From suse-liberty-linux-updates at lists.suse.com Tue Oct 1 15:05:41 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Tue, 1 Oct 2024 17:05:41 +0200 (CEST) Subject: RHSA-2024:7346: Low: SUSE Liberty Linux security update for cups-filters Message-ID: # security update for cups-filters Announcement ID: RHSA-2024:7346 Rating: Low Cross-References: * CVE-2024-47076 * CVE-2024-47175 * CVE-2024-47176 CVSS scores: * CVE-2024-47076 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-47076 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H * CVE-2024-47175 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47175 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H * CVE-2024-47176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47176 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H Affected Products: * SUSE Liberty Linux 9 An update that solves 3 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7346. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7346. ## Package List: * SUSE Liberty Linux 9: * cups-filters 1.28.7-17.el9_4 * cups-filters-devel 1.28.7-17.el9_4 * cups-filters-libs 1.28.7-17.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-47076.html * https://www.suse.com/security/cve/CVE-2024-47175.html * https://www.suse.com/security/cve/CVE-2024-47176.html From suse-liberty-linux-updates at lists.suse.com Tue Oct 1 15:05:42 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Tue, 1 Oct 2024 17:05:42 +0200 (CEST) Subject: RHSA-2024:7349: Low: SUSE Liberty Linux security update for grafana Message-ID: # security update for grafana Announcement ID: RHSA-2024:7349 Rating: Low Cross-References: * CVE-2024-24791 CVSS scores: * CVE-2024-24791 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Liberty Linux 8 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7349. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7349. ## Package List: * SUSE Liberty Linux 8: * grafana 9.2.10-18.el8_10 * grafana-selinux 9.2.10-18.el8_10 ## References: * https://www.suse.com/security/cve/CVE-2024-24791.html From suse-liberty-linux-updates at lists.suse.com Wed Oct 2 15:05:35 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Wed, 2 Oct 2024 17:05:35 +0200 (CEST) Subject: ESBA-2024:0607: Moderate: SUSE Liberty Linux bind: CVE-2024-0760, CVE-2024-1975, CVE-2024-1737, CVE-2024-4076 fixes Message-ID: # bind: CVE-2024-0760, CVE-2024-1975, CVE-2024-1737, CVE-2024-4076 fixes Announcement ID: ESBA-2024:0607 Rating: Moderate Cross-References: * CVE-2024-0760 * CVE-2024-1737 * CVE-2024-1975 * CVE-2024-4076 CVSS scores: * CVE-2024-0760 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-1737 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-1975 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-4076 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Liberty Linux 7 LTSS An update that solves 4 vulnerabilities can now be installed. ## Description: bind: CVE-2024-0760, CVE-2024-1975, CVE-2024-1737, CVE-2024-4076 fixes ## Package List: * SUSE Liberty Linux 7 LTSS: * bind 9.11.4-26.P2.el7_9.16 * bind-chroot 9.11.4-26.P2.el7_9.16 * bind-devel 9.11.4-26.P2.el7_9.16 * bind-export-devel 9.11.4-26.P2.el7_9.16 * bind-export-libs 9.11.4-26.P2.el7_9.16 * bind-libs 9.11.4-26.P2.el7_9.16 * bind-libs-lite 9.11.4-26.P2.el7_9.16 * bind-license 9.11.4-26.P2.el7_9.16 * bind-lite-devel 9.11.4-26.P2.el7_9.16 * bind-pkcs11 9.11.4-26.P2.el7_9.16 * bind-pkcs11-devel 9.11.4-26.P2.el7_9.16 * bind-pkcs11-libs 9.11.4-26.P2.el7_9.16 * bind-pkcs11-utils 9.11.4-26.P2.el7_9.16 * bind-sdb 9.11.4-26.P2.el7_9.16 * bind-sdb-chroot 9.11.4-26.P2.el7_9.16 * bind-utils 9.11.4-26.P2.el7_9.16 ## References: * https://www.suse.com/security/cve/CVE-2024-0760.html * https://www.suse.com/security/cve/CVE-2024-1737.html * https://www.suse.com/security/cve/CVE-2024-1975.html * https://www.suse.com/security/cve/CVE-2024-4076.html From suse-liberty-linux-updates at lists.suse.com Wed Oct 2 15:05:36 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Wed, 2 Oct 2024 17:05:36 +0200 (CEST) Subject: RHBA-2024:7457: Low: SUSE Liberty Linux bugfix update for mod_jk Message-ID: # bugfix update for mod_jk Announcement ID: RHBA-2024:7457 Rating: Low Affected Products: * SUSE Liberty Linux 9 An update that solves various issues can now be installed. ## Description: This bugfix update provides a functional equivalent of RHBA-2024:7457. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHBA-2024:7457. ## Package List: * SUSE Liberty Linux 9: * mod_jk 1.2.50-1.el9_4.1 From suse-liberty-linux-updates at lists.suse.com Wed Oct 2 15:05:36 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Wed, 2 Oct 2024 17:05:36 +0200 (CEST) Subject: RHSA-2024:7484: Low: SUSE Liberty Linux security update for linux-firmware Message-ID: # security update for linux-firmware Announcement ID: RHSA-2024:7484 Rating: Low Cross-References: * CVE-2023-20584 * CVE-2023-31356 CVSS scores: * CVE-2023-20584 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N * CVE-2023-20584 ( SUSE ): 4 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N * CVE-2023-31356 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2023-31356 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves 2 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7484. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7484. ## Package List: * SUSE Liberty Linux 9: * iwl100-firmware 39.31.5.1-143.3.el9_4 * iwl1000-firmware 39.31.5.1-143.3.el9_4 * iwl105-firmware 18.168.6.1-143.3.el9_4 * iwl135-firmware 18.168.6.1-143.3.el9_4 * iwl2000-firmware 18.168.6.1-143.3.el9_4 * iwl2030-firmware 18.168.6.1-143.3.el9_4 * iwl3160-firmware 25.30.13.0-143.3.el9_4 * iwl5000-firmware 8.83.5.1_1-143.3.el9_4 * iwl5150-firmware 8.24.2.2-143.3.el9_4 * iwl6000g2a-firmware 18.168.6.1-143.3.el9_4 * iwl6000g2b-firmware 18.168.6.1-143.3.el9_4 * iwl6050-firmware 41.28.5.1-143.3.el9_4 * iwl7260-firmware 25.30.13.0-143.3.el9_4 * libertas-sd8787-firmware 20240905-143.3.el9_4 * linux-firmware 20240905-143.3.el9_4 * linux-firmware-whence 20240905-143.3.el9_4 * netronome-firmware 20240905-143.3.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2023-20584.html * https://www.suse.com/security/cve/CVE-2023-31356.html From suse-liberty-linux-updates at lists.suse.com Wed Oct 2 15:05:36 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Wed, 2 Oct 2024 17:05:36 +0200 (CEST) Subject: RHSA-2024:7463: Low: SUSE Liberty Linux security update for cups-filters Message-ID: # security update for cups-filters Announcement ID: RHSA-2024:7463 Rating: Low Cross-References: * CVE-2024-47076 * CVE-2024-47175 * CVE-2024-47176 CVSS scores: * CVE-2024-47076 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-47076 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H * CVE-2024-47175 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47175 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H * CVE-2024-47176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47176 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H Affected Products: * SUSE Liberty Linux 8 An update that solves 3 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7463. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7463. ## Package List: * SUSE Liberty Linux 8: * cups-filters 1.20.0-35.el8_10 * cups-filters-devel 1.20.0-35.el8_10 * cups-filters-libs 1.20.0-35.el8_10 ## References: * https://www.suse.com/security/cve/CVE-2024-47076.html * https://www.suse.com/security/cve/CVE-2024-47175.html * https://www.suse.com/security/cve/CVE-2024-47176.html From suse-liberty-linux-updates at lists.suse.com Wed Oct 2 15:05:36 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Wed, 2 Oct 2024 17:05:36 +0200 (CEST) Subject: RHBA-2024:7448: Low: SUSE Liberty Linux bugfix update for glibc Message-ID: # bugfix update for glibc Announcement ID: RHBA-2024:7448 Rating: Low Affected Products: * SUSE Liberty Linux 9 An update that solves various issues can now be installed. ## Description: This bugfix update provides a functional equivalent of RHBA-2024:7448. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHBA-2024:7448. ## Package List: * SUSE Liberty Linux 9: * glibc 2.34-100.el9_4.4 * glibc-all-langpacks 2.34-100.el9_4.4 * glibc-benchtests 2.34-100.el9_4.4 * glibc-common 2.34-100.el9_4.4 * glibc-devel 2.34-100.el9_4.4 * glibc-doc 2.34-100.el9_4.4 * glibc-gconv-extra 2.34-100.el9_4.4 * glibc-headers 2.34-100.el9_4.4 * glibc-langpack-aa 2.34-100.el9_4.4 * glibc-langpack-af 2.34-100.el9_4.4 * glibc-langpack-agr 2.34-100.el9_4.4 * glibc-langpack-ak 2.34-100.el9_4.4 * glibc-langpack-am 2.34-100.el9_4.4 * glibc-langpack-an 2.34-100.el9_4.4 * glibc-langpack-anp 2.34-100.el9_4.4 * glibc-langpack-ar 2.34-100.el9_4.4 * glibc-langpack-as 2.34-100.el9_4.4 * glibc-langpack-ast 2.34-100.el9_4.4 * glibc-langpack-ayc 2.34-100.el9_4.4 * glibc-langpack-az 2.34-100.el9_4.4 * glibc-langpack-be 2.34-100.el9_4.4 * glibc-langpack-bem 2.34-100.el9_4.4 * glibc-langpack-ber 2.34-100.el9_4.4 * glibc-langpack-bg 2.34-100.el9_4.4 * glibc-langpack-bhb 2.34-100.el9_4.4 * glibc-langpack-bho 2.34-100.el9_4.4 * glibc-langpack-bi 2.34-100.el9_4.4 * glibc-langpack-bn 2.34-100.el9_4.4 * glibc-langpack-bo 2.34-100.el9_4.4 * glibc-langpack-br 2.34-100.el9_4.4 * glibc-langpack-brx 2.34-100.el9_4.4 * glibc-langpack-bs 2.34-100.el9_4.4 * glibc-langpack-byn 2.34-100.el9_4.4 * glibc-langpack-ca 2.34-100.el9_4.4 * glibc-langpack-ce 2.34-100.el9_4.4 * glibc-langpack-chr 2.34-100.el9_4.4 * glibc-langpack-ckb 2.34-100.el9_4.4 * glibc-langpack-cmn 2.34-100.el9_4.4 * glibc-langpack-crh 2.34-100.el9_4.4 * glibc-langpack-cs 2.34-100.el9_4.4 * glibc-langpack-csb 2.34-100.el9_4.4 * glibc-langpack-cv 2.34-100.el9_4.4 * glibc-langpack-cy 2.34-100.el9_4.4 * glibc-langpack-da 2.34-100.el9_4.4 * glibc-langpack-de 2.34-100.el9_4.4 * glibc-langpack-doi 2.34-100.el9_4.4 * glibc-langpack-dsb 2.34-100.el9_4.4 * glibc-langpack-dv 2.34-100.el9_4.4 * glibc-langpack-dz 2.34-100.el9_4.4 * glibc-langpack-el 2.34-100.el9_4.4 * glibc-langpack-en 2.34-100.el9_4.4 * glibc-langpack-eo 2.34-100.el9_4.4 * glibc-langpack-es 2.34-100.el9_4.4 * glibc-langpack-et 2.34-100.el9_4.4 * glibc-langpack-eu 2.34-100.el9_4.4 * glibc-langpack-fa 2.34-100.el9_4.4 * glibc-langpack-ff 2.34-100.el9_4.4 * glibc-langpack-fi 2.34-100.el9_4.4 * glibc-langpack-fil 2.34-100.el9_4.4 * glibc-langpack-fo 2.34-100.el9_4.4 * glibc-langpack-fr 2.34-100.el9_4.4 * glibc-langpack-fur 2.34-100.el9_4.4 * glibc-langpack-fy 2.34-100.el9_4.4 * glibc-langpack-ga 2.34-100.el9_4.4 * glibc-langpack-gd 2.34-100.el9_4.4 * glibc-langpack-gez 2.34-100.el9_4.4 * glibc-langpack-gl 2.34-100.el9_4.4 * glibc-langpack-gu 2.34-100.el9_4.4 * glibc-langpack-gv 2.34-100.el9_4.4 * glibc-langpack-ha 2.34-100.el9_4.4 * glibc-langpack-hak 2.34-100.el9_4.4 * glibc-langpack-he 2.34-100.el9_4.4 * glibc-langpack-hi 2.34-100.el9_4.4 * glibc-langpack-hif 2.34-100.el9_4.4 * glibc-langpack-hne 2.34-100.el9_4.4 * glibc-langpack-hr 2.34-100.el9_4.4 * glibc-langpack-hsb 2.34-100.el9_4.4 * glibc-langpack-ht 2.34-100.el9_4.4 * glibc-langpack-hu 2.34-100.el9_4.4 * glibc-langpack-hy 2.34-100.el9_4.4 * glibc-langpack-ia 2.34-100.el9_4.4 * glibc-langpack-id 2.34-100.el9_4.4 * glibc-langpack-ig 2.34-100.el9_4.4 * glibc-langpack-ik 2.34-100.el9_4.4 * glibc-langpack-is 2.34-100.el9_4.4 * glibc-langpack-it 2.34-100.el9_4.4 * glibc-langpack-iu 2.34-100.el9_4.4 * glibc-langpack-ja 2.34-100.el9_4.4 * glibc-langpack-ka 2.34-100.el9_4.4 * glibc-langpack-kab 2.34-100.el9_4.4 * glibc-langpack-kk 2.34-100.el9_4.4 * glibc-langpack-kl 2.34-100.el9_4.4 * glibc-langpack-km 2.34-100.el9_4.4 * glibc-langpack-kn 2.34-100.el9_4.4 * glibc-langpack-ko 2.34-100.el9_4.4 * glibc-langpack-kok 2.34-100.el9_4.4 * glibc-langpack-ks 2.34-100.el9_4.4 * glibc-langpack-ku 2.34-100.el9_4.4 * glibc-langpack-kw 2.34-100.el9_4.4 * glibc-langpack-ky 2.34-100.el9_4.4 * glibc-langpack-lb 2.34-100.el9_4.4 * glibc-langpack-lg 2.34-100.el9_4.4 * glibc-langpack-li 2.34-100.el9_4.4 * glibc-langpack-lij 2.34-100.el9_4.4 * glibc-langpack-ln 2.34-100.el9_4.4 * glibc-langpack-lo 2.34-100.el9_4.4 * glibc-langpack-lt 2.34-100.el9_4.4 * glibc-langpack-lv 2.34-100.el9_4.4 * glibc-langpack-lzh 2.34-100.el9_4.4 * glibc-langpack-mag 2.34-100.el9_4.4 * glibc-langpack-mai 2.34-100.el9_4.4 * glibc-langpack-mfe 2.34-100.el9_4.4 * glibc-langpack-mg 2.34-100.el9_4.4 * glibc-langpack-mhr 2.34-100.el9_4.4 * glibc-langpack-mi 2.34-100.el9_4.4 * glibc-langpack-miq 2.34-100.el9_4.4 * glibc-langpack-mjw 2.34-100.el9_4.4 * glibc-langpack-mk 2.34-100.el9_4.4 * glibc-langpack-ml 2.34-100.el9_4.4 * glibc-langpack-mn 2.34-100.el9_4.4 * glibc-langpack-mni 2.34-100.el9_4.4 * glibc-langpack-mnw 2.34-100.el9_4.4 * glibc-langpack-mr 2.34-100.el9_4.4 * glibc-langpack-ms 2.34-100.el9_4.4 * glibc-langpack-mt 2.34-100.el9_4.4 * glibc-langpack-my 2.34-100.el9_4.4 * glibc-langpack-nan 2.34-100.el9_4.4 * glibc-langpack-nb 2.34-100.el9_4.4 * glibc-langpack-nds 2.34-100.el9_4.4 * glibc-langpack-ne 2.34-100.el9_4.4 * glibc-langpack-nhn 2.34-100.el9_4.4 * glibc-langpack-niu 2.34-100.el9_4.4 * glibc-langpack-nl 2.34-100.el9_4.4 * glibc-langpack-nn 2.34-100.el9_4.4 * glibc-langpack-nr 2.34-100.el9_4.4 * glibc-langpack-nso 2.34-100.el9_4.4 * glibc-langpack-oc 2.34-100.el9_4.4 * glibc-langpack-om 2.34-100.el9_4.4 * glibc-langpack-or 2.34-100.el9_4.4 * glibc-langpack-os 2.34-100.el9_4.4 * glibc-langpack-pa 2.34-100.el9_4.4 * glibc-langpack-pap 2.34-100.el9_4.4 * glibc-langpack-pl 2.34-100.el9_4.4 * glibc-langpack-ps 2.34-100.el9_4.4 * glibc-langpack-pt 2.34-100.el9_4.4 * glibc-langpack-quz 2.34-100.el9_4.4 * glibc-langpack-raj 2.34-100.el9_4.4 * glibc-langpack-ro 2.34-100.el9_4.4 * glibc-langpack-ru 2.34-100.el9_4.4 * glibc-langpack-rw 2.34-100.el9_4.4 * glibc-langpack-sa 2.34-100.el9_4.4 * glibc-langpack-sah 2.34-100.el9_4.4 * glibc-langpack-sat 2.34-100.el9_4.4 * glibc-langpack-sc 2.34-100.el9_4.4 * glibc-langpack-sd 2.34-100.el9_4.4 * glibc-langpack-se 2.34-100.el9_4.4 * glibc-langpack-sgs 2.34-100.el9_4.4 * glibc-langpack-shn 2.34-100.el9_4.4 * glibc-langpack-shs 2.34-100.el9_4.4 * glibc-langpack-si 2.34-100.el9_4.4 * glibc-langpack-sid 2.34-100.el9_4.4 * glibc-langpack-sk 2.34-100.el9_4.4 * glibc-langpack-sl 2.34-100.el9_4.4 * glibc-langpack-sm 2.34-100.el9_4.4 * glibc-langpack-so 2.34-100.el9_4.4 * glibc-langpack-sq 2.34-100.el9_4.4 * glibc-langpack-sr 2.34-100.el9_4.4 * glibc-langpack-ss 2.34-100.el9_4.4 * glibc-langpack-st 2.34-100.el9_4.4 * glibc-langpack-sv 2.34-100.el9_4.4 * glibc-langpack-sw 2.34-100.el9_4.4 * glibc-langpack-szl 2.34-100.el9_4.4 * glibc-langpack-ta 2.34-100.el9_4.4 * glibc-langpack-tcy 2.34-100.el9_4.4 * glibc-langpack-te 2.34-100.el9_4.4 * glibc-langpack-tg 2.34-100.el9_4.4 * glibc-langpack-th 2.34-100.el9_4.4 * glibc-langpack-the 2.34-100.el9_4.4 * glibc-langpack-ti 2.34-100.el9_4.4 * glibc-langpack-tig 2.34-100.el9_4.4 * glibc-langpack-tk 2.34-100.el9_4.4 * glibc-langpack-tl 2.34-100.el9_4.4 * glibc-langpack-tn 2.34-100.el9_4.4 * glibc-langpack-to 2.34-100.el9_4.4 * glibc-langpack-tpi 2.34-100.el9_4.4 * glibc-langpack-tr 2.34-100.el9_4.4 * glibc-langpack-ts 2.34-100.el9_4.4 * glibc-langpack-tt 2.34-100.el9_4.4 * glibc-langpack-ug 2.34-100.el9_4.4 * glibc-langpack-uk 2.34-100.el9_4.4 * glibc-langpack-unm 2.34-100.el9_4.4 * glibc-langpack-ur 2.34-100.el9_4.4 * glibc-langpack-uz 2.34-100.el9_4.4 * glibc-langpack-ve 2.34-100.el9_4.4 * glibc-langpack-vi 2.34-100.el9_4.4 * glibc-langpack-wa 2.34-100.el9_4.4 * glibc-langpack-wae 2.34-100.el9_4.4 * glibc-langpack-wal 2.34-100.el9_4.4 * glibc-langpack-wo 2.34-100.el9_4.4 * glibc-langpack-xh 2.34-100.el9_4.4 * glibc-langpack-yi 2.34-100.el9_4.4 * glibc-langpack-yo 2.34-100.el9_4.4 * glibc-langpack-yue 2.34-100.el9_4.4 * glibc-langpack-yuw 2.34-100.el9_4.4 * glibc-langpack-zh 2.34-100.el9_4.4 * glibc-langpack-zu 2.34-100.el9_4.4 * glibc-locale-source 2.34-100.el9_4.4 * glibc-minimal-langpack 2.34-100.el9_4.4 * glibc-nss-devel 2.34-100.el9_4.4 * glibc-static 2.34-100.el9_4.4 * glibc-utils 2.34-100.el9_4.4 * libnsl 2.34-100.el9_4.4 * nscd 2.34-100.el9_4.4 * nss_db 2.34-100.el9_4.4 * nss_hesiod 2.34-100.el9_4.4 From suse-liberty-linux-updates at lists.suse.com Wed Oct 2 15:05:36 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Wed, 2 Oct 2024 17:05:36 +0200 (CEST) Subject: RHSA-2024:7481: Low: SUSE Liberty Linux security update for linux-firmware Message-ID: # security update for linux-firmware Announcement ID: RHSA-2024:7481 Rating: Low Cross-References: * CVE-2023-20584 * CVE-2023-31356 CVSS scores: * CVE-2023-20584 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N * CVE-2023-20584 ( SUSE ): 4 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N * CVE-2023-31356 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2023-31356 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 8 An update that solves 2 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7481. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7481. ## Package List: * SUSE Liberty Linux 8: * iwl100-firmware 39.31.5.1-124.el8_10.1 * iwl1000-firmware 39.31.5.1-124.el8_10.1 * iwl105-firmware 18.168.6.1-124.el8_10.1 * iwl135-firmware 18.168.6.1-124.el8_10.1 * iwl2000-firmware 18.168.6.1-124.el8_10.1 * iwl2030-firmware 18.168.6.1-124.el8_10.1 * iwl3160-firmware 25.30.13.0-124.el8_10.1 * iwl3945-firmware 15.32.2.9-124.el8_10.1 * iwl4965-firmware 228.61.2.24-124.el8_10.1 * iwl5000-firmware 8.83.5.1_1-124.el8_10.1 * iwl5150-firmware 8.24.2.2-124.el8_10.1 * iwl6000-firmware 9.221.4.1-124.el8_10.1 * iwl6000g2a-firmware 18.168.6.1-124.el8_10.1 * iwl6000g2b-firmware 18.168.6.1-124.el8_10.1 * iwl6050-firmware 41.28.5.1-124.el8_10.1 * iwl7260-firmware 25.30.13.0-124.el8_10.1 * libertas-sd8686-firmware 20240827-124.git3cff7109.el8_10 * libertas-sd8787-firmware 20240827-124.git3cff7109.el8_10 * libertas-usb8388-firmware 20240827-124.git3cff7109.el8_10 * libertas-usb8388-olpc-firmware 20240827-124.git3cff7109.el8_10 * linux-firmware 20240827-124.git3cff7109.el8_10 ## References: * https://www.suse.com/security/cve/CVE-2023-20584.html * https://www.suse.com/security/cve/CVE-2023-31356.html From suse-liberty-linux-updates at lists.suse.com Thu Oct 3 15:05:56 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 3 Oct 2024 17:05:56 +0200 (CEST) Subject: RHBA-2024:6984: Low: SUSE Liberty Linux bugfix update for firewalld Message-ID: # bugfix update for firewalld Announcement ID: RHBA-2024:6984 Rating: Low Affected Products: * SUSE Liberty Linux 8 An update that solves various issues can now be installed. ## Description: This bugfix update provides a functional equivalent of RHBA-2024:6984. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHBA-2024:6984. ## Package List: * SUSE Liberty Linux 8: * firewall-applet 0.9.11-9.el8_10 * firewall-config 0.9.11-9.el8_10 * firewalld 0.9.11-9.el8_10 * firewalld-filesystem 0.9.11-9.el8_10 * python3-firewall 0.9.11-9.el8_10 From suse-liberty-linux-updates at lists.suse.com Thu Oct 3 15:05:56 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 3 Oct 2024 17:05:56 +0200 (CEST) Subject: RHSA-2024:7550: Low: SUSE Liberty Linux security update for golang Message-ID: # security update for golang Announcement ID: RHSA-2024:7550 Rating: Low Cross-References: * CVE-2024-9355 Affected Products: * SUSE Liberty Linux 9 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7550. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7550. ## Package List: * SUSE Liberty Linux 9: * go-toolset 1.21.13-4.el9_4 * golang 1.21.13-4.el9_4 * golang-bin 1.21.13-4.el9_4 * golang-docs 1.21.13-4.el9_4 * golang-misc 1.21.13-4.el9_4 * golang-src 1.21.13-4.el9_4 * golang-tests 1.21.13-4.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-9355.html From suse-liberty-linux-updates at lists.suse.com Thu Oct 3 15:05:56 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 3 Oct 2024 17:05:56 +0200 (CEST) Subject: RHBA-2024:6985: Low: SUSE Liberty Linux bugfix update for avahi Message-ID: # bugfix update for avahi Announcement ID: RHBA-2024:6985 Rating: Low Affected Products: * SUSE Liberty Linux 8 An update that solves various issues can now be installed. ## Description: This bugfix update provides a functional equivalent of RHBA-2024:6985. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHBA-2024:6985. ## Package List: * SUSE Liberty Linux 8: * avahi 0.7-27.el8_10.1 * avahi-autoipd 0.7-27.el8_10.1 * avahi-compat-howl 0.7-27.el8_10.1 * avahi-compat-howl-devel 0.7-27.el8_10.1 * avahi-compat-libdns_sd 0.7-27.el8_10.1 * avahi-compat-libdns_sd-devel 0.7-27.el8_10.1 * avahi-devel 0.7-27.el8_10.1 * avahi-glib 0.7-27.el8_10.1 * avahi-glib-devel 0.7-27.el8_10.1 * avahi-gobject 0.7-27.el8_10.1 * avahi-gobject-devel 0.7-27.el8_10.1 * avahi-libs 0.7-27.el8_10.1 * avahi-tools 0.7-27.el8_10.1 * avahi-ui 0.7-27.el8_10.1 * avahi-ui-devel 0.7-27.el8_10.1 * avahi-ui-gtk3 0.7-27.el8_10.1 * python3-avahi 0.7-27.el8_10.1 From suse-liberty-linux-updates at lists.suse.com Thu Oct 3 15:05:56 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 3 Oct 2024 17:05:56 +0200 (CEST) Subject: RHSA-2024:6994: Low: SUSE Liberty Linux security update for kernel Message-ID: # security update for kernel Announcement ID: RHSA-2024:6994 Rating: Low Cross-References: * CVE-2024-2201 * CVE-2024-41071 CVSS scores: * CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Liberty Linux 7 LTSS An update that solves 2 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:6994. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:6994. ## Package List: * SUSE Liberty Linux 7 LTSS: * bpftool 3.10.0-1160.125.1.el7 * kernel 3.10.0-1160.125.1.el7 * kernel-abi-whitelists 3.10.0-1160.125.1.el7 * kernel-debug 3.10.0-1160.125.1.el7 * kernel-debug-devel 3.10.0-1160.125.1.el7 * kernel-devel 3.10.0-1160.125.1.el7 * kernel-doc 3.10.0-1160.125.1.el7 * kernel-headers 3.10.0-1160.125.1.el7 * kernel-tools 3.10.0-1160.125.1.el7 * kernel-tools-libs 3.10.0-1160.125.1.el7 * kernel-tools-libs-devel 3.10.0-1160.125.1.el7 * perf 3.10.0-1160.125.1.el7 * python-perf 3.10.0-1160.125.1.el7 ## References: * https://www.suse.com/security/cve/CVE-2024-2201.html * https://www.suse.com/security/cve/CVE-2024-41071.html From suse-liberty-linux-updates at lists.suse.com Thu Oct 3 15:05:56 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 3 Oct 2024 17:05:56 +0200 (CEST) Subject: RHSA-2024:7502: Low: SUSE Liberty Linux security update for delve Message-ID: # security update for delve Announcement ID: RHSA-2024:7502 Rating: Low Cross-References: * CVE-2024-9355 Affected Products: * SUSE Liberty Linux 8 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7502. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7502. ## Package List: * SUSE Liberty Linux 8: * delve 1.21.2-4.module+el8.10.0+22329+6cd5c9c6 * go-toolset 1.21.13-1.module+el8.10.0+22329+6cd5c9c6 * golang 1.21.13-3.module+el8.10.0+22345+acdd8d0e * golang-bin 1.21.13-3.module+el8.10.0+22345+acdd8d0e * golang-docs 1.21.13-3.module+el8.10.0+22345+acdd8d0e * golang-misc 1.21.13-3.module+el8.10.0+22345+acdd8d0e * golang-src 1.21.13-3.module+el8.10.0+22345+acdd8d0e * golang-tests 1.21.13-3.module+el8.10.0+22345+acdd8d0e ## References: * https://www.suse.com/security/cve/CVE-2024-9355.html From suse-liberty-linux-updates at lists.suse.com Thu Oct 3 15:05:56 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 3 Oct 2024 17:05:56 +0200 (CEST) Subject: RHBA-2024:6988: Low: SUSE Liberty Linux bugfix update for glibc Message-ID: # bugfix update for glibc Announcement ID: RHBA-2024:6988 Rating: Low Affected Products: * SUSE Liberty Linux 8 An update that solves various issues can now be installed. ## Description: This bugfix update provides a functional equivalent of RHBA-2024:6988. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHBA-2024:6988. ## Package List: * SUSE Liberty Linux 8: * compat-libpthread-nonshared 2.28-251.el8_10.5 * glibc 2.28-251.el8_10.5 * glibc-all-langpacks 2.28-251.el8_10.5 * glibc-benchtests 2.28-251.el8_10.5 * glibc-common 2.28-251.el8_10.5 * glibc-devel 2.28-251.el8_10.5 * glibc-doc 2.28-251.el8_10.5 * glibc-gconv-extra 2.28-251.el8_10.5 * glibc-headers 2.28-251.el8_10.5 * glibc-langpack-aa 2.28-251.el8_10.5 * glibc-langpack-af 2.28-251.el8_10.5 * glibc-langpack-agr 2.28-251.el8_10.5 * glibc-langpack-ak 2.28-251.el8_10.5 * glibc-langpack-am 2.28-251.el8_10.5 * glibc-langpack-an 2.28-251.el8_10.5 * glibc-langpack-anp 2.28-251.el8_10.5 * glibc-langpack-ar 2.28-251.el8_10.5 * glibc-langpack-as 2.28-251.el8_10.5 * glibc-langpack-ast 2.28-251.el8_10.5 * glibc-langpack-ayc 2.28-251.el8_10.5 * glibc-langpack-az 2.28-251.el8_10.5 * glibc-langpack-be 2.28-251.el8_10.5 * glibc-langpack-bem 2.28-251.el8_10.5 * glibc-langpack-ber 2.28-251.el8_10.5 * glibc-langpack-bg 2.28-251.el8_10.5 * glibc-langpack-bhb 2.28-251.el8_10.5 * glibc-langpack-bho 2.28-251.el8_10.5 * glibc-langpack-bi 2.28-251.el8_10.5 * glibc-langpack-bn 2.28-251.el8_10.5 * glibc-langpack-bo 2.28-251.el8_10.5 * glibc-langpack-br 2.28-251.el8_10.5 * glibc-langpack-brx 2.28-251.el8_10.5 * glibc-langpack-bs 2.28-251.el8_10.5 * glibc-langpack-byn 2.28-251.el8_10.5 * glibc-langpack-ca 2.28-251.el8_10.5 * glibc-langpack-ce 2.28-251.el8_10.5 * glibc-langpack-chr 2.28-251.el8_10.5 * glibc-langpack-cmn 2.28-251.el8_10.5 * glibc-langpack-crh 2.28-251.el8_10.5 * glibc-langpack-cs 2.28-251.el8_10.5 * glibc-langpack-csb 2.28-251.el8_10.5 * glibc-langpack-cv 2.28-251.el8_10.5 * glibc-langpack-cy 2.28-251.el8_10.5 * glibc-langpack-da 2.28-251.el8_10.5 * glibc-langpack-de 2.28-251.el8_10.5 * glibc-langpack-doi 2.28-251.el8_10.5 * glibc-langpack-dsb 2.28-251.el8_10.5 * glibc-langpack-dv 2.28-251.el8_10.5 * glibc-langpack-dz 2.28-251.el8_10.5 * glibc-langpack-el 2.28-251.el8_10.5 * glibc-langpack-en 2.28-251.el8_10.5 * glibc-langpack-eo 2.28-251.el8_10.5 * glibc-langpack-es 2.28-251.el8_10.5 * glibc-langpack-et 2.28-251.el8_10.5 * glibc-langpack-eu 2.28-251.el8_10.5 * glibc-langpack-fa 2.28-251.el8_10.5 * glibc-langpack-ff 2.28-251.el8_10.5 * glibc-langpack-fi 2.28-251.el8_10.5 * glibc-langpack-fil 2.28-251.el8_10.5 * glibc-langpack-fo 2.28-251.el8_10.5 * glibc-langpack-fr 2.28-251.el8_10.5 * glibc-langpack-fur 2.28-251.el8_10.5 * glibc-langpack-fy 2.28-251.el8_10.5 * glibc-langpack-ga 2.28-251.el8_10.5 * glibc-langpack-gd 2.28-251.el8_10.5 * glibc-langpack-gez 2.28-251.el8_10.5 * glibc-langpack-gl 2.28-251.el8_10.5 * glibc-langpack-gu 2.28-251.el8_10.5 * glibc-langpack-gv 2.28-251.el8_10.5 * glibc-langpack-ha 2.28-251.el8_10.5 * glibc-langpack-hak 2.28-251.el8_10.5 * glibc-langpack-he 2.28-251.el8_10.5 * glibc-langpack-hi 2.28-251.el8_10.5 * glibc-langpack-hif 2.28-251.el8_10.5 * glibc-langpack-hne 2.28-251.el8_10.5 * glibc-langpack-hr 2.28-251.el8_10.5 * glibc-langpack-hsb 2.28-251.el8_10.5 * glibc-langpack-ht 2.28-251.el8_10.5 * glibc-langpack-hu 2.28-251.el8_10.5 * glibc-langpack-hy 2.28-251.el8_10.5 * glibc-langpack-ia 2.28-251.el8_10.5 * glibc-langpack-id 2.28-251.el8_10.5 * glibc-langpack-ig 2.28-251.el8_10.5 * glibc-langpack-ik 2.28-251.el8_10.5 * glibc-langpack-is 2.28-251.el8_10.5 * glibc-langpack-it 2.28-251.el8_10.5 * glibc-langpack-iu 2.28-251.el8_10.5 * glibc-langpack-ja 2.28-251.el8_10.5 * glibc-langpack-ka 2.28-251.el8_10.5 * glibc-langpack-kab 2.28-251.el8_10.5 * glibc-langpack-kk 2.28-251.el8_10.5 * glibc-langpack-kl 2.28-251.el8_10.5 * glibc-langpack-km 2.28-251.el8_10.5 * glibc-langpack-kn 2.28-251.el8_10.5 * glibc-langpack-ko 2.28-251.el8_10.5 * glibc-langpack-kok 2.28-251.el8_10.5 * glibc-langpack-ks 2.28-251.el8_10.5 * glibc-langpack-ku 2.28-251.el8_10.5 * glibc-langpack-kw 2.28-251.el8_10.5 * glibc-langpack-ky 2.28-251.el8_10.5 * glibc-langpack-lb 2.28-251.el8_10.5 * glibc-langpack-lg 2.28-251.el8_10.5 * glibc-langpack-li 2.28-251.el8_10.5 * glibc-langpack-lij 2.28-251.el8_10.5 * glibc-langpack-ln 2.28-251.el8_10.5 * glibc-langpack-lo 2.28-251.el8_10.5 * glibc-langpack-lt 2.28-251.el8_10.5 * glibc-langpack-lv 2.28-251.el8_10.5 * glibc-langpack-lzh 2.28-251.el8_10.5 * glibc-langpack-mag 2.28-251.el8_10.5 * glibc-langpack-mai 2.28-251.el8_10.5 * glibc-langpack-mfe 2.28-251.el8_10.5 * glibc-langpack-mg 2.28-251.el8_10.5 * glibc-langpack-mhr 2.28-251.el8_10.5 * glibc-langpack-mi 2.28-251.el8_10.5 * glibc-langpack-miq 2.28-251.el8_10.5 * glibc-langpack-mjw 2.28-251.el8_10.5 * glibc-langpack-mk 2.28-251.el8_10.5 * glibc-langpack-ml 2.28-251.el8_10.5 * glibc-langpack-mn 2.28-251.el8_10.5 * glibc-langpack-mni 2.28-251.el8_10.5 * glibc-langpack-mr 2.28-251.el8_10.5 * glibc-langpack-ms 2.28-251.el8_10.5 * glibc-langpack-mt 2.28-251.el8_10.5 * glibc-langpack-my 2.28-251.el8_10.5 * glibc-langpack-nan 2.28-251.el8_10.5 * glibc-langpack-nb 2.28-251.el8_10.5 * glibc-langpack-nds 2.28-251.el8_10.5 * glibc-langpack-ne 2.28-251.el8_10.5 * glibc-langpack-nhn 2.28-251.el8_10.5 * glibc-langpack-niu 2.28-251.el8_10.5 * glibc-langpack-nl 2.28-251.el8_10.5 * glibc-langpack-nn 2.28-251.el8_10.5 * glibc-langpack-nr 2.28-251.el8_10.5 * glibc-langpack-nso 2.28-251.el8_10.5 * glibc-langpack-oc 2.28-251.el8_10.5 * glibc-langpack-om 2.28-251.el8_10.5 * glibc-langpack-or 2.28-251.el8_10.5 * glibc-langpack-os 2.28-251.el8_10.5 * glibc-langpack-pa 2.28-251.el8_10.5 * glibc-langpack-pap 2.28-251.el8_10.5 * glibc-langpack-pl 2.28-251.el8_10.5 * glibc-langpack-ps 2.28-251.el8_10.5 * glibc-langpack-pt 2.28-251.el8_10.5 * glibc-langpack-quz 2.28-251.el8_10.5 * glibc-langpack-raj 2.28-251.el8_10.5 * glibc-langpack-ro 2.28-251.el8_10.5 * glibc-langpack-ru 2.28-251.el8_10.5 * glibc-langpack-rw 2.28-251.el8_10.5 * glibc-langpack-sa 2.28-251.el8_10.5 * glibc-langpack-sah 2.28-251.el8_10.5 * glibc-langpack-sat 2.28-251.el8_10.5 * glibc-langpack-sc 2.28-251.el8_10.5 * glibc-langpack-sd 2.28-251.el8_10.5 * glibc-langpack-se 2.28-251.el8_10.5 * glibc-langpack-sgs 2.28-251.el8_10.5 * glibc-langpack-shn 2.28-251.el8_10.5 * glibc-langpack-shs 2.28-251.el8_10.5 * glibc-langpack-si 2.28-251.el8_10.5 * glibc-langpack-sid 2.28-251.el8_10.5 * glibc-langpack-sk 2.28-251.el8_10.5 * glibc-langpack-sl 2.28-251.el8_10.5 * glibc-langpack-sm 2.28-251.el8_10.5 * glibc-langpack-so 2.28-251.el8_10.5 * glibc-langpack-sq 2.28-251.el8_10.5 * glibc-langpack-sr 2.28-251.el8_10.5 * glibc-langpack-ss 2.28-251.el8_10.5 * glibc-langpack-st 2.28-251.el8_10.5 * glibc-langpack-sv 2.28-251.el8_10.5 * glibc-langpack-sw 2.28-251.el8_10.5 * glibc-langpack-szl 2.28-251.el8_10.5 * glibc-langpack-ta 2.28-251.el8_10.5 * glibc-langpack-tcy 2.28-251.el8_10.5 * glibc-langpack-te 2.28-251.el8_10.5 * glibc-langpack-tg 2.28-251.el8_10.5 * glibc-langpack-th 2.28-251.el8_10.5 * glibc-langpack-the 2.28-251.el8_10.5 * glibc-langpack-ti 2.28-251.el8_10.5 * glibc-langpack-tig 2.28-251.el8_10.5 * glibc-langpack-tk 2.28-251.el8_10.5 * glibc-langpack-tl 2.28-251.el8_10.5 * glibc-langpack-tn 2.28-251.el8_10.5 * glibc-langpack-to 2.28-251.el8_10.5 * glibc-langpack-tpi 2.28-251.el8_10.5 * glibc-langpack-tr 2.28-251.el8_10.5 * glibc-langpack-ts 2.28-251.el8_10.5 * glibc-langpack-tt 2.28-251.el8_10.5 * glibc-langpack-ug 2.28-251.el8_10.5 * glibc-langpack-uk 2.28-251.el8_10.5 * glibc-langpack-unm 2.28-251.el8_10.5 * glibc-langpack-ur 2.28-251.el8_10.5 * glibc-langpack-uz 2.28-251.el8_10.5 * glibc-langpack-ve 2.28-251.el8_10.5 * glibc-langpack-vi 2.28-251.el8_10.5 * glibc-langpack-wa 2.28-251.el8_10.5 * glibc-langpack-wae 2.28-251.el8_10.5 * glibc-langpack-wal 2.28-251.el8_10.5 * glibc-langpack-wo 2.28-251.el8_10.5 * glibc-langpack-xh 2.28-251.el8_10.5 * glibc-langpack-yi 2.28-251.el8_10.5 * glibc-langpack-yo 2.28-251.el8_10.5 * glibc-langpack-yue 2.28-251.el8_10.5 * glibc-langpack-yuw 2.28-251.el8_10.5 * glibc-langpack-zh 2.28-251.el8_10.5 * glibc-langpack-zu 2.28-251.el8_10.5 * glibc-locale-source 2.28-251.el8_10.5 * glibc-minimal-langpack 2.28-251.el8_10.5 * glibc-nss-devel 2.28-251.el8_10.5 * glibc-static 2.28-251.el8_10.5 * glibc-utils 2.28-251.el8_10.5 * libnsl 2.28-251.el8_10.5 * nscd 2.28-251.el8_10.5 * nss_db 2.28-251.el8_10.5 * nss_hesiod 2.28-251.el8_10.5 From suse-liberty-linux-updates at lists.suse.com Fri Oct 4 15:05:46 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 4 Oct 2024 17:05:46 +0200 (CEST) Subject: ESBA-2024:0639: Moderate: SUSE Liberty Linux The equivalent of RHSA-2024:5930: CVE-2024-1737, CVE-2024-1975 fixes Message-ID: # The equivalent of RHSA-2024:5930: CVE-2024-1737, CVE-2024-1975 fixes Announcement ID: ESBA-2024:0639 Rating: Moderate References: * bsc#1231274 Cross-References: * CVE-2024-1737 * CVE-2024-1975 CVSS scores: * CVE-2024-1737 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-1975 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Liberty Linux 7 LTSS An update that solves 2 vulnerabilities and has one bug fix can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:5930. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:5930 ## Package List: * SUSE Liberty Linux 7 LTSS: * bind 9.11.4-26.P2.el7_9.17 * bind-chroot 9.11.4-26.P2.el7_9.17 * bind-devel 9.11.4-26.P2.el7_9.17 * bind-export-devel 9.11.4-26.P2.el7_9.17 * bind-export-libs 9.11.4-26.P2.el7_9.17 * bind-libs 9.11.4-26.P2.el7_9.17 * bind-libs-lite 9.11.4-26.P2.el7_9.17 * bind-license 9.11.4-26.P2.el7_9.17 * bind-lite-devel 9.11.4-26.P2.el7_9.17 * bind-pkcs11 9.11.4-26.P2.el7_9.17 * bind-pkcs11-devel 9.11.4-26.P2.el7_9.17 * bind-pkcs11-libs 9.11.4-26.P2.el7_9.17 * bind-pkcs11-utils 9.11.4-26.P2.el7_9.17 * bind-sdb 9.11.4-26.P2.el7_9.17 * bind-sdb-chroot 9.11.4-26.P2.el7_9.17 * bind-utils 9.11.4-26.P2.el7_9.17 ## References: * https://www.suse.com/security/cve/CVE-2024-1737.html * https://www.suse.com/security/cve/CVE-2024-1975.html From suse-liberty-linux-updates at lists.suse.com Fri Oct 4 15:05:46 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 4 Oct 2024 17:05:46 +0200 (CEST) Subject: RHSA-2024:7505: Low: SUSE Liberty Linux security update for firefox Message-ID: # security update for firefox Announcement ID: RHSA-2024:7505 Rating: Low Cross-References: * CVE-2024-9392 * CVE-2024-9393 * CVE-2024-9394 * CVE-2024-9401 * CVE-2024-9402 CVSS scores: * CVE-2024-9392 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9392 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9393 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9393 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9394 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9394 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9401 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9401 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9402 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9402 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves 5 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7505. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7505. ## Package List: * SUSE Liberty Linux 9: * firefox 128.3.0-1.el9_4 * firefox-x11 128.3.0-1.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-9392.html * https://www.suse.com/security/cve/CVE-2024-9393.html * https://www.suse.com/security/cve/CVE-2024-9394.html * https://www.suse.com/security/cve/CVE-2024-9401.html * https://www.suse.com/security/cve/CVE-2024-9402.html From suse-liberty-linux-updates at lists.suse.com Fri Oct 4 15:05:47 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 4 Oct 2024 17:05:47 +0200 (CEST) Subject: RHSA-2024:7552: Low: SUSE Liberty Linux security update for thunderbird Message-ID: # security update for thunderbird Announcement ID: RHSA-2024:7552 Rating: Low Cross-References: * CVE-2024-9392 * CVE-2024-9393 * CVE-2024-9394 * CVE-2024-9396 * CVE-2024-9397 * CVE-2024-9398 * CVE-2024-9399 * CVE-2024-9400 * CVE-2024-9401 * CVE-2024-9402 * CVE-2024-9403 CVSS scores: * CVE-2024-9392 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9392 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9393 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9393 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9394 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9394 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9396 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-9396 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-9397 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9397 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9398 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-9398 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-9399 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-9399 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-9400 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-9400 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-9401 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9401 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9402 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9402 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9403 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9403 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves 11 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7552. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7552. ## Package List: * SUSE Liberty Linux 9: * thunderbird 128.3.0-1.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-9392.html * https://www.suse.com/security/cve/CVE-2024-9393.html * https://www.suse.com/security/cve/CVE-2024-9394.html * https://www.suse.com/security/cve/CVE-2024-9396.html * https://www.suse.com/security/cve/CVE-2024-9397.html * https://www.suse.com/security/cve/CVE-2024-9398.html * https://www.suse.com/security/cve/CVE-2024-9399.html * https://www.suse.com/security/cve/CVE-2024-9400.html * https://www.suse.com/security/cve/CVE-2024-9401.html * https://www.suse.com/security/cve/CVE-2024-9402.html * https://www.suse.com/security/cve/CVE-2024-9403.html From suse-liberty-linux-updates at lists.suse.com Sat Oct 5 15:05:46 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sat, 5 Oct 2024 17:05:46 +0200 (CEST) Subject: RHEA-2024:7620: Low: SUSE Liberty Linux enhancement update for microcode_ctl Message-ID: # enhancement update for microcode_ctl Announcement ID: RHEA-2024:7620 Rating: Low Affected Products: * SUSE Liberty Linux 9 An update that solves various issues can now be installed. ## Description: This enhancement update provides a functional equivalent of RHEA-2024:7620. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHEA-2024:7620. ## Package List: * SUSE Liberty Linux 9: * microcode_ctl 20230808-2.20240531.1.el9_4 From suse-liberty-linux-updates at lists.suse.com Sat Oct 5 15:05:46 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sat, 5 Oct 2024 17:05:46 +0200 (CEST) Subject: RHSA-2024:7434: Low: SUSE Liberty Linux security update for 389-ds-base Message-ID: # security update for 389-ds-base Announcement ID: RHSA-2024:7434 Rating: Low Cross-References: * CVE-2024-8445 CVSS scores: * CVE-2024-8445 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8445 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 7 LTSS An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7434. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7434. ## Package List: * SUSE Liberty Linux 7 LTSS: * 389-ds-base 1.3.11.1-7.el7_9 * 389-ds-base-devel 1.3.11.1-7.el7_9 * 389-ds-base-libs 1.3.11.1-7.el7_9 * 389-ds-base-snmp 1.3.11.1-7.el7_9 ## References: * https://www.suse.com/security/cve/CVE-2024-8445.html From suse-liberty-linux-updates at lists.suse.com Tue Oct 8 15:05:48 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Tue, 8 Oct 2024 17:05:48 +0200 (CEST) Subject: RHSA-2024:7699: Low: SUSE Liberty Linux security update for thunderbird Message-ID: # security update for thunderbird Announcement ID: RHSA-2024:7699 Rating: Low Cross-References: * CVE-2024-9392 * CVE-2024-9393 * CVE-2024-9394 * CVE-2024-9396 * CVE-2024-9397 * CVE-2024-9398 * CVE-2024-9399 * CVE-2024-9400 * CVE-2024-9401 * CVE-2024-9402 * CVE-2024-9403 CVSS scores: * CVE-2024-9392 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9392 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9393 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9393 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9394 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9394 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9396 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-9396 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-9397 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9397 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9398 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-9398 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-9399 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-9399 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-9400 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-9400 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-9401 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9401 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9402 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9402 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9403 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9403 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 8 An update that solves 11 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7699. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7699. ## Package List: * SUSE Liberty Linux 8: * thunderbird 128.3.0-1.el8_10 ## References: * https://www.suse.com/security/cve/CVE-2024-9392.html * https://www.suse.com/security/cve/CVE-2024-9393.html * https://www.suse.com/security/cve/CVE-2024-9394.html * https://www.suse.com/security/cve/CVE-2024-9396.html * https://www.suse.com/security/cve/CVE-2024-9397.html * https://www.suse.com/security/cve/CVE-2024-9398.html * https://www.suse.com/security/cve/CVE-2024-9399.html * https://www.suse.com/security/cve/CVE-2024-9400.html * https://www.suse.com/security/cve/CVE-2024-9401.html * https://www.suse.com/security/cve/CVE-2024-9402.html * https://www.suse.com/security/cve/CVE-2024-9403.html From suse-liberty-linux-updates at lists.suse.com Tue Oct 8 15:05:48 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Tue, 8 Oct 2024 17:05:48 +0200 (CEST) Subject: RHSA-2024:7700: Low: SUSE Liberty Linux security update for firefox Message-ID: # security update for firefox Announcement ID: RHSA-2024:7700 Rating: Low Cross-References: * CVE-2024-8900 * CVE-2024-9392 * CVE-2024-9393 * CVE-2024-9394 * CVE-2024-9396 * CVE-2024-9397 * CVE-2024-9398 * CVE-2024-9399 * CVE-2024-9400 * CVE-2024-9401 * CVE-2024-9402 CVSS scores: * CVE-2024-9392 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9392 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9393 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9393 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9394 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9394 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9396 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-9396 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-9397 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-9397 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9398 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-9398 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-9399 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-9399 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-9400 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2024-9400 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-9401 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9401 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-9402 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9402 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 8 An update that solves 11 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7700. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7700. ## Package List: * SUSE Liberty Linux 8: * firefox 128.3.0-1.el8_10 ## References: * https://www.suse.com/security/cve/CVE-2024-8900.html * https://www.suse.com/security/cve/CVE-2024-9392.html * https://www.suse.com/security/cve/CVE-2024-9393.html * https://www.suse.com/security/cve/CVE-2024-9394.html * https://www.suse.com/security/cve/CVE-2024-9396.html * https://www.suse.com/security/cve/CVE-2024-9397.html * https://www.suse.com/security/cve/CVE-2024-9398.html * https://www.suse.com/security/cve/CVE-2024-9399.html * https://www.suse.com/security/cve/CVE-2024-9400.html * https://www.suse.com/security/cve/CVE-2024-9401.html * https://www.suse.com/security/cve/CVE-2024-9402.html From suse-liberty-linux-updates at lists.suse.com Thu Oct 10 15:05:48 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 10 Oct 2024 17:05:48 +0200 (CEST) Subject: RHSA-2024:7848: Low: SUSE Liberty Linux security update for openssl Message-ID: # security update for openssl Announcement ID: RHSA-2024:7848 Rating: Low Cross-References: * CVE-2024-5535 CVSS scores: * CVE-2024-5535 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Liberty Linux 8 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7848. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7848. ## Package List: * SUSE Liberty Linux 8: * openssl 1.1.1k-14.el8_6 * openssl-devel 1.1.1k-14.el8_6 * openssl-libs 1.1.1k-14.el8_6 * openssl-perl 1.1.1k-14.el8_6 ## References: * https://www.suse.com/security/cve/CVE-2024-5535.html From suse-liberty-linux-updates at lists.suse.com Thu Oct 10 15:05:49 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 10 Oct 2024 17:05:49 +0200 (CEST) Subject: RHSA-2024:7851: Low: SUSE Liberty Linux security update for dotnet6.0 Message-ID: # security update for dotnet6.0 Announcement ID: RHSA-2024:7851 Rating: Low Cross-References: * CVE-2024-43483 * CVE-2024-43484 * CVE-2024-43485 Affected Products: * SUSE Liberty Linux 8 An update that solves 3 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7851. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7851. ## Package List: * SUSE Liberty Linux 8: * aspnetcore-runtime-6.0 6.0.35-1.el8_10 * aspnetcore-targeting-pack-6.0 6.0.35-1.el8_10 * dotnet-apphost-pack-6.0 6.0.35-1.el8_10 * dotnet-hostfxr-6.0 6.0.35-1.el8_10 * dotnet-runtime-6.0 6.0.35-1.el8_10 * dotnet-sdk-6.0 6.0.135-1.el8_10 * dotnet-sdk-6.0-source-built-artifacts 6.0.135-1.el8_10 * dotnet-targeting-pack-6.0 6.0.35-1.el8_10 * dotnet-templates-6.0 6.0.135-1.el8_10 ## References: * https://www.suse.com/security/cve/CVE-2024-43483.html * https://www.suse.com/security/cve/CVE-2024-43484.html * https://www.suse.com/security/cve/CVE-2024-43485.html From suse-liberty-linux-updates at lists.suse.com Thu Oct 10 15:05:49 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 10 Oct 2024 17:05:49 +0200 (CEST) Subject: RHSA-2024:7868: Low: SUSE Liberty Linux security update for dotnet8.0 Message-ID: # security update for dotnet8.0 Announcement ID: RHSA-2024:7868 Rating: Low Cross-References: * CVE-2024-38229 * CVE-2024-43483 * CVE-2024-43484 * CVE-2024-43485 Affected Products: * SUSE Liberty Linux 8 An update that solves 4 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7868. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7868. ## Package List: * SUSE Liberty Linux 8: * aspnetcore-runtime-8.0 8.0.10-1.el8_10 * aspnetcore-runtime-dbg-8.0 8.0.10-1.el8_10 * aspnetcore-targeting-pack-8.0 8.0.10-1.el8_10 * dotnet 8.0.110-1.el8_10 * dotnet-apphost-pack-8.0 8.0.10-1.el8_10 * dotnet-host 8.0.10-1.el8_10 * dotnet-hostfxr-8.0 8.0.10-1.el8_10 * dotnet-runtime-8.0 8.0.10-1.el8_10 * dotnet-runtime-dbg-8.0 8.0.10-1.el8_10 * dotnet-sdk-8.0 8.0.110-1.el8_10 * dotnet-sdk-8.0-source-built-artifacts 8.0.110-1.el8_10 * dotnet-sdk-dbg-8.0 8.0.110-1.el8_10 * dotnet-targeting-pack-8.0 8.0.10-1.el8_10 * dotnet-templates-8.0 8.0.110-1.el8_10 * netstandard-targeting-pack-2.1 8.0.110-1.el8_10 ## References: * https://www.suse.com/security/cve/CVE-2024-38229.html * https://www.suse.com/security/cve/CVE-2024-43483.html * https://www.suse.com/security/cve/CVE-2024-43484.html * https://www.suse.com/security/cve/CVE-2024-43485.html From suse-liberty-linux-updates at lists.suse.com Thu Oct 10 15:05:48 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 10 Oct 2024 17:05:48 +0200 (CEST) Subject: RHSA-2024:7869: Low: SUSE Liberty Linux security update for dotnet8.0 Message-ID: # security update for dotnet8.0 Announcement ID: RHSA-2024:7869 Rating: Low Cross-References: * CVE-2024-38229 * CVE-2024-43483 * CVE-2024-43484 * CVE-2024-43485 Affected Products: * SUSE Liberty Linux 9 An update that solves 4 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7869. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7869. ## Package List: * SUSE Liberty Linux 9: * aspnetcore-runtime-8.0 8.0.10-1.el9_4 * aspnetcore-runtime-dbg-8.0 8.0.10-1.el9_4 * aspnetcore-targeting-pack-8.0 8.0.10-1.el9_4 * dotnet-apphost-pack-8.0 8.0.10-1.el9_4 * dotnet-host 8.0.10-1.el9_4 * dotnet-hostfxr-8.0 8.0.10-1.el9_4 * dotnet-runtime-8.0 8.0.10-1.el9_4 * dotnet-runtime-dbg-8.0 8.0.10-1.el9_4 * dotnet-sdk-8.0 8.0.110-1.el9_4 * dotnet-sdk-8.0-source-built-artifacts 8.0.110-1.el9_4 * dotnet-sdk-dbg-8.0 8.0.110-1.el9_4 * dotnet-targeting-pack-8.0 8.0.10-1.el9_4 * dotnet-templates-8.0 8.0.110-1.el9_4 * netstandard-targeting-pack-2.1 8.0.110-1.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-38229.html * https://www.suse.com/security/cve/CVE-2024-43483.html * https://www.suse.com/security/cve/CVE-2024-43484.html * https://www.suse.com/security/cve/CVE-2024-43485.html From suse-liberty-linux-updates at lists.suse.com Fri Oct 11 15:05:41 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 11 Oct 2024 17:05:41 +0200 (CEST) Subject: RHSA-2024:7553: Low: SUSE Liberty Linux security update for cups-filters Message-ID: # security update for cups-filters Announcement ID: RHSA-2024:7553 Rating: Low Cross-References: * CVE-2024-47076 * CVE-2024-47175 * CVE-2024-47176 CVSS scores: * CVE-2024-47076 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-47076 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H * CVE-2024-47175 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47175 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H * CVE-2024-47176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47176 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H Affected Products: * SUSE Liberty Linux 7 LTSS An update that solves 3 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7553. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7553. ## Package List: * SUSE Liberty Linux 7 LTSS: * cups-filters 1.0.35-29.el7_9.3 * cups-filters-devel 1.0.35-29.el7_9.3 * cups-filters-libs 1.0.35-29.el7_9.3 ## References: * https://www.suse.com/security/cve/CVE-2024-47076.html * https://www.suse.com/security/cve/CVE-2024-47175.html * https://www.suse.com/security/cve/CVE-2024-47176.html From suse-liberty-linux-updates at lists.suse.com Fri Oct 11 15:05:41 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 11 Oct 2024 17:05:41 +0200 (CEST) Subject: RHSA-2024:7867: Low: SUSE Liberty Linux security update for dotnet6.0 Message-ID: # security update for dotnet6.0 Announcement ID: RHSA-2024:7867 Rating: Low Cross-References: * CVE-2024-43483 * CVE-2024-43484 * CVE-2024-43485 Affected Products: * SUSE Liberty Linux 9 An update that solves 3 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7867. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7867. ## Package List: * SUSE Liberty Linux 9: * aspnetcore-runtime-6.0 6.0.35-1.el9_4 * aspnetcore-targeting-pack-6.0 6.0.35-1.el9_4 * dotnet-apphost-pack-6.0 6.0.35-1.el9_4 * dotnet-hostfxr-6.0 6.0.35-1.el9_4 * dotnet-runtime-6.0 6.0.35-1.el9_4 * dotnet-sdk-6.0 6.0.135-1.el9_4 * dotnet-sdk-6.0-source-built-artifacts 6.0.135-1.el9_4 * dotnet-targeting-pack-6.0 6.0.35-1.el9_4 * dotnet-templates-6.0 6.0.135-1.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-43483.html * https://www.suse.com/security/cve/CVE-2024-43484.html * https://www.suse.com/security/cve/CVE-2024-43485.html From suse-liberty-linux-updates at lists.suse.com Sat Oct 12 15:05:49 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sat, 12 Oct 2024 17:05:49 +0200 (CEST) Subject: ESBA-2024:0641: Moderate: SUSE Liberty Linux bugfix update for anaconda Message-ID: # bugfix update for anaconda Announcement ID: ESBA-2024:0641 Rating: Moderate References: * bsc#1230534 Affected Products: * SUSE Liberty Linux 8 An update that has one bug fix can now be installed. ## Description: SUSE Liberty Linux 8 update: Anaconda version bump to fix #1230534 ## Package List: * SUSE Liberty Linux 8: * anaconda 33.16.10.5-1.el8.1 * anaconda-core 33.16.10.5-1.el8.1 * anaconda-dracut 33.16.10.5-1.el8.1 * anaconda-gui 33.16.10.5-1.el8.1 * anaconda-install-env-deps 33.16.10.5-1.el8.1 * anaconda-live 33.16.10.5-1.el8.1 * anaconda-tui 33.16.10.5-1.el8.1 * anaconda-widgets 33.16.10.5-1.el8.1 * anaconda-widgets-devel 33.16.10.5-1.el8.1 From suse-liberty-linux-updates at lists.suse.com Sat Oct 12 15:05:50 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sat, 12 Oct 2024 17:05:50 +0200 (CEST) Subject: RHSA-2024:7977: Low: SUSE Liberty Linux security update for firefox Message-ID: # security update for firefox Announcement ID: RHSA-2024:7977 Rating: Low Cross-References: * CVE-2024-9680 CVSS scores: * CVE-2024-9680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9680 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 8 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7977. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7977. ## Package List: * SUSE Liberty Linux 8: * firefox 128.3.1-2.el8_10 ## References: * https://www.suse.com/security/cve/CVE-2024-9680.html From suse-liberty-linux-updates at lists.suse.com Sat Oct 12 15:05:50 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sat, 12 Oct 2024 17:05:50 +0200 (CEST) Subject: RHSA-2024:7958: Low: SUSE Liberty Linux security update for firefox Message-ID: # security update for firefox Announcement ID: RHSA-2024:7958 Rating: Low Cross-References: * CVE-2024-9680 CVSS scores: * CVE-2024-9680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9680 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7958. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7958. ## Package List: * SUSE Liberty Linux 9: * firefox 128.3.1-2.el9_4 * firefox-x11 128.3.1-2.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-9680.html From suse-liberty-linux-updates at lists.suse.com Tue Oct 15 15:06:38 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Tue, 15 Oct 2024 17:06:38 +0200 (CEST) Subject: ESSA-2024:0645: Moderate: SUSE Liberty Linux security update for shim from RHSA-2024:1903 Message-ID: # security update for shim from RHSA-2024:1903 Announcement ID: ESSA-2024:0645 Rating: Moderate Affected Products: * SUSE Liberty Linux 9 An update that solves various issues can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:1903. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:1903 ## Package List: * SUSE Liberty Linux 9: * shim-x64 15.8-4.el9_3 From suse-liberty-linux-updates at lists.suse.com Tue Oct 15 15:06:38 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Tue, 15 Oct 2024 17:06:38 +0200 (CEST) Subject: RHSA-2024:8025: Low: SUSE Liberty Linux security update for thunderbird Message-ID: # security update for thunderbird Announcement ID: RHSA-2024:8025 Rating: Low Cross-References: * CVE-2024-9680 CVSS scores: * CVE-2024-9680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9680 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8025. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8025. ## Package List: * SUSE Liberty Linux 9: * thunderbird 128.3.1-1.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-9680.html From suse-liberty-linux-updates at lists.suse.com Tue Oct 15 15:06:39 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Tue, 15 Oct 2024 17:06:39 +0200 (CEST) Subject: RHSA-2024:8039: Low: SUSE Liberty Linux security update for podman Message-ID: # security update for podman Announcement ID: RHSA-2024:8039 Rating: Low Cross-References: * CVE-2024-34155 * CVE-2024-34156 * CVE-2024-34158 * CVE-2024-9341 CVSS scores: * CVE-2024-34155 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-34156 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-34158 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-9341 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9341 ( SUSE ): 5.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves 4 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8039. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8039. ## Package List: * SUSE Liberty Linux 9: * podman 4.9.4-13.el9_4 * podman-docker 4.9.4-13.el9_4 * podman-plugins 4.9.4-13.el9_4 * podman-remote 4.9.4-13.el9_4 * podman-tests 4.9.4-13.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-34155.html * https://www.suse.com/security/cve/CVE-2024-34156.html * https://www.suse.com/security/cve/CVE-2024-34158.html * https://www.suse.com/security/cve/CVE-2024-9341.html From suse-liberty-linux-updates at lists.suse.com Tue Oct 15 15:06:39 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Tue, 15 Oct 2024 17:06:39 +0200 (CEST) Subject: RHSA-2024:8024: Low: SUSE Liberty Linux security update for thunderbird Message-ID: # security update for thunderbird Announcement ID: RHSA-2024:8024 Rating: Low Cross-References: * CVE-2024-9680 CVSS scores: * CVE-2024-9680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9680 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 8 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8024. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8024. ## Package List: * SUSE Liberty Linux 8: * thunderbird 128.3.1-1.el8_10 ## References: * https://www.suse.com/security/cve/CVE-2024-9680.html From suse-liberty-linux-updates at lists.suse.com Tue Oct 15 15:06:38 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Tue, 15 Oct 2024 17:06:38 +0200 (CEST) Subject: RHSA-2024:8037: Low: SUSE Liberty Linux security update for OpenIPMI Message-ID: # security update for OpenIPMI Announcement ID: RHSA-2024:8037 Rating: Low Cross-References: * CVE-2024-42934 CVSS scores: * CVE-2024-42934 ( SUSE ): 5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42934 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8037. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8037. ## Package List: * SUSE Liberty Linux 9: * OpenIPMI 2.0.32-5.el9_4 * OpenIPMI-devel 2.0.32-5.el9_4 * OpenIPMI-lanserv 2.0.32-5.el9_4 * OpenIPMI-libs 2.0.32-5.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-42934.html From suse-liberty-linux-updates at lists.suse.com Tue Oct 15 15:06:39 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Tue, 15 Oct 2024 17:06:39 +0200 (CEST) Subject: RHSA-2024:8038: Low: SUSE Liberty Linux security update for aardvark-dns Message-ID: # security update for aardvark-dns Announcement ID: RHSA-2024:8038 Rating: Low Cross-References: * CVE-2023-45290 * CVE-2024-34155 * CVE-2024-34156 * CVE-2024-34158 CVSS scores: * CVE-2023-45290 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-34155 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-34156 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-34158 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Liberty Linux 8 An update that solves 4 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8038. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8038. ## Package List: * SUSE Liberty Linux 8: * aardvark-dns 1.10.1-2.module+el8.10.0+22346+28c02849 * buildah 1.33.8-4.module+el8.10.0+22346+28c02849 * buildah-tests 1.33.8-4.module+el8.10.0+22346+28c02849 * cockpit-podman 84.1-1.module+el8.10.0+22346+28c02849 * conmon 2.1.10-1.module+el8.10.0+22346+28c02849 * container-selinux 2.229.0-2.module+el8.10.0+22346+28c02849 * containernetworking-plugins 1.4.0-5.module+el8.10.0+22346+28c02849 * containers-common 1-82.module+el8.10.0+22346+28c02849 * crit 3.18-5.module+el8.10.0+22346+28c02849 * criu 3.18-5.module+el8.10.0+22346+28c02849 * criu-devel 3.18-5.module+el8.10.0+22346+28c02849 * criu-libs 3.18-5.module+el8.10.0+22346+28c02849 * crun 1.14.3-2.module+el8.10.0+22346+28c02849 * fuse-overlayfs 1.13-1.module+el8.10.0+22346+28c02849 * libslirp 4.4.0-2.module+el8.10.0+22346+28c02849 * libslirp-devel 4.4.0-2.module+el8.10.0+22346+28c02849 * netavark 1.10.3-1.module+el8.10.0+22346+28c02849 * oci-seccomp-bpf-hook 1.2.10-1.module+el8.10.0+22346+28c02849 * podman 4.9.4-13.module+el8.10.0+22346+28c02849 * podman-catatonit 4.9.4-13.module+el8.10.0+22346+28c02849 * podman-docker 4.9.4-13.module+el8.10.0+22346+28c02849 * podman-gvproxy 4.9.4-13.module+el8.10.0+22346+28c02849 * podman-plugins 4.9.4-13.module+el8.10.0+22346+28c02849 * podman-remote 4.9.4-13.module+el8.10.0+22346+28c02849 * podman-tests 4.9.4-13.module+el8.10.0+22346+28c02849 * python3-criu 3.18-5.module+el8.10.0+22346+28c02849 * python3-podman 4.9.0-2.module+el8.10.0+22346+28c02849 * runc 1.1.12-5.module+el8.10.0+22346+28c02849 * skopeo 1.14.5-3.module+el8.10.0+22346+28c02849 * skopeo-tests 1.14.5-3.module+el8.10.0+22346+28c02849 * slirp4netns 1.2.3-1.module+el8.10.0+22346+28c02849 * toolbox 0.0.99.5-2.module+el8.10.0+22346+28c02849 * toolbox-tests 0.0.99.5-2.module+el8.10.0+22346+28c02849 * udica 0.2.6-21.module+el8.10.0+22346+28c02849 ## References: * https://www.suse.com/security/cve/CVE-2023-45290.html * https://www.suse.com/security/cve/CVE-2024-34155.html * https://www.suse.com/security/cve/CVE-2024-34156.html * https://www.suse.com/security/cve/CVE-2024-34158.html From suse-liberty-linux-updates at lists.suse.com Wed Oct 16 15:05:56 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Wed, 16 Oct 2024 17:05:56 +0200 (CEST) Subject: ESSA-2024:0630: Moderate: SUSE Liberty Linux security update for httpd from RHSA-2024:7101 Message-ID: # security update for httpd from RHSA-2024:7101 Announcement ID: ESSA-2024:0630 Rating: Moderate Cross-References: * CVE-2024-38476 CVSS scores: * CVE-2024-38476 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N Affected Products: * SUSE Liberty Linux 7 LTSS An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7101. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:7101 ## Package List: * SUSE Liberty Linux 7 LTSS: * httpd 2.4.6-99.el7_9.4 * httpd-devel 2.4.6-99.el7_9.4 * httpd-manual 2.4.6-99.el7_9.4 * httpd-tools 2.4.6-99.el7_9.4 * mod_ldap 2.4.6-99.el7_9.4 * mod_proxy_html 2.4.6-99.el7_9.4 * mod_session 2.4.6-99.el7_9.4 * mod_ssl 2.4.6-99.el7_9.4 ## References: * https://www.suse.com/security/cve/CVE-2024-38476.html From suse-liberty-linux-updates at lists.suse.com Thu Oct 17 15:06:03 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 17 Oct 2024 17:06:03 +0200 (CEST) Subject: RHEA-2024:8159: Low: SUSE Liberty Linux enhancement update for microcode_ctl Message-ID: # enhancement update for microcode_ctl Announcement ID: RHEA-2024:8159 Rating: Low Affected Products: * SUSE Liberty Linux 8 An update that solves various issues can now be installed. ## Description: This enhancement update provides a functional equivalent of RHEA-2024:8159. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHEA-2024:8159. ## Package List: * SUSE Liberty Linux 8: * microcode_ctl 20240531-1.el8_10 From suse-liberty-linux-updates at lists.suse.com Thu Oct 17 15:06:03 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 17 Oct 2024 17:06:03 +0200 (CEST) Subject: RHSA-2024:8162: Low: SUSE Liberty Linux security update for kernel Message-ID: # security update for kernel Announcement ID: RHSA-2024:8162 Rating: Low Cross-References: * CVE-2021-47385 * CVE-2023-28746 * CVE-2023-52658 * CVE-2024-27403 * CVE-2024-35989 * CVE-2024-36889 * CVE-2024-36978 * CVE-2024-38556 * CVE-2024-39483 * CVE-2024-39502 * CVE-2024-40959 * CVE-2024-42079 * CVE-2024-42272 * CVE-2024-42284 CVSS scores: * CVE-2021-47385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2023-52658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36889 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-36978 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-38556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39483 ( SUSE ): 0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-39502 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42079 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42272 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-42272 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Liberty Linux 9 An update that solves 14 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8162. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8162. ## Package List: * SUSE Liberty Linux 9: * bpftool 7.3.0-427.40.1.el9_4 * kernel 5.14.0-427.40.1.el9_4 * kernel-abi-stablelists 5.14.0-427.40.1.el9_4 * kernel-core 5.14.0-427.40.1.el9_4 * kernel-cross-headers 5.14.0-427.40.1.el9_4 * kernel-debug 5.14.0-427.40.1.el9_4 * kernel-debug-core 5.14.0-427.40.1.el9_4 * kernel-debug-devel 5.14.0-427.40.1.el9_4 * kernel-debug-devel-matched 5.14.0-427.40.1.el9_4 * kernel-debug-modules 5.14.0-427.40.1.el9_4 * kernel-debug-modules-core 5.14.0-427.40.1.el9_4 * kernel-debug-modules-extra 5.14.0-427.40.1.el9_4 * kernel-debug-uki-virt 5.14.0-427.40.1.el9_4 * kernel-devel 5.14.0-427.40.1.el9_4 * kernel-devel-matched 5.14.0-427.40.1.el9_4 * kernel-doc 5.14.0-427.40.1.el9_4 * kernel-headers 5.14.0-427.40.1.el9_4 * kernel-modules 5.14.0-427.40.1.el9_4 * kernel-modules-core 5.14.0-427.40.1.el9_4 * kernel-modules-extra 5.14.0-427.40.1.el9_4 * kernel-tools 5.14.0-427.40.1.el9_4 * kernel-tools-libs 5.14.0-427.40.1.el9_4 * kernel-tools-libs-devel 5.14.0-427.40.1.el9_4 * kernel-uki-virt 5.14.0-427.40.1.el9_4 * libperf 5.14.0-427.40.1.el9_4 * perf 5.14.0-427.40.1.el9_4 * python3-perf 5.14.0-427.40.1.el9_4 * rtla 5.14.0-427.40.1.el9_4 * rv 5.14.0-427.40.1.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2021-47385.html * https://www.suse.com/security/cve/CVE-2023-28746.html * https://www.suse.com/security/cve/CVE-2023-52658.html * https://www.suse.com/security/cve/CVE-2024-27403.html * https://www.suse.com/security/cve/CVE-2024-35989.html * https://www.suse.com/security/cve/CVE-2024-36889.html * https://www.suse.com/security/cve/CVE-2024-36978.html * https://www.suse.com/security/cve/CVE-2024-38556.html * https://www.suse.com/security/cve/CVE-2024-39483.html * https://www.suse.com/security/cve/CVE-2024-39502.html * https://www.suse.com/security/cve/CVE-2024-40959.html * https://www.suse.com/security/cve/CVE-2024-42079.html * https://www.suse.com/security/cve/CVE-2024-42272.html * https://www.suse.com/security/cve/CVE-2024-42284.html From suse-liberty-linux-updates at lists.suse.com Fri Oct 18 15:06:11 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 18 Oct 2024 17:06:11 +0200 (CEST) Subject: RHSA-2024:8121: Low: SUSE Liberty Linux security update for java-11-openjdk Message-ID: # security update for java-11-openjdk Announcement ID: RHSA-2024:8121 Rating: Low Cross-References: * CVE-2023-48161 * CVE-2024-21208 * CVE-2024-21210 * CVE-2024-21217 * CVE-2024-21235 CVSS scores: * CVE-2023-48161 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21208 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21210 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21217 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-21235 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 8 An update that solves 5 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8121. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8121. ## Package List: * SUSE Liberty Linux 8: * java-11-openjdk 11.0.25.0.9-2.el9 * java-11-openjdk-demo 11.0.25.0.9-2.el9 * java-11-openjdk-demo-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-demo-slowdebug 11.0.25.0.9-2.el9 * java-11-openjdk-devel 11.0.25.0.9-2.el9 * java-11-openjdk-devel-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-devel-slowdebug 11.0.25.0.9-2.el9 * java-11-openjdk-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-headless 11.0.25.0.9-2.el9 * java-11-openjdk-headless-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-headless-slowdebug 11.0.25.0.9-2.el9 * java-11-openjdk-javadoc 11.0.25.0.9-2.el9 * java-11-openjdk-javadoc-zip 11.0.25.0.9-2.el9 * java-11-openjdk-jmods 11.0.25.0.9-2.el9 * java-11-openjdk-jmods-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-jmods-slowdebug 11.0.25.0.9-2.el9 * java-11-openjdk-slowdebug 11.0.25.0.9-2.el9 * java-11-openjdk-src 11.0.25.0.9-2.el9 * java-11-openjdk-src-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-src-slowdebug 11.0.25.0.9-2.el9 * java-11-openjdk-static-libs 11.0.25.0.9-2.el9 * java-11-openjdk-static-libs-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-static-libs-slowdebug 11.0.25.0.9-2.el9 ## References: * https://www.suse.com/security/cve/CVE-2023-48161.html * https://www.suse.com/security/cve/CVE-2024-21208.html * https://www.suse.com/security/cve/CVE-2024-21210.html * https://www.suse.com/security/cve/CVE-2024-21217.html * https://www.suse.com/security/cve/CVE-2024-21235.html From suse-liberty-linux-updates at lists.suse.com Fri Oct 18 15:06:11 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 18 Oct 2024 17:06:11 +0200 (CEST) Subject: RHSA-2024:8121: Low: SUSE Liberty Linux security update for java-11-openjdk Message-ID: # security update for java-11-openjdk Announcement ID: RHSA-2024:8121 Rating: Low Cross-References: * CVE-2023-48161 * CVE-2024-21208 * CVE-2024-21210 * CVE-2024-21217 * CVE-2024-21235 CVSS scores: * CVE-2023-48161 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21208 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21210 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21217 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-21235 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves 5 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8121. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8121. ## Package List: * SUSE Liberty Linux 9: * java-11-openjdk 11.0.25.0.9-2.el9 * java-11-openjdk-demo 11.0.25.0.9-2.el9 * java-11-openjdk-demo-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-demo-slowdebug 11.0.25.0.9-2.el9 * java-11-openjdk-devel 11.0.25.0.9-2.el9 * java-11-openjdk-devel-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-devel-slowdebug 11.0.25.0.9-2.el9 * java-11-openjdk-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-headless 11.0.25.0.9-2.el9 * java-11-openjdk-headless-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-headless-slowdebug 11.0.25.0.9-2.el9 * java-11-openjdk-javadoc 11.0.25.0.9-2.el9 * java-11-openjdk-javadoc-zip 11.0.25.0.9-2.el9 * java-11-openjdk-jmods 11.0.25.0.9-2.el9 * java-11-openjdk-jmods-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-jmods-slowdebug 11.0.25.0.9-2.el9 * java-11-openjdk-slowdebug 11.0.25.0.9-2.el9 * java-11-openjdk-src 11.0.25.0.9-2.el9 * java-11-openjdk-src-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-src-slowdebug 11.0.25.0.9-2.el9 * java-11-openjdk-static-libs 11.0.25.0.9-2.el9 * java-11-openjdk-static-libs-fastdebug 11.0.25.0.9-2.el9 * java-11-openjdk-static-libs-slowdebug 11.0.25.0.9-2.el9 ## References: * https://www.suse.com/security/cve/CVE-2023-48161.html * https://www.suse.com/security/cve/CVE-2024-21208.html * https://www.suse.com/security/cve/CVE-2024-21210.html * https://www.suse.com/security/cve/CVE-2024-21217.html * https://www.suse.com/security/cve/CVE-2024-21235.html From suse-liberty-linux-updates at lists.suse.com Sat Oct 19 15:05:47 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sat, 19 Oct 2024 17:05:47 +0200 (CEST) Subject: RHSA-2024:8117: Low: SUSE Liberty Linux security update for java-1.8.0-openjdk Message-ID: # security update for java-1.8.0-openjdk Announcement ID: RHSA-2024:8117 Rating: Low Cross-References: * CVE-2023-48161 * CVE-2024-21208 * CVE-2024-21210 * CVE-2024-21217 * CVE-2024-21235 CVSS scores: * CVE-2023-48161 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21208 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21210 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21217 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-21235 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 8 An update that solves 5 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8117. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8117. ## Package List: * SUSE Liberty Linux 8: * java-1.8.0-openjdk 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-accessibility 1.8.0.432.b06-2.el8 * java-1.8.0-openjdk-accessibility-fastdebug 1.8.0.432.b06-2.el8 * java-1.8.0-openjdk-accessibility-slowdebug 1.8.0.432.b06-2.el8 * java-1.8.0-openjdk-demo 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-demo-fastdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-demo-slowdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-devel 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-devel-fastdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-devel-slowdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-fastdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-headless 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-headless-fastdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-headless-slowdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-javadoc 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-javadoc-zip 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-slowdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-src 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-src-fastdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-src-slowdebug 1.8.0.432.b06-2.el9 ## References: * https://www.suse.com/security/cve/CVE-2023-48161.html * https://www.suse.com/security/cve/CVE-2024-21208.html * https://www.suse.com/security/cve/CVE-2024-21210.html * https://www.suse.com/security/cve/CVE-2024-21217.html * https://www.suse.com/security/cve/CVE-2024-21235.html From suse-liberty-linux-updates at lists.suse.com Sat Oct 19 15:05:47 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sat, 19 Oct 2024 17:05:47 +0200 (CEST) Subject: RHSA-2024:8124: Low: SUSE Liberty Linux security update for java-17-openjdk Message-ID: # security update for java-17-openjdk Announcement ID: RHSA-2024:8124 Rating: Low Cross-References: * CVE-2023-48161 * CVE-2024-21208 * CVE-2024-21210 * CVE-2024-21217 * CVE-2024-21235 CVSS scores: * CVE-2023-48161 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21208 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21210 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21217 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-21235 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 8 An update that solves 5 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8124. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8124. ## Package List: * SUSE Liberty Linux 8: * java-17-openjdk 17.0.13.0.11-3.el9 * java-17-openjdk-demo 17.0.13.0.11-3.el9 * java-17-openjdk-demo-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-demo-slowdebug 17.0.13.0.11-3.el9 * java-17-openjdk-devel 17.0.13.0.11-3.el9 * java-17-openjdk-devel-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-devel-slowdebug 17.0.13.0.11-3.el9 * java-17-openjdk-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-headless 17.0.13.0.11-3.el9 * java-17-openjdk-headless-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-headless-slowdebug 17.0.13.0.11-3.el9 * java-17-openjdk-javadoc 17.0.13.0.11-3.el9 * java-17-openjdk-javadoc-zip 17.0.13.0.11-3.el9 * java-17-openjdk-jmods 17.0.13.0.11-3.el9 * java-17-openjdk-jmods-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-jmods-slowdebug 17.0.13.0.11-3.el9 * java-17-openjdk-slowdebug 17.0.13.0.11-3.el9 * java-17-openjdk-src 17.0.13.0.11-3.el9 * java-17-openjdk-src-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-src-slowdebug 17.0.13.0.11-3.el9 * java-17-openjdk-static-libs 17.0.13.0.11-3.el9 * java-17-openjdk-static-libs-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-static-libs-slowdebug 17.0.13.0.11-3.el9 ## References: * https://www.suse.com/security/cve/CVE-2023-48161.html * https://www.suse.com/security/cve/CVE-2024-21208.html * https://www.suse.com/security/cve/CVE-2024-21210.html * https://www.suse.com/security/cve/CVE-2024-21217.html * https://www.suse.com/security/cve/CVE-2024-21235.html From suse-liberty-linux-updates at lists.suse.com Sat Oct 19 15:05:47 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sat, 19 Oct 2024 17:05:47 +0200 (CEST) Subject: RHSA-2024:8117: Low: SUSE Liberty Linux security update for java-1.8.0-openjdk Message-ID: # security update for java-1.8.0-openjdk Announcement ID: RHSA-2024:8117 Rating: Low Cross-References: * CVE-2023-48161 * CVE-2024-21208 * CVE-2024-21210 * CVE-2024-21217 * CVE-2024-21235 CVSS scores: * CVE-2023-48161 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21208 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21210 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21217 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-21235 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves 5 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8117. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8117. ## Package List: * SUSE Liberty Linux 9: * java-1.8.0-openjdk 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-accessibility 1.8.0.432.b06-2.el8 * java-1.8.0-openjdk-accessibility-fastdebug 1.8.0.432.b06-2.el8 * java-1.8.0-openjdk-accessibility-slowdebug 1.8.0.432.b06-2.el8 * java-1.8.0-openjdk-demo 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-demo-fastdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-demo-slowdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-devel 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-devel-fastdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-devel-slowdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-fastdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-headless 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-headless-fastdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-headless-slowdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-javadoc 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-javadoc-zip 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-slowdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-src 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-src-fastdebug 1.8.0.432.b06-2.el9 * java-1.8.0-openjdk-src-slowdebug 1.8.0.432.b06-2.el9 ## References: * https://www.suse.com/security/cve/CVE-2023-48161.html * https://www.suse.com/security/cve/CVE-2024-21208.html * https://www.suse.com/security/cve/CVE-2024-21210.html * https://www.suse.com/security/cve/CVE-2024-21217.html * https://www.suse.com/security/cve/CVE-2024-21235.html From suse-liberty-linux-updates at lists.suse.com Sat Oct 19 15:05:47 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sat, 19 Oct 2024 17:05:47 +0200 (CEST) Subject: RHSA-2024:8124: Low: SUSE Liberty Linux security update for java-17-openjdk Message-ID: # security update for java-17-openjdk Announcement ID: RHSA-2024:8124 Rating: Low Cross-References: * CVE-2023-48161 * CVE-2024-21208 * CVE-2024-21210 * CVE-2024-21217 * CVE-2024-21235 CVSS scores: * CVE-2023-48161 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21208 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21210 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21217 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-21235 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves 5 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8124. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8124. ## Package List: * SUSE Liberty Linux 9: * java-17-openjdk 17.0.13.0.11-3.el9 * java-17-openjdk-demo 17.0.13.0.11-3.el9 * java-17-openjdk-demo-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-demo-slowdebug 17.0.13.0.11-3.el9 * java-17-openjdk-devel 17.0.13.0.11-3.el9 * java-17-openjdk-devel-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-devel-slowdebug 17.0.13.0.11-3.el9 * java-17-openjdk-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-headless 17.0.13.0.11-3.el9 * java-17-openjdk-headless-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-headless-slowdebug 17.0.13.0.11-3.el9 * java-17-openjdk-javadoc 17.0.13.0.11-3.el9 * java-17-openjdk-javadoc-zip 17.0.13.0.11-3.el9 * java-17-openjdk-jmods 17.0.13.0.11-3.el9 * java-17-openjdk-jmods-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-jmods-slowdebug 17.0.13.0.11-3.el9 * java-17-openjdk-slowdebug 17.0.13.0.11-3.el9 * java-17-openjdk-src 17.0.13.0.11-3.el9 * java-17-openjdk-src-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-src-slowdebug 17.0.13.0.11-3.el9 * java-17-openjdk-static-libs 17.0.13.0.11-3.el9 * java-17-openjdk-static-libs-fastdebug 17.0.13.0.11-3.el9 * java-17-openjdk-static-libs-slowdebug 17.0.13.0.11-3.el9 ## References: * https://www.suse.com/security/cve/CVE-2023-48161.html * https://www.suse.com/security/cve/CVE-2024-21208.html * https://www.suse.com/security/cve/CVE-2024-21210.html * https://www.suse.com/security/cve/CVE-2024-21217.html * https://www.suse.com/security/cve/CVE-2024-21235.html From suse-liberty-linux-updates at lists.suse.com Sat Oct 19 15:05:47 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sat, 19 Oct 2024 17:05:47 +0200 (CEST) Subject: RHSA-2024:8127: Low: SUSE Liberty Linux security update for java-21-openjdk Message-ID: # security update for java-21-openjdk Announcement ID: RHSA-2024:8127 Rating: Low Cross-References: * CVE-2023-48161 * CVE-2024-21208 * CVE-2024-21210 * CVE-2024-21217 * CVE-2024-21235 CVSS scores: * CVE-2023-48161 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21208 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21210 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21217 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-21235 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 8 An update that solves 5 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8127. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8127. ## Package List: * SUSE Liberty Linux 8: * java-21-openjdk 21.0.5.0.10-3.el9 * java-21-openjdk-demo 21.0.5.0.10-3.el9 * java-21-openjdk-demo-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-demo-slowdebug 21.0.5.0.10-3.el9 * java-21-openjdk-devel 21.0.5.0.10-3.el9 * java-21-openjdk-devel-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-devel-slowdebug 21.0.5.0.10-3.el9 * java-21-openjdk-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-headless 21.0.5.0.10-3.el9 * java-21-openjdk-headless-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-headless-slowdebug 21.0.5.0.10-3.el9 * java-21-openjdk-javadoc 21.0.5.0.10-3.el9 * java-21-openjdk-javadoc-zip 21.0.5.0.10-3.el9 * java-21-openjdk-jmods 21.0.5.0.10-3.el9 * java-21-openjdk-jmods-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-jmods-slowdebug 21.0.5.0.10-3.el9 * java-21-openjdk-slowdebug 21.0.5.0.10-3.el9 * java-21-openjdk-src 21.0.5.0.10-3.el9 * java-21-openjdk-src-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-src-slowdebug 21.0.5.0.10-3.el9 * java-21-openjdk-static-libs 21.0.5.0.10-3.el9 * java-21-openjdk-static-libs-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-static-libs-slowdebug 21.0.5.0.10-3.el9 ## References: * https://www.suse.com/security/cve/CVE-2023-48161.html * https://www.suse.com/security/cve/CVE-2024-21208.html * https://www.suse.com/security/cve/CVE-2024-21210.html * https://www.suse.com/security/cve/CVE-2024-21217.html * https://www.suse.com/security/cve/CVE-2024-21235.html From suse-liberty-linux-updates at lists.suse.com Sat Oct 19 15:05:47 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sat, 19 Oct 2024 17:05:47 +0200 (CEST) Subject: RHSA-2024:8127: Low: SUSE Liberty Linux security update for java-21-openjdk Message-ID: # security update for java-21-openjdk Announcement ID: RHSA-2024:8127 Rating: Low Cross-References: * CVE-2023-48161 * CVE-2024-21208 * CVE-2024-21210 * CVE-2024-21217 * CVE-2024-21235 CVSS scores: * CVE-2023-48161 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21208 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21210 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21217 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-21235 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves 5 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8127. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8127. ## Package List: * SUSE Liberty Linux 9: * java-21-openjdk 21.0.5.0.10-3.el9 * java-21-openjdk-demo 21.0.5.0.10-3.el9 * java-21-openjdk-demo-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-demo-slowdebug 21.0.5.0.10-3.el9 * java-21-openjdk-devel 21.0.5.0.10-3.el9 * java-21-openjdk-devel-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-devel-slowdebug 21.0.5.0.10-3.el9 * java-21-openjdk-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-headless 21.0.5.0.10-3.el9 * java-21-openjdk-headless-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-headless-slowdebug 21.0.5.0.10-3.el9 * java-21-openjdk-javadoc 21.0.5.0.10-3.el9 * java-21-openjdk-javadoc-zip 21.0.5.0.10-3.el9 * java-21-openjdk-jmods 21.0.5.0.10-3.el9 * java-21-openjdk-jmods-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-jmods-slowdebug 21.0.5.0.10-3.el9 * java-21-openjdk-slowdebug 21.0.5.0.10-3.el9 * java-21-openjdk-src 21.0.5.0.10-3.el9 * java-21-openjdk-src-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-src-slowdebug 21.0.5.0.10-3.el9 * java-21-openjdk-static-libs 21.0.5.0.10-3.el9 * java-21-openjdk-static-libs-fastdebug 21.0.5.0.10-3.el9 * java-21-openjdk-static-libs-slowdebug 21.0.5.0.10-3.el9 ## References: * https://www.suse.com/security/cve/CVE-2023-48161.html * https://www.suse.com/security/cve/CVE-2024-21208.html * https://www.suse.com/security/cve/CVE-2024-21210.html * https://www.suse.com/security/cve/CVE-2024-21217.html * https://www.suse.com/security/cve/CVE-2024-21235.html From suse-liberty-linux-updates at lists.suse.com Sun Oct 20 15:06:18 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sun, 20 Oct 2024 17:06:18 +0200 (CEST) Subject: RHSA-2024:8180: Low: SUSE Liberty Linux security update for webkit2gtk3 Message-ID: # security update for webkit2gtk3 Announcement ID: RHSA-2024:8180 Rating: Low Cross-References: * CVE-2024-23271 * CVE-2024-27820 * CVE-2024-27838 * CVE-2024-27851 * CVE-2024-40776 * CVE-2024-40779 * CVE-2024-40780 * CVE-2024-40782 * CVE-2024-40789 * CVE-2024-40866 * CVE-2024-44187 CVSS scores: * CVE-2024-23271 ( SUSE ): 4.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N * CVE-2024-27820 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-27838 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-27851 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-40776 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H * CVE-2024-40776 ( SUSE ): 8.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-40779 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-40780 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-40782 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-40789 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-40866 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-44187 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Affected Products: * SUSE Liberty Linux 9 An update that solves 11 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8180. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8180. ## Package List: * SUSE Liberty Linux 9: * webkit2gtk3 2.46.1-2.el9_4 * webkit2gtk3-devel 2.46.1-2.el9_4 * webkit2gtk3-jsc 2.46.1-2.el9_4 * webkit2gtk3-jsc-devel 2.46.1-2.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-23271.html * https://www.suse.com/security/cve/CVE-2024-27820.html * https://www.suse.com/security/cve/CVE-2024-27838.html * https://www.suse.com/security/cve/CVE-2024-27851.html * https://www.suse.com/security/cve/CVE-2024-40776.html * https://www.suse.com/security/cve/CVE-2024-40779.html * https://www.suse.com/security/cve/CVE-2024-40780.html * https://www.suse.com/security/cve/CVE-2024-40782.html * https://www.suse.com/security/cve/CVE-2024-40789.html * https://www.suse.com/security/cve/CVE-2024-40866.html * https://www.suse.com/security/cve/CVE-2024-44187.html From suse-liberty-linux-updates at lists.suse.com Mon Oct 21 15:06:06 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Mon, 21 Oct 2024 17:06:06 +0200 (CEST) Subject: RHSA-2024:8110: Low: SUSE Liberty Linux security update for containernetworking-plugins Message-ID: # security update for containernetworking-plugins Announcement ID: RHSA-2024:8110 Rating: Low Cross-References: * CVE-2024-34156 CVSS scores: * CVE-2024-34156 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Liberty Linux 9 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8110. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8110. ## Package List: * SUSE Liberty Linux 9: * containernetworking-plugins 1.4.0-6.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-34156.html From suse-liberty-linux-updates at lists.suse.com Mon Oct 21 15:06:06 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Mon, 21 Oct 2024 17:06:06 +0200 (CEST) Subject: RHSA-2024:8111: Low: SUSE Liberty Linux security update for skopeo Message-ID: # security update for skopeo Announcement ID: RHSA-2024:8111 Rating: Low Cross-References: * CVE-2024-34156 CVSS scores: * CVE-2024-34156 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Liberty Linux 9 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8111. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8111. ## Package List: * SUSE Liberty Linux 9: * skopeo 1.14.5-2.el9_4 * skopeo-tests 1.14.5-2.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-34156.html From suse-liberty-linux-updates at lists.suse.com Wed Oct 23 15:05:56 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Wed, 23 Oct 2024 17:05:56 +0200 (CEST) Subject: ESBA-2024:0647: Moderate: SUSE Liberty Linux python-zope-interface dependency for LTSS Message-ID: # python-zope-interface dependency for LTSS Announcement ID: ESBA-2024:0647 Rating: Moderate Affected Products: * SUSE Liberty Linux 7 LTSS An update that solves various issues can now be installed. ## Description: SUSE Liberty Linux 7 update: python-zope-interface dependency for LTSS ## Package List: * SUSE Liberty Linux 7 LTSS: * python-zope-interface 4.0.5-4.el7 From suse-liberty-linux-updates at lists.suse.com Wed Oct 23 15:05:57 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Wed, 23 Oct 2024 17:05:57 +0200 (CEST) Subject: RHSA-2024:8327: Low: SUSE Liberty Linux security update for grafana Message-ID: # security update for grafana Announcement ID: RHSA-2024:8327 Rating: Low Cross-References: * CVE-2024-47875 * CVE-2024-9355 CVSS scores: * CVE-2024-47875 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L * CVE-2024-47875 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 8 An update that solves 2 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8327. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8327. ## Package List: * SUSE Liberty Linux 8: * grafana 9.2.10-20.el8_10 * grafana-selinux 9.2.10-20.el8_10 ## References: * https://www.suse.com/security/cve/CVE-2024-47875.html * https://www.suse.com/security/cve/CVE-2024-9355.html From suse-liberty-linux-updates at lists.suse.com Fri Oct 25 15:05:50 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 25 Oct 2024 17:05:50 +0200 (CEST) Subject: RHBA-2024:8454: Low: SUSE Liberty Linux bugfix update for rpm-ostree Message-ID: # bugfix update for rpm-ostree Announcement ID: RHBA-2024:8454 Rating: Low Affected Products: * SUSE Liberty Linux 9 An update that solves various issues can now be installed. ## Description: This bugfix update provides a functional equivalent of RHBA-2024:8454. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHBA-2024:8454. ## Package List: * SUSE Liberty Linux 9: * rpm-ostree 2024.3-6.el9_4 * rpm-ostree-libs 2024.3-6.el9_4 From suse-liberty-linux-updates at lists.suse.com Fri Oct 25 15:05:50 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 25 Oct 2024 17:05:50 +0200 (CEST) Subject: RHSA-2024:8446: Low: SUSE Liberty Linux security update for python3.9 Message-ID: # security update for python3.9 Announcement ID: RHSA-2024:8446 Rating: Low Cross-References: * CVE-2024-6232 CVSS scores: * CVE-2024-6232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8446. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8446. ## Package List: * SUSE Liberty Linux 9: * python-unversioned-command 3.9.18-3.el9_4.6 * python3 3.9.18-3.el9_4.6 * python3-debug 3.9.18-3.el9_4.6 * python3-devel 3.9.18-3.el9_4.6 * python3-idle 3.9.18-3.el9_4.6 * python3-libs 3.9.18-3.el9_4.6 * python3-test 3.9.18-3.el9_4.6 * python3-tkinter 3.9.18-3.el9_4.6 ## References: * https://www.suse.com/security/cve/CVE-2024-6232.html From suse-liberty-linux-updates at lists.suse.com Fri Oct 25 15:05:50 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 25 Oct 2024 17:05:50 +0200 (CEST) Subject: RHSA-2024:8447: Low: SUSE Liberty Linux security update for python3.12 Message-ID: # security update for python3.12 Announcement ID: RHSA-2024:8447 Rating: Low Cross-References: * CVE-2024-6232 CVSS scores: * CVE-2024-6232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8447. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8447. ## Package List: * SUSE Liberty Linux 9: * python3.12 3.12.1-4.el9_4.4 * python3.12-debug 3.12.1-4.el9_4.4 * python3.12-devel 3.12.1-4.el9_4.4 * python3.12-idle 3.12.1-4.el9_4.4 * python3.12-libs 3.12.1-4.el9_4.4 * python3.12-test 3.12.1-4.el9_4.4 * python3.12-tkinter 3.12.1-4.el9_4.4 ## References: * https://www.suse.com/security/cve/CVE-2024-6232.html From suse-liberty-linux-updates at lists.suse.com Fri Oct 25 15:05:50 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 25 Oct 2024 17:05:50 +0200 (CEST) Subject: RHSA-2024:8374: Low: SUSE Liberty Linux security update for python3.11 Message-ID: # security update for python3.11 Announcement ID: RHSA-2024:8374 Rating: Low Cross-References: * CVE-2024-6232 CVSS scores: * CVE-2024-6232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8374. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8374. ## Package List: * SUSE Liberty Linux 9: * python3.11 3.11.7-1.el9_4.6 * python3.11-debug 3.11.7-1.el9_4.6 * python3.11-devel 3.11.7-1.el9_4.6 * python3.11-idle 3.11.7-1.el9_4.6 * python3.11-libs 3.11.7-1.el9_4.6 * python3.11-test 3.11.7-1.el9_4.6 * python3.11-tkinter 3.11.7-1.el9_4.6 ## References: * https://www.suse.com/security/cve/CVE-2024-6232.html From suse-liberty-linux-updates at lists.suse.com Fri Oct 25 15:05:51 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 25 Oct 2024 17:05:51 +0200 (CEST) Subject: RHSA-2024:7705: Low: SUSE Liberty Linux security update for systemd Message-ID: # security update for systemd Announcement ID: RHSA-2024:7705 Rating: Low Cross-References: * CVE-2023-26604 CVSS scores: * CVE-2023-26604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Liberty Linux 7 LTSS An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:7705. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:7705. ## Package List: * SUSE Liberty Linux 7 LTSS: * libgudev1 219-78.el7_9.11 * libgudev1-devel 219-78.el7_9.11 * systemd 219-78.el7_9.11 * systemd-devel 219-78.el7_9.11 * systemd-journal-gateway 219-78.el7_9.11 * systemd-libs 219-78.el7_9.11 * systemd-networkd 219-78.el7_9.11 * systemd-python 219-78.el7_9.11 * systemd-resolved 219-78.el7_9.11 * systemd-sysv 219-78.el7_9.11 ## References: * https://www.suse.com/security/cve/CVE-2023-26604.html From suse-liberty-linux-updates at lists.suse.com Fri Oct 25 15:05:51 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Fri, 25 Oct 2024 17:05:51 +0200 (CEST) Subject: RHSA-2024:8353: Low: SUSE Liberty Linux security update for NetworkManager-libreswan Message-ID: # security update for NetworkManager-libreswan Announcement ID: RHSA-2024:8353 Rating: Low Cross-References: * CVE-2024-9050 Affected Products: * SUSE Liberty Linux 8 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8353. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8353. ## Package List: * SUSE Liberty Linux 8: * NetworkManager-libreswan 1.2.10-7.el8_10 * NetworkManager-libreswan-gnome 1.2.10-7.el8_10 ## References: * https://www.suse.com/security/cve/CVE-2024-9050.html From suse-liberty-linux-updates at lists.suse.com Sat Oct 26 15:05:50 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Sat, 26 Oct 2024 17:05:50 +0200 (CEST) Subject: RHSA-2024:8112: Low: SUSE Liberty Linux security update for buildah Message-ID: # security update for buildah Announcement ID: RHSA-2024:8112 Rating: Low Cross-References: * CVE-2024-34155 * CVE-2024-34156 * CVE-2024-34158 * CVE-2024-9341 CVSS scores: * CVE-2024-34155 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-34156 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-34158 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-9341 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9341 ( SUSE ): 5.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves 4 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8112. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8112. ## Package List: * SUSE Liberty Linux 9: * buildah 1.33.9-1.el9_4 * buildah-tests 1.33.9-1.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-34155.html * https://www.suse.com/security/cve/CVE-2024-34156.html * https://www.suse.com/security/cve/CVE-2024-34158.html * https://www.suse.com/security/cve/CVE-2024-9341.html From suse-liberty-linux-updates at lists.suse.com Wed Oct 30 16:07:34 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Wed, 30 Oct 2024 17:07:34 +0100 (CET) Subject: RHSA-2024:8563: Low: SUSE Liberty Linux security update for buildah Message-ID: # security update for buildah Announcement ID: RHSA-2024:8563 Rating: Low Cross-References: * CVE-2024-9675 CVSS scores: * CVE-2024-9675 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-9675 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8563. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8563. ## Package List: * SUSE Liberty Linux 9: * buildah 1.33.10-1.el9_4 * buildah-tests 1.33.10-1.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-9675.html From suse-liberty-linux-updates at lists.suse.com Thu Oct 31 16:05:44 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 31 Oct 2024 17:05:44 +0100 (CET) Subject: RHSA-2024:8678: Low: SUSE Liberty Linux security update for grafana Message-ID: # security update for grafana Announcement ID: RHSA-2024:8678 Rating: Low Cross-References: * CVE-2024-47875 * CVE-2024-9355 CVSS scores: * CVE-2024-47875 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L * CVE-2024-47875 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N Affected Products: * SUSE Liberty Linux 9 An update that solves 2 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8678. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8678. ## Package List: * SUSE Liberty Linux 9: * grafana 9.2.10-19.el9_4 * grafana-selinux 9.2.10-19.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2024-47875.html * https://www.suse.com/security/cve/CVE-2024-9355.html From suse-liberty-linux-updates at lists.suse.com Thu Oct 31 16:05:44 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 31 Oct 2024 17:05:44 +0100 (CET) Subject: RHSA-2024:8680: Low: SUSE Liberty Linux security update for mod_http2 Message-ID: # security update for mod_http2 Announcement ID: RHSA-2024:8680 Rating: Low Cross-References: * CVE-2024-36387 CVSS scores: * CVE-2024-36387 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Liberty Linux 9 An update that solves one vulnerability can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8680. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8680. ## Package List: * SUSE Liberty Linux 9: * mod_http2 2.0.26-2.el9_4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-36387.html From suse-liberty-linux-updates at lists.suse.com Thu Oct 31 16:05:44 2024 From: suse-liberty-linux-updates at lists.suse.com (Update Advisories for SUSE Liberty Linux) Date: Thu, 31 Oct 2024 17:05:44 +0100 (CET) Subject: RHSA-2024:8617: Low: SUSE Liberty Linux security update for kernel Message-ID: # security update for kernel Announcement ID: RHSA-2024:8617 Rating: Low Cross-References: * CVE-2021-47383 * CVE-2024-2201 * CVE-2024-26640 * CVE-2024-26826 * CVE-2024-26923 * CVE-2024-26935 * CVE-2024-26961 * CVE-2024-36244 * CVE-2024-39472 * CVE-2024-39504 * CVE-2024-40904 * CVE-2024-40931 * CVE-2024-40960 * CVE-2024-40972 * CVE-2024-40977 * CVE-2024-40995 * CVE-2024-40998 * CVE-2024-41005 * CVE-2024-41013 * CVE-2024-41014 * CVE-2024-43854 * CVE-2024-45018 CVSS scores: * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26923 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-39472 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-39504 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40931 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-40960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40972 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41013 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-41014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Liberty Linux 9 An update that solves 22 vulnerabilities can now be installed. ## Description: This security update provides a functional equivalent of RHSA-2024:8617. The original Red Hat(R) advisory is available from the Red Hat web site at https://access.redhat.com/errata/RHSA-2024:8617. ## Package List: * SUSE Liberty Linux 9: * bpftool 7.3.0-427.42.1.el9_4 * kernel 5.14.0-427.42.1.el9_4 * kernel-abi-stablelists 5.14.0-427.42.1.el9_4 * kernel-core 5.14.0-427.42.1.el9_4 * kernel-cross-headers 5.14.0-427.42.1.el9_4 * kernel-debug 5.14.0-427.42.1.el9_4 * kernel-debug-core 5.14.0-427.42.1.el9_4 * kernel-debug-devel 5.14.0-427.42.1.el9_4 * kernel-debug-devel-matched 5.14.0-427.42.1.el9_4 * kernel-debug-modules 5.14.0-427.42.1.el9_4 * kernel-debug-modules-core 5.14.0-427.42.1.el9_4 * kernel-debug-modules-extra 5.14.0-427.42.1.el9_4 * kernel-debug-uki-virt 5.14.0-427.42.1.el9_4 * kernel-devel 5.14.0-427.42.1.el9_4 * kernel-devel-matched 5.14.0-427.42.1.el9_4 * kernel-doc 5.14.0-427.42.1.el9_4 * kernel-headers 5.14.0-427.42.1.el9_4 * kernel-modules 5.14.0-427.42.1.el9_4 * kernel-modules-core 5.14.0-427.42.1.el9_4 * kernel-modules-extra 5.14.0-427.42.1.el9_4 * kernel-tools 5.14.0-427.42.1.el9_4 * kernel-tools-libs 5.14.0-427.42.1.el9_4 * kernel-tools-libs-devel 5.14.0-427.42.1.el9_4 * kernel-uki-virt 5.14.0-427.42.1.el9_4 * libperf 5.14.0-427.42.1.el9_4 * perf 5.14.0-427.42.1.el9_4 * python3-perf 5.14.0-427.42.1.el9_4 * rtla 5.14.0-427.42.1.el9_4 * rv 5.14.0-427.42.1.el9_4 ## References: * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2024-2201.html * https://www.suse.com/security/cve/CVE-2024-26640.html * https://www.suse.com/security/cve/CVE-2024-26826.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26935.html * https://www.suse.com/security/cve/CVE-2024-26961.html * https://www.suse.com/security/cve/CVE-2024-36244.html * https://www.suse.com/security/cve/CVE-2024-39472.html * https://www.suse.com/security/cve/CVE-2024-39504.html * https://www.suse.com/security/cve/CVE-2024-40904.html * https://www.suse.com/security/cve/CVE-2024-40931.html * https://www.suse.com/security/cve/CVE-2024-40960.html * https://www.suse.com/security/cve/CVE-2024-40972.html * https://www.suse.com/security/cve/CVE-2024-40977.html * https://www.suse.com/security/cve/CVE-2024-40995.html * https://www.suse.com/security/cve/CVE-2024-40998.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41013.html * https://www.suse.com/security/cve/CVE-2024-41014.html * https://www.suse.com/security/cve/CVE-2024-43854.html * https://www.suse.com/security/cve/CVE-2024-45018.html