * https://bugzilla.suse.com/show_bug.cgi?id=1214797 * https://bugzilla.suse.com/show_bug.cgi?id=1215489 * https://jira.suse.com/browse/MSQA-699 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:30:32 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:30:32 -0000 Subject: SUSE-SU-2023:3881-1: moderate: Security update for SUSE Manager Salt Bundle Message-ID: <169590423247.32431.10492799910858779123@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-2023:3881-1 Rating: moderate References: * #1193948 * #1210994 * #1212794 * #1212844 * #1212855 * #1213257 * #1213441 * #1213630 * #1213960 * #1214796 * #1214797 * #1215489 * MSQA-699 Cross-References: * CVE-2023-20897 * CVE-2023-20898 CVSS scores: * CVE-2023-20897 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20897 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20898 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2023-20898 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N Affected Products: * SUSE Manager Client Tools for Debian 11 An update that solves two vulnerabilities, contains one feature and has 10 security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Security issues fixed: * CVE-2023-20897: Fixed DOS in minion return. (bsc#1214796, bsc#1213441) * CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base name. (bsc#1214797, bsc#1193948) * Bugs fixed: * Revert usage of long running REQ channel to prevent possible missing responses on requests and duplicated responses (bsc#1213960, bsc#1213630, bsc#1213257) * Create minion_id with reproducible mtime * Do not recompile SELinux policy module on building. Use precompiled module instead to avoid incompatibility errors. * Fix broken tests to make them running in the testsuite * Fix detection of Salt codename by "salt_version" execution module * Fix inconsistency in reported version by egg-info metadata (bsc#1215489) * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844) * Fix the regression of user.present state when group is unset (bsc#1212855) * Fix utf8 handling in 'pass' renderer and make it more robust * Fix zypper repositories always being reconfigured * Make sure configured user is properly set by Salt (bsc#1210994) * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794) * Ship SELinux policy module version 19 to make it compatible with broader list of Linux distributions ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 11 zypper in -t patch SUSE-Debian-11-CLIENT-TOOLS-x86_64-2023-3881=1 ## Package List: * SUSE Manager Client Tools for Debian 11 (amd64) * venv-salt-minion-3006.0-2.38.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20897.html * https://www.suse.com/security/cve/CVE-2023-20898.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1210994 * https://bugzilla.suse.com/show_bug.cgi?id=1212794 * https://bugzilla.suse.com/show_bug.cgi?id=1212844 * https://bugzilla.suse.com/show_bug.cgi?id=1212855 * https://bugzilla.suse.com/show_bug.cgi?id=1213257 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213630 * https://bugzilla.suse.com/show_bug.cgi?id=1213960 * https://bugzilla.suse.com/show_bug.cgi?id=1214796 * https://bugzilla.suse.com/show_bug.cgi?id=1214797 * https://bugzilla.suse.com/show_bug.cgi?id=1215489 * https://jira.suse.com/browse/MSQA-699 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:30:36 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:30:36 -0000 Subject: SUSE-SU-2023:3880-1: moderate: Security update for SUSE Manager Client Tools Message-ID: <169590423659.32431.11680903004789825783@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-2023:3880-1 Rating: moderate References: * #1210994 * #1212794 * #1212844 * #1212855 * #1213441 * #1213691 * #1215489 * ECO-3319 * MSQA-699 Cross-References: * CVE-2023-20897 CVSS scores: * CVE-2023-20897 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20897 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Manager Client Tools for Debian 10 An update that solves one vulnerability, contains two features and has six security fixes can now be installed. ## Description: This update fixes the following issues: salt: * Security issues fixed: * CVE-2023-20897: Do not fail on bad message pack message (bsc#1213441) * Bugs fixed: * Create minion_id with reproducible mtime * Fix broken tests to make them running in the testsuite * Fix detection of Salt codename by "salt_version" execution module * Fix inconsistency in reported version by egg-info metadata (bsc#1215489) * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844) * Fix the regression of user.present state when group is unset (bsc#1212855) * Fix utf8 handling in 'pass' renderer and make it more robust * Fix zypper repositories always being reconfigured * Make sure configured user is properly set by Salt (bsc#1210994) * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794) scap-security-guide: * Updated to 0.1.69 (jsc#ECO-3319) * Introduce a JSON build manifest (#10761) * Introduce a script to compare ComplianceAsCode versions (#10768) * Introduce CCN profiles for RHEL9 (#10860) * Map rules to components (#10609) * products/anolis23: supports Anolis OS 23 (#10548) * Render components to HTML (#10709) * Store rendered control files (#10656) * Test and use rules to components mapping (#10693) * Use distributed product properties (#10554) * Revert patch that breaks the SLE hardening (bsc#1213691) * Updated to 0.1.68 (jsc#ECO-3319) * Bump OL8 STIG version to V1R6 * Introduce a Product class, make the project work with it * Introduce Fedora and Firefox CaC profiles for common workstation users * OL7 DISA STIG v2r11 update * Publish rendered policy artifacts * Update ANSSI BP-028 to version 2.0 * Updated to 0.1.67 (jsc#ECO-3319) * Add utils/controlrefcheck.py * RHEL 9 STIG Update Q1 2023 * Include warning for NetworkManager keyfiles in RHEL9 * OL7 stig v2r10 update * Bump version of OL8 STIG to V1R5 * Various enhancements to SLE profiles spacecmd: * Version 4.3.23-1 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 10 zypper in -t patch SUSE-Debian-10-CLIENT-TOOLS-x86_64-2023-3880=1 ## Package List: * SUSE Manager Client Tools for Debian 10 (all) * spacecmd-4.3.23-2.54.1 * salt-common-3006.0+ds-1+2.88.1 * scap-security-guide-debian-0.1.69-2.35.1 * salt-minion-3006.0+ds-1+2.88.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20897.html * https://bugzilla.suse.com/show_bug.cgi?id=1210994 * https://bugzilla.suse.com/show_bug.cgi?id=1212794 * https://bugzilla.suse.com/show_bug.cgi?id=1212844 * https://bugzilla.suse.com/show_bug.cgi?id=1212855 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213691 * https://bugzilla.suse.com/show_bug.cgi?id=1215489 * https://jira.suse.com/browse/ECO-3319 * https://jira.suse.com/browse/MSQA-699 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:30:42 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:30:42 -0000 Subject: SUSE-SU-202308:15234-1: moderate: Security update for SUSE Manager Salt Bundle Message-ID: <169590424275.32431.14066113835683362265@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-202308:15234-1 Rating: moderate References: * #1193948 * #1210994 * #1212794 * #1212844 * #1212855 * #1213257 * #1213441 * #1213630 * #1213960 * #1214796 * #1214797 * #1215489 * MSQA-699 Cross-References: * CVE-2023-20897 * CVE-2023-20898 CVSS scores: * CVE-2023-20897 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20897 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20898 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2023-20898 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N Affected Products: * SUSE Manager Client Tools for Ubuntu 22.04 2204 An update that solves two vulnerabilities, contains one feature and has 10 security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Security issues fixed: * CVE-2023-20897: Do not fail on bad message pack message (bsc#1213441) * CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base name. (bsc#1214797, bsc#1193948) * Bugs fixed: * Revert usage of long running REQ channel to prevent possible missing responses on requests and duplicated responses (bsc#1213960, bsc#1213630, bsc#1213257) * Create minion_id with reproducible mtime * Do not recompile SELinux policy module on building. Use precompiled module instead to avoid incompatibility errors. * Fix broken tests to make them running in the testsuite * Fix detection of Salt codename by "salt_version" execution module * Fix inconsistency in reported version by egg-info metadata (bsc#1215489) * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844) * Fix the regression of user.present state when group is unset (bsc#1212855) * Fix utf8 handling in 'pass' renderer and make it more robust * Fix zypper repositories always being reconfigured * Make sure configured user is properly set by Salt (bsc#1210994) * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794) * Ship SELinux policy module version 19 to make it compatible with broader list of Linux distributions ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 22.04 2204 zypper in -t patch suse-ubu224ct-client-tools-202308-15234=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 22.04 2204 (amd64) * venv-salt-minion-3006.0-2.31.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20897.html * https://www.suse.com/security/cve/CVE-2023-20898.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1210994 * https://bugzilla.suse.com/show_bug.cgi?id=1212794 * https://bugzilla.suse.com/show_bug.cgi?id=1212844 * https://bugzilla.suse.com/show_bug.cgi?id=1212855 * https://bugzilla.suse.com/show_bug.cgi?id=1213257 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213630 * https://bugzilla.suse.com/show_bug.cgi?id=1213960 * https://bugzilla.suse.com/show_bug.cgi?id=1214796 * https://bugzilla.suse.com/show_bug.cgi?id=1214797 * https://bugzilla.suse.com/show_bug.cgi?id=1215489 * https://jira.suse.com/browse/MSQA-699 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:30:51 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:30:51 -0000 Subject: SUSE-SU-202309:15233-1: moderate: Security update for SUSE Manager Salt Bundle Message-ID: <169590425102.32431.10734591327185298657@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-202309:15233-1 Rating: moderate References: * #1193948 * #1210994 * #1212794 * #1212844 * #1212855 * #1213257 * #1213441 * #1213630 * #1213960 * #1214796 * #1214797 * #1215489 * MSQA-699 Cross-References: * CVE-2023-20897 * CVE-2023-20898 CVSS scores: * CVE-2023-20897 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20897 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20898 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2023-20898 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N Affected Products: * SUSE Manager Client Tools for Ubuntu 20.04 2004 An update that solves two vulnerabilities, contains one feature and has 10 security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Security issues fixed: * CVE-2023-20897: Do not fail on bad message pack message (bsc#1213441) * CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base name. (bsc#1214797, bsc#1193948) * Bugs fixed: * Revert usage of long running REQ channel to prevent possible missing responses on requests and duplicated responses (bsc#1213960, bsc#1213630, bsc#1213257) * Create minion_id with reproducible mtime * Do not recompile SELinux policy module on building. Use precompiled module instead to avoid incompatibility errors. * Fix broken tests to make them running in the testsuite * Fix detection of Salt codename by "salt_version" execution module * Fix inconsistency in reported version by egg-info metadata (bsc#1215489) * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844) * Fix the regression of user.present state when group is unset (bsc#1212855) * Fix utf8 handling in 'pass' renderer and make it more robust * Fix zypper repositories always being reconfigured * Make sure configured user is properly set by Salt (bsc#1210994) * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794) * Ship SELinux policy module version 19 to make it compatible with broader list of Linux distributions ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 20.04 2004 zypper in -t patch suse-ubu204ct-client-tools-202309-15233=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 20.04 2004 (amd64) * venv-salt-minion-3006.0-2.40.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20897.html * https://www.suse.com/security/cve/CVE-2023-20898.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1210994 * https://bugzilla.suse.com/show_bug.cgi?id=1212794 * https://bugzilla.suse.com/show_bug.cgi?id=1212844 * https://bugzilla.suse.com/show_bug.cgi?id=1212855 * https://bugzilla.suse.com/show_bug.cgi?id=1213257 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213630 * https://bugzilla.suse.com/show_bug.cgi?id=1213960 * https://bugzilla.suse.com/show_bug.cgi?id=1214796 * https://bugzilla.suse.com/show_bug.cgi?id=1214797 * https://bugzilla.suse.com/show_bug.cgi?id=1215489 * https://jira.suse.com/browse/MSQA-699 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:30:57 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:30:57 -0000 Subject: SUSE-SU-2023:3877-1: moderate: Security update for SUSE Manager Salt Bundle Message-ID: <169590425732.32431.15513375033082157625@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-2023:3877-1 Rating: moderate References: * #1193948 * #1210994 * #1212794 * #1212844 * #1212855 * #1213257 * #1213441 * #1213630 * #1213960 * #1214796 * #1214797 * #1215489 * MSQA-699 Cross-References: * CVE-2023-20897 * CVE-2023-20898 CVSS scores: * CVE-2023-20897 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20897 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20898 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2023-20898 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves two vulnerabilities, contains one feature and has 10 security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Security issues fixed: * CVE-2023-20897: Do not fail on bad message pack message (bsc#1213441) * CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base name. (bsc#1214797, bsc#1193948) * Bugs fixed: * Revert usage of long running REQ channel to prevent possible missing responses on requests and duplicated responses (bsc#1213960, bsc#1213630, bsc#1213257) * Create minion_id with reproducible mtime * Do not recompile SELinux policy module on building. Use precompiled module instead to avoid incompatibility errors. * Fix broken tests to make them running in the testsuite * Fix detection of Salt codename by "salt_version" execution module * Fix inconsistency in reported version by egg-info metadata (bsc#1215489) * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844) * Fix the regression of user.present state when group is unset (bsc#1212855) * Fix utf8 handling in 'pass' renderer and make it more robust * Fix zypper repositories always being reconfigured * Make sure configured user is properly set by Salt (bsc#1210994) * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794) * Ship SELinux policy module version 19 to make it compatible with broader list of Linux distributions ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2023-3877=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2023-3877=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-3877=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-3877=1 ## Package List: * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-150000.3.42.1 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * venv-salt-minion-3006.0-150000.3.42.1 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-150000.3.42.1 * SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-150000.3.42.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20897.html * https://www.suse.com/security/cve/CVE-2023-20898.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1210994 * https://bugzilla.suse.com/show_bug.cgi?id=1212794 * https://bugzilla.suse.com/show_bug.cgi?id=1212844 * https://bugzilla.suse.com/show_bug.cgi?id=1212855 * https://bugzilla.suse.com/show_bug.cgi?id=1213257 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213630 * https://bugzilla.suse.com/show_bug.cgi?id=1213960 * https://bugzilla.suse.com/show_bug.cgi?id=1214796 * https://bugzilla.suse.com/show_bug.cgi?id=1214797 * https://bugzilla.suse.com/show_bug.cgi?id=1215489 * https://jira.suse.com/browse/MSQA-699 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:31:03 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:31:03 -0000 Subject: SUSE-SU-2023:3876-1: moderate: Security update for SUSE Manager Salt Bundle Message-ID: <169590426324.32431.13845864028356964919@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-2023:3876-1 Rating: moderate References: * #1193948 * #1210994 * #1212794 * #1212844 * #1212855 * #1213257 * #1213441 * #1213630 * #1213960 * #1214796 * #1214797 * #1215489 * MSQA-699 Cross-References: * CVE-2023-20897 * CVE-2023-20898 CVSS scores: * CVE-2023-20897 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20897 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20898 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2023-20898 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that solves two vulnerabilities, contains one feature and has 10 security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Security issues fixed: * CVE-2023-20897: Do not fail on bad message pack message (bsc#1213441) * CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base name. (bsc#1214797, bsc#1193948) * Bugs fixed: * Revert usage of long running REQ channel to prevent possible missing responses on requests and duplicated responses (bsc#1213960, bsc#1213630, bsc#1213257) * Create minion_id with reproducible mtime * Do not recompile SELinux policy module on building. Use precompiled module instead to avoid incompatibility errors. * Fix broken tests to make them running in the testsuite * Fix detection of Salt codename by "salt_version" execution module * Fix inconsistency in reported version by egg-info metadata (bsc#1215489) * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844) * Fix the regression of user.present state when group is unset (bsc#1212855) * Fix utf8 handling in 'pass' renderer and make it more robust * Fix zypper repositories always being reconfigured * Make sure configured user is properly set by Salt (bsc#1210994) * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794) * Ship SELinux policy module version 19 to make it compatible with broader list of Linux distributions ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2023-3876=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-3.40.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20897.html * https://www.suse.com/security/cve/CVE-2023-20898.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1210994 * https://bugzilla.suse.com/show_bug.cgi?id=1212794 * https://bugzilla.suse.com/show_bug.cgi?id=1212844 * https://bugzilla.suse.com/show_bug.cgi?id=1212855 * https://bugzilla.suse.com/show_bug.cgi?id=1213257 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213630 * https://bugzilla.suse.com/show_bug.cgi?id=1213960 * https://bugzilla.suse.com/show_bug.cgi?id=1214796 * https://bugzilla.suse.com/show_bug.cgi?id=1214797 * https://bugzilla.suse.com/show_bug.cgi?id=1215489 * https://jira.suse.com/browse/MSQA-699 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:31:06 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:31:06 -0000 Subject: SUSE-SU-2023:3875-1: important: Security update for SUSE Manager Client Tools Message-ID: <169590426695.32431.18331821584438709934@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-2023:3875-1 Rating: important References: * #1204501 * #1208046 * #1208270 * #1213691 * #1213880 * ECO-3319 * MSQA-699 * PED-5405 * SLE-24791 Cross-References: * CVE-2022-32149 * CVE-2022-41723 * CVE-2022-46146 * CVE-2023-29409 CVSS scores: * CVE-2022-32149 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-32149 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-46146 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-46146 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-29409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-29409 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 An update that solves four vulnerabilities, contains four features and has one security fix can now be installed. ## Description: This update fixes the following issues: golang-github-lusitaniae-apache_exporter: * Security issues fixed: * CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501) * CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270) * CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046) * Changes and bugs fixed: * Updated to 1.0.0 (jsc#PED-5405) * Improved flag parsing * Added support for custom headers * Changes from 0.13.1 * Fix panic caused by missing flagConfig options * Changes from 0.11.0 (jsc#SLE-24791) * Add TLS support * Switch to logger, please check --log.level and --log.format flags * Changes from 0.10.1 * Bugfix: Reset ProxyBalancer metrics on each scrape to remove stale data * Changes from 0.10.0 * Add Apache Proxy and other metrics * Changes from 0.8.0 * Change commandline flags * Add metrics: Apache version, request duration total * Changes from 0.7.0 * Handle OS TERM signals * Changes from 0.6.0 * Add option to override host name * Added support for Red Hat Enterprise Linux * Added AppArmor profile * Added sandboxing options to systemd service unit * Build using promu * Build with Go 1.19 * Exclude s390 architecture golang-github-prometheus-node_exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. golang-github-QubitProducts-exporter_exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. prometheus-postgres_exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. scap-security-guide: * Updated to 0.1.69 (jsc#ECO-3319) * Introduce a JSON build manifest * Introduce a script to compare ComplianceAsCode versions * Introduce CCN profiles for Red Hat Enterprise Linux 9 * Map rules to components * products/anolis23: supports Anolis OS 23 * Render components to HTML * Store rendered control files * Test and use rules to components mapping * Use distributed product properties * Revert patch that breaks the SLE hardening (bsc#1213691) * Changes from 0.1.68 (jsc#ECO-3319) * Bump OL8 STIG version to V1R6 * Introduce a Product class, make the project work with it * Introduce Fedora and Firefox CaC profiles for common workstation users * OL7 DISA STIG v2r11 update * Publish rendered policy artifacts * Update ANSSI BP-028 to version 2.0 * Changes from 0.1.67 (jsc#ECO-3319) * Add utils/controlrefcheck.py * Red Hat Enterprise Linux 9 STIG Update Q1 2023 * Include warning for NetworkManager keyfiles in Red Hat Enterprise Linux 9 * OL7 stig v2r10 update * Bump version of OL8 STIG to V1R5 * Various enhancements to SLE profiles spacecmd: * Updated to 4.3.23-1 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 zypper in -t patch SUSE-EL-9-CLIENT-TOOLS-2023-3875=1 ## Package List: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (aarch64 ppc64le s390x x86_64) * golang-github-lusitaniae-apache_exporter-debugsource-1.0.0-1.8.1 * prometheus-postgres_exporter-0.10.1-1.9.2 * golang-github-QubitProducts-exporter_exporter-debugsource-0.4.0-1.6.1 * golang-github-QubitProducts-exporter_exporter-debuginfo-0.4.0-1.6.1 * golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1 * golang-github-lusitaniae-apache_exporter-1.0.0-1.8.1 * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (aarch64 ppc64le x86_64) * golang-github-prometheus-node_exporter-debuginfo-1.5.0-1.9.2 * golang-github-prometheus-node_exporter-1.5.0-1.9.2 * golang-github-prometheus-node_exporter-debugsource-1.5.0-1.9.2 * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (noarch) * scap-security-guide-redhat-0.1.69-1.12.2 * spacecmd-4.3.23-1.18.2 ## References: * https://www.suse.com/security/cve/CVE-2022-32149.html * https://www.suse.com/security/cve/CVE-2022-41723.html * https://www.suse.com/security/cve/CVE-2022-46146.html * https://www.suse.com/security/cve/CVE-2023-29409.html * https://bugzilla.suse.com/show_bug.cgi?id=1204501 * https://bugzilla.suse.com/show_bug.cgi?id=1208046 * https://bugzilla.suse.com/show_bug.cgi?id=1208270 * https://bugzilla.suse.com/show_bug.cgi?id=1213691 * https://bugzilla.suse.com/show_bug.cgi?id=1213880 * https://jira.suse.com/browse/ECO-3319 * https://jira.suse.com/browse/MSQA-699 * https://jira.suse.com/browse/PED-5405 * https://jira.suse.com/browse/SLE-24791 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:31:08 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:31:08 -0000 Subject: SUSE-RU-2023:3872-1: moderate: Recommended update for SUSE Manager Client Tools Message-ID: <169590426807.32431.4095262931859008100@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2023:3872-1 Rating: moderate References: * MSQA-699 Affected Products: * SUSE Manager Client Tools for Debian 11 An update that contains one feature can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 4.3.23-1 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 11 zypper in -t patch SUSE-Debian-11-CLIENT-TOOLS-x86_64-2023-3872=1 ## Package List: * SUSE Manager Client Tools for Debian 11 (all) * spacecmd-4.3.23-2.27.1 ## References: * https://jira.suse.com/browse/MSQA-699 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:31:14 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:31:14 -0000 Subject: SUSE-SU-2023:3871-1: moderate: Security update for SUSE Manager Salt Bundle Message-ID: <169590427426.32431.6430021118203945648@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-2023:3871-1 Rating: moderate References: * #1193948 * #1210994 * #1212794 * #1212844 * #1212855 * #1213257 * #1213441 * #1213630 * #1213960 * #1214796 * #1214797 * #1215489 * MSQA-699 Cross-References: * CVE-2023-20897 * CVE-2023-20898 CVSS scores: * CVE-2023-20897 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20897 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20898 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2023-20898 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N Affected Products: * SUSE Manager Client Tools for Debian 10 An update that solves two vulnerabilities, contains one feature and has 10 security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Security issues fixed: * CVE-2023-20897: Do not fail on bad message pack message (bsc#1213441) * CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base name. (bsc#1214797, bsc#1193948) * Bugs fixed: * Revert usage of long running REQ channel to prevent possible missing responses on requests and duplicated responses (bsc#1213960, bsc#1213630, bsc#1213257) * Create minion_id with reproducible mtime * Do not recompile SELinux policy module on building. Use precompiled module instead to avoid incompatibility errors. * Fix broken tests to make them running in the testsuite * Fix detection of Salt codename by "salt_version" execution module * Fix inconsistency in reported version by egg-info metadata (bsc#1215489) * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844) * Fix the regression of user.present state when group is unset (bsc#1212855) * Fix utf8 handling in 'pass' renderer and make it more robust * Fix zypper repositories always being reconfigured * Make sure configured user is properly set by Salt (bsc#1210994) * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794) * Ship SELinux policy module version 19 to make it compatible with broader list of Linux distributions ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 10 zypper in -t patch SUSE-Debian-10-CLIENT-TOOLS-x86_64-2023-3871=1 ## Package List: * SUSE Manager Client Tools for Debian 10 (amd64) * venv-salt-minion-3006.0-2.40.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20897.html * https://www.suse.com/security/cve/CVE-2023-20898.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1210994 * https://bugzilla.suse.com/show_bug.cgi?id=1212794 * https://bugzilla.suse.com/show_bug.cgi?id=1212844 * https://bugzilla.suse.com/show_bug.cgi?id=1212855 * https://bugzilla.suse.com/show_bug.cgi?id=1213257 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213630 * https://bugzilla.suse.com/show_bug.cgi?id=1213960 * https://bugzilla.suse.com/show_bug.cgi?id=1214796 * https://bugzilla.suse.com/show_bug.cgi?id=1214797 * https://bugzilla.suse.com/show_bug.cgi?id=1215489 * https://jira.suse.com/browse/MSQA-699 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:31:16 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:31:16 -0000 Subject: SUSE-SU-202306:15231-1: important: Security update for SUSE Manager Client Tools Message-ID: <169590427657.32431.13243257096734100560@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-202306:15231-1 Rating: important References: * #1208612 * #1213880 * MSQA-679 Cross-References: * CVE-2023-29409 CVSS scores: * CVE-2023-29409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-29409 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Manager Client Tools for Ubuntu 22.04 2204 An update that solves one vulnerability, contains one feature and has one security fix can now be installed. ## Description: This update fixes the following issues: prometheus-apache-exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. spacecmd: * Version 4.3.22-1 * Bypass traditional systems check on older SUMA instances (bsc#1208612) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 22.04 2204 zypper in -t patch suse-ubu224ct-client-tools-202306-15231=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 22.04 2204 (amd64) * prometheus-apache-exporter-0.11.0-1 * SUSE Manager Client Tools for Ubuntu 22.04 2204 (all) * spacecmd-4.3.23-2.24.3 ## References: * https://www.suse.com/security/cve/CVE-2023-29409.html * https://bugzilla.suse.com/show_bug.cgi?id=1208612 * https://bugzilla.suse.com/show_bug.cgi?id=1213880 * https://jira.suse.com/browse/MSQA-679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:31:23 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:31:23 -0000 Subject: SUSE-SU-202309:15230-1: moderate: Security update for SUSE Manager Client Tools Message-ID: <169590428345.32431.10250386802671519514@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-202309:15230-1 Rating: moderate References: * #1193948 * #1210994 * #1212794 * #1212844 * #1212855 * #1213257 * #1213441 * #1213630 * #1213691 * #1213880 * #1213960 * #1214796 * #1214797 * #1215489 * ECO-3319 * MSQA-699 Cross-References: * CVE-2023-20897 * CVE-2023-20898 * CVE-2023-29409 CVSS scores: * CVE-2023-20897 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20897 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20898 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2023-20898 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2023-29409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-29409 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Manager Client Tools for Ubuntu 20.04 2004 An update that solves three vulnerabilities, contains two features and has 11 security fixes can now be installed. ## Description: This update fixes the following issues: prometheus-apache-exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. salt: * CVE-2023-20897: Fixed DOS in minion return. (bsc#1214796, bsc#1213441) * CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base name. (bsc#1214797, bsc#1193948) * Revert usage of long running REQ channel to prevent possible missing responses on requests and dublicated responses (bsc#1213960, bsc#1213630, bsc#1213257) * Make sure configured user is properly set by Salt (bsc#1210994) * Fix broken tests to make them running in the testsuite * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794) * Create minion_id with reproducible mtime * Fix detection of Salt codename by "salt_version" execution module * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844) * Fix the regression of user.present state when group is unset (bsc#1212855) * Fix zypper repositories always being reconfigured * Fix utf8 handling in 'pass' renderer and make it more robust * Security issues fixed: * CVE-2023-20897: Fixed DOS in minion return. (bsc#1214796, bsc#1213441) * CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base name. (bsc#1214797, bsc#1193948) * Bugs fixed: * Create minion_id with reproducible mtime * Fix broken tests to make them running in the testsuite * Fix detection of Salt codename by "salt_version" execution module * Fix inconsistency in reported version by egg-info metadata (bsc#1215489) * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844) * Fix the regression of user.present state when group is unset (bsc#1212855) * Fix utf8 handling in 'pass' renderer and make it more robust * Fix zypper repositories always being reconfigured * Make sure configured user is properly set by Salt (bsc#1210994) * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794) scap-security-guide: * Updated to 0.1.69 (jsc#ECO-3319) * Introduce a JSON build manifest * Introduce a script to compare ComplianceAsCode versions * Introduce CCN profiles for RHEL9 * Map rules to components * products/anolis23: supports Anolis OS 23 * Render components to HTML * Store rendered control files * Test and use rules to components mapping * Use distributed product properties * Revert patch that breaks the SLE hardening (bsc#1213691) * Updated to 0.1.68 (jsc#ECO-3319) * Bump OL8 STIG version to V1R6 * Introduce a Product class, make the project work with it * Introduce Fedora and Firefox CaC profiles for common workstation users * OL7 DISA STIG v2r11 update * Publish rendered policy artifacts * Update ANSSI BP-028 to version 2.0 * Updated to 0.1.67 (jsc#ECO-3319) * Add utils/controlrefcheck.py * RHEL 9 STIG Update Q1 2023 * Include warning for NetworkManager keyfiles in RHEL9 * OL7 stig v2r10 update * Bump version of OL8 STIG to V1R5 * Various enhancements to SLE profiles * Scap-security-guide-UnicodeEncodeError-character-fix.patch: fixed upstream spacecmd: * Version 4.3.23-1 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 20.04 2004 zypper in -t patch suse-ubu204ct-client-tools-202309-15230=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 20.04 2004 (amd64) * prometheus-apache-exporter-0.7.0+ds-1 * SUSE Manager Client Tools for Ubuntu 20.04 2004 (all) * salt-minion-3006.0+ds-1+2.109.1 * salt-common-3006.0+ds-1+2.109.1 * scap-security-guide-ubuntu-0.1.69-2.35.4 * spacecmd-4.3.23-2.69.3 ## References: * https://www.suse.com/security/cve/CVE-2023-20897.html * https://www.suse.com/security/cve/CVE-2023-20898.html * https://www.suse.com/security/cve/CVE-2023-29409.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1210994 * https://bugzilla.suse.com/show_bug.cgi?id=1212794 * https://bugzilla.suse.com/show_bug.cgi?id=1212844 * https://bugzilla.suse.com/show_bug.cgi?id=1212855 * https://bugzilla.suse.com/show_bug.cgi?id=1213257 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213630 * https://bugzilla.suse.com/show_bug.cgi?id=1213691 * https://bugzilla.suse.com/show_bug.cgi?id=1213880 * https://bugzilla.suse.com/show_bug.cgi?id=1213960 * https://bugzilla.suse.com/show_bug.cgi?id=1214796 * https://bugzilla.suse.com/show_bug.cgi?id=1214797 * https://bugzilla.suse.com/show_bug.cgi?id=1215489 * https://jira.suse.com/browse/ECO-3319 * https://jira.suse.com/browse/MSQA-699 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:31:28 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:31:28 -0000 Subject: SUSE-SU-2023:3868-1: important: Security update for SUSE Manager Client Tools Message-ID: <169590428801.32431.15172382574599915241@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-2023:3868-1 Rating: important References: * #1204501 * #1208046 * #1208270 * #1208298 * #1208692 * #1211525 * #1213880 * MSQA-699 * PED-5405 * PED-5406 Cross-References: * CVE-2022-32149 * CVE-2022-41723 * CVE-2022-46146 * CVE-2023-29409 CVSS scores: * CVE-2022-32149 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-32149 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-46146 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-46146 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-29409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-29409 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.2 Module 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.2 Module 4.2 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves four vulnerabilities, contains three features and has three security fixes can now be installed. ## Description: This update fixes the following issues: golang-github-lusitaniae-apache_exporter: * Security issues fixed: * CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501) * CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270) * CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046) * Changes and bugs fixed: * Updated to 1.0.0 (jsc#PED-5405) * Improved flag parsing * Added support for custom headers * Changes from 0.13.1 * Fix panic caused by missing flagConfig options * Added AppArmor profile * Added sandboxing options to systemd service unit * Build using promu * Build with Go 1.19 * Exclude s390 architecture golang-github-prometheus-prometheus: * This update introduces breaking changes. Please, read carefully the provided informations. * Security issues fixed: * CVE-2022-41723: Fix uncontrolled resource consumption by updating Go to version 1.20.1 (bsc#1208298) * Updated to 2.45.0 (jsc#PED-5406): * [FEATURE] API: New limit parameter to limit the number of items returned by `/api/v1/status/tsdb` endpoint * [FEATURE] Config: Add limits to global config * [FEATURE] Consul SD: Added support for `path_prefix` * [FEATURE] Native histograms: Add option to scrape both classic and native histograms. * [FEATURE] Native histograms: Added support for two more arithmetic operators `avg_over_time` and `sum_over_time` * [FEATURE] Promtool: When providing the block id, only one block will be loaded and analyzed * [FEATURE] Remote-write: New Azure ad configuration to support remote writing directly to Azure Monitor workspace * [FEATURE] TSDB: Samples per chunk are now configurable with flag `storage.tsdb.samples-per-chunk`. By default set to its former value 120 * [ENHANCEMENT] Native histograms: bucket size can now be limited to avoid scrape fails * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL sooner * [BUGFIX] Native histograms: ChunkSeries iterator now checks if a new sample can be appended to the open chunk * [BUGFIX] Native histograms: Fix Histogram Appender `Appendable()` segfault * [BUGFIX] Native histograms: Fix setting reset header to gauge histograms in seriesToChunkEncoder * [BUGFIX] TSDB: Tombstone intervals are not modified after Get() call * [BUGFIX] TSDB: Use path/filepath to set the WAL directory. * Changes from 2.44.0: * [FEATURE] Remote-read: Handle native histograms * [FEATURE] Promtool: Health and readiness check of prometheus server in CLI * [FEATURE] PromQL: Add `query_samples_total` metric, the total number of samples loaded by all queries * [ENHANCEMENT] Storage: Optimise buffer used to iterate through samples * [ENHANCEMENT] Scrape: Reduce memory allocations on target labels * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` / `bottomk()` * [ENHANCEMENT] Rules API: Allow filtering by rule name * [ENHANCEMENT] Native Histograms: Various fixes and improvements * [ENHANCEMENT] UI: Search of scraping pools is now case-insensitive * [ENHANCEMENT] TSDB: Add an affirmative log message for successful WAL repair * [BUGFIX] TSDB: Block compaction failed when shutting down * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the write-behind log was deleted * Changes from 2.43.1 * [BUGFIX] Labels: Set() after Del() would be ignored, which broke some relabeling rules * Changes from 2.43.0: * [FEATURE] Promtool: Add HTTP client configuration to query commands * [FEATURE] Scrape: Add `include_scrape_configs` to include scrape configs from different files * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from proxied requests * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read proxies from env variables * [ENHANCEMENT] API: Add support for setting lookback delta per query via the API * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499 if a request is canceled * [ENHANCEMENT] Scrape: Allow exemplars for all metric types * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders size * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot with index that is ahead of WAL * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to be more comprehensible * [ENHANCEMENT] UI: Scope `group by` labels to metric in autocompletion * [BUGFIX] Scrape: Fix `prometheus_target_scrape_pool_target_limit` metric not set before reloading * [BUGFIX] TSDB: Correctly update `prometheus_tsdb_head_chunks_removed_total` and `prometheus_tsdb_head_chunks` metrics when reading WAL * [BUGFIX] TSDB: Use the correct unit (seconds) when recording out-of-order append deltas in the `prometheus_tsdb_sample_ooo_delta` metric * Changes from 2.42.0: This release comes with a new feature coverage for native histograms and breaking changes. If you are trying native histograms already, we recommend you remove the `wal` directory when upgrading. Because the old WAL record for native histograms is not backward compatible in v2.42.0, this will lead to some data loss for the latest data. Additionally, if you scrape "float histograms" or use recording rules on native histograms in v2.42.0 (which writes float histograms), it is a one-way street since older versions do not support float histograms. * [CHANGE] **breaking** TSDB: Changed WAL record format for the experimental native histograms * [FEATURE] Add 'keep_firing_for' field to alerting rules * [FEATURE] Promtool: Add support of selecting timeseries for TSDB dump * [ENHANCEMENT] Agent: Native histogram support. * [ENHANCEMENT] Rules: Support native histograms in recording rules * [ENHANCEMENT] SD: Add container ID as a meta label for pod targets for Kubernetes * [ENHANCEMENT] SD: Add VM size label to azure service discovery * [ENHANCEMENT] Support native histograms in federation * [ENHANCEMENT] TSDB: Add gauge histogram support * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that represents buckets as float64 values * [ENHANCEMENT] UI: Show individual scrape pools on /targets page * Changes from 2.41.0: * [FEATURE] Relabeling: Add keepequal and dropequal relabel actions * [FEATURE] Add support for HTTP proxy headers * [ENHANCEMENT] Reload private certificates when changed on disk * [ENHANCEMENT] Add max_version to specify maximum TLS version in tls_config * [ENHANCEMENT] Add goos and goarch labels to prometheus_build_info * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs * [ENHANCEMENT] SD: Add new metric prometheus_sd_file_watcher_errors_total * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in iterators * [ENHANCEMENT] TSDB: Optimize postings offset table reading * [BUGFIX] Scrape: Validate the metric name, label names, and label values after relabeling * [BUGFIX] Remote Write receiver and rule manager: Fix error handling * Changes from 2.40.7: * [BUGFIX] TSDB: Fix queries involving negative buckets of native histograms * Changes from 2.40.5: * [BUGFIX] TSDB: Fix queries involving native histograms due to improper reset of iterators * Changes from 2.40.3: * [BUGFIX] TSDB: Fix compaction after a deletion is called * Changes from 2.40.2: * [BUGFIX] UI: Fix black-on-black metric name color in dark mode * Changes from 2.40.1: * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit architecture * [BUGFIX] Scrape: Fix accept headers * Changes from 2.40.0: * [FEATURE] Add experimental support for native histograms. Enable with the flag --enable-feature=native-histograms. * [FEATURE] SD: Add service discovery for OVHcloud * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved sorting speed * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds __meta_consul_partition label. Adds partition config in consul_sd_config * [BUGFIX] API: Fix API error codes for /api/v1/labels and /api/v1/series * Changes from 2.39.1: * [BUGFIX] Rules: Fix notifier relabel changing the labels on active alerts * Changes from 2.39.0: * [FEATURE] experimental TSDB: Add support for ingesting out-of-order samples. This is configured via out_of_order_time_window field in the config file; check config file docs for more info * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also respond to a HEAD request on top of existing GET support. * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label. * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label. * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region label. * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory. * [ENHANCEMENT] TSDB: Improve WAL replay timings. * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary data in the memory. * [ENHANCEMENT] TSDB: Allow overlapping blocks by default. \--storage.tsdb.allow-overlapping-blocks now has no effect. * [ENHANCEMENT] UI: Click to copy label-value pair from query result to clipboard. * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak. * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus startup. * [BUGFIX] PromQL: Properly close file descriptor when logging unfinished queries. * [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired. * Changes from 2.38.0: * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint that allows pretty-formatting PromQL expressions. * [FEATURE]: UI: Add support for formatting PromQL expressions in the UI. * [FEATURE]: DNS SD: Support MX records for discovering targets. * [FEATURE]: Templates: Add toTime() template function that allows converting sample timestamps to Go time.Time values * [ENHANCEMENT]: Kubernetes SD: Add __meta_kubernetes_service_port_number meta label indicating the service port number. __meta_kubernetes_pod_container_image meta label indicating the container image. * [ENHANCEMENT]: PromQL: When a query panics, also log the query itself alongside the panic message. * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve the contrast ratio. * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding locks and using atomic types instead. * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature flag, which omits or removes any default HTTP (:80) or HTTPS (:443) ports in the target's scrape address. * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the type="exemplar" label instead of type="unknown" for exemplar records. * [BUGFIX]: TSDB: Fix race condition around allocating series IDs during chunk snapshot loading. golang-github-QubitProducts-exporter_exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. grafana: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. prometheus-blackbox_exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. prometheus-postgres_exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. python-pyvmomi: * Preparing submission to SUSE:SLE-15-SP3:Update as part of ECO PED-3623. spacecmd: * Updated to 4.3.23-1 * Update translation strings supportutils-plugin-susemanager-client: * Updated to 4.3.3-1 * Write configured crypto-policy in supportconfig * Add cloud and Pay-as-you-go checks uyuni-common-libs: * Updated to 4.3.9-1 * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3868=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3868=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2023-3868=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2023-3868=1 * SUSE Manager Proxy 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-3868=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-3868=1 * SUSE Manager Server 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-3868=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-3868=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3 * golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2 * prometheus-postgres_exporter-0.10.1-150000.1.14.3 * golang-github-lusitaniae-apache_exporter-debuginfo-1.0.0-150000.1.17.2 * prometheus-blackbox_exporter-0.24.0-150000.1.23.3 * openSUSE Leap 15.4 (noarch) * supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2 * spacecmd-4.3.23-150000.3.104.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3 * golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2 * prometheus-postgres_exporter-0.10.1-150000.1.14.3 * golang-github-lusitaniae-apache_exporter-debuginfo-1.0.0-150000.1.17.2 * prometheus-blackbox_exporter-0.24.0-150000.1.23.3 * openSUSE Leap 15.5 (noarch) * supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2 * spacecmd-4.3.23-150000.3.104.2 * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3 * golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2 * prometheus-postgres_exporter-0.10.1-150000.1.14.3 * firewalld-prometheus-config-0.1-150000.3.50.3 * golang-github-lusitaniae-apache_exporter-debuginfo-1.0.0-150000.1.17.2 * grafana-9.5.5-150000.1.54.3 * golang-github-prometheus-prometheus-2.45.0-150000.3.50.3 * grafana-debuginfo-9.5.5-150000.1.54.3 * prometheus-blackbox_exporter-0.24.0-150000.1.23.3 * python3-uyuni-common-libs-4.3.9-150000.1.36.2 * SUSE Manager Client Tools for SLE 15 (noarch) * supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2 * python3-pyvmomi-6.7.3-150000.1.6.2 * spacecmd-4.3.23-150000.3.104.2 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3 * prometheus-blackbox_exporter-0.24.0-150000.1.23.3 * SUSE Manager Proxy 4.2 Module 4.2 (aarch64 ppc64le s390x x86_64) * golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3 * golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2 * golang-github-lusitaniae-apache_exporter-debuginfo-1.0.0-150000.1.17.2 * prometheus-blackbox_exporter-0.24.0-150000.1.23.3 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3 * golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2 * golang-github-lusitaniae-apache_exporter-debuginfo-1.0.0-150000.1.17.2 * prometheus-blackbox_exporter-0.24.0-150000.1.23.3 * SUSE Manager Server 4.2 Module 4.2 (aarch64 ppc64le s390x x86_64) * golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3 * golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2 * prometheus-postgres_exporter-0.10.1-150000.1.14.3 * golang-github-lusitaniae-apache_exporter-debuginfo-1.0.0-150000.1.17.2 * SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3 * golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2 * golang-github-lusitaniae-apache_exporter-debuginfo-1.0.0-150000.1.17.2 ## References: * https://www.suse.com/security/cve/CVE-2022-32149.html * https://www.suse.com/security/cve/CVE-2022-41723.html * https://www.suse.com/security/cve/CVE-2022-46146.html * https://www.suse.com/security/cve/CVE-2023-29409.html * https://bugzilla.suse.com/show_bug.cgi?id=1204501 * https://bugzilla.suse.com/show_bug.cgi?id=1208046 * https://bugzilla.suse.com/show_bug.cgi?id=1208270 * https://bugzilla.suse.com/show_bug.cgi?id=1208298 * https://bugzilla.suse.com/show_bug.cgi?id=1208692 * https://bugzilla.suse.com/show_bug.cgi?id=1211525 * https://bugzilla.suse.com/show_bug.cgi?id=1213880 * https://jira.suse.com/browse/MSQA-699 * https://jira.suse.com/browse/PED-5405 * https://jira.suse.com/browse/PED-5406 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:31:31 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:31:31 -0000 Subject: SUSE-SU-2023:3867-1: important: Security update for SUSE Manager Client Tools Message-ID: <169590429178.32431.15137633414996341758@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-2023:3867-1 Rating: important References: * #1204501 * #1208046 * #1208270 * #1208298 * #1208692 * #1211525 * #1213880 * MSQA-699 * PED-5405 * PED-5406 Cross-References: * CVE-2022-32149 * CVE-2022-41723 * CVE-2022-46146 * CVE-2023-29409 CVSS scores: * CVE-2022-32149 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-32149 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-46146 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-46146 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-29409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-29409 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that solves four vulnerabilities, contains three features and has three security fixes can now be installed. ## Description: This update fixes the following issues: golang-github-lusitaniae-apache_exporter: * Security issues fixed: * CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501) * CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270) * CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046) * Changes and bugs fixed: * Updated to 1.0.0 (jsc#PED-5405) * Improved flag parsing * Added support for custom headers * Changes from 0.13.1 * Fix panic caused by missing flagConfig options * Added AppArmor profile * Added sandboxing options to systemd service unit * Build using promu * Build with Go 1.19 * Exclude s390 architecture golang-github-prometheus-alertmanager: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. golang-github-prometheus-node_exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. golang-github-prometheus-prometheus: * This update introduces breaking changes. Please, read carefully the provided informations. * Security issues fixed: * CVE-2022-41723: Fix uncontrolled resource consumption by updating Go to version 1.20.1 (bsc#1208298) * Updated to 2.45.0 (jsc#PED-5406): * [FEATURE] API: New limit parameter to limit the number of items returned by `/api/v1/status/tsdb` endpoint * [FEATURE] Config: Add limits to global config * [FEATURE] Consul SD: Added support for `path_prefix` * [FEATURE] Native histograms: Add option to scrape both classic and native histograms. * [FEATURE] Native histograms: Added support for two more arithmetic operators `avg_over_time` and `sum_over_time` * [FEATURE] Promtool: When providing the block id, only one block will be loaded and analyzed * [FEATURE] Remote-write: New Azure ad configuration to support remote writing directly to Azure Monitor workspace * [FEATURE] TSDB: Samples per chunk are now configurable with flag `storage.tsdb.samples-per-chunk`. By default set to its former value 120 * [ENHANCEMENT] Native histograms: bucket size can now be limited to avoid scrape fails * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL sooner * [BUGFIX] Native histograms: ChunkSeries iterator now checks if a new sample can be appended to the open chunk * [BUGFIX] Native histograms: Fix Histogram Appender `Appendable()` segfault * [BUGFIX] Native histograms: Fix setting reset header to gauge histograms in seriesToChunkEncoder * [BUGFIX] TSDB: Tombstone intervals are not modified after Get() call * [BUGFIX] TSDB: Use path/filepath to set the WAL directory. * Changes from 2.44.0: * [FEATURE] Remote-read: Handle native histograms * [FEATURE] Promtool: Health and readiness check of prometheus server in CLI * [FEATURE] PromQL: Add `query_samples_total` metric, the total number of samples loaded by all queries * [ENHANCEMENT] Storage: Optimise buffer used to iterate through samples * [ENHANCEMENT] Scrape: Reduce memory allocations on target labels * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` / `bottomk()` * [ENHANCEMENT] Rules API: Allow filtering by rule name * [ENHANCEMENT] Native Histograms: Various fixes and improvements * [ENHANCEMENT] UI: Search of scraping pools is now case-insensitive * [ENHANCEMENT] TSDB: Add an affirmative log message for successful WAL repair * [BUGFIX] TSDB: Block compaction failed when shutting down * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the write-behind log was deleted * Changes from 2.43.1 * [BUGFIX] Labels: Set() after Del() would be ignored, which broke some relabeling rules * Changes from 2.43.0: * [FEATURE] Promtool: Add HTTP client configuration to query commands * [FEATURE] Scrape: Add `include_scrape_configs` to include scrape configs from different files * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from proxied requests * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read proxies from env variables * [ENHANCEMENT] API: Add support for setting lookback delta per query via the API * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499 if a request is canceled * [ENHANCEMENT] Scrape: Allow exemplars for all metric types * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders size * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot with index that is ahead of WAL * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to be more comprehensible * [ENHANCEMENT] UI: Scope `group by` labels to metric in autocompletion * [BUGFIX] Scrape: Fix `prometheus_target_scrape_pool_target_limit` metric not set before reloading * [BUGFIX] TSDB: Correctly update `prometheus_tsdb_head_chunks_removed_total` and `prometheus_tsdb_head_chunks` metrics when reading WAL * [BUGFIX] TSDB: Use the correct unit (seconds) when recording out-of-order append deltas in the `prometheus_tsdb_sample_ooo_delta` metric * Changes from 2.42.0: This release comes with a new feature coverage for native histograms and breaking changes. If you are trying native histograms already, we recommend you remove the `wal` directory when upgrading. Because the old WAL record for native histograms is not backward compatible in v2.42.0, this will lead to some data loss for the latest data. Additionally, if you scrape "float histograms" or use recording rules on native histograms in v2.42.0 (which writes float histograms), it is a one-way street since older versions do not support float histograms. * [CHANGE] **breaking** TSDB: Changed WAL record format for the experimental native histograms * [FEATURE] Add 'keep_firing_for' field to alerting rules * [FEATURE] Promtool: Add support of selecting timeseries for TSDB dump * [ENHANCEMENT] Agent: Native histogram support. * [ENHANCEMENT] Rules: Support native histograms in recording rules * [ENHANCEMENT] SD: Add container ID as a meta label for pod targets for Kubernetes * [ENHANCEMENT] SD: Add VM size label to azure service discovery * [ENHANCEMENT] Support native histograms in federation * [ENHANCEMENT] TSDB: Add gauge histogram support * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that represents buckets as float64 values * [ENHANCEMENT] UI: Show individual scrape pools on /targets page * Changes from 2.41.0: * [FEATURE] Relabeling: Add keepequal and dropequal relabel actions * [FEATURE] Add support for HTTP proxy headers * [ENHANCEMENT] Reload private certificates when changed on disk * [ENHANCEMENT] Add max_version to specify maximum TLS version in tls_config * [ENHANCEMENT] Add goos and goarch labels to prometheus_build_info * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs * [ENHANCEMENT] SD: Add new metric prometheus_sd_file_watcher_errors_total * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in iterators * [ENHANCEMENT] TSDB: Optimize postings offset table reading * [BUGFIX] Scrape: Validate the metric name, label names, and label values after relabeling * [BUGFIX] Remote Write receiver and rule manager: Fix error handling * Changes from 2.40.7: * [BUGFIX] TSDB: Fix queries involving negative buckets of native histograms * Changes from 2.40.5: * [BUGFIX] TSDB: Fix queries involving native histograms due to improper reset of iterators * Changes from 2.40.3: * [BUGFIX] TSDB: Fix compaction after a deletion is called * Changes from 2.40.2: * [BUGFIX] UI: Fix black-on-black metric name color in dark mode * Changes from 2.40.1: * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit architecture * [BUGFIX] Scrape: Fix accept headers * Changes from 2.40.0: * [FEATURE] Add experimental support for native histograms. Enable with the flag --enable-feature=native-histograms. * [FEATURE] SD: Add service discovery for OVHcloud * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved sorting speed * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds __meta_consul_partition label. Adds partition config in consul_sd_config * [BUGFIX] API: Fix API error codes for /api/v1/labels and /api/v1/series * Changes from 2.39.1: * [BUGFIX] Rules: Fix notifier relabel changing the labels on active alerts * Changes from 2.39.0: * [FEATURE] experimental TSDB: Add support for ingesting out-of-order samples. This is configured via out_of_order_time_window field in the config file; check config file docs for more info * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also respond to a HEAD request on top of existing GET support. * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label. * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label. * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region label. * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory. * [ENHANCEMENT] TSDB: Improve WAL replay timings. * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary data in the memory. * [ENHANCEMENT] TSDB: Allow overlapping blocks by default. \--storage.tsdb.allow-overlapping-blocks now has no effect. * [ENHANCEMENT] UI: Click to copy label-value pair from query result to clipboard. * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak. * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus startup. * [BUGFIX] PromQL: Properly close file descriptor when logging unfinished queries. * [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired. * Changes from 2.38.0: * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint that allows pretty-formatting PromQL expressions. * [FEATURE]: UI: Add support for formatting PromQL expressions in the UI. * [FEATURE]: DNS SD: Support MX records for discovering targets. * [FEATURE]: Templates: Add toTime() template function that allows converting sample timestamps to Go time.Time values * [ENHANCEMENT]: Kubernetes SD: Add __meta_kubernetes_service_port_number meta label indicating the service port number. __meta_kubernetes_pod_container_image meta label indicating the container image. * [ENHANCEMENT]: PromQL: When a query panics, also log the query itself alongside the panic message. * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve the contrast ratio. * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding locks and using atomic types instead. * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature flag, which omits or removes any default HTTP (:80) or HTTPS (:443) ports in the target's scrape address. * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the type="exemplar" label instead of type="unknown" for exemplar records. * [BUGFIX]: TSDB: Fix race condition around allocating series IDs during chunk snapshot loading. golang-github-QubitProducts-exporter_exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. grafana: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. prometheus-blackbox_exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. prometheus-postgres_exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. spacecmd: * Updated to 4.3.23-1 * Update translation strings supportutils-plugin-susemanager-client: * Updated to 4.3.3-1 * Write configured crypto-policy in supportconfig * Add cloud and Pay-as-you-go checks uyuni-common-libs: * Updated to 4.3.9-1 * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2023-3867=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3867=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3867=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3867=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64) * golang-github-QubitProducts-exporter_exporter-0.4.0-1.12.2 * prometheus-blackbox_exporter-debuginfo-0.24.0-1.23.2 * golang-github-prometheus-alertmanager-0.23.0-1.21.2 * golang-github-prometheus-node_exporter-1.5.0-1.27.2 * prometheus-postgres_exporter-0.10.1-1.14.3 * golang-github-prometheus-prometheus-2.45.0-1.47.3 * golang-github-lusitaniae-apache_exporter-1.0.0-1.18.2 * prometheus-blackbox_exporter-0.24.0-1.23.2 * python2-uyuni-common-libs-4.3.9-1.36.3 * grafana-9.5.5-1.54.3 * SUSE Manager Client Tools for SLE 12 (noarch) * spacecmd-4.3.23-38.127.3 * supportutils-plugin-susemanager-client-4.3.3-6.27.2 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.5.0-1.27.2 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.5.0-1.27.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.5.0-1.27.2 ## References: * https://www.suse.com/security/cve/CVE-2022-32149.html * https://www.suse.com/security/cve/CVE-2022-41723.html * https://www.suse.com/security/cve/CVE-2022-46146.html * https://www.suse.com/security/cve/CVE-2023-29409.html * https://bugzilla.suse.com/show_bug.cgi?id=1204501 * https://bugzilla.suse.com/show_bug.cgi?id=1208046 * https://bugzilla.suse.com/show_bug.cgi?id=1208270 * https://bugzilla.suse.com/show_bug.cgi?id=1208298 * https://bugzilla.suse.com/show_bug.cgi?id=1208692 * https://bugzilla.suse.com/show_bug.cgi?id=1211525 * https://bugzilla.suse.com/show_bug.cgi?id=1213880 * https://jira.suse.com/browse/MSQA-699 * https://jira.suse.com/browse/PED-5405 * https://jira.suse.com/browse/PED-5406 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:31:52 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:31:52 -0000 Subject: SUSE-SU-2023:3864-1: moderate: Security update for salt Message-ID: <169590431253.32431.9111681847416492818@smelt2.prg2.suse.org> # Security update for salt Announcement ID: SUSE-SU-2023:3864-1 Rating: moderate References: * #1193948 * #1210994 * #1212794 * #1212844 * #1212855 * #1213257 * #1213441 * #1213630 * #1213960 * #1214796 * #1214797 * #1215489 Cross-References: * CVE-2023-20897 * CVE-2023-20898 CVSS scores: * CVE-2023-20897 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20897 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-20898 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2023-20898 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves two vulnerabilities and has 10 security fixes can now be installed. ## Description: This update for salt fixes the following issues: Security issues fixed: * CVE-2023-20897: Fixed DOS in minion return. (bsc#1214796, bsc#1213441) * CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base name. (bsc#1214797, bsc#1193948) Bugs fixed: * Create minion_id with reproducible mtime * Fix broken tests to make them running in the testsuite * Fix detection of Salt codename by "salt_version" execution module * Fix inconsistency in reported version by egg-info metadata (bsc#1215489) * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844) * Fix the regression of user.present state when group is unset (bsc#1212855) * Fix utf8 handling in 'pass' renderer and make it more robust * Fix zypper repositories always being reconfigured * Make sure configured user is properly set by Salt (bsc#1210994) * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794) * Revert usage of long running REQ channel to prevent possible missing responses on requests and duplicated responses (bsc#1213960, bsc#1213630, bsc#1213257) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3864=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3864=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3864=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3864=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3864=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3864=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3864=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3864=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3864=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3864=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3864=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * python3-salt-3006.0-150300.53.60.1 * salt-standalone-formulas-configuration-3006.0-150300.53.60.1 * salt-doc-3006.0-150300.53.60.1 * salt-minion-3006.0-150300.53.60.1 * salt-master-3006.0-150300.53.60.1 * salt-proxy-3006.0-150300.53.60.1 * salt-syndic-3006.0-150300.53.60.1 * salt-ssh-3006.0-150300.53.60.1 * salt-3006.0-150300.53.60.1 * salt-api-3006.0-150300.53.60.1 * salt-cloud-3006.0-150300.53.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * salt-bash-completion-3006.0-150300.53.60.1 * salt-zsh-completion-3006.0-150300.53.60.1 * salt-fish-completion-3006.0-150300.53.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * python3-salt-3006.0-150300.53.60.1 * salt-standalone-formulas-configuration-3006.0-150300.53.60.1 * salt-doc-3006.0-150300.53.60.1 * salt-minion-3006.0-150300.53.60.1 * salt-master-3006.0-150300.53.60.1 * salt-proxy-3006.0-150300.53.60.1 * salt-syndic-3006.0-150300.53.60.1 * salt-ssh-3006.0-150300.53.60.1 * salt-3006.0-150300.53.60.1 * salt-api-3006.0-150300.53.60.1 * salt-cloud-3006.0-150300.53.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * salt-bash-completion-3006.0-150300.53.60.1 * salt-zsh-completion-3006.0-150300.53.60.1 * salt-fish-completion-3006.0-150300.53.60.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * python3-salt-3006.0-150300.53.60.1 * salt-transactional-update-3006.0-150300.53.60.1 * salt-standalone-formulas-configuration-3006.0-150300.53.60.1 * salt-doc-3006.0-150300.53.60.1 * salt-minion-3006.0-150300.53.60.1 * salt-master-3006.0-150300.53.60.1 * salt-proxy-3006.0-150300.53.60.1 * salt-syndic-3006.0-150300.53.60.1 * salt-ssh-3006.0-150300.53.60.1 * salt-3006.0-150300.53.60.1 * salt-api-3006.0-150300.53.60.1 * salt-cloud-3006.0-150300.53.60.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * salt-bash-completion-3006.0-150300.53.60.1 * salt-zsh-completion-3006.0-150300.53.60.1 * salt-fish-completion-3006.0-150300.53.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * python3-salt-3006.0-150300.53.60.1 * salt-standalone-formulas-configuration-3006.0-150300.53.60.1 * salt-doc-3006.0-150300.53.60.1 * salt-minion-3006.0-150300.53.60.1 * salt-master-3006.0-150300.53.60.1 * salt-proxy-3006.0-150300.53.60.1 * salt-syndic-3006.0-150300.53.60.1 * salt-ssh-3006.0-150300.53.60.1 * salt-3006.0-150300.53.60.1 * salt-api-3006.0-150300.53.60.1 * salt-cloud-3006.0-150300.53.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * salt-bash-completion-3006.0-150300.53.60.1 * salt-zsh-completion-3006.0-150300.53.60.1 * salt-fish-completion-3006.0-150300.53.60.1 * SUSE Manager Proxy 4.2 (x86_64) * python3-salt-3006.0-150300.53.60.1 * salt-standalone-formulas-configuration-3006.0-150300.53.60.1 * salt-doc-3006.0-150300.53.60.1 * salt-minion-3006.0-150300.53.60.1 * salt-master-3006.0-150300.53.60.1 * salt-proxy-3006.0-150300.53.60.1 * salt-syndic-3006.0-150300.53.60.1 * salt-ssh-3006.0-150300.53.60.1 * salt-3006.0-150300.53.60.1 * salt-api-3006.0-150300.53.60.1 * salt-cloud-3006.0-150300.53.60.1 * SUSE Manager Proxy 4.2 (noarch) * salt-bash-completion-3006.0-150300.53.60.1 * salt-zsh-completion-3006.0-150300.53.60.1 * salt-fish-completion-3006.0-150300.53.60.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * python3-salt-3006.0-150300.53.60.1 * salt-standalone-formulas-configuration-3006.0-150300.53.60.1 * salt-doc-3006.0-150300.53.60.1 * salt-minion-3006.0-150300.53.60.1 * salt-master-3006.0-150300.53.60.1 * salt-proxy-3006.0-150300.53.60.1 * salt-syndic-3006.0-150300.53.60.1 * salt-ssh-3006.0-150300.53.60.1 * salt-3006.0-150300.53.60.1 * salt-api-3006.0-150300.53.60.1 * salt-cloud-3006.0-150300.53.60.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * salt-bash-completion-3006.0-150300.53.60.1 * salt-zsh-completion-3006.0-150300.53.60.1 * salt-fish-completion-3006.0-150300.53.60.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * python3-salt-3006.0-150300.53.60.1 * salt-standalone-formulas-configuration-3006.0-150300.53.60.1 * salt-doc-3006.0-150300.53.60.1 * salt-minion-3006.0-150300.53.60.1 * salt-master-3006.0-150300.53.60.1 * salt-proxy-3006.0-150300.53.60.1 * salt-syndic-3006.0-150300.53.60.1 * salt-ssh-3006.0-150300.53.60.1 * salt-3006.0-150300.53.60.1 * salt-api-3006.0-150300.53.60.1 * salt-cloud-3006.0-150300.53.60.1 * SUSE Manager Server 4.2 (noarch) * salt-bash-completion-3006.0-150300.53.60.1 * salt-zsh-completion-3006.0-150300.53.60.1 * salt-fish-completion-3006.0-150300.53.60.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * python3-salt-3006.0-150300.53.60.1 * salt-transactional-update-3006.0-150300.53.60.1 * salt-standalone-formulas-configuration-3006.0-150300.53.60.1 * salt-doc-3006.0-150300.53.60.1 * salt-minion-3006.0-150300.53.60.1 * salt-master-3006.0-150300.53.60.1 * salt-proxy-3006.0-150300.53.60.1 * salt-syndic-3006.0-150300.53.60.1 * salt-ssh-3006.0-150300.53.60.1 * salt-3006.0-150300.53.60.1 * salt-api-3006.0-150300.53.60.1 * salt-cloud-3006.0-150300.53.60.1 * SUSE Enterprise Storage 7.1 (noarch) * salt-bash-completion-3006.0-150300.53.60.1 * salt-zsh-completion-3006.0-150300.53.60.1 * salt-fish-completion-3006.0-150300.53.60.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * salt-3006.0-150300.53.60.1 * salt-minion-3006.0-150300.53.60.1 * python3-salt-3006.0-150300.53.60.1 * salt-transactional-update-3006.0-150300.53.60.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * salt-3006.0-150300.53.60.1 * salt-minion-3006.0-150300.53.60.1 * python3-salt-3006.0-150300.53.60.1 * salt-transactional-update-3006.0-150300.53.60.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * salt-3006.0-150300.53.60.1 * salt-minion-3006.0-150300.53.60.1 * python3-salt-3006.0-150300.53.60.1 * salt-transactional-update-3006.0-150300.53.60.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20897.html * https://www.suse.com/security/cve/CVE-2023-20898.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1210994 * https://bugzilla.suse.com/show_bug.cgi?id=1212794 * https://bugzilla.suse.com/show_bug.cgi?id=1212844 * https://bugzilla.suse.com/show_bug.cgi?id=1212855 * https://bugzilla.suse.com/show_bug.cgi?id=1213257 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213630 * https://bugzilla.suse.com/show_bug.cgi?id=1213960 * https://bugzilla.suse.com/show_bug.cgi?id=1214796 * https://bugzilla.suse.com/show_bug.cgi?id=1214797 * https://bugzilla.suse.com/show_bug.cgi?id=1215489 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 12:32:21 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 12:32:21 -0000 Subject: SUSE-SU-2023:3861-1: important: Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server Message-ID: <169590434125.32431.18125456460813191158@smelt2.prg2.suse.org> # Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server Announcement ID: SUSE-SU-2023:3861-1 Rating: important References: * #1207330 * #1207330 * #1208692 * #1208692 * #1208692 * #1210935 * #1210935 * #1211525 * #1211525 * #1211525 * #1211874 * #1211874 * #1211884 * #1211884 * #1212246 * #1212246 * #1212730 * #1212730 * #1212814 * #1212814 * #1212827 * #1212827 * #1212856 * #1212856 * #1212856 * #1212943 * #1212943 * #1212943 * #1213009 * #1213009 * #1213077 * #1213077 * #1213288 * #1213288 * #1213445 * #1213445 * #1213445 * #1213675 * #1213675 * #1213675 * #1213716 * #1213716 * #1213880 * #1213880 * #1214002 * #1214002 * #1214121 * #1214121 * #1214124 * #1214124 * #1214187 * #1214187 * #1214266 * #1214266 * #1214280 * #1214280 * #1214889 * #1214889 * #1214982 * #1214982 * #1215352 * #1215352 * #1215362 * #1215362 * #1215373 * #1215373 * #1215413 * #1215413 * #1215497 * #1215497 * #1215756 * #1215756 * MSQA-699 * MSQA-699 * MSQA-699 * SUMA-158 * SUMA-158 * SUMA-280 * SUMA-280 Cross-References: * CVE-2023-29409 * CVE-2023-29409 CVSS scores: * CVE-2023-29409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-29409 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves two vulnerabilities, contains seven features and has 70 security fixes can now be installed. ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.3 ### Description: This update fixes the following issues: spacecmd: * Version 4.3.23-1 * Update translation strings spacewalk-backend: * Version 4.3.23-1 * Use a constant to get the product name in python code rather than reading rhn.conf (bsc#1212943) * Add key import debug logging to reposync (bsc#1213675) * Add hint about missing auth header for Pay-as-you-go instances (bsc#1213445) * rhn-ssl-dbstore read CA from STDIN (bsc#1212856) * Implement new RHUI support in reposync spacewalk-certs-tools: * Version 4.3.19-1 * Support EC Cryptography with mgr-ssl-cert-setup * mgr-ssl-cert-setup: store CA certificate in database (bsc#1212856) spacewalk-web: * Version 4.3.33-1 * Update the messages after syncing the products * Fix issue that prevented to delete credentials * Add warning message in login UI for Pay-as-you-go with SCC credentials and no forward registration. * Hide SSH info for `localhost` in Pay-as-you-go section * Integrate @formatjs/intl as a replacement for t() * Fix link interpolation in message maps supportutils-plugin-susemanager-client: * Version 4.3.3-1 * Write configured crypto-policy in supportconfig * Add cloud and Pay-as-you-go checks supportutils-plugin-susemanager-proxy: * Version 4.3.3-1 * Write configured crypto-policy in supportconfig uyuni-common-libs: * Version 4.3.9-1 * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692) How to apply this update: 1. Log in as root user to the SUSE Manager Proxy or Retail Branch Server. 2. Stop the proxy service: `spacewalk-proxy stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-proxy start` ## Security update for SUSE Manager Server 4.3 ### Description: This update fixes the following issues: billing-data-service: * Version 0.3-1 * Add required dependencies to package and service * Change billing api datastructure * Require csp-billing-adapter service cobbler: * Fix EFI PXE boot regression (bsc#1214124) * Fix isolinux.cfg generation in "cobbler buildiso" (bsc#1207330) hub-xmlrpc-api: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. grafana-formula: * Version 0.9.0 * Add SUSE Linux Enterprise 15 Service Pack 5 to the supported versions (bsc#1215497) image-sync-formula: * Update to version 0.1.1692188980.9aa0455 * Fix boot image version compare to use numeric instead of string (bsc#1214002) * Add support to filter individual image versions in whitelist * Delete cache files that are no longer needed inter-server-sync: * Version 0.3.0 * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) * Require at least Go 1.19 for building due to CVE-2023-29409 * Require at least Go 1.18 for building Red Hat packages prometheus-exporters-formula: * Version 1.3.0 * Add support for Apache exporter >= 1.0.0 (bsc#1214266) prometheus-postgres_exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. saltboot-formula: * Update to version 0.1.1692188980.9aa0455 * Add pillar based saltboot redeploy and repartitioning (jsc#SUMA-158) spacecmd: * Version 4.3.23-1 * Update translation strings spacewalk-admin: * Version 4.3.13-1 * Integrate instance-flavor-check to detect if the instance is Pay-as-you-go * Add checks for csp-billing-adapter in case of a Pay-as-you-go instance spacewalk-backend: * Version 4.3.23-1 * Use a constant to get the product name in python code rather than reading rhn.conf (bsc#1212943) * Add key import debug logging to reposync (bsc#1213675) * Add hint about missing auth header for Pay-as-you-go instances (bsc#1213445) * rhn-ssl-dbstore read CA from STDIN (bsc#1212856) * Implement new RHUI support in reposync spacewalk-certs-tools: * Version 4.3.19-1 * Support EC Cryptography with mgr-ssl-cert-setup * mgr-ssl-cert-setup: store CA certificate in database (bsc#1212856) spacewalk-config: * Version 4.3.11-1 * Allow calling instance-flavor-check via sudo spacewalk-java: * version 4.3.66-1 * Fix RHUI support for RHEL 7 clients (bsc#1215756) * version 4.3.65-1 * Combine the PAYG credentials and the repository paths when they collide (bsc#1215413) * version 4.3.64-1 * Fix token issue with cloned deb channels (bsc#1214982) * Fix PAYG credentials extraction for SLES 12 clients (bsc#1215352) * Improved detection of the best authentication for accessing a repository in case of PAYG credentials (bsc#1215362) * Do not warn about missing Client Tools Channel subscription in a PAYG environment * version 4.3.63-1 * Fix X-Instance-Identifier header when doing a product refresh at Cloud RMT Server (bsc#1214889) * Version 4.3.62-1 * Add environment build/promote date to CLM API output (jsc#SUMA-280) * Call mgr-libmod with its absolute path * Introduce new API to update the products page metadata * Extract additional authentication information needed for Pay-as-you-go * Fix handling of null credentials in RMT credentials check * Integrate instance-flavor-check to detect if the instance is Pay-as-you-go * Add rule to count only servers with SUSE Manager Tools as managed clients * Create flag to disable update status (bsc#1212730) * Fix syntax error in sql query for source package search * Catch exceptions and log a message when mailer setup failed (bsc#1213009) * Fix logging of libraries using apache-commons-logging * Invalidate Pay-as-you-go client credentials after repeated connection failure (bsc#1213445) * Restrict product migrations for Pay-as-you-go * Add warning message in login UI for Pay-as-you-go with SCC credentials and no forward registration * Restrict cloning channels under different product channels for Pay-as-you-go * Avoid sending data to SCC about Pay-as-you-go instances * Add saltboot redeploy and repartition based on pillars (jsc#SUMA-158) * Add system pillar API access {get|set}Pillar * Consider the venv-salt-minion package update as Salt update to prevent backtraces on upgrading Salt with itself (bsc#1211884) * Fix processing of pkg.purged results (bsc#1213288) * Fix Null Pointer Exception in auth endpoint when an empty body is provided * Do not ignore scheduling error in Taskomatic * Add compliance checks when running as Pay-as-you-go * Add RHUI support to Pay-as-you-go connection feature * Fix Debian Packages file generation (bsc#1213716) * Fix action executor to prevent blocking Taskomatic for actions that are already finished (bsc#1214121) * Fix detection in case RHEL-based products (bsc#1214280) * Improve error message when instance-flavor-check tool is not installed * Fix auto product refresh in case of SUSE Manager Pay-as-you-go Server * Optimize org channel accessibility query (bsc#1211874) * Check csp billing adapter status spacewalk-setup: * Version 4.3.18-1 * Do not rely on rpm runtime status, rather check rhn.conf if is configured (bsc#1210935) * Remove storing CA in DB directly as it is now part of mgr-ssl-cert-setup (bsc#1212856) spacewalk-web: * Version 4.3.33-1 * Update the messages after syncing the products * Fix issue that prevented to delete credentials * Add warning message in login UI for Pay-as-you-go with SCC credentials and no forward registration. * Hide SSH info for `localhost` in Pay-as-you-go section * Integrate @formatjs/intl as a replacement for t() * Fix link interpolation in message maps supportutils-plugin-susemanager: * Version 4.3.9-1 * Add cloud and Pay-as-you-go checks * Write configured crypto-policy in supportconfig susemanager: * Version 4.3.31-1 * Require LTSS channel for SUSE Manager Proxy 4.2 (bsc#1214187) susemanager-docs_en: * Added a note for SUSE Linux Enterprise Micro clients only having Node and Blackbox exporter for monitoring available, in the Administration Guide (bsc#1212246) * Added a warning about channel synchronization failure because of invalidated credentials in Connect Pay-as-you-go instance section of the Installation and Upgrade Guide * Added a workflow describing channel removal to the Common Workflows Guide * Added background information on Ansible playbooks in the Ansible chapter in Administration Guide (bsc#1213077) * Added Best practices and image pillars files to Retail Guide * Added detailed information about all supported SUSE Linux Enterprise Micro versions * Added Saltboot redeployment subchapter in the Retail Guide * Changed filename for configuring Tomcat memory usage in Specialized Guides (bsc#1212814) * Fixed Ubuntu channel names in Ubuntu chapter of the Client Configuration Guide (bsc#1212827) * Improved Red Hat Update Infrastructure documentation (bsc#1215373) * Listed supported key types for SSL certificates in Import SSL Certificates section of the Administation Guide * Minimal memory requirement is now 16 GB for a SUSE Manager Server installation * Removed the step calling rhn-ssl-dbstore from the SSL setup as it is now integrated into mgr-ssl-cert-setup in Administration Guide * Replaced plain text with dedicated attribute for AutoYaST * Typo correction for cobbler buildiso command in Client Configuration Guide * Updated Ansible chapter in Administration Guide for clarity (bsc#1213077) susemanager-schema: * Version 4.3.20-1 * Add new credentials type RHUI * Store the Pay-as-you-go products susemanager-sls: * Version 4.3.35-1 * Integrate instance-flavor-check to detect if the instance is Pay-as-you-go * Do not disable salt-minion on salt-ssh managed clients * Keep original traditional stack tools for RHEL7 RHUI connection * Include automatic migration from Salt 3000 to Salt Bundle in highstate * Use recurse stratedy to merge formula pillar with existing pillars * Mask Uyuni roster module password on logs uyuni-common-libs: * Version 4.3.9-1 * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692) How to apply this update: 1. Log in as root user to the SUSE Manager Server. 2. Stop the Spacewalk service: `spacewalk-service stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-service start` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-3861=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-3861=1 ## Package List: * SUSE Manager Proxy 4.3 Module 4.3 (noarch) * spacewalk-base-minimal-config-4.3.33-150400.3.27.16 * python3-spacewalk-certs-tools-4.3.19-150400.3.18.13 * supportutils-plugin-susemanager-client-4.3.3-150400.3.3.13 * spacewalk-backend-4.3.23-150400.3.27.19 * spacecmd-4.3.23-150400.3.24.13 * spacewalk-certs-tools-4.3.19-150400.3.18.13 * spacewalk-base-minimal-4.3.33-150400.3.27.16 * supportutils-plugin-susemanager-proxy-4.3.3-150400.3.3.13 * SUSE Manager Proxy 4.3 Module 4.3 (x86_64) * python3-uyuni-common-libs-4.3.9-150400.3.15.13 * SUSE Manager Server 4.3 Module 4.3 (noarch) * susemanager-docs_en-pdf-4.3-150400.9.38.2 * susemanager-schema-4.3.20-150400.3.24.17 * spacewalk-base-4.3.33-150400.3.27.16 * spacewalk-config-4.3.11-150400.3.9.13 * prometheus-exporters-formula-1.3.0-150400.3.3.13 * spacewalk-backend-applet-4.3.23-150400.3.27.19 * spacewalk-base-minimal-config-4.3.33-150400.3.27.16 * billing-data-service-0.3-150400.10.6.13 * spacewalk-java-lib-4.3.66-150400.3.60.1 * python3-spacewalk-certs-tools-4.3.19-150400.3.18.13 * spacewalk-backend-package-push-server-4.3.23-150400.3.27.19 * spacewalk-backend-xml-export-libs-4.3.23-150400.3.27.19 * spacewalk-backend-config-files-common-4.3.23-150400.3.27.19 * spacewalk-java-config-4.3.66-150400.3.60.1 * susemanager-docs_en-4.3-150400.9.38.2 * susemanager-schema-utility-4.3.20-150400.3.24.17 * saltboot-formula-0.1.1692188980.9aa0455-150400.3.12.13 * cobbler-3.3.3-150400.5.33.13 * spacewalk-backend-iss-4.3.23-150400.3.27.19 * spacewalk-base-minimal-4.3.33-150400.3.27.16 * image-sync-formula-0.1.1692188980.9aa0455-150400.3.15.13 * spacewalk-admin-4.3.13-150400.3.12.13 * spacewalk-java-4.3.66-150400.3.60.1 * spacewalk-backend-4.3.23-150400.3.27.19 * spacecmd-4.3.23-150400.3.24.13 * spacewalk-certs-tools-4.3.19-150400.3.18.13 * spacewalk-taskomatic-4.3.66-150400.3.60.1 * spacewalk-backend-iss-export-4.3.23-150400.3.27.19 * supportutils-plugin-susemanager-4.3.9-150400.3.15.13 * spacewalk-setup-4.3.18-150400.3.27.13 * uyuni-config-modules-4.3.35-150400.3.31.12 * spacewalk-backend-server-4.3.23-150400.3.27.19 * spacewalk-backend-app-4.3.23-150400.3.27.19 * spacewalk-backend-tools-4.3.23-150400.3.27.19 * spacewalk-html-4.3.33-150400.3.27.16 * susemanager-sls-4.3.35-150400.3.31.12 * grafana-formula-0.9.0-150400.3.12.1 * spacewalk-backend-sql-postgresql-4.3.23-150400.3.27.19 * spacewalk-backend-config-files-tool-4.3.23-150400.3.27.19 * spacewalk-backend-xmlrpc-4.3.23-150400.3.27.19 * spacewalk-backend-config-files-4.3.23-150400.3.27.19 * spacewalk-java-postgresql-4.3.66-150400.3.60.1 * spacewalk-backend-sql-4.3.23-150400.3.27.19 * SUSE Manager Server 4.3 Module 4.3 (ppc64le s390x x86_64) * inter-server-sync-0.3.0-150400.3.21.15 * hub-xmlrpc-api-0.7-150400.5.9.15 * python3-uyuni-common-libs-4.3.9-150400.3.15.13 * susemanager-4.3.31-150400.3.36.12 * prometheus-postgres_exporter-0.10.1-150400.3.6.17 * inter-server-sync-debuginfo-0.3.0-150400.3.21.15 * susemanager-tools-4.3.31-150400.3.36.12 ## References: * https://www.suse.com/security/cve/CVE-2023-29409.html * https://www.suse.com/security/cve/CVE-2023-29409.html * https://bugzilla.suse.com/show_bug.cgi?id=1207330 * https://bugzilla.suse.com/show_bug.cgi?id=1207330 * https://bugzilla.suse.com/show_bug.cgi?id=1208692 * https://bugzilla.suse.com/show_bug.cgi?id=1208692 * https://bugzilla.suse.com/show_bug.cgi?id=1208692 * https://bugzilla.suse.com/show_bug.cgi?id=1210935 * https://bugzilla.suse.com/show_bug.cgi?id=1210935 * https://bugzilla.suse.com/show_bug.cgi?id=1211525 * https://bugzilla.suse.com/show_bug.cgi?id=1211525 * https://bugzilla.suse.com/show_bug.cgi?id=1211525 * https://bugzilla.suse.com/show_bug.cgi?id=1211874 * https://bugzilla.suse.com/show_bug.cgi?id=1211874 * https://bugzilla.suse.com/show_bug.cgi?id=1211884 * https://bugzilla.suse.com/show_bug.cgi?id=1211884 * https://bugzilla.suse.com/show_bug.cgi?id=1212246 * https://bugzilla.suse.com/show_bug.cgi?id=1212246 * https://bugzilla.suse.com/show_bug.cgi?id=1212730 * https://bugzilla.suse.com/show_bug.cgi?id=1212730 * https://bugzilla.suse.com/show_bug.cgi?id=1212814 * https://bugzilla.suse.com/show_bug.cgi?id=1212814 * https://bugzilla.suse.com/show_bug.cgi?id=1212827 * https://bugzilla.suse.com/show_bug.cgi?id=1212827 * https://bugzilla.suse.com/show_bug.cgi?id=1212856 * https://bugzilla.suse.com/show_bug.cgi?id=1212856 * https://bugzilla.suse.com/show_bug.cgi?id=1212856 * https://bugzilla.suse.com/show_bug.cgi?id=1212943 * https://bugzilla.suse.com/show_bug.cgi?id=1212943 * https://bugzilla.suse.com/show_bug.cgi?id=1212943 * https://bugzilla.suse.com/show_bug.cgi?id=1213009 * https://bugzilla.suse.com/show_bug.cgi?id=1213009 * https://bugzilla.suse.com/show_bug.cgi?id=1213077 * https://bugzilla.suse.com/show_bug.cgi?id=1213077 * https://bugzilla.suse.com/show_bug.cgi?id=1213288 * https://bugzilla.suse.com/show_bug.cgi?id=1213288 * https://bugzilla.suse.com/show_bug.cgi?id=1213445 * https://bugzilla.suse.com/show_bug.cgi?id=1213445 * https://bugzilla.suse.com/show_bug.cgi?id=1213445 * https://bugzilla.suse.com/show_bug.cgi?id=1213675 * https://bugzilla.suse.com/show_bug.cgi?id=1213675 * https://bugzilla.suse.com/show_bug.cgi?id=1213675 * https://bugzilla.suse.com/show_bug.cgi?id=1213716 * https://bugzilla.suse.com/show_bug.cgi?id=1213716 * https://bugzilla.suse.com/show_bug.cgi?id=1213880 * https://bugzilla.suse.com/show_bug.cgi?id=1213880 * https://bugzilla.suse.com/show_bug.cgi?id=1214002 * https://bugzilla.suse.com/show_bug.cgi?id=1214002 * https://bugzilla.suse.com/show_bug.cgi?id=1214121 * https://bugzilla.suse.com/show_bug.cgi?id=1214121 * https://bugzilla.suse.com/show_bug.cgi?id=1214124 * https://bugzilla.suse.com/show_bug.cgi?id=1214124 * https://bugzilla.suse.com/show_bug.cgi?id=1214187 * https://bugzilla.suse.com/show_bug.cgi?id=1214187 * https://bugzilla.suse.com/show_bug.cgi?id=1214266 * https://bugzilla.suse.com/show_bug.cgi?id=1214266 * https://bugzilla.suse.com/show_bug.cgi?id=1214280 * https://bugzilla.suse.com/show_bug.cgi?id=1214280 * https://bugzilla.suse.com/show_bug.cgi?id=1214889 * https://bugzilla.suse.com/show_bug.cgi?id=1214889 * https://bugzilla.suse.com/show_bug.cgi?id=1214982 * https://bugzilla.suse.com/show_bug.cgi?id=1214982 * https://bugzilla.suse.com/show_bug.cgi?id=1215352 * https://bugzilla.suse.com/show_bug.cgi?id=1215352 * https://bugzilla.suse.com/show_bug.cgi?id=1215362 * https://bugzilla.suse.com/show_bug.cgi?id=1215362 * https://bugzilla.suse.com/show_bug.cgi?id=1215373 * https://bugzilla.suse.com/show_bug.cgi?id=1215373 * https://bugzilla.suse.com/show_bug.cgi?id=1215413 * https://bugzilla.suse.com/show_bug.cgi?id=1215413 * https://bugzilla.suse.com/show_bug.cgi?id=1215497 * https://bugzilla.suse.com/show_bug.cgi?id=1215497 * https://bugzilla.suse.com/show_bug.cgi?id=1215756 * https://bugzilla.suse.com/show_bug.cgi?id=1215756 * https://jira.suse.com/browse/MSQA-699 * https://jira.suse.com/browse/MSQA-699 * https://jira.suse.com/browse/MSQA-699 * https://jira.suse.com/browse/SUMA-158 * https://jira.suse.com/browse/SUMA-158 * https://jira.suse.com/browse/SUMA-280 * https://jira.suse.com/browse/SUMA-280 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Thu Sep 28 16:30:03 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Thu, 28 Sep 2023 16:30:03 -0000 Subject: SUSE-SU-2023:3888-1: important: Security update for Golang Prometheus Message-ID: <169591860314.19361.1616143443119846890@smelt2.prg2.suse.org> # Security update for Golang Prometheus Announcement ID: SUSE-SU-2023:3888-1 Rating: important References: * #1213880 Cross-References: * CVE-2023-29409 CVSS scores: * CVE-2023-29409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-29409 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.2 Module 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for Golang Prometheus fixes the following issues: golang-github-prometheus-alertmanager: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. golang-github-prometheus-node_exporter: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3888=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-3888=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2023-3888=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2023-3888=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3888=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3888=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3888=1 * SUSE Manager Proxy 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-3888=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-3888=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3888=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3888=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3888=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3888=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3888=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3888=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3888=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3888=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3888=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3888=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3888=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3888=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3888=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3888=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.23.0-150100.4.16.2 * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.23.0-150100.4.16.2 * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.23.0-150100.4.16.2 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.23.0-150100.4.16.2 * SUSE Manager Proxy 4.2 Module 4.2 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.23.0-150100.4.16.2 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.23.0-150100.4.16.2 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Manager Proxy 4.2 (x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Manager Retail Branch Server 4.2 (x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 * SUSE CaaS Platform 4.0 (x86_64) * golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 ## References: * https://www.suse.com/security/cve/CVE-2023-29409.html * https://bugzilla.suse.com/show_bug.cgi?id=1213880 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Fri Sep 29 12:30:05 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Fri, 29 Sep 2023 12:30:05 -0000 Subject: SUSE-RU-2023:3900-1: moderate: Maintenance update for SUSE Manager 4.3.8 Release Notes Message-ID: <169599060504.732.1094635745732512763@smelt2.prg2.suse.org> # Maintenance update for SUSE Manager 4.3.8 Release Notes Announcement ID: SUSE-RU-2023:3900-1 Rating: moderate References: * MSQA-703 * MSQA-703 Affected Products: * openSUSE Leap 15.4 * SUSE Manager Server 4.3 An update that contains two features can now be installed. ## Description: This update fixes the following issues: release-notes-susemanager: * Update to SUSE Manager 4.3.8.1 * Fix the link issue for PAYG guide ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2023-3900=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2023-3900=1 ## Package List: * SUSE Manager Server 4.3 (noarch) * release-notes-susemanager-4.3.8.1-150400.3.80.2 * openSUSE Leap 15.4 (noarch) * release-notes-susemanager-4.3.8.1-150400.3.80.2 ## References: * https://jira.suse.com/browse/MSQA-703 * https://jira.suse.com/browse/MSQA-703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From maint-coord at suse.de Fri Sep 29 16:30:05 2023 From: maint-coord at suse.de (maint-coord at suse.de) Date: Fri, 29 Sep 2023 16:30:05 -0000 Subject: SUSE-SU-2023:3903-1: important: Security update for xen Message-ID: <169600500564.13239.5724664569890800477@smelt2.prg2.suse.org> # Security update for xen Announcement ID: SUSE-SU-2023:3903-1 Rating: important References: * #1213616 * #1215145 * #1215474 Cross-References: * CVE-2023-20588 * CVE-2023-20593 * CVE-2023-34322 CVSS scores: * CVE-2023-20588 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2023-20588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-20593 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-20593 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-34322 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves three vulnerabilities can now be installed. ## Description: This update for xen fixes the following issues: * CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474). * CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145). * CVE-2023-20593: Fixed AMD Zenbleed (XSA-433) (bsc#1213616). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3903=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3903=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3903=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3903=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3903=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3903=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3903=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3903=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3903=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3903=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-3903=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (x86_64) * xen-debugsource-4.14.6_04-150300.3.54.1 * xen-libs-debuginfo-4.14.6_04-150300.3.54.1 * xen-libs-4.14.6_04-150300.3.54.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * xen-debugsource-4.14.6_04-150300.3.54.1 * xen-libs-debuginfo-4.14.6_04-150300.3.54.1 * xen-libs-4.14.6_04-150300.3.54.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * xen-debugsource-4.14.6_04-150300.3.54.1 * xen-libs-debuginfo-4.14.6_04-150300.3.54.1 * xen-libs-4.14.6_04-150300.3.54.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * xen-tools-4.14.6_04-150300.3.54.1 * xen-libs-debuginfo-4.14.6_04-150300.3.54.1 * xen-libs-4.14.6_04-150300.3.54.1 * xen-4.14.6_04-150300.3.54.1 * xen-tools-domU-4.14.6_04-150300.3.54.1 * xen-devel-4.14.6_04-150300.3.54.1 * xen-tools-domU-debuginfo-4.14.6_04-150300.3.54.1 * xen-debugsource-4.14.6_04-150300.3.54.1 * xen-tools-debuginfo-4.14.6_04-150300.3.54.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * xen-tools-4.14.6_04-150300.3.54.1 * xen-libs-debuginfo-4.14.6_04-150300.3.54.1 * xen-libs-4.14.6_04-150300.3.54.1 * xen-4.14.6_04-150300.3.54.1 * xen-tools-domU-4.14.6_04-150300.3.54.1 * xen-devel-4.14.6_04-150300.3.54.1 * xen-tools-domU-debuginfo-4.14.6_04-150300.3.54.1 * xen-debugsource-4.14.6_04-150300.3.54.1 * xen-tools-debuginfo-4.14.6_04-150300.3.54.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * xen-tools-4.14.6_04-150300.3.54.1 * xen-libs-debuginfo-4.14.6_04-150300.3.54.1 * xen-libs-4.14.6_04-150300.3.54.1 * xen-4.14.6_04-150300.3.54.1 * xen-tools-domU-4.14.6_04-150300.3.54.1 * xen-devel-4.14.6_04-150300.3.54.1 * xen-tools-domU-debuginfo-4.14.6_04-150300.3.54.1 * xen-debugsource-4.14.6_04-150300.3.54.1 * xen-tools-debuginfo-4.14.6_04-150300.3.54.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * xen-tools-4.14.6_04-150300.3.54.1 * xen-libs-debuginfo-4.14.6_04-150300.3.54.1 * xen-libs-4.14.6_04-150300.3.54.1 * xen-4.14.6_04-150300.3.54.1 * xen-tools-domU-4.14.6_04-150300.3.54.1 * xen-devel-4.14.6_04-150300.3.54.1 * xen-tools-domU-debuginfo-4.14.6_04-150300.3.54.1 * xen-debugsource-4.14.6_04-150300.3.54.1 * xen-tools-debuginfo-4.14.6_04-150300.3.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1 * SUSE Manager Proxy 4.2 (x86_64) * xen-tools-4.14.6_04-150300.3.54.1 * xen-libs-debuginfo-4.14.6_04-150300.3.54.1 * xen-libs-4.14.6_04-150300.3.54.1 * xen-4.14.6_04-150300.3.54.1 * xen-tools-domU-4.14.6_04-150300.3.54.1 * xen-devel-4.14.6_04-150300.3.54.1 * xen-tools-domU-debuginfo-4.14.6_04-150300.3.54.1 * xen-debugsource-4.14.6_04-150300.3.54.1 * xen-tools-debuginfo-4.14.6_04-150300.3.54.1 * SUSE Manager Proxy 4.2 (noarch) * xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * xen-tools-4.14.6_04-150300.3.54.1 * xen-libs-debuginfo-4.14.6_04-150300.3.54.1 * xen-libs-4.14.6_04-150300.3.54.1 * xen-4.14.6_04-150300.3.54.1 * xen-tools-domU-4.14.6_04-150300.3.54.1 * xen-devel-4.14.6_04-150300.3.54.1 * xen-tools-domU-debuginfo-4.14.6_04-150300.3.54.1 * xen-debugsource-4.14.6_04-150300.3.54.1 * xen-tools-debuginfo-4.14.6_04-150300.3.54.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1 * SUSE Manager Server 4.2 (x86_64) * xen-tools-4.14.6_04-150300.3.54.1 * xen-libs-debuginfo-4.14.6_04-150300.3.54.1 * xen-libs-4.14.6_04-150300.3.54.1 * xen-4.14.6_04-150300.3.54.1 * xen-tools-domU-4.14.6_04-150300.3.54.1 * xen-devel-4.14.6_04-150300.3.54.1 * xen-tools-domU-debuginfo-4.14.6_04-150300.3.54.1 * xen-debugsource-4.14.6_04-150300.3.54.1 * xen-tools-debuginfo-4.14.6_04-150300.3.54.1 * SUSE Manager Server 4.2 (noarch) * xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1 * SUSE Enterprise Storage 7.1 (x86_64) * xen-tools-4.14.6_04-150300.3.54.1 * xen-libs-debuginfo-4.14.6_04-150300.3.54.1 * xen-libs-4.14.6_04-150300.3.54.1 * xen-4.14.6_04-150300.3.54.1 * xen-tools-domU-4.14.6_04-150300.3.54.1 * xen-devel-4.14.6_04-150300.3.54.1 * xen-tools-domU-debuginfo-4.14.6_04-150300.3.54.1 * xen-debugsource-4.14.6_04-150300.3.54.1 * xen-tools-debuginfo-4.14.6_04-150300.3.54.1 * SUSE Enterprise Storage 7.1 (noarch) * xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1 ## References: * https://www.suse.com/security/cve/CVE-2023-20588.html * https://www.suse.com/security/cve/CVE-2023-20593.html * https://www.suse.com/security/cve/CVE-2023-34322.html * https://bugzilla.suse.com/show_bug.cgi?id=1213616 * https://bugzilla.suse.com/show_bug.cgi?id=1215145 * https://bugzilla.suse.com/show_bug.cgi?id=1215474 -------------- next part -------------- An HTML attachment was scrubbed... URL: