SUSE-SU-2024:4042-1: important: Security update for govulncheck-vulndb
openSUSE-SU-2024:0373-1: important: Security update for chromium
openSUSE-SU-2024:0374-1: important: Security update for chromium
openSUSE-SU-2024:14517-1: moderate: traefik2-2.11.14-1.1 on GA media
openSUSE-SU-2024:14515-1: moderate: govulncheck-vulndb-0.0.20241120T172248-1.1 on GA media
openSUSE-SU-2024:14514-1: moderate: dcmtk-3.6.8-5.1 on GA media
openSUSE-SU-2024:14516-1: moderate: iptraf-ng-1.2.2-1.1 on GA media
SUSE-SU-2024:4042-1: important: Security update for govulncheck-vulndb
# Security update for govulncheck-vulndb
Announcement ID: SUSE-SU-2024:4042-1
Release Date: 2024-11-22T10:44:15Z
Rating: important
References:
* jsc#PED-11136
Cross-References:
* CVE-2024-10389
* CVE-2024-10975
* CVE-2024-45794
* CVE-2024-48057
* CVE-2024-51735
* CVE-2024-51744
* CVE-2024-51746
CVSS scores:
* CVE-2024-10389 ( NVD ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:D/RE:L/U:Green
* CVE-2024-10389 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:L
* CVE-2024-10975 ( NVD ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
* CVE-2024-45794 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
* CVE-2024-48057 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-51735 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2024-51744 ( SUSE ): 2.1
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-51744 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-51744 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-51746 ( NVD ): 1.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves seven vulnerabilities and contains one feature can now be
installed.
## Description:
This update for govulncheck-vulndb fixes the following issues:
* Update to version 0.0.20241112T145010 2024-11-12T14:50:10Z. Refs
jsc#PED-11136 Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2024-3250 CVE-2024-51744 GHSA-29wx-vh33-7x7r
* Update to version 0.0.20241108T172500 2024-11-08T17:25:00Z. Refs
jsc#PED-11136 Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2024-3260 CVE-2024-45794 GHSA-q78v-cv36-8fxj
* GO-2024-3262 CVE-2024-10975 GHSA-2w5v-x29g-jw7j
* Update to version 0.0.20241106T172143 2024-11-06T17:21:43Z. Refs
jsc#PED-11136 Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2024-3251 CVE-2024-10389 GHSA-q3rp-vvm7-j8jg
* GO-2024-3252 CVE-2024-51746 GHSA-8pmp-678w-c8xx
* GO-2024-3253 CVE-2024-48057 GHSA-ghx4-cgxw-7h9p
* GO-2024-3254 CVE-2024-51735 GHSA-wvv7-wm5v-w2gv
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4042=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4042=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4042=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4042=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1
* openSUSE Leap 15.6 (noarch)
* govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1
* SUSE Package Hub 15 15-SP5 (noarch)
* govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1
* SUSE Package Hub 15 15-SP6 (noarch)
* govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1
## References:
* https://www.suse.com/security/cve/CVE-2024-10389.html
* https://www.suse.com/security/cve/CVE-2024-10975.html
* https://www.suse.com/security/cve/CVE-2024-45794.html
* https://www.suse.com/security/cve/CVE-2024-48057.html
* https://www.suse.com/security/cve/CVE-2024-51735.html
* https://www.suse.com/security/cve/CVE-2024-51744.html
* https://www.suse.com/security/cve/CVE-2024-51746.html
* https://jira.suse.com/browse/PED-11136
openSUSE-SU-2024:0373-1: important: Security update for chromium
openSUSE Security Update: Security update for chromium
_______________________________
Announcement ID: openSUSE-SU-2024:0373-1
Rating: important
References: #1233311
Cross-References: CVE-2024-11110 CVE-2024-11111 CVE-2024-11112
CVE-2024-11113 CVE-2024-11114 CVE-2024-11115
CVE-2024-11116 CVE-2024-11117
Affected Products:
openSUSE Backports SLE-15-SP5
_______________________________
An update that fixes 8 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Chromium 131.0.6778.69 (stable released 2024-11-12) (boo#1233311)
* CVE-2024-11110: Inappropriate implementation in Blink.
* CVE-2024-11111: Inappropriate implementation in Autofill.
* CVE-2024-11112: Use after free in Media.
* CVE-2024-11113: Use after free in Accessibility.
* CVE-2024-11114: Inappropriate implementation in Views.
* CVE-2024-11115: Insufficient policy enforcement in Navigation.
* CVE-2024-11116: Inappropriate implementation in Paint.
* CVE-2024-11117: Inappropriate implementation in FileSystem.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-373=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):
chromedriver-131.0.6778.69-bp155.2.141.1
chromium-131.0.6778.69-bp155.2.141.1
References:
https://www.suse.com/security/cve/CVE-2024-11110.html
https://www.suse.com/security/cve/CVE-2024-11111.html
https://www.suse.com/security/cve/CVE-2024-11112.html
https://www.suse.com/security/cve/CVE-2024-11113.html
https://www.suse.com/security/cve/CVE-2024-11114.html
https://www.suse.com/security/cve/CVE-2024-11115.html
https://www.suse.com/security/cve/CVE-2024-11116.html
https://www.suse.com/security/cve/CVE-2024-11117.html
https://bugzilla.suse.com/1233311
openSUSE-SU-2024:0374-1: important: Security update for chromium
openSUSE Security Update: Security update for chromium
_______________________________
Announcement ID: openSUSE-SU-2024:0374-1
Rating: important
References: #1233311
Cross-References: CVE-2024-11110 CVE-2024-11111 CVE-2024-11112
CVE-2024-11113 CVE-2024-11114 CVE-2024-11115
CVE-2024-11116 CVE-2024-11117
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________
An update that fixes 8 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Chromium 131.0.6778.69 (stable released 2024-11-12) (boo#1233311)
* CVE-2024-11110: Inappropriate implementation in Blink.
* CVE-2024-11111: Inappropriate implementation in Autofill.
* CVE-2024-11112: Use after free in Media.
* CVE-2024-11113: Use after free in Accessibility.
* CVE-2024-11114: Inappropriate implementation in Views.
* CVE-2024-11115: Insufficient policy enforcement in Navigation.
* CVE-2024-11116: Inappropriate implementation in Paint.
* CVE-2024-11117: Inappropriate implementation in FileSystem.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-374=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):
chromedriver-131.0.6778.69-bp156.2.53.1
chromium-131.0.6778.69-bp156.2.53.1
References:
https://www.suse.com/security/cve/CVE-2024-11110.html
https://www.suse.com/security/cve/CVE-2024-11111.html
https://www.suse.com/security/cve/CVE-2024-11112.html
https://www.suse.com/security/cve/CVE-2024-11113.html
https://www.suse.com/security/cve/CVE-2024-11114.html
https://www.suse.com/security/cve/CVE-2024-11115.html
https://www.suse.com/security/cve/CVE-2024-11116.html
https://www.suse.com/security/cve/CVE-2024-11117.html
https://bugzilla.suse.com/1233311
openSUSE-SU-2024:14517-1: moderate: traefik2-2.11.14-1.1 on GA media
# traefik2-2.11.14-1.1 on GA media
Announcement ID: openSUSE-SU-2024:14517-1
Rating: moderate
Cross-References:
* CVE-2024-51744
CVSS scores:
* CVE-2024-51744 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-51744 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the traefik2-2.11.14-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* traefik2 2.11.14-1.1
## References:
* https://www.suse.com/security/cve/CVE-2024-51744.html
openSUSE-SU-2024:14515-1: moderate: govulncheck-vulndb-0.0.20241120T172248-1.1 on GA media
# govulncheck-vulndb-0.0.20241120T172248-1.1 on GA media
Announcement ID: openSUSE-SU-2024:14515-1
Rating: moderate
Cross-References:
* CVE-2024-52009
* CVE-2024-8986
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the govulncheck-vulndb-0.0.20241120T172248-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* govulncheck-vulndb 0.0.20241120T172248-1.1
## References:
* https://www.suse.com/security/cve/CVE-2024-52009.html
* https://www.suse.com/security/cve/CVE-2024-8986.html
openSUSE-SU-2024:14514-1: moderate: dcmtk-3.6.8-5.1 on GA media
# dcmtk-3.6.8-5.1 on GA media
Announcement ID: openSUSE-SU-2024:14514-1
Rating: moderate
Cross-References:
* CVE-2024-27628
* CVE-2024-34509
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the dcmtk-3.6.8-5.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* dcmtk 3.6.8-5.1
* dcmtk-devel 3.6.8-5.1
* libdcmtk18 3.6.8-5.1
## References:
* https://www.suse.com/security/cve/CVE-2024-27628.html
* https://www.suse.com/security/cve/CVE-2024-34509.html
openSUSE-SU-2024:14516-1: moderate: iptraf-ng-1.2.2-1.1 on GA media
# iptraf-ng-1.2.2-1.1 on GA media
Announcement ID: openSUSE-SU-2024:14516-1
Rating: moderate
Cross-References:
* CVE-2024-52949
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the iptraf-ng-1.2.2-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* iptraf-ng 1.2.2-1.1
## References:
* https://www.suse.com/security/cve/CVE-2024-52949.html