SUSE 5175 Published by

SUSE Linux has received several security updates, including moderate updates for govulncheck-vulndb, nodejs20, socat, nodejs18, python310-Django, libsvn_auth_gnome_keyring, radare2, govulncheck-vulndb-0.0.20241209T183251-1.1, buildah, java-1_8_0-ibm, qemu, and chromium:

SUSE-SU-2024:4299-1: moderate: Security update for govulncheck-vulndb
SUSE-SU-2024:4300-1: moderate: Security update for nodejs20
SUSE-SU-2024:4302-1: moderate: Security update for socat
SUSE-SU-2024:4301-1: moderate: Security update for nodejs18
openSUSE-SU-2024:14568-1: moderate: python310-Django-5.1.4-1.1 on GA media
openSUSE-SU-2024:14570-1: moderate: libsvn_auth_gnome_keyring-1-0-1.14.5-1.1 on GA media
openSUSE-SU-2024:14569-1: moderate: radare2-5.9.8-1.1 on GA media
openSUSE-SU-2024:14567-1: moderate: govulncheck-vulndb-0.0.20241209T183251-1.1 on GA media
SUSE-SU-2024:4303-1: moderate: Security update for buildah
SUSE-SU-2024:4306-1: moderate: Security update for java-1_8_0-ibm
SUSE-SU-2024:4304-1: important: Security update for qemu
openSUSE-SU-2024:0406-1: important: Security update for chromium
openSUSE-SU-2024:0405-1: important: Security update for chromium




SUSE-SU-2024:4299-1: moderate: Security update for govulncheck-vulndb


# Security update for govulncheck-vulndb

Announcement ID: SUSE-SU-2024:4299-1
Release Date: 2024-12-12T08:10:04Z
Rating: moderate
References:

* jsc#PED-11136

Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6

An update that contains one feature can now be installed.

## Description:

This update for govulncheck-vulndb fixes the following issues:

* Update to version 0.0.20241209T183251 2024-12-09T18:32:51Z (jsc#PED-11136)
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2024-3284
* GO-2024-3286
* GO-2024-3287
* GO-2024-3288
* GO-2024-3289
* GO-2024-3290
* GO-2024-3291
* GO-2024-3292
* GO-2024-3294
* GO-2024-3296
* GO-2024-3299
* GO-2024-3300
* GO-2024-3302
* GO-2024-3303
* GO-2024-3304
* GO-2024-3305
* GO-2024-3307
* GO-2024-3308
* GO-2024-3310
* GO-2024-3311
* GO-2024-3312
* GO-2024-3313

* Update to version 0.0.20241121T195252 2024-11-21T19:52:52Z (jsc#PED-11136)
Go CVE Numbering Authority IDs added or updated with aliases:

* GO-2024-3279
* GO-2024-3280
* GO-2024-3281
* GO-2024-3282
* GO-2024-3283

* Update to version 0.0.20241120T172248 2024-11-20T17:22:48Z (jsc#PED-11136)
Go CVE Numbering Authority IDs added or updated with aliases:

* GO-2024-3140
* GO-2024-3259
* GO-2024-3265

* Update to version 0.0.20241119T173509 2024-11-19T17:35:09Z (jsc#PED-11136)
Go CVE Numbering Authority IDs added or updated with aliases:

* GO-2022-0646
* GO-2024-3267
* GO-2024-3269
* GO-2024-3271
* GO-2024-3272
* GO-2024-3273
* GO-2024-3274
* GO-2024-3275
* GO-2024-3277
* GO-2024-3278

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4299=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4299=1

* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4299=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4299=1

## Package List:

* openSUSE Leap 15.5 (noarch)
* govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1
* openSUSE Leap 15.6 (noarch)
* govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1
* SUSE Package Hub 15 15-SP5 (noarch)
* govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1
* SUSE Package Hub 15 15-SP6 (noarch)
* govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1

## References:

* https://jira.suse.com/browse/PED-11136



SUSE-SU-2024:4300-1: moderate: Security update for nodejs20


# Security update for nodejs20

Announcement ID: SUSE-SU-2024:4300-1
Release Date: 2024-12-12T08:10:17Z
Rating: moderate
References:

* bsc#1233856

Cross-References:

* CVE-2024-21538

CVSS scores:

* CVE-2024-21538 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-21538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-21538 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for nodejs20 fixes the following issues:

* CVE-2024-21538: Fixed regular expression denial of service in cross-spawn
dependency (bsc#1233856)

Other fixes: \- Updated to 20.18.1: * Experimental Network Inspection Support in
Node.js * Exposes X509_V_FLAG_PARTIAL_CHAIN to tls.createSecureContext * New
option for vm.createContext() to create a context with a freezable globalThis *
buffer: optimize createFromString \- Changes in 20.17.0: * module: support
require()ing synchronous ESM graphs * path: add matchesGlob method * stream:
expose DuplexPair API \- Changes in 20.16.0: * process: add
process.getBuiltinModule(id) * inspector: fix disable async hooks on
Debugger.setAsyncCallStackDepth * buffer: add .bytes() method to Blob

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4300=1 SUSE-2024-4300=1

* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4300=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* npm20-20.18.1-150500.11.15.1
* nodejs20-debugsource-20.18.1-150500.11.15.1
* nodejs20-20.18.1-150500.11.15.1
* nodejs20-debuginfo-20.18.1-150500.11.15.1
* nodejs20-devel-20.18.1-150500.11.15.1
* corepack20-20.18.1-150500.11.15.1
* openSUSE Leap 15.5 (noarch)
* nodejs20-docs-20.18.1-150500.11.15.1
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* npm20-20.18.1-150500.11.15.1
* nodejs20-debugsource-20.18.1-150500.11.15.1
* nodejs20-20.18.1-150500.11.15.1
* nodejs20-debuginfo-20.18.1-150500.11.15.1
* nodejs20-devel-20.18.1-150500.11.15.1
* Web and Scripting Module 15-SP5 (noarch)
* nodejs20-docs-20.18.1-150500.11.15.1

## References:

* https://www.suse.com/security/cve/CVE-2024-21538.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233856



SUSE-SU-2024:4302-1: moderate: Security update for socat


# Security update for socat

Announcement ID: SUSE-SU-2024:4302-1
Release Date: 2024-12-12T08:51:18Z
Rating: moderate
References:

* bsc#1225462

Cross-References:

* CVE-2024-54661

CVSS scores:

* CVE-2024-54661 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-54661 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for socat fixes the following issues:

* CVE-2024-54661: Fixed arbitrary file overwrite via predictable /tmp
directory (bsc#1225462)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4302=1

* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4302=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4302=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4302=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4302=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4302=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4302=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4302=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4302=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* socat-extra-1.8.0.0-150400.14.6.1
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1

## References:

* https://www.suse.com/security/cve/CVE-2024-54661.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225462



SUSE-SU-2024:4301-1: moderate: Security update for nodejs18


# Security update for nodejs18

Announcement ID: SUSE-SU-2024:4301-1
Release Date: 2024-12-12T08:10:45Z
Rating: moderate
References:

* bsc#1233856

Cross-References:

* CVE-2024-21538

CVSS scores:

* CVE-2024-21538 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-21538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-21538 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for nodejs18 fixes the following issues:

* CVE-2024-21538: Fixed regular expression denial of service in cross-spawn
dependency (bsc#1233856)

Other fixes: \- Update to 18.20.5 * esm: mark import attributes and JSON module
as stable * deps: \+ upgrade npm to 10.8.2 \+ update simdutf to 5.6.0 \+ update
brotli to 1.1.0 \+ update ada to 2.8.0 \+ update acorn to 8.13.0 \+ update
acorn-walk to 8.3.4 \+ update c-ares to 1.29.0

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4301=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4301=1

* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4301=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* corepack18-18.20.5-150400.9.30.1
* nodejs18-devel-18.20.5-150400.9.30.1
* nodejs18-debugsource-18.20.5-150400.9.30.1
* npm18-18.20.5-150400.9.30.1
* nodejs18-debuginfo-18.20.5-150400.9.30.1
* nodejs18-18.20.5-150400.9.30.1
* openSUSE Leap 15.4 (noarch)
* nodejs18-docs-18.20.5-150400.9.30.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* corepack18-18.20.5-150400.9.30.1
* nodejs18-devel-18.20.5-150400.9.30.1
* nodejs18-debugsource-18.20.5-150400.9.30.1
* npm18-18.20.5-150400.9.30.1
* nodejs18-debuginfo-18.20.5-150400.9.30.1
* nodejs18-18.20.5-150400.9.30.1
* openSUSE Leap 15.5 (noarch)
* nodejs18-docs-18.20.5-150400.9.30.1
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* nodejs18-debugsource-18.20.5-150400.9.30.1
* nodejs18-devel-18.20.5-150400.9.30.1
* npm18-18.20.5-150400.9.30.1
* nodejs18-debuginfo-18.20.5-150400.9.30.1
* nodejs18-18.20.5-150400.9.30.1
* Web and Scripting Module 15-SP5 (noarch)
* nodejs18-docs-18.20.5-150400.9.30.1

## References:

* https://www.suse.com/security/cve/CVE-2024-21538.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233856



openSUSE-SU-2024:14568-1: moderate: python310-Django-5.1.4-1.1 on GA media


# python310-Django-5.1.4-1.1 on GA media

Announcement ID: openSUSE-SU-2024:14568-1
Rating: moderate

Cross-References:

* CVE-2024-53907
* CVE-2024-53908

CVSS scores:

* CVE-2024-53907 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53908 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the python310-Django-5.1.4-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python310-Django 5.1.4-1.1
* python311-Django 5.1.4-1.1
* python312-Django 5.1.4-1.1
* python313-Django 5.1.4-1.1

## References:

* https://www.suse.com/security/cve/CVE-2024-53907.html
* https://www.suse.com/security/cve/CVE-2024-53908.html



openSUSE-SU-2024:14570-1: moderate: libsvn_auth_gnome_keyring-1-0-1.14.5-1.1 on GA media


# libsvn_auth_gnome_keyring-1-0-1.14.5-1.1 on GA media

Announcement ID: openSUSE-SU-2024:14570-1
Rating: moderate

Cross-References:

* CVE-2024-46901

CVSS scores:

* CVE-2024-46901 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the libsvn_auth_gnome_keyring-1-0-1.14.5-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libsvn_auth_gnome_keyring-1-0 1.14.5-1.1
* libsvn_auth_kwallet-1-0 1.14.5-1.1
* subversion 1.14.5-1.1
* subversion-bash-completion 1.14.5-1.1
* subversion-devel 1.14.5-1.1
* subversion-perl 1.14.5-1.1
* subversion-python 1.14.5-1.1
* subversion-ruby 1.14.5-1.1
* subversion-server 1.14.5-1.1
* subversion-tools 1.14.5-1.1

## References:

* https://www.suse.com/security/cve/CVE-2024-46901.html



openSUSE-SU-2024:14569-1: moderate: radare2-5.9.8-1.1 on GA media


# radare2-5.9.8-1.1 on GA media

Announcement ID: openSUSE-SU-2024:14569-1
Rating: moderate

Cross-References:

* CVE-2024-29645

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the radare2-5.9.8-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* radare2 5.9.8-1.1
* radare2-devel 5.9.8-1.1
* radare2-zsh-completion 5.9.8-1.1

## References:

* https://www.suse.com/security/cve/CVE-2024-29645.html



openSUSE-SU-2024:14567-1: moderate: govulncheck-vulndb-0.0.20241209T183251-1.1 on GA media


# govulncheck-vulndb-0.0.20241209T183251-1.1 on GA media

Announcement ID: openSUSE-SU-2024:14567-1
Rating: moderate

Cross-References:

* CVE-2024-10220
* CVE-2024-36620
* CVE-2024-36621
* CVE-2024-36623
* CVE-2024-37820
* CVE-2024-43784
* CVE-2024-45719
* CVE-2024-50948
* CVE-2024-52003
* CVE-2024-52529
* CVE-2024-52801
* CVE-2024-53259
* CVE-2024-53264
* CVE-2024-53858
* CVE-2024-53862
* CVE-2024-54131
* CVE-2024-54132
* CVE-2024-6156
* CVE-2024-6219
* CVE-2024-6538
* CVE-2024-8676

CVSS scores:

* CVE-2024-10220 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-36621 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36623 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-54132 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 21 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the govulncheck-vulndb-0.0.20241209T183251-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* govulncheck-vulndb 0.0.20241209T183251-1.1

## References:

* https://www.suse.com/security/cve/CVE-2024-10220.html
* https://www.suse.com/security/cve/CVE-2024-36620.html
* https://www.suse.com/security/cve/CVE-2024-36621.html
* https://www.suse.com/security/cve/CVE-2024-36623.html
* https://www.suse.com/security/cve/CVE-2024-37820.html
* https://www.suse.com/security/cve/CVE-2024-43784.html
* https://www.suse.com/security/cve/CVE-2024-45719.html
* https://www.suse.com/security/cve/CVE-2024-50948.html
* https://www.suse.com/security/cve/CVE-2024-52003.html
* https://www.suse.com/security/cve/CVE-2024-52529.html
* https://www.suse.com/security/cve/CVE-2024-52801.html
* https://www.suse.com/security/cve/CVE-2024-53259.html
* https://www.suse.com/security/cve/CVE-2024-53264.html
* https://www.suse.com/security/cve/CVE-2024-53858.html
* https://www.suse.com/security/cve/CVE-2024-53862.html
* https://www.suse.com/security/cve/CVE-2024-54131.html
* https://www.suse.com/security/cve/CVE-2024-54132.html
* https://www.suse.com/security/cve/CVE-2024-6156.html
* https://www.suse.com/security/cve/CVE-2024-6219.html
* https://www.suse.com/security/cve/CVE-2024-6538.html
* https://www.suse.com/security/cve/CVE-2024-8676.html



SUSE-SU-2024:4303-1: moderate: Security update for buildah


# Security update for buildah

Announcement ID: SUSE-SU-2024:4303-1
Release Date: 2024-12-12T12:50:24Z
Rating: moderate
References:

* bsc#1231208
* bsc#1231230
* bsc#1231499
* bsc#1231698
* bsc#1232522

Cross-References:

* CVE-2024-9341
* CVE-2024-9407
* CVE-2024-9675
* CVE-2024-9676

CVSS scores:

* CVE-2024-9341 ( SUSE ): 5.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9341 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9341 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
* CVE-2024-9341 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9407 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N
* CVE-2024-9675 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
* CVE-2024-9675 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-9675 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-9676 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-9676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP3

An update that solves four vulnerabilities and has one security fix can now be
installed.

## Description:

This update for buildah fixes the following issues:

Security issues fixed:

* CVE-2024-9675: cache arbitrary directory mount (bsc#1231499)
* CVE-2024-9407: Improper Input Validation in bind-propagation Option of
Dockerfile RUN --mount Instruction (bsc#1231208)
* CVE-2024-9676: symlink traversal vulnerability in the containers/storage
library can cause denial of service (bsc#1231698)
* CVE-2024-9341: FIPS Crypto-Policy Directory Mounting Issue in
containers/common Go Library (bsc#1231230)

Non-security issue fixed:

* default to slirp4netns on SLE instead of pasta (bsc#1232522)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4303=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4303=1

* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4303=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4303=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4303=1

## Package List:

* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.35.4-150300.8.28.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* buildah-1.35.4-150300.8.28.3
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* buildah-1.35.4-150300.8.28.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* buildah-1.35.4-150300.8.28.3
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* buildah-1.35.4-150300.8.28.3

## References:

* https://www.suse.com/security/cve/CVE-2024-9341.html
* https://www.suse.com/security/cve/CVE-2024-9407.html
* https://www.suse.com/security/cve/CVE-2024-9675.html
* https://www.suse.com/security/cve/CVE-2024-9676.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231208
* https://bugzilla.suse.com/show_bug.cgi?id=1231230
* https://bugzilla.suse.com/show_bug.cgi?id=1231499
* https://bugzilla.suse.com/show_bug.cgi?id=1231698
* https://bugzilla.suse.com/show_bug.cgi?id=1232522



SUSE-SU-2024:4306-1: moderate: Security update for java-1_8_0-ibm


# Security update for java-1_8_0-ibm

Announcement ID: SUSE-SU-2024:4306-1
Release Date: 2024-12-12T14:31:37Z
Rating: moderate
References:

* bsc#1225470
* bsc#1231702
* bsc#1231711
* bsc#1231716
* bsc#1231719
* bsc#1232064

Cross-References:

* CVE-2024-21208
* CVE-2024-21210
* CVE-2024-21217
* CVE-2024-21235
* CVE-2024-3933

CVSS scores:

* CVE-2024-21208 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21208 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21210 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21210 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21217 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21217 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21235 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21235 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-3933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L

Affected Products:

* Legacy Module 15-SP5
* Legacy Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves five vulnerabilities and has one security fix can now be
installed.

## Description:

This update for java-1_8_0-ibm fixes the following issues:

Updated to Java 8.0 Service Refresh 8 Fix Pack 35 with Oracle October 15 2024
CPU (bsc#1232064): \- CVE-2024-21208: Fixed partial DoS in component Networking
(bsc#1231702,JDK-8328286) \- CVE-2024-21210: Fixed unauthorized update, insert
or delete access to some of Oracle Java SE accessible data in component Hotspot
(bsc#1231711,JDK-8328544) \- CVE-2024-21217: Fixed partial DoS in component
Serialization (bsc#1231716,JDK-8331446) \- CVE-2024-21235: Fixed unauthorized
read/write access to data in component Hotspot (bsc#1231719,JDK-8332644)

Other issues fixed in past releases: \- CVE-2024-3933: Fixed evaluate constant
byteLenNode of arrayCopyChild (bsc#1225470)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4306=1

* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-4306=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4306=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4306=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4306=1

* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4306=1

* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4306=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4306=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4306=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4306=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4306=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4306=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4306=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4306=1

## Package List:

* Legacy Module 15-SP5 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP5 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP5 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP6 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP6 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP6 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Enterprise Storage 7.1 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Enterprise Storage 7.1 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.5 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.5 (x86_64)
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-32bit-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-32bit-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* java-1_8_0-ibm-src-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-demo-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.6 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.6 (x86_64)
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-32bit-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-32bit-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* java-1_8_0-ibm-src-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-demo-1.8.0_sr8.35-150000.3.95.1

## References:

* https://www.suse.com/security/cve/CVE-2024-21208.html
* https://www.suse.com/security/cve/CVE-2024-21210.html
* https://www.suse.com/security/cve/CVE-2024-21217.html
* https://www.suse.com/security/cve/CVE-2024-21235.html
* https://www.suse.com/security/cve/CVE-2024-3933.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225470
* https://bugzilla.suse.com/show_bug.cgi?id=1231702
* https://bugzilla.suse.com/show_bug.cgi?id=1231711
* https://bugzilla.suse.com/show_bug.cgi?id=1231716
* https://bugzilla.suse.com/show_bug.cgi?id=1231719
* https://bugzilla.suse.com/show_bug.cgi?id=1232064



SUSE-SU-2024:4304-1: important: Security update for qemu


# Security update for qemu

Announcement ID: SUSE-SU-2024:4304-1
Release Date: 2024-12-12T13:22:09Z
Rating: important
References:

* bsc#1229007
* bsc#1230834
* bsc#1230915

Cross-References:

* CVE-2024-7409
* CVE-2024-8354
* CVE-2024-8612

CVSS scores:

* CVE-2024-7409 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-7409 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8354 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-8354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8612 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-8612 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
* CVE-2024-8612 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves three vulnerabilities can now be installed.

## Description:

This update for qemu fixes the following issues:

* CVE-2024-7409: Fixed denial of service via improper synchronization in QEMU
NBD Server during socket closure (bsc#1229007)
* CVE-2024-8354: Fixed assertion failure in usb_ep_get() in usb (bsc#1230834)
* CVE-2024-8612: Fixed information leak in virtio devices (bsc#1230915)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4304=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4304=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4304=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4304=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4304=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4304=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4304=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4304=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4304=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4304=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4304=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4304=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4304=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-block-gluster-6.2.0-150400.37.37.3
* qemu-audio-jack-6.2.0-150400.37.37.3
* qemu-hw-usb-smartcard-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ivshmem-tools-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-jack-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-arm-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-accel-qtest-6.2.0-150400.37.37.3
* qemu-block-gluster-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-linux-user-debuginfo-6.2.0-150400.37.37.2
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-block-nfs-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-block-nfs-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-ppc-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-ppc-6.2.0-150400.37.37.3
* qemu-extra-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-smartcard-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-block-dmg-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* qemu-linux-user-debugsource-6.2.0-150400.37.37.2
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-oss-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-vhost-user-gpu-6.2.0-150400.37.37.3
* qemu-vhost-user-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-dmg-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-oss-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-linux-user-6.2.0-150400.37.37.2
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-ivshmem-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-extra-6.2.0-150400.37.37.3
* qemu-accel-qtest-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* openSUSE Leap 15.4 (s390x x86_64 i586)
* qemu-kvm-6.2.0-150400.37.37.3
* openSUSE Leap 15.4 (noarch)
* qemu-skiboot-6.2.0-150400.37.37.3
* qemu-SLOF-6.2.0-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* qemu-microvm-6.2.0-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (s390x)
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* qemu-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (s390x)
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* qemu-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (s390x)
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* qemu-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (s390x)
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* qemu-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64)
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* qemu-skiboot-6.2.0-150400.37.37.3
* qemu-SLOF-6.2.0-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le)
* qemu-ppc-debuginfo-6.2.0-150400.37.37.3
* qemu-ppc-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (s390x x86_64)
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (s390x)
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.37.3
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.37.3
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* qemu-skiboot-6.2.0-150400.37.37.3
* qemu-SLOF-6.2.0-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le)
* qemu-ppc-debuginfo-6.2.0-150400.37.37.3
* qemu-ppc-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* SUSE Manager Proxy 4.3 (x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Manager Proxy 4.3 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Manager Retail Branch Server 4.3 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (noarch)
* qemu-skiboot-6.2.0-150400.37.37.3
* qemu-SLOF-6.2.0-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Manager Server 4.3 (ppc64le x86_64)
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (ppc64le)
* qemu-ppc-debuginfo-6.2.0-150400.37.37.3
* qemu-ppc-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (s390x x86_64)
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (s390x)
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.37.3
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.37.3
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3

## References:

* https://www.suse.com/security/cve/CVE-2024-7409.html
* https://www.suse.com/security/cve/CVE-2024-8354.html
* https://www.suse.com/security/cve/CVE-2024-8612.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229007
* https://bugzilla.suse.com/show_bug.cgi?id=1230834
* https://bugzilla.suse.com/show_bug.cgi?id=1230915



openSUSE-SU-2024:0406-1: important: Security update for chromium


openSUSE Security Update: Security update for chromium
_______________________________

Announcement ID: openSUSE-SU-2024:0406-1
Rating: important
References: #1234118
Cross-References: CVE-2024-12053
Affected Products:
openSUSE Backports SLE-15-SP5
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for chromium fixes the following issues:

Chromium 131.0.6778.108 (stable released 2024-12-04) (boo#1234118)

- CVE-2024-12053: Type Confusion in V8

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP5:

zypper in -t patch openSUSE-2024-406=1

Package List:

- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):

chromedriver-131.0.6778.108-bp155.2.147.1
chromium-131.0.6778.108-bp155.2.147.1

References:

https://www.suse.com/security/cve/CVE-2024-12053.html
https://bugzilla.suse.com/1234118



openSUSE-SU-2024:0405-1: important: Security update for chromium


openSUSE Security Update: Security update for chromium
_______________________________

Announcement ID: openSUSE-SU-2024:0405-1
Rating: important
References: #1234118
Cross-References: CVE-2024-12053
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for chromium fixes the following issues:

Chromium 131.0.6778.108 (stable released 2024-12-04) (boo#1234118)

- CVE-2024-12053: Type Confusion in V8

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2024-405=1

Package List:

- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):

chromedriver-131.0.6778.108-bp156.2.59.1
chromium-131.0.6778.108-bp156.2.59.1

References:

https://www.suse.com/security/cve/CVE-2024-12053.html
https://bugzilla.suse.com/1234118