SUSE 5180 Published by

A number of applications in OpenSUSE Leap and SUSE Linux Enterprise have received security upgrades, including SUSE Manager Client Tools, golang-github-prometheus-prometheus, 389-ds, Linux Kernel, wireshark, gstreamer-plugins-bad, and libopenssl-3-devel-3.1.4-13.1:

SUSE-SU-2024:3267-1: important: Security update for SUSE Manager Client Tools
SUSE-SU-2024:3288-1: important: Security update for golang-github-prometheus-prometheus
SUSE-SU-2024:3257-1: important: Security update for 389-ds
SUSE-SU-2024:3249-1: important: Security update for the Linux Kernel
SUSE-SU-2024:3250-1: moderate: Security update for wireshark
openSUSE-SU-2024:0305-1: important: Security update for gstreamer-plugins-bad
openSUSE-SU-2024:14317-1: moderate: libopenssl-3-devel-3.1.4-13.1 on GA media




SUSE-SU-2024:3267-1: important: Security update for SUSE Manager Client Tools


# Security update for SUSE Manager Client Tools

Announcement ID: SUSE-SU-2024:3267-1
Rating: important
References:

* bsc#1220136
* bsc#1224349
* bsc#1225349
* bsc#1226191
* bsc#1226284
* bsc#1226437
* bsc#1226759
* bsc#1226793
* bsc#1226847
* bsc#1226914
* bsc#1227038
* bsc#1227195
* bsc#1227244
* bsc#1227245
* bsc#1227505
* bsc#1227584
* bsc#1227586
* bsc#1227588
* bsc#1227718
* bsc#1227951
* bsc#1228026
* bsc#1228183
* bsc#1228198
* bsc#1228556
* jsc#MSQA-848
* jsc#PED-3577

Cross-References:

* CVE-2023-45142
* CVE-2024-6104

CVSS scores:

* CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.3
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15
* SUSE Linux Enterprise Desktop 15 SP1
* SUSE Linux Enterprise Desktop 15 SP2
* SUSE Linux Enterprise Desktop 15 SP3
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.0
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP1
* SUSE Linux Enterprise Real Time 15 SP2
* SUSE Linux Enterprise Real Time 15 SP3
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Client Tools for SLE 15
* SUSE Manager Client Tools for SLE Micro 5

An update that solves two vulnerabilities, contains two features and has 22
security fixes can now be installed.

## Description:

This update fixes the following issues:

golang-github-prometheus-prometheus:

* Security issues fixed:

* CVE-2024-6104: Update go-retryablehttp to version 0.7.7 (bsc#1227038)

* CVE-2023-45142: Updated otelhttp to version 0.46.1 (bsc#1228556)

* Require Go > 1.20 for building

* Migrate from `disabled` to `manual` service mode
* Update to 2.45.6 (jsc#PED-3577):
* Security fixes in dependencies
* Update to 2.45.5:
* [BUGFIX] tsdb/agent: ensure that new series get written to WAL on rollback.
* [BUGFIX] Remote write: Avoid a race condition when applying configuration.
* Update to 2.45.4:
* [BUGFIX] Remote read: Release querier resources before encoding the results.
* Update to 2.45.3:
* [BUGFIX] TSDB: Remove double memory snapshot on shutdown.
* Update to 2.45.2:
* [BUGFIX] TSDB: Fix PostingsForMatchers race with creating new series.
* Update to 2.45.1:
* [ENHANCEMENT] Hetzner SD: Support larger ID's that will be used by Hetzner
in September.
* [BUGFIX] Linode SD: Cast InstanceSpec values to int64 to avoid overflows on
386 architecture.
* [BUGFIX] TSDB: Handle TOC parsing failures.

rhnlib:

* Version 5.0.4-0
* Add the old TLS code for very old traditional clients still on python 2.7
(bsc#1228198)

spacecmd:

* Version 5.0.9-0
* Update translation strings

uyuni-tools:

* Version 0.1.21-0
* mgrpxy: Fix typo on Systemd template
* Version 0.1.20-0
* Update the push tag to 5.0.1
* mgrpxy: expose port on IPv6 network (bsc#1227951)
* Version 0.1.19-0
* Skip updating Tomcat remote debug if conf file is not present
* Version 0.1.18-0
* Setup Confidential Computing container during migration (bsc#1227588)
* Add the /etc/uyuni/uyuni-tools.yaml path to the config help
* Split systemd config files to not loose configuration at upgrade
(bsc#1227718)
* Use the same logic for image computation in mgradm and mgrpxy (bsc#1228026)
* Allow building with different Helm and container default registry paths
(bsc#1226191)
* Fix recursion in mgradm upgrade podman list --help
* Setup hub xmlrpc API service in migration to Podman (bsc#1227588)
* Setup disabled hub xmlrpc API service in all cases (bsc#1227584)
* Clean the inspection code to make it faster
* Properly detect IPv6 enabled on Podman network (bsc#1224349)
* Fix the log file path generation
* Write scripts output to uyuni-tools.log file
* Add uyuni-hubxml-rpc to the list of values in mgradm scale --help
* Use path in mgradm support sql file input (bsc#1227505)
* On Ubuntu build with go1.21 instead of go1.20
* Enforce Cobbler setup (bsc#1226847)
* Expose port on IPv6 network (bsc#1227951)
* show output of podman image search --list-tags command
* Implement mgrpxy support config command
* During migration, ignore /etc/sysconfig/tomcat and /etc/tomcat/tomcat.conf
(bsc#1228183)
* During migration, remove java.annotation,com.sun.xml.bind and
UseConcMarkSweepGC settings
* Disable node exporter port for Kubernetes
* Fix start, stop and restart in Kubernetes
* Increase start timeout in Kubernetes
* Fix traefik query
* Fix password entry usability (bsc#1226437)
* Add --prepare option to migrate command
* Fix random error during installation of CA certificate (bsc#1227245)
* Clarify and fix distro name guessing when not provided (bsc#1226284)
* Replace not working Fatal error by plain error return (bsc#1220136)
* Allow server installation with preexisting storage volumes
* Do not report error when purging mounted volume (bsc#1225349)
* Preserve PAGER settings from the host for interactive sql usage
(bsc#1226914)
* Add mgrpxy command to clear the Squid cache
* Use local images for Confidential Computing and Hub containers (bsc#1227586)
* Version 0.1.17-0
* Allow GPG files to be loaded from the local file (bsc#1227195)
* Version 0.1.16-0
* Prefer local images in all migration steps (bsc#1227244)
* Version 0.1.15-0
* Define --registry flag behaviour (bsc#1226793)
* Version 0.1.14-0
* Do not rely on hardcoded registry, remove any FQDN
* Version 0.1.13-0
* Fix mgradm support config tarball creation (bsc#1226759)
* Version 0.1.12-0
* Detection of k8s on Proxy was wrongly influenced by Server setting

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3267=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3267=1

* SUSE Manager Client Tools for SLE 15
zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-3267=1

* SUSE Manager Client Tools for SLE Micro 5
zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-3267=1

## Package List:

* openSUSE Leap 15.5 (noarch)
* spacecmd-5.0.9-150000.3.124.1
* openSUSE Leap 15.6 (noarch)
* spacecmd-5.0.9-150000.3.124.1
* SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64)
* mgrctl-debuginfo-0.1.21-150000.1.8.2
* mgrctl-0.1.21-150000.1.8.2
* firewalld-prometheus-config-0.1-150000.3.56.1
* golang-github-prometheus-prometheus-2.45.6-150000.3.56.1
* SUSE Manager Client Tools for SLE 15 (noarch)
* mgrctl-bash-completion-0.1.21-150000.1.8.2
* python3-rhnlib-5.0.4-150000.3.46.1
* mgrctl-zsh-completion-0.1.21-150000.1.8.2
* mgrctl-lang-0.1.21-150000.1.8.2
* spacecmd-5.0.9-150000.3.124.1
* SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64)
* mgrctl-debuginfo-0.1.21-150000.1.8.2
* mgrctl-0.1.21-150000.1.8.2
* SUSE Manager Client Tools for SLE Micro 5 (noarch)
* mgrctl-bash-completion-0.1.21-150000.1.8.2
* mgrctl-lang-0.1.21-150000.1.8.2
* mgrctl-zsh-completion-0.1.21-150000.1.8.2

## References:

* https://www.suse.com/security/cve/CVE-2023-45142.html
* https://www.suse.com/security/cve/CVE-2024-6104.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220136
* https://bugzilla.suse.com/show_bug.cgi?id=1224349
* https://bugzilla.suse.com/show_bug.cgi?id=1225349
* https://bugzilla.suse.com/show_bug.cgi?id=1226191
* https://bugzilla.suse.com/show_bug.cgi?id=1226284
* https://bugzilla.suse.com/show_bug.cgi?id=1226437
* https://bugzilla.suse.com/show_bug.cgi?id=1226759
* https://bugzilla.suse.com/show_bug.cgi?id=1226793
* https://bugzilla.suse.com/show_bug.cgi?id=1226847
* https://bugzilla.suse.com/show_bug.cgi?id=1226914
* https://bugzilla.suse.com/show_bug.cgi?id=1227038
* https://bugzilla.suse.com/show_bug.cgi?id=1227195
* https://bugzilla.suse.com/show_bug.cgi?id=1227244
* https://bugzilla.suse.com/show_bug.cgi?id=1227245
* https://bugzilla.suse.com/show_bug.cgi?id=1227505
* https://bugzilla.suse.com/show_bug.cgi?id=1227584
* https://bugzilla.suse.com/show_bug.cgi?id=1227586
* https://bugzilla.suse.com/show_bug.cgi?id=1227588
* https://bugzilla.suse.com/show_bug.cgi?id=1227718
* https://bugzilla.suse.com/show_bug.cgi?id=1227951
* https://bugzilla.suse.com/show_bug.cgi?id=1228026
* https://bugzilla.suse.com/show_bug.cgi?id=1228183
* https://bugzilla.suse.com/show_bug.cgi?id=1228198
* https://bugzilla.suse.com/show_bug.cgi?id=1228556
* https://jira.suse.com/browse/MSQA-848
* https://jira.suse.com/browse/PED-3577



SUSE-SU-2024:3288-1: important: Security update for golang-github-prometheus-prometheus


# Security update for golang-github-prometheus-prometheus

Announcement ID: SUSE-SU-2024:3288-1
Rating: important
References:

* bsc#1204023
* bsc#1208298
* bsc#1227038
* bsc#1228556
* jsc#MSQA-848
* jsc#PED-3577
* jsc#PED-5406

Cross-References:

* CVE-2022-41715
* CVE-2022-41723
* CVE-2023-45142
* CVE-2024-6104

CVSS scores:

* CVE-2022-41715 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-41715 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-41723 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-41723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Proxy 4.3 Module 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6

An update that solves four vulnerabilities and contains three features can now
be installed.

## Description:

This update for golang-github-prometheus-prometheus fixes the following issues:

* Require Go > 1.20 for building

* Bump go-retryablehttp to version 0.7.7 (CVE-2024-6104, bsc#1227038)

* Migrate from `disabled` to `manual` service mode
* Add0003-Bump-go-retryablehttp.patch
* Update to 2.45.6 (jsc#PED-3577):
* Security fixes in dependencies
* Update to 2.45.5:
* [BUGFIX] tsdb/agent: ensure that new series get written to WAL on rollback.
* [BUGFIX] Remote write: Avoid a race condition when applying configuration.
* Update to 2.45.4:
* [BUGFIX] Remote read: Release querier resources before encoding the results.
* Update to 2.45.3:
* Security fixes in dependencies
* [BUGFIX] TSDB: Remove double memory snapshot on shutdown.
* Update to 2.45.2:
* Security fixes in dependencies
* [SECURITY] Updated otelhttp to version 0.46.1 (CVE-2023-45142, bsc#1228556)
* [BUGFIX] TSDB: Fix PostingsForMatchers race with creating new series.
* Update to 2.45.1:
* [ENHANCEMENT] Hetzner SD: Support larger ID's that will be used by Hetzner
in September.
* [BUGFIX] Linode SD: Cast InstanceSpec values to int64 to avoid overflows on
386 architecture.
* [BUGFIX] TSDB: Handle TOC parsing failures.

* update to 2.45.0 (jsc#PED-5406):

* [FEATURE] API: New limit parameter to limit the number of items returned by
`/api/v1/status/tsdb` endpoint.
* [FEATURE] Config: Add limits to global config.
* [FEATURE] Consul SD: Added support for `path_prefix`.
* [FEATURE] Native histograms: Add option to scrape both classic and native
histograms.
* [FEATURE] Native histograms: Added support for two more arithmetic operators
`avg_over_time` and `sum_over_time`.
* [FEATURE] Promtool: When providing the block id, only one block will be
loaded and analyzed.
* [FEATURE] Remote-write: New Azure ad configuration to support remote writing
directly to Azure Monitor workspace.
* [FEATURE] TSDB: Samples per chunk are now configurable with flag
`storage.tsdb.samples-per-chunk`. By default set to its former value 120.
* [ENHANCEMENT] Native histograms: bucket size can now be limited to avoid
scrape fails.
* [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL sooner.
* [BUGFIX] Native histograms: ChunkSeries iterator now checks if a new sample
can be appended to the open chunk.
* [BUGFIX] Native histograms: Fix Histogram Appender `Appendable()` segfault.
* [BUGFIX] Native histograms: Fix setting reset header to gauge histograms in
seriesToChunkEncoder.
* [BUGFIX] TSDB: Tombstone intervals are not modified after Get() call.
* [BUGFIX] TSDB: Use path/filepath to set the WAL directory.
* update to 2.44.0:
* [FEATURE] Remote-read: Handle native histograms.
* [FEATURE] Promtool: Health and readiness check of prometheus server in CLI.
* [FEATURE] PromQL: Add `query_samples_total` metric, the total number of
samples loaded by all queries.
* [ENHANCEMENT] Storage: Optimise buffer used to iterate through samples.
* [ENHANCEMENT] Scrape: Reduce memory allocations on target labels.
* [ENHANCEMENT] PromQL: Use faster heap method for `topk()` / `bottomk()`.
* [ENHANCEMENT] Rules API: Allow filtering by rule name.
* [ENHANCEMENT] Native Histograms: Various fixes and improvements.
* [ENHANCEMENT] UI: Search of scraping pools is now case-insensitive.
* [ENHANCEMENT] TSDB: Add an affirmative log message for successful WAL
repair.
* [BUGFIX] TSDB: Block compaction failed when shutting down.
* [BUGFIX] TSDB: Out-of-order chunks could be ignored if the write-behind log
was deleted.
* rebase patch 0001-Do-not-force-the-pure-Go-name-resolver.patch onto v2.44.0
* update to 2.43.1
* [BUGFIX] Labels: Set() after Del() would be ignored, which broke some
relabeling rules.
* update to 2.43.0:
* [FEATURE] Promtool: Add HTTP client configuration to query commands.
* [FEATURE] Scrape: Add `include_scrape_configs` to include scrape configs
from different files.
* [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from proxied requests.
* [FEATURE] HTTP client: Add `proxy_from_enviroment` to read proxies from env
variables.
* [ENHANCEMENT] API: Add support for setting lookback delta per query via the
API.
* [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499 if a request
is canceled.
* [ENHANCEMENT] Scrape: Allow exemplars for all metric types.
* [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders size.
* [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot with index that
is ahead of WAL.
* [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to be more
comprehensible.
* [ENHANCEMENT] UI: Scope `group by` labels to metric in autocompletion.
* [BUGFIX] Scrape: Fix `prometheus_target_scrape_pool_target_limit` metric not
set before reloading.
* [BUGFIX] TSDB: Correctly update `prometheus_tsdb_head_chunks_removed_total`
and `prometheus_tsdb_head_chunks` metrics when reading WAL.
* [BUGFIX] TSDB: Use the correct unit (seconds) when recording out-of-order
append deltas in the `prometheus_tsdb_sample_ooo_delta` metric.
* update to 2.42.0: This release comes with a bunch of feature coverage for
native histograms and breaking changes. If you are trying native histograms
already, we recommend you remove the `wal` directory when upgrading. Because
the old WAL record for native histograms is not backward compatible in
v2.42.0, this will lead to some data loss for the latest data. Additionally,
if you scrape "float histograms" or use recording rules on native histograms
in v2.42.0 (which writes float histograms), it is a one-way street since
older versions do not support float histograms.
* [CHANGE] **breaking** TSDB: Changed WAL record format for the experimental
native histograms.
* [FEATURE] Add 'keep_firing_for' field to alerting rules.
* [FEATURE] Promtool: Add support of selecting timeseries for TSDB dump.
* [ENHANCEMENT] Agent: Native histogram support.
* [ENHANCEMENT] Rules: Support native histograms in recording rules.
* [ENHANCEMENT] SD: Add container ID as a meta label for pod targets for
Kubernetes.
* [ENHANCEMENT] SD: Add VM size label to azure service discovery.
* [ENHANCEMENT] Support native histograms in federation.
* [ENHANCEMENT] TSDB: Add gauge histogram support.
* [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that represents buckets as
float64 values.
* [ENHANCEMENT] UI: Show individual scrape pools on /targets page.
* update to 2.41.0:
* [FEATURE] Relabeling: Add keepequal and dropequal relabel actions.
* [FEATURE] Add support for HTTP proxy headers.
* [ENHANCEMENT] Reload private certificates when changed on disk.
* [ENHANCEMENT] Add max_version to specify maximum TLS version in tls_config.
* [ENHANCEMENT] Add goos and goarch labels to prometheus_build_info.
* [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs.
* [ENHANCEMENT] SD: Add new metric prometheus_sd_file_watcher_errors_total.
* [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling.
* [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in iterators.
* [ENHANCEMENT] TSDB: Optimize postings offset table reading.
* [BUGFIX] Scrape: Validate the metric name, label names, and label values
after relabeling.
* [BUGFIX] Remote Write receiver and rule manager: Fix error handling.
* update to 2.40.7:
* [BUGFIX] TSDB: Fix queries involving negative buckets of native histograms.
* update to 2.40.5:
* [BUGFIX] TSDB: Fix queries involving native histograms due to improper reset
of iterators.
* update to 2.40.3:
* [BUGFIX] TSDB: Fix compaction after a deletion is called.
* update to 2.40.2:
* [BUGFIX] UI: Fix black-on-black metric name color in dark mode.
* update to 2.40.1:
* [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit architecture.
* [BUGFIX] Scrape: Fix accept headers.
* update to 2.40.0:
* [FEATURE] Add experimental support for native histograms. Enable with the
flag --enable-feature=native-histograms.
* [FEATURE] SD: Add service discovery for OVHcloud.
* [ENHANCEMENT] Kubernetes SD: Use protobuf encoding.
* [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved sorting speed.
* [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds
__meta_consul_partition label. Adds partition config in consul_sd_config.
* [BUGFIX] API: Fix API error codes for /api/v1/labels and /api/v1/series.
* update to 2.39.1:
* [BUGFIX] Rules: Fix notifier relabel changing the labels on active alerts.
* update to 2.39.0:
* [FEATURE] experimental TSDB: Add support for ingesting out-of-order samples.
This is configured via out_of_order_time_window field in the config file;
check config file docs for more info.
* [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also respond to a
HEAD request on top of existing GET support.
* [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.
* [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.
* [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region label.
* [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.
* [ENHANCEMENT] TSDB: Improve WAL replay timings.
* [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary data in the
memory.
* [ENHANCEMENT] TSDB: Allow overlapping blocks by default.
\--storage.tsdb.allow-overlapping-blocks now has no effect.
* [ENHANCEMENT] UI: Click to copy label-value pair from query result to
clipboard.
* [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak.
* [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus startup.
* [BUGFIX] PromQL: Properly close file descriptor when logging unfinished
queries.
* [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing
more than desired.
* update to 2.38.0:
* [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint that allows
pretty-formatting PromQL expressions.
* [FEATURE]: UI: Add support for formatting PromQL expressions in the UI.
* [FEATURE]: DNS SD: Support MX records for discovering targets.
* [FEATURE]: Templates: Add toTime() template function that allows converting
sample timestamps to Go time.Time values.
* [ENHANCEMENT]: Kubernetes SD: Add __meta_kubernetes_service_port_number meta
label indicating the service port number.
* [ENHANCEMENT]: Kubernetes SD: Add __meta_kubernetes_pod_container_image meta
label indicating the container image.
* [ENHANCEMENT]: PromQL: When a query panics, also log the query itself
alongside the panic message.
* [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve the contrast
ratio.
* [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding locks and
using atomic types instead.
* [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature flag, which
omits or removes any default HTTP (:80) or HTTPS (:443) ports in the
target's scrape address.
* [BUGFIX]: TSDB: In the WAL watcher metrics, expose the type="exemplar" label
instead of type="unknown" for exemplar records.
* [BUGFIX]: TSDB: Fix race condition around allocating series IDs during chunk
snapshot loading.

* Remove npm_licenses.tar.bz2 during "make clean"

* Remove web-ui archives during "make clean".

* [SECURITY] CVE-2022-41715: Limit memory used by parsing regexps
(bsc#1204023).

* Fix uncontrolled resource consumption by updating Go to version 1.20.1
(CVE-2022-41723, bsc#1208298)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3288=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3288=1

* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3288=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3288=1

* SUSE Manager Proxy 4.3 Module 4.3
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-3288=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-prometheus-2.45.6-150100.4.20.1
* firewalld-prometheus-config-0.1-150100.4.20.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-prometheus-2.45.6-150100.4.20.1
* firewalld-prometheus-config-0.1-150100.4.20.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-prometheus-2.45.6-150100.4.20.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-prometheus-2.45.6-150100.4.20.1
* SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-prometheus-2.45.6-150100.4.20.1

## References:

* https://www.suse.com/security/cve/CVE-2022-41715.html
* https://www.suse.com/security/cve/CVE-2022-41723.html
* https://www.suse.com/security/cve/CVE-2023-45142.html
* https://www.suse.com/security/cve/CVE-2024-6104.html
* https://bugzilla.suse.com/show_bug.cgi?id=1204023
* https://bugzilla.suse.com/show_bug.cgi?id=1208298
* https://bugzilla.suse.com/show_bug.cgi?id=1227038
* https://bugzilla.suse.com/show_bug.cgi?id=1228556
* https://jira.suse.com/browse/MSQA-848
* https://jira.suse.com/browse/PED-3577
* https://jira.suse.com/browse/PED-5406



SUSE-SU-2024:3257-1: important: Security update for 389-ds


# Security update for 389-ds

Announcement ID: SUSE-SU-2024:3257-1
Rating: important
References:

* bsc#1225507
* bsc#1225512
* bsc#1226277

Cross-References:

* CVE-2024-2199
* CVE-2024-3657
* CVE-2024-5953

CVSS scores:

* CVE-2024-2199 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3657 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3657 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-5953 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-5953 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3

An update that solves three vulnerabilities can now be installed.

## Description:

This update for 389-ds fixes the following issues:

* Update to version 1.4.4.20~git3.e7ac6d87:
* CVE-2024-3657: DOS via via specially crafted kerberos AS-REQ request.
(bsc#1225512)
* CVE-2024-5953: Malformed userPassword hashes may cause a denial of service.
(bsc#1226277)
* CVE-2024-2199: Malformed userPassword may cause crash at do_modify in
slapd/modify.c. (bsc#1225507)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3257=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3257=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3257=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3257=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3257=1

## Package List:

* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* libsvrcore0-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-snmp-debuginfo-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* libsvrcore0-debuginfo-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-devel-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-snmp-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-debuginfo-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* lib389-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-debugsource-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libsvrcore0-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* libsvrcore0-debuginfo-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-devel-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-debuginfo-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* lib389-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-debugsource-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libsvrcore0-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* libsvrcore0-debuginfo-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-devel-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-debuginfo-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* lib389-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-debugsource-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libsvrcore0-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* libsvrcore0-debuginfo-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-devel-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-debuginfo-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* lib389-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-debugsource-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libsvrcore0-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* libsvrcore0-debuginfo-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-devel-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-debuginfo-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* lib389-1.4.4.20~git3.e7ac6d87-150300.3.35.1
* 389-ds-debugsource-1.4.4.20~git3.e7ac6d87-150300.3.35.1

## References:

* https://www.suse.com/security/cve/CVE-2024-2199.html
* https://www.suse.com/security/cve/CVE-2024-3657.html
* https://www.suse.com/security/cve/CVE-2024-5953.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225507
* https://bugzilla.suse.com/show_bug.cgi?id=1225512
* https://bugzilla.suse.com/show_bug.cgi?id=1226277



SUSE-SU-2024:3249-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:3249-1
Rating: important
References:

* bsc#1176447
* bsc#1195668
* bsc#1195928
* bsc#1195957
* bsc#1196018
* bsc#1196516
* bsc#1196823
* bsc#1202346
* bsc#1209636
* bsc#1209799
* bsc#1210629
* bsc#1216834
* bsc#1220185
* bsc#1220186
* bsc#1222251
* bsc#1222728
* bsc#1223948
* bsc#1225109
* bsc#1225584
* bsc#1227832
* bsc#1227924
* bsc#1227928
* bsc#1227932
* bsc#1227935
* bsc#1227941
* bsc#1227942
* bsc#1227945
* bsc#1227952
* bsc#1227964
* bsc#1227969
* bsc#1227985
* bsc#1227987
* bsc#1227988
* bsc#1227989
* bsc#1227997
* bsc#1228000
* bsc#1228002
* bsc#1228004
* bsc#1228005
* bsc#1228006
* bsc#1228015
* bsc#1228020
* bsc#1228037
* bsc#1228045
* bsc#1228060
* bsc#1228062
* bsc#1228066
* bsc#1228114
* bsc#1228516
* bsc#1228576
* bsc#1228959
* bsc#1229400
* bsc#1229454
* bsc#1229500
* bsc#1229503
* bsc#1229510
* bsc#1229512
* bsc#1229598
* bsc#1229604
* bsc#1229607
* bsc#1229620
* bsc#1229621
* bsc#1229624
* bsc#1229626
* bsc#1229629
* bsc#1229630
* bsc#1229637
* bsc#1229641
* bsc#1229657
* bsc#1229707

Cross-References:

* CVE-2021-4441
* CVE-2022-0854
* CVE-2022-20368
* CVE-2022-28748
* CVE-2022-2964
* CVE-2022-48686
* CVE-2022-48775
* CVE-2022-48778
* CVE-2022-48787
* CVE-2022-48788
* CVE-2022-48789
* CVE-2022-48790
* CVE-2022-48791
* CVE-2022-48798
* CVE-2022-48802
* CVE-2022-48805
* CVE-2022-48811
* CVE-2022-48823
* CVE-2022-48824
* CVE-2022-48827
* CVE-2022-48834
* CVE-2022-48835
* CVE-2022-48836
* CVE-2022-48837
* CVE-2022-48838
* CVE-2022-48839
* CVE-2022-48843
* CVE-2022-48851
* CVE-2022-48853
* CVE-2022-48856
* CVE-2022-48857
* CVE-2022-48858
* CVE-2022-48872
* CVE-2022-48873
* CVE-2022-48901
* CVE-2022-48905
* CVE-2022-48912
* CVE-2022-48917
* CVE-2022-48919
* CVE-2022-48925
* CVE-2022-48926
* CVE-2022-48928
* CVE-2022-48930
* CVE-2022-48933
* CVE-2022-48934
* CVE-2023-1582
* CVE-2023-2176
* CVE-2023-52854
* CVE-2024-26583
* CVE-2024-26584
* CVE-2024-26800
* CVE-2024-40910
* CVE-2024-41009
* CVE-2024-41011
* CVE-2024-41062
* CVE-2024-42077
* CVE-2024-42232
* CVE-2024-42271
* CVE-2024-43861
* CVE-2024-43882
* CVE-2024-43883
* CVE-2024-44947

CVSS scores:

* CVE-2021-4441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-4441 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-0854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-0854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-20368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-20368 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-28748 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-2964 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-2964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48686 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48775 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48778 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48778 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48787 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48805 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48823 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48834 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-48834 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48836 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48837 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48838 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48843 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48851 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48872 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48872 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48905 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48912 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48912 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48919 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48919 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48925 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1582 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26583 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26583 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26800 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41062 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42232 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42271 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43883 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Manager Proxy 4.2
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Server 4.2

An update that solves 62 vulnerabilities and has eight security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229454).
* CVE-2022-48919: Fix double free race when mount fails in cifs_get_root()
(bsc#1229657).
* CVE-2023-52854: Fix refcnt handling in padata_free_shell() (bsc#1225584).
* CVE-2024-43883: Do not drop references before new references are gained
(bsc#1229707).
* CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
* CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage.
(bsc#1229503)
* CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
* CVE-2022-48872: Fix use-after-free race condition for maps (bsc#1229510).
* CVE-2022-48873: Do not remove map on creater_process and device_release
(bsc#1229512).
* CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
* CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop().
(bsc#1228959)
* CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
* CVE-2022-48686: Fixed UAF when detecting digest errors (bsc#1223948).
* CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).
* CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002)

The following non-security bugs were fixed:

* Bluetooth: L2CAP: Fix deadlock (git-fixes).
* powerpc: Remove support for PowerPC 601 (Remove unused and malformed
assembly causing build error).
* sched/psi: use kernfs polling functions for PSI trigger polling (bsc#1209799
bsc#1225109).
* scsi: pm80xx: Fix TMF task completion race condition (bsc#1228002).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3249=1

* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-3249=1

* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-3249=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3249=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3249=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3249=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3249=1

* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3249=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3249=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3249=1

## Package List:

* openSUSE Leap 15.3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (noarch)
* kernel-source-vanilla-5.3.18-150300.59.174.1
* kernel-docs-html-5.3.18-150300.59.174.1
* kernel-source-5.3.18-150300.59.174.1
* kernel-macros-5.3.18-150300.59.174.1
* kernel-devel-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (nosrc ppc64le x86_64)
* kernel-debug-5.3.18-150300.59.174.1
* kernel-kvmsmall-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (ppc64le x86_64)
* kernel-debug-debugsource-5.3.18-150300.59.174.1
* kernel-debug-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-debug-debuginfo-5.3.18-150300.59.174.1
* kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.174.1
* kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-kvmsmall-debuginfo-5.3.18-150300.59.174.1
* kernel-kvmsmall-devel-5.3.18-150300.59.174.1
* kernel-kvmsmall-debugsource-5.3.18-150300.59.174.1
* kernel-debug-livepatch-devel-5.3.18-150300.59.174.1
* kernel-debug-devel-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-5.3.18-150300.59.174.1
* kernel-default-livepatch-5.3.18-150300.59.174.1
* kernel-default-extra-debuginfo-5.3.18-150300.59.174.1
* kernel-obs-build-5.3.18-150300.59.174.1
* kernel-default-optional-5.3.18-150300.59.174.1
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* kernel-default-livepatch-devel-5.3.18-150300.59.174.1
* gfs2-kmp-default-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-obs-qa-5.3.18-150300.59.174.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.174.1
* cluster-md-kmp-default-5.3.18-150300.59.174.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kselftests-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-extra-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* ocfs2-kmp-default-5.3.18-150300.59.174.1
* kernel-syms-5.3.18-150300.59.174.1
* kernel-default-devel-5.3.18-150300.59.174.1
* kernel-obs-build-debugsource-5.3.18-150300.59.174.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.174.1
* dlm-kmp-default-5.3.18-150300.59.174.1
* kernel-default-optional-debuginfo-5.3.18-150300.59.174.1
* kselftests-kmp-default-5.3.18-150300.59.174.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-base-rebuild-5.3.18-150300.59.174.1.150300.18.103.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_174-default-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_174-default-debuginfo-1-150300.7.3.1
* kernel-livepatch-SLE15-SP3_Update_48-debugsource-1-150300.7.3.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_174-preempt-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_174-preempt-debuginfo-1-150300.7.3.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* kernel-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1
* gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-extra-5.3.18-150300.59.174.1
* kernel-preempt-livepatch-devel-5.3.18-150300.59.174.1
* kernel-preempt-optional-5.3.18-150300.59.174.1
* ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-devel-5.3.18-150300.59.174.1
* gfs2-kmp-preempt-5.3.18-150300.59.174.1
* kselftests-kmp-preempt-5.3.18-150300.59.174.1
* reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.174.1
* dlm-kmp-preempt-5.3.18-150300.59.174.1
* ocfs2-kmp-preempt-5.3.18-150300.59.174.1
* kernel-preempt-optional-debuginfo-5.3.18-150300.59.174.1
* cluster-md-kmp-preempt-5.3.18-150300.59.174.1
* kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-extra-debuginfo-5.3.18-150300.59.174.1
* reiserfs-kmp-preempt-5.3.18-150300.59.174.1
* cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.174.1
* dlm-kmp-preempt-debuginfo-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.174.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (nosrc)
* dtb-aarch64-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (aarch64)
* dtb-socionext-5.3.18-150300.59.174.1
* kernel-64kb-extra-5.3.18-150300.59.174.1
* reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.174.1
* dtb-freescale-5.3.18-150300.59.174.1
* dtb-lg-5.3.18-150300.59.174.1
* kernel-64kb-optional-5.3.18-150300.59.174.1
* dtb-zte-5.3.18-150300.59.174.1
* cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.174.1
* dtb-apm-5.3.18-150300.59.174.1
* dtb-al-5.3.18-150300.59.174.1
* cluster-md-kmp-64kb-5.3.18-150300.59.174.1
* reiserfs-kmp-64kb-5.3.18-150300.59.174.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.174.1
* dtb-renesas-5.3.18-150300.59.174.1
* kernel-64kb-optional-debuginfo-5.3.18-150300.59.174.1
* dtb-exynos-5.3.18-150300.59.174.1
* kselftests-kmp-64kb-5.3.18-150300.59.174.1
* dtb-sprd-5.3.18-150300.59.174.1
* kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.174.1
* dtb-allwinner-5.3.18-150300.59.174.1
* dtb-marvell-5.3.18-150300.59.174.1
* dtb-cavium-5.3.18-150300.59.174.1
* ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.174.1
* dtb-rockchip-5.3.18-150300.59.174.1
* dtb-arm-5.3.18-150300.59.174.1
* gfs2-kmp-64kb-5.3.18-150300.59.174.1
* dlm-kmp-64kb-5.3.18-150300.59.174.1
* dtb-xilinx-5.3.18-150300.59.174.1
* dtb-mediatek-5.3.18-150300.59.174.1
* dtb-amd-5.3.18-150300.59.174.1
* kernel-64kb-extra-debuginfo-5.3.18-150300.59.174.1
* ocfs2-kmp-64kb-5.3.18-150300.59.174.1
* gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.174.1
* kernel-64kb-devel-5.3.18-150300.59.174.1
* dtb-altera-5.3.18-150300.59.174.1
* dtb-broadcom-5.3.18-150300.59.174.1
* dtb-nvidia-5.3.18-150300.59.174.1
* dlm-kmp-64kb-debuginfo-5.3.18-150300.59.174.1
* kernel-64kb-livepatch-devel-5.3.18-150300.59.174.1
* dtb-hisilicon-5.3.18-150300.59.174.1
* kernel-64kb-debugsource-5.3.18-150300.59.174.1
* dtb-qcom-5.3.18-150300.59.174.1
* kernel-64kb-debuginfo-5.3.18-150300.59.174.1
* dtb-amlogic-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-default-livepatch-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* kernel-livepatch-5_3_18-150300_59_174-default-1-150300.7.3.1
* kernel-default-livepatch-devel-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* gfs2-kmp-default-5.3.18-150300.59.174.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.174.1
* dlm-kmp-default-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.174.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.174.1
* cluster-md-kmp-default-5.3.18-150300.59.174.1
* ocfs2-kmp-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-64kb-debugsource-5.3.18-150300.59.174.1
* kernel-64kb-devel-5.3.18-150300.59.174.1
* kernel-64kb-debuginfo-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc
x86_64)
* kernel-preempt-5.3.18-150300.59.174.1
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* kernel-default-devel-5.3.18-150300.59.174.1
* reiserfs-kmp-default-5.3.18-150300.59.174.1
* kernel-obs-build-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-syms-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* kernel-obs-build-5.3.18-150300.59.174.1
* kernel-preempt-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-devel-5.3.18-150300.59.174.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* kernel-source-5.3.18-150300.59.174.1
* kernel-devel-5.3.18-150300.59.174.1
* kernel-macros-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-64kb-debugsource-5.3.18-150300.59.174.1
* kernel-64kb-devel-5.3.18-150300.59.174.1
* kernel-64kb-debuginfo-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* kernel-default-devel-5.3.18-150300.59.174.1
* reiserfs-kmp-default-5.3.18-150300.59.174.1
* kernel-obs-build-debugsource-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* kernel-obs-build-5.3.18-150300.59.174.1
* kernel-syms-5.3.18-150300.59.174.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* kernel-source-5.3.18-150300.59.174.1
* kernel-devel-5.3.18-150300.59.174.1
* kernel-macros-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
* kernel-preempt-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-devel-5.3.18-150300.59.174.1
* kernel-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.174.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* kernel-default-devel-5.3.18-150300.59.174.1
* reiserfs-kmp-default-5.3.18-150300.59.174.1
* kernel-obs-build-debugsource-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* kernel-obs-build-5.3.18-150300.59.174.1
* kernel-syms-5.3.18-150300.59.174.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* kernel-source-5.3.18-150300.59.174.1
* kernel-devel-5.3.18-150300.59.174.1
* kernel-macros-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* kernel-preempt-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-devel-5.3.18-150300.59.174.1
* kernel-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.174.1
* SUSE Enterprise Storage 7.1 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-64kb-debugsource-5.3.18-150300.59.174.1
* kernel-64kb-devel-5.3.18-150300.59.174.1
* kernel-64kb-debuginfo-5.3.18-150300.59.174.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.174.1
* kernel-default-5.3.18-150300.59.174.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* kernel-default-devel-5.3.18-150300.59.174.1
* reiserfs-kmp-default-5.3.18-150300.59.174.1
* kernel-obs-build-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-syms-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* kernel-obs-build-5.3.18-150300.59.174.1
* kernel-preempt-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-devel-5.3.18-150300.59.174.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* SUSE Enterprise Storage 7.1 (noarch)
* kernel-source-5.3.18-150300.59.174.1
* kernel-devel-5.3.18-150300.59.174.1
* kernel-macros-5.3.18-150300.59.174.1
* SUSE Enterprise Storage 7.1 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1

## References:

* https://www.suse.com/security/cve/CVE-2021-4441.html
* https://www.suse.com/security/cve/CVE-2022-0854.html
* https://www.suse.com/security/cve/CVE-2022-20368.html
* https://www.suse.com/security/cve/CVE-2022-28748.html
* https://www.suse.com/security/cve/CVE-2022-2964.html
* https://www.suse.com/security/cve/CVE-2022-48686.html
* https://www.suse.com/security/cve/CVE-2022-48775.html
* https://www.suse.com/security/cve/CVE-2022-48778.html
* https://www.suse.com/security/cve/CVE-2022-48787.html
* https://www.suse.com/security/cve/CVE-2022-48788.html
* https://www.suse.com/security/cve/CVE-2022-48789.html
* https://www.suse.com/security/cve/CVE-2022-48790.html
* https://www.suse.com/security/cve/CVE-2022-48791.html
* https://www.suse.com/security/cve/CVE-2022-48798.html
* https://www.suse.com/security/cve/CVE-2022-48802.html
* https://www.suse.com/security/cve/CVE-2022-48805.html
* https://www.suse.com/security/cve/CVE-2022-48811.html
* https://www.suse.com/security/cve/CVE-2022-48823.html
* https://www.suse.com/security/cve/CVE-2022-48824.html
* https://www.suse.com/security/cve/CVE-2022-48827.html
* https://www.suse.com/security/cve/CVE-2022-48834.html
* https://www.suse.com/security/cve/CVE-2022-48835.html
* https://www.suse.com/security/cve/CVE-2022-48836.html
* https://www.suse.com/security/cve/CVE-2022-48837.html
* https://www.suse.com/security/cve/CVE-2022-48838.html
* https://www.suse.com/security/cve/CVE-2022-48839.html
* https://www.suse.com/security/cve/CVE-2022-48843.html
* https://www.suse.com/security/cve/CVE-2022-48851.html
* https://www.suse.com/security/cve/CVE-2022-48853.html
* https://www.suse.com/security/cve/CVE-2022-48856.html
* https://www.suse.com/security/cve/CVE-2022-48857.html
* https://www.suse.com/security/cve/CVE-2022-48858.html
* https://www.suse.com/security/cve/CVE-2022-48872.html
* https://www.suse.com/security/cve/CVE-2022-48873.html
* https://www.suse.com/security/cve/CVE-2022-48901.html
* https://www.suse.com/security/cve/CVE-2022-48905.html
* https://www.suse.com/security/cve/CVE-2022-48912.html
* https://www.suse.com/security/cve/CVE-2022-48917.html
* https://www.suse.com/security/cve/CVE-2022-48919.html
* https://www.suse.com/security/cve/CVE-2022-48925.html
* https://www.suse.com/security/cve/CVE-2022-48926.html
* https://www.suse.com/security/cve/CVE-2022-48928.html
* https://www.suse.com/security/cve/CVE-2022-48930.html
* https://www.suse.com/security/cve/CVE-2022-48933.html
* https://www.suse.com/security/cve/CVE-2022-48934.html
* https://www.suse.com/security/cve/CVE-2023-1582.html
* https://www.suse.com/security/cve/CVE-2023-2176.html
* https://www.suse.com/security/cve/CVE-2023-52854.html
* https://www.suse.com/security/cve/CVE-2024-26583.html
* https://www.suse.com/security/cve/CVE-2024-26584.html
* https://www.suse.com/security/cve/CVE-2024-26800.html
* https://www.suse.com/security/cve/CVE-2024-40910.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41062.html
* https://www.suse.com/security/cve/CVE-2024-42077.html
* https://www.suse.com/security/cve/CVE-2024-42232.html
* https://www.suse.com/security/cve/CVE-2024-42271.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://www.suse.com/security/cve/CVE-2024-43882.html
* https://www.suse.com/security/cve/CVE-2024-43883.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://bugzilla.suse.com/show_bug.cgi?id=1176447
* https://bugzilla.suse.com/show_bug.cgi?id=1195668
* https://bugzilla.suse.com/show_bug.cgi?id=1195928
* https://bugzilla.suse.com/show_bug.cgi?id=1195957
* https://bugzilla.suse.com/show_bug.cgi?id=1196018
* https://bugzilla.suse.com/show_bug.cgi?id=1196516
* https://bugzilla.suse.com/show_bug.cgi?id=1196823
* https://bugzilla.suse.com/show_bug.cgi?id=1202346
* https://bugzilla.suse.com/show_bug.cgi?id=1209636
* https://bugzilla.suse.com/show_bug.cgi?id=1209799
* https://bugzilla.suse.com/show_bug.cgi?id=1210629
* https://bugzilla.suse.com/show_bug.cgi?id=1216834
* https://bugzilla.suse.com/show_bug.cgi?id=1220185
* https://bugzilla.suse.com/show_bug.cgi?id=1220186
* https://bugzilla.suse.com/show_bug.cgi?id=1222251
* https://bugzilla.suse.com/show_bug.cgi?id=1222728
* https://bugzilla.suse.com/show_bug.cgi?id=1223948
* https://bugzilla.suse.com/show_bug.cgi?id=1225109
* https://bugzilla.suse.com/show_bug.cgi?id=1225584
* https://bugzilla.suse.com/show_bug.cgi?id=1227832
* https://bugzilla.suse.com/show_bug.cgi?id=1227924
* https://bugzilla.suse.com/show_bug.cgi?id=1227928
* https://bugzilla.suse.com/show_bug.cgi?id=1227932
* https://bugzilla.suse.com/show_bug.cgi?id=1227935
* https://bugzilla.suse.com/show_bug.cgi?id=1227941
* https://bugzilla.suse.com/show_bug.cgi?id=1227942
* https://bugzilla.suse.com/show_bug.cgi?id=1227945
* https://bugzilla.suse.com/show_bug.cgi?id=1227952
* https://bugzilla.suse.com/show_bug.cgi?id=1227964
* https://bugzilla.suse.com/show_bug.cgi?id=1227969
* https://bugzilla.suse.com/show_bug.cgi?id=1227985
* https://bugzilla.suse.com/show_bug.cgi?id=1227987
* https://bugzilla.suse.com/show_bug.cgi?id=1227988
* https://bugzilla.suse.com/show_bug.cgi?id=1227989
* https://bugzilla.suse.com/show_bug.cgi?id=1227997
* https://bugzilla.suse.com/show_bug.cgi?id=1228000
* https://bugzilla.suse.com/show_bug.cgi?id=1228002
* https://bugzilla.suse.com/show_bug.cgi?id=1228004
* https://bugzilla.suse.com/show_bug.cgi?id=1228005
* https://bugzilla.suse.com/show_bug.cgi?id=1228006
* https://bugzilla.suse.com/show_bug.cgi?id=1228015
* https://bugzilla.suse.com/show_bug.cgi?id=1228020
* https://bugzilla.suse.com/show_bug.cgi?id=1228037
* https://bugzilla.suse.com/show_bug.cgi?id=1228045
* https://bugzilla.suse.com/show_bug.cgi?id=1228060
* https://bugzilla.suse.com/show_bug.cgi?id=1228062
* https://bugzilla.suse.com/show_bug.cgi?id=1228066
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228516
* https://bugzilla.suse.com/show_bug.cgi?id=1228576
* https://bugzilla.suse.com/show_bug.cgi?id=1228959
* https://bugzilla.suse.com/show_bug.cgi?id=1229400
* https://bugzilla.suse.com/show_bug.cgi?id=1229454
* https://bugzilla.suse.com/show_bug.cgi?id=1229500
* https://bugzilla.suse.com/show_bug.cgi?id=1229503
* https://bugzilla.suse.com/show_bug.cgi?id=1229510
* https://bugzilla.suse.com/show_bug.cgi?id=1229512
* https://bugzilla.suse.com/show_bug.cgi?id=1229598
* https://bugzilla.suse.com/show_bug.cgi?id=1229604
* https://bugzilla.suse.com/show_bug.cgi?id=1229607
* https://bugzilla.suse.com/show_bug.cgi?id=1229620
* https://bugzilla.suse.com/show_bug.cgi?id=1229621
* https://bugzilla.suse.com/show_bug.cgi?id=1229624
* https://bugzilla.suse.com/show_bug.cgi?id=1229626
* https://bugzilla.suse.com/show_bug.cgi?id=1229629
* https://bugzilla.suse.com/show_bug.cgi?id=1229630
* https://bugzilla.suse.com/show_bug.cgi?id=1229637
* https://bugzilla.suse.com/show_bug.cgi?id=1229641
* https://bugzilla.suse.com/show_bug.cgi?id=1229657
* https://bugzilla.suse.com/show_bug.cgi?id=1229707



SUSE-SU-2024:3250-1: moderate: Security update for wireshark


# Security update for wireshark

Announcement ID: SUSE-SU-2024:3250-1
Rating: moderate
References:

* bsc#1229907
* bsc#1230372

Cross-References:

* CVE-2024-8250
* CVE-2024-8645

CVSS scores:

* CVE-2024-8250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-8250 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-8645 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-8645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-8645 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves two vulnerabilities can now be installed.

## Description:

This update for wireshark fixes the following issues:

* CVE-2024-8250: Fixed NTLMSSP dissector crash (bsc#1229907).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3250=1 openSUSE-SLE-15.6-2024-3250=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3250=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3250=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libwiretap14-debuginfo-4.2.7-150600.18.11.1
* libwireshark17-debuginfo-4.2.7-150600.18.11.1
* libwsutil15-debuginfo-4.2.7-150600.18.11.1
* libwsutil15-4.2.7-150600.18.11.1
* wireshark-debuginfo-4.2.7-150600.18.11.1
* wireshark-debugsource-4.2.7-150600.18.11.1
* libwireshark17-4.2.7-150600.18.11.1
* wireshark-devel-4.2.7-150600.18.11.1
* wireshark-4.2.7-150600.18.11.1
* libwiretap14-4.2.7-150600.18.11.1
* wireshark-ui-qt-debuginfo-4.2.7-150600.18.11.1
* wireshark-ui-qt-4.2.7-150600.18.11.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libwiretap14-debuginfo-4.2.7-150600.18.11.1
* libwireshark17-debuginfo-4.2.7-150600.18.11.1
* libwsutil15-debuginfo-4.2.7-150600.18.11.1
* libwsutil15-4.2.7-150600.18.11.1
* wireshark-debuginfo-4.2.7-150600.18.11.1
* wireshark-debugsource-4.2.7-150600.18.11.1
* libwireshark17-4.2.7-150600.18.11.1
* wireshark-4.2.7-150600.18.11.1
* libwiretap14-4.2.7-150600.18.11.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* wireshark-debuginfo-4.2.7-150600.18.11.1
* wireshark-debugsource-4.2.7-150600.18.11.1
* wireshark-devel-4.2.7-150600.18.11.1
* wireshark-ui-qt-debuginfo-4.2.7-150600.18.11.1
* wireshark-ui-qt-4.2.7-150600.18.11.1

## References:

* https://www.suse.com/security/cve/CVE-2024-8250.html
* https://www.suse.com/security/cve/CVE-2024-8645.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229907
* https://bugzilla.suse.com/show_bug.cgi?id=1230372



openSUSE-SU-2024:0305-1: important: Security update for gstreamer-plugins-bad


openSUSE Security Update: Security update for gstreamer-plugins-bad
_______________________________

Announcement ID: openSUSE-SU-2024:0305-1
Rating: important
References: #1215792 #1217211 #1217213 #1218534 #1223263

Cross-References: CVE-2023-40475 CVE-2023-44429 CVE-2023-44446
CVE-2023-50186
CVSS scores:
CVE-2023-40475 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-44429 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-44446 (SUSE): 8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVE-2023-50186 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:
openSUSE Leap 15.5
_______________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for gstreamer-plugins-bad fixes the following issues:

Adding references for already fixed vulnerability:

- CVE-2023-50186: Fixed heap-based buffer overflow in the AV1 codec parser
(ZDI-CAN-22300, bsc#1218534, bsc#1223263)
- CVE-2023-40475: Fixed GStreamer MXF File Parsing Integer Overflow
(bsc#1215792).
- CVE-2023-44446: Fixed GStreamer MXF File Parsing Use-After-Free
(bsc#1217213).
- CVE-2023-44429: Fixed GStreamer AV1 Codec Parsing Heap-based Buffer
Overflow (bsc#1217211).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.5:

zypper in -t patch openSUSE-2024-305=1

Package List:

- openSUSE Leap 15.5 (aarch64 i586 ppc64le s390x x86_64):

gstreamer-plugins-bad-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-chromaprint-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-chromaprint-debuginfo-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-debuginfo-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-debugsource-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-devel-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-fluidsynth-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-fluidsynth-debuginfo-1.22.0-lp155.3.10.1
gstreamer-transcoder-1.22.0-lp155.3.10.1
gstreamer-transcoder-debuginfo-1.22.0-lp155.3.10.1
gstreamer-transcoder-devel-1.22.0-lp155.3.10.1
libgstadaptivedemux-1_0-0-1.22.0-lp155.3.10.1
libgstadaptivedemux-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstbadaudio-1_0-0-1.22.0-lp155.3.10.1
libgstbadaudio-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstbasecamerabinsrc-1_0-0-1.22.0-lp155.3.10.1
libgstbasecamerabinsrc-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstcodecparsers-1_0-0-1.22.0-lp155.3.10.1
libgstcodecparsers-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstcodecs-1_0-0-1.22.0-lp155.3.10.1
libgstcodecs-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstcuda-1_0-0-1.22.0-lp155.3.10.1
libgstcuda-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstinsertbin-1_0-0-1.22.0-lp155.3.10.1
libgstinsertbin-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstisoff-1_0-0-1.22.0-lp155.3.10.1
libgstisoff-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstmpegts-1_0-0-1.22.0-lp155.3.10.1
libgstmpegts-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstphotography-1_0-0-1.22.0-lp155.3.10.1
libgstphotography-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstplay-1_0-0-1.22.0-lp155.3.10.1
libgstplay-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstplayer-1_0-0-1.22.0-lp155.3.10.1
libgstplayer-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstsctp-1_0-0-1.22.0-lp155.3.10.1
libgstsctp-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgsttranscoder-1_0-0-1.22.0-lp155.3.10.1
libgsttranscoder-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgsturidownloader-1_0-0-1.22.0-lp155.3.10.1
libgsturidownloader-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstva-1_0-0-1.22.0-lp155.3.10.1
libgstva-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstvulkan-1_0-0-1.22.0-lp155.3.10.1
libgstvulkan-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstwayland-1_0-0-1.22.0-lp155.3.10.1
libgstwayland-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstwebrtc-1_0-0-1.22.0-lp155.3.10.1
libgstwebrtc-1_0-0-debuginfo-1.22.0-lp155.3.10.1
libgstwebrtcnice-1_0-0-1.22.0-lp155.3.10.1
libgstwebrtcnice-1_0-0-debuginfo-1.22.0-lp155.3.10.1
typelib-1_0-CudaGst-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstBadAudio-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstCodecs-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstCuda-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstInsertBin-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstMpegts-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstPlay-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstPlayer-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstTranscoder-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstVa-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstVulkan-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstVulkanWayland-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstVulkanXCB-1_0-1.22.0-lp155.3.10.1
typelib-1_0-GstWebRTC-1_0-1.22.0-lp155.3.10.1

- openSUSE Leap 15.5 (aarch64_ilp32):

gstreamer-plugins-bad-64bit-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-64bit-debuginfo-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-chromaprint-64bit-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-chromaprint-64bit-debuginfo-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-fluidsynth-64bit-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-fluidsynth-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstadaptivedemux-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstadaptivedemux-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstbadaudio-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstbadaudio-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstbasecamerabinsrc-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstbasecamerabinsrc-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstcodecparsers-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstcodecparsers-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstcodecs-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstcodecs-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstcuda-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstcuda-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstinsertbin-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstinsertbin-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstisoff-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstisoff-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstmpegts-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstmpegts-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstphotography-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstphotography-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstplay-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstplay-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstplayer-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstplayer-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstsctp-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstsctp-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgsturidownloader-1_0-0-64bit-1.22.0-lp155.3.10.1
libgsturidownloader-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstva-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstva-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstvulkan-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstvulkan-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstwayland-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstwayland-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstwebrtc-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstwebrtc-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1
libgstwebrtcnice-1_0-0-64bit-1.22.0-lp155.3.10.1
libgstwebrtcnice-1_0-0-64bit-debuginfo-1.22.0-lp155.3.10.1

- openSUSE Leap 15.5 (noarch):

gstreamer-plugins-bad-lang-1.22.0-lp155.3.10.1

- openSUSE Leap 15.5 (x86_64):

gstreamer-plugins-bad-32bit-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-32bit-debuginfo-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-chromaprint-32bit-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-chromaprint-32bit-debuginfo-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-fluidsynth-32bit-1.22.0-lp155.3.10.1
gstreamer-plugins-bad-fluidsynth-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstadaptivedemux-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstadaptivedemux-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstbadaudio-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstbadaudio-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstbasecamerabinsrc-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstbasecamerabinsrc-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstcodecparsers-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstcodecparsers-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstcodecs-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstcodecs-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstcuda-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstcuda-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstinsertbin-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstinsertbin-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstisoff-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstisoff-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstmpegts-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstmpegts-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstphotography-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstphotography-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstplay-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstplay-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstplayer-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstplayer-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstsctp-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstsctp-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgsturidownloader-1_0-0-32bit-1.22.0-lp155.3.10.1
libgsturidownloader-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstva-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstva-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstvulkan-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstvulkan-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstwayland-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstwayland-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstwebrtc-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstwebrtc-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1
libgstwebrtcnice-1_0-0-32bit-1.22.0-lp155.3.10.1
libgstwebrtcnice-1_0-0-32bit-debuginfo-1.22.0-lp155.3.10.1

References:

https://www.suse.com/security/cve/CVE-2023-40475.html
https://www.suse.com/security/cve/CVE-2023-44429.html
https://www.suse.com/security/cve/CVE-2023-44446.html
https://www.suse.com/security/cve/CVE-2023-50186.html
https://bugzilla.suse.com/1215792
https://bugzilla.suse.com/1217211
https://bugzilla.suse.com/1217213
https://bugzilla.suse.com/1218534
https://bugzilla.suse.com/1223263



openSUSE-SU-2024:14317-1: moderate: libopenssl-3-devel-3.1.4-13.1 on GA media


# libopenssl-3-devel-3.1.4-13.1 on GA media

Announcement ID: openSUSE-SU-2024:14317-1
Rating: moderate

Cross-References:

* CVE-2024-6119

CVSS scores:

* CVE-2024-6119 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6119 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the libopenssl-3-devel-3.1.4-13.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libopenssl-3-devel 3.1.4-13.1
* libopenssl-3-devel-32bit 3.1.4-13.1
* libopenssl-3-fips-provider 3.1.4-13.1
* libopenssl-3-fips-provider-32bit 3.1.4-13.1
* libopenssl-3-fips-provider-x86-64-v3 3.1.4-13.1
* libopenssl3 3.1.4-13.1
* libopenssl3-32bit 3.1.4-13.1
* libopenssl3-x86-64-v3 3.1.4-13.1
* openssl-3 3.1.4-13.1
* openssl-3-doc 3.1.4-13.1

## References:

* https://www.suse.com/security/cve/CVE-2024-6119.html