SUSE 5149 Published by

OpenSUSE Leap and SUSE Linux Enterprise have received security updates for ffmpeg-4, python312, clamav, clamav, ucode-intel, and wireshark:

SUSE-SU-2024:3301-1: important: Security update for ffmpeg-4
SUSE-SU-2024:3303-1: important: Security update for python312
SUSE-SU-2024:3305-1: important: Security update for clamav
SUSE-SU-2024:3306-1: important: Security update for clamav
SUSE-SU-2024:3332-1: moderate: Security update for ucode-intel
SUSE-SU-2024:3333-1: moderate: Security update for wireshark




SUSE-SU-2024:3301-1: important: Security update for ffmpeg-4


# Security update for ffmpeg-4

Announcement ID: SUSE-SU-2024:3301-1
Rating: important
References:

* bsc#1229026

Cross-References:

* CVE-2024-7055

CVSS scores:

* CVE-2024-7055 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Package Hub 15 15-SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for ffmpeg-4 fixes the following issues:

* CVE-2024-7055: Fixed a heap-based buffer overflow in pnmdec. (bsc#1229026)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3301=1 openSUSE-SLE-15.6-2024-3301=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3301=1

* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3301=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libavresample4_0-4.4-150600.13.13.1
* ffmpeg-4-libswresample-devel-4.4-150600.13.13.1
* libavcodec58_134-4.4-150600.13.13.1
* libavutil56_70-debuginfo-4.4-150600.13.13.1
* ffmpeg-4-4.4-150600.13.13.1
* ffmpeg-4-libavfilter-devel-4.4-150600.13.13.1
* libavdevice58_13-debuginfo-4.4-150600.13.13.1
* libpostproc55_9-4.4-150600.13.13.1
* libavresample4_0-debuginfo-4.4-150600.13.13.1
* libswresample3_9-4.4-150600.13.13.1
* libavfilter7_110-debuginfo-4.4-150600.13.13.1
* ffmpeg-4-debuginfo-4.4-150600.13.13.1
* ffmpeg-4-libpostproc-devel-4.4-150600.13.13.1
* libavcodec58_134-debuginfo-4.4-150600.13.13.1
* ffmpeg-4-libavutil-devel-4.4-150600.13.13.1
* libavformat58_76-4.4-150600.13.13.1
* libswscale5_9-debuginfo-4.4-150600.13.13.1
* ffmpeg-4-libavresample-devel-4.4-150600.13.13.1
* ffmpeg-4-libavdevice-devel-4.4-150600.13.13.1
* ffmpeg-4-libavcodec-devel-4.4-150600.13.13.1
* libavformat58_76-debuginfo-4.4-150600.13.13.1
* libavdevice58_13-4.4-150600.13.13.1
* libavfilter7_110-4.4-150600.13.13.1
* libswresample3_9-debuginfo-4.4-150600.13.13.1
* ffmpeg-4-libswscale-devel-4.4-150600.13.13.1
* ffmpeg-4-debugsource-4.4-150600.13.13.1
* libswscale5_9-4.4-150600.13.13.1
* libavutil56_70-4.4-150600.13.13.1
* ffmpeg-4-libavformat-devel-4.4-150600.13.13.1
* ffmpeg-4-private-devel-4.4-150600.13.13.1
* libpostproc55_9-debuginfo-4.4-150600.13.13.1
* openSUSE Leap 15.6 (x86_64)
* libavcodec58_134-32bit-debuginfo-4.4-150600.13.13.1
* libavformat58_76-32bit-debuginfo-4.4-150600.13.13.1
* libavutil56_70-32bit-4.4-150600.13.13.1
* libswscale5_9-32bit-4.4-150600.13.13.1
* libpostproc55_9-32bit-4.4-150600.13.13.1
* libswscale5_9-32bit-debuginfo-4.4-150600.13.13.1
* libpostproc55_9-32bit-debuginfo-4.4-150600.13.13.1
* libavfilter7_110-32bit-4.4-150600.13.13.1
* libavresample4_0-32bit-4.4-150600.13.13.1
* libavdevice58_13-32bit-debuginfo-4.4-150600.13.13.1
* libavcodec58_134-32bit-4.4-150600.13.13.1
* libavutil56_70-32bit-debuginfo-4.4-150600.13.13.1
* libavdevice58_13-32bit-4.4-150600.13.13.1
* libavresample4_0-32bit-debuginfo-4.4-150600.13.13.1
* libswresample3_9-32bit-4.4-150600.13.13.1
* libswresample3_9-32bit-debuginfo-4.4-150600.13.13.1
* libavfilter7_110-32bit-debuginfo-4.4-150600.13.13.1
* libavformat58_76-32bit-4.4-150600.13.13.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libavcodec58_134-64bit-debuginfo-4.4-150600.13.13.1
* libavresample4_0-64bit-debuginfo-4.4-150600.13.13.1
* libpostproc55_9-64bit-debuginfo-4.4-150600.13.13.1
* libswresample3_9-64bit-4.4-150600.13.13.1
* libavutil56_70-64bit-debuginfo-4.4-150600.13.13.1
* libavformat58_76-64bit-4.4-150600.13.13.1
* libswresample3_9-64bit-debuginfo-4.4-150600.13.13.1
* libavdevice58_13-64bit-4.4-150600.13.13.1
* libavresample4_0-64bit-4.4-150600.13.13.1
* libpostproc55_9-64bit-4.4-150600.13.13.1
* libavfilter7_110-64bit-4.4-150600.13.13.1
* libavformat58_76-64bit-debuginfo-4.4-150600.13.13.1
* libavutil56_70-64bit-4.4-150600.13.13.1
* libavdevice58_13-64bit-debuginfo-4.4-150600.13.13.1
* libswscale5_9-64bit-4.4-150600.13.13.1
* libswscale5_9-64bit-debuginfo-4.4-150600.13.13.1
* libavfilter7_110-64bit-debuginfo-4.4-150600.13.13.1
* libavcodec58_134-64bit-4.4-150600.13.13.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* libavresample4_0-4.4-150600.13.13.1
* ffmpeg-4-libswresample-devel-4.4-150600.13.13.1
* libavcodec58_134-4.4-150600.13.13.1
* libavutil56_70-debuginfo-4.4-150600.13.13.1
* ffmpeg-4-4.4-150600.13.13.1
* ffmpeg-4-libavfilter-devel-4.4-150600.13.13.1
* libavdevice58_13-debuginfo-4.4-150600.13.13.1
* libpostproc55_9-4.4-150600.13.13.1
* libavresample4_0-debuginfo-4.4-150600.13.13.1
* libswresample3_9-4.4-150600.13.13.1
* libavfilter7_110-debuginfo-4.4-150600.13.13.1
* ffmpeg-4-debuginfo-4.4-150600.13.13.1
* ffmpeg-4-libpostproc-devel-4.4-150600.13.13.1
* libavcodec58_134-debuginfo-4.4-150600.13.13.1
* ffmpeg-4-libavutil-devel-4.4-150600.13.13.1
* libavformat58_76-4.4-150600.13.13.1
* libswscale5_9-debuginfo-4.4-150600.13.13.1
* ffmpeg-4-libavresample-devel-4.4-150600.13.13.1
* ffmpeg-4-libavdevice-devel-4.4-150600.13.13.1
* ffmpeg-4-libavcodec-devel-4.4-150600.13.13.1
* libavformat58_76-debuginfo-4.4-150600.13.13.1
* libavdevice58_13-4.4-150600.13.13.1
* libavfilter7_110-4.4-150600.13.13.1
* libswresample3_9-debuginfo-4.4-150600.13.13.1
* ffmpeg-4-libswscale-devel-4.4-150600.13.13.1
* ffmpeg-4-debugsource-4.4-150600.13.13.1
* libswscale5_9-4.4-150600.13.13.1
* libavutil56_70-4.4-150600.13.13.1
* ffmpeg-4-libavformat-devel-4.4-150600.13.13.1
* ffmpeg-4-private-devel-4.4-150600.13.13.1
* libpostproc55_9-debuginfo-4.4-150600.13.13.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* ffmpeg-4-debugsource-4.4-150600.13.13.1
* libswscale5_9-4.4-150600.13.13.1
* libavutil56_70-4.4-150600.13.13.1
* ffmpeg-4-debuginfo-4.4-150600.13.13.1
* libavcodec58_134-debuginfo-4.4-150600.13.13.1
* libavformat58_76-4.4-150600.13.13.1
* libavformat58_76-debuginfo-4.4-150600.13.13.1
* libavcodec58_134-4.4-150600.13.13.1
* libavutil56_70-debuginfo-4.4-150600.13.13.1
* libswresample3_9-debuginfo-4.4-150600.13.13.1
* libswscale5_9-debuginfo-4.4-150600.13.13.1
* libswresample3_9-4.4-150600.13.13.1

## References:

* https://www.suse.com/security/cve/CVE-2024-7055.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229026



SUSE-SU-2024:3303-1: important: Security update for python312


# Security update for python312

Announcement ID: SUSE-SU-2024:3303-1
Rating: important
References:

* bsc#1227999
* bsc#1228780
* bsc#1229596
* bsc#1229704
* bsc#1230227

Cross-References:

* CVE-2024-6232
* CVE-2024-6923
* CVE-2024-7592
* CVE-2024-8088

CVSS scores:

* CVE-2024-6232 ( SUSE ): 8.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-6232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-7592 ( SUSE ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8088 ( SUSE ): 5.9
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-8088 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves four vulnerabilities and has one security fix can now be
installed.

## Description:

This update for python312 fixes the following issues:

* Update to 3.12.6
* CVE-2024-6923: Fixed uncontrolled CPU resource consumption when in
http.cookies module. (bsc#1228780).
* CVE-2024-7592: Fixed Email header injection due to unquoted newlines.
(bsc#1229596)
* CVE-2024-6232: Fixed ReDos via excessive backtracking while parsing header
values. (bsc#1230227)
* CVE-2024-8088: Fixed denial of service in zipfile. (bsc#1229704)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3303=1 openSUSE-SLE-15.6-2024-3303=1

* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-3303=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python312-tk-3.12.6-150600.3.6.1
* python312-curses-debuginfo-3.12.6-150600.3.6.1
* python312-idle-3.12.6-150600.3.6.1
* libpython3_12-1_0-3.12.6-150600.3.6.1
* python312-dbm-3.12.6-150600.3.6.1
* python312-doc-3.12.6-150600.3.6.1
* python312-dbm-debuginfo-3.12.6-150600.3.6.1
* python312-base-3.12.6-150600.3.6.1
* python312-3.12.6-150600.3.6.1
* python312-devel-3.12.6-150600.3.6.1
* python312-testsuite-3.12.6-150600.3.6.1
* python312-tk-debuginfo-3.12.6-150600.3.6.1
* python312-curses-3.12.6-150600.3.6.1
* libpython3_12-1_0-debuginfo-3.12.6-150600.3.6.1
* python312-debuginfo-3.12.6-150600.3.6.1
* python312-base-debuginfo-3.12.6-150600.3.6.1
* python312-doc-devhelp-3.12.6-150600.3.6.1
* python312-testsuite-debuginfo-3.12.6-150600.3.6.1
* python312-debugsource-3.12.6-150600.3.6.1
* python312-core-debugsource-3.12.6-150600.3.6.1
* python312-tools-3.12.6-150600.3.6.1
* openSUSE Leap 15.6 (x86_64)
* libpython3_12-1_0-32bit-debuginfo-3.12.6-150600.3.6.1
* python312-base-32bit-debuginfo-3.12.6-150600.3.6.1
* libpython3_12-1_0-32bit-3.12.6-150600.3.6.1
* python312-base-32bit-3.12.6-150600.3.6.1
* python312-32bit-debuginfo-3.12.6-150600.3.6.1
* python312-32bit-3.12.6-150600.3.6.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* python312-base-64bit-debuginfo-3.12.6-150600.3.6.1
* python312-64bit-debuginfo-3.12.6-150600.3.6.1
* libpython3_12-1_0-64bit-3.12.6-150600.3.6.1
* libpython3_12-1_0-64bit-debuginfo-3.12.6-150600.3.6.1
* python312-base-64bit-3.12.6-150600.3.6.1
* python312-64bit-3.12.6-150600.3.6.1
* Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python312-curses-3.12.6-150600.3.6.1
* python312-debugsource-3.12.6-150600.3.6.1
* libpython3_12-1_0-debuginfo-3.12.6-150600.3.6.1
* python312-tk-3.12.6-150600.3.6.1
* python312-debuginfo-3.12.6-150600.3.6.1
* python312-curses-debuginfo-3.12.6-150600.3.6.1
* python312-dbm-debuginfo-3.12.6-150600.3.6.1
* python312-idle-3.12.6-150600.3.6.1
* python312-base-3.12.6-150600.3.6.1
* python312-3.12.6-150600.3.6.1
* python312-base-debuginfo-3.12.6-150600.3.6.1
* python312-devel-3.12.6-150600.3.6.1
* libpython3_12-1_0-3.12.6-150600.3.6.1
* python312-dbm-3.12.6-150600.3.6.1
* python312-core-debugsource-3.12.6-150600.3.6.1
* python312-tk-debuginfo-3.12.6-150600.3.6.1
* python312-tools-3.12.6-150600.3.6.1

## References:

* https://www.suse.com/security/cve/CVE-2024-6232.html
* https://www.suse.com/security/cve/CVE-2024-6923.html
* https://www.suse.com/security/cve/CVE-2024-7592.html
* https://www.suse.com/security/cve/CVE-2024-8088.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227999
* https://bugzilla.suse.com/show_bug.cgi?id=1228780
* https://bugzilla.suse.com/show_bug.cgi?id=1229596
* https://bugzilla.suse.com/show_bug.cgi?id=1229704
* https://bugzilla.suse.com/show_bug.cgi?id=1230227



SUSE-SU-2024:3305-1: important: Security update for clamav


# Security update for clamav

Announcement ID: SUSE-SU-2024:3305-1
Rating: important
References:

* bsc#1230161
* bsc#1230162

Cross-References:

* CVE-2024-20505
* CVE-2024-20506

CVSS scores:

* CVE-2024-20505 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-20505 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-20505 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-20505 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-20506 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-20506 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
* CVE-2024-20506 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-20506 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves two vulnerabilities can now be installed.

## Description:

This update for clamav fixes the following issues:

* Update to version 0.103.12
* CVE-2024-20506: Disable symlinks following to prevent an attacker to corrupt
system files. (bsc#1230162)
* CVE-2024-20505: Fixed possible out-of-bounds read bug in the PDF file
parser. (bsc#1230161)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3305=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3305=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3305=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3305=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3305=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3305=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3305=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3305=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3305=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3305=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3305=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3305=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3305=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3305=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3305=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3305=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3305=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Manager Proxy 4.3 (x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* clamav-devel-0.103.12-150000.3.53.1
* libfreshclam2-0.103.12-150000.3.53.1
* libclamav9-0.103.12-150000.3.53.1
* clamav-debugsource-0.103.12-150000.3.53.1
* libclamav9-debuginfo-0.103.12-150000.3.53.1
* clamav-debuginfo-0.103.12-150000.3.53.1
* libfreshclam2-debuginfo-0.103.12-150000.3.53.1
* clamav-0.103.12-150000.3.53.1

## References:

* https://www.suse.com/security/cve/CVE-2024-20505.html
* https://www.suse.com/security/cve/CVE-2024-20506.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230161
* https://bugzilla.suse.com/show_bug.cgi?id=1230162



SUSE-SU-2024:3306-1: important: Security update for clamav


# Security update for clamav

Announcement ID: SUSE-SU-2024:3306-1
Rating: important
References:

* bsc#1230161
* bsc#1230162

Cross-References:

* CVE-2024-20505
* CVE-2024-20506

CVSS scores:

* CVE-2024-20505 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-20505 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-20505 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-20505 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-20506 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-20506 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
* CVE-2024-20506 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-20506 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves two vulnerabilities can now be installed.

## Description:

This update for clamav fixes the following issues:

* Update to version 0.103.12
* CVE-2024-20506: Disable symlinks following to prevent an attacker to corrupt
system files. (bsc#1230162)
* CVE-2024-20505: Fixed possible out-of-bounds read bug in the PDF file
parser. (bsc#1230161)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3306=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3306=1 openSUSE-SLE-15.6-2024-3306=1

## Package List:

* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* clamav-devel-0.103.12-150600.18.3.1
* libclamav9-debuginfo-0.103.12-150600.18.3.1
* clamav-0.103.12-150600.18.3.1
* libfreshclam2-0.103.12-150600.18.3.1
* clamav-debugsource-0.103.12-150600.18.3.1
* libclamav9-0.103.12-150600.18.3.1
* clamav-debuginfo-0.103.12-150600.18.3.1
* libfreshclam2-debuginfo-0.103.12-150600.18.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* clamav-devel-0.103.12-150600.18.3.1
* libclamav9-debuginfo-0.103.12-150600.18.3.1
* clamav-0.103.12-150600.18.3.1
* libfreshclam2-0.103.12-150600.18.3.1
* clamav-debugsource-0.103.12-150600.18.3.1
* libclamav9-0.103.12-150600.18.3.1
* clamav-debuginfo-0.103.12-150600.18.3.1
* libfreshclam2-debuginfo-0.103.12-150600.18.3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-20505.html
* https://www.suse.com/security/cve/CVE-2024-20506.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230161
* https://bugzilla.suse.com/show_bug.cgi?id=1230162



SUSE-SU-2024:3332-1: moderate: Security update for ucode-intel


# Security update for ucode-intel

Announcement ID: SUSE-SU-2024:3332-1
Rating: moderate
References:

* bsc#1230400

Cross-References:

* CVE-2024-23984
* CVE-2024-24968

CVSS scores:

* CVE-2024-23984 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-23984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-23984 ( NVD ): 6.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2024-23984 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-24968 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-24968 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-24968 ( NVD ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2024-24968 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves two vulnerabilities can now be installed.

## Description:

This update for ucode-intel fixes the following issues:

* Intel CPU Microcode was updated to the 20240910 release (bsc#1230400)
* CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel
Processors may allow a privileged user to potentially enable information
disclosure via local access.
* CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in
some Intel Processors may allow an privileged user to potentially enable a
denial of service via local access.

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3332=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3332=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3332=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3332=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3332=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3332=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3332=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3332=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3332=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3332=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3332=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3332=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3332=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3332=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3332=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3332=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3332=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3332=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3332=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3332=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3332=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3332=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3332=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3332=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3332=1

* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3332=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3332=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3332=1

## Package List:

* openSUSE Leap Micro 5.5 (x86_64)
* ucode-intel-20240910-150200.47.1
* openSUSE Leap 15.5 (x86_64)
* ucode-intel-20240910-150200.47.1
* openSUSE Leap 15.6 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* ucode-intel-20240910-150200.47.1
* Basesystem Module 15-SP5 (x86_64)
* ucode-intel-20240910-150200.47.1
* Basesystem Module 15-SP6 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Manager Proxy 4.3 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Manager Server 4.3 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Enterprise Storage 7.1 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Micro 5.1 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* ucode-intel-20240910-150200.47.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* ucode-intel-20240910-150200.47.1

## References:

* https://www.suse.com/security/cve/CVE-2024-23984.html
* https://www.suse.com/security/cve/CVE-2024-24968.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230400



SUSE-SU-2024:3333-1: moderate: Security update for wireshark


# Security update for wireshark

Announcement ID: SUSE-SU-2024:3333-1
Rating: moderate
References:

* bsc#1229907

Cross-References:

* CVE-2024-8250

CVSS scores:

* CVE-2024-8250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-8250 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for wireshark fixes the following issues:

* Upgraded Wireshark to version 3.6.24.
* CVE-2024-8250: Fixed NTLMSSP dissector crash (bsc#1229907).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3333=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3333=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3333=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libwsutil13-3.6.24-150000.3.118.1
* wireshark-ui-qt-3.6.24-150000.3.118.1
* wireshark-debuginfo-3.6.24-150000.3.118.1
* libwsutil13-debuginfo-3.6.24-150000.3.118.1
* libwireshark15-debuginfo-3.6.24-150000.3.118.1
* libwiretap12-3.6.24-150000.3.118.1
* wireshark-debugsource-3.6.24-150000.3.118.1
* libwireshark15-3.6.24-150000.3.118.1
* libwiretap12-debuginfo-3.6.24-150000.3.118.1
* wireshark-devel-3.6.24-150000.3.118.1
* wireshark-ui-qt-debuginfo-3.6.24-150000.3.118.1
* wireshark-3.6.24-150000.3.118.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libwsutil13-3.6.24-150000.3.118.1
* wireshark-debuginfo-3.6.24-150000.3.118.1
* libwsutil13-debuginfo-3.6.24-150000.3.118.1
* libwireshark15-debuginfo-3.6.24-150000.3.118.1
* libwiretap12-3.6.24-150000.3.118.1
* wireshark-debugsource-3.6.24-150000.3.118.1
* libwireshark15-3.6.24-150000.3.118.1
* libwiretap12-debuginfo-3.6.24-150000.3.118.1
* wireshark-3.6.24-150000.3.118.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* wireshark-ui-qt-3.6.24-150000.3.118.1
* wireshark-debuginfo-3.6.24-150000.3.118.1
* wireshark-debugsource-3.6.24-150000.3.118.1
* wireshark-devel-3.6.24-150000.3.118.1
* wireshark-ui-qt-debuginfo-3.6.24-150000.3.118.1

## References:

* https://www.suse.com/security/cve/CVE-2024-8250.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229907