SUSE-SU-2024:0819-1: important: Security update for wpa_supplicant
SUSE-SU-2024:0831-1: moderate: Security update for openssl-1_0_0
SUSE-SU-2024:0815-1: moderate: Security update for openssl-3
SUSE-SU-2024:0833-1: moderate: Security update for openssl-1_1
SUSE-SU-2024:0812-1: important: Security update for go1.22
SUSE-SU-2024:0808-1: important: Security update for xmlgraphics-batik
SUSE-SU-2024:0793-1: important: Security update for gstreamer-plugins-bad
SUSE-SU-2024:0794-1: important: Security update for sudo
openSUSE-SU-2024:0077-1: important: Security update for python-Django
openSUSE-SU-2024:0080-1: important: Security update for python-Django1
SUSE-SU-2024:0819-1: important: Security update for wpa_supplicant
# Security update for wpa_supplicant
Announcement ID: SUSE-SU-2024:0819-1
Rating: important
References:
* bsc#1219975
Cross-References:
* CVE-2023-52160
CVSS scores:
* CVE-2023-52160 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52160 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for wpa_supplicant fixes the following issues:
* CVE-2023-52160: Bypassing WiFi Authentication (bsc#1219975).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-819=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-819=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-819=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-819=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-819=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-819=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-819=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-819=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-819=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-819=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-819=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-819=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-819=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-819=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-819=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-819=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-819=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-819=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-819=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-819=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-819=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-819=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-819=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-819=1
## Package List:
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Manager Proxy 4.3 (x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* wpa_supplicant-2.9-150000.4.39.1
* wpa_supplicant-debuginfo-2.9-150000.4.39.1
* wpa_supplicant-debugsource-2.9-150000.4.39.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52160.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219975
SUSE-SU-2024:0831-1: moderate: Security update for openssl-1_0_0
# Security update for openssl-1_0_0
Announcement ID: SUSE-SU-2024:0831-1
Rating: moderate
References:
* bsc#1219243
Cross-References:
* CVE-2024-0727
CVSS scores:
* CVE-2024-0727 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-0727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Legacy Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-1_0_0 fixes the following issues:
* CVE-2024-0727: Denial of service when processing a maliciously formatted
PKCS12 file (bsc#1219243).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-831=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-831=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-831=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-831=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-831=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-831=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-831=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-831=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-831=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-831=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-831=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-831=1
## Package List:
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libopenssl1_0_0-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.91.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.91.1
* openssl-1_0_0-1.0.2p-150000.3.91.1
* libopenssl10-debuginfo-1.0.2p-150000.3.91.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl10-1.0.2p-150000.3.91.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libopenssl1_0_0-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.91.1
* openssl-1_0_0-1.0.2p-150000.3.91.1
* libopenssl10-debuginfo-1.0.2p-150000.3.91.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl10-1.0.2p-150000.3.91.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libopenssl1_0_0-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.91.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.91.1
* openssl-1_0_0-1.0.2p-150000.3.91.1
* libopenssl10-debuginfo-1.0.2p-150000.3.91.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl10-1.0.2p-150000.3.91.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libopenssl1_0_0-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.91.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.91.1
* openssl-1_0_0-1.0.2p-150000.3.91.1
* libopenssl10-debuginfo-1.0.2p-150000.3.91.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl10-1.0.2p-150000.3.91.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libopenssl1_0_0-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.91.1
* openssl-1_0_0-1.0.2p-150000.3.91.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.91.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libopenssl1_0_0-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.91.1
* openssl-1_0_0-1.0.2p-150000.3.91.1
* libopenssl10-debuginfo-1.0.2p-150000.3.91.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl10-1.0.2p-150000.3.91.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libopenssl1_0_0-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.91.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.91.1
* openssl-1_0_0-1.0.2p-150000.3.91.1
* libopenssl10-debuginfo-1.0.2p-150000.3.91.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl10-1.0.2p-150000.3.91.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libopenssl1_0_0-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.91.1
* openssl-1_0_0-1.0.2p-150000.3.91.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.91.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libopenssl1_0_0-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.91.1
* openssl-1_0_0-1.0.2p-150000.3.91.1
* libopenssl10-debuginfo-1.0.2p-150000.3.91.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl10-1.0.2p-150000.3.91.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libopenssl1_0_0-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.91.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.91.1
* openssl-1_0_0-1.0.2p-150000.3.91.1
* libopenssl10-debuginfo-1.0.2p-150000.3.91.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl10-1.0.2p-150000.3.91.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libopenssl1_0_0-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.91.1
* openssl-1_0_0-1.0.2p-150000.3.91.1
* libopenssl10-debuginfo-1.0.2p-150000.3.91.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl10-1.0.2p-150000.3.91.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libopenssl1_0_0-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1
* libopenssl1_0_0-steam-debuginfo-1.0.2p-150000.3.91.1
* openssl-1_0_0-cavs-1.0.2p-150000.3.91.1
* openssl-1_0_0-cavs-debuginfo-1.0.2p-150000.3.91.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.91.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.91.1
* libopenssl1_0_0-steam-1.0.2p-150000.3.91.1
* openssl-1_0_0-1.0.2p-150000.3.91.1
* libopenssl10-debuginfo-1.0.2p-150000.3.91.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.91.1
* libopenssl10-1.0.2p-150000.3.91.1
* openSUSE Leap 15.5 (x86_64)
* libopenssl1_0_0-32bit-debuginfo-1.0.2p-150000.3.91.1
* libopenssl1_0_0-32bit-1.0.2p-150000.3.91.1
* libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.91.1
* libopenssl1_0_0-steam-32bit-debuginfo-1.0.2p-150000.3.91.1
* libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.91.1
* libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.91.1
* openSUSE Leap 15.5 (noarch)
* openssl-1_0_0-doc-1.0.2p-150000.3.91.1
## References:
* https://www.suse.com/security/cve/CVE-2024-0727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219243
SUSE-SU-2024:0815-1: moderate: Security update for openssl-3
# Security update for openssl-3
Announcement ID: SUSE-SU-2024:0815-1
Rating: moderate
References:
* bsc#1219243
Cross-References:
* CVE-2024-0727
CVSS scores:
* CVE-2024-0727 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-0727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-3 fixes the following issues:
* CVE-2024-0727: Denial of service when processing a maliciously formatted
PKCS12 file (bsc#1219243).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-815=1 openSUSE-SLE-15.5-2024-815=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-815=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* openssl-3-3.0.8-150500.5.27.1
* openssl-3-debuginfo-3.0.8-150500.5.27.1
* libopenssl3-3.0.8-150500.5.27.1
* libopenssl-3-devel-3.0.8-150500.5.27.1
* openssl-3-debugsource-3.0.8-150500.5.27.1
* libopenssl3-debuginfo-3.0.8-150500.5.27.1
* openSUSE Leap 15.5 (x86_64)
* libopenssl3-32bit-debuginfo-3.0.8-150500.5.27.1
* libopenssl3-32bit-3.0.8-150500.5.27.1
* libopenssl-3-devel-32bit-3.0.8-150500.5.27.1
* openSUSE Leap 15.5 (noarch)
* openssl-3-doc-3.0.8-150500.5.27.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libopenssl3-64bit-3.0.8-150500.5.27.1
* libopenssl3-64bit-debuginfo-3.0.8-150500.5.27.1
* libopenssl-3-devel-64bit-3.0.8-150500.5.27.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* openssl-3-3.0.8-150500.5.27.1
* openssl-3-debuginfo-3.0.8-150500.5.27.1
* libopenssl3-3.0.8-150500.5.27.1
* libopenssl-3-devel-3.0.8-150500.5.27.1
* openssl-3-debugsource-3.0.8-150500.5.27.1
* libopenssl3-debuginfo-3.0.8-150500.5.27.1
## References:
* https://www.suse.com/security/cve/CVE-2024-0727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219243
SUSE-SU-2024:0833-1: moderate: Security update for openssl-1_1
# Security update for openssl-1_1
Announcement ID: SUSE-SU-2024:0833-1
Rating: moderate
References:
* bsc#1219243
Cross-References:
* CVE-2024-0727
CVSS scores:
* CVE-2024-0727 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-0727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-1_1 fixes the following issues:
* CVE-2024-0727: Denial of service when processing a maliciously formatted
PKCS12 file (bsc#1219243).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-833=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-833=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-833=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-833=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-833=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-833=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-833=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-833=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-833=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-833=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-833=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-833=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-833=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-833=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-833=1
## Package List:
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* SUSE Manager Server 4.3 (x86_64)
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.63.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* openSUSE Leap 15.4 (x86_64)
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.63.1
* openSUSE Leap 15.4 (noarch)
* openssl-1_1-doc-1.1.1l-150400.7.63.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libopenssl1_1-hmac-64bit-1.1.1l-150400.7.63.1
* libopenssl1_1-64bit-1.1.1l-150400.7.63.1
* libopenssl1_1-64bit-debuginfo-1.1.1l-150400.7.63.1
* libopenssl-1_1-devel-64bit-1.1.1l-150400.7.63.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.63.1
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.63.1
* SUSE Manager Proxy 4.3 (x86_64)
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.63.1
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.63.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.63.1
* libopenssl-1_1-devel-1.1.1l-150400.7.63.1
* libopenssl1_1-1.1.1l-150400.7.63.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-1.1.1l-150400.7.63.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.63.1
* openssl-1_1-debugsource-1.1.1l-150400.7.63.1
* openssl-1_1-1.1.1l-150400.7.63.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.63.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.63.1
## References:
* https://www.suse.com/security/cve/CVE-2024-0727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219243
SUSE-SU-2024:0812-1: important: Security update for go1.22
# Security update for go1.22
Announcement ID: SUSE-SU-2024:0812-1
Rating: important
References:
* bsc#1218424
* bsc#1219988
* bsc#1220999
* bsc#1221000
* bsc#1221001
* bsc#1221002
* bsc#1221003
Cross-References:
* CVE-2023-45289
* CVE-2023-45290
* CVE-2024-24783
* CVE-2024-24784
* CVE-2024-24785
CVSS scores:
* CVE-2023-45289 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-45290 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24783 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24784 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-24785 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves five vulnerabilities and has two security fixes can now be
installed.
## Description:
This update for go1.22 fixes the following issues:
* Upgrade go to version 1.22.1
* CVE-2023-45289: net/http, net/http/cookiejar: incorrect forwarding of
sensitive headers and cookies on HTTP redirect (bsc#1221000)
* CVE-2023-45290: net/http: memory exhaustion in Request.ParseMultipartForm
(bsc#1221001)
* CVE-2024-24783: crypto/x509: Verify panics on certificates with an unknown
public key algorithm (bsc#1220999)
* CVE-2024-24784: net/mail: comments in display names are incorrectly handled
(bsc#1221002)
* CVE-2024-24785: html/template: errors returned from MarshalJSON methods may
break template escaping (bsc#1221003)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-812=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-812=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.22-1.22.1-150000.1.9.1
* go1.22-doc-1.22.1-150000.1.9.1
* go1.22-race-1.22.1-150000.1.9.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.22-1.22.1-150000.1.9.1
* go1.22-doc-1.22.1-150000.1.9.1
* go1.22-race-1.22.1-150000.1.9.1
## References:
* https://www.suse.com/security/cve/CVE-2023-45289.html
* https://www.suse.com/security/cve/CVE-2023-45290.html
* https://www.suse.com/security/cve/CVE-2024-24783.html
* https://www.suse.com/security/cve/CVE-2024-24784.html
* https://www.suse.com/security/cve/CVE-2024-24785.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218424
* https://bugzilla.suse.com/show_bug.cgi?id=1219988
* https://bugzilla.suse.com/show_bug.cgi?id=1220999
* https://bugzilla.suse.com/show_bug.cgi?id=1221000
* https://bugzilla.suse.com/show_bug.cgi?id=1221001
* https://bugzilla.suse.com/show_bug.cgi?id=1221002
* https://bugzilla.suse.com/show_bug.cgi?id=1221003
SUSE-SU-2024:0808-1: important: Security update for xmlgraphics-batik
# Security update for xmlgraphics-batik
Announcement ID: SUSE-SU-2024:0808-1
Rating: important
References:
* bsc#1204704
* bsc#1204709
Cross-References:
* CVE-2022-41704
* CVE-2022-42890
* CVE-2022-44729
* CVE-2022-44730
CVSS scores:
* CVE-2022-41704 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-41704 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-42890 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-42890 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-44729 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
* CVE-2022-44730 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves four vulnerabilities can now be installed.
## Description:
This update for xmlgraphics-batik fixes the following issues:
* CVE-2022-41704: Fixed information disclosure vulnerability in Apache Batik
(bsc#1204704).
* CVE-2022-42890: Fixed information disclosure vulnerability in Apache Batik
(bsc#1204709).
* CVE-2022-44730: Fixed Server-Side Request Forgery.
* CVE-2022-44729: Fixed Server-Side Request Forgery.
Upgrade to version 1.17.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-808=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-808=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* xmlgraphics-batik-1.17-150200.4.7.1
* xmlgraphics-batik-svgpp-1.17-150200.4.7.1
* xmlgraphics-batik-ttf2svg-1.17-150200.4.7.1
* xmlgraphics-batik-squiggle-1.17-150200.4.7.1
* xmlgraphics-batik-javadoc-1.17-150200.4.7.1
* xmlgraphics-batik-slideshow-1.17-150200.4.7.1
* xmlgraphics-batik-rasterizer-1.17-150200.4.7.1
* xmlgraphics-batik-css-1.17-150200.4.7.1
* xmlgraphics-batik-demo-1.17-150200.4.7.1
* Development Tools Module 15-SP5 (noarch)
* xmlgraphics-batik-css-1.17-150200.4.7.1
* xmlgraphics-batik-1.17-150200.4.7.1
## References:
* https://www.suse.com/security/cve/CVE-2022-41704.html
* https://www.suse.com/security/cve/CVE-2022-42890.html
* https://www.suse.com/security/cve/CVE-2022-44729.html
* https://www.suse.com/security/cve/CVE-2022-44730.html
* https://bugzilla.suse.com/show_bug.cgi?id=1204704
* https://bugzilla.suse.com/show_bug.cgi?id=1204709
SUSE-SU-2024:0793-1: important: Security update for gstreamer-plugins-bad
# Security update for gstreamer-plugins-bad
Announcement ID: SUSE-SU-2024:0793-1
Rating: important
References:
* bsc#1217213
Cross-References:
* CVE-2023-44446
CVSS scores:
* CVE-2023-44446 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves one vulnerability can now be installed.
## Description:
This update for gstreamer-plugins-bad fixes the following issues:
* CVE-2023-44446: Fixed use-after-free remote code execution vulnerability via
MXF file (bsc#1217213).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-793=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-793=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-793=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-793=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-793=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libgstsctp-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-debuginfo-1.16.3-150300.9.18.1
* typelib-1_0-GstPlayer-1_0-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-devel-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-1.16.3-150300.9.18.1
* typelib-1_0-GstMpegts-1_0-1.16.3-150300.9.18.1
* typelib-1_0-GstWebRTC-1_0-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-doc-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-debugsource-1.16.3-150300.9.18.1
* libgstsctp-1_0-0-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-debuginfo-1.16.3-150300.9.18.1
* typelib-1_0-GstInsertBin-1_0-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-1.16.3-150300.9.18.1
* openSUSE Leap 15.3 (x86_64)
* libgstinsertbin-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-32bit-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-32bit-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-32bit-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-32bit-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-32bit-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-32bit-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-32bit-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* libgstsctp-1_0-0-32bit-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-32bit-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-32bit-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-32bit-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-32bit-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-32bit-debuginfo-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-32bit-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-32bit-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-32bit-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* libgstsctp-1_0-0-32bit-debuginfo-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-32bit-1.16.3-150300.9.18.1
* openSUSE Leap 15.3 (noarch)
* gstreamer-plugins-bad-lang-1.16.3-150300.9.18.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libgstsctp-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-64bit-debuginfo-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-64bit-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-64bit-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-64bit-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-64bit-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-64bit-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-64bit-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-64bit-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-64bit-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-64bit-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-64bit-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-64bit-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-64bit-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-64bit-1.16.3-150300.9.18.1
* libgstsctp-1_0-0-64bit-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-64bit-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-64bit-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-64bit-debuginfo-1.16.3-150300.9.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libgstsctp-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-debuginfo-1.16.3-150300.9.18.1
* typelib-1_0-GstPlayer-1_0-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-devel-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-1.16.3-150300.9.18.1
* typelib-1_0-GstMpegts-1_0-1.16.3-150300.9.18.1
* typelib-1_0-GstWebRTC-1_0-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-debugsource-1.16.3-150300.9.18.1
* libgstsctp-1_0-0-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-debuginfo-1.16.3-150300.9.18.1
* typelib-1_0-GstInsertBin-1_0-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-1.16.3-150300.9.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* gstreamer-plugins-bad-lang-1.16.3-150300.9.18.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libgstsctp-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-debuginfo-1.16.3-150300.9.18.1
* typelib-1_0-GstPlayer-1_0-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-devel-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-1.16.3-150300.9.18.1
* typelib-1_0-GstMpegts-1_0-1.16.3-150300.9.18.1
* typelib-1_0-GstWebRTC-1_0-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-debugsource-1.16.3-150300.9.18.1
* libgstsctp-1_0-0-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-debuginfo-1.16.3-150300.9.18.1
* typelib-1_0-GstInsertBin-1_0-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-1.16.3-150300.9.18.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* gstreamer-plugins-bad-lang-1.16.3-150300.9.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libgstsctp-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-debuginfo-1.16.3-150300.9.18.1
* typelib-1_0-GstPlayer-1_0-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-devel-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-1.16.3-150300.9.18.1
* typelib-1_0-GstMpegts-1_0-1.16.3-150300.9.18.1
* typelib-1_0-GstWebRTC-1_0-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-debugsource-1.16.3-150300.9.18.1
* libgstsctp-1_0-0-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-debuginfo-1.16.3-150300.9.18.1
* typelib-1_0-GstInsertBin-1_0-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-1.16.3-150300.9.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* gstreamer-plugins-bad-lang-1.16.3-150300.9.18.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libgstsctp-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-1.16.3-150300.9.18.1
* libgstbadaudio-1_0-0-debuginfo-1.16.3-150300.9.18.1
* typelib-1_0-GstPlayer-1_0-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-devel-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstmpegts-1_0-0-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-1.16.3-150300.9.18.1
* typelib-1_0-GstMpegts-1_0-1.16.3-150300.9.18.1
* typelib-1_0-GstWebRTC-1_0-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-1.16.3-150300.9.18.1
* libgstplayer-1_0-0-1.16.3-150300.9.18.1
* libgstwayland-1_0-0-1.16.3-150300.9.18.1
* libgstisoff-1_0-0-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-1.16.3-150300.9.18.1
* libgsturidownloader-1_0-0-1.16.3-150300.9.18.1
* libgstinsertbin-1_0-0-debuginfo-1.16.3-150300.9.18.1
* libgstwebrtc-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-debugsource-1.16.3-150300.9.18.1
* libgstsctp-1_0-0-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-chromaprint-debuginfo-1.16.3-150300.9.18.1
* libgstphotography-1_0-0-1.16.3-150300.9.18.1
* libgstbasecamerabinsrc-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-1.16.3-150300.9.18.1
* libgstadaptivedemux-1_0-0-debuginfo-1.16.3-150300.9.18.1
* gstreamer-plugins-bad-debuginfo-1.16.3-150300.9.18.1
* typelib-1_0-GstInsertBin-1_0-1.16.3-150300.9.18.1
* libgstcodecparsers-1_0-0-1.16.3-150300.9.18.1
* SUSE Enterprise Storage 7.1 (noarch)
* gstreamer-plugins-bad-lang-1.16.3-150300.9.18.1
## References:
* https://www.suse.com/security/cve/CVE-2023-44446.html
* https://bugzilla.suse.com/show_bug.cgi?id=1217213
SUSE-SU-2024:0794-1: important: Security update for sudo
# Security update for sudo
Announcement ID: SUSE-SU-2024:0794-1
Rating: important
References:
* bsc#1219026
* bsc#1220389
Cross-References:
* CVE-2023-42465
CVSS scores:
* CVE-2023-42465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42465 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for sudo fixes the following issues:
* CVE-2023-42465: Try to make sudo less vulnerable to ROWHAMMER attacks
(bsc#1219026).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-794=1 openSUSE-SLE-15.5-2024-794=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-794=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-794=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* sudo-test-1.9.12p1-150500.7.7.1
* sudo-plugin-python-debuginfo-1.9.12p1-150500.7.7.1
* sudo-plugin-python-1.9.12p1-150500.7.7.1
* sudo-debuginfo-1.9.12p1-150500.7.7.1
* sudo-1.9.12p1-150500.7.7.1
* sudo-debugsource-1.9.12p1-150500.7.7.1
* sudo-devel-1.9.12p1-150500.7.7.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* sudo-debuginfo-1.9.12p1-150500.7.7.1
* sudo-debugsource-1.9.12p1-150500.7.7.1
* sudo-1.9.12p1-150500.7.7.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* sudo-plugin-python-debuginfo-1.9.12p1-150500.7.7.1
* sudo-plugin-python-1.9.12p1-150500.7.7.1
* sudo-debuginfo-1.9.12p1-150500.7.7.1
* sudo-1.9.12p1-150500.7.7.1
* sudo-debugsource-1.9.12p1-150500.7.7.1
* sudo-devel-1.9.12p1-150500.7.7.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42465.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219026
* https://bugzilla.suse.com/show_bug.cgi?id=1220389
openSUSE-SU-2024:0077-1: important: Security update for python-Django
openSUSE Security Update: Security update for python-Django
_______________________________
Announcement ID: openSUSE-SU-2024:0077-1
Rating: important
References: #1220358
Cross-References: CVE-2024-27351
CVSS scores:
CVE-2024-27351 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP5
_______________________________
An update that fixes one vulnerability is now available.
Description:
This update for python-Django fixes the following issues:
- CVE-2024-27351: Fixed a denial-of-service in regular expression of
django.utils.text.Truncator.words() (boo#1220358).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-77=1
Package List:
References:
https://www.suse.com/security/cve/CVE-2024-27351.html
https://bugzilla.suse.com/1220358
openSUSE-SU-2024:0080-1: important: Security update for python-Django1
openSUSE Security Update: Security update for python-Django1
_______________________________
Announcement ID: openSUSE-SU-2024:0080-1
Rating: important
References: #1220358
Cross-References: CVE-2024-27351
CVSS scores:
CVE-2024-27351 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP5
_______________________________
An update that fixes one vulnerability is now available.
Description:
This update for python-Django1 fixes the following issues:
- CVE-2024-27351: Fixed a denial-of-service in regular expression of
django.utils.text.Truncator.words() (boo#1220358).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-80=1
Package List:
- openSUSE Backports SLE-15-SP5 (noarch):
python3-Django1-1.11.29-bp155.4.9.1
References:
https://www.suse.com/security/cve/CVE-2024-27351.html
https://bugzilla.suse.com/1220358