SUSE-SU-2024:0129-1: important: Security update for the Linux Kernel
SUSE-SU-2024:0090-1: moderate: Security update for gstreamer-plugins-rs
SUSE-SU-2024:0076-1: moderate: Security update for hawk2
SUSE-SU-2024:0057-1: important: Security update for eclipse-jgit, jsch
SUSE-SU-2024:0044-1: important: Security update for MozillaThunderbird
SUSE-SU-2024:0058-1: important: Security update for wireshark
SUSE-SU-2024:0129-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:0129-1
Rating: important
References:
* bsc#1179610
* bsc#1183045
* bsc#1193285
* bsc#1211162
* bsc#1211226
* bsc#1212584
* bsc#1214747
* bsc#1214823
* bsc#1215237
* bsc#1215696
* bsc#1215885
* bsc#1216057
* bsc#1216559
* bsc#1216776
* bsc#1217036
* bsc#1217217
* bsc#1217250
* bsc#1217602
* bsc#1217692
* bsc#1217790
* bsc#1217801
* bsc#1217933
* bsc#1217938
* bsc#1217946
* bsc#1217947
* bsc#1217980
* bsc#1217981
* bsc#1217982
* bsc#1218056
* bsc#1218139
* bsc#1218184
* bsc#1218234
* bsc#1218253
* bsc#1218258
* bsc#1218335
* bsc#1218357
* bsc#1218447
* bsc#1218515
* bsc#1218559
* bsc#1218569
* bsc#1218659
* jsc#PED-3459
* jsc#PED-5021
* jsc#PED-7322
Cross-References:
* CVE-2020-26555
* CVE-2023-51779
* CVE-2023-6121
* CVE-2023-6531
* CVE-2023-6546
* CVE-2023-6606
* CVE-2023-6610
* CVE-2023-6622
* CVE-2023-6931
* CVE-2023-6932
CVSS scores:
* CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-6622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Real Time Module 15-SP4
An update that solves 10 vulnerabilities, contains three features and has 31
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix
garbage collector's deletion of SKB races with unix_stream_read_generic() on
the socket that the SKB is queued on (bsc#1218447).
* CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing
debug information (bsc#1217946).
* CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race
condition in bt_sock_recvmsg (bsc#1218559).
* CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the
Bluetooth subsystem that would allow replay attacks (bsc#1179610
bsc#1215237).
* CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving
a malformed length from a server (bsc#1217947).
* CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via
the GSMIOC_SETCONF ioctl that could lead to local privilege escalation
(bsc#1218335).
* CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux
kernel's Performance Events system component that could lead to local
privilege escalation. (bsc#1218258).
* CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's
ipv4: igmp component that could lead to local privilege escalation
(bsc#1218253).
* CVE-2023-6622: Fixed a null pointer dereference vulnerability in
nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user
privilege to trigger a denial of service (bsc#1217938).
* CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted
packet in the NVMe-oF/TCP subsystem (bsc#1217250).
The following non-security bugs were fixed:
* Reviewed and added more information to README.SUSE (jsc#PED-5021).
* Build in the correct KOTD repository with multibuild (JSC-SLE#5501,
boo#1211226, bsc#1218184) With multibuild setting repository flags is no
longer supported for individual spec files - see
https://github.com/openSUSE/open-build-service/issues/3574 Add ExclusiveArch
conditional that depends on a macro set up by bs-upload-kernel instead. With
that each package should build only in one repository - either standard or
QA. Note: bs-upload-kernel does not interpret rpm conditionals, and only
uses the first ExclusiveArch line to determine the architectures to enable.
* KVM: s390/mm: Properly reset no-dat (bsc#1218056).
* KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217933).
* KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).
* NFS: Fix O_DIRECT locking issues (bsc#1211162).
* NFS: Fix a few more clear_bit() instances that need release semantics
(bsc#1211162).
* NFS: Fix a potential data corruption (bsc#1211162).
* NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162).
* NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162).
* NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162).
* NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162).
* NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162).
* NLM: Defend against file_lock changes after vfs_test_lock() (bsc#1217692).
* Updated SPI patches for NVIDIA Grace enablement (bsc#1212584, jsc#PED-3459).
* block: fix revalidate performance regression (bsc#1216057).
* bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234).
* ceph: fix incorrect revoked caps assert in ceph_fill_file_size()
(bsc#1217980).
* ceph: fix type promotion bug on 32bit systems (bsc#1217982).
* clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885
bsc#1217217).
* clocksource: Enable TSC watchdog checking of HPET and PMTMR only when
requested (bsc#1215885 bsc#1217217).
* clocksource: Handle negative skews in "skew is too large" messages
(bsc#1215885 bsc#1217217).
* clocksource: Improve "skew is too large" messages (bsc#1215885 bsc#1217217).
* clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217).
* clocksource: Loosen clocksource watchdog constraints (bsc#1215885
bsc#1217217).
* clocksource: Print clocksource name when clocksource is tested unstable
(bsc#1215885 bsc#1217217).
* clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885
bsc#1217217).
* dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776).
* fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659).
* kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes,
as used only locally for asus-wmi stuff
* libceph: use kernel_connect() (bsc#1217981).
* mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When
MULTIBUILD option in config.sh is enabled generate a _multibuild file
listing all spec files.
* mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515).
* net/smc: Fix pos miscalculation in statistics (bsc#1218139).
* net/tg3: fix race condition in tg3_reset_task() (bsc#1217801).
* nfs: only issue commit in DIO codepath if we have uncommitted data
(bsc#1211162).
* remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569).
* s390/vx: fix save/restore of fpu kernel context (bsc#1218357).
* scsi: lpfc: use unsigned type for num_sge (bsc#1214747).
* swiotlb: fix a braino in the alignment check fix (bsc#1216559).
* swiotlb: fix slot alignment checks (bsc#1216559).
* tracing: Disable preemption when using the filter buffer (bsc#1217036).
* tracing: Fix a possible race when disabling buffered events (bsc#1217036).
* tracing: Fix a warning when allocating buffered events fails (bsc#1217036).
* tracing: Fix incomplete locking when disabling buffered events
(bsc#1217036).
* tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036).
* tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver()
(bsc#1217036).
* uapi: propagate __struct_group() attributes to the container union
(jsc#SLE-18978).
* vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602).
* x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
* x86/platform/uv: Use alternate source for socket to node data (bsc#1215696
bsc#1217790).
* x86/tsc: Add option to force frequency recalibration with HW timer
(bsc#1215885 bsc#1217217).
* x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217).
* x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885
bsc#1217217).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Real Time Module 15-SP4
zypper in -t patch SUSE-SLE-Module-RT-15-SP4-2024-129=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-129=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-129=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-129=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-129=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-129=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-129=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-129=1
## Package List:
* SUSE Real Time Module 15-SP4 (x86_64)
* kernel-rt-devel-debuginfo-5.14.21-150400.15.65.1
* kernel-rt-debuginfo-5.14.21-150400.15.65.1
* kernel-rt_debug-debuginfo-5.14.21-150400.15.65.1
* gfs2-kmp-rt-debuginfo-5.14.21-150400.15.65.1
* kernel-rt_debug-devel-5.14.21-150400.15.65.1
* cluster-md-kmp-rt-5.14.21-150400.15.65.1
* dlm-kmp-rt-debuginfo-5.14.21-150400.15.65.1
* kernel-rt-devel-5.14.21-150400.15.65.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.65.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.65.1
* kernel-syms-rt-5.14.21-150400.15.65.1
* ocfs2-kmp-rt-5.14.21-150400.15.65.1
* dlm-kmp-rt-5.14.21-150400.15.65.1
* kernel-rt_debug-debugsource-5.14.21-150400.15.65.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.65.1
* kernel-rt-debugsource-5.14.21-150400.15.65.1
* gfs2-kmp-rt-5.14.21-150400.15.65.1
* SUSE Real Time Module 15-SP4 (noarch)
* kernel-devel-rt-5.14.21-150400.15.65.1
* kernel-source-rt-5.14.21-150400.15.65.1
* SUSE Real Time Module 15-SP4 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150400.15.65.1
* kernel-rt-5.14.21-150400.15.65.1
* openSUSE Leap Micro 5.3 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.65.1
* openSUSE Leap Micro 5.3 (x86_64)
* kernel-rt-debuginfo-5.14.21-150400.15.65.1
* kernel-rt-debugsource-5.14.21-150400.15.65.1
* openSUSE Leap Micro 5.4 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.65.1
* openSUSE Leap Micro 5.4 (x86_64)
* kernel-rt-debuginfo-5.14.21-150400.15.65.1
* kernel-rt-debugsource-5.14.21-150400.15.65.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.65.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* kernel-rt-debuginfo-5.14.21-150400.15.65.1
* kernel-rt-debugsource-5.14.21-150400.15.65.1
* SUSE Linux Enterprise Micro 5.3 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.65.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* kernel-rt-debuginfo-5.14.21-150400.15.65.1
* kernel-rt-debugsource-5.14.21-150400.15.65.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.65.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* kernel-rt-debuginfo-5.14.21-150400.15.65.1
* kernel-rt-debugsource-5.14.21-150400.15.65.1
* SUSE Linux Enterprise Micro 5.4 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.65.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* kernel-rt-debuginfo-5.14.21-150400.15.65.1
* kernel-rt-debugsource-5.14.21-150400.15.65.1
* SUSE Linux Enterprise Live Patching 15-SP4 (x86_64)
* kernel-livepatch-SLE15-SP4-RT_Update_17-debugsource-1-150400.1.3.1
* kernel-livepatch-5_14_21-150400_15_65-rt-debuginfo-1-150400.1.3.1
* kernel-livepatch-5_14_21-150400_15_65-rt-1-150400.1.3.1
## References:
* https://www.suse.com/security/cve/CVE-2020-26555.html
* https://www.suse.com/security/cve/CVE-2023-51779.html
* https://www.suse.com/security/cve/CVE-2023-6121.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2023-6546.html
* https://www.suse.com/security/cve/CVE-2023-6606.html
* https://www.suse.com/security/cve/CVE-2023-6610.html
* https://www.suse.com/security/cve/CVE-2023-6622.html
* https://www.suse.com/security/cve/CVE-2023-6931.html
* https://www.suse.com/security/cve/CVE-2023-6932.html
* https://bugzilla.suse.com/show_bug.cgi?id=1179610
* https://bugzilla.suse.com/show_bug.cgi?id=1183045
* https://bugzilla.suse.com/show_bug.cgi?id=1193285
* https://bugzilla.suse.com/show_bug.cgi?id=1211162
* https://bugzilla.suse.com/show_bug.cgi?id=1211226
* https://bugzilla.suse.com/show_bug.cgi?id=1212584
* https://bugzilla.suse.com/show_bug.cgi?id=1214747
* https://bugzilla.suse.com/show_bug.cgi?id=1214823
* https://bugzilla.suse.com/show_bug.cgi?id=1215237
* https://bugzilla.suse.com/show_bug.cgi?id=1215696
* https://bugzilla.suse.com/show_bug.cgi?id=1215885
* https://bugzilla.suse.com/show_bug.cgi?id=1216057
* https://bugzilla.suse.com/show_bug.cgi?id=1216559
* https://bugzilla.suse.com/show_bug.cgi?id=1216776
* https://bugzilla.suse.com/show_bug.cgi?id=1217036
* https://bugzilla.suse.com/show_bug.cgi?id=1217217
* https://bugzilla.suse.com/show_bug.cgi?id=1217250
* https://bugzilla.suse.com/show_bug.cgi?id=1217602
* https://bugzilla.suse.com/show_bug.cgi?id=1217692
* https://bugzilla.suse.com/show_bug.cgi?id=1217790
* https://bugzilla.suse.com/show_bug.cgi?id=1217801
* https://bugzilla.suse.com/show_bug.cgi?id=1217933
* https://bugzilla.suse.com/show_bug.cgi?id=1217938
* https://bugzilla.suse.com/show_bug.cgi?id=1217946
* https://bugzilla.suse.com/show_bug.cgi?id=1217947
* https://bugzilla.suse.com/show_bug.cgi?id=1217980
* https://bugzilla.suse.com/show_bug.cgi?id=1217981
* https://bugzilla.suse.com/show_bug.cgi?id=1217982
* https://bugzilla.suse.com/show_bug.cgi?id=1218056
* https://bugzilla.suse.com/show_bug.cgi?id=1218139
* https://bugzilla.suse.com/show_bug.cgi?id=1218184
* https://bugzilla.suse.com/show_bug.cgi?id=1218234
* https://bugzilla.suse.com/show_bug.cgi?id=1218253
* https://bugzilla.suse.com/show_bug.cgi?id=1218258
* https://bugzilla.suse.com/show_bug.cgi?id=1218335
* https://bugzilla.suse.com/show_bug.cgi?id=1218357
* https://bugzilla.suse.com/show_bug.cgi?id=1218447
* https://bugzilla.suse.com/show_bug.cgi?id=1218515
* https://bugzilla.suse.com/show_bug.cgi?id=1218559
* https://bugzilla.suse.com/show_bug.cgi?id=1218569
* https://bugzilla.suse.com/show_bug.cgi?id=1218659
* https://jira.suse.com/browse/PED-3459
* https://jira.suse.com/browse/PED-5021
* https://jira.suse.com/browse/PED-7322
SUSE-SU-2024:0090-1: moderate: Security update for gstreamer-plugins-rs
# Security update for gstreamer-plugins-rs
Announcement ID: SUSE-SU-2024:0090-1
Rating: moderate
References:
* bsc#1208556
Cross-References:
* CVE-2022-31394
CVSS scores:
* CVE-2022-31394 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-31394 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for gstreamer-plugins-rs fixes the following issues:
* CVE-2022-31394: Fixed a potential denial of service in the HTTP/2
implementation (bsc#1208556).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-90=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-90=1
* SUSE Linux Enterprise Real Time 15 SP4
zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-90=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gstreamer-plugins-rs-debuginfo-0.8.2-150400.3.3.1
* gstreamer-plugins-rs-devel-0.8.2-150400.3.3.1
* gstreamer-plugins-rs-debugsource-0.8.2-150400.3.3.1
* gstreamer-plugins-rs-0.8.2-150400.3.3.1
* Desktop Applications Module 15-SP5 (ppc64le)
* gstreamer-plugins-rs-debuginfo-0.8.2-150400.3.3.1
* gstreamer-plugins-rs-devel-0.8.2-150400.3.3.1
* gstreamer-plugins-rs-debugsource-0.8.2-150400.3.3.1
* gstreamer-plugins-rs-0.8.2-150400.3.3.1
* SUSE Linux Enterprise Real Time 15 SP4 (x86_64)
* gstreamer-plugins-rs-debuginfo-0.8.2-150400.3.3.1
* gstreamer-plugins-rs-devel-0.8.2-150400.3.3.1
* gstreamer-plugins-rs-debugsource-0.8.2-150400.3.3.1
* gstreamer-plugins-rs-0.8.2-150400.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2022-31394.html
* https://bugzilla.suse.com/show_bug.cgi?id=1208556
SUSE-SU-2024:0076-1: moderate: Security update for hawk2
# Security update for hawk2
Announcement ID: SUSE-SU-2024:0076-1
Rating: moderate
References:
* bsc#1206217
* bsc#1207930
* bsc#1208533
* bsc#1213454
* bsc#1215438
* bsc#1215976
* bsc#1216508
* bsc#1216571
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Availability Extension 15 SP1
* SUSE Linux Enterprise High Availability Extension 15 SP2
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.0
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.0
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.0
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has eight security fixes can now be installed.
## Description:
This update for hawk2 fixes the following issues:
* Fixed HttpOnly secure flag by default (bsc#1216508).
* Fixed CSRF in errors_controller.rb protection (bsc#1216571).
Update to version 2.6.4+git.1702030539.5fb7d91b:
* Fix mime type issue in MS windows (bsc#1215438)
* Parametrize CORS Access-Control-Allow-Origin header (bsc#1213454)
* Tests: upgrate tests for ruby3.2 (tumbleweed) (bsc#1215976)
* Upgrade for ruby3.2 (tumbleweed) (bsc#1215976)
* Forbid special symbols in the category (bsc#1206217)
* Fix the sass-rails version on ~5.0 (bsc#1208533)
* Don't delete the private key if the public key is missing (bsc#1207930)
* make-sle155-compatible.patch . No bsc, it's for backwards compatibility.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2024-76=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-76=1
* SUSE Linux Enterprise High Availability Extension 15 SP1
zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2024-76=1
* SUSE Linux Enterprise High Availability Extension 15 SP2
zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-76=1
* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-76=1
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-76=1
* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-76=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* SUSE Linux Enterprise High Availability Extension 15 SP1 (aarch64 ppc64le
s390x x86_64)
* hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le
s390x x86_64)
* hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
s390x x86_64)
* hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
* hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1206217
* https://bugzilla.suse.com/show_bug.cgi?id=1207930
* https://bugzilla.suse.com/show_bug.cgi?id=1208533
* https://bugzilla.suse.com/show_bug.cgi?id=1213454
* https://bugzilla.suse.com/show_bug.cgi?id=1215438
* https://bugzilla.suse.com/show_bug.cgi?id=1215976
* https://bugzilla.suse.com/show_bug.cgi?id=1216508
* https://bugzilla.suse.com/show_bug.cgi?id=1216571
SUSE-SU-2024:0057-1: important: Security update for eclipse-jgit, jsch
# Security update for eclipse-jgit, jsch
Announcement ID: SUSE-SU-2024:0057-1
Rating: important
References:
* bsc#1209646
* bsc#1211955
* bsc#1215298
* jsc#PED-6376
* jsc#PED-6377
Cross-References:
* CVE-2023-4759
CVSS scores:
* CVE-2023-4759 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-4759 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Development Tools Module 15-SP4
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module 4.3
An update that solves one vulnerability, contains two features and has two
security fixes can now be installed.
## Description:
This update for eclipse-jgit, jsch fixes the following issues:
Security fix: \- CVE-2023-4759: Fixed an arbitrary file overwrite which might
have occurred with a specially crafted git repository and a case-insensitive
filesystem. (bsc#1215298)
Other fixes: jsch was updated to version 0.2.9: \- Added support for various
algorithms \- Migrated from `com.jcraft:jsch` to `com.github.mwiede:jsch` fork
(bsc#1211955): * Alias to the old artifact since the new one is drop-in
replacement * Keep the old OSGi bundle symbolic name to avoid extensive patching
of eclipse stack \- Updated to version 0.2.9: * For the full list of changes
please consult the upstream changelogs below for each version updated: \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.2.9 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.2.8 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.2.7 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.2.6 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.2.5 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.2.4 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.2.3 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.2.2 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.2.1 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.2.0 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.71 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.70 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.69 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.68 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.67 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.66 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.65 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.64 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.63 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.62 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.61 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.60 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.59 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.58 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.57 \+
https://github.com/mwiede/jsch/releases/tag/jsch-0.1.56
eclipse-jgit:
* Craft the jgit script from the real Main class of the jar file instead of
using a jar launcher (bsc#1209646)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2024-57=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-57=1
* Development Tools Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2024-57=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-57=1
* SUSE Manager Server 4.3 Module 4.3
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-57=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-57=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-57=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-57=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-57=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-57=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-57=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-57=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-57=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* jsch-demo-0.2.9-150200.11.10.1
* jsch-javadoc-0.2.9-150200.11.10.1
* jgit-javadoc-5.11.0-150200.3.15.2
* eclipse-jgit-5.11.0-150200.3.15.2
* jgit-5.11.0-150200.3.15.2
* jsch-0.2.9-150200.11.10.1
* openSUSE Leap 15.5 (noarch)
* eclipse-jgit-5.11.0-150200.3.15.2
* jsch-demo-0.2.9-150200.11.10.1
* jsch-javadoc-0.2.9-150200.11.10.1
* jsch-0.2.9-150200.11.10.1
* Development Tools Module 15-SP4 (noarch)
* jsch-0.2.9-150200.11.10.1
* Development Tools Module 15-SP5 (noarch)
* jsch-0.2.9-150200.11.10.1
* SUSE Manager Server 4.3 Module 4.3 (noarch)
* jsch-0.2.9-150200.11.10.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* jsch-0.2.9-150200.11.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch)
* jsch-0.2.9-150200.11.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* jsch-0.2.9-150200.11.10.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* jsch-0.2.9-150200.11.10.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* jsch-0.2.9-150200.11.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* jsch-0.2.9-150200.11.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* jsch-0.2.9-150200.11.10.1
* SUSE Enterprise Storage 7.1 (noarch)
* jsch-0.2.9-150200.11.10.1
## References:
* https://www.suse.com/security/cve/CVE-2023-4759.html
* https://bugzilla.suse.com/show_bug.cgi?id=1209646
* https://bugzilla.suse.com/show_bug.cgi?id=1211955
* https://bugzilla.suse.com/show_bug.cgi?id=1215298
* https://jira.suse.com/browse/PED-6376
* https://jira.suse.com/browse/PED-6377
SUSE-SU-2024:0044-1: important: Security update for MozillaThunderbird
# Security update for MozillaThunderbird
Announcement ID: SUSE-SU-2024:0044-1
Rating: important
References:
* bsc#1217974
Cross-References:
* CVE-2023-50761
* CVE-2023-50762
* CVE-2023-6856
* CVE-2023-6857
* CVE-2023-6858
* CVE-2023-6859
* CVE-2023-6860
* CVE-2023-6861
* CVE-2023-6862
* CVE-2023-6863
* CVE-2023-6864
CVSS scores:
* CVE-2023-50761 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2023-50762 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2023-6856 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-6857 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2023-6858 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-6859 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-6860 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2023-6861 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-6862 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-6863 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-6864 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves 11 vulnerabilities can now be installed.
## Description:
This update for MozillaThunderbird fixes the following issues:
Firefox Extended Support Release 115.6.0 ESR (bsc#1217974): * CVE-2023-6856:
Heap-buffer-overflow affecting WebGL DrawElementsInstanced method with Mesa VM
driver (bmo#1843782). * CVE-2023-6857: Symlinks may resolve to smaller than
expected buffers (bmo#1796023). * CVE-2023-6858: Heap buffer overflow in
nsTextFragment (bmo#1826791). * CVE-2023-6859: Use-after-free in
PR_GetIdentitiesLayer (bmo#1840144). * CVE-2023-6860: Potential sandbox escape
due to VideoBridge lack of texture validation (bmo#1854669). * CVE-2023-6861:
Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode
(bmo#1864118). * CVE-2023-6862: Use-after-free in nsDNSService (bsc#1868042). *
CVE-2023-6863: Undefined behavior in ShutdownObserver() (bmo#1868901). *
CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and
Thunderbird 115.6. * CVE-2023-50762: Truncated signed text was shown with a
valid OpenPGP signature (bmo#1862625).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-44=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-44=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-44=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-44=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-debuginfo-115.6.0-150200.8.142.2
* MozillaThunderbird-debugsource-115.6.0-150200.8.142.2
* MozillaThunderbird-translations-other-115.6.0-150200.8.142.2
* MozillaThunderbird-115.6.0-150200.8.142.2
* MozillaThunderbird-translations-common-115.6.0-150200.8.142.2
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
* MozillaThunderbird-debuginfo-115.6.0-150200.8.142.2
* MozillaThunderbird-debugsource-115.6.0-150200.8.142.2
* MozillaThunderbird-translations-other-115.6.0-150200.8.142.2
* MozillaThunderbird-115.6.0-150200.8.142.2
* MozillaThunderbird-translations-common-115.6.0-150200.8.142.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* MozillaThunderbird-debuginfo-115.6.0-150200.8.142.2
* MozillaThunderbird-debugsource-115.6.0-150200.8.142.2
* MozillaThunderbird-translations-other-115.6.0-150200.8.142.2
* MozillaThunderbird-115.6.0-150200.8.142.2
* MozillaThunderbird-translations-common-115.6.0-150200.8.142.2
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* MozillaThunderbird-debuginfo-115.6.0-150200.8.142.2
* MozillaThunderbird-debugsource-115.6.0-150200.8.142.2
* MozillaThunderbird-translations-other-115.6.0-150200.8.142.2
* MozillaThunderbird-115.6.0-150200.8.142.2
* MozillaThunderbird-translations-common-115.6.0-150200.8.142.2
## References:
* https://www.suse.com/security/cve/CVE-2023-50761.html
* https://www.suse.com/security/cve/CVE-2023-50762.html
* https://www.suse.com/security/cve/CVE-2023-6856.html
* https://www.suse.com/security/cve/CVE-2023-6857.html
* https://www.suse.com/security/cve/CVE-2023-6858.html
* https://www.suse.com/security/cve/CVE-2023-6859.html
* https://www.suse.com/security/cve/CVE-2023-6860.html
* https://www.suse.com/security/cve/CVE-2023-6861.html
* https://www.suse.com/security/cve/CVE-2023-6862.html
* https://www.suse.com/security/cve/CVE-2023-6863.html
* https://www.suse.com/security/cve/CVE-2023-6864.html
* https://bugzilla.suse.com/show_bug.cgi?id=1217974
SUSE-SU-2024:0058-1: important: Security update for wireshark
# Security update for wireshark
Announcement ID: SUSE-SU-2024:0058-1
Rating: important
References:
* bsc#1218504
* bsc#1218505
Cross-References:
* CVE-2024-0208
* CVE-2024-0209
CVSS scores:
* CVE-2024-0208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-0209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE CaaS Platform 4.0
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for wireshark fixes the following issues:
* Updated to Wireshark 3.6.20:
* CVE-2024-0208: Fixed a crash in the GVCP dissector (bsc#1218504).
* CVE-2024-0209: Fixed a crash in the IEEE 1609.2 dissector (bsc#1218505).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-58=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-58=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-58=1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-58=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-58=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-58=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-58=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-58=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-58=1
* SUSE Linux Enterprise Real Time 15 SP4
zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-58=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-58=1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-58=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-58=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-58=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-58=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-58=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-58=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-58=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-58=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-58=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-58=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-58=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-58=1
* SUSE CaaS Platform 4.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform
you if it detects new updates and let you then trigger updating of the complete
cluster in a controlled way.
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64
x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64
x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise Real Time 15 SP4 (x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Manager Proxy 4.3 (x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
* SUSE CaaS Platform 4.0 (x86_64)
* libwireshark15-3.6.20-150000.3.109.1
* libwiretap12-3.6.20-150000.3.109.1
* wireshark-debugsource-3.6.20-150000.3.109.1
* wireshark-debuginfo-3.6.20-150000.3.109.1
* libwireshark15-debuginfo-3.6.20-150000.3.109.1
* libwiretap12-debuginfo-3.6.20-150000.3.109.1
* wireshark-3.6.20-150000.3.109.1
* libwsutil13-debuginfo-3.6.20-150000.3.109.1
* wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1
* wireshark-devel-3.6.20-150000.3.109.1
* wireshark-ui-qt-3.6.20-150000.3.109.1
* libwsutil13-3.6.20-150000.3.109.1
## References:
* https://www.suse.com/security/cve/CVE-2024-0208.html
* https://www.suse.com/security/cve/CVE-2024-0209.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218504
* https://bugzilla.suse.com/show_bug.cgi?id=1218505