SUSE 5162 Published by

The following security updates have been released for openSUSE Leap and SUSE Linux Enterprise:

SUSE-SU-2024:3159-1: important: Security update for postgresql16
SUSE-SU-2024:3156-1: low: Security update for python312-pip
SUSE-SU-2024:3160-1: important: Security update for postgresql16
SUSE-SU-2024:3157-1: important: Security update for MozillaFirefox
SUSE-SU-2024:3158-1: important: Security update for postgresql16
SUSE-SU-2024:3162-1: important: Security update for java-1_8_0-ibm
SUSE-SU-2024:3163-1: moderate: Security update for gradle
SUSE-SU-2024:3149-1: moderate: Security update for systemd
SUSE-SU-2024:3144-1: important: Security update for hdf5, netcdf, trilinos
SUSE-SU-2024:3140-1: important: Security update for java-1_8_0-openj9
SUSE-SU-2024:3139-1: important: Security update for python-Django




SUSE-SU-2024:3159-1: important: Security update for postgresql16


# Security update for postgresql16

Announcement ID: SUSE-SU-2024:3159-1
Rating: important
References:

* bsc#1224038
* bsc#1224051
* bsc#1229013

Cross-References:

* CVE-2024-4317
* CVE-2024-7348

CVSS scores:

* CVE-2024-4317 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-7348 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves two vulnerabilities and has one security fix can now be
installed.

## Description:

This update for postgresql16 fixes the following issues:

* Upgrade to 16.4 (bsc#1229013)
* CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes
arbitrary SQL. (bsc#1229013)
* CVE-2024-4317: Restrict visibility of pg_stats_ext and pg_stats_ext_exprs
entries to the table owner. See the release notes for the steps that have to
be taken to fix existing PostgreSQL instances. (bsc#1224038)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3159=1

* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3159=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3159=1 openSUSE-SLE-15.6-2024-3159=1

## Package List:

* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* postgresql16-16.4-150600.16.5.1
* libpq5-debuginfo-16.4-150600.16.5.1
* postgresql16-debugsource-16.4-150600.16.5.1
* postgresql16-debuginfo-16.4-150600.16.5.1
* libpq5-16.4-150600.16.5.1
* Basesystem Module 15-SP6 (x86_64)
* libpq5-32bit-debuginfo-16.4-150600.16.5.1
* libpq5-32bit-16.4-150600.16.5.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* postgresql16-devel-16.4-150600.16.5.1
* postgresql16-server-16.4-150600.16.5.1
* postgresql16-server-devel-debuginfo-16.4-150600.16.5.1
* libecpg6-16.4-150600.16.5.1
* postgresql16-plperl-debuginfo-16.4-150600.16.5.1
* postgresql16-server-debuginfo-16.4-150600.16.5.1
* postgresql16-plpython-16.4-150600.16.5.1
* postgresql16-plpython-debuginfo-16.4-150600.16.5.1
* postgresql16-contrib-debuginfo-16.4-150600.16.5.1
* postgresql16-pltcl-debuginfo-16.4-150600.16.5.1
* postgresql16-debugsource-16.4-150600.16.5.1
* postgresql16-debuginfo-16.4-150600.16.5.1
* postgresql16-server-devel-16.4-150600.16.5.1
* libecpg6-debuginfo-16.4-150600.16.5.1
* postgresql16-devel-debuginfo-16.4-150600.16.5.1
* postgresql16-contrib-16.4-150600.16.5.1
* postgresql16-plperl-16.4-150600.16.5.1
* postgresql16-pltcl-16.4-150600.16.5.1
* Server Applications Module 15-SP6 (noarch)
* postgresql16-docs-16.4-150600.16.5.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* postgresql16-16.4-150600.16.5.1
* postgresql16-test-16.4-150600.16.5.1
* libpq5-debuginfo-16.4-150600.16.5.1
* postgresql16-plpython-debuginfo-16.4-150600.16.5.1
* postgresql16-llvmjit-devel-16.4-150600.16.5.1
* postgresql16-debugsource-16.4-150600.16.5.1
* postgresql16-debuginfo-16.4-150600.16.5.1
* postgresql16-plperl-16.4-150600.16.5.1
* postgresql16-devel-debuginfo-16.4-150600.16.5.1
* postgresql16-llvmjit-16.4-150600.16.5.1
* postgresql16-server-16.4-150600.16.5.1
* postgresql16-server-debuginfo-16.4-150600.16.5.1
* postgresql16-contrib-debuginfo-16.4-150600.16.5.1
* postgresql16-devel-mini-16.4-150600.16.5.1
* libecpg6-debuginfo-16.4-150600.16.5.1
* libpq5-16.4-150600.16.5.1
* postgresql16-contrib-16.4-150600.16.5.1
* postgresql16-mini-debugsource-16.4-150600.16.5.1
* postgresql16-plperl-debuginfo-16.4-150600.16.5.1
* postgresql16-plpython-16.4-150600.16.5.1
* postgresql16-llvmjit-debuginfo-16.4-150600.16.5.1
* postgresql16-server-devel-16.4-150600.16.5.1
* postgresql16-server-devel-debuginfo-16.4-150600.16.5.1
* postgresql16-pltcl-debuginfo-16.4-150600.16.5.1
* postgresql16-pltcl-16.4-150600.16.5.1
* postgresql16-devel-16.4-150600.16.5.1
* libecpg6-16.4-150600.16.5.1
* postgresql16-devel-mini-debuginfo-16.4-150600.16.5.1
* openSUSE Leap 15.6 (x86_64)
* libpq5-32bit-debuginfo-16.4-150600.16.5.1
* libecpg6-32bit-16.4-150600.16.5.1
* libpq5-32bit-16.4-150600.16.5.1
* libecpg6-32bit-debuginfo-16.4-150600.16.5.1
* openSUSE Leap 15.6 (noarch)
* postgresql16-docs-16.4-150600.16.5.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libecpg6-64bit-debuginfo-16.4-150600.16.5.1
* libpq5-64bit-16.4-150600.16.5.1
* libpq5-64bit-debuginfo-16.4-150600.16.5.1
* libecpg6-64bit-16.4-150600.16.5.1

## References:

* https://www.suse.com/security/cve/CVE-2024-4317.html
* https://www.suse.com/security/cve/CVE-2024-7348.html
* https://bugzilla.suse.com/show_bug.cgi?id=1224038
* https://bugzilla.suse.com/show_bug.cgi?id=1224051
* https://bugzilla.suse.com/show_bug.cgi?id=1229013



SUSE-SU-2024:3156-1: low: Security update for python312-pip


# Security update for python312-pip

Announcement ID: SUSE-SU-2024:3156-1
Rating: low
References:

* bsc#1217353

Cross-References:

* CVE-2023-5752

CVSS scores:

* CVE-2023-5752 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-5752 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Affected Products:

* openSUSE Leap 15.6
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for python312-pip fixes the following issues:

* CVE-2023-5752: Avoiding injection of arbitrary configuration through
Mercurial parameter. (bsc#1217353)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3156=1 openSUSE-SLE-15.6-2024-3156=1

* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-3156=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* python312-pip-23.2.1-150600.3.3.1
* Python 3 Module 15-SP6 (noarch)
* python312-pip-23.2.1-150600.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2023-5752.html
* https://bugzilla.suse.com/show_bug.cgi?id=1217353



SUSE-SU-2024:3160-1: important: Security update for postgresql16


# Security update for postgresql16

Announcement ID: SUSE-SU-2024:3160-1
Rating: important
References:

* bsc#1229013

Cross-References:

* CVE-2024-7348

CVSS scores:

* CVE-2024-7348 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for postgresql16 fixes the following issues:

* Upgrade to 14.13 (bsc#1229013)
* CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes
arbitrary SQL. (bsc#1229013)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3160=1 openSUSE-SLE-15.6-2024-3160=1

* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3160=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3160=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* postgresql14-devel-debuginfo-14.13-150600.16.6.1
* postgresql14-plpython-14.13-150600.16.6.1
* postgresql14-plperl-debuginfo-14.13-150600.16.6.1
* postgresql14-14.13-150600.16.6.1
* postgresql14-pltcl-14.13-150600.16.6.1
* postgresql14-contrib-14.13-150600.16.6.1
* postgresql14-llvmjit-14.13-150600.16.6.1
* postgresql14-pltcl-debuginfo-14.13-150600.16.6.1
* postgresql14-server-devel-14.13-150600.16.6.1
* postgresql14-server-devel-debuginfo-14.13-150600.16.6.1
* postgresql14-plpython-debuginfo-14.13-150600.16.6.1
* postgresql14-test-14.13-150600.16.6.1
* postgresql14-llvmjit-devel-14.13-150600.16.6.1
* postgresql14-devel-14.13-150600.16.6.1
* postgresql14-server-14.13-150600.16.6.1
* postgresql14-debuginfo-14.13-150600.16.6.1
* postgresql14-debugsource-14.13-150600.16.6.1
* postgresql14-server-debuginfo-14.13-150600.16.6.1
* postgresql14-plperl-14.13-150600.16.6.1
* postgresql14-contrib-debuginfo-14.13-150600.16.6.1
* postgresql14-llvmjit-debuginfo-14.13-150600.16.6.1
* openSUSE Leap 15.6 (noarch)
* postgresql14-docs-14.13-150600.16.6.1
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* postgresql14-devel-debuginfo-14.13-150600.16.6.1
* postgresql14-devel-14.13-150600.16.6.1
* postgresql14-plpython-14.13-150600.16.6.1
* postgresql14-pltcl-14.13-150600.16.6.1
* postgresql14-server-14.13-150600.16.6.1
* postgresql14-debuginfo-14.13-150600.16.6.1
* postgresql14-contrib-14.13-150600.16.6.1
* postgresql14-debugsource-14.13-150600.16.6.1
* postgresql14-pltcl-debuginfo-14.13-150600.16.6.1
* postgresql14-plpython-debuginfo-14.13-150600.16.6.1
* postgresql14-server-devel-14.13-150600.16.6.1
* postgresql14-server-devel-debuginfo-14.13-150600.16.6.1
* postgresql14-server-debuginfo-14.13-150600.16.6.1
* postgresql14-plperl-debuginfo-14.13-150600.16.6.1
* postgresql14-plperl-14.13-150600.16.6.1
* postgresql14-contrib-debuginfo-14.13-150600.16.6.1
* postgresql14-14.13-150600.16.6.1
* Legacy Module 15-SP6 (noarch)
* postgresql14-docs-14.13-150600.16.6.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* postgresql14-debuginfo-14.13-150600.16.6.1
* postgresql14-llvmjit-14.13-150600.16.6.1
* postgresql14-debugsource-14.13-150600.16.6.1
* postgresql14-llvmjit-debuginfo-14.13-150600.16.6.1
* postgresql14-test-14.13-150600.16.6.1

## References:

* https://www.suse.com/security/cve/CVE-2024-7348.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229013



SUSE-SU-2024:3157-1: important: Security update for MozillaFirefox


# Security update for MozillaFirefox

Announcement ID: SUSE-SU-2024:3157-1
Rating: important
References:

* bsc#1229821

Cross-References:

* CVE-2024-8381
* CVE-2024-8382
* CVE-2024-8383
* CVE-2024-8384
* CVE-2024-8385
* CVE-2024-8386
* CVE-2024-8387

CVSS scores:

* CVE-2024-8381 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-8381 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8382 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-8382 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-8383 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-8383 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-8384 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-8384 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8385 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-8385 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8386 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-8386 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-8387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-8387 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves seven vulnerabilities can now be installed.

## Description:

This update for MozillaFirefox fixes the following issues:

* Update to Firefox Extended Support Release 128.2.0 ESR (bsc#1229821)
* CVE-2024-8381: Type confusion when looking up a property name in a 'with'
block
* CVE-2024-8382: Internal event interfaces were exposed to web content when
browser EventHandler listener callbacks ran
* CVE-2024-8383: Firefox did not ask before openings news: links in an
external application
* CVE-2024-8384: Garbage collection could mis-color cross-compartment objects
in OOM conditions
* CVE-2024-8385: WASM type confusion involving ArrayTypes
* CVE-2024-8386: SelectElements could be shown over another site if popups are
allowed
* CVE-2024-8387: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2,
and Thunderbird 128.2

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3157=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3157=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3157=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3157=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3157=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3157=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3157=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3157=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3157=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3157=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3157=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3157=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3157=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3157=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3157=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3157=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-branding-upstream-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* openSUSE Leap 15.5 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-branding-upstream-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* openSUSE Leap 15.6 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* Desktop Applications Module 15-SP5 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* Desktop Applications Module 15-SP6 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Enterprise Storage 7.1 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1

## References:

* https://www.suse.com/security/cve/CVE-2024-8381.html
* https://www.suse.com/security/cve/CVE-2024-8382.html
* https://www.suse.com/security/cve/CVE-2024-8383.html
* https://www.suse.com/security/cve/CVE-2024-8384.html
* https://www.suse.com/security/cve/CVE-2024-8385.html
* https://www.suse.com/security/cve/CVE-2024-8386.html
* https://www.suse.com/security/cve/CVE-2024-8387.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229821



SUSE-SU-2024:3158-1: important: Security update for postgresql16


# Security update for postgresql16

Announcement ID: SUSE-SU-2024:3158-1
Rating: important
References:

* bsc#1229013

Cross-References:

* CVE-2024-7348

CVSS scores:

* CVE-2024-7348 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for postgresql16 fixes the following issues:

* Upgrade to 15.8 (bsc#1229013)
* CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes
arbitrary SQL. (bsc#1229013)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3158=1 openSUSE-SLE-15.6-2024-3158=1

* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3158=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* postgresql15-llvmjit-15.8-150600.16.6.1
* postgresql15-plperl-debuginfo-15.8-150600.16.6.1
* postgresql15-test-15.8-150600.16.6.1
* postgresql15-devel-debuginfo-15.8-150600.16.6.1
* postgresql15-contrib-15.8-150600.16.6.1
* postgresql15-debuginfo-15.8-150600.16.6.1
* postgresql15-15.8-150600.16.6.1
* postgresql15-llvmjit-devel-15.8-150600.16.6.1
* postgresql15-debugsource-15.8-150600.16.6.1
* postgresql15-plpython-15.8-150600.16.6.1
* postgresql15-server-devel-15.8-150600.16.6.1
* postgresql15-llvmjit-debuginfo-15.8-150600.16.6.1
* postgresql15-server-debuginfo-15.8-150600.16.6.1
* postgresql15-server-devel-debuginfo-15.8-150600.16.6.1
* postgresql15-devel-15.8-150600.16.6.1
* postgresql15-server-15.8-150600.16.6.1
* postgresql15-pltcl-15.8-150600.16.6.1
* postgresql15-contrib-debuginfo-15.8-150600.16.6.1
* postgresql15-pltcl-debuginfo-15.8-150600.16.6.1
* postgresql15-plpython-debuginfo-15.8-150600.16.6.1
* postgresql15-plperl-15.8-150600.16.6.1
* openSUSE Leap 15.6 (noarch)
* postgresql15-docs-15.8-150600.16.6.1
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* postgresql15-debuginfo-15.8-150600.16.6.1
* postgresql15-contrib-debuginfo-15.8-150600.16.6.1
* postgresql15-server-debuginfo-15.8-150600.16.6.1
* postgresql15-15.8-150600.16.6.1
* postgresql15-debugsource-15.8-150600.16.6.1
* postgresql15-server-15.8-150600.16.6.1
* postgresql15-contrib-15.8-150600.16.6.1

## References:

* https://www.suse.com/security/cve/CVE-2024-7348.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229013



SUSE-SU-2024:3162-1: important: Security update for java-1_8_0-ibm


# Security update for java-1_8_0-ibm

Announcement ID: SUSE-SU-2024:3162-1
Rating: important
References:

* bsc#1228046
* bsc#1228047
* bsc#1228048
* bsc#1228050
* bsc#1228051
* bsc#1228052
* bsc#1228346
* bsc#1229224

Cross-References:

* CVE-2024-21131
* CVE-2024-21138
* CVE-2024-21140
* CVE-2024-21144
* CVE-2024-21145
* CVE-2024-21147
* CVE-2024-27267

CVSS scores:

* CVE-2024-21131 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21138 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21140 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21144 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21145 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21147 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-27267 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Legacy Module 15-SP5
* Legacy Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves seven vulnerabilities and has one security fix can now be
installed.

## Description:

This update for java-1_8_0-ibm fixes the following issues:

* Update to Java 8.0 Service Refresh 8 Fix Pack 30 (bsc#1228346)
* CVE-2024-21147: Fixed an array index overflow in RangeCheckElimination.
(bsc#1228052)
* CVE-2024-21145: Fixed an out-of-bounds access in 2D image handling.
(bsc#1228051)
* CVE-2024-21140: Fixed a range check elimination pre-loop limit overflow.
(bsc#1228048)
* CVE-2024-21144: Pack200 increase loading time due to improper header
validation. (bsc#1228050)
* CVE-2024-21138: Fixed an issue where excessive symbol length can lead to
infinite loop. (bsc#1228047)
* CVE-2024-21131: Fixed a potential UTF8 size overflow. (bsc#1228046)
* CVE-2024-27267: Fixed an Object Request Broker (ORB) remote denial of
service. (bsc#1229224)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3162=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3162=1

* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3162=1

* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3162=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3162=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3162=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3162=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3162=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3162=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3162=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3162=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3162=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3162=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3162=1

## Package List:

* openSUSE Leap 15.5 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* openSUSE Leap 15.5 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1
* openSUSE Leap 15.6 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* openSUSE Leap 15.6 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1
* Legacy Module 15-SP5 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* Legacy Module 15-SP5 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* Legacy Module 15-SP5 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* Legacy Module 15-SP6 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* Legacy Module 15-SP6 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* Legacy Module 15-SP6 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Enterprise Storage 7.1 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Enterprise Storage 7.1 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1

## References:

* https://www.suse.com/security/cve/CVE-2024-21131.html
* https://www.suse.com/security/cve/CVE-2024-21138.html
* https://www.suse.com/security/cve/CVE-2024-21140.html
* https://www.suse.com/security/cve/CVE-2024-21144.html
* https://www.suse.com/security/cve/CVE-2024-21145.html
* https://www.suse.com/security/cve/CVE-2024-21147.html
* https://www.suse.com/security/cve/CVE-2024-27267.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228046
* https://bugzilla.suse.com/show_bug.cgi?id=1228047
* https://bugzilla.suse.com/show_bug.cgi?id=1228048
* https://bugzilla.suse.com/show_bug.cgi?id=1228050
* https://bugzilla.suse.com/show_bug.cgi?id=1228051
* https://bugzilla.suse.com/show_bug.cgi?id=1228052
* https://bugzilla.suse.com/show_bug.cgi?id=1228346
* https://bugzilla.suse.com/show_bug.cgi?id=1229224



SUSE-SU-2024:3163-1: moderate: Security update for gradle


# Security update for gradle

Announcement ID: SUSE-SU-2024:3163-1
Rating: moderate
References:

* bsc#1212930

Cross-References:

* CVE-2023-35946

CVSS scores:

* CVE-2023-35946 ( SUSE ): 6.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
* CVE-2023-35946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Affected Products:

* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for gradle fixes the following issues:

* CVE-2023-35946: Fixed a dependency issue leading the cache to write files
into an unintended location. (bsc#1212930)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3163=1

* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3163=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3163=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3163=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* gradle-4.4.1-150200.3.24.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gradle-4.4.1-150200.3.24.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* gradle-4.4.1-150200.3.24.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* gradle-4.4.1-150200.3.24.1

## References:

* https://www.suse.com/security/cve/CVE-2023-35946.html
* https://bugzilla.suse.com/show_bug.cgi?id=1212930



SUSE-SU-2024:3149-1: moderate: Security update for systemd


# Security update for systemd

Announcement ID: SUSE-SU-2024:3149-1
Rating: moderate
References:

* bsc#1218297
* bsc#1221479
* bsc#1226414
* bsc#1228091

Cross-References:

* CVE-2023-7008

CVSS scores:

* CVE-2023-7008 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-7008 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5

An update that solves one vulnerability and has three security fixes can now be
installed.

## Description:

This update for systemd fixes the following issues:

* CVE-2023-7008: Fixed man-in-the-middle due to unsigned name response in
signed zone not refused when DNSSEC=yes (bsc#1218297)

Other fixes: \- Unit: drop ProtectClock=yes from systemd-udevd.service
(bsc#1226414) \- Don't mention any rpm macros inside comments, even if escaped
(bsc#1228091) \- Skip redundant dependencies specified the LSB description that
references the file name of the service itself for early boot scripts
(bsc#1221479).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3149=1

* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3149=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3149=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3149=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3149=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3149=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3149=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3149=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3149=1

* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3149=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* systemd-portable-debuginfo-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* systemd-mini-debuginfo-249.17-150400.8.43.1
* systemd-mini-doc-249.17-150400.8.43.1
* nss-systemd-debuginfo-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-network-debuginfo-249.17-150400.8.43.1
* systemd-mini-249.17-150400.8.43.1
* nss-myhostname-debuginfo-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* systemd-devel-249.17-150400.8.43.1
* systemd-mini-sysvinit-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-doc-249.17-150400.8.43.1
* systemd-mini-container-debuginfo-249.17-150400.8.43.1
* nss-myhostname-249.17-150400.8.43.1
* systemd-testsuite-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* udev-mini-debuginfo-249.17-150400.8.43.1
* systemd-network-249.17-150400.8.43.1
* libsystemd0-mini-249.17-150400.8.43.1
* udev-mini-249.17-150400.8.43.1
* systemd-mini-devel-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-testsuite-249.17-150400.8.43.1
* libudev-mini1-249.17-150400.8.43.1
* systemd-coredump-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* systemd-debugsource-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* libsystemd0-mini-debuginfo-249.17-150400.8.43.1
* systemd-mini-container-249.17-150400.8.43.1
* systemd-mini-debugsource-249.17-150400.8.43.1
* systemd-experimental-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev-mini1-debuginfo-249.17-150400.8.43.1
* systemd-experimental-249.17-150400.8.43.1
* systemd-portable-249.17-150400.8.43.1
* systemd-coredump-debuginfo-249.17-150400.8.43.1
* nss-systemd-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* openSUSE Leap 15.4 (x86_64)
* nss-myhostname-32bit-debuginfo-249.17-150400.8.43.1
* libsystemd0-32bit-249.17-150400.8.43.1
* systemd-32bit-249.17-150400.8.43.1
* systemd-32bit-debuginfo-249.17-150400.8.43.1
* libudev1-32bit-249.17-150400.8.43.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.43.1
* libudev1-32bit-debuginfo-249.17-150400.8.43.1
* nss-myhostname-32bit-249.17-150400.8.43.1
* openSUSE Leap 15.4 (noarch)
* systemd-lang-249.17-150400.8.43.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libudev1-64bit-249.17-150400.8.43.1
* libudev1-64bit-debuginfo-249.17-150400.8.43.1
* systemd-64bit-debuginfo-249.17-150400.8.43.1
* libsystemd0-64bit-249.17-150400.8.43.1
* nss-myhostname-64bit-249.17-150400.8.43.1
* nss-myhostname-64bit-debuginfo-249.17-150400.8.43.1
* systemd-64bit-249.17-150400.8.43.1
* libsystemd0-64bit-debuginfo-249.17-150400.8.43.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* systemd-portable-debuginfo-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* nss-systemd-debuginfo-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-network-debuginfo-249.17-150400.8.43.1
* nss-myhostname-debuginfo-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* systemd-devel-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-doc-249.17-150400.8.43.1
* nss-myhostname-249.17-150400.8.43.1
* systemd-testsuite-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-network-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-testsuite-249.17-150400.8.43.1
* systemd-coredump-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* systemd-debugsource-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* systemd-experimental-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* systemd-experimental-249.17-150400.8.43.1
* systemd-portable-249.17-150400.8.43.1
* systemd-coredump-debuginfo-249.17-150400.8.43.1
* nss-systemd-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* openSUSE Leap 15.5 (x86_64)
* nss-myhostname-32bit-debuginfo-249.17-150400.8.43.1
* libsystemd0-32bit-249.17-150400.8.43.1
* systemd-32bit-249.17-150400.8.43.1
* systemd-32bit-debuginfo-249.17-150400.8.43.1
* libudev1-32bit-249.17-150400.8.43.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.43.1
* libudev1-32bit-debuginfo-249.17-150400.8.43.1
* nss-myhostname-32bit-249.17-150400.8.43.1
* openSUSE Leap 15.5 (noarch)
* systemd-lang-249.17-150400.8.43.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* systemd-devel-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-doc-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-coredump-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-coredump-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* Basesystem Module 15-SP5 (noarch)
* systemd-lang-249.17-150400.8.43.1
* Basesystem Module 15-SP5 (x86_64)
* systemd-32bit-249.17-150400.8.43.1
* libsystemd0-32bit-249.17-150400.8.43.1
* libudev1-32bit-249.17-150400.8.43.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.43.1
* libudev1-32bit-debuginfo-249.17-150400.8.43.1
* systemd-32bit-debuginfo-249.17-150400.8.43.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-network-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* systemd-network-debuginfo-249.17-150400.8.43.1

## References:

* https://www.suse.com/security/cve/CVE-2023-7008.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218297
* https://bugzilla.suse.com/show_bug.cgi?id=1221479
* https://bugzilla.suse.com/show_bug.cgi?id=1226414
* https://bugzilla.suse.com/show_bug.cgi?id=1228091



SUSE-SU-2024:3144-1: important: Security update for hdf5, netcdf, trilinos


# Security update for hdf5, netcdf, trilinos

Announcement ID: SUSE-SU-2024:3144-1
Rating: important
References:

* bsc#1011205
* bsc#1093641
* bsc#1125882
* bsc#1133222
* bsc#1167400
* bsc#1207973
* bsc#1209548
* bsc#1210049
* bsc#1224158

Cross-References:

* CVE-2016-4332
* CVE-2017-17507
* CVE-2018-11202
* CVE-2018-11205
* CVE-2019-8396
* CVE-2020-10812
* CVE-2021-37501
* CVE-2024-29158
* CVE-2024-29161
* CVE-2024-29166
* CVE-2024-32608
* CVE-2024-32610
* CVE-2024-32614
* CVE-2024-32619
* CVE-2024-32620
* CVE-2024-33873
* CVE-2024-33874
* CVE-2024-33875

CVSS scores:

* CVE-2016-4332 ( NVD ): 8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2017-17507 ( SUSE ): 4.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
* CVE-2017-17507 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2018-11202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-11202 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2018-11205 ( SUSE ): 5.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2018-11205 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
* CVE-2019-8396 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2019-8396 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2020-10812 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2020-10812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-37501 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2021-37501 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-29158 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-29161 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-29166 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32608 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32610 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32614 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32619 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32620 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-33873 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-33874 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-33875 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

Affected Products:

* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3

An update that solves 18 vulnerabilities can now be installed.

## Description:

This update for hdf5, netcdf, trilinos fixes the following issues:

hdf5 was updated from version 1.10.8 to 1.10.11:

* Security issues fixed:

* CVE-2019-8396: Fixed problems with malformed HDF5 files where content does
not match expected size. (bsc#1125882)

* CVE-2018-11202: Fixed that a malformed file could result in chunk index
memory leaks. (bsc#1093641)
* CVE-2016-4332: Fixed an assertion in a previous fix for this issue
(bsc#1011205).
* CVE-2020-10812: Fixed a segfault on file close in h5debug which fails with a
core dump on a file that has an illegal file size in its cache image.Fixes
HDFFV-11052, (bsc#1167400).
* CVE-2021-37501: Fixed buffer overflow in hdf5-h5dump (bsc#1207973)
* Other security issues fixed (bsc#1224158):

* CVE-2024-29158, CVE-2024-29161, CVE-2024-29166, CVE-2024-32608,
* CVE-2024-32610, CVE-2024-32614, CVE-2024-32619, CVE-2024-32620,
* CVE-2024-33873, CVE-2024-33874, CVE-2024-33875
* Additionally, these fixes resolve crashes triggered by the reproducers for CVE-2017-17507, CVE-2018-11205. These crashes appear to be unrelated to the original problems
* Other issues fixed:

* Remove timestamp/buildhost/kernel version from libhdf5.settings
(bsc#1209548)

* Changed the error handling for a not found path in the find plugin process.
* Fixed a file space allocation bug in the parallel library for chunked
datasets.
* Fixed an assertion failure in Parallel HDF5 when a file can't be created due
to an invalid library version bounds setting.
* Fixed memory leaks that could occur when reading a dataset from a malformed
file.
* Fixed a bug in H5Ocopy that could generate invalid HDF5 files
* Fixed potential heap buffer overflow in decoding of link info message.
* Fixed potential buffer overrun issues in some object header decode routines.
* Fixed a heap buffer overflow that occurs when reading from a dataset with a
compact layout within a malformed HDF5 file.
* Fixed memory leak when running h5dump with proof of vulnerability file.
* Added option --no-compact-subset to h5diff
* Several improvements to parallel compression feature, including:

* Improved support for collective I/O (for both writes and reads).
* Reduction of copying of application data buffers passed to H5Dwrite.
* Addition of support for incremental file space allocation for filtered datasets created in parallel.
* Addition of support for HDF5's "don't filter partial edge chunks" flag
* Addition of proper support for HDF5 fill values with the feature.
* Addition of 'H5_HAVE_PARALLEL_FILTERED_WRITES' macro toH5pubconf.h so HDF5 applications can determine at compile-time whether the feature is available.
* Addition of simple examples
* h5repack added an optional verbose value for reporting R/W timing.

* Fixed a metadata cache bug when resizing a pinned/protected cache entry.
* Fixed a problem with the H5_VERS_RELEASE check in the H5check_version
function.
* Unified handling of collective metadata reads to correctly fix old bugs.
* Fixed several potential MPI deadlocks in library failure conditions.
* Fixed an issue with collective metadata reads being permanently disabled
after a dataset chunk lookup operation.

netcdf was updated to fix:

* rebuild against new hdf5 library version.

trilinos was updated to fix:

* Rebuild against new hdf5 library version.
* Fix dependency in module file for MPI version of Trilinos to depend on the
correct version of netcdf (bsc#1210049). This prevents the error message:
"Lmod has detected the following error: These module(s) or extension(s)
exist but cannot be loaded as requested: "trilinos"

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3144=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3144=1

## Package List:

* openSUSE Leap 15.3 (noarch)
* hdf5-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150300.4.16.15
* hdf5-gnu-hpc-1.10.11-150300.4.16.15
* netcdf-gnu-openmpi3-hpc-devel-4.7.4-150300.4.7.17
* hdf5-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150300.4.16.15
* netcdf-gnu-mpich-hpc-devel-4.7.4-150300.4.7.19
* netcdf-gnu-openmpi2-hpc-4.7.4-150300.4.7.10
* hdf5-hpc-examples-1.10.11-150300.4.16.15
* adios-gnu-mvapich2-hpc-devel-static-1.13.1-150300.12.4.2
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150300.4.16.15
* netcdf-gnu-hpc-4.7.4-150300.4.7.19
* netcdf-gnu-mvapich2-hpc-devel-4.7.4-150300.4.7.20
* trilinos-gnu-openmpi4-hpc-devel-13.2.0-150300.3.12.18
* adios-gnu-mpich-hpc-devel-static-1.13.1-150300.12.4.2
* netcdf-gnu-hpc-devel-4.7.4-150300.4.7.19
* netcdf-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* adios-gnu-mpich-hpc-devel-1.13.1-150300.12.4.2
* hdf5-gnu-hpc-devel-1.10.11-150300.4.16.15
* adios-gnu-openmpi3-hpc-1.13.1-150300.12.4.2
* adios-gnu-openmpi2-hpc-devel-static-1.13.1-150300.12.4.1
* adios-gnu-openmpi4-hpc-devel-static-1.13.1-150300.12.4.2
* adios-gnu-mvapich2-hpc-devel-1.13.1-150300.12.4.2
* adios-gnu-openmpi2-hpc-1.13.1-150300.12.4.1
* petsc-doc-3.14.5-150300.3.4.3
* trilinos-gnu-openmpi2-hpc-devel-13.2.0-150300.3.12.9
* adios-gnu-mvapich2-hpc-1.13.1-150300.12.4.2
* netcdf-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* netcdf-gnu-openmpi4-hpc-devel-4.7.4-150300.4.7.21
* trilinos-hpc-doc-13.2.0-150300.3.12.9
* trilinos-gnu-mpich-hpc-devel-13.2.0-150300.3.12.18
* adios-gnu-mpich-hpc-1.13.1-150300.12.4.2
* trilinos-gnu-mvapich2-hpc-devel-13.2.0-150300.3.12.18
* netcdf-gnu-mpich-hpc-4.7.4-150300.4.7.19
* adios-gnu-openmpi4-hpc-1.13.1-150300.12.4.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* hdf5-gnu-mpich-hpc-devel-1.10.11-150300.4.16.15
* adios-gnu-openmpi2-hpc-devel-1.13.1-150300.12.4.1
* netcdf-gnu-openmpi2-hpc-devel-4.7.4-150300.4.7.10
* trilinos-gnu-openmpi3-hpc-devel-13.2.0-150300.3.12.16
* adios-gnu-openmpi3-hpc-devel-static-1.13.1-150300.12.4.2
* netcdf-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* trilinos_13_2_0-hpc-doc-13.2.0-150300.3.12.9
* hdf5-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* adios-gnu-openmpi4-hpc-devel-1.13.1-150300.12.4.2
* adios-gnu-openmpi3-hpc-devel-1.13.1-150300.12.4.2
* openSUSE Leap 15.3 (aarch64 ppc64le x86_64 i586)
* petsc_3_14_5-gnu-mpich-hpc-debugsource-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi2-hpc-debuginfo-1.13.1-150300.12.4.1
* adios_1_13_1-gnu-openmpi3-hpc-1.13.1-150300.12.4.2
* libpetsc_3_14_5-gnu-openmpi4-hpc-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-openmpi4-hpc-debugsource-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-openmpi2-hpc-debuginfo-3.14.5-150300.3.4.4
* petsc-gnu-openmpi4-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi3-hpc-devel-1.13.1-150300.12.4.2
* petsc-gnu-mvapich2-hpc-devel-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-mpich-hpc-devel-3.14.5-150300.3.4.4
* petsc-gnu-mpich-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi4-hpc-debugsource-1.13.1-150300.12.4.2
* libpetsc_3_14_5-gnu-mvapich2-hpc-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-openmpi3-hpc-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi4-hpc-devel-static-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-openmpi4-hpc-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mvapich2-hpc-devel-1.13.1-150300.12.4.2
* petsc_3_14_5-gnu-openmpi2-hpc-devel-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-openmpi3-hpc-debugsource-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi4-hpc-devel-1.13.1-150300.12.4.2
* petsc_3_14_5-gnu-openmpi3-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-mvapich2-hpc-1.13.1-150300.12.4.2
* libpetsc-gnu-mpich-hpc-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-mpich-hpc-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-openmpi3-hpc-debuginfo-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-openmpi3-hpc-saws-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi3-hpc-debuginfo-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mpich-hpc-devel-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mpich-hpc-debugsource-1.13.1-150300.12.4.2
* libpetsc-gnu-openmpi3-hpc-3.14.5-150300.3.4.4
* petsc-gnu-openmpi2-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi2-hpc-debugsource-1.13.1-150300.12.4.1
* petsc_3_14_5-gnu-openmpi4-hpc-devel-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-mvapich2-hpc-debugsource-3.14.5-150300.3.4.4
* libpetsc-gnu-openmpi4-hpc-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-mvapich2-hpc-debuginfo-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mpich-hpc-devel-static-1.13.1-150300.12.4.2
* petsc_3_14_5-gnu-openmpi2-hpc-saws-3.14.5-150300.3.4.4
* petsc-gnu-openmpi3-hpc-devel-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-mpich-hpc-debuginfo-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-openmpi2-hpc-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi2-hpc-devel-1.13.1-150300.12.4.1
* adios_1_13_1-gnu-mpich-hpc-debuginfo-1.13.1-150300.12.4.2
* libpetsc_3_14_5-gnu-mvapich2-hpc-debuginfo-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi4-hpc-debuginfo-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-openmpi3-hpc-debugsource-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mpich-hpc-1.13.1-150300.12.4.2
* petsc_3_14_5-gnu-mvapich2-hpc-saws-3.14.5-150300.3.4.4
* libpetsc-gnu-openmpi2-hpc-3.14.5-150300.3.4.4
* libpetsc-gnu-mvapich2-hpc-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi2-hpc-devel-static-1.13.1-150300.12.4.1
* adios_1_13_1-gnu-openmpi3-hpc-devel-static-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mvapich2-hpc-devel-static-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mvapich2-hpc-debugsource-1.13.1-150300.12.4.2
* petsc_3_14_5-gnu-openmpi4-hpc-saws-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-openmpi4-hpc-debuginfo-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-mvapich2-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi2-hpc-1.13.1-150300.12.4.1
* petsc_3_14_5-gnu-mpich-hpc-saws-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-openmpi2-hpc-debugsource-3.14.5-150300.3.4.4
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libnetcdf_4_7_4-gnu-openmpi4-hpc-debuginfo-4.7.4-150300.4.7.21
* netcdf-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-4.7.4-150300.4.7.9
* netcdf-openmpi3-devel-static-4.7.4-150300.4.7.9
* libnetcdf-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* netcdf_4_7_4-gnu-openmpi3-hpc-debugsource-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-hpc-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-openmpi4-hpc-debugsource-4.7.4-150300.4.7.21
* netcdf-openmpi4-4.7.4-150300.4.7.9
* netcdf-openmpi2-4.7.4-150300.4.7.9
* netcdf-devel-data-4.7.4-150300.4.7.9
* libnetcdf_4_7_4-gnu-mpich-hpc-debuginfo-4.7.4-150300.4.7.19
* netcdf-openmpi4-debuginfo-4.7.4-150300.4.7.9
* libnetcdf_4_7_4-gnu-mvapich2-hpc-debuginfo-4.7.4-150300.4.7.20
* libnetcdf-gnu-hpc-4.7.4-150300.4.7.19
* netcdf-openmpi3-debuginfo-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi3-hpc-debuginfo-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi4-hpc-debuginfo-4.7.4-150300.4.7.21
* netcdf-openmpi3-devel-4.7.4-150300.4.7.9
* libnetcdf18-openmpi4-debuginfo-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi2-hpc-devel-static-4.7.4-150300.4.7.10
* libnetcdf18-openmpi4-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi2-hpc-debugsource-4.7.4-150300.4.7.10
* libnetcdf_4_7_4-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi3-hpc-devel-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi4-hpc-devel-static-4.7.4-150300.4.7.21
* netcdf_4_7_4-gnu-mpich-hpc-devel-debuginfo-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-openmpi4-hpc-devel-debuginfo-4.7.4-150300.4.7.21
* libnetcdf18-openmpi3-4.7.4-150300.4.7.9
* libnetcdf-gnu-mpich-hpc-4.7.4-150300.4.7.19
* libnetcdf_4_7_4-gnu-hpc-debuginfo-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-hpc-debuginfo-4.7.4-150300.4.7.19
* libnetcdf-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-mvapich2-hpc-devel-static-4.7.4-150300.4.7.20
* netcdf-openmpi2-debuginfo-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi2-hpc-4.7.4-150300.4.7.10
* netcdf-openmpi4-devel-debuginfo-4.7.4-150300.4.7.9
* libnetcdf_4_7_4-gnu-openmpi2-hpc-4.7.4-150300.4.7.10
* libnetcdf_4_7_4-gnu-openmpi2-hpc-debuginfo-4.7.4-150300.4.7.10
* netcdf_4_7_4-gnu-openmpi2-hpc-devel-4.7.4-150300.4.7.10
* netcdf_4_7_4-gnu-mpich-hpc-devel-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-openmpi2-hpc-debuginfo-4.7.4-150300.4.7.10
* netcdf_4_7_4-gnu-mpich-hpc-devel-static-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* netcdf-openmpi4-devel-static-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-mpich-hpc-debugsource-4.7.4-150300.4.7.19
* netcdf-openmpi3-4.7.4-150300.4.7.9
* netcdf-openmpi3-devel-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi3-debuginfo-4.7.4-150300.4.7.9
* netcdf-openmpi2-devel-debuginfo-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-hpc-devel-static-4.7.4-150300.4.7.19
* libnetcdf18-openmpi2-debuginfo-4.7.4-150300.4.7.9
* netcdf-openmpi3-debugsource-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi3-hpc-devel-debuginfo-4.7.4-150300.4.7.17
* netcdf-devel-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-mvapich2-hpc-debuginfo-4.7.4-150300.4.7.20
* netcdf-devel-debuginfo-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-hpc-devel-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* netcdf-openmpi2-debugsource-4.7.4-150300.4.7.9
* libnetcdf_4_7_4-gnu-hpc-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-mvapich2-hpc-devel-debuginfo-4.7.4-150300.4.7.20
* libnetcdf-gnu-openmpi2-hpc-4.7.4-150300.4.7.10
* netcdf-openmpi4-devel-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-mpich-hpc-debuginfo-4.7.4-150300.4.7.19
* libnetcdf-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* libnetcdf18-openmpi2-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi3-hpc-devel-static-4.7.4-150300.4.7.17
* netcdf-devel-static-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi2-hpc-devel-debuginfo-4.7.4-150300.4.7.10
* libnetcdf_4_7_4-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* netcdf_4_7_4-gnu-hpc-devel-debuginfo-4.7.4-150300.4.7.19
* libnetcdf_4_7_4-gnu-mpich-hpc-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-mpich-hpc-4.7.4-150300.4.7.19
* netcdf-openmpi2-devel-4.7.4-150300.4.7.9
* netcdf-openmpi2-devel-static-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-hpc-debugsource-4.7.4-150300.4.7.19
* netcdf-4.7.4-150300.4.7.9
* netcdf-debugsource-4.7.4-150300.4.7.9
* libnetcdf_4_7_4-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* netcdf_4_7_4-gnu-mvapich2-hpc-debugsource-4.7.4-150300.4.7.20
* netcdf_4_7_4-gnu-mvapich2-hpc-devel-4.7.4-150300.4.7.20
* netcdf-openmpi4-debugsource-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi4-hpc-devel-4.7.4-150300.4.7.21
* libnetcdf18-debuginfo-4.7.4-150300.4.7.9
* libnetcdf_4_7_4-gnu-openmpi3-hpc-debuginfo-4.7.4-150300.4.7.17
* openSUSE Leap 15.3 (x86_64)
* libnetcdf18-openmpi3-32bit-4.7.4-150300.4.7.9
* libnetcdf18-32bit-4.7.4-150300.4.7.9
* libnetcdf18-32bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi2-32bit-4.7.4-150300.4.7.9
* libnetcdf18-openmpi4-32bit-4.7.4-150300.4.7.9
* libnetcdf18-openmpi4-32bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi2-32bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi3-32bit-debuginfo-4.7.4-150300.4.7.9
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-hpc-examples-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* openSUSE Leap 15.3 (aarch64 ppc64le x86_64)
* libtrilinos-gnu-openmpi2-hpc-13.2.0-150300.3.12.9
* libtrilinos_13_2_0-gnu-openmpi3-hpc-debuginfo-13.2.0-150300.3.12.16
* libtrilinos_13_2_0-gnu-mpich-hpc-debuginfo-13.2.0-150300.3.12.18
* libtrilinos_13_2_0-gnu-mpich-hpc-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-mpich-hpc-devel-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-mvapich2-hpc-debugsource-13.2.0-150300.3.12.18
* libtrilinos_13_2_0-gnu-openmpi4-hpc-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-openmpi3-hpc-debugsource-13.2.0-150300.3.12.16
* libtrilinos_13_2_0-gnu-openmpi2-hpc-debuginfo-13.2.0-150300.3.12.9
* libtrilinos_13_2_0-gnu-openmpi3-hpc-13.2.0-150300.3.12.16
* libtrilinos_13_2_0-gnu-openmpi2-hpc-13.2.0-150300.3.12.9
* libtrilinos_13_2_0-gnu-mvapich2-hpc-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-mvapich2-hpc-devel-13.2.0-150300.3.12.18
* libtrilinos-gnu-mvapich2-hpc-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-mpich-hpc-debugsource-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-openmpi2-hpc-debugsource-13.2.0-150300.3.12.9
* libtrilinos_13_2_0-gnu-openmpi4-hpc-debuginfo-13.2.0-150300.3.12.18
* libtrilinos_13_2_0-gnu-mvapich2-hpc-debuginfo-13.2.0-150300.3.12.18
* libtrilinos-gnu-openmpi4-hpc-13.2.0-150300.3.12.18
* libtrilinos-gnu-openmpi3-hpc-13.2.0-150300.3.12.16
* trilinos_13_2_0-gnu-openmpi4-hpc-debugsource-13.2.0-150300.3.12.18
* libtrilinos-gnu-mpich-hpc-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-openmpi2-hpc-devel-13.2.0-150300.3.12.9
* trilinos_13_2_0-gnu-openmpi3-hpc-devel-13.2.0-150300.3.12.16
* trilinos_13_2_0-gnu-openmpi4-hpc-devel-13.2.0-150300.3.12.18
* trilinos_13_2_0-hpc-debugsource-13.2.0-150300.3.12.9
* openSUSE Leap 15.3 (aarch64_ilp32)
* libnetcdf18-64bit-4.7.4-150300.4.7.9
* libnetcdf18-openmpi2-64bit-4.7.4-150300.4.7.9
* libnetcdf18-openmpi2-64bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-64bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi4-64bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi3-64bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi3-64bit-4.7.4-150300.4.7.9
* libnetcdf18-openmpi4-64bit-4.7.4-150300.4.7.9
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* hdf5-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150300.4.16.15
* hdf5-gnu-hpc-1.10.11-150300.4.16.15
* hdf5-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* netcdf-gnu-openmpi3-hpc-devel-4.7.4-150300.4.7.17
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150300.4.16.15
* netcdf-gnu-mpich-hpc-devel-4.7.4-150300.4.7.19
* hdf5-hpc-examples-1.10.11-150300.4.16.15
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150300.4.16.15
* adios-gnu-mvapich2-hpc-devel-static-1.13.1-150300.12.4.2
* netcdf-gnu-hpc-4.7.4-150300.4.7.19
* netcdf-gnu-mvapich2-hpc-devel-4.7.4-150300.4.7.20
* trilinos-gnu-openmpi4-hpc-devel-13.2.0-150300.3.12.18
* adios-gnu-mpich-hpc-devel-static-1.13.1-150300.12.4.2
* netcdf-gnu-hpc-devel-4.7.4-150300.4.7.19
* netcdf-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* adios-gnu-mpich-hpc-devel-1.13.1-150300.12.4.2
* hdf5-gnu-hpc-devel-1.10.11-150300.4.16.15
* adios-gnu-openmpi3-hpc-1.13.1-150300.12.4.2
* adios-gnu-openmpi4-hpc-devel-static-1.13.1-150300.12.4.2
* adios-gnu-mvapich2-hpc-devel-1.13.1-150300.12.4.2
* petsc-doc-3.14.5-150300.3.4.3
* adios-gnu-mvapich2-hpc-1.13.1-150300.12.4.2
* netcdf-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* netcdf-gnu-openmpi4-hpc-devel-4.7.4-150300.4.7.21
* trilinos-hpc-doc-13.2.0-150300.3.12.9
* trilinos-gnu-mpich-hpc-devel-13.2.0-150300.3.12.18
* adios-gnu-mpich-hpc-1.13.1-150300.12.4.2
* trilinos-gnu-mvapich2-hpc-devel-13.2.0-150300.3.12.18
* netcdf-gnu-mpich-hpc-4.7.4-150300.4.7.19
* adios-gnu-openmpi4-hpc-1.13.1-150300.12.4.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* hdf5-gnu-mpich-hpc-devel-1.10.11-150300.4.16.15
* trilinos-gnu-openmpi3-hpc-devel-13.2.0-150300.3.12.16
* adios-gnu-openmpi3-hpc-devel-static-1.13.1-150300.12.4.2
* netcdf-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* trilinos_13_2_0-hpc-doc-13.2.0-150300.3.12.9
* hdf5-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* adios-gnu-openmpi4-hpc-devel-1.13.1-150300.12.4.2
* adios-gnu-openmpi3-hpc-devel-1.13.1-150300.12.4.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-openmpi4-hpc-debuginfo-4.7.4-150300.4.7.21
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150300.4.16.15
* petsc_3_14_5-gnu-openmpi4-hpc-debugsource-3.14.5-150300.3.4.4
* libtrilinos_13_2_0-gnu-mpich-hpc-13.2.0-150300.3.12.18
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libpetsc_3_14_5-gnu-openmpi3-hpc-3.14.5-150300.3.4.4
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libnetcdf-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-openmpi4-hpc-devel-1.13.1-150300.12.4.2
* netcdf_4_7_4-gnu-hpc-4.7.4-150300.4.7.19
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-openmpi3-hpc-debugsource-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi4-hpc-debugsource-4.7.4-150300.4.7.21
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-mpich-hpc-debuginfo-4.7.4-150300.4.7.19
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* petsc_3_14_5-gnu-openmpi4-hpc-devel-3.14.5-150300.3.4.4
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150300.4.16.15
* libnetcdf-gnu-hpc-4.7.4-150300.4.7.19
* libnetcdf_4_7_4-gnu-mvapich2-hpc-debuginfo-4.7.4-150300.4.7.20
* netcdf_4_7_4-gnu-openmpi3-hpc-debuginfo-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi4-hpc-debuginfo-4.7.4-150300.4.7.21
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libtrilinos_13_2_0-gnu-openmpi4-hpc-debuginfo-13.2.0-150300.3.12.18
* libpetsc_3_14_5-gnu-mvapich2-hpc-debuginfo-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi4-hpc-debuginfo-1.13.1-150300.12.4.2
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi3-hpc-devel-4.7.4-150300.4.7.17
* adios_1_13_1-gnu-openmpi3-hpc-devel-static-1.13.1-150300.12.4.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-mvapich2-hpc-debugsource-1.13.1-150300.12.4.2
* petsc_3_14_5-gnu-mvapich2-hpc-devel-3.14.5-150300.3.4.4
* libhdf5_hl-gnu-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-openmpi4-hpc-devel-static-4.7.4-150300.4.7.21
* netcdf_4_7_4-gnu-mpich-hpc-devel-debuginfo-4.7.4-150300.4.7.19
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-openmpi4-hpc-devel-debuginfo-4.7.4-150300.4.7.21
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libnetcdf-gnu-mpich-hpc-4.7.4-150300.4.7.19
* libnetcdf_4_7_4-gnu-hpc-debuginfo-4.7.4-150300.4.7.19
* libtrilinos_13_2_0-gnu-openmpi4-hpc-13.2.0-150300.3.12.18
* libhdf5_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* trilinos_13_2_0-gnu-openmpi3-hpc-debugsource-13.2.0-150300.3.12.16
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libtrilinos_13_2_0-gnu-openmpi3-hpc-13.2.0-150300.3.12.16
* netcdf_4_7_4-gnu-hpc-debuginfo-4.7.4-150300.4.7.19
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libnetcdf-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-openmpi4-hpc-devel-static-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mvapich2-hpc-devel-1.13.1-150300.12.4.2
* netcdf_4_7_4-gnu-mvapich2-hpc-devel-static-4.7.4-150300.4.7.20
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150300.4.16.15
* libpetsc-gnu-mpich-hpc-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-mpich-hpc-3.14.5-150300.3.4.4
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libtrilinos_13_2_0-gnu-mvapich2-hpc-13.2.0-150300.3.12.18
* netcdf_4_7_4-gnu-mpich-hpc-devel-4.7.4-150300.4.7.19
* trilinos_13_2_0-gnu-mvapich2-hpc-devel-13.2.0-150300.3.12.18
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libpetsc-gnu-openmpi4-hpc-3.14.5-150300.3.4.4
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libpetsc_3_14_5-gnu-mpich-hpc-debuginfo-3.14.5-150300.3.4.4
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-mpich-hpc-devel-static-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libtrilinos_13_2_0-gnu-mvapich2-hpc-debuginfo-13.2.0-150300.3.12.18
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-mpich-hpc-debugsource-4.7.4-150300.4.7.19
* libhdf5-gnu-hpc-1.10.11-150300.4.16.15
* libtrilinos-gnu-mpich-hpc-13.2.0-150300.3.12.18
* libhdf5-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-hpc-devel-static-4.7.4-150300.4.7.19
* petsc_3_14_5-gnu-mpich-hpc-debugsource-3.14.5-150300.3.4.4
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-openmpi3-hpc-1.13.1-150300.12.4.2
* libpetsc_3_14_5-gnu-openmpi4-hpc-3.14.5-150300.3.4.4
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libtrilinos_13_2_0-gnu-openmpi3-hpc-debuginfo-13.2.0-150300.3.12.16
* petsc-gnu-openmpi4-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi3-hpc-devel-1.13.1-150300.12.4.2
* trilinos_13_2_0-gnu-mpich-hpc-devel-13.2.0-150300.3.12.18
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-openmpi3-hpc-devel-debuginfo-4.7.4-150300.4.7.17
* petsc-gnu-mvapich2-hpc-devel-3.14.5-150300.3.4.4
* trilinos_13_2_0-gnu-mvapich2-hpc-debugsource-13.2.0-150300.3.12.18
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-mvapich2-hpc-debuginfo-4.7.4-150300.4.7.20
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* petsc_3_14_5-gnu-openmpi3-hpc-debugsource-3.14.5-150300.3.4.4
* libhdf5_cpp-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* petsc_3_14_5-gnu-openmpi3-hpc-devel-3.14.5-150300.3.4.4
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libpetsc_3_14_5-gnu-openmpi3-hpc-debuginfo-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi3-hpc-debuginfo-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mpich-hpc-devel-1.13.1-150300.12.4.2
* netcdf_4_7_4-gnu-hpc-devel-4.7.4-150300.4.7.19
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-mpich-hpc-debugsource-1.13.1-150300.12.4.2
* netcdf_4_7_4-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libpetsc-gnu-openmpi3-hpc-3.14.5-150300.3.4.4
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-hpc-4.7.4-150300.4.7.19
* adios_1_13_1-gnu-mvapich2-hpc-debuginfo-1.13.1-150300.12.4.2
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150300.4.16.15
* hdf5_1_10_11-hpc-examples-1.10.11-150300.4.16.15
* libtrilinos-gnu-mvapich2-hpc-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-mpich-hpc-debugsource-13.2.0-150300.3.12.18
* netcdf_4_7_4-gnu-mvapich2-hpc-devel-debuginfo-4.7.4-150300.4.7.20
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* petsc-gnu-openmpi3-hpc-devel-3.14.5-150300.3.4.4
* netcdf_4_7_4-gnu-mpich-hpc-debuginfo-4.7.4-150300.4.7.19
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-mpich-hpc-debuginfo-1.13.1-150300.12.4.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150300.4.16.15
* libnetcdf-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* netcdf_4_7_4-gnu-openmpi3-hpc-devel-static-4.7.4-150300.4.7.17
* trilinos_13_2_0-gnu-openmpi3-hpc-devel-13.2.0-150300.3.12.16
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* trilinos_13_2_0-gnu-openmpi4-hpc-devel-13.2.0-150300.3.12.18
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libtrilinos_13_2_0-gnu-mpich-hpc-debuginfo-13.2.0-150300.3.12.18
* libhdf5-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* petsc_3_14_5-gnu-mpich-hpc-devel-3.14.5-150300.3.4.4
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* petsc-gnu-mpich-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi4-hpc-debugsource-1.13.1-150300.12.4.2
* libpetsc_3_14_5-gnu-mvapich2-hpc-3.14.5-150300.3.4.4
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-hpc-devel-debuginfo-4.7.4-150300.4.7.19
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-openmpi4-hpc-1.13.1-150300.12.4.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-mpich-hpc-4.7.4-150300.4.7.19
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-mvapich2-hpc-1.13.1-150300.12.4.2
* libpetsc_3_14_5-gnu-openmpi4-hpc-debuginfo-3.14.5-150300.3.4.4
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-mpich-hpc-4.7.4-150300.4.7.19
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150300.4.16.15
* petsc_3_14_5-gnu-mvapich2-hpc-debugsource-3.14.5-150300.3.4.4
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-mpich-hpc-devel-static-1.13.1-150300.12.4.2
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-hpc-debugsource-4.7.4-150300.4.7.19
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-openmpi3-hpc-debugsource-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mpich-hpc-1.13.1-150300.12.4.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-mvapich2-hpc-debugsource-4.7.4-150300.4.7.20
* libpetsc-gnu-mvapich2-hpc-3.14.5-150300.3.4.4
* libtrilinos-gnu-openmpi4-hpc-13.2.0-150300.3.12.18
* libtrilinos-gnu-openmpi3-hpc-13.2.0-150300.3.12.16
* netcdf_4_7_4-gnu-mvapich2-hpc-devel-4.7.4-150300.4.7.20
* adios_1_13_1-gnu-mvapich2-hpc-devel-static-1.13.1-150300.12.4.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-openmpi4-hpc-devel-4.7.4-150300.4.7.21
* trilinos_13_2_0-gnu-openmpi4-hpc-debugsource-13.2.0-150300.3.12.18
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* trilinos_13_2_0-hpc-debugsource-13.2.0-150300.3.12.9
* libnetcdf_4_7_4-gnu-openmpi3-hpc-debuginfo-4.7.4-150300.4.7.17

## References:

* https://www.suse.com/security/cve/CVE-2016-4332.html
* https://www.suse.com/security/cve/CVE-2017-17507.html
* https://www.suse.com/security/cve/CVE-2018-11202.html
* https://www.suse.com/security/cve/CVE-2018-11205.html
* https://www.suse.com/security/cve/CVE-2019-8396.html
* https://www.suse.com/security/cve/CVE-2020-10812.html
* https://www.suse.com/security/cve/CVE-2021-37501.html
* https://www.suse.com/security/cve/CVE-2024-29158.html
* https://www.suse.com/security/cve/CVE-2024-29161.html
* https://www.suse.com/security/cve/CVE-2024-29166.html
* https://www.suse.com/security/cve/CVE-2024-32608.html
* https://www.suse.com/security/cve/CVE-2024-32610.html
* https://www.suse.com/security/cve/CVE-2024-32614.html
* https://www.suse.com/security/cve/CVE-2024-32619.html
* https://www.suse.com/security/cve/CVE-2024-32620.html
* https://www.suse.com/security/cve/CVE-2024-33873.html
* https://www.suse.com/security/cve/CVE-2024-33874.html
* https://www.suse.com/security/cve/CVE-2024-33875.html
* https://bugzilla.suse.com/show_bug.cgi?id=1011205
* https://bugzilla.suse.com/show_bug.cgi?id=1093641
* https://bugzilla.suse.com/show_bug.cgi?id=1125882
* https://bugzilla.suse.com/show_bug.cgi?id=1133222
* https://bugzilla.suse.com/show_bug.cgi?id=1167400
* https://bugzilla.suse.com/show_bug.cgi?id=1207973
* https://bugzilla.suse.com/show_bug.cgi?id=1209548
* https://bugzilla.suse.com/show_bug.cgi?id=1210049
* https://bugzilla.suse.com/show_bug.cgi?id=1224158



SUSE-SU-2024:3140-1: important: Security update for java-1_8_0-openj9


# Security update for java-1_8_0-openj9

Announcement ID: SUSE-SU-2024:3140-1
Rating: important
References:

* bsc#1228046
* bsc#1228047
* bsc#1228048
* bsc#1228050
* bsc#1228051
* bsc#1228052

Cross-References:

* CVE-2024-21131
* CVE-2024-21138
* CVE-2024-21140
* CVE-2024-21144
* CVE-2024-21145
* CVE-2024-21147

CVSS scores:

* CVE-2024-21131 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21138 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21140 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21144 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21145 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21147 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6

An update that solves six vulnerabilities can now be installed.

## Description:

This update for java-1_8_0-openj9 fixes the following issues:

* Update to OpenJDK 8u422 build 05 with OpenJ9 0.46.0 virtual machine
* CVE-2024-21147: Fixed an array index overflow in RangeCheckElimination.
(bsc#1228052)
* CVE-2024-21145: Fixed an out-of-bounds access in 2D image handling.
(bsc#1228051)
* CVE-2024-21140: Fixed a range check elimination pre-loop limit overflow.
(bsc#1228048)
* CVE-2024-21144: Pack200 increase loading time due to improper header
validation. (bsc#1228050)
* CVE-2024-21138: Fixed an issue where excessive symbol length can lead to
infinite loop. (bsc#1228047)
* CVE-2024-21131: Fixed a potential UTF8 size overflow. (bsc#1228046)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3140=1

* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3140=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3140=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3140=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openj9-headless-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-accessibility-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-headless-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-src-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debugsource-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-1.8.0.422-150200.3.48.2
* openSUSE Leap 15.6 (noarch)
* java-1_8_0-openj9-javadoc-1.8.0.422-150200.3.48.2
* SUSE Package Hub 15 15-SP5 (ppc64le s390x)
* java-1_8_0-openj9-headless-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-accessibility-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-headless-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-src-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debugsource-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-1.8.0.422-150200.3.48.2
* SUSE Package Hub 15 15-SP6 (ppc64le s390x)
* java-1_8_0-openj9-headless-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-accessibility-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-headless-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-src-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debugsource-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-1.8.0.422-150200.3.48.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openj9-headless-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-accessibility-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-headless-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-src-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debugsource-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-1.8.0.422-150200.3.48.2
* openSUSE Leap 15.5 (noarch)
* java-1_8_0-openj9-javadoc-1.8.0.422-150200.3.48.2

## References:

* https://www.suse.com/security/cve/CVE-2024-21131.html
* https://www.suse.com/security/cve/CVE-2024-21138.html
* https://www.suse.com/security/cve/CVE-2024-21140.html
* https://www.suse.com/security/cve/CVE-2024-21144.html
* https://www.suse.com/security/cve/CVE-2024-21145.html
* https://www.suse.com/security/cve/CVE-2024-21147.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228046
* https://bugzilla.suse.com/show_bug.cgi?id=1228047
* https://bugzilla.suse.com/show_bug.cgi?id=1228048
* https://bugzilla.suse.com/show_bug.cgi?id=1228050
* https://bugzilla.suse.com/show_bug.cgi?id=1228051
* https://bugzilla.suse.com/show_bug.cgi?id=1228052



SUSE-SU-2024:3139-1: important: Security update for python-Django


# Security update for python-Django

Announcement ID: SUSE-SU-2024:3139-1
Rating: important
References:

* bsc#1229823
* bsc#1229824

Cross-References:

* CVE-2024-45230
* CVE-2024-45231

CVSS scores:

* CVE-2024-45230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45231 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Affected Products:

* openSUSE Leap 15.5

An update that solves two vulnerabilities can now be installed.

## Description:

This update for python-Django fixes the following issues:

* CVE-2024-45230: Fixed potential denial-of-service vulnerability in
django.utils.html.urlize(). (bsc#1229823)
* CVE-2024-45231: Fixed potential user email enumeration via response status
on password reset. (bsc#1229824)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3139=1

## Package List:

* openSUSE Leap 15.5 (noarch)
* python3-Django-2.0.7-150000.1.33.1

## References:

* https://www.suse.com/security/cve/CVE-2024-45230.html
* https://www.suse.com/security/cve/CVE-2024-45231.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229823
* https://bugzilla.suse.com/show_bug.cgi?id=1229824