From null at suse.de Thu Aug 1 08:30:14 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 01 Aug 2024 08:30:14 -0000 Subject: SUSE-FU-2024:2688-1: important: Feature update for Public Cloud Message-ID: <172250101405.12919.7270621196353405748@smelt2.prg2.suse.org> # Feature update for Public Cloud Announcement ID: SUSE-FU-2024:2688-1 Rating: important References: * bsc#1222075 * bsc#1227067 * bsc#1227106 * bsc#1227711 * jsc#SMO-345 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that contains one feature and has four fixes can now be installed. ## Description: This update for Public Cloud fixes the following issues: * Added Public Cloud packages and dependencies to SLE Micro 5.5 to enhance SUSE Manager 5.0 (jsc#SMO-345): * google-guest-agent (no source changes) * google-guest-configs (no source changes) * google-guest-oslogin (no source changes) * google-osconfig-agent (no source changes) * growpart-rootgrow (no source changes) * python-azure-agent (includes bug fixes see below) * python-cssselect (no source changes) * python-instance-billing-flavor-check (no source changes) * python-toml (no source changes) * python3-lxml (inlcudes a bug fix, see below) * python-azure-agent received the following fixes: * Use the proper option to force btrfs to overwrite a file system on the resource disk if one already exists (bsc#1227711) * Set Provisioning.Agent parameter to 'cloud-init' in SLE Micro 5.5 and newer (bsc#1227106) * Do not package `waagent2.0` in Python 3 builds * Do not require `wicked` in non-SUSE build environments * Apply python3 interpreter patch in non SLE build environments (bcs#1227067) * python3-lxml also received the following fix: * Fixed compatibility with system libexpat in tests (bnc#1222075) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2688=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2688=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-2688=1 openSUSE-SLE-15.5-2024-2688=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-2688=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2688=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2688=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2688=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2688=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2688=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2688=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2688=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2688=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-2688=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2688=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2688=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2688=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2688=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2688=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2688=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2688=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2688=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2688=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2688=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2688=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2688=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2688=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2688=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2688=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2688=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2688=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2688=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2688=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2688=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2688=1 ## Package List: * openSUSE Leap 15.3 (noarch) * python2-toml-0.10.2-150300.3.2.6 * python3-toml-0.10.2-150300.3.2.6 * openSUSE Leap 15.4 (noarch) * google-guest-configs-20240307.00-150400.13.11.6 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * python3-lxml-devel-4.9.1-150500.3.4.3 * python3-lxml-debuginfo-4.9.1-150500.3.4.3 * python3-lxml-debugsource-4.9.1-150500.3.4.3 * python3-lxml-4.9.1-150500.3.4.3 * openSUSE Leap 15.5 (noarch) * python-azure-agent-2.9.1.1-150400.3.41.1 * growpart-rootgrow-1.0.7-150400.1.14.7 * python3-lxml-doc-4.9.1-150500.3.4.3 * python3-toml-0.10.2-150300.3.2.6 * google-guest-configs-20240307.00-150400.13.11.6 * python3-cssselect-1.0.3-150400.3.7.4 * python-azure-agent-test-2.9.1.1-150400.3.41.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-debugsource-20240311.00-150400.1.45.7 * google-guest-oslogin-20240311.00-150400.1.45.7 * google-osconfig-agent-20240320.00-150400.1.35.7 * google-guest-agent-20240314.00-150400.1.48.7 * google-guest-oslogin-debuginfo-20240311.00-150400.1.45.7 * openSUSE Leap Micro 5.5 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * openSUSE Leap Micro 5.5 (aarch64 x86_64) * python3-lxml-debuginfo-4.9.1-150500.3.4.3 * python3-lxml-debugsource-4.9.1-150500.3.4.3 * python3-lxml-4.9.1-150500.3.4.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python3-lxml-debugsource-4.9.1-150500.3.4.3 * google-guest-oslogin-debugsource-20240311.00-150400.1.45.7 * google-guest-oslogin-20240311.00-150400.1.45.7 * google-osconfig-agent-20240320.00-150400.1.35.7 * python3-lxml-devel-4.9.1-150500.3.4.3 * google-guest-agent-20240314.00-150400.1.48.7 * python3-lxml-debuginfo-4.9.1-150500.3.4.3 * python3-lxml-4.9.1-150500.3.4.3 * python-instance-billing-flavor-check-0.0.6-150400.1.11.7 * google-guest-oslogin-debuginfo-20240311.00-150400.1.45.7 * openSUSE Leap 15.6 (noarch) * python-azure-agent-2.9.1.1-150400.3.41.1 * growpart-rootgrow-1.0.7-150400.1.14.7 * python-azure-agent-config-hpc-2.9.1.1-150400.3.41.1 * python-azure-agent-config-micro-2.9.1.1-150400.3.41.1 * python3-lxml-doc-4.9.1-150500.3.4.3 * python-azure-agent-config-default-2.9.1.1-150400.3.41.1 * google-guest-configs-20240307.00-150400.13.11.6 * python-azure-agent-config-server-2.9.1.1-150400.3.41.1 * python-azure-agent-test-2.9.1.1-150400.3.41.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-0.0.6-150400.1.11.7 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-0.0.6-150400.1.11.7 * SUSE Linux Enterprise Micro 5.3 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-0.0.6-150400.1.11.7 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-0.0.6-150400.1.11.7 * SUSE Linux Enterprise Micro 5.4 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * python3-lxml-debugsource-4.9.1-150500.3.4.3 * google-guest-oslogin-20240311.00-150400.1.45.7 * google-osconfig-agent-20240320.00-150400.1.35.7 * google-guest-agent-20240314.00-150400.1.48.7 * python3-lxml-debuginfo-4.9.1-150500.3.4.3 * python3-lxml-4.9.1-150500.3.4.3 * python-instance-billing-flavor-check-0.0.6-150400.1.11.7 * SUSE Linux Enterprise Micro 5.5 (noarch) * python-azure-agent-2.9.1.1-150400.3.41.1 * growpart-rootgrow-1.0.7-150400.1.14.7 * python3-toml-0.10.2-150300.3.2.6 * google-guest-configs-20240307.00-150400.13.11.6 * python3-cssselect-1.0.3-150400.3.7.4 * Basesystem Module 15-SP5 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * python3-toml-0.10.2-150300.3.2.6 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-lxml-devel-4.9.1-150500.3.4.3 * python3-lxml-debuginfo-4.9.1-150500.3.4.3 * python3-lxml-debugsource-4.9.1-150500.3.4.3 * python3-lxml-4.9.1-150500.3.4.3 * Basesystem Module 15-SP6 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * python3-toml-0.10.2-150300.3.2.6 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python3-lxml-devel-4.9.1-150500.3.4.3 * python3-lxml-debuginfo-4.9.1-150500.3.4.3 * python3-lxml-debugsource-4.9.1-150500.3.4.3 * python3-lxml-4.9.1-150500.3.4.3 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-debugsource-20240311.00-150400.1.45.7 * google-guest-oslogin-20240311.00-150400.1.45.7 * google-osconfig-agent-20240320.00-150400.1.35.7 * google-guest-agent-20240314.00-150400.1.48.7 * python-instance-billing-flavor-check-0.0.6-150400.1.11.7 * google-guest-oslogin-debuginfo-20240311.00-150400.1.45.7 * Public Cloud Module 15-SP2 (noarch) * python-azure-agent-2.9.1.1-150400.3.41.1 * growpart-rootgrow-1.0.7-150400.1.14.7 * python-azure-agent-config-hpc-2.9.1.1-150400.3.41.1 * python-azure-agent-config-micro-2.9.1.1-150400.3.41.1 * python-azure-agent-config-default-2.9.1.1-150400.3.41.1 * python-azure-agent-config-server-2.9.1.1-150400.3.41.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-debugsource-20240311.00-150400.1.45.7 * google-guest-oslogin-20240311.00-150400.1.45.7 * google-osconfig-agent-20240320.00-150400.1.35.7 * google-guest-agent-20240314.00-150400.1.48.7 * python-instance-billing-flavor-check-0.0.6-150400.1.11.7 * google-guest-oslogin-debuginfo-20240311.00-150400.1.45.7 * Public Cloud Module 15-SP3 (noarch) * python-azure-agent-2.9.1.1-150400.3.41.1 * growpart-rootgrow-1.0.7-150400.1.14.7 * python-azure-agent-config-hpc-2.9.1.1-150400.3.41.1 * python-azure-agent-config-micro-2.9.1.1-150400.3.41.1 * python-azure-agent-config-default-2.9.1.1-150400.3.41.1 * python-azure-agent-config-server-2.9.1.1-150400.3.41.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-debugsource-20240311.00-150400.1.45.7 * google-guest-oslogin-20240311.00-150400.1.45.7 * google-osconfig-agent-20240320.00-150400.1.35.7 * google-guest-agent-20240314.00-150400.1.48.7 * python-instance-billing-flavor-check-0.0.6-150400.1.11.7 * google-guest-oslogin-debuginfo-20240311.00-150400.1.45.7 * Public Cloud Module 15-SP4 (noarch) * python-azure-agent-2.9.1.1-150400.3.41.1 * growpart-rootgrow-1.0.7-150400.1.14.7 * python-azure-agent-config-hpc-2.9.1.1-150400.3.41.1 * python-azure-agent-config-micro-2.9.1.1-150400.3.41.1 * python-azure-agent-config-default-2.9.1.1-150400.3.41.1 * google-guest-configs-20240307.00-150400.13.11.6 * python-azure-agent-config-server-2.9.1.1-150400.3.41.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-debugsource-20240311.00-150400.1.45.7 * google-guest-oslogin-20240311.00-150400.1.45.7 * google-osconfig-agent-20240320.00-150400.1.35.7 * google-guest-agent-20240314.00-150400.1.48.7 * python-instance-billing-flavor-check-0.0.6-150400.1.11.7 * google-guest-oslogin-debuginfo-20240311.00-150400.1.45.7 * Public Cloud Module 15-SP5 (noarch) * python-azure-agent-2.9.1.1-150400.3.41.1 * growpart-rootgrow-1.0.7-150400.1.14.7 * python-azure-agent-config-hpc-2.9.1.1-150400.3.41.1 * python-azure-agent-config-micro-2.9.1.1-150400.3.41.1 * python-azure-agent-config-default-2.9.1.1-150400.3.41.1 * google-guest-configs-20240307.00-150400.13.11.6 * python-azure-agent-config-server-2.9.1.1-150400.3.41.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-debugsource-20240311.00-150400.1.45.7 * google-guest-oslogin-20240311.00-150400.1.45.7 * google-osconfig-agent-20240320.00-150400.1.35.7 * google-guest-agent-20240314.00-150400.1.48.7 * python-instance-billing-flavor-check-0.0.6-150400.1.11.7 * google-guest-oslogin-debuginfo-20240311.00-150400.1.45.7 * Public Cloud Module 15-SP6 (noarch) * python-azure-agent-2.9.1.1-150400.3.41.1 * growpart-rootgrow-1.0.7-150400.1.14.7 * python-azure-agent-config-hpc-2.9.1.1-150400.3.41.1 * python-azure-agent-config-micro-2.9.1.1-150400.3.41.1 * python-azure-agent-config-default-2.9.1.1-150400.3.41.1 * google-guest-configs-20240307.00-150400.13.11.6 * python-azure-agent-config-server-2.9.1.1-150400.3.41.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * python3-toml-0.10.2-150300.3.2.6 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * python3-toml-0.10.2-150300.3.2.6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * python3-toml-0.10.2-150300.3.2.6 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * python3-toml-0.10.2-150300.3.2.6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * python3-toml-0.10.2-150300.3.2.6 * SUSE Manager Proxy 4.3 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * python3-toml-0.10.2-150300.3.2.6 * SUSE Manager Retail Branch Server 4.3 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * python3-toml-0.10.2-150300.3.2.6 * SUSE Manager Server 4.3 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * python3-toml-0.10.2-150300.3.2.6 * SUSE Enterprise Storage 7.1 (noarch) * python3-cssselect-1.0.3-150400.3.7.4 * SUSE Linux Enterprise Micro 5.2 (noarch) * python-azure-agent-2.9.1.1-150400.3.41.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * python-azure-agent-2.9.1.1-150400.3.41.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222075 * https://bugzilla.suse.com/show_bug.cgi?id=1227067 * https://bugzilla.suse.com/show_bug.cgi?id=1227106 * https://bugzilla.suse.com/show_bug.cgi?id=1227711 * https://jira.suse.com/browse/SMO-345 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Aug 1 08:30:22 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 01 Aug 2024 08:30:22 -0000 Subject: SUSE-SU-2024:1880-2: moderate: Security update for python-requests Message-ID: <172250102235.12919.17259044050457277487@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2024:1880-2 Rating: moderate References: * bsc#1224788 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-requests fixes the following issues: * CVE-2024-35195: Fixed cert verification regardless of changes to the value of `verify` (bsc#1224788). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1880=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1880=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1880=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1880=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1880=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1880=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1880=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1880=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1880=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1880=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1880=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1880=1 ## Package List: * SUSE Manager Proxy 4.3 (noarch) * python3-requests-2.25.1-150300.3.9.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * python3-requests-2.25.1-150300.3.9.1 * SUSE Manager Server 4.3 (noarch) * python3-requests-2.25.1-150300.3.9.1 * SUSE Enterprise Storage 7.1 (noarch) * python3-requests-2.25.1-150300.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * python3-requests-2.25.1-150300.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-requests-2.25.1-150300.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-requests-2.25.1-150300.3.9.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python3-requests-2.25.1-150300.3.9.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * python3-requests-2.25.1-150300.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python3-requests-2.25.1-150300.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * python3-requests-2.25.1-150300.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-requests-2.25.1-150300.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1224788 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Aug 1 16:30:27 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 01 Aug 2024 16:30:27 -0000 Subject: SUSE-RU-2024:2697-1: moderate: Recommended update for dracut Message-ID: <172252982769.29083.8368829514486369439@smelt2.prg2.suse.org> # Recommended update for dracut Announcement ID: SUSE-RU-2024:2697-1 Rating: moderate References: * bsc#1208690 * bsc#1217083 * bsc#1220485 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has three fixes can now be installed. ## Description: This update for dracut fixes the following issues: * Version update: * fix(dracut-install): continue parsing if ldd prints "cannot be preloaded" (bsc#1208690) * fix(zfcp_rules): correct shellcheck regression when parsing ccw args (bsc#1220485) * fix(dracut.sh): skip README for AMD microcode generation (bsc#1217083) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2697=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2697=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2697=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2697=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2697=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2697=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2697=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2697=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2697=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2697=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2697=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2697=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2697=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-tools-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-ima-055+suse.357.g905645c2-150400.3.34.2 * dracut-extra-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-ima-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-ima-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-ima-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-ima-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-ima-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 * SUSE Manager Proxy 4.3 (x86_64) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-ima-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-ima-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * dracut-mkinitrd-deprecated-055+suse.357.g905645c2-150400.3.34.2 * dracut-fips-055+suse.357.g905645c2-150400.3.34.2 * dracut-055+suse.357.g905645c2-150400.3.34.2 * dracut-debugsource-055+suse.357.g905645c2-150400.3.34.2 * dracut-ima-055+suse.357.g905645c2-150400.3.34.2 * dracut-debuginfo-055+suse.357.g905645c2-150400.3.34.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1208690 * https://bugzilla.suse.com/show_bug.cgi?id=1217083 * https://bugzilla.suse.com/show_bug.cgi?id=1220485 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Aug 2 16:30:10 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 02 Aug 2024 16:30:10 -0000 Subject: SUSE-RU-2024:2718-1: moderate: Recommended update for libqb Message-ID: <172261621068.14780.17978794372286421601@smelt2.prg2.suse.org> # Recommended update for libqb Announcement ID: SUSE-RU-2024:2718-1 Rating: moderate References: * bsc#1224183 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for libqb fixes the following issue: * ipc: Retry receiving credentials if the the message is short (bsc#1224183) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2718=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-2718=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2718=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2718=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2718=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2718=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2718=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2718=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2718=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2718=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * doxygen2man-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-debugsource-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-tests-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-tests-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb100-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-devel-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-tools-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb100-2.0.4+20211112.a2691b9-150400.4.6.2 * doxygen2man-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-tools-2.0.4+20211112.a2691b9-150400.4.6.2 * openSUSE Leap 15.4 (x86_64) * libqb100-32bit-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb100-32bit-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-devel-32bit-2.0.4+20211112.a2691b9-150400.4.6.2 * openSUSE Leap 15.4 (aarch64_ilp32) * libqb100-64bit-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-devel-64bit-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb100-64bit-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * doxygen2man-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-debugsource-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-tests-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-tests-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-tools-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * doxygen2man-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-tools-2.0.4+20211112.a2691b9-150400.4.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libqb100-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb100-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-debugsource-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-devel-2.0.4+20211112.a2691b9-150400.4.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libqb100-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb100-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-debugsource-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-devel-2.0.4+20211112.a2691b9-150400.4.6.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libqb100-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb100-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-debugsource-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-devel-2.0.4+20211112.a2691b9-150400.4.6.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libqb100-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb100-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-debugsource-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-devel-2.0.4+20211112.a2691b9-150400.4.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libqb100-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb100-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-debugsource-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-devel-2.0.4+20211112.a2691b9-150400.4.6.2 * SUSE Manager Proxy 4.3 (x86_64) * libqb100-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb100-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-debugsource-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-devel-2.0.4+20211112.a2691b9-150400.4.6.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libqb100-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb100-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-debugsource-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-devel-2.0.4+20211112.a2691b9-150400.4.6.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libqb100-debuginfo-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb100-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-debugsource-2.0.4+20211112.a2691b9-150400.4.6.2 * libqb-devel-2.0.4+20211112.a2691b9-150400.4.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224183 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Aug 5 20:37:00 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 05 Aug 2024 20:37:00 -0000 Subject: SUSE-RU-2024:2744-1: important: Recommended update for suseconnect-ng Message-ID: <172289022057.12336.10956709064746905483@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:2744-1 Rating: important References: * bsc#1219004 * bsc#1223107 * bsc#1226128 * jsc#PED-7982 * jsc#PED-8018 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains two features and has three fixes can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Version update * Added uname as collector * Added SAP workload detection * Added detection of container runtimes * Multiple fixes on ARM64 detection * Use `read_values` for the CPU collector on Z * Fixed data collection for ppc64le * Grab the home directory from /etc/passwd if needed (bsc#1226128) * Build zypper-migration and zypper-packages-search as standalone binaries rather then one single binary * Add --gpg-auto-import-keys flag before action in zypper command (bsc#1219004) * Include /etc/products.d in directories whose content are backed up and restored if a zypper-migration rollback happens (bsc#1219004) * Add the ability to upload the system uptime logs, produced by the suse- uptime-tracker daemon, to SCC/RMT as part of keepalive report (jsc#PED-7982) (jsc#PED-8018) * Add support for third party packages in SUSEConnect * Refactor existing system information collection implementation self-signed SSL certificate (bsc#1223107) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2744=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2744=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2744=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2744=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2744=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2744=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2744=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2744=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2744=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2744=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2744=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2744=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2744=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * suseconnect-ruby-bindings-1.11.0-150400.3.36.4 * suseconnect-ng-1.11.0-150400.3.36.4 * libsuseconnect-1.11.0-150400.3.36.4 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.11.0-150400.3.36.4 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.11.0-150400.3.36.4 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.11.0-150400.3.36.4 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.11.0-150400.3.36.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * suseconnect-ruby-bindings-1.11.0-150400.3.36.4 * suseconnect-ng-1.11.0-150400.3.36.4 * libsuseconnect-1.11.0-150400.3.36.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * suseconnect-ruby-bindings-1.11.0-150400.3.36.4 * suseconnect-ng-1.11.0-150400.3.36.4 * libsuseconnect-1.11.0-150400.3.36.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * suseconnect-ruby-bindings-1.11.0-150400.3.36.4 * suseconnect-ng-1.11.0-150400.3.36.4 * libsuseconnect-1.11.0-150400.3.36.4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * suseconnect-ruby-bindings-1.11.0-150400.3.36.4 * suseconnect-ng-1.11.0-150400.3.36.4 * libsuseconnect-1.11.0-150400.3.36.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * suseconnect-ruby-bindings-1.11.0-150400.3.36.4 * suseconnect-ng-1.11.0-150400.3.36.4 * libsuseconnect-1.11.0-150400.3.36.4 * SUSE Manager Proxy 4.3 (x86_64) * suseconnect-ruby-bindings-1.11.0-150400.3.36.4 * suseconnect-ng-1.11.0-150400.3.36.4 * libsuseconnect-1.11.0-150400.3.36.4 * SUSE Manager Retail Branch Server 4.3 (x86_64) * suseconnect-ruby-bindings-1.11.0-150400.3.36.4 * suseconnect-ng-1.11.0-150400.3.36.4 * libsuseconnect-1.11.0-150400.3.36.4 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * suseconnect-ruby-bindings-1.11.0-150400.3.36.4 * suseconnect-ng-1.11.0-150400.3.36.4 * libsuseconnect-1.11.0-150400.3.36.4 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219004 * https://bugzilla.suse.com/show_bug.cgi?id=1223107 * https://bugzilla.suse.com/show_bug.cgi?id=1226128 * https://jira.suse.com/browse/PED-7982 * https://jira.suse.com/browse/PED-8018 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Aug 7 08:30:06 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 07 Aug 2024 08:30:06 -0000 Subject: SUSE-SU-2024:2811-1: important: Security update for bind Message-ID: <172301940670.9296.3721422161047020318@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2024:2811-1 Rating: important References: * bsc#1228256 * bsc#1228257 Cross-References: * CVE-2024-1737 * CVE-2024-1975 CVSS scores: * CVE-2024-1737 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-1975 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Client Tools for SLE Micro 5 An update that solves two vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2024-1737: It is possible to craft excessively large numbers of resource record types for a given owner name, which has the effect of slowing down database processing. This has been addressed by adding a configurable limit to the number of records that can be stored per name and type in a cache or zone database. The default is 100, which can be tuned with the new max- types-per-name option. (bsc#1228256) * CVE-2024-1975: Validating DNS messages signed using the SIG(0) protocol (RFC 2931) could cause excessive CPU load, leading to a denial-of-service condition. Support for SIG(0) message validation was removed from this version of named. (bsc#1228257) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-2811=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2811=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2811=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2811=1 ## Package List: * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * bind-utils-9.16.6-150000.12.77.1 * libdns1605-9.16.6-150000.12.77.1 * libns1604-9.16.6-150000.12.77.1 * libisccc1600-9.16.6-150000.12.77.1 * libisccfg1600-9.16.6-150000.12.77.1 * libirs1601-9.16.6-150000.12.77.1 * libns1604-debuginfo-9.16.6-150000.12.77.1 * libbind9-1600-9.16.6-150000.12.77.1 * libisc1606-9.16.6-150000.12.77.1 * SUSE Manager Client Tools for SLE Micro 5 (aarch64_ilp32) * libdns1605-64bit-9.16.6-150000.12.77.1 * libisccfg1600-64bit-9.16.6-150000.12.77.1 * libirs1601-64bit-9.16.6-150000.12.77.1 * libbind9-1600-64bit-9.16.6-150000.12.77.1 * libisccc1600-64bit-9.16.6-150000.12.77.1 * libisc1606-64bit-9.16.6-150000.12.77.1 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * python3-bind-9.16.6-150000.12.77.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libirs-devel-9.16.6-150000.12.77.1 * libns1604-debuginfo-9.16.6-150000.12.77.1 * bind-utils-debuginfo-9.16.6-150000.12.77.1 * libdns1605-debuginfo-9.16.6-150000.12.77.1 * libisccfg1600-debuginfo-9.16.6-150000.12.77.1 * libirs1601-debuginfo-9.16.6-150000.12.77.1 * bind-debuginfo-9.16.6-150000.12.77.1 * bind-debugsource-9.16.6-150000.12.77.1 * bind-chrootenv-9.16.6-150000.12.77.1 * libisc1606-debuginfo-9.16.6-150000.12.77.1 * libirs1601-9.16.6-150000.12.77.1 * libisccfg1600-9.16.6-150000.12.77.1 * libbind9-1600-9.16.6-150000.12.77.1 * bind-devel-9.16.6-150000.12.77.1 * libbind9-1600-debuginfo-9.16.6-150000.12.77.1 * bind-utils-9.16.6-150000.12.77.1 * libdns1605-9.16.6-150000.12.77.1 * libisccc1600-debuginfo-9.16.6-150000.12.77.1 * libns1604-9.16.6-150000.12.77.1 * libisccc1600-9.16.6-150000.12.77.1 * bind-9.16.6-150000.12.77.1 * libisc1606-9.16.6-150000.12.77.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * python3-bind-9.16.6-150000.12.77.1 * bind-doc-9.16.6-150000.12.77.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libirs-devel-9.16.6-150000.12.77.1 * libns1604-debuginfo-9.16.6-150000.12.77.1 * bind-utils-debuginfo-9.16.6-150000.12.77.1 * libdns1605-debuginfo-9.16.6-150000.12.77.1 * libisccfg1600-debuginfo-9.16.6-150000.12.77.1 * libirs1601-debuginfo-9.16.6-150000.12.77.1 * bind-debuginfo-9.16.6-150000.12.77.1 * bind-debugsource-9.16.6-150000.12.77.1 * bind-chrootenv-9.16.6-150000.12.77.1 * libisc1606-debuginfo-9.16.6-150000.12.77.1 * libirs1601-9.16.6-150000.12.77.1 * libisccfg1600-9.16.6-150000.12.77.1 * libbind9-1600-9.16.6-150000.12.77.1 * bind-devel-9.16.6-150000.12.77.1 * libbind9-1600-debuginfo-9.16.6-150000.12.77.1 * bind-utils-9.16.6-150000.12.77.1 * libdns1605-9.16.6-150000.12.77.1 * libisccc1600-debuginfo-9.16.6-150000.12.77.1 * libns1604-9.16.6-150000.12.77.1 * libisccc1600-9.16.6-150000.12.77.1 * bind-9.16.6-150000.12.77.1 * libisc1606-9.16.6-150000.12.77.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * python3-bind-9.16.6-150000.12.77.1 * bind-doc-9.16.6-150000.12.77.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libirs-devel-9.16.6-150000.12.77.1 * libns1604-debuginfo-9.16.6-150000.12.77.1 * bind-utils-debuginfo-9.16.6-150000.12.77.1 * libdns1605-debuginfo-9.16.6-150000.12.77.1 * libisccfg1600-debuginfo-9.16.6-150000.12.77.1 * libirs1601-debuginfo-9.16.6-150000.12.77.1 * bind-debuginfo-9.16.6-150000.12.77.1 * bind-debugsource-9.16.6-150000.12.77.1 * bind-chrootenv-9.16.6-150000.12.77.1 * libisc1606-debuginfo-9.16.6-150000.12.77.1 * libirs1601-9.16.6-150000.12.77.1 * libisccfg1600-9.16.6-150000.12.77.1 * libbind9-1600-9.16.6-150000.12.77.1 * bind-devel-9.16.6-150000.12.77.1 * libbind9-1600-debuginfo-9.16.6-150000.12.77.1 * bind-utils-9.16.6-150000.12.77.1 * libdns1605-9.16.6-150000.12.77.1 * libisccc1600-debuginfo-9.16.6-150000.12.77.1 * libns1604-9.16.6-150000.12.77.1 * libisccc1600-9.16.6-150000.12.77.1 * bind-9.16.6-150000.12.77.1 * libisc1606-9.16.6-150000.12.77.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * python3-bind-9.16.6-150000.12.77.1 * bind-doc-9.16.6-150000.12.77.1 ## References: * https://www.suse.com/security/cve/CVE-2024-1737.html * https://www.suse.com/security/cve/CVE-2024-1975.html * https://bugzilla.suse.com/show_bug.cgi?id=1228256 * https://bugzilla.suse.com/show_bug.cgi?id=1228257 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Aug 9 08:36:22 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 09 Aug 2024 08:36:22 -0000 Subject: SUSE-SU-2024:2863-1: important: Security update for bind Message-ID: <172319258243.12336.786808186340120668@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2024:2863-1 Rating: important References: * bsc#1228256 * bsc#1228257 * bsc#1228258 Cross-References: * CVE-2024-1737 * CVE-2024-1975 * CVE-2024-4076 CVSS scores: * CVE-2024-1737 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-1975 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-4076 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: Update to 9.16.50: * Bug Fixes: * A regression in cache-cleaning code enabled memory use to grow significantly more quickly than before, until the configured max-cache-size limit was reached. This has been fixed. * Using rndc flush inadvertently caused cache cleaning to become less effective. This could ultimately lead to the configured max-cache-size limit being exceeded and has now been fixed. * The logic for cleaning up expired cached DNS records was tweaked to be more aggressive. This change helps with enforcing max-cache-ttl and max-ncache- ttl in a timely manner. * It was possible to trigger a use-after-free assertion when the overmem cache cleaning was initiated. This has been fixed. New Features: * Added RESOLVER.ARPA to the built in empty zones. * Security Fixes: * It is possible to craft excessively large numbers of resource record types for a given owner name, which has the effect of slowing down database processing. This has been addressed by adding a configurable limit to the number of records that can be stored per name and type in a cache or zone database. The default is 100, which can be tuned with the new max-types-per- name option. (CVE-2024-1737, bsc#1228256) * Validating DNS messages signed using the SIG(0) protocol (RFC 2931) could cause excessive CPU load, leading to a denial-of-service condition. Support for SIG(0) message validation was removed from this version of named. (CVE-2024-1975, bsc#1228257) * When looking up the NS records of parent zones as part of looking up DS records, it was possible for named to trigger an assertion failure if serve- stale was enabled. This has been fixed. (CVE-2024-4076, bsc#1228258) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2863=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2863=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2863=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2863=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2863=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2863=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2863=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2863=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2863=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * bind-utils-9.16.50-150400.5.43.1 * bind-utils-debuginfo-9.16.50-150400.5.43.1 * bind-9.16.50-150400.5.43.1 * bind-debugsource-9.16.50-150400.5.43.1 * bind-debuginfo-9.16.50-150400.5.43.1 * openSUSE Leap 15.4 (noarch) * python3-bind-9.16.50-150400.5.43.1 * bind-doc-9.16.50-150400.5.43.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * bind-utils-9.16.50-150400.5.43.1 * bind-utils-debuginfo-9.16.50-150400.5.43.1 * bind-9.16.50-150400.5.43.1 * bind-debugsource-9.16.50-150400.5.43.1 * bind-debuginfo-9.16.50-150400.5.43.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-bind-9.16.50-150400.5.43.1 * bind-doc-9.16.50-150400.5.43.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * bind-utils-9.16.50-150400.5.43.1 * bind-utils-debuginfo-9.16.50-150400.5.43.1 * bind-9.16.50-150400.5.43.1 * bind-debugsource-9.16.50-150400.5.43.1 * bind-debuginfo-9.16.50-150400.5.43.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-bind-9.16.50-150400.5.43.1 * bind-doc-9.16.50-150400.5.43.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * bind-utils-debuginfo-9.16.50-150400.5.43.1 * bind-utils-9.16.50-150400.5.43.1 * bind-debugsource-9.16.50-150400.5.43.1 * bind-debuginfo-9.16.50-150400.5.43.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python3-bind-9.16.50-150400.5.43.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * bind-utils-9.16.50-150400.5.43.1 * bind-utils-debuginfo-9.16.50-150400.5.43.1 * bind-9.16.50-150400.5.43.1 * bind-debugsource-9.16.50-150400.5.43.1 * bind-debuginfo-9.16.50-150400.5.43.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python3-bind-9.16.50-150400.5.43.1 * bind-doc-9.16.50-150400.5.43.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * bind-utils-9.16.50-150400.5.43.1 * bind-utils-debuginfo-9.16.50-150400.5.43.1 * bind-9.16.50-150400.5.43.1 * bind-debugsource-9.16.50-150400.5.43.1 * bind-debuginfo-9.16.50-150400.5.43.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-bind-9.16.50-150400.5.43.1 * bind-doc-9.16.50-150400.5.43.1 * SUSE Manager Proxy 4.3 (x86_64) * bind-utils-9.16.50-150400.5.43.1 * bind-utils-debuginfo-9.16.50-150400.5.43.1 * bind-9.16.50-150400.5.43.1 * bind-debugsource-9.16.50-150400.5.43.1 * bind-debuginfo-9.16.50-150400.5.43.1 * SUSE Manager Proxy 4.3 (noarch) * python3-bind-9.16.50-150400.5.43.1 * bind-doc-9.16.50-150400.5.43.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * bind-utils-9.16.50-150400.5.43.1 * bind-utils-debuginfo-9.16.50-150400.5.43.1 * bind-9.16.50-150400.5.43.1 * bind-debugsource-9.16.50-150400.5.43.1 * bind-debuginfo-9.16.50-150400.5.43.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * python3-bind-9.16.50-150400.5.43.1 * bind-doc-9.16.50-150400.5.43.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * bind-utils-9.16.50-150400.5.43.1 * bind-utils-debuginfo-9.16.50-150400.5.43.1 * bind-9.16.50-150400.5.43.1 * bind-debugsource-9.16.50-150400.5.43.1 * bind-debuginfo-9.16.50-150400.5.43.1 * SUSE Manager Server 4.3 (noarch) * python3-bind-9.16.50-150400.5.43.1 * bind-doc-9.16.50-150400.5.43.1 ## References: * https://www.suse.com/security/cve/CVE-2024-1737.html * https://www.suse.com/security/cve/CVE-2024-1975.html * https://www.suse.com/security/cve/CVE-2024-4076.html * https://bugzilla.suse.com/show_bug.cgi?id=1228256 * https://bugzilla.suse.com/show_bug.cgi?id=1228257 * https://bugzilla.suse.com/show_bug.cgi?id=1228258 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Aug 9 08:36:32 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 09 Aug 2024 08:36:32 -0000 Subject: SUSE-SU-2024:2860-1: important: Security update for python3-Twisted Message-ID: <172319259287.12336.16199546947556425753@smelt2.prg2.suse.org> # Security update for python3-Twisted Announcement ID: SUSE-SU-2024:2860-1 Rating: important References: * bsc#1228549 * bsc#1228552 Cross-References: * CVE-2024-41671 * CVE-2024-41810 CVSS scores: * CVE-2024-41671 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-41671 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L * CVE-2024-41810 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N * CVE-2024-41810 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for python3-Twisted fixes the following issues: * CVE-2024-41671: Fixed HTTP pipelined requests processed out of order in twisted.web (bsc#1228549) * CVE-2024-41810: Fixed reflected XSS via HTML Injection in Redirect Response (bsc#1228552) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2860=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2860=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-2860=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2860=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2860=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2860=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2860=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2860=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2860=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2860=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2860=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python-Twisted-doc-22.2.0-150400.21.1 * python3-Twisted-22.2.0-150400.21.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python3-Twisted-22.2.0-150400.21.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-Twisted-22.2.0-150400.21.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python3-Twisted-22.2.0-150400.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python3-Twisted-22.2.0-150400.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python3-Twisted-22.2.0-150400.21.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python3-Twisted-22.2.0-150400.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python3-Twisted-22.2.0-150400.21.1 * SUSE Manager Proxy 4.3 (x86_64) * python3-Twisted-22.2.0-150400.21.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * python3-Twisted-22.2.0-150400.21.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * python3-Twisted-22.2.0-150400.21.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41671.html * https://www.suse.com/security/cve/CVE-2024-41810.html * https://bugzilla.suse.com/show_bug.cgi?id=1228549 * https://bugzilla.suse.com/show_bug.cgi?id=1228552 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Aug 9 16:30:09 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 09 Aug 2024 16:30:09 -0000 Subject: SUSE-SU-2024:2869-1: important: Security update for ca-certificates-mozilla Message-ID: <172322100965.5589.14314239594110545713@smelt2.prg2.suse.org> # Security update for ca-certificates-mozilla Announcement ID: SUSE-SU-2024:2869-1 Rating: important References: * bsc#1220356 * bsc#1227525 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two security fixes can now be installed. ## Description: This update for ca-certificates-mozilla fixes the following issues: * Updated to 2.68 state of Mozilla SSL root CAs (bsc#1227525) * Added: FIRMAPROFESIONAL CA ROOT-A WEB * Distrust: GLOBALTRUST 2020 * Updated to 2.66 state of Mozilla SSL root CAs (bsc#1220356) Added: * CommScope Public Trust ECC Root-01 * CommScope Public Trust ECC Root-02 * CommScope Public Trust RSA Root-01 * CommScope Public Trust RSA Root-02 * D-Trust SBR Root CA 1 2022 * D-Trust SBR Root CA 2 2022 * Telekom Security SMIME ECC Root 2021 * Telekom Security SMIME RSA Root 2023 * Telekom Security TLS ECC Root 2020 * Telekom Security TLS RSA Root 2023 * TrustAsia Global Root CA G3 * TrustAsia Global Root CA G4 Removed: * Autoridad de Certificacion Firmaprofesional CIF A62634068 * Chambers of Commerce Root - 2008 * Global Chambersign Root - 2008 * Security Communication Root CA * Symantec Class 1 Public Primary Certification Authority - G6 * Symantec Class 2 Public Primary Certification Authority - G6 * TrustCor ECA-1 * TrustCor RootCert CA-1 * TrustCor RootCert CA-2 * VeriSign Class 1 Public Primary Certification Authority - G3 * VeriSign Class 2 Public Primary Certification Authority - G3 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-2869=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2869=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2869=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2869=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2869=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2869=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2869=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2869=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2869=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2869=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2869=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2869=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2869=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2869=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2869=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2869=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2869=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2869=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2869=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2869=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2869=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2869=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2869=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2869=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2869=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2869=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2869=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2869=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2869=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2869=1 ## Package List: * openSUSE Leap Micro 5.5 (noarch) * ca-certificates-mozilla-2.68-150200.33.1 * openSUSE Leap 15.5 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * openSUSE Leap 15.6 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * ca-certificates-mozilla-2.68-150200.33.1 * Basesystem Module 15-SP5 (noarch) * ca-certificates-mozilla-2.68-150200.33.1 * Basesystem Module 15-SP6 (noarch) * ca-certificates-mozilla-2.68-150200.33.1 * Development Tools Module 15-SP5 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * Development Tools Module 15-SP6 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Manager Proxy 4.3 (noarch) * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Manager Server 4.3 (noarch) * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Enterprise Storage 7.1 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * ca-certificates-mozilla-prebuilt-2.68-150200.33.1 * ca-certificates-mozilla-2.68-150200.33.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220356 * https://bugzilla.suse.com/show_bug.cgi?id=1227525 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Aug 13 08:36:08 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 13 Aug 2024 08:36:08 -0000 Subject: SUSE-RU-2024:2886-1: moderate: Recommended update for dmidecode Message-ID: <172353816835.4512.15702056878035930007@smelt2.prg2.suse.org> # Recommended update for dmidecode Announcement ID: SUSE-RU-2024:2886-1 Rating: moderate References: * jsc#PED-8574 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for dmidecode fixes the following issues: * Version update (jsc#PED-8574): * Support for SMBIOS 3.6.0. This includes new memory device types, new processor upgrades, and Loongarch support * Support for SMBIOS 3.7.0. This includes new port types, new processor upgrades, new slot characteristics and new fields for memory modules * Add bash completion * Decode HPE OEM records 197, 216, 224, 230, 238, 239, 242 and 245 * Implement options --list-strings and --list-types * Update HPE OEM records 203, 212, 216, 221, 233 and 236 * Update Redfish support * Bug fixes: * Fix enabled slot characteristics not being printed * Minor improvements: * Print slot width on its own line * Use standard strings for slot width * Add a --no-quirks option * Drop the CPUID exception list * Obsoletes patches removed : dmidecode-do-not-let-dump-bin-overwrite-an- existing-file, dmidecode-fortify-entry-point-length-checks, dmidecode-split- table-fetching-from-decoding, dmidecode-write-the-whole-dump-file-at-once, dmioem-fix-segmentation-fault-in-dmi_hp_240_attr, dmioem-hpe-oem- record-237-firmware-change, dmioem-typo-fix-virutal-virtual, ensure-dev-mem- is-a-character-device-file, news-fix-typo, use-read_file-to-read-from-dump Update for HPE servers from upstream: * dmioem-update-hpe-oem-type-238 patch: Decode PCI bus segment in HPE type 238 records ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2886=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-2886=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2886=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2886=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2886=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2886=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2886=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2886=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2886=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2886=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2886=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2886=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2886=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2886=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2886=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2886=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2886=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2886=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2886=1 ## Package List: * openSUSE Leap 15.4 (aarch64 x86_64 i586) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * openSUSE Leap Micro 5.5 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * openSUSE Leap 15.5 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * openSUSE Leap 15.6 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * Basesystem Module 15-SP5 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * Basesystem Module 15-SP6 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Manager Proxy 4.3 (x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 * SUSE Manager Server 4.3 (x86_64) * dmidecode-debugsource-3.6-150400.16.11.2 * dmidecode-debuginfo-3.6-150400.16.11.2 * dmidecode-3.6-150400.16.11.2 ## References: * https://jira.suse.com/browse/PED-8574 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Aug 13 12:30:14 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 13 Aug 2024 12:30:14 -0000 Subject: SUSE-SU-2024:2890-1: important: Security update for libqt5-qtbase Message-ID: <172355221466.5808.4646328295040175448@smelt2.prg2.suse.org> # Security update for libqt5-qtbase Announcement ID: SUSE-SU-2024:2890-1 Rating: important References: * bsc#1218413 * bsc#1222120 * bsc#1227426 * bsc#1227513 Cross-References: * CVE-2023-45935 * CVE-2023-51714 * CVE-2024-39936 CVSS scores: * CVE-2023-45935 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39936 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39936 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities and has one security fix can now be installed. ## Description: This update for libqt5-qtbase fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). * CVE-2024-39936: Fixed information leakage due to process HTTP2 communication before encrypted() can be responded to (bsc#1227426) * CVE-2023-45935: Fixed NULL pointer dereference in QXcbConnection::initializeAllAtoms() due to anomalous behavior from the X server (bsc#1222120) Other fixes: \- Add patch from upstream to fix a regression in the ODBC driver (bsc#1227513, QTBUG-112375) \- Add upstream patch to fix a potential overflow in assemble_hpack_block() ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2890=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2890=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2890=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2890=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2890=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2890=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2890=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2890=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2890=1 ## Package List: * openSUSE Leap 15.4 (x86_64) * libQt5OpenGL5-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Core5-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Core-devel-32bit-5.15.2+kde294-150400.6.15.1 * libQt5OpenGLExtensions-devel-static-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Sql-devel-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Test5-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Core5-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Network5-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Test-devel-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent-devel-32bit-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-devel-static-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-devel-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Network5-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-32bit-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Network-devel-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Test5-32bit-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-32bit-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-32bit-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-examples-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-devel-32bit-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-32bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-32bit-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-examples-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Bootstrap-devel-static-32bit-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-devel-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Xml-devel-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Gui-devel-32bit-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-32bit-5.15.2+kde294-150400.6.15.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libQt5Gui5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-debugsource-5.15.2+kde294-150400.6.15.1 * libQt5OpenGLExtensions-devel-static-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-examples-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-5.15.2+kde294-150400.6.15.1 * libQt5Test-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Network-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Bootstrap-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Core-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Core5-5.15.2+kde294-150400.6.15.1 * libQt5PlatformHeaders-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-examples-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5KmsSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Test5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Network5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-5.15.2+kde294-150400.6.15.1 * libQt5Sql-devel-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-5.15.2+kde294-150400.6.15.1 * libQt5Xml-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Test5-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Gui-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * openSUSE Leap 15.4 (noarch) * libQt5KmsSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Gui-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Core-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Test-private-headers-devel-5.15.2+kde294-150400.6.15.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libQt5DBus-devel-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-devel-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Bootstrap-devel-static-64bit-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-devel-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Core5-64bit-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Test-devel-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Network5-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-64bit-5.15.2+kde294-150400.6.15.1 * libQt5OpenGLExtensions-devel-static-64bit-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-examples-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Sql-devel-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core-devel-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-devel-64bit-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-devel-static-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-64bit-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Test5-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-64bit-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Core5-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Network5-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent-devel-64bit-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Test5-64bit-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-examples-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml-devel-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-64bit-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Network-devel-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Gui-devel-64bit-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-64bit-5.15.2+kde294-150400.6.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libQt5Gui5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-debugsource-5.15.2+kde294-150400.6.15.1 * libQt5OpenGLExtensions-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-5.15.2+kde294-150400.6.15.1 * libQt5Test-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-5.15.2+kde294-150400.6.15.1 * libQt5Network-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Core5-5.15.2+kde294-150400.6.15.1 * libQt5PlatformHeaders-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5KmsSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Test5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Network5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-5.15.2+kde294-150400.6.15.1 * libQt5Sql-devel-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-5.15.2+kde294-150400.6.15.1 * libQt5Xml-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Test5-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Gui-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * libQt5KmsSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Gui-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Core-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Test-private-headers-devel-5.15.2+kde294-150400.6.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libQt5Gui5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-debugsource-5.15.2+kde294-150400.6.15.1 * libQt5OpenGLExtensions-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-5.15.2+kde294-150400.6.15.1 * libQt5Test-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-5.15.2+kde294-150400.6.15.1 * libQt5Network-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Core5-5.15.2+kde294-150400.6.15.1 * libQt5PlatformHeaders-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5KmsSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Test5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Network5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-5.15.2+kde294-150400.6.15.1 * libQt5Sql-devel-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-5.15.2+kde294-150400.6.15.1 * libQt5Xml-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Test5-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Gui-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * libQt5KmsSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Gui-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Core-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Test-private-headers-devel-5.15.2+kde294-150400.6.15.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libQt5Gui5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-debugsource-5.15.2+kde294-150400.6.15.1 * libQt5OpenGLExtensions-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-5.15.2+kde294-150400.6.15.1 * libQt5Test-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-5.15.2+kde294-150400.6.15.1 * libQt5Network-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Core5-5.15.2+kde294-150400.6.15.1 * libQt5PlatformHeaders-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5KmsSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Test5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Network5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-5.15.2+kde294-150400.6.15.1 * libQt5Sql-devel-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-5.15.2+kde294-150400.6.15.1 * libQt5Xml-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Test5-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Gui-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * libQt5KmsSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Gui-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Core-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Test-private-headers-devel-5.15.2+kde294-150400.6.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libQt5Gui5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-debugsource-5.15.2+kde294-150400.6.15.1 * libQt5OpenGLExtensions-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-5.15.2+kde294-150400.6.15.1 * libQt5Test-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-5.15.2+kde294-150400.6.15.1 * libQt5Network-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Core5-5.15.2+kde294-150400.6.15.1 * libQt5PlatformHeaders-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5KmsSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Test5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Network5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-5.15.2+kde294-150400.6.15.1 * libQt5Sql-devel-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-5.15.2+kde294-150400.6.15.1 * libQt5Xml-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Test5-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Gui-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * libQt5KmsSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Gui-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Core-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Test-private-headers-devel-5.15.2+kde294-150400.6.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libQt5Gui5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-debugsource-5.15.2+kde294-150400.6.15.1 * libQt5OpenGLExtensions-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-5.15.2+kde294-150400.6.15.1 * libQt5Test-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-5.15.2+kde294-150400.6.15.1 * libQt5Network-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Core5-5.15.2+kde294-150400.6.15.1 * libQt5PlatformHeaders-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5KmsSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Test5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-postgresql-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Network5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-5.15.2+kde294-150400.6.15.1 * libQt5Sql-devel-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-unixODBC-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-5.15.2+kde294-150400.6.15.1 * libQt5Xml-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-mysql-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Test5-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Gui-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * libQt5KmsSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Gui-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Core-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Test-private-headers-devel-5.15.2+kde294-150400.6.15.1 * SUSE Manager Proxy 4.3 (x86_64) * libQt5Gui5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-devel-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-debugsource-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-5.15.2+kde294-150400.6.15.1 * libQt5Test-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-5.15.2+kde294-150400.6.15.1 * libQt5Network-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Core5-5.15.2+kde294-150400.6.15.1 * libQt5PlatformHeaders-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5KmsSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Test5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-5.15.2+kde294-150400.6.15.1 * libQt5Sql-devel-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-5.15.2+kde294-150400.6.15.1 * libQt5Xml-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Test5-5.15.2+kde294-150400.6.15.1 * libQt5Gui-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * SUSE Manager Proxy 4.3 (noarch) * libQt5KmsSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Gui-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Core-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Test-private-headers-devel-5.15.2+kde294-150400.6.15.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libQt5Gui5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-devel-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-debugsource-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-5.15.2+kde294-150400.6.15.1 * libQt5Test-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-5.15.2+kde294-150400.6.15.1 * libQt5Network-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Core5-5.15.2+kde294-150400.6.15.1 * libQt5PlatformHeaders-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5KmsSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Test5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-5.15.2+kde294-150400.6.15.1 * libQt5Sql-devel-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-5.15.2+kde294-150400.6.15.1 * libQt5Xml-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Test5-5.15.2+kde294-150400.6.15.1 * libQt5Gui-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * libQt5KmsSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Gui-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Core-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Test-private-headers-devel-5.15.2+kde294-150400.6.15.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libQt5Gui5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-devel-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-debugsource-5.15.2+kde294-150400.6.15.1 * libQt5Gui5-5.15.2+kde294-150400.6.15.1 * libQt5Test-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-5.15.2+kde294-150400.6.15.1 * libQt5Network-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Core5-5.15.2+kde294-150400.6.15.1 * libQt5PlatformHeaders-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5KmsSupport-devel-static-5.15.2+kde294-150400.6.15.1 * libQt5Test5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Xml5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network5-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-5.15.2+kde294-150400.6.15.1 * libQt5Sql-devel-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5DBus5-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Core5-debuginfo-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-common-devel-5.15.2+kde294-150400.6.15.1 * libQt5Xml-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql5-sqlite-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Concurrent5-5.15.2+kde294-150400.6.15.1 * libQt5Widgets5-debuginfo-5.15.2+kde294-150400.6.15.1 * libQt5Test5-5.15.2+kde294-150400.6.15.1 * libQt5Gui-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-devel-debuginfo-5.15.2+kde294-150400.6.15.1 * SUSE Manager Server 4.3 (noarch) * libQt5KmsSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5DBus-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Network-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Gui-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PrintSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Sql-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libqt5-qtbase-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5PlatformSupport-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5OpenGL-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Widgets-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Core-private-headers-devel-5.15.2+kde294-150400.6.15.1 * libQt5Test-private-headers-devel-5.15.2+kde294-150400.6.15.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45935.html * https://www.suse.com/security/cve/CVE-2023-51714.html * https://www.suse.com/security/cve/CVE-2024-39936.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 * https://bugzilla.suse.com/show_bug.cgi?id=1222120 * https://bugzilla.suse.com/show_bug.cgi?id=1227426 * https://bugzilla.suse.com/show_bug.cgi?id=1227513 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Aug 15 08:30:38 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 15 Aug 2024 08:30:38 -0000 Subject: SUSE-SU-2024:2927-1: moderate: Security update for openssl-1_1 Message-ID: <172371063887.632.1905591517605583860@smelt2.prg2.suse.org> # Security update for openssl-1_1 Announcement ID: SUSE-SU-2024:2927-1 Rating: moderate References: * bsc#1226463 * bsc#1227138 Cross-References: * CVE-2024-5535 CVSS scores: * CVE-2024-5535 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for openssl-1_1 fixes the following issues: * CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138) Other fixes: \- Build with no-afalgeng (bsc#1226463) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2927=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2927=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2927=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2927=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2927=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2927=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2927=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2927=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2927=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2927=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2927=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2927=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2927=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * openSUSE Leap 15.4 (x86_64) * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1 * openSUSE Leap 15.4 (noarch) * openssl-1_1-doc-1.1.1l-150400.7.72.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libopenssl1_1-64bit-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-64bit-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-64bit-1.1.1l-150400.7.72.1 * libopenssl1_1-64bit-debuginfo-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1 * SUSE Manager Proxy 4.3 (x86_64) * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * openssl-1_1-debuginfo-1.1.1l-150400.7.72.1 * libopenssl-1_1-devel-1.1.1l-150400.7.72.1 * libopenssl1_1-debuginfo-1.1.1l-150400.7.72.1 * openssl-1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-1.1.1l-150400.7.72.1 * openssl-1_1-debugsource-1.1.1l-150400.7.72.1 * SUSE Manager Server 4.3 (x86_64) * libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.72.1 * libopenssl1_1-32bit-1.1.1l-150400.7.72.1 * libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5535.html * https://bugzilla.suse.com/show_bug.cgi?id=1226463 * https://bugzilla.suse.com/show_bug.cgi?id=1227138 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Aug 15 08:36:52 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 15 Aug 2024 08:36:52 -0000 Subject: SUSE-RU-2024:2922-1: important: Recommended update for grub2 Message-ID: <172371101258.12638.8930595443383624984@smelt2.prg2.suse.org> # Recommended update for grub2 Announcement ID: SUSE-RU-2024:2922-1 Rating: important References: * bsc#1207230 * bsc#1217102 * bsc#1223535 * bsc#1226100 * bsc#1228124 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that has five fixes can now be installed. ## Description: This update for grub2 fixes the following issues: * Fix btrfs subvolume for platform modules not mounting at runtime when the default subvolume is the topmost root tree (bsc#1228124) * Fix error in grub-install when root is on tmpfs (bsc#1226100) * Fix input handling in ppc64le grub2 has high latency (bsc#1223535) * Fix PowerPC grub loads 5 to 10 minutes slower on SLE-15-SP5 compared to SLE-15-SP2 (bsc#1217102) * Enhancement to PPC secure boot's root device discovery config (bsc#1207230) * Fix regex for Open Firmware device specifier with encoded commas * Fix regular expression in PPC secure boot config to prevent escaped commas from being treated as delimiters when retrieving partition substrings * Use prep_load_env in PPC secure boot config to handle unset host-specific environment variables and ensure successful command execution ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2922=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2922=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2922=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2922=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2922=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2922=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2922=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-2922=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-2922=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2922=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2922=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2922=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2922=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2922=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2922=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 (x86_64) * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * grub2-debugsource-2.06-150400.11.46.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * grub2-x86_64-xen-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-systemd-sleep-plugin-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * SUSE Manager Server 4.3 (noarch) * grub2-x86_64-xen-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-powerpc-ieee1275-2.06-150400.11.46.1 * grub2-systemd-sleep-plugin-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 * SUSE Manager Server 4.3 (s390x x86_64) * grub2-debugsource-2.06-150400.11.46.1 * SUSE Manager Server 4.3 (s390x) * grub2-s390x-emu-2.06-150400.11.46.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * grub2-branding-upstream-2.06-150400.11.46.1 * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * openSUSE Leap 15.4 (aarch64 s390x x86_64 i586) * grub2-debugsource-2.06-150400.11.46.1 * openSUSE Leap 15.4 (noarch) * grub2-arm64-efi-debug-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-powerpc-ieee1275-debug-2.06-150400.11.46.1 * grub2-arm64-efi-extras-2.06-150400.11.46.1 * grub2-x86_64-efi-debug-2.06-150400.11.46.1 * grub2-x86_64-xen-2.06-150400.11.46.1 * grub2-powerpc-ieee1275-extras-2.06-150400.11.46.1 * grub2-s390x-emu-extras-2.06-150400.11.46.1 * grub2-powerpc-ieee1275-2.06-150400.11.46.1 * grub2-systemd-sleep-plugin-2.06-150400.11.46.1 * grub2-i386-pc-debug-2.06-150400.11.46.1 * grub2-i386-xen-extras-2.06-150400.11.46.1 * grub2-arm64-efi-2.06-150400.11.46.1 * grub2-x86_64-xen-extras-2.06-150400.11.46.1 * grub2-i386-xen-2.06-150400.11.46.1 * grub2-i386-efi-2.06-150400.11.46.1 * grub2-x86_64-efi-extras-2.06-150400.11.46.1 * grub2-i386-efi-extras-2.06-150400.11.46.1 * grub2-i386-pc-extras-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 * grub2-i386-efi-debug-2.06-150400.11.46.1 * openSUSE Leap 15.4 (s390x) * grub2-s390x-emu-debug-2.06-150400.11.46.1 * grub2-s390x-emu-2.06-150400.11.46.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * grub2-debugsource-2.06-150400.11.46.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * grub2-x86_64-xen-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-arm64-efi-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (s390x) * grub2-s390x-emu-2.06-150400.11.46.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * grub2-debugsource-2.06-150400.11.46.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * grub2-x86_64-xen-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-arm64-efi-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 * SUSE Linux Enterprise Micro 5.3 (s390x) * grub2-s390x-emu-2.06-150400.11.46.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * grub2-debugsource-2.06-150400.11.46.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * grub2-x86_64-xen-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-arm64-efi-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (s390x) * grub2-s390x-emu-2.06-150400.11.46.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * grub2-debugsource-2.06-150400.11.46.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * grub2-x86_64-xen-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-arm64-efi-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 * SUSE Linux Enterprise Micro 5.4 (s390x) * grub2-s390x-emu-2.06-150400.11.46.1 * SUSE Manager Proxy 4.3 Module 4.3 (noarch) * grub2-arm64-efi-2.06-150400.11.46.1 * SUSE Manager Server 4.3 Module 4.3 (noarch) * grub2-arm64-efi-2.06-150400.11.46.1 * grub2-powerpc-ieee1275-2.06-150400.11.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * grub2-debugsource-2.06-150400.11.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * grub2-x86_64-xen-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-arm64-efi-2.06-150400.11.46.1 * grub2-systemd-sleep-plugin-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * grub2-debugsource-2.06-150400.11.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * grub2-x86_64-xen-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-arm64-efi-2.06-150400.11.46.1 * grub2-systemd-sleep-plugin-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * grub2-debugsource-2.06-150400.11.46.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * grub2-systemd-sleep-plugin-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * grub2-x86_64-xen-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-arm64-efi-2.06-150400.11.46.1 * grub2-powerpc-ieee1275-2.06-150400.11.46.1 * grub2-systemd-sleep-plugin-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150400.11.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x) * grub2-s390x-emu-2.06-150400.11.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * grub2-x86_64-xen-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-powerpc-ieee1275-2.06-150400.11.46.1 * grub2-systemd-sleep-plugin-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * grub2-debugsource-2.06-150400.11.46.1 * SUSE Manager Proxy 4.3 (x86_64) * grub2-debuginfo-2.06-150400.11.46.1 * grub2-2.06-150400.11.46.1 * grub2-debugsource-2.06-150400.11.46.1 * SUSE Manager Proxy 4.3 (noarch) * grub2-x86_64-xen-2.06-150400.11.46.1 * grub2-x86_64-efi-2.06-150400.11.46.1 * grub2-snapper-plugin-2.06-150400.11.46.1 * grub2-systemd-sleep-plugin-2.06-150400.11.46.1 * grub2-i386-pc-2.06-150400.11.46.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1207230 * https://bugzilla.suse.com/show_bug.cgi?id=1217102 * https://bugzilla.suse.com/show_bug.cgi?id=1223535 * https://bugzilla.suse.com/show_bug.cgi?id=1226100 * https://bugzilla.suse.com/show_bug.cgi?id=1228124 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Aug 15 12:30:22 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 15 Aug 2024 12:30:22 -0000 Subject: SUSE-SU-2024:2931-1: moderate: Security update for openssl-3 Message-ID: <172372502270.3187.17492125831892258089@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2024:2931-1 Rating: moderate References: * bsc#1226463 * bsc#1227138 Cross-References: * CVE-2024-5535 CVSS scores: * CVE-2024-5535 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138) Other fixes: \- Build with no-afalgeng (bsc#1226463) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2931=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2931=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2931=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2931=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2931=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2931=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2931=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2931=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2931=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2931=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2931=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2931=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2931=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * openssl-3-3.0.8-150400.4.60.1 * libopenssl-3-devel-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * openssl-3-debuginfo-3.0.8-150400.4.60.1 * libopenssl3-3.0.8-150400.4.60.1 * libopenssl3-debuginfo-3.0.8-150400.4.60.1 * openSUSE Leap 15.4 (x86_64) * libopenssl-3-devel-32bit-3.0.8-150400.4.60.1 * libopenssl3-32bit-3.0.8-150400.4.60.1 * libopenssl3-32bit-debuginfo-3.0.8-150400.4.60.1 * openSUSE Leap 15.4 (noarch) * openssl-3-doc-3.0.8-150400.4.60.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libopenssl-3-devel-64bit-3.0.8-150400.4.60.1 * libopenssl3-64bit-3.0.8-150400.4.60.1 * libopenssl3-64bit-debuginfo-3.0.8-150400.4.60.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * libopenssl3-3.0.8-150400.4.60.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libopenssl3-debuginfo-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * libopenssl3-3.0.8-150400.4.60.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libopenssl3-3.0.8-150400.4.60.1 * libopenssl3-debuginfo-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libopenssl3-3.0.8-150400.4.60.1 * libopenssl3-debuginfo-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * openssl-3-3.0.8-150400.4.60.1 * libopenssl-3-devel-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * openssl-3-debuginfo-3.0.8-150400.4.60.1 * libopenssl3-3.0.8-150400.4.60.1 * libopenssl3-debuginfo-3.0.8-150400.4.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * openssl-3-3.0.8-150400.4.60.1 * libopenssl-3-devel-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * openssl-3-debuginfo-3.0.8-150400.4.60.1 * libopenssl3-3.0.8-150400.4.60.1 * libopenssl3-debuginfo-3.0.8-150400.4.60.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * openssl-3-3.0.8-150400.4.60.1 * libopenssl-3-devel-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * openssl-3-debuginfo-3.0.8-150400.4.60.1 * libopenssl3-3.0.8-150400.4.60.1 * libopenssl3-debuginfo-3.0.8-150400.4.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * openssl-3-3.0.8-150400.4.60.1 * libopenssl-3-devel-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * openssl-3-debuginfo-3.0.8-150400.4.60.1 * libopenssl3-3.0.8-150400.4.60.1 * libopenssl3-debuginfo-3.0.8-150400.4.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openssl-3-3.0.8-150400.4.60.1 * libopenssl-3-devel-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * openssl-3-debuginfo-3.0.8-150400.4.60.1 * libopenssl3-3.0.8-150400.4.60.1 * libopenssl3-debuginfo-3.0.8-150400.4.60.1 * SUSE Manager Proxy 4.3 (x86_64) * openssl-3-3.0.8-150400.4.60.1 * libopenssl-3-devel-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * openssl-3-debuginfo-3.0.8-150400.4.60.1 * libopenssl3-3.0.8-150400.4.60.1 * libopenssl3-debuginfo-3.0.8-150400.4.60.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * openssl-3-3.0.8-150400.4.60.1 * libopenssl-3-devel-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * openssl-3-debuginfo-3.0.8-150400.4.60.1 * libopenssl3-3.0.8-150400.4.60.1 * libopenssl3-debuginfo-3.0.8-150400.4.60.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * openssl-3-3.0.8-150400.4.60.1 * libopenssl-3-devel-3.0.8-150400.4.60.1 * openssl-3-debugsource-3.0.8-150400.4.60.1 * openssl-3-debuginfo-3.0.8-150400.4.60.1 * libopenssl3-3.0.8-150400.4.60.1 * libopenssl3-debuginfo-3.0.8-150400.4.60.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5535.html * https://bugzilla.suse.com/show_bug.cgi?id=1226463 * https://bugzilla.suse.com/show_bug.cgi?id=1227138 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Aug 15 12:33:02 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 15 Aug 2024 12:33:02 -0000 Subject: SUSE-SU-2024:2929-1: important: Security update for the Linux Kernel Message-ID: <172372518200.3187.3118786254079703314@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:2929-1 Rating: important References: * bsc#1156395 * bsc#1190336 * bsc#1191958 * bsc#1193454 * bsc#1193554 * bsc#1193787 * bsc#1193883 * bsc#1194324 * bsc#1194826 * bsc#1194869 * bsc#1195065 * bsc#1195254 * bsc#1195341 * bsc#1195349 * bsc#1195357 * bsc#1195668 * bsc#1195927 * bsc#1195957 * bsc#1196018 * bsc#1196746 * bsc#1196823 * bsc#1197146 * bsc#1197246 * bsc#1197762 * bsc#1197915 * bsc#1198014 * bsc#1199295 * bsc#1202346 * bsc#1202686 * bsc#1202767 * bsc#1202780 * bsc#1209636 * bsc#1213123 * bsc#1215587 * bsc#1216834 * bsc#1218820 * bsc#1220185 * bsc#1220186 * bsc#1220187 * bsc#1221044 * bsc#1222011 * bsc#1222728 * bsc#1222809 * bsc#1222810 * bsc#1223635 * bsc#1223863 * bsc#1224488 * bsc#1224495 * bsc#1224671 * bsc#1225573 * bsc#1225829 * bsc#1226168 * bsc#1226226 * bsc#1226519 * bsc#1226537 * bsc#1226539 * bsc#1226550 * bsc#1226553 * bsc#1226554 * bsc#1226556 * bsc#1226557 * bsc#1226558 * bsc#1226559 * bsc#1226561 * bsc#1226562 * bsc#1226563 * bsc#1226564 * bsc#1226567 * bsc#1226569 * bsc#1226572 * bsc#1226574 * bsc#1226575 * bsc#1226576 * bsc#1226577 * bsc#1226580 * bsc#1226583 * bsc#1226585 * bsc#1226587 * bsc#1226601 * bsc#1226602 * bsc#1226603 * bsc#1226607 * bsc#1226614 * bsc#1226617 * bsc#1226618 * bsc#1226619 * bsc#1226621 * bsc#1226624 * bsc#1226626 * bsc#1226628 * bsc#1226629 * bsc#1226643 * bsc#1226644 * bsc#1226645 * bsc#1226650 * bsc#1226653 * bsc#1226662 * bsc#1226669 * bsc#1226670 * bsc#1226672 * bsc#1226673 * bsc#1226674 * bsc#1226675 * bsc#1226679 * bsc#1226683 * bsc#1226685 * bsc#1226686 * bsc#1226690 * bsc#1226691 * bsc#1226692 * bsc#1226696 * bsc#1226697 * bsc#1226698 * bsc#1226699 * bsc#1226701 * bsc#1226702 * bsc#1226703 * bsc#1226705 * bsc#1226708 * bsc#1226709 * bsc#1226710 * bsc#1226711 * bsc#1226712 * bsc#1226713 * bsc#1226715 * bsc#1226716 * bsc#1226719 * bsc#1226720 * bsc#1226721 * bsc#1226732 * bsc#1226758 * bsc#1226762 * bsc#1226785 * bsc#1227090 * bsc#1227383 * bsc#1227487 * bsc#1227549 * bsc#1227716 * bsc#1227750 * bsc#1227764 * bsc#1227808 * bsc#1227810 * bsc#1227823 * bsc#1227829 * bsc#1227836 * bsc#1227917 * bsc#1227920 * bsc#1227921 * bsc#1227922 * bsc#1227923 * bsc#1227924 * bsc#1227925 * bsc#1227928 * bsc#1227931 * bsc#1227932 * bsc#1227933 * bsc#1227935 * bsc#1227938 * bsc#1227941 * bsc#1227942 * bsc#1227944 * bsc#1227945 * bsc#1227948 * bsc#1227949 * bsc#1227952 * bsc#1227953 * bsc#1227954 * bsc#1227956 * bsc#1227963 * bsc#1227964 * bsc#1227965 * bsc#1227968 * bsc#1227969 * bsc#1227970 * bsc#1227971 * bsc#1227972 * bsc#1227975 * bsc#1227976 * bsc#1227981 * bsc#1227982 * bsc#1227985 * bsc#1227986 * bsc#1227987 * bsc#1227988 * bsc#1227989 * bsc#1227990 * bsc#1227991 * bsc#1227993 * bsc#1227995 * bsc#1227996 * bsc#1227997 * bsc#1228000 * bsc#1228002 * bsc#1228004 * bsc#1228005 * bsc#1228006 * bsc#1228007 * bsc#1228008 * bsc#1228009 * bsc#1228010 * bsc#1228013 * bsc#1228014 * bsc#1228015 * bsc#1228019 * bsc#1228025 * bsc#1228028 * bsc#1228035 * bsc#1228037 * bsc#1228038 * bsc#1228039 * bsc#1228040 * bsc#1228045 * bsc#1228054 * bsc#1228055 * bsc#1228056 * bsc#1228060 * bsc#1228061 * bsc#1228062 * bsc#1228063 * bsc#1228064 * bsc#1228066 * bsc#1228114 * bsc#1228247 * bsc#1228328 * bsc#1228440 * bsc#1228561 * bsc#1228644 * bsc#1228680 * bsc#1228743 * bsc#1228801 Cross-References: * CVE-2021-4439 * CVE-2021-47534 * CVE-2021-47576 * CVE-2021-47578 * CVE-2021-47580 * CVE-2021-47582 * CVE-2021-47583 * CVE-2021-47584 * CVE-2021-47585 * CVE-2021-47586 * CVE-2021-47587 * CVE-2021-47589 * CVE-2021-47592 * CVE-2021-47596 * CVE-2021-47597 * CVE-2021-47598 * CVE-2021-47600 * CVE-2021-47601 * CVE-2021-47602 * CVE-2021-47603 * CVE-2021-47607 * CVE-2021-47608 * CVE-2021-47609 * CVE-2021-47611 * CVE-2021-47612 * CVE-2021-47614 * CVE-2021-47615 * CVE-2021-47616 * CVE-2021-47617 * CVE-2021-47618 * CVE-2021-47619 * CVE-2021-47620 * CVE-2021-47622 * CVE-2021-47624 * CVE-2022-0854 * CVE-2022-20368 * CVE-2022-28748 * CVE-2022-2964 * CVE-2022-48711 * CVE-2022-48712 * CVE-2022-48713 * CVE-2022-48715 * CVE-2022-48717 * CVE-2022-48720 * CVE-2022-48721 * CVE-2022-48722 * CVE-2022-48723 * CVE-2022-48724 * CVE-2022-48725 * CVE-2022-48726 * CVE-2022-48727 * CVE-2022-48728 * CVE-2022-48729 * CVE-2022-48730 * CVE-2022-48732 * CVE-2022-48734 * CVE-2022-48735 * CVE-2022-48736 * CVE-2022-48737 * CVE-2022-48738 * CVE-2022-48739 * CVE-2022-48740 * CVE-2022-48743 * CVE-2022-48744 * CVE-2022-48745 * CVE-2022-48746 * CVE-2022-48747 * CVE-2022-48749 * CVE-2022-48751 * CVE-2022-48752 * CVE-2022-48754 * CVE-2022-48756 * CVE-2022-48758 * CVE-2022-48759 * CVE-2022-48760 * CVE-2022-48761 * CVE-2022-48763 * CVE-2022-48765 * CVE-2022-48767 * CVE-2022-48768 * CVE-2022-48769 * CVE-2022-48771 * CVE-2022-48773 * CVE-2022-48774 * CVE-2022-48775 * CVE-2022-48776 * CVE-2022-48777 * CVE-2022-48778 * CVE-2022-48780 * CVE-2022-48783 * CVE-2022-48784 * CVE-2022-48786 * CVE-2022-48787 * CVE-2022-48788 * CVE-2022-48789 * CVE-2022-48790 * CVE-2022-48791 * CVE-2022-48792 * CVE-2022-48793 * CVE-2022-48794 * CVE-2022-48796 * CVE-2022-48797 * CVE-2022-48798 * CVE-2022-48799 * CVE-2022-48800 * CVE-2022-48801 * CVE-2022-48802 * CVE-2022-48803 * CVE-2022-48804 * CVE-2022-48805 * CVE-2022-48806 * CVE-2022-48807 * CVE-2022-48811 * CVE-2022-48812 * CVE-2022-48813 * CVE-2022-48814 * CVE-2022-48815 * CVE-2022-48816 * CVE-2022-48817 * CVE-2022-48818 * CVE-2022-48820 * CVE-2022-48821 * CVE-2022-48822 * CVE-2022-48823 * CVE-2022-48824 * CVE-2022-48825 * CVE-2022-48826 * CVE-2022-48827 * CVE-2022-48828 * CVE-2022-48829 * CVE-2022-48830 * CVE-2022-48831 * CVE-2022-48834 * CVE-2022-48835 * CVE-2022-48836 * CVE-2022-48837 * CVE-2022-48838 * CVE-2022-48839 * CVE-2022-48840 * CVE-2022-48841 * CVE-2022-48842 * CVE-2022-48843 * CVE-2022-48847 * CVE-2022-48849 * CVE-2022-48851 * CVE-2022-48853 * CVE-2022-48856 * CVE-2022-48857 * CVE-2022-48858 * CVE-2022-48859 * CVE-2022-48860 * CVE-2022-48861 * CVE-2022-48862 * CVE-2022-48863 * CVE-2022-48866 * CVE-2023-1582 * CVE-2023-37453 * CVE-2023-52591 * CVE-2023-52762 * CVE-2023-52766 * CVE-2023-52800 * CVE-2023-52885 * CVE-2023-52886 * CVE-2024-26583 * CVE-2024-26584 * CVE-2024-26585 * CVE-2024-26800 * CVE-2024-26813 * CVE-2024-26814 * CVE-2024-26976 * CVE-2024-35878 * CVE-2024-35901 * CVE-2024-35905 * CVE-2024-36926 * CVE-2024-36974 * CVE-2024-38541 * CVE-2024-38555 * CVE-2024-38559 * CVE-2024-39463 * CVE-2024-39494 * CVE-2024-40902 * CVE-2024-40937 * CVE-2024-40954 * CVE-2024-40956 * CVE-2024-40989 * CVE-2024-40994 * CVE-2024-41011 * CVE-2024-41012 * CVE-2024-41059 * CVE-2024-41069 * CVE-2024-41090 * CVE-2024-42093 * CVE-2024-42145 * CVE-2024-42230 CVSS scores: * CVE-2021-4439 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47576 ( SUSE ): 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47578 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47580 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2021-47582 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47585 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47587 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47597 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47600 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47603 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47614 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47615 ( SUSE ): 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47616 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47617 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47620 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47622 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47624 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-0854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-0854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-20368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-20368 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-28748 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2022-2964 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48711 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48712 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-48713 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48715 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-48717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48720 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48722 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48723 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48724 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48725 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48727 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-48728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48734 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48735 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48736 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-48737 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-48738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48747 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-48749 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48751 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48763 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48769 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48771 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48774 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-48775 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48776 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48778 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-48780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48786 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-48787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48787 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48792 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48792 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48796 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-48798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48799 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48800 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48801 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48803 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-48804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48805 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-48807 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48816 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48821 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48822 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48822 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48823 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-48826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-48829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-48830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48834 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-48834 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48836 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48837 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48838 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48842 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48842 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48843 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-48851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48851 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48863 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48866 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-48866 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-1582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1582 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-37453 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-37453 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26583 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26583 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26800 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26813 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36974 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38541 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38559 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39463 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39494 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41069 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42230 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 194 vulnerabilities and has 36 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716). * CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743) * CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829). * CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247). * CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680). * CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561). * CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328). * CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114). * CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574). * CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836). * CVE-2024-35901: net: mana: Fix Rx DMA datasize and skb_over_panic (bsc#1224495). * CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869). * CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187). * CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519). * CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607). The following non-security bugs were fixed: * NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662). * NFS: Reduce use of uncached readdir (bsc#1226662). * NFSv4.x: by default serialize open/close operations (bsc#1226226 bsc#1223863). * X.509: Fix the parser of extended key usage for length (bsc#1218820). * btrfs: sysfs: update fs features directory asynchronously (bsc#1226168). * cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801). * jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383). * kABI: rtas: Workaround false positive due to lost definition (bsc#1227487). * kernel-binary: vdso: Own module_dir * net/dcb: check for detached device before executing callbacks (bsc#1215587). * ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834). * powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487). * powerpc/rtas: clean up includes (bsc#1227487). * workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454). * workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-2929=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2929=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2929=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2929=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2929=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2929=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2929=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2929=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2929=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2929=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2929=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2929=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2929=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2929=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2929=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. ## Package List: * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-5.14.21-150400.24.128.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.128.1 * cluster-md-kmp-default-5.14.21-150400.24.128.1 * ocfs2-kmp-default-5.14.21-150400.24.128.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1 * dlm-kmp-default-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * kernel-default-debugsource-5.14.21-150400.24.128.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1 * kernel-64kb-debugsource-5.14.21-150400.24.128.1 * kernel-64kb-debuginfo-5.14.21-150400.24.128.1 * kernel-64kb-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1 * kernel-syms-5.14.21-150400.24.128.1 * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * kernel-obs-build-debugsource-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * reiserfs-kmp-default-5.14.21-150400.24.128.1 * kernel-obs-build-5.14.21-150400.24.128.1 * kernel-default-debugsource-5.14.21-150400.24.128.1 * kernel-default-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.128.1 * kernel-macros-5.14.21-150400.24.128.1 * kernel-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1 * kernel-64kb-debugsource-5.14.21-150400.24.128.1 * kernel-64kb-debuginfo-5.14.21-150400.24.128.1 * kernel-64kb-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1 * kernel-syms-5.14.21-150400.24.128.1 * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * kernel-obs-build-debugsource-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * reiserfs-kmp-default-5.14.21-150400.24.128.1 * kernel-obs-build-5.14.21-150400.24.128.1 * kernel-default-debugsource-5.14.21-150400.24.128.1 * kernel-default-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.128.1 * kernel-macros-5.14.21-150400.24.128.1 * kernel-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64) * kernel-default-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.128.1 * kernel-syms-5.14.21-150400.24.128.1 * kernel-default-extra-5.14.21-150400.24.128.1 * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * kernel-obs-build-debugsource-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * kernel-obs-build-5.14.21-150400.24.128.1 * kernel-default-debugsource-5.14.21-150400.24.128.1 * kernel-default-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * kernel-source-5.14.21-150400.24.128.1 * kernel-macros-5.14.21-150400.24.128.1 * kernel-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1 * kernel-64kb-debugsource-5.14.21-150400.24.128.1 * kernel-64kb-debuginfo-5.14.21-150400.24.128.1 * kernel-64kb-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1 * kernel-syms-5.14.21-150400.24.128.1 * kernel-obs-build-debugsource-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * reiserfs-kmp-default-5.14.21-150400.24.128.1 * kernel-obs-build-5.14.21-150400.24.128.1 * kernel-default-debugsource-5.14.21-150400.24.128.1 * kernel-default-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * kernel-source-5.14.21-150400.24.128.1 * kernel-macros-5.14.21-150400.24.128.1 * kernel-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.128.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1 * kernel-syms-5.14.21-150400.24.128.1 * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * kernel-obs-build-debugsource-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * reiserfs-kmp-default-5.14.21-150400.24.128.1 * kernel-obs-build-5.14.21-150400.24.128.1 * kernel-default-debugsource-5.14.21-150400.24.128.1 * kernel-default-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.128.1 * kernel-macros-5.14.21-150400.24.128.1 * kernel-devel-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.128.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.128.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1 * kernel-syms-5.14.21-150400.24.128.1 * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * kernel-default-debugsource-5.14.21-150400.24.128.1 * kernel-default-devel-5.14.21-150400.24.128.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-source-5.14.21-150400.24.128.1 * kernel-macros-5.14.21-150400.24.128.1 * kernel-devel-5.14.21-150400.24.128.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.128.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1 * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * kernel-default-debugsource-5.14.21-150400.24.128.1 * kernel-default-devel-5.14.21-150400.24.128.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-macros-5.14.21-150400.24.128.1 * kernel-devel-5.14.21-150400.24.128.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.128.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1 * kernel-syms-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * kernel-default-debugsource-5.14.21-150400.24.128.1 * kernel-default-devel-5.14.21-150400.24.128.1 * SUSE Manager Server 4.3 (noarch) * kernel-source-5.14.21-150400.24.128.1 * kernel-macros-5.14.21-150400.24.128.1 * kernel-devel-5.14.21-150400.24.128.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.128.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.128.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (noarch) * kernel-source-5.14.21-150400.24.128.1 * kernel-devel-5.14.21-150400.24.128.1 * kernel-source-vanilla-5.14.21-150400.24.128.1 * kernel-macros-5.14.21-150400.24.128.1 * kernel-docs-html-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-debuginfo-5.14.21-150400.24.128.1 * kernel-debug-livepatch-devel-5.14.21-150400.24.128.1 * kernel-debug-debugsource-5.14.21-150400.24.128.1 * kernel-debug-devel-debuginfo-5.14.21-150400.24.128.1 * kernel-debug-devel-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-5.14.21-150400.24.128.1 * kernel-kvmsmall-devel-5.14.21-150400.24.128.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.128.1 * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.128.1 * kernel-default-base-rebuild-5.14.21-150400.24.128.1.150400.24.62.1 * kernel-kvmsmall-debugsource-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.128.1 * kselftests-kmp-default-5.14.21-150400.24.128.1 * kernel-syms-5.14.21-150400.24.128.1 * cluster-md-kmp-default-5.14.21-150400.24.128.1 * dlm-kmp-default-5.14.21-150400.24.128.1 * kernel-obs-build-debugsource-5.14.21-150400.24.128.1 * kernel-default-livepatch-5.14.21-150400.24.128.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.128.1 * kernel-default-devel-5.14.21-150400.24.128.1 * kernel-default-extra-5.14.21-150400.24.128.1 * kernel-default-debugsource-5.14.21-150400.24.128.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1 * gfs2-kmp-default-5.14.21-150400.24.128.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.128.1 * kernel-default-optional-5.14.21-150400.24.128.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.128.1 * ocfs2-kmp-default-5.14.21-150400.24.128.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * kernel-obs-build-5.14.21-150400.24.128.1 * kernel-default-livepatch-devel-5.14.21-150400.24.128.1 * kernel-obs-qa-5.14.21-150400.24.128.1 * reiserfs-kmp-default-5.14.21-150400.24.128.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-1-150400.9.3.1 * kernel-livepatch-SLE15-SP4_Update_29-debugsource-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.128.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (aarch64) * dtb-lg-5.14.21-150400.24.128.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1 * dtb-amd-5.14.21-150400.24.128.1 * ocfs2-kmp-64kb-5.14.21-150400.24.128.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.128.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.128.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.128.1 * dtb-exynos-5.14.21-150400.24.128.1 * dtb-apple-5.14.21-150400.24.128.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.128.1 * dtb-cavium-5.14.21-150400.24.128.1 * kernel-64kb-debugsource-5.14.21-150400.24.128.1 * kernel-64kb-devel-5.14.21-150400.24.128.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.128.1 * dtb-allwinner-5.14.21-150400.24.128.1 * kernel-64kb-optional-5.14.21-150400.24.128.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.128.1 * reiserfs-kmp-64kb-5.14.21-150400.24.128.1 * dtb-freescale-5.14.21-150400.24.128.1 * kernel-64kb-extra-5.14.21-150400.24.128.1 * dtb-altera-5.14.21-150400.24.128.1 * dtb-mediatek-5.14.21-150400.24.128.1 * dtb-arm-5.14.21-150400.24.128.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.128.1 * dtb-amlogic-5.14.21-150400.24.128.1 * dtb-renesas-5.14.21-150400.24.128.1 * dtb-hisilicon-5.14.21-150400.24.128.1 * cluster-md-kmp-64kb-5.14.21-150400.24.128.1 * kselftests-kmp-64kb-5.14.21-150400.24.128.1 * dtb-apm-5.14.21-150400.24.128.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.128.1 * dtb-rockchip-5.14.21-150400.24.128.1 * gfs2-kmp-64kb-5.14.21-150400.24.128.1 * dlm-kmp-64kb-5.14.21-150400.24.128.1 * dtb-broadcom-5.14.21-150400.24.128.1 * dtb-marvell-5.14.21-150400.24.128.1 * dtb-sprd-5.14.21-150400.24.128.1 * dtb-qcom-5.14.21-150400.24.128.1 * kernel-64kb-livepatch-devel-5.14.21-150400.24.128.1 * kernel-64kb-debuginfo-5.14.21-150400.24.128.1 * dtb-nvidia-5.14.21-150400.24.128.1 * dtb-xilinx-5.14.21-150400.24.128.1 * dtb-socionext-5.14.21-150400.24.128.1 * dtb-amazon-5.14.21-150400.24.128.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.128.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_29-debugsource-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1 * kernel-default-livepatch-devel-5.14.21-150400.24.128.1 * kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-1-150400.9.3.1 * kernel-default-livepatch-5.14.21-150400.24.128.1 * kernel-default-debuginfo-5.14.21-150400.24.128.1 * kernel-default-debugsource-5.14.21-150400.24.128.1 ## References: * https://www.suse.com/security/cve/CVE-2021-4439.html * https://www.suse.com/security/cve/CVE-2021-47534.html * https://www.suse.com/security/cve/CVE-2021-47576.html * https://www.suse.com/security/cve/CVE-2021-47578.html * https://www.suse.com/security/cve/CVE-2021-47580.html * https://www.suse.com/security/cve/CVE-2021-47582.html * https://www.suse.com/security/cve/CVE-2021-47583.html * https://www.suse.com/security/cve/CVE-2021-47584.html * https://www.suse.com/security/cve/CVE-2021-47585.html * https://www.suse.com/security/cve/CVE-2021-47586.html * https://www.suse.com/security/cve/CVE-2021-47587.html * https://www.suse.com/security/cve/CVE-2021-47589.html * https://www.suse.com/security/cve/CVE-2021-47592.html * https://www.suse.com/security/cve/CVE-2021-47596.html * https://www.suse.com/security/cve/CVE-2021-47597.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2021-47600.html * https://www.suse.com/security/cve/CVE-2021-47601.html * https://www.suse.com/security/cve/CVE-2021-47602.html * https://www.suse.com/security/cve/CVE-2021-47603.html * https://www.suse.com/security/cve/CVE-2021-47607.html * https://www.suse.com/security/cve/CVE-2021-47608.html * https://www.suse.com/security/cve/CVE-2021-47609.html * https://www.suse.com/security/cve/CVE-2021-47611.html * https://www.suse.com/security/cve/CVE-2021-47612.html * https://www.suse.com/security/cve/CVE-2021-47614.html * https://www.suse.com/security/cve/CVE-2021-47615.html * https://www.suse.com/security/cve/CVE-2021-47616.html * https://www.suse.com/security/cve/CVE-2021-47617.html * https://www.suse.com/security/cve/CVE-2021-47618.html * https://www.suse.com/security/cve/CVE-2021-47619.html * https://www.suse.com/security/cve/CVE-2021-47620.html * https://www.suse.com/security/cve/CVE-2021-47622.html * https://www.suse.com/security/cve/CVE-2021-47624.html * https://www.suse.com/security/cve/CVE-2022-0854.html * https://www.suse.com/security/cve/CVE-2022-20368.html * https://www.suse.com/security/cve/CVE-2022-28748.html * https://www.suse.com/security/cve/CVE-2022-2964.html * https://www.suse.com/security/cve/CVE-2022-48711.html * https://www.suse.com/security/cve/CVE-2022-48712.html * https://www.suse.com/security/cve/CVE-2022-48713.html * https://www.suse.com/security/cve/CVE-2022-48715.html * https://www.suse.com/security/cve/CVE-2022-48717.html * https://www.suse.com/security/cve/CVE-2022-48720.html * https://www.suse.com/security/cve/CVE-2022-48721.html * https://www.suse.com/security/cve/CVE-2022-48722.html * https://www.suse.com/security/cve/CVE-2022-48723.html * https://www.suse.com/security/cve/CVE-2022-48724.html * https://www.suse.com/security/cve/CVE-2022-48725.html * https://www.suse.com/security/cve/CVE-2022-48726.html * https://www.suse.com/security/cve/CVE-2022-48727.html * https://www.suse.com/security/cve/CVE-2022-48728.html * https://www.suse.com/security/cve/CVE-2022-48729.html * https://www.suse.com/security/cve/CVE-2022-48730.html * https://www.suse.com/security/cve/CVE-2022-48732.html * https://www.suse.com/security/cve/CVE-2022-48734.html * https://www.suse.com/security/cve/CVE-2022-48735.html * https://www.suse.com/security/cve/CVE-2022-48736.html * https://www.suse.com/security/cve/CVE-2022-48737.html * https://www.suse.com/security/cve/CVE-2022-48738.html * https://www.suse.com/security/cve/CVE-2022-48739.html * https://www.suse.com/security/cve/CVE-2022-48740.html * https://www.suse.com/security/cve/CVE-2022-48743.html * https://www.suse.com/security/cve/CVE-2022-48744.html * https://www.suse.com/security/cve/CVE-2022-48745.html * https://www.suse.com/security/cve/CVE-2022-48746.html * https://www.suse.com/security/cve/CVE-2022-48747.html * https://www.suse.com/security/cve/CVE-2022-48749.html * https://www.suse.com/security/cve/CVE-2022-48751.html * https://www.suse.com/security/cve/CVE-2022-48752.html * https://www.suse.com/security/cve/CVE-2022-48754.html * https://www.suse.com/security/cve/CVE-2022-48756.html * https://www.suse.com/security/cve/CVE-2022-48758.html * https://www.suse.com/security/cve/CVE-2022-48759.html * https://www.suse.com/security/cve/CVE-2022-48760.html * https://www.suse.com/security/cve/CVE-2022-48761.html * https://www.suse.com/security/cve/CVE-2022-48763.html * https://www.suse.com/security/cve/CVE-2022-48765.html * https://www.suse.com/security/cve/CVE-2022-48767.html * https://www.suse.com/security/cve/CVE-2022-48768.html * https://www.suse.com/security/cve/CVE-2022-48769.html * https://www.suse.com/security/cve/CVE-2022-48771.html * https://www.suse.com/security/cve/CVE-2022-48773.html * https://www.suse.com/security/cve/CVE-2022-48774.html * https://www.suse.com/security/cve/CVE-2022-48775.html * https://www.suse.com/security/cve/CVE-2022-48776.html * https://www.suse.com/security/cve/CVE-2022-48777.html * https://www.suse.com/security/cve/CVE-2022-48778.html * https://www.suse.com/security/cve/CVE-2022-48780.html * https://www.suse.com/security/cve/CVE-2022-48783.html * https://www.suse.com/security/cve/CVE-2022-48784.html * https://www.suse.com/security/cve/CVE-2022-48786.html * https://www.suse.com/security/cve/CVE-2022-48787.html * https://www.suse.com/security/cve/CVE-2022-48788.html * https://www.suse.com/security/cve/CVE-2022-48789.html * https://www.suse.com/security/cve/CVE-2022-48790.html * https://www.suse.com/security/cve/CVE-2022-48791.html * https://www.suse.com/security/cve/CVE-2022-48792.html * https://www.suse.com/security/cve/CVE-2022-48793.html * https://www.suse.com/security/cve/CVE-2022-48794.html * https://www.suse.com/security/cve/CVE-2022-48796.html * https://www.suse.com/security/cve/CVE-2022-48797.html * https://www.suse.com/security/cve/CVE-2022-48798.html * https://www.suse.com/security/cve/CVE-2022-48799.html * https://www.suse.com/security/cve/CVE-2022-48800.html * https://www.suse.com/security/cve/CVE-2022-48801.html * https://www.suse.com/security/cve/CVE-2022-48802.html * https://www.suse.com/security/cve/CVE-2022-48803.html * https://www.suse.com/security/cve/CVE-2022-48804.html * https://www.suse.com/security/cve/CVE-2022-48805.html * https://www.suse.com/security/cve/CVE-2022-48806.html * https://www.suse.com/security/cve/CVE-2022-48807.html * https://www.suse.com/security/cve/CVE-2022-48811.html * https://www.suse.com/security/cve/CVE-2022-48812.html * https://www.suse.com/security/cve/CVE-2022-48813.html * https://www.suse.com/security/cve/CVE-2022-48814.html * https://www.suse.com/security/cve/CVE-2022-48815.html * https://www.suse.com/security/cve/CVE-2022-48816.html * https://www.suse.com/security/cve/CVE-2022-48817.html * https://www.suse.com/security/cve/CVE-2022-48818.html * https://www.suse.com/security/cve/CVE-2022-48820.html * https://www.suse.com/security/cve/CVE-2022-48821.html * https://www.suse.com/security/cve/CVE-2022-48822.html * https://www.suse.com/security/cve/CVE-2022-48823.html * https://www.suse.com/security/cve/CVE-2022-48824.html * https://www.suse.com/security/cve/CVE-2022-48825.html * https://www.suse.com/security/cve/CVE-2022-48826.html * https://www.suse.com/security/cve/CVE-2022-48827.html * https://www.suse.com/security/cve/CVE-2022-48828.html * https://www.suse.com/security/cve/CVE-2022-48829.html * https://www.suse.com/security/cve/CVE-2022-48830.html * https://www.suse.com/security/cve/CVE-2022-48831.html * https://www.suse.com/security/cve/CVE-2022-48834.html * https://www.suse.com/security/cve/CVE-2022-48835.html * https://www.suse.com/security/cve/CVE-2022-48836.html * https://www.suse.com/security/cve/CVE-2022-48837.html * https://www.suse.com/security/cve/CVE-2022-48838.html * https://www.suse.com/security/cve/CVE-2022-48839.html * https://www.suse.com/security/cve/CVE-2022-48840.html * https://www.suse.com/security/cve/CVE-2022-48841.html * https://www.suse.com/security/cve/CVE-2022-48842.html * https://www.suse.com/security/cve/CVE-2022-48843.html * https://www.suse.com/security/cve/CVE-2022-48847.html * https://www.suse.com/security/cve/CVE-2022-48849.html * https://www.suse.com/security/cve/CVE-2022-48851.html * https://www.suse.com/security/cve/CVE-2022-48853.html * https://www.suse.com/security/cve/CVE-2022-48856.html * https://www.suse.com/security/cve/CVE-2022-48857.html * https://www.suse.com/security/cve/CVE-2022-48858.html * https://www.suse.com/security/cve/CVE-2022-48859.html * https://www.suse.com/security/cve/CVE-2022-48860.html * https://www.suse.com/security/cve/CVE-2022-48861.html * https://www.suse.com/security/cve/CVE-2022-48862.html * https://www.suse.com/security/cve/CVE-2022-48863.html * https://www.suse.com/security/cve/CVE-2022-48866.html * https://www.suse.com/security/cve/CVE-2023-1582.html * https://www.suse.com/security/cve/CVE-2023-37453.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52762.html * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52885.html * https://www.suse.com/security/cve/CVE-2023-52886.html * https://www.suse.com/security/cve/CVE-2024-26583.html * https://www.suse.com/security/cve/CVE-2024-26584.html * https://www.suse.com/security/cve/CVE-2024-26585.html * https://www.suse.com/security/cve/CVE-2024-26800.html * https://www.suse.com/security/cve/CVE-2024-26813.html * https://www.suse.com/security/cve/CVE-2024-26814.html * https://www.suse.com/security/cve/CVE-2024-26976.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35901.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-36926.html * https://www.suse.com/security/cve/CVE-2024-36974.html * https://www.suse.com/security/cve/CVE-2024-38541.html * https://www.suse.com/security/cve/CVE-2024-38555.html * https://www.suse.com/security/cve/CVE-2024-38559.html * https://www.suse.com/security/cve/CVE-2024-39463.html * https://www.suse.com/security/cve/CVE-2024-39494.html * https://www.suse.com/security/cve/CVE-2024-40902.html * https://www.suse.com/security/cve/CVE-2024-40937.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-40956.html * https://www.suse.com/security/cve/CVE-2024-40989.html * https://www.suse.com/security/cve/CVE-2024-40994.html * https://www.suse.com/security/cve/CVE-2024-41011.html * https://www.suse.com/security/cve/CVE-2024-41012.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-41069.html * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-42093.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-42230.html * https://bugzilla.suse.com/show_bug.cgi?id=1156395 * https://bugzilla.suse.com/show_bug.cgi?id=1190336 * https://bugzilla.suse.com/show_bug.cgi?id=1191958 * https://bugzilla.suse.com/show_bug.cgi?id=1193454 * https://bugzilla.suse.com/show_bug.cgi?id=1193554 * https://bugzilla.suse.com/show_bug.cgi?id=1193787 * https://bugzilla.suse.com/show_bug.cgi?id=1193883 * https://bugzilla.suse.com/show_bug.cgi?id=1194324 * https://bugzilla.suse.com/show_bug.cgi?id=1194826 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1195065 * https://bugzilla.suse.com/show_bug.cgi?id=1195254 * https://bugzilla.suse.com/show_bug.cgi?id=1195341 * https://bugzilla.suse.com/show_bug.cgi?id=1195349 * https://bugzilla.suse.com/show_bug.cgi?id=1195357 * https://bugzilla.suse.com/show_bug.cgi?id=1195668 * https://bugzilla.suse.com/show_bug.cgi?id=1195927 * https://bugzilla.suse.com/show_bug.cgi?id=1195957 * https://bugzilla.suse.com/show_bug.cgi?id=1196018 * https://bugzilla.suse.com/show_bug.cgi?id=1196746 * https://bugzilla.suse.com/show_bug.cgi?id=1196823 * https://bugzilla.suse.com/show_bug.cgi?id=1197146 * https://bugzilla.suse.com/show_bug.cgi?id=1197246 * https://bugzilla.suse.com/show_bug.cgi?id=1197762 * https://bugzilla.suse.com/show_bug.cgi?id=1197915 * https://bugzilla.suse.com/show_bug.cgi?id=1198014 * https://bugzilla.suse.com/show_bug.cgi?id=1199295 * https://bugzilla.suse.com/show_bug.cgi?id=1202346 * https://bugzilla.suse.com/show_bug.cgi?id=1202686 * https://bugzilla.suse.com/show_bug.cgi?id=1202767 * https://bugzilla.suse.com/show_bug.cgi?id=1202780 * https://bugzilla.suse.com/show_bug.cgi?id=1209636 * https://bugzilla.suse.com/show_bug.cgi?id=1213123 * https://bugzilla.suse.com/show_bug.cgi?id=1215587 * https://bugzilla.suse.com/show_bug.cgi?id=1216834 * https://bugzilla.suse.com/show_bug.cgi?id=1218820 * https://bugzilla.suse.com/show_bug.cgi?id=1220185 * https://bugzilla.suse.com/show_bug.cgi?id=1220186 * https://bugzilla.suse.com/show_bug.cgi?id=1220187 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1222011 * https://bugzilla.suse.com/show_bug.cgi?id=1222728 * https://bugzilla.suse.com/show_bug.cgi?id=1222809 * https://bugzilla.suse.com/show_bug.cgi?id=1222810 * https://bugzilla.suse.com/show_bug.cgi?id=1223635 * https://bugzilla.suse.com/show_bug.cgi?id=1223863 * https://bugzilla.suse.com/show_bug.cgi?id=1224488 * https://bugzilla.suse.com/show_bug.cgi?id=1224495 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1225573 * https://bugzilla.suse.com/show_bug.cgi?id=1225829 * https://bugzilla.suse.com/show_bug.cgi?id=1226168 * https://bugzilla.suse.com/show_bug.cgi?id=1226226 * https://bugzilla.suse.com/show_bug.cgi?id=1226519 * https://bugzilla.suse.com/show_bug.cgi?id=1226537 * https://bugzilla.suse.com/show_bug.cgi?id=1226539 * https://bugzilla.suse.com/show_bug.cgi?id=1226550 * https://bugzilla.suse.com/show_bug.cgi?id=1226553 * https://bugzilla.suse.com/show_bug.cgi?id=1226554 * https://bugzilla.suse.com/show_bug.cgi?id=1226556 * https://bugzilla.suse.com/show_bug.cgi?id=1226557 * https://bugzilla.suse.com/show_bug.cgi?id=1226558 * https://bugzilla.suse.com/show_bug.cgi?id=1226559 * https://bugzilla.suse.com/show_bug.cgi?id=1226561 * https://bugzilla.suse.com/show_bug.cgi?id=1226562 * https://bugzilla.suse.com/show_bug.cgi?id=1226563 * https://bugzilla.suse.com/show_bug.cgi?id=1226564 * https://bugzilla.suse.com/show_bug.cgi?id=1226567 * https://bugzilla.suse.com/show_bug.cgi?id=1226569 * https://bugzilla.suse.com/show_bug.cgi?id=1226572 * https://bugzilla.suse.com/show_bug.cgi?id=1226574 * https://bugzilla.suse.com/show_bug.cgi?id=1226575 * https://bugzilla.suse.com/show_bug.cgi?id=1226576 * https://bugzilla.suse.com/show_bug.cgi?id=1226577 * https://bugzilla.suse.com/show_bug.cgi?id=1226580 * https://bugzilla.suse.com/show_bug.cgi?id=1226583 * https://bugzilla.suse.com/show_bug.cgi?id=1226585 * https://bugzilla.suse.com/show_bug.cgi?id=1226587 * https://bugzilla.suse.com/show_bug.cgi?id=1226601 * https://bugzilla.suse.com/show_bug.cgi?id=1226602 * https://bugzilla.suse.com/show_bug.cgi?id=1226603 * https://bugzilla.suse.com/show_bug.cgi?id=1226607 * https://bugzilla.suse.com/show_bug.cgi?id=1226614 * https://bugzilla.suse.com/show_bug.cgi?id=1226617 * https://bugzilla.suse.com/show_bug.cgi?id=1226618 * https://bugzilla.suse.com/show_bug.cgi?id=1226619 * https://bugzilla.suse.com/show_bug.cgi?id=1226621 * https://bugzilla.suse.com/show_bug.cgi?id=1226624 * https://bugzilla.suse.com/show_bug.cgi?id=1226626 * https://bugzilla.suse.com/show_bug.cgi?id=1226628 * https://bugzilla.suse.com/show_bug.cgi?id=1226629 * https://bugzilla.suse.com/show_bug.cgi?id=1226643 * https://bugzilla.suse.com/show_bug.cgi?id=1226644 * https://bugzilla.suse.com/show_bug.cgi?id=1226645 * https://bugzilla.suse.com/show_bug.cgi?id=1226650 * https://bugzilla.suse.com/show_bug.cgi?id=1226653 * https://bugzilla.suse.com/show_bug.cgi?id=1226662 * https://bugzilla.suse.com/show_bug.cgi?id=1226669 * https://bugzilla.suse.com/show_bug.cgi?id=1226670 * https://bugzilla.suse.com/show_bug.cgi?id=1226672 * https://bugzilla.suse.com/show_bug.cgi?id=1226673 * https://bugzilla.suse.com/show_bug.cgi?id=1226674 * https://bugzilla.suse.com/show_bug.cgi?id=1226675 * https://bugzilla.suse.com/show_bug.cgi?id=1226679 * https://bugzilla.suse.com/show_bug.cgi?id=1226683 * https://bugzilla.suse.com/show_bug.cgi?id=1226685 * https://bugzilla.suse.com/show_bug.cgi?id=1226686 * https://bugzilla.suse.com/show_bug.cgi?id=1226690 * https://bugzilla.suse.com/show_bug.cgi?id=1226691 * https://bugzilla.suse.com/show_bug.cgi?id=1226692 * https://bugzilla.suse.com/show_bug.cgi?id=1226696 * https://bugzilla.suse.com/show_bug.cgi?id=1226697 * https://bugzilla.suse.com/show_bug.cgi?id=1226698 * https://bugzilla.suse.com/show_bug.cgi?id=1226699 * https://bugzilla.suse.com/show_bug.cgi?id=1226701 * https://bugzilla.suse.com/show_bug.cgi?id=1226702 * https://bugzilla.suse.com/show_bug.cgi?id=1226703 * https://bugzilla.suse.com/show_bug.cgi?id=1226705 * https://bugzilla.suse.com/show_bug.cgi?id=1226708 * https://bugzilla.suse.com/show_bug.cgi?id=1226709 * https://bugzilla.suse.com/show_bug.cgi?id=1226710 * https://bugzilla.suse.com/show_bug.cgi?id=1226711 * https://bugzilla.suse.com/show_bug.cgi?id=1226712 * https://bugzilla.suse.com/show_bug.cgi?id=1226713 * https://bugzilla.suse.com/show_bug.cgi?id=1226715 * https://bugzilla.suse.com/show_bug.cgi?id=1226716 * https://bugzilla.suse.com/show_bug.cgi?id=1226719 * https://bugzilla.suse.com/show_bug.cgi?id=1226720 * https://bugzilla.suse.com/show_bug.cgi?id=1226721 * https://bugzilla.suse.com/show_bug.cgi?id=1226732 * https://bugzilla.suse.com/show_bug.cgi?id=1226758 * https://bugzilla.suse.com/show_bug.cgi?id=1226762 * https://bugzilla.suse.com/show_bug.cgi?id=1226785 * https://bugzilla.suse.com/show_bug.cgi?id=1227090 * https://bugzilla.suse.com/show_bug.cgi?id=1227383 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227549 * https://bugzilla.suse.com/show_bug.cgi?id=1227716 * https://bugzilla.suse.com/show_bug.cgi?id=1227750 * https://bugzilla.suse.com/show_bug.cgi?id=1227764 * https://bugzilla.suse.com/show_bug.cgi?id=1227808 * https://bugzilla.suse.com/show_bug.cgi?id=1227810 * https://bugzilla.suse.com/show_bug.cgi?id=1227823 * https://bugzilla.suse.com/show_bug.cgi?id=1227829 * https://bugzilla.suse.com/show_bug.cgi?id=1227836 * https://bugzilla.suse.com/show_bug.cgi?id=1227917 * https://bugzilla.suse.com/show_bug.cgi?id=1227920 * https://bugzilla.suse.com/show_bug.cgi?id=1227921 * https://bugzilla.suse.com/show_bug.cgi?id=1227922 * https://bugzilla.suse.com/show_bug.cgi?id=1227923 * https://bugzilla.suse.com/show_bug.cgi?id=1227924 * https://bugzilla.suse.com/show_bug.cgi?id=1227925 * https://bugzilla.suse.com/show_bug.cgi?id=1227928 * https://bugzilla.suse.com/show_bug.cgi?id=1227931 * https://bugzilla.suse.com/show_bug.cgi?id=1227932 * https://bugzilla.suse.com/show_bug.cgi?id=1227933 * https://bugzilla.suse.com/show_bug.cgi?id=1227935 * https://bugzilla.suse.com/show_bug.cgi?id=1227938 * https://bugzilla.suse.com/show_bug.cgi?id=1227941 * https://bugzilla.suse.com/show_bug.cgi?id=1227942 * https://bugzilla.suse.com/show_bug.cgi?id=1227944 * https://bugzilla.suse.com/show_bug.cgi?id=1227945 * https://bugzilla.suse.com/show_bug.cgi?id=1227948 * https://bugzilla.suse.com/show_bug.cgi?id=1227949 * https://bugzilla.suse.com/show_bug.cgi?id=1227952 * https://bugzilla.suse.com/show_bug.cgi?id=1227953 * https://bugzilla.suse.com/show_bug.cgi?id=1227954 * https://bugzilla.suse.com/show_bug.cgi?id=1227956 * https://bugzilla.suse.com/show_bug.cgi?id=1227963 * https://bugzilla.suse.com/show_bug.cgi?id=1227964 * https://bugzilla.suse.com/show_bug.cgi?id=1227965 * https://bugzilla.suse.com/show_bug.cgi?id=1227968 * https://bugzilla.suse.com/show_bug.cgi?id=1227969 * https://bugzilla.suse.com/show_bug.cgi?id=1227970 * https://bugzilla.suse.com/show_bug.cgi?id=1227971 * https://bugzilla.suse.com/show_bug.cgi?id=1227972 * https://bugzilla.suse.com/show_bug.cgi?id=1227975 * https://bugzilla.suse.com/show_bug.cgi?id=1227976 * https://bugzilla.suse.com/show_bug.cgi?id=1227981 * https://bugzilla.suse.com/show_bug.cgi?id=1227982 * https://bugzilla.suse.com/show_bug.cgi?id=1227985 * https://bugzilla.suse.com/show_bug.cgi?id=1227986 * https://bugzilla.suse.com/show_bug.cgi?id=1227987 * https://bugzilla.suse.com/show_bug.cgi?id=1227988 * https://bugzilla.suse.com/show_bug.cgi?id=1227989 * https://bugzilla.suse.com/show_bug.cgi?id=1227990 * https://bugzilla.suse.com/show_bug.cgi?id=1227991 * https://bugzilla.suse.com/show_bug.cgi?id=1227993 * https://bugzilla.suse.com/show_bug.cgi?id=1227995 * https://bugzilla.suse.com/show_bug.cgi?id=1227996 * https://bugzilla.suse.com/show_bug.cgi?id=1227997 * https://bugzilla.suse.com/show_bug.cgi?id=1228000 * https://bugzilla.suse.com/show_bug.cgi?id=1228002 * https://bugzilla.suse.com/show_bug.cgi?id=1228004 * https://bugzilla.suse.com/show_bug.cgi?id=1228005 * https://bugzilla.suse.com/show_bug.cgi?id=1228006 * https://bugzilla.suse.com/show_bug.cgi?id=1228007 * https://bugzilla.suse.com/show_bug.cgi?id=1228008 * https://bugzilla.suse.com/show_bug.cgi?id=1228009 * https://bugzilla.suse.com/show_bug.cgi?id=1228010 * https://bugzilla.suse.com/show_bug.cgi?id=1228013 * https://bugzilla.suse.com/show_bug.cgi?id=1228014 * https://bugzilla.suse.com/show_bug.cgi?id=1228015 * https://bugzilla.suse.com/show_bug.cgi?id=1228019 * https://bugzilla.suse.com/show_bug.cgi?id=1228025 * https://bugzilla.suse.com/show_bug.cgi?id=1228028 * https://bugzilla.suse.com/show_bug.cgi?id=1228035 * https://bugzilla.suse.com/show_bug.cgi?id=1228037 * https://bugzilla.suse.com/show_bug.cgi?id=1228038 * https://bugzilla.suse.com/show_bug.cgi?id=1228039 * https://bugzilla.suse.com/show_bug.cgi?id=1228040 * https://bugzilla.suse.com/show_bug.cgi?id=1228045 * https://bugzilla.suse.com/show_bug.cgi?id=1228054 * https://bugzilla.suse.com/show_bug.cgi?id=1228055 * https://bugzilla.suse.com/show_bug.cgi?id=1228056 * https://bugzilla.suse.com/show_bug.cgi?id=1228060 * https://bugzilla.suse.com/show_bug.cgi?id=1228061 * https://bugzilla.suse.com/show_bug.cgi?id=1228062 * https://bugzilla.suse.com/show_bug.cgi?id=1228063 * https://bugzilla.suse.com/show_bug.cgi?id=1228064 * https://bugzilla.suse.com/show_bug.cgi?id=1228066 * https://bugzilla.suse.com/show_bug.cgi?id=1228114 * https://bugzilla.suse.com/show_bug.cgi?id=1228247 * https://bugzilla.suse.com/show_bug.cgi?id=1228328 * https://bugzilla.suse.com/show_bug.cgi?id=1228440 * https://bugzilla.suse.com/show_bug.cgi?id=1228561 * https://bugzilla.suse.com/show_bug.cgi?id=1228644 * https://bugzilla.suse.com/show_bug.cgi?id=1228680 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228801 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Aug 19 12:39:19 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 19 Aug 2024 12:39:19 -0000 Subject: SUSE-SU-2024:2052-1: important: Security update for libaom Message-ID: <172407115993.18977.13484027143798394115@smelt2.prg2.suse.org> # Security update for libaom Announcement ID: SUSE-SU-2024:2052-1 Rating: important References: * bsc#1226020 Cross-References: * CVE-2024-5171 CVSS scores: * CVE-2024-5171 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-5171 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for libaom fixes the following issues: * CVE-2024-5171: Fixed heap buffer overflow in img_alloc_helper() caused by integer overflow (bsc#1226020). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2052=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2052=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2052=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2052=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2052=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2052=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2052=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2052=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2052=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2052=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2052=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libaom-debugsource-3.2.0-150400.3.6.1 * libaom3-3.2.0-150400.3.6.1 * libaom3-debuginfo-3.2.0-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libaom-debugsource-3.2.0-150400.3.6.1 * libaom3-3.2.0-150400.3.6.1 * libaom3-debuginfo-3.2.0-150400.3.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libaom-debugsource-3.2.0-150400.3.6.1 * libaom3-3.2.0-150400.3.6.1 * libaom3-debuginfo-3.2.0-150400.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libaom-debugsource-3.2.0-150400.3.6.1 * libaom3-3.2.0-150400.3.6.1 * libaom3-debuginfo-3.2.0-150400.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libaom-debugsource-3.2.0-150400.3.6.1 * libaom3-3.2.0-150400.3.6.1 * libaom3-debuginfo-3.2.0-150400.3.6.1 * SUSE Manager Proxy 4.3 (x86_64) * libaom-debugsource-3.2.0-150400.3.6.1 * libaom3-3.2.0-150400.3.6.1 * libaom3-debuginfo-3.2.0-150400.3.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libaom-debugsource-3.2.0-150400.3.6.1 * libaom3-3.2.0-150400.3.6.1 * libaom3-debuginfo-3.2.0-150400.3.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libaom-debugsource-3.2.0-150400.3.6.1 * libaom3-3.2.0-150400.3.6.1 * libaom3-debuginfo-3.2.0-150400.3.6.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * aom-tools-debuginfo-3.2.0-150400.3.6.1 * aom-tools-3.2.0-150400.3.6.1 * libaom-debugsource-3.2.0-150400.3.6.1 * libaom3-debuginfo-3.2.0-150400.3.6.1 * libaom3-3.2.0-150400.3.6.1 * libaom-devel-3.2.0-150400.3.6.1 * openSUSE Leap 15.4 (noarch) * libaom-devel-doc-3.2.0-150400.3.6.1 * openSUSE Leap 15.4 (x86_64) * libaom3-32bit-debuginfo-3.2.0-150400.3.6.1 * libaom3-32bit-3.2.0-150400.3.6.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libaom3-64bit-3.2.0-150400.3.6.1 * libaom3-64bit-debuginfo-3.2.0-150400.3.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * aom-tools-debuginfo-3.2.0-150400.3.6.1 * aom-tools-3.2.0-150400.3.6.1 * libaom-debugsource-3.2.0-150400.3.6.1 * libaom3-debuginfo-3.2.0-150400.3.6.1 * libaom3-3.2.0-150400.3.6.1 * libaom-devel-3.2.0-150400.3.6.1 * openSUSE Leap 15.5 (noarch) * libaom-devel-doc-3.2.0-150400.3.6.1 * openSUSE Leap 15.5 (x86_64) * libaom3-32bit-debuginfo-3.2.0-150400.3.6.1 * libaom3-32bit-3.2.0-150400.3.6.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libaom-debugsource-3.2.0-150400.3.6.1 * libaom3-3.2.0-150400.3.6.1 * libaom3-debuginfo-3.2.0-150400.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5171.html * https://bugzilla.suse.com/show_bug.cgi?id=1226020 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Aug 19 12:40:11 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 19 Aug 2024 12:40:11 -0000 Subject: SUSE-SU-2024:1861-1: important: Security update for python3-sqlparse Message-ID: <172407121195.18977.6600173269631486171@smelt2.prg2.suse.org> # Security update for python3-sqlparse Announcement ID: SUSE-SU-2024:1861-1 Rating: important References: * bsc#1223603 Cross-References: * CVE-2024-4340 CVSS scores: * CVE-2024-4340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python3-sqlparse fixes the following issues: * CVE-2024-4340: Fixed RecursionError catch to avoid a denial-of-service issue (bsc#1223603). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1861=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1861=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1861=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1861=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1861=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1861=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1861=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1861=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1861=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1861=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1861=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1861=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1861=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1861=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1861=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1861=1 ## Package List: * openSUSE Leap 15.3 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * openSUSE Leap 15.5 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * Basesystem Module 15-SP5 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * Basesystem Module 15-SP6 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * SUSE Manager Proxy 4.3 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * SUSE Manager Server 4.3 (noarch) * python3-sqlparse-0.4.2-150300.12.1 * SUSE Enterprise Storage 7.1 (noarch) * python3-sqlparse-0.4.2-150300.12.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4340.html * https://bugzilla.suse.com/show_bug.cgi?id=1223603 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Aug 19 12:39:48 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 19 Aug 2024 12:39:48 -0000 Subject: SUSE-SU-2024:1867-1: moderate: Security update for fwupdate Message-ID: <172407118881.18977.1333784598161855368@smelt2.prg2.suse.org> # Security update for fwupdate Announcement ID: SUSE-SU-2024:1867-1 Rating: moderate References: * bsc#1209188 * bsc#1221301 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two security fixes can now be installed. ## Description: This update of fwupdate fixes the following issues: * rebuild the package with the new secure boot key (bsc#1209188). * Update the email address of security team in SBAT (bsc#1221301) * elf_aarch64_efi.lds: set the memory permission explicitly to avoid ld warning like "LOAD segment with RWX permissions" ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1867=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1867=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1867=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1867=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1867=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1867=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1867=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1867=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1867=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1867=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1867=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1867=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1867=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1867=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1867=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1867=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1867=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1867=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1867=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1867=1 * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2024-1867=1 ## Package List: * openSUSE Leap 15.5 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * openSUSE Leap 15.6 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Linux Enterprise Micro 5.5 (x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * Basesystem Module 15-SP5 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * Basesystem Module 15-SP6 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Manager Proxy 4.3 (x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Manager Server 4.3 (x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 * SUSE Enterprise Storage 7 (aarch64 x86_64) * fwupdate-12-150100.11.15.2 * libfwup1-debuginfo-12-150100.11.15.2 * fwupdate-efi-12-150100.11.15.2 * fwupdate-debuginfo-12-150100.11.15.2 * fwupdate-debugsource-12-150100.11.15.2 * fwupdate-efi-debuginfo-12-150100.11.15.2 * libfwup1-12-150100.11.15.2 * fwupdate-devel-12-150100.11.15.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1209188 * https://bugzilla.suse.com/show_bug.cgi?id=1221301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Aug 19 12:40:50 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 19 Aug 2024 12:40:50 -0000 Subject: SUSE-RU-2024:1671-1: important: Recommended update for open-vm-tools Message-ID: <172407125032.18977.11530084512297593809@smelt2.prg2.suse.org> # Recommended update for open-vm-tools Announcement ID: SUSE-RU-2024:1671-1 Rating: important References: * bsc#1054800 * bsc#1062837 * bsc#1121964 * bsc#1133623 * bsc#1141969 * bsc#1143452 * bsc#1171003 * bsc#1171764 * bsc#1172693 * bsc#1196803 * bsc#1196804 * bsc#1205962 * bsc#1217478 * bsc#1217796 * bsc#1222089 * bsc#474076 * bsc#481137 * bsc#944615 * bsc#952645 * bsc#994598 * jsc#ECO-2164 * jsc#SLE-24094 * jsc#SLE-24095 * jsc#SLE-24096 * jsc#SLE-24097 Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains five features and has 20 fixes can now be installed. ## Description: This update for open-vm-tools fixes the following issues: * Remove protobuf less than v22 dependency from spec file (bsc#1217478) * Use for updating open-vm-tools to new version (bsc#1222089) * There are no new features in the current open-vm-tools release This is primarily a maintenance release that addresses a few critical problems * Use %patch -P N instead of deprecated %patchN * Own %{_modulesloaddir}: used to be present via udev-mini - kmod - suse- module-tools dependency before * Fix outdated libxmlsec1 dependency version Updates to open-vm-tools for SLES 12 SP4 and SP5 are now being built againt against libxmlsec1-1-1.2.37. Update the spec file to now require libxmlsec1-openssl1 v1.2.37 or above. (bsc#1217796) * limit to protobuf less than v22 for now until build failures have been fixed pam-vmtoolsd patch as instructed by vmware (bsc#1171003). This should fix both (bsc#1171003) and (bsc#1172693) * Update vmtoolsd.service to support cloud-init customization by default (bsc#994598) * Enable vgauth for openSUSE Leap 42.1 (bsc#952645) * Extensive rewrite of the spec file * rename vmware-KMP to vmware-guest-KMP for easier identification ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1671=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1671=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1671=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1671=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1671=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1671=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1671=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1671=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1671=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1671=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1671=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1671=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1671=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1671=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1671=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1671=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1671=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1671=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1671=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1671=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1671=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1671=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1671=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1671=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1671=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1671=1 ## Package List: * openSUSE Leap 15.3 (aarch64 x86_64 i586) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-desktop-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-desktop-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * openSUSE Leap 15.3 (x86_64) * open-vm-tools-salt-minion-12.4.0-150300.49.11 * openSUSE Leap Micro 5.3 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * openSUSE Leap Micro 5.4 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * openSUSE Leap 15.5 (aarch64 x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-desktop-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-desktop-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * openSUSE Leap 15.5 (x86_64) * open-vm-tools-salt-minion-12.4.0-150300.49.11 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * SUSE Linux Enterprise Micro 5.3 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * SUSE Linux Enterprise Micro 5.4 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * SUSE Linux Enterprise Micro 5.5 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * Basesystem Module 15-SP5 (aarch64 x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * Basesystem Module 15-SP5 (x86_64) * open-vm-tools-salt-minion-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * Desktop Applications Module 15-SP5 (aarch64 x86_64) * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-desktop-12.4.0-150300.49.11 * open-vm-tools-desktop-debuginfo-12.4.0-150300.49.11 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-desktop-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-desktop-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * open-vm-tools-salt-minion-12.4.0-150300.49.11 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-desktop-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-desktop-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * open-vm-tools-salt-minion-12.4.0-150300.49.11 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-desktop-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-desktop-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * open-vm-tools-salt-minion-12.4.0-150300.49.11 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-desktop-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-desktop-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * open-vm-tools-salt-minion-12.4.0-150300.49.11 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-desktop-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-desktop-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * open-vm-tools-salt-minion-12.4.0-150300.49.11 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-desktop-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-desktop-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * open-vm-tools-salt-minion-12.4.0-150300.49.11 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-desktop-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-desktop-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-desktop-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-desktop-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * open-vm-tools-salt-minion-12.4.0-150300.49.11 * SUSE Manager Proxy 4.3 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-salt-minion-12.4.0-150300.49.11 * SUSE Manager Retail Branch Server 4.3 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-salt-minion-12.4.0-150300.49.11 * SUSE Manager Server 4.3 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-salt-minion-12.4.0-150300.49.11 * SUSE Enterprise Storage 7.1 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * open-vm-tools-desktop-12.4.0-150300.49.11 * open-vm-tools-containerinfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * open-vm-tools-desktop-debuginfo-12.4.0-150300.49.11 * libvmtools-devel-12.4.0-150300.49.11 * open-vm-tools-containerinfo-debuginfo-12.4.0-150300.49.11 * open-vm-tools-sdmp-12.4.0-150300.49.11 * open-vm-tools-sdmp-debuginfo-12.4.0-150300.49.11 * open-vm-tools-salt-minion-12.4.0-150300.49.11 * SUSE Linux Enterprise Micro 5.1 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * SUSE Linux Enterprise Micro 5.2 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * open-vm-tools-12.4.0-150300.49.11 * open-vm-tools-debuginfo-12.4.0-150300.49.11 * libvmtools0-12.4.0-150300.49.11 * libvmtools0-debuginfo-12.4.0-150300.49.11 * open-vm-tools-debugsource-12.4.0-150300.49.11 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1054800 * https://bugzilla.suse.com/show_bug.cgi?id=1062837 * https://bugzilla.suse.com/show_bug.cgi?id=1121964 * https://bugzilla.suse.com/show_bug.cgi?id=1133623 * https://bugzilla.suse.com/show_bug.cgi?id=1141969 * https://bugzilla.suse.com/show_bug.cgi?id=1143452 * https://bugzilla.suse.com/show_bug.cgi?id=1171003 * https://bugzilla.suse.com/show_bug.cgi?id=1171764 * https://bugzilla.suse.com/show_bug.cgi?id=1172693 * https://bugzilla.suse.com/show_bug.cgi?id=1196803 * https://bugzilla.suse.com/show_bug.cgi?id=1196804 * https://bugzilla.suse.com/show_bug.cgi?id=1205962 * https://bugzilla.suse.com/show_bug.cgi?id=1217478 * https://bugzilla.suse.com/show_bug.cgi?id=1217796 * https://bugzilla.suse.com/show_bug.cgi?id=1222089 * https://bugzilla.suse.com/show_bug.cgi?id=474076 * https://bugzilla.suse.com/show_bug.cgi?id=481137 * https://bugzilla.suse.com/show_bug.cgi?id=944615 * https://bugzilla.suse.com/show_bug.cgi?id=952645 * https://bugzilla.suse.com/show_bug.cgi?id=994598 * https://jira.suse.com/browse/ECO-2164 * https://jira.suse.com/browse/SLE-24094 * https://jira.suse.com/browse/SLE-24095 * https://jira.suse.com/browse/SLE-24096 * https://jira.suse.com/browse/SLE-24097 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Aug 19 12:41:47 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 19 Aug 2024 12:41:47 -0000 Subject: SUSE-RU-2024:1481-1: moderate: Recommended update for rmt-server Message-ID: <172407130742.18977.14001339894960034605@smelt2.prg2.suse.org> # Recommended update for rmt-server Announcement ID: SUSE-RU-2024:1481-1 Rating: moderate References: * bsc#1222122 * jsc#PED-3684 Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has one fix can now be installed. ## Description: This update for rmt-server fixes the following issues: * Support bzip2 compressed repositories (bsc#1222122) * Remove automatic backup generation for repodata within repository * Add support for Debian repositories using flat or nested structures (jsc#PED-3684) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1481=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1481=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1481=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1481=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1481=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1481=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1481=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1481=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1481=1 ## Package List: * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-pubcloud-2.16-150400.3.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * SUSE Manager Proxy 4.3 (x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * rmt-server-pubcloud-2.16-150400.3.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222122 * https://jira.suse.com/browse/PED-3684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Aug 19 12:41:56 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 19 Aug 2024 12:41:56 -0000 Subject: SUSE-SU-2024:1464-1: important: Security update for jasper Message-ID: <172407131666.18977.10246532135425855894@smelt2.prg2.suse.org> # Security update for jasper Announcement ID: SUSE-SU-2024:1464-1 Rating: important References: * bsc#1223155 Cross-References: * CVE-2024-31744 CVSS scores: * CVE-2024-31744 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for jasper fixes the following issues: * CVE-2024-31744: Fixed denial of service through assertion failure in jpc_streamlist_remove() (bsc#1223155). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1464=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1464=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1464=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1464=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1464=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1464=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1464=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1464=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1464=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1464=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1464=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1464=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1464=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1464=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1464=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1464=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1464=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1464=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * jasper-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * openSUSE Leap 15.5 (x86_64) * libjasper4-32bit-2.0.14-150000.3.34.1 * libjasper4-32bit-debuginfo-2.0.14-150000.3.34.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Manager Proxy 4.3 (x86_64) * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libjasper-devel-2.0.14-150000.3.34.1 * jasper-debugsource-2.0.14-150000.3.34.1 * libjasper4-2.0.14-150000.3.34.1 * libjasper4-debuginfo-2.0.14-150000.3.34.1 * jasper-debuginfo-2.0.14-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2024-31744.html * https://bugzilla.suse.com/show_bug.cgi?id=1223155 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Aug 19 12:41:57 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 19 Aug 2024 12:41:57 -0000 Subject: SUSE-RU-2024:1398-1: moderate: Recommended update for systemd-default-settings Message-ID: <172407131779.18977.17859612370035743830@smelt2.prg2.suse.org> # Recommended update for systemd-default-settings Announcement ID: SUSE-RU-2024:1398-1 Rating: moderate References: * jsc#PED-2276 * jsc#SLE-10123 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains two features can now be installed. ## Description: This update for systemd-default-settings fixes the following issues: * Disable pids controller limit under user instances (jsc#SLE-10123) * Disable controllers by default (jsc#PED-2276) * The usage of drop-ins is now the official way for configuring systemd and its various daemons on Factory/ALP, hence the early drop-ins SUSE specific "feature" has been abandoned. * User priority '26' for SLE-Micro * Convert more drop-ins into early ones ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1398=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1398=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1398=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1398=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1398=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1398=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1398=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1398=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1398=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1398=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1398=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1398=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1398=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1398=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1398=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1398=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1398=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1398=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1398=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1398=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1398=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1398=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1398=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1398=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1398=1 ## Package List: * openSUSE Leap 15.3 (noarch) * systemd-default-settings-0.10-150300.3.7.1 * systemd-default-settings-branding-SLE-Micro-0.10-150300.3.7.1 * systemd-default-settings-branding-openSUSE-0.10-150300.3.7.1 * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-branding-upstream-0.10-150300.3.7.1 * openSUSE Leap Micro 5.3 (noarch) * systemd-default-settings-0.10-150300.3.7.1 * openSUSE Leap Micro 5.4 (noarch) * systemd-default-settings-branding-SLE-Micro-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * openSUSE Leap 15.5 (noarch) * systemd-default-settings-0.10-150300.3.7.1 * systemd-default-settings-branding-SLE-Micro-0.10-150300.3.7.1 * systemd-default-settings-branding-openSUSE-0.10-150300.3.7.1 * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-branding-upstream-0.10-150300.3.7.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * systemd-default-settings-branding-SLE-Micro-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * systemd-default-settings-branding-SLE-Micro-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * systemd-default-settings-branding-SLE-Micro-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * systemd-default-settings-branding-SLE-Micro-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * systemd-default-settings-branding-SLE-Micro-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * Basesystem Module 15-SP5 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Manager Proxy 4.3 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Manager Server 4.3 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Enterprise Storage 7.1 (noarch) * systemd-default-settings-branding-SLE-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * systemd-default-settings-branding-SLE-Micro-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * systemd-default-settings-branding-SLE-Micro-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * systemd-default-settings-branding-SLE-Micro-0.10-150300.3.7.1 * systemd-default-settings-0.10-150300.3.7.1 ## References: * https://jira.suse.com/browse/PED-2276 * https://jira.suse.com/browse/SLE-10123 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Aug 19 12:42:14 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 19 Aug 2024 12:42:14 -0000 Subject: SUSE-RU-2024:0880-1: moderate: Recommended update for installation-images Message-ID: <172407133430.18977.9721188280414659244@smelt2.prg2.suse.org> # Recommended update for installation-images Announcement ID: SUSE-RU-2024:0880-1 Rating: moderate References: * bsc#1203405 * bsc#1217968 * bsc#1218652 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has three fixes can now be installed. ## Description: This update for installation-images fixes the following issues: * Include complete system-role-common-criteria package (bsc#1217968, bsc#1218652) * Change HMC console name from ttyS1 to ttysclp0 (bsc#1203405) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-880=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-880=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-880=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-880=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-880=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-880=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-880=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-880=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-880=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * skelcd-installer-SLES-16.57.29-150400.3.19.1 * skelcd-installer-net-SLES-16.57.29-150400.3.19.1 * installation-images-SLES-16.57.29-150400.3.19.1 * installation-images-debuginfodeps-SLES-16.57.29-150400.3.19.1 * install-initrd-SLES-16.57.29-150400.3.19.1 * openSUSE Leap 15.4 (noarch) * tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.19.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.19.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.19.1 * SUSE Manager Proxy 4.3 (noarch) * tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.19.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.19.1 * SUSE Manager Server 4.3 (noarch) * tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.19.1 * tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.19.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1203405 * https://bugzilla.suse.com/show_bug.cgi?id=1217968 * https://bugzilla.suse.com/show_bug.cgi?id=1218652 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Aug 19 16:30:12 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 19 Aug 2024 16:30:12 -0000 Subject: SUSE-RU-2024:2967-1: moderate: Recommended update for pam Message-ID: <172408501248.18977.11163345963935596658@smelt2.prg2.suse.org> # Recommended update for pam Announcement ID: SUSE-RU-2024:2967-1 Rating: moderate References: * bsc#1194818 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for pam fixes the following issue: * Prevent cursor escape from the login prompt (bsc#1194818). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-2967=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-2967=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-2967=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2967=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2967=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2967=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2967=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-2967=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2967=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2967=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2967=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2967=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2967=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2967=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2967=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2967=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2967=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2967=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2967=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2967=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2967=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2967=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2967=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2967=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2967=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2967=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2967=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2967=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2967=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2967=1 ## Package List: * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-debuginfo-1.3.0-150000.6.71.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * openSUSE Leap 15.5 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * openSUSE Leap 15.5 (noarch) * pam-doc-1.3.0-150000.6.71.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * openSUSE Leap 15.6 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * openSUSE Leap 15.6 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-debuginfo-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-debuginfo-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-debuginfo-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-debuginfo-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * pam-debugsource-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-debuginfo-1.3.0-150000.6.71.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * Basesystem Module 15-SP5 (noarch) * pam-doc-1.3.0-150000.6.71.2 * Basesystem Module 15-SP5 (x86_64) * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * Basesystem Module 15-SP6 (noarch) * pam-doc-1.3.0-150000.6.71.2 * Basesystem Module 15-SP6 (x86_64) * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * Development Tools Module 15-SP5 (x86_64) * pam-devel-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * Development Tools Module 15-SP6 (x86_64) * pam-devel-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-debuginfo-1.3.0-150000.6.71.2 * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * SUSE Manager Proxy 4.3 (x86_64) * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-debuginfo-1.3.0-150000.6.71.2 * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * SUSE Manager Proxy 4.3 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-debuginfo-1.3.0-150000.6.71.2 * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * SUSE Manager Server 4.3 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Manager Server 4.3 (x86_64) * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * pam-debuginfo-1.3.0-150000.6.71.2 * pam-devel-1.3.0-150000.6.71.2 * pam-debugsource-1.3.0-150000.6.71.2 * pam-extra-debuginfo-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-extra-1.3.0-150000.6.71.2 * SUSE Enterprise Storage 7.1 (noarch) * pam-doc-1.3.0-150000.6.71.2 * SUSE Enterprise Storage 7.1 (x86_64) * pam-32bit-1.3.0-150000.6.71.2 * pam-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-debuginfo-1.3.0-150000.6.71.2 * pam-extra-32bit-1.3.0-150000.6.71.2 * pam-devel-32bit-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-debuginfo-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-debuginfo-1.3.0-150000.6.71.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.71.2 * pam-1.3.0-150000.6.71.2 * pam-debuginfo-1.3.0-150000.6.71.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1194818 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Aug 19 16:30:16 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 19 Aug 2024 16:30:16 -0000 Subject: SUSE-RU-2024:2966-1: moderate: Recommended update for util-linux Message-ID: <172408501604.18977.2419858303083636318@smelt2.prg2.suse.org> # Recommended update for util-linux Announcement ID: SUSE-RU-2024:2966-1 Rating: moderate References: * bsc#1194818 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for util-linux fixes the following issue: * agetty: Prevent login cursor escape (bsc#1194818). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2966=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2966=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2966=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2966=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2966=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2966=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2966=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2966=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2966=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2966=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2966=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2966=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2966=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python3-libmount-debugsource-2.37.2-150400.8.32.2 * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols-devel-static-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libuuid-devel-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * python3-libmount-debuginfo-2.37.2-150400.8.32.2 * libmount1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols-devel-2.37.2-150400.8.32.2 * libmount-devel-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * libblkid-devel-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * uuidd-debuginfo-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * libfdisk-devel-static-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * python3-libmount-2.37.2-150400.8.32.2 * libblkid-devel-static-2.37.2-150400.8.32.2 * libuuid-devel-static-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * uuidd-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * libfdisk-devel-2.37.2-150400.8.32.2 * libmount-devel-static-2.37.2-150400.8.32.2 * openSUSE Leap 15.4 (x86_64) * libblkid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libblkid1-32bit-2.37.2-150400.8.32.2 * libuuid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libmount-devel-32bit-2.37.2-150400.8.32.2 * libmount1-32bit-debuginfo-2.37.2-150400.8.32.2 * libblkid-devel-32bit-2.37.2-150400.8.32.2 * libfdisk-devel-32bit-2.37.2-150400.8.32.2 * libsmartcols1-32bit-2.37.2-150400.8.32.2 * libuuid-devel-32bit-2.37.2-150400.8.32.2 * libuuid1-32bit-2.37.2-150400.8.32.2 * libsmartcols1-32bit-debuginfo-2.37.2-150400.8.32.2 * libmount1-32bit-2.37.2-150400.8.32.2 * libsmartcols-devel-32bit-2.37.2-150400.8.32.2 * libfdisk1-32bit-2.37.2-150400.8.32.2 * libfdisk1-32bit-debuginfo-2.37.2-150400.8.32.2 * openSUSE Leap 15.4 (noarch) * util-linux-lang-2.37.2-150400.8.32.2 * openSUSE Leap 15.4 (aarch64_ilp32) * libfdisk1-64bit-2.37.2-150400.8.32.2 * libuuid-devel-64bit-2.37.2-150400.8.32.2 * libfdisk1-64bit-debuginfo-2.37.2-150400.8.32.2 * libfdisk-devel-64bit-2.37.2-150400.8.32.2 * libmount1-64bit-debuginfo-2.37.2-150400.8.32.2 * libuuid1-64bit-2.37.2-150400.8.32.2 * libsmartcols-devel-64bit-2.37.2-150400.8.32.2 * libblkid1-64bit-2.37.2-150400.8.32.2 * libblkid1-64bit-debuginfo-2.37.2-150400.8.32.2 * libmount1-64bit-2.37.2-150400.8.32.2 * libsmartcols1-64bit-debuginfo-2.37.2-150400.8.32.2 * libuuid1-64bit-debuginfo-2.37.2-150400.8.32.2 * libmount-devel-64bit-2.37.2-150400.8.32.2 * libblkid-devel-64bit-2.37.2-150400.8.32.2 * libsmartcols1-64bit-2.37.2-150400.8.32.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libmount1-debuginfo-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libmount1-debuginfo-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libmount1-debuginfo-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libmount1-debuginfo-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libuuid-devel-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * libmount1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols-devel-2.37.2-150400.8.32.2 * libmount-devel-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * libblkid-devel-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * uuidd-debuginfo-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * libblkid-devel-static-2.37.2-150400.8.32.2 * libuuid-devel-static-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * uuidd-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * libfdisk-devel-2.37.2-150400.8.32.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * util-linux-lang-2.37.2-150400.8.32.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libblkid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libblkid1-32bit-2.37.2-150400.8.32.2 * libuuid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libmount1-32bit-debuginfo-2.37.2-150400.8.32.2 * libuuid1-32bit-2.37.2-150400.8.32.2 * libmount1-32bit-2.37.2-150400.8.32.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libuuid-devel-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * libmount1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols-devel-2.37.2-150400.8.32.2 * libmount-devel-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * libblkid-devel-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * uuidd-debuginfo-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * libblkid-devel-static-2.37.2-150400.8.32.2 * libuuid-devel-static-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * uuidd-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * libfdisk-devel-2.37.2-150400.8.32.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * util-linux-lang-2.37.2-150400.8.32.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libblkid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libblkid1-32bit-2.37.2-150400.8.32.2 * libuuid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libmount1-32bit-debuginfo-2.37.2-150400.8.32.2 * libuuid1-32bit-2.37.2-150400.8.32.2 * libmount1-32bit-2.37.2-150400.8.32.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libblkid1-32bit-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libuuid-devel-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * libuuid1-32bit-2.37.2-150400.8.32.2 * libmount1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols-devel-2.37.2-150400.8.32.2 * libmount-devel-2.37.2-150400.8.32.2 * libuuid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * libblkid-devel-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * libblkid-devel-static-2.37.2-150400.8.32.2 * libuuid-devel-static-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * libmount1-32bit-debuginfo-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * libmount1-32bit-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * libblkid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * libfdisk-devel-2.37.2-150400.8.32.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * util-linux-lang-2.37.2-150400.8.32.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libuuid-devel-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * libmount1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols-devel-2.37.2-150400.8.32.2 * libmount-devel-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * libblkid-devel-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * uuidd-debuginfo-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * libblkid-devel-static-2.37.2-150400.8.32.2 * libuuid-devel-static-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * uuidd-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * libfdisk-devel-2.37.2-150400.8.32.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * util-linux-lang-2.37.2-150400.8.32.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libblkid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libblkid1-32bit-2.37.2-150400.8.32.2 * libuuid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libmount1-32bit-debuginfo-2.37.2-150400.8.32.2 * libuuid1-32bit-2.37.2-150400.8.32.2 * libmount1-32bit-2.37.2-150400.8.32.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libuuid-devel-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * libmount1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols-devel-2.37.2-150400.8.32.2 * libmount-devel-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * libblkid-devel-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * uuidd-debuginfo-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * libblkid-devel-static-2.37.2-150400.8.32.2 * libuuid-devel-static-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * uuidd-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * libfdisk-devel-2.37.2-150400.8.32.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * util-linux-lang-2.37.2-150400.8.32.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libblkid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libblkid1-32bit-2.37.2-150400.8.32.2 * libuuid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libmount1-32bit-debuginfo-2.37.2-150400.8.32.2 * libuuid1-32bit-2.37.2-150400.8.32.2 * libmount1-32bit-2.37.2-150400.8.32.2 * SUSE Manager Proxy 4.3 (x86_64) * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libblkid1-32bit-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libuuid-devel-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * libuuid1-32bit-2.37.2-150400.8.32.2 * libmount1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols-devel-2.37.2-150400.8.32.2 * libmount-devel-2.37.2-150400.8.32.2 * libuuid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * libblkid-devel-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * uuidd-debuginfo-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * libblkid-devel-static-2.37.2-150400.8.32.2 * libuuid-devel-static-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * libmount1-32bit-debuginfo-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * libmount1-32bit-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * uuidd-2.37.2-150400.8.32.2 * libblkid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * libfdisk-devel-2.37.2-150400.8.32.2 * SUSE Manager Proxy 4.3 (noarch) * util-linux-lang-2.37.2-150400.8.32.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libblkid1-32bit-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libuuid-devel-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * libuuid1-32bit-2.37.2-150400.8.32.2 * libmount1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols-devel-2.37.2-150400.8.32.2 * libmount-devel-2.37.2-150400.8.32.2 * libuuid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * libblkid-devel-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * uuidd-debuginfo-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * libblkid-devel-static-2.37.2-150400.8.32.2 * libuuid-devel-static-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * libmount1-32bit-debuginfo-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * libmount1-32bit-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * uuidd-2.37.2-150400.8.32.2 * libblkid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * libfdisk-devel-2.37.2-150400.8.32.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * util-linux-lang-2.37.2-150400.8.32.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libfdisk1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols1-2.37.2-150400.8.32.2 * libuuid-devel-2.37.2-150400.8.32.2 * util-linux-systemd-debugsource-2.37.2-150400.8.32.2 * libmount1-debuginfo-2.37.2-150400.8.32.2 * libsmartcols-devel-2.37.2-150400.8.32.2 * libmount-devel-2.37.2-150400.8.32.2 * libsmartcols1-debuginfo-2.37.2-150400.8.32.2 * libblkid-devel-2.37.2-150400.8.32.2 * libblkid1-2.37.2-150400.8.32.2 * uuidd-debuginfo-2.37.2-150400.8.32.2 * libuuid1-debuginfo-2.37.2-150400.8.32.2 * libfdisk1-2.37.2-150400.8.32.2 * libblkid-devel-static-2.37.2-150400.8.32.2 * libuuid-devel-static-2.37.2-150400.8.32.2 * util-linux-systemd-debuginfo-2.37.2-150400.8.32.2 * util-linux-debuginfo-2.37.2-150400.8.32.2 * util-linux-systemd-2.37.2-150400.8.32.2 * libuuid1-2.37.2-150400.8.32.2 * util-linux-debugsource-2.37.2-150400.8.32.2 * util-linux-2.37.2-150400.8.32.2 * uuidd-2.37.2-150400.8.32.2 * libblkid1-debuginfo-2.37.2-150400.8.32.2 * libmount1-2.37.2-150400.8.32.2 * libfdisk-devel-2.37.2-150400.8.32.2 * SUSE Manager Server 4.3 (noarch) * util-linux-lang-2.37.2-150400.8.32.2 * SUSE Manager Server 4.3 (x86_64) * libblkid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libblkid1-32bit-2.37.2-150400.8.32.2 * libuuid1-32bit-debuginfo-2.37.2-150400.8.32.2 * libmount1-32bit-debuginfo-2.37.2-150400.8.32.2 * libuuid1-32bit-2.37.2-150400.8.32.2 * libmount1-32bit-2.37.2-150400.8.32.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1194818 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Aug 20 12:30:05 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 20 Aug 2024 12:30:05 -0000 Subject: SUSE-RU-2024:2988-1: moderate: Recommended update for powerpc-utils Message-ID: <172415700524.19318.14176737569730823792@smelt2.prg2.suse.org> # Recommended update for powerpc-utils Announcement ID: SUSE-RU-2024:2988-1 Rating: moderate References: * bsc#1228597 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for powerpc-utils fixes the following issue: * ofpathname: skip devices with no devspec when coorelating FC OF paths (bsc#1228597). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2988=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2988=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2988=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2988=1 ## Package List: * openSUSE Leap 15.4 (ppc64le) * powerpc-utils-1.3.10-150400.19.21.2 * powerpc-utils-debugsource-1.3.10-150400.19.21.2 * powerpc-utils-debuginfo-1.3.10-150400.19.21.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (ppc64le) * powerpc-utils-1.3.10-150400.19.21.2 * powerpc-utils-debugsource-1.3.10-150400.19.21.2 * powerpc-utils-debuginfo-1.3.10-150400.19.21.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le) * powerpc-utils-1.3.10-150400.19.21.2 * powerpc-utils-debugsource-1.3.10-150400.19.21.2 * powerpc-utils-debuginfo-1.3.10-150400.19.21.2 * SUSE Manager Server 4.3 (ppc64le) * powerpc-utils-1.3.10-150400.19.21.2 * powerpc-utils-debugsource-1.3.10-150400.19.21.2 * powerpc-utils-debuginfo-1.3.10-150400.19.21.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228597 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Aug 20 12:30:09 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 20 Aug 2024 12:30:09 -0000 Subject: SUSE-RU-2024:2987-1: moderate: Recommended update for dpdk Message-ID: <172415700967.19318.12855811513141785985@smelt2.prg2.suse.org> # Recommended update for dpdk Announcement ID: SUSE-RU-2024:2987-1 Rating: moderate References: * bsc#1214724 * jsc#PED-8431 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has one fix can now be installed. ## Description: This update for dpdk fixes the following issue: * Provided DPDK modules taint the kernel as unsupported (bsc#1214724, jsc#PED-8431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2987=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2987=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2987=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2987=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2987=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2987=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2987=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2987=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-tools-19.11.10-150400.4.18.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.18.1 * dpdk-19.11.10-150400.4.18.1 * dpdk-examples-debuginfo-19.11.10-150400.4.18.1 * dpdk-examples-19.11.10-150400.4.18.1 * libdpdk-20_0-19.11.10-150400.4.18.1 * dpdk-devel-19.11.10-150400.4.18.1 * dpdk-devel-debuginfo-19.11.10-150400.4.18.1 * dpdk-debuginfo-19.11.10-150400.4.18.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-debugsource-19.11.10-150400.4.18.1 * dpdk-tools-debuginfo-19.11.10-150400.4.18.1 * openSUSE Leap 15.4 (noarch) * dpdk-doc-19.11.10-150400.4.18.1 * dpdk-thunderx-doc-19.11.10-150400.4.18.1 * openSUSE Leap 15.4 (aarch64) * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-thunderx-tools-debuginfo-19.11.10-150400.4.18.1 * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.18.1 * dpdk-thunderx-devel-19.11.10-150400.4.18.1 * dpdk-thunderx-debuginfo-19.11.10-150400.4.18.1 * dpdk-thunderx-debugsource-19.11.10-150400.4.18.1 * dpdk-thunderx-tools-19.11.10-150400.4.18.1 * dpdk-thunderx-examples-debuginfo-19.11.10-150400.4.18.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-thunderx-19.11.10-150400.4.18.1 * dpdk-thunderx-examples-19.11.10-150400.4.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-tools-19.11.10-150400.4.18.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.18.1 * dpdk-19.11.10-150400.4.18.1 * libdpdk-20_0-19.11.10-150400.4.18.1 * dpdk-devel-19.11.10-150400.4.18.1 * dpdk-devel-debuginfo-19.11.10-150400.4.18.1 * dpdk-debuginfo-19.11.10-150400.4.18.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-debugsource-19.11.10-150400.4.18.1 * dpdk-tools-debuginfo-19.11.10-150400.4.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.18.1 * dpdk-thunderx-devel-19.11.10-150400.4.18.1 * dpdk-thunderx-debuginfo-19.11.10-150400.4.18.1 * dpdk-thunderx-debugsource-19.11.10-150400.4.18.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-thunderx-19.11.10-150400.4.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-tools-19.11.10-150400.4.18.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.18.1 * dpdk-19.11.10-150400.4.18.1 * libdpdk-20_0-19.11.10-150400.4.18.1 * dpdk-devel-19.11.10-150400.4.18.1 * dpdk-devel-debuginfo-19.11.10-150400.4.18.1 * dpdk-debuginfo-19.11.10-150400.4.18.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-debugsource-19.11.10-150400.4.18.1 * dpdk-tools-debuginfo-19.11.10-150400.4.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.18.1 * dpdk-thunderx-devel-19.11.10-150400.4.18.1 * dpdk-thunderx-debuginfo-19.11.10-150400.4.18.1 * dpdk-thunderx-debugsource-19.11.10-150400.4.18.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-thunderx-19.11.10-150400.4.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-tools-19.11.10-150400.4.18.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.18.1 * dpdk-19.11.10-150400.4.18.1 * libdpdk-20_0-19.11.10-150400.4.18.1 * dpdk-devel-19.11.10-150400.4.18.1 * dpdk-devel-debuginfo-19.11.10-150400.4.18.1 * dpdk-debuginfo-19.11.10-150400.4.18.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-debugsource-19.11.10-150400.4.18.1 * dpdk-tools-debuginfo-19.11.10-150400.4.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.18.1 * dpdk-thunderx-devel-19.11.10-150400.4.18.1 * dpdk-thunderx-debuginfo-19.11.10-150400.4.18.1 * dpdk-thunderx-debugsource-19.11.10-150400.4.18.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-thunderx-19.11.10-150400.4.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-tools-19.11.10-150400.4.18.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.18.1 * dpdk-19.11.10-150400.4.18.1 * libdpdk-20_0-19.11.10-150400.4.18.1 * dpdk-devel-19.11.10-150400.4.18.1 * dpdk-devel-debuginfo-19.11.10-150400.4.18.1 * dpdk-debuginfo-19.11.10-150400.4.18.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-debugsource-19.11.10-150400.4.18.1 * dpdk-tools-debuginfo-19.11.10-150400.4.18.1 * SUSE Manager Proxy 4.3 (x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-tools-19.11.10-150400.4.18.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.18.1 * dpdk-19.11.10-150400.4.18.1 * libdpdk-20_0-19.11.10-150400.4.18.1 * dpdk-devel-19.11.10-150400.4.18.1 * dpdk-devel-debuginfo-19.11.10-150400.4.18.1 * dpdk-debuginfo-19.11.10-150400.4.18.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-debugsource-19.11.10-150400.4.18.1 * dpdk-tools-debuginfo-19.11.10-150400.4.18.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-tools-19.11.10-150400.4.18.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.18.1 * dpdk-19.11.10-150400.4.18.1 * libdpdk-20_0-19.11.10-150400.4.18.1 * dpdk-devel-19.11.10-150400.4.18.1 * dpdk-devel-debuginfo-19.11.10-150400.4.18.1 * dpdk-debuginfo-19.11.10-150400.4.18.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-debugsource-19.11.10-150400.4.18.1 * dpdk-tools-debuginfo-19.11.10-150400.4.18.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-tools-19.11.10-150400.4.18.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.18.1 * dpdk-19.11.10-150400.4.18.1 * libdpdk-20_0-19.11.10-150400.4.18.1 * dpdk-devel-19.11.10-150400.4.18.1 * dpdk-devel-debuginfo-19.11.10-150400.4.18.1 * dpdk-debuginfo-19.11.10-150400.4.18.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.125-150400.4.18.1 * dpdk-debugsource-19.11.10-150400.4.18.1 * dpdk-tools-debuginfo-19.11.10-150400.4.18.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214724 * https://jira.suse.com/browse/PED-8431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Aug 20 12:30:34 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 20 Aug 2024 12:30:34 -0000 Subject: SUSE-SU-2024:2980-1: important: Security update for kernel-firmware Message-ID: <172415703474.19318.17367550423408536924@smelt2.prg2.suse.org> # Security update for kernel-firmware Announcement ID: SUSE-SU-2024:2980-1 Rating: important References: * bsc#1229069 Cross-References: * CVE-2023-31315 CVSS scores: * CVE-2023-31315 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-firmware fixes the following issues: CVE-2023-31315: Fixed validation in a model specific register (MSR) that lead to modification of SMM configuration by malicious program with ring0 access (bsc#1229069) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-2980=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2980=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-2980=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2980=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-2980=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2980=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2980=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2980=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2980=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2980=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2980=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-2980=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2980=1 ## Package List: * openSUSE Leap 15.4 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 * SUSE Manager Server 4.3 (noarch) * kernel-firmware-ath10k-20220509-150400.4.28.1 * kernel-firmware-bnx2-20220509-150400.4.28.1 * kernel-firmware-brcm-20220509-150400.4.28.1 * kernel-firmware-sound-20220509-150400.4.28.1 * kernel-firmware-chelsio-20220509-150400.4.28.1 * kernel-firmware-mellanox-20220509-150400.4.28.1 * kernel-firmware-platform-20220509-150400.4.28.1 * kernel-firmware-i915-20220509-150400.4.28.1 * kernel-firmware-liquidio-20220509-150400.4.28.1 * kernel-firmware-all-20220509-150400.4.28.1 * kernel-firmware-amdgpu-20220509-150400.4.28.1 * kernel-firmware-intel-20220509-150400.4.28.1 * kernel-firmware-usb-network-20220509-150400.4.28.1 * kernel-firmware-ti-20220509-150400.4.28.1 * kernel-firmware-nfp-20220509-150400.4.28.1 * kernel-firmware-bluetooth-20220509-150400.4.28.1 * kernel-firmware-iwlwifi-20220509-150400.4.28.1 * kernel-firmware-marvell-20220509-150400.4.28.1 * kernel-firmware-nvidia-20220509-150400.4.28.1 * kernel-firmware-prestera-20220509-150400.4.28.1 * kernel-firmware-radeon-20220509-150400.4.28.1 * kernel-firmware-atheros-20220509-150400.4.28.1 * kernel-firmware-media-20220509-150400.4.28.1 * kernel-firmware-qlogic-20220509-150400.4.28.1 * kernel-firmware-ath11k-20220509-150400.4.28.1 * kernel-firmware-mwifiex-20220509-150400.4.28.1 * kernel-firmware-network-20220509-150400.4.28.1 * kernel-firmware-dpaa2-20220509-150400.4.28.1 * ucode-amd-20220509-150400.4.28.1 * kernel-firmware-ueagle-20220509-150400.4.28.1 * kernel-firmware-mediatek-20220509-150400.4.28.1 * kernel-firmware-serial-20220509-150400.4.28.1 * kernel-firmware-realtek-20220509-150400.4.28.1 * kernel-firmware-qcom-20220509-150400.4.28.1 ## References: * https://www.suse.com/security/cve/CVE-2023-31315.html * https://bugzilla.suse.com/show_bug.cgi?id=1229069 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Aug 26 12:30:14 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 26 Aug 2024 12:30:14 -0000 Subject: SUSE-RU-2024:3009-1: moderate: Recommended update for git Message-ID: <172467541413.18977.10783043175216912315@smelt2.prg2.suse.org> # Recommended update for git Announcement ID: SUSE-RU-2024:3009-1 Rating: moderate References: * bsc#1229029 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for git fixes the following issue: * Fix syntax error with old apparmor versions (bsc#1229029) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3009=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3009=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3009=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3009=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3009=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3009=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3009=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3009=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3009=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3009=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3009=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3009=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3009=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3009=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3009=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3009=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3009=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3009=1 ## Package List: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * git-gui-2.35.3-150300.10.45.2 * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-daemon-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-cvs-2.35.3-150300.10.45.2 * gitk-2.35.3-150300.10.45.2 * git-arch-2.35.3-150300.10.45.2 * git-svn-2.35.3-150300.10.45.2 * git-email-2.35.3-150300.10.45.2 * git-web-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-daemon-debuginfo-2.35.3-150300.10.45.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * git-doc-2.35.3-150300.10.45.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * git-gui-2.35.3-150300.10.45.2 * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-daemon-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-cvs-2.35.3-150300.10.45.2 * gitk-2.35.3-150300.10.45.2 * git-arch-2.35.3-150300.10.45.2 * git-svn-2.35.3-150300.10.45.2 * git-email-2.35.3-150300.10.45.2 * git-web-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-daemon-debuginfo-2.35.3-150300.10.45.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * git-doc-2.35.3-150300.10.45.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * git-gui-2.35.3-150300.10.45.2 * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-daemon-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-cvs-2.35.3-150300.10.45.2 * gitk-2.35.3-150300.10.45.2 * git-arch-2.35.3-150300.10.45.2 * git-svn-2.35.3-150300.10.45.2 * git-email-2.35.3-150300.10.45.2 * git-web-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-daemon-debuginfo-2.35.3-150300.10.45.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * git-doc-2.35.3-150300.10.45.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * git-gui-2.35.3-150300.10.45.2 * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-daemon-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-cvs-2.35.3-150300.10.45.2 * gitk-2.35.3-150300.10.45.2 * git-arch-2.35.3-150300.10.45.2 * git-svn-2.35.3-150300.10.45.2 * git-email-2.35.3-150300.10.45.2 * git-web-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-daemon-debuginfo-2.35.3-150300.10.45.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * git-doc-2.35.3-150300.10.45.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * git-gui-2.35.3-150300.10.45.2 * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-daemon-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-cvs-2.35.3-150300.10.45.2 * gitk-2.35.3-150300.10.45.2 * git-arch-2.35.3-150300.10.45.2 * git-svn-2.35.3-150300.10.45.2 * git-email-2.35.3-150300.10.45.2 * git-web-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-daemon-debuginfo-2.35.3-150300.10.45.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * git-doc-2.35.3-150300.10.45.2 * SUSE Manager Proxy 4.3 (x86_64) * git-core-debuginfo-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * git-core-debuginfo-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * git-core-debuginfo-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * git-gui-2.35.3-150300.10.45.2 * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-daemon-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-cvs-2.35.3-150300.10.45.2 * gitk-2.35.3-150300.10.45.2 * git-arch-2.35.3-150300.10.45.2 * git-svn-2.35.3-150300.10.45.2 * git-email-2.35.3-150300.10.45.2 * git-web-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-daemon-debuginfo-2.35.3-150300.10.45.2 * SUSE Enterprise Storage 7.1 (noarch) * git-doc-2.35.3-150300.10.45.2 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * git-gui-2.35.3-150300.10.45.2 * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * git-credential-gnome-keyring-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-daemon-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-credential-gnome-keyring-debuginfo-2.35.3-150300.10.45.2 * git-credential-libsecret-debuginfo-2.35.3-150300.10.45.2 * git-cvs-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-arch-2.35.3-150300.10.45.2 * git-svn-2.35.3-150300.10.45.2 * gitk-2.35.3-150300.10.45.2 * git-email-2.35.3-150300.10.45.2 * git-web-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-credential-libsecret-2.35.3-150300.10.45.2 * git-p4-2.35.3-150300.10.45.2 * git-daemon-debuginfo-2.35.3-150300.10.45.2 * openSUSE Leap 15.3 (noarch) * git-doc-2.35.3-150300.10.45.2 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * git-gui-2.35.3-150300.10.45.2 * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * git-credential-gnome-keyring-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-daemon-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-credential-gnome-keyring-debuginfo-2.35.3-150300.10.45.2 * git-credential-libsecret-debuginfo-2.35.3-150300.10.45.2 * git-cvs-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-arch-2.35.3-150300.10.45.2 * git-svn-2.35.3-150300.10.45.2 * gitk-2.35.3-150300.10.45.2 * git-email-2.35.3-150300.10.45.2 * git-web-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-credential-libsecret-2.35.3-150300.10.45.2 * git-p4-2.35.3-150300.10.45.2 * git-daemon-debuginfo-2.35.3-150300.10.45.2 * openSUSE Leap 15.5 (noarch) * git-doc-2.35.3-150300.10.45.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * git-core-debuginfo-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * git-gui-2.35.3-150300.10.45.2 * git-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-daemon-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-cvs-2.35.3-150300.10.45.2 * gitk-2.35.3-150300.10.45.2 * git-arch-2.35.3-150300.10.45.2 * git-svn-2.35.3-150300.10.45.2 * git-email-2.35.3-150300.10.45.2 * git-web-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-daemon-debuginfo-2.35.3-150300.10.45.2 * Development Tools Module 15-SP5 (noarch) * git-doc-2.35.3-150300.10.45.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * git-gui-2.35.3-150300.10.45.2 * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-daemon-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-cvs-2.35.3-150300.10.45.2 * gitk-2.35.3-150300.10.45.2 * git-arch-2.35.3-150300.10.45.2 * git-svn-2.35.3-150300.10.45.2 * git-email-2.35.3-150300.10.45.2 * git-web-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-daemon-debuginfo-2.35.3-150300.10.45.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * git-doc-2.35.3-150300.10.45.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * git-gui-2.35.3-150300.10.45.2 * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-daemon-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-cvs-2.35.3-150300.10.45.2 * gitk-2.35.3-150300.10.45.2 * git-arch-2.35.3-150300.10.45.2 * git-svn-2.35.3-150300.10.45.2 * git-email-2.35.3-150300.10.45.2 * git-web-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-daemon-debuginfo-2.35.3-150300.10.45.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * git-doc-2.35.3-150300.10.45.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * git-gui-2.35.3-150300.10.45.2 * git-2.35.3-150300.10.45.2 * git-core-2.35.3-150300.10.45.2 * perl-Git-2.35.3-150300.10.45.2 * git-daemon-2.35.3-150300.10.45.2 * git-core-debuginfo-2.35.3-150300.10.45.2 * git-debugsource-2.35.3-150300.10.45.2 * git-cvs-2.35.3-150300.10.45.2 * gitk-2.35.3-150300.10.45.2 * git-arch-2.35.3-150300.10.45.2 * git-svn-2.35.3-150300.10.45.2 * git-email-2.35.3-150300.10.45.2 * git-web-2.35.3-150300.10.45.2 * git-debuginfo-2.35.3-150300.10.45.2 * git-daemon-debuginfo-2.35.3-150300.10.45.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * git-doc-2.35.3-150300.10.45.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229029 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Aug 27 12:30:15 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 27 Aug 2024 12:30:15 -0000 Subject: SUSE-RU-2024:3026-1: moderate: Recommended update for supportutils Message-ID: <172476181565.17623.6802887363631340635@smelt2.prg2.suse.org> # Recommended update for supportutils Announcement ID: SUSE-RU-2024:3026-1 Rating: moderate References: * bsc#1222021 * bsc#1227127 * bsc#1228265 * jsc#PED-8211 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has three fixes can now be installed. ## Description: This update for supportutils fixes the following issues: Changes to version 3.2.8 * Avoid getting duplicate kernel verifications in boot.text (pr#190) * lvm: suppress file descriptor leak warnings from lvm commands (pr#191) * docker_info: Add timestamps to container logs (pr#196) * Key value pairs and container log timestamps (bsc#1222021 PED-8211, pr#198) * Update supportconfig get pam.d sorted (pr#199) * yast_files: Exclude .zcat (pr#201) * Sanitize grub bootloader (bsc#1227127, pr#203) * Sanitize regcodes (pr#204) * Improve product detection (pr#205) * Add read_values for s390x (bsc#1228265, pr#206) * hardware_info: Remove old alsa ver check (pr#209) * drbd_info: Fix incorrect escape of quotes (pr#210) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-3026=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3026=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3026=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3026=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3026=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3026=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3026=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3026=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3026=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3026=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3026=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3026=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3026=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3026=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3026=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3026=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3026=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3026=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3026=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3026=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3026=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3026=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3026=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3026=1 ## Package List: * openSUSE Leap 15.3 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * openSUSE Leap Micro 5.5 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * openSUSE Leap 15.5 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * Basesystem Module 15-SP5 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Manager Proxy 4.3 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Manager Server 4.3 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Enterprise Storage 7.1 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * supportutils-3.2.8-150300.7.35.33.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * supportutils-3.2.8-150300.7.35.33.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222021 * https://bugzilla.suse.com/show_bug.cgi?id=1227127 * https://bugzilla.suse.com/show_bug.cgi?id=1228265 * https://jira.suse.com/browse/PED-8211 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Aug 28 16:30:15 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 28 Aug 2024 16:30:15 -0000 Subject: SUSE-RU-2024:3059-1: moderate: Recommended update for udisks2 Message-ID: <172486261541.18977.8078611793645935707@smelt2.prg2.suse.org> # Recommended update for udisks2 Announcement ID: SUSE-RU-2024:3059-1 Rating: moderate References: * bsc#1228290 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for udisks2 fixes the following issue: * Code patch: fix double free inside the g_static_resource_fini() atexit handler (bsc#1228290). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3059=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3059=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3059=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3059=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3059=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3059=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3059=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3059=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3059=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3059=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3059=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3059=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3059=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3059=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3059=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3059=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3059=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3059=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3059=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libudisks2-0_vdo-debuginfo-2.9.2-150400.3.6.2 * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * libudisks2-0_lsm-2.9.2-150400.3.6.2 * libudisks2-0_zram-2.9.2-150400.3.6.2 * libudisks2-0_bcache-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_zram-debuginfo-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * libudisks2-0_lsm-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_vdo-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0_bcache-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * openSUSE Leap 15.4 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libudisks2-0_vdo-debuginfo-2.9.2-150400.3.6.2 * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * libudisks2-0_lsm-2.9.2-150400.3.6.2 * libudisks2-0_zram-2.9.2-150400.3.6.2 * libudisks2-0_bcache-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_zram-debuginfo-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * libudisks2-0_lsm-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_vdo-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0_bcache-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * openSUSE Leap 15.5 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libudisks2-0_vdo-debuginfo-2.9.2-150400.3.6.2 * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * libudisks2-0_lsm-2.9.2-150400.3.6.2 * libudisks2-0_zram-2.9.2-150400.3.6.2 * libudisks2-0_bcache-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_zram-debuginfo-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * libudisks2-0_lsm-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_vdo-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0_bcache-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * openSUSE Leap 15.6 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * libudisks2-0_btrfs-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0_lvm2-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * Basesystem Module 15-SP5 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * Basesystem Module 15-SP6 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 * SUSE Manager Proxy 4.3 (x86_64) * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * SUSE Manager Proxy 4.3 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * typelib-1_0-UDisks-2_0-2.9.2-150400.3.6.2 * udisks2-debugsource-2.9.2-150400.3.6.2 * udisks2-debuginfo-2.9.2-150400.3.6.2 * libudisks2-0-devel-2.9.2-150400.3.6.2 * libudisks2-0-2.9.2-150400.3.6.2 * udisks2-2.9.2-150400.3.6.2 * libudisks2-0-debuginfo-2.9.2-150400.3.6.2 * SUSE Manager Server 4.3 (noarch) * udisks2-lang-2.9.2-150400.3.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228290 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Aug 28 16:30:29 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 28 Aug 2024 16:30:29 -0000 Subject: SUSE-SU-2024:3054-1: important: Security update for python3-setuptools Message-ID: <172486262930.18977.2930107369700953271@smelt2.prg2.suse.org> # Security update for python3-setuptools Announcement ID: SUSE-SU-2024:3054-1 Rating: important References: * bsc#1228105 Cross-References: * CVE-2024-6345 CVSS scores: * CVE-2024-6345 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python3-setuptools fixes the following issues: * CVE-2024-6345: Fixed code execution via download functions in the package_index module (bsc#1228105) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3054=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3054=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3054=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3054=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3054=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3054=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3054=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3054=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3054=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3054=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3054=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-3054=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3054=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3054=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3054=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3054=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-3054=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3054=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-3054=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * Basesystem Module 15-SP5 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * Basesystem Module 15-SP6 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * SUSE Manager Proxy 4.3 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * SUSE Manager Server 4.3 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * openSUSE Leap 15.4 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * openSUSE Leap Micro 5.5 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * openSUSE Leap 15.5 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * openSUSE Leap 15.6 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * python3-setuptools-test-44.1.1-150400.9.9.1 * python3-setuptools-wheel-44.1.1-150400.9.9.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * python3-setuptools-44.1.1-150400.9.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6345.html * https://bugzilla.suse.com/show_bug.cgi?id=1228105 -------------- next part -------------- An HTML attachment was scrubbed... URL: